Navigation Menu

Search code, repositories, users, issues, pull requests..., provide feedback.

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly.

To see all available qualifiers, see our documentation .

  • Notifications

Model of virtual power plant as a part of Msc thesis

wiola94/VirtualPowerPlant

Folders and files, repository files navigation, virtualpowerplant.

Model of a virtual power plant as a part of MSc thesis

The repository is a part of the thesis about the system for Negawatt Virtual Power Plant, which heads up groups of heat pumps. Virtual Power Plant is a concept of connected power plants and regular users of electric power. The main aim of such a system is to take control over dependent installations in order to maintain good collaborations with power system and to make a profit. The program compares two types of heat pump operation. The first one (later called ‘Simple Mode’) did not take into consideration managing with the Virtual Power Plant concept and was a base version to economically compare it to the enhanced one. The second type of simulation ( later called ‘VPPMode’), was to manage dependent cells by a Virtual Power Plant way of thinking.

Title of the thesis: "Project of negawatt virtual power plant based on the work of heat pumps"

Link to the thesis: https://repo.pw.edu.pl/info/master/WUT56b33692a18a4f65aa5cae9fec04b136/

Warsaw University of Technology, Poland, 2018

  • Python 100.0%
  • Bibliography
  • More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
  • Automated transliteration
  • Relevant bibliographies by topics
  • Referencing guides

Virtual Power Plants and Integrated Energy System: Current Status and Future Prospects

  • Living reference work entry
  • First Online: 26 February 2022
  • Cite this living reference work entry

thesis on virtual power plant

  • Sambeet Mishra 4 , 5 ,
  • Chiara Bordin 6 ,
  • Madis Leinakse 7 ,
  • Fushuan Wen 7 ,
  • Robert J Howlett 8 &
  • Ivo Palu 7  

229 Accesses

The power system is undergoing a digitalization, decarbonization, and decentralization. Economic incentives along with resiliency and reliability concerns are partly driving the transition. In the process of decentralization, local energy markets are forming at various places. A virtual power plant (VPP) is a by-product of this digitalization capitalizing on the opportunity to further promote renewable resources, demand-side flexibility, and sector coupling. A VPP enables resilient operation of power system while assembling small- to large-scale generation units and demand-side flexibility. Specifically, during the pandemic uncertainty, virtual work meets virtual power plants. A VPP has two both cyber and physical components. On one side, the physical component presents the operational challenges in terms of security, stability, reliability, and efficiency. On the other side, the cyber component introduces the challenges on communication, computation, security, and privacy. A VPP synthesizes synergies between the cyber and physical components, thereby harnessing the potential in terms of enhancing energy efficiency and reducing the cost. The objective of this chapter is to introduce the virtual power plant and integrated energy system with associated concepts, terminology, and relation thereof. The secondary objective is to categorize the key concepts while highlighting subsequent issues in planning, operations, and control of a VPP with an integrated energy system. Moreover, this chapter knits together the concepts and challenges in realizing virtual power plants with integrated energy systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

A4 large scale storage options under special consideration of 6 × 15 mw battery example, http://www.eqmagpro.com/wp-content/uploads/2017/06/VGB-Congress_Benesch.pdf . Accessed on 21 Oct 2020

K. Aduda, T. Labeodan, W. Zeiler, G. Boxem, Demand side flexibility coordination in office buildings: a framework and case study application. Sustain. Cities Soc. 29 , 139–158 (2017)

Google Scholar  

A. Ajanovic, A. Hiesl, R. Haas, On the role of storage for electricity in smart energy systems. Energy 200 117473 (2020)

A. Alahyari, M. Ehsan, M. Moghimi, Managing distributed energy resources (DERs) through virtual power plant technology (VPP): a stochastic information-gap decision theory (IGDT) approach. Iranian J. Sci. Technol. Trans. Electric. Eng. 44 (1), 279–291 (2020). https://doi.org/10.1007/s40998-019-00248-w

A. Aldegheishem, R. Bukhsh, N. Alrajeh, N. Javaid, FaaVPP: fog as a virtual power plant service for community energy management. Futur. Gener. Comput. Syst. 105 , 675–683 (2020)

A.A. Alkahtani, S.T. Alfalahi, A.A. Athamneh, A.Q. Al-Shetwi, M.B. Mansor, M. Hannan, V.G. Agelidis, Power quality in microgrids including supraharmonics: issues, standards, and mitigations. IEEE Access 8 , 127104–127122 (2020)

A.Q. Al-Shetwi, M.Z. Sujod, Modeling and control of grid-connected photovoltaic power plant with fault ride-through capability. J. Solar Energy Eng. 140 (2), 1–8 (2018)

A.Q. Al-Shetwi, M. Hannan, K.P. Jern, A.A. Alkahtani, A. PG Abas, Power quality assessment of grid-connected pv system in compliance with the recent integration requirements. Electronics 9 (2), 366 (2020)

M.A. Ancona, M. Bianchi, L. Branchini, A. De Pascale, F. Melino, A. Peretto, Low temperature district heating networks for complete energy needs fulfillment. Int. J. Sustain. Energy Plan. Manag. 24 , 33–42 (2019)

K.E. Antoniadou-Plytaria, I.N. Kouveliotis-Lysikatos, P.S. Georgilakis, n.d. Hatziargyriou, Distributed and decentralized voltage control of smart distribution networks: models, methods, and future research. IEEE Trans. Smart Grid 8 (6), 2999–3008 (2017)

S.G. Argade, V. Aravinthan, I.E. Büyüktahtakın, S. Joseph, Performance and consumer satisfaction-based bi-level tariff scheme for EV charging as a VPP. IET Gener. Transm. Distrib. 13 (11), 2112–2122 (2018)

P. Asmus, Microgrids, virtual power plants and our distributed energy future. Electric. J. 23 (10), 72–82 (2010)

S. Babaei, C. Zhao, L. Fan, A data-driven model of virtual power plants in day-ahead unit commitment. IEEE Trans. Power Syst. 34 (6), 5125–5135 (2019)

L. Bai, F. Li, H. Cui, T. Jiang, H. Sun, J. Zhu, Interval optimization based operating strategy for gas-electricity integrated energy systems considering demand response and wind uncertainty. Appl. Energy 167 , 270–279 (2016). https://doi.org/10.1016/j.apenergy.2015.10.119

R. Boampong, D.P. Brown, On the benefits of behind-the-meter rooftop solar and energy storage: the importance of retail rate design. Energy Econ. 86 , 104682 (2020)

C. Bordin, A. Gordini, D. Vigo, An optimization approach for district heating strategic network design. Eur. J. Oper. Res. 252 (1), 296–307 (2016)

C. Bordin, A. Håkansson, S. Mishra, Smart energy and power systems modelling: an IOT and cyber-physical systems perspective, in the context of energy informatics. Proc. Comput. Sci. 176 , 2254–2263 (2020)

T. Brown, D. Schlachtberger, A. Kies, S. Schramm, M. Greiner, Synergies of sector coupling and transmission reinforcement in a cost-optimised, highly renewable European energy system. Energy 160 , 720–739 (2018). arXiv:1801.05290, https://doi.org/10.1016/j.energy.2018.06.222

Building a battery power plant wemag – aggreko, https://www.aggreko.com/en-pg/case-studies/utilities/building-a-battery-power-plant-wemag#challenge . Accessed on 21 Oct 2020

Centrica’s restore business launches 32 mw ‘virtual power plant’ in Belgium – centrica plc, https://www.centrica.com/news/centricas-restore-business-launches-32-mw-virtual-power-plant-belgium . Accessed on 21 Oct 2020

P. Chaudhari, P. Rane, A. Bawankar, P. Shete, K. Kalange, A. Moghe, J. Panda, A. Kadrolkar, K. Gaikwad, N. Bhor et al., Design and implementation of statcom for reactive power compensation and voltage fluctuation mitigation in microgrid, in 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES) (IEEE, 2015), pp. 1–5

S.T. Chavhan, C. Bhattar, P.V. Koli, V.S. Rathod, Application of statcom for power quality improvement of grid integrated wind mill, in 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO) (IEEE, 2015), pp. 1–7

C.-I. Chen, Y.-C. Chen, C.-N. Chen, A high-resolution technique for flicker measurement in power quality monitoring, in 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA) (IEEE, 2013), pp. 528–533

K.J. Chua, S.K. Chou, W. Yang, Advances in heat pump systems: a review. Appl. Energy 87 (12), 3611–3624 (2010)

e2m announces strategic partnership with swytch to collaborate on proof of concept pilot – with e2m, https://www.e2m.energy/en/news-entry/Strategic-Partnership-with-Swytch.html . Accessed on 21 Oct 2020

Edf offers 866 mw at VPP auction, no additional power tenders on horizon – icis, https://www.icis.com/explore/resources/news/2007/11/29/9300807/edf-offers-866-mw-at-vpp-auction-no-additional-power-tenders-on-horizon/ . Accessed on 21 Oct 2020

N. Edomah, Effects of voltage sags, swell and other disturbances on electrical equipment and their economic implications, in IEEE Proceedings of 20th International Conference on Electricity Distribution (IET, 2009), pp. 1–4

K. El Bakari, W.L. Kling, Virtual power plants: an answer to increasing distributed generation, in IEEE PES Innovative Smart Grid Technologies Conference Europe, ISGT Europe (2010). https://doi.org/10.1109/ISGTEUROPE.2010.5638984

M. Emarati, F. Keynia, M. Rashidinejad, A two-stage stochastic programming framework for risk-based day-ahead operation of a virtual power plant. Int. Trans. Electric. Energy Syst. 30 (3) (2020). https://doi.org/10.1002/2050-7038.12255

Enel increases ‘virtual power plant’ to 157 mw – Vermont business magazine, https://vermontbiz.com/news/2018/march/01/enel-increases-virtual-power-plant-157mw . Accessed on 21 Oct 2020

Engie, kiwi power partner on virtual power plants in US – s&p global market intelligence, https://www.spglobal.com/marketintelligence/en/news-insights/latest-news-headlines/engie-kiwi-power-partner-on-virtual-power-plants-in-us-59480758 . Accessed on 21 Oct 2020

E.on and thyssenkrupp bring hydrogen to the electric market – energy live news, https://www.en ergylivenews.com/2020/06/30/e-on-and-thyssenkrupp-bring-hydrogen-to-the-electric-market/ . Accessed on 21 Oct 2020

Evegen virtual power plant, https://www.evergen.com.au/ . Accessed on 21 Oct 2020

First 5 mw virtual power plant from major utility origin gets funding in victoria, Australia, https://www.energy-storage.news . Accessed on 21 Oct 2020

J. Freeman, I. Guarracino, S.A. Kalogirou, C.N. Markides, A small-scale solar organic Rankine cycle combined heat and power system with integrated thermal energy storage. Appl. Thermal Eng. 127 , 1543–1554 (2017)

G. Fridgen, R. Keller, M.-F. Körner, M. Schöpf, A holistic view on sector coupling. Energy Policy 147 , 111913 (2020)

I. Gerami Moghaddam, Scheduling a smart energy hub-based virtual power plant using benders decomposition to considering power system constraints. Int. Trans. Electric. Energy Syst. 28 (10), e2608 (2018)

A. Ghosh, G. Ledwich, A unified power quality conditioner (UPQC) for simultaneous voltage and current compensation. Electric Power Syst. Res. 59 (1), 55–63 (2001)

C. Goebel, H.-A. Jacobsen, V. del Razo, C. Doblander, J. Rivera, J. Ilg, C. Flath, H. Schmeck, C. Weinhardt, D. Pathmaperuma et al., Energy Inf. Bus. Inf. Syst. Eng. 6 (1), 25–31 (2014)

D. Graovac, V. Katic, A. Rufer, Power quality problems compensation with universal power quality conditioning system. IEEE Trans. Power Delivery 22 (2), 968–976 (2007)

A. Hariri, M.O. Faruque, Impacts of distributed generation on power quality, in 2014 North American Power Symposium (NAPS) (IEEE, 2014), pp. 1–6

A. Hariri, M.O. Faruque, R. Soman, R. Meeker, Impacts and interactions of voltage regulators on distribution networks with high pv penetration, in 2015 North American Power Symposium (NAPS) (IEEE, 2015), pp. 1–6

A. Hauer, Storage technology issues and opportunities, international low-carbon energy technology platform, in, Proceedings of the Strategic and Cross-Cutting Workshop “Energy Storage—Issues and Opportunities” , Paris, vol. 15 (2011)

R. Hemmati, H. Saboori, S. Saboori, Stochastic risk-averse coordinated scheduling of grid integrated energy storage units in transmission constrained wind-thermal systems within a conditional value-at-risk framework. Energy 113 , 762–775 (2016). https://doi.org/10.1016/ j.energy.2016.07.089

A. Honrubia-Escribano, T. García-Sánchez, E. Gómez-Lázaro, E. Muljadi, A. Molina-Garcia, Power quality surveys of photovoltaic power plants: characterisation and analysis of grid-code requirements. IET Renew. Power Gener. 9 (5), 466–473 (2015)

E. Hossain, M.R. Tür, S. Padmanaban, S. Ay, I. Khan, Analysis and mitigation of power quality issues in distributed generation systems using custom power devices. IEEE Access 6 , 16816–16833 (2018)

K. Ilango, A. Bhargav, A. Trivikram, P. Kavya, G. Mounika, M.G. Nair, Power quality improvement using statcom with renewable energy sources, in 2012 IEEE 5th India International Conference on Power Electronics (IICPE) (IEEE, 2012), pp. 1–6

S.-I. Inage, Prospects for large-scale energy storage in decarbonised power grids. Int. Energy Agency 3 (4), 125 (2009)

M. Jadidbonab, B. Mohammadi-Ivatloo, M. Marzband, P. Siano, Short-term self-scheduling of virtual energy hub plant within thermal energy market. IEEE Trans. Ind. Electron. 1 (2020). https://doi.org/10.1109/tie.2020.2978707

J.-P. Jimenez-Navarro, K. Kavvadias, F. Filippidou, M. Pavičević, S. Quoilin, Coupling the heating and power sectors: the role of centralised combined heat and power plants and district heat in a European decarbonised power system. Appl. Energy 270 , 115134 (2020)

J.T. Johnson, Design and evaluation of a secure virtual power plant. Technical report, Sandia National Lab.(SNL-NM), Albuquerque, NM (United States) (2017)

M. Kesler, E. Ozdemir, Synchronous-reference-frame-based control method for upqc under unbalanced and distorted load conditions. IEEE Trans. Ind. Electron. 58 (9), 3967–3975 (2010)

V. Khadkikar, Enhancing electric power quality using UPQC: a comprehensive overview. IEEE Trans. Power Electron. 27 (5), 2284–2297 (2011)

V. Khadkikar, A. Chandra, A. Barry, T. Nguyen, Analysis of power flow in UPQC during voltage sag and swell conditions for selection of device ratings, in 2006 Canadian Conference on Electrical and Computer Engineering (IEEE, 2006), pp. 867–872

J. Kiviluoma, S. Heinen, H. Qazi, H. Madsen, G. Strbac, C. Kang, N. Zhang, D. Patteeuw, T. Naegler, Harnessing flexibility from hot and cold: heat storage and hybrid systems can play a major role. IEEE Power Energy Mag. 15 (1), 25–33 (2017)

A. Kulmala, S. Repo, P. Järventausta, Coordinated voltage control in distribution networks including several distributed energy resources. IEEE Trans. Smart Grid 5 (4), 2010–2020 (2014)

T.-L. Lee, S.-H. Hu, Y.-H. Chan, D-statcom with positive-sequence admittance and negative-sequence conductance to mitigate voltage fluctuations in high-level penetration of distributed-generation systems. IEEE Trans. Ind. Electron. 60 (4), 1417–1428 (2011)

S. Lehnhoff, A. Nieße, Recent trends in energy informatics research. IT-Inf. Technol. 59 (1), 1–3 (2017)

P. Li, Y. Liu, H. Xin, X. Jiang, A robust distributed economic dispatch strategy of virtual power plant under cyber-attacks. IEEE Trans. Ind. Inform. 14 (10), 4343–4352 (2018)

Limejump gets all clear to chase big six in UK grid balancing market – rethink, https://rethi- nkresearch.biz/articles/limejump-gets-all-clear-to-chase-big-six-in-uk-grid-balancing-market/ . Accessed on 21 Oct 2020

L. Lin, X. Guan, Y. Peng, N. Wang, S. Maharjan, T. Ohtsuki, Deep reinforcement learning for economic dispatch of virtual power plant in internet of energy. IEEE Internet Things J. 7 , 6288–6301 (2020)

X. Liu, A. Aichhorn, L. Liu, H. Li, Coordinated control of distributed energy storage system with tap changer transformers for voltage rise mitigation under high photovoltaic penetration. IEEE Trans. Smart Grid 3 (2), 897–906 (2012)

J. Lizana, C. Bordin, T. Rajabloo, Integration of solar latent heat storage towards optimal small-scale combined heat and power generation by organic Rankine cycle. J. Energy Storage 29 , 101367 (2020)

J. Lu, X. Zheng, A. Gharaei, K. Kalaboukas, D. Kiritsis, Cognitive twins for supporting decision-makings of internet of things systems, in Proceedings of 5th International Conference on the Industry 4.0 Model for Advanced Manufacturing (Springer, 2020), pp. 105–115

C. Mateu-Royo, S. Sawalha, A. Mota-Babiloni, J. Navarro-Esbrí, High temperature heat pump integration into district heating network. Energy Convers. Manag. 210 , 112719 (2020)

S. Mishra, C. Bordin, A. Tomasgard, I. Palu, A multi-agent system approach for optimal microgrid expansion planning under uncertainty. Int. J. Electric. Power Energy Syst. 109 , 696–709 (2019)

‘modelling electricity demand the key’ as UK comes out of lockdown: Kiwi power – s&p global platts, https://www.spglobal.com . Accessed on 21 Oct 2020

Moixa to build virtual power plant as first phase of UK smart energy project – pv magazine international, https://www.moixa.com/ . Accessed on 21 Oct 2020

M. Molinas, J.A. Suul, T. Undeland, Low voltage ride through of wind farms with cage generators: statcom versus SVC. IEEE Trans. Power Electron. 23 (3), 1104–1117 (2008)

J.M. Morales, A.J. Conejo, H. Madsen, P. Pinson, M. Zugno, Integrating Renewables in Electricity Markets: Operational Problems , vol. 205 (Springer Science & Business Media, New York, 2013)

Navigant research names autogrid as #1 virtual power plant platform provider in 2020 – autogrid, https://www.auto-grid.com/products/virtual-power-plant/ . Accessed on 21 Oct 2020

Next kraftwerke connects 2 mw battery to its VPP in Belgium – pv magazine international, https://www.pv-magazine.com/2018/07/13/next-kraftwerke-connects-2-mw-battery-to-its-vpp-in-belgium/ . Accessed on 21 Oct 2020

Next kraftwerke records strong portfolio growth in 2017, https://www.next-kraftwerke.com/news/next-kraftwerke-records-strong-portfolio-growth-in-2017 . Accessed on 21 Oct 2020

H.T. Nguyen, L.B. Le, Z. Wang, A bidding strategy for virtual power plants with the intraday demand response exchange market using the stochastic programming. IEEE Trans. Ind. Appl. 54 (4), 3044–3055 (2018)

Open energi – dynamic demand 2.0 distributed energy platform, https://www.openenergi.com/ . Accessed on 21 Oct 2020

G. Papaefthymiou, K. Dragoon, Towards 100% renewable energy systems: uncapping power system flexibility. Energy Policy 92 , 69–82 (2016). https://doi.org/10.1016/j.enpol.2016. 01.025

T. Pavleska, H. Aranha, M. Masi, G.P. Sellitto, Drafting a cybersecurity framework profile for smart grids in EU: A goal-based methodology, in European Dependable Computing Conference (Springer, 2020), pp. 143–155

J.S. Pereira, J.B. Ribeiro, R. Mendes, G.C. Vaz, J.C. André, Orc based micro-cogeneration systems for residential application–a state of the art review and current challenges. Renew. Sustain. Energy Rev. 92 , 728–743 (2018)

Pge program will transform hundreds of homes into a virtual power plant – news releases – pge, https://www.portlandgeneral.com . Accessed on 21 Oct 2020

G. Plancke, K. De Vos, R. Belmans, A. Delnooz, Virtual power plants: definition, applications and barriers to the implementation in the distribution system, in International Conference on the European Energy Market, EEM , Aug 2015 (IEEE Computer Society, 2015). https://doi.org/ 10.1109/EEM.2015.7216693

Book   Google Scholar  

D. Pudjianto, C. Ramsay, G. Strbac, Virtual power plant and system integration of distributed energy resources. IET Renew. Power Gener. 1 (1), 10–16 (2007). https://doi.org/10.1049/iet-rpg:20060023

Quinbrook invests in flexible generation, grid support and demand response, https://www.quinbrook.com . Accessed on 21 Oct 2020

D. Ranamuka, A. Agalgaonkar, K. Muttaqi, Online voltage control in distribution systems with multiple voltage regulating devices. IEEE Trans. Sustain. Energy 5 (2), 617–628 (2013)

D. Ranamuka, A.P. Agalgaonkar, K.M. Muttaqi, Examining the interactions between dg units and voltage regulating devices for effective voltage control in distribution systems. IEEE Trans. Ind. Appl. 53 (2), 1485–1496 (2016)

D. Ranamuka, A.P. Agalgaonkar, K.M. Muttaqi, Examining the interactions between dg units and voltage regulating devices for effective voltage control in distribution systems. IEEE Trans. Ind. Appl. 53 (2), 1485–1496 (2017)

T.B. Rasmussen, G. Yang, A.H. Nielsen, Z. Dong, A review of cyber-physical energy system security assessment, in 2017 IEEE Manchester PowerTech (IEEE, 2017), pp. 1–6

P.K. Ray, S.R. Mohanty, N. Kishor, Classification of power quality disturbances due to environmental characteristics in distributed generation system. IEEE Trans. Sustain. Energy 4 (2), 302–313 (2012)

P.K. Ray, S.R. Mohanty, N. Kishor, J.P. Catalão, Optimal feature and decision tree-based classification of power quality disturbances in distributed generation systems. IEEE Trans. Sustain. Energy 5 (1), 200–208 (2013)

repowering-clean-sunrun.pdf, https://www.sunrun.com/sites/default/files/repowering-clean-sunrun.pdf . Accessed on 21 Oct 2020

M. Robinius, A. Otto, P. Heuser, L. Welder, K. Syranidis, D.S. Ryberg, T. Grube, P. Markewitz, R. Peters, D. Stolten, Linking the power and transport sectors – part 1: The principle of sector coupling. Energies 10 (7), 956 (2017)

J.M. Rozanec, L. Jinzhi, Towards actionable cognitive digital twins for manufacturing, in International Workshop On Semantic Digital Twins (SeDiT 2020) , Greece (2020)

Sa virtual power plant – tesla Australia, https://www.tesla.com/en_au/sa-virtual-power-plant . Accessed on 21 Oct 2020

O. Sadeghian, A. Oshnoei, R. Khezri, S. Muyeen, Risk-constrained stochastic optimal allocation of energy storage system in virtual power plants. J. Energy Storage 31 , 101732 (2020)

R. Saint, N. Friedman, The application guide for distributed generation interconnection-the nreca guide to IEEE 1547, in 2002 Rural Electric Power Conference. Papers Presented at the 46th Annual Conference (Cat. No. 02CH37360) (IEEE, 2002), pp. D2–1

I. Sarbu, C. Sebarchievici, A comprehensive review of thermal energy storage. Sustainability 10 (1), 191 (2018)

Simply energy virtual power plant – Australian renewable energy agency, https://arena.gov.au/projects/simply-energy-virtual-power-plant-vpp/ . Accessed on 21 Oct 2020

Software for virtual power plants powered by residential solar-plus-storage, https://www.pv-magazine.com/ . Accessed on 21 Oct 2020

M. Sony, Lean six sigma in the power sector: frog into prince. Benchmarking: Int. J. 26 , 356– 370 (2019)

Springer, Aims and scope of energy informatics journal, https://energyinformatics.springeropen.com , online; Accessed 2020

Statkraft unveils 1gw virtual power plant in UK, intends to double capacity by summer – current news, https://www.statkraft.com/newsroom/news-and-stories/archive/2020/vpp-balancing-services/ . Accessed on 21 Oct 2020

Storage and the rise of the virtual power plant – energy storage news, https://www.energy-storage.news/blogs/storage-and-the-rise-of-the-virtual-power-plant . Accessed on 21 Oct 2020

R. Thallam, G. Heydt, Power acceptability and voltage sag indices in the three phase sense, in 2000 Power Engineering Society Summer Meeting (Cat. No. 00CH37134), vol. 2 (IEEE, 2000), pp. 905–910

A. Van der Veen, M. Van der Laan, H. De Heer, E. Klaassen, W. Van den Reek, Flexibility value chain (2018)

S.K. Venkatachary, J. Prasad, R. Samikannu, A. Alagappan, L.J.B. Andrews, Cybersecurity infrastructure challenges in IoT based virtual power plants. J. Stat. Manag. Syst. 23 (2), 263–276 (2020)

F.A. Viawan, D. Karlsson, Combined local and remote voltage and reactive power control in the presence of induction machine distributed generation. IEEE Trans. Power Syst. 22 (4), 2003–2012 (2007)

VPP, Why Ecotricity has entered the flexibility market – theenergyst.com, https://theenergyst.com/ecotricity-enters-flexibility-market/ . Accessed on 21 Oct 2020

VPP.pdf, https://www.enbala.com/wp-content/uploads/2018/01/VPP.pdf . Accessed on 21 Oct 2020

S. Vukmirović, A. Erdeljan, F. Kulić, S. Luković, Software architecture for smart metering systems with virtual power plant, in MELECON 2010-2010 15th IEEE Mediterranean Electrotechnical Conference (IEEE, 2010), pp. 448–451

W.a. community virtual power plant confirms $50m Swiss investment – one step off the grid, https://onestepoffthegrid.com.au/w-a-community-virtual-power-plant-confirms-50m-swiss-investment/ . Accessed on 21 Oct 2020

R. Walling, R. Saint, R.C. Dugan, J. Burke, L.A. Kojovic, Summary of distributed resources impact on power delivery systems. IEEE Trans. Power Delivery 23 (3), 1636–1644 (2008)

What is a virtual power plant? https://www.solarpowerworldonline.com/2017/09/virtual-power-plant/ . Accessed on 21 Oct 2020

M. Wickert, S. Liebehentze, A. Zündorf, Experience report: first steps towards a microservice architecture for virtual power plants in the energy sector, in Joint Post-proceedings of the First and Second International Conference on Microservices (Microservices 2017/2019) , Schloss Dagstuhl-Leibniz-Zentrum für Informatik (2020)

S. Wong, J.-P. Pinard, Opportunities for smart electric thermal storage on electric grids with renewable energy. IEEE Trans. Smart Grid 8 (2), 1014–1022 (2016)

Y. Wong, L. Lai, S. Gao, K. Chau, Stationary and mobile battery energy storage systems for smart grids, in 2011 4th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT) (IEEE, 2011), pp. 1–6

Q.-H. Wu, J. Zheng, Z. Jing, X. Zhou, Large-Scale Integrated Energy Systems . Energy Systems in Electrical Engineering (Springer, Singapore, 2019). https://doi.org/10.1007/978-981-13-6943-8

Y. Yohanis, O. Popel, S. Frid, B. Norton, Geographic variation of solar water heater performance in Europe. Proc. Inst. Mech. Eng. Part A: J. Power Energy 220 (4), 395–407 (2006)

V. Yuvaraj, S. Deepa, A.R. Rozario, M. Kumar, Improving grid power quality with facts device on integration of wind energy system, in 2011 Fifth Asia Modelling Symposium (IEEE, 2011), pp. 157–162

Z. Zhai, J.F. Martínez, N.L. Martínez, V.H. Díaz, Applying case-based reasoning and a learning-based adaptation strategy to irrigation scheduling in grape farming. Comput. Electron. Agric. 178 , 105741 (2020)

X. Zhang, M. Shahidehpour, A. Alabdulwahab, A. Abusorrah, Optimal expansion planning of energy hub with multiple energy infrastructures. IEEE Trans. Smart Grid 6 (5), 2302–2311 (2015). https://doi.org/10.1109/TSG.2015.2390640

G. Zhang, C. Jiang, X. Wang, Comprehensive review on structure and operation of virtual power plant in electrical system (2019). https://doi.org/10.1049/iet-gtd.2018.5880

Y. Zhao, Electrical power systems quality. Univ. Buffalo (2016)

B. Zwaenepoel, J. Vansteenbrugge, T. Vandoorn, G. Van Eetvelde, L. Vandevelde, Renewable energy balancing with thermal grid support, in 16th International conference on Process Integration, Modelling and Optimisation for Energy Saving and Pollution Reduction (PRES 2013) , vol. 35 (AIDIC Servizi, 2013), pp. 535–540

Download references

Acknowledgements

This work is supported by the Estonian Research Council grant PUTJD915.

Author information

Authors and affiliations.

Tallinn University of Technology, Tallinn, Estonia

Sambeet Mishra

Danish Technical University, Kongens Lyngby, Denmark

The Arctic University of Norway, Tromsø, Norway

Chiara Bordin

Madis Leinakse, Fushuan Wen & Ivo Palu

KES International, Shoreham-by-sea, UK

Robert J Howlett

You can also search for this author in PubMed   Google Scholar

Corresponding authors

Correspondence to Sambeet Mishra or Chiara Bordin .

Editor information

Editors and affiliations.

Information Technology and Decision Sciences, University of North Texas, Denton, TX, USA

Mahdi Fathi

Department of Energy, Politecnico di Milano, MILANO, Milano, Italy

Industrial & Systems Engineering, University of Florida, GAINESVILLE, FL, USA

Panos M. Pardalos

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this entry

Cite this entry.

Mishra, S., Bordin, C., Leinakse, M., Wen, F., Howlett, R.J., Palu, I. (2021). Virtual Power Plants and Integrated Energy System: Current Status and Future Prospects. In: Fathi, M., Zio, E., Pardalos, P.M. (eds) Handbook of Smart Energy Systems. Springer, Cham. https://doi.org/10.1007/978-3-030-72322-4_73-1

Download citation

DOI : https://doi.org/10.1007/978-3-030-72322-4_73-1

Published : 26 February 2022

Publisher Name : Springer, Cham

Print ISBN : 978-3-030-72322-4

Online ISBN : 978-3-030-72322-4

eBook Packages : Springer Reference Economics and Finance Reference Module Humanities and Social Sciences Reference Module Business, Economics and Social Sciences

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Research Explorer The University of Manchester Logo

Characterisation of Virtual Power Plants

  • Department of Electrical & Electronic Engineering

Student thesis : Phd

  • Virtual Power Plants
  • Distributed Generation
  • Characterisation

File : application/pdf, -1 bytes

Type : Thesis

  • Open access
  • Published: 31 March 2021

Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?

  • Sampath Kumar Venkatachary   ORCID: orcid.org/0000-0002-5583-7313 1 ,
  • Annamalai Alagappan 2 &
  • Leo John Baptist Andrews 3  

Energy Informatics volume  4 , Article number:  5 ( 2021 ) Cite this article

8221 Accesses

7 Citations

3 Altmetric

Metrics details

Distributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements. With this also comes challenges associated with securing physical systems, data protection and information privacy. Recent technological advancements have aided cybercriminals to disrupt operations by carrying out deliberate attacks on the energy sector. Though security researchers have tried to mitigate the risks, vulnerabilities, and it remains a challenge. This paper aims to present a comprehensive Edge-based security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection.

Introduction

Virtual Power Plants (VPP), Smart Grids (S.G.). Virtual Power Plant, “As its name infers, a virtual power plant does not exist in the solid and-turbine sense. It utilises the smart grid infrastructure to integrate little, divergent energy assets as though they were a single generator. Pretty much any energy source can be connected up. (Kumagai, 2012 ). Moreover, the energy can likewise add to a virtual power, not plant’s capacity” The point of VPP’s is to distributed appropriated energy assets over the virtual energy pool. (Fig . 1 ) shows a brief overview of a Virtual Power Plant. Unlike traditional energy systems, the energy generation is not centralised in a remote location and then transmitted in a complex network but instead generated in small individual distributed areas. In this, a consumer can become a prosumer and supply the excess energy generated back to the grid. The traditional model, though, is cost-effective the outreach of the model in third world countries pose a problem where the majority of the population have no access to energy. This problem technically can be addressed by using distributed energy networks and effectively exercise control through a VPP operator. It is expected that by 2035–2040 the electricity system will mostly constitute decentralised IoT devices effectively communicating through virtual power plants and distributed energy systems. In short, electricity will be digital.

figure 1

VPP Energy System

This growing deployment of small prosumers also poses a problem in the grid systems which also needs to adopt a decentralised approach to reduce the complexity and overcome the increasingly new challenges in management (Pop et al., 2019 ). These deployments pose a different set of problems in the form of efficiency in integration, energy supply security, continuity. Assuming the energy generated is not consumed by the consumer in the resource, it could also technically lead to over-voltage problems, losses, transformer ageing and efficiency.

The future energy networks will relate to advance distribution and management systems, including using data relating to grid monitoring, control, sensors, load balancing requirements, environmental parameters etc. (Rennie, 2019 ). The range of data shared between transmission and distribution, system, grid operators, consumers, prosumers, aggregators are enormous. Most of these systems will also be using intelligent control systems, distributed intelligence employing A.I. This will also help enhance consumers with improving capabilities, reporting and managing infrastructure.

Edge virtual power plants

The term edge computing is relatively a new concept, though very similar to other computing terminologies in use. Edge computing refers to simple process operations carried out close to the origins of data. In simple terms, the processes can be done on the devices rather than on the servers, increasing the processing speed. Therefore, it is possible to offload a few resource-hungry tasks to the new edge layer, thereby reducing the impact on resource-constrained resources. The application of edge technology in virtual power plant technically involves optimising resources through machine learning algorithms. As more and more DER systems integrate, the data must be processed balloons, requiring more processing power. Since each of these devices communicates with the IoT devices in the household, the information processed can be done locally (Rennie, 2019 ).

Traditional VPP’s mostly are controlled centrally, and the information is collated and transmitted to these central units through a communication environment including 5G technologies (Jaber et al., 2016 ; Khodashenas et al., 2016 ) (Zaho & Gerla, 2019 ). 5G communication technologies are said to noted to have privacy issues in a centralised environment (Cai et al., 2019 ; Cai & Zheng, 2019 ; Tian et al., 2019 ), leading researchers to suggest distributed control methods (Chen et al., 2018a , b , c ; Cai & He, 2019 ; Huang et al., 2019 ). The advancement of technology has also led to research on edge computing for processing information and control. (Chen et al., 2018a , b , c ; Chen et al., 2018a , b , c ). The rise of A.I. and cognitive computing (Chen et al., 2019 ) has paved the way for applying mathematical tools to improve processes and efficiency, which are popularly termed as Edge Intelligence (Zhou et al., 2019 ; Rausch & Dustdar, 2019 ). Due to this huge demand for processing on the edge nodes, edge computing applies the A.I. to enhance the processing speeds. The application of edge intelligence computing requires a huge communication network and bandwidth. As VPP is also a combination of distributed networks, some of these problems apply. Some of these problems have been effectively addressed to minimise the costs and reduce the communication environment by Li et al. (Li et al., 2018 ).

These dependencies on the ICT infrastructure also has potential cybersecurity threats. Since the operations are widespread and network-based with individual endpoints, the attack surface in a virtual power plant is vast since the core of the processes is from the control centre. The threat actors multiply manifold due to the different RTUs and SCADA gadgets. Any vulnerability in a single system is a gateway for hackers to get into the network. It can be noticed from the data analysed that the critical infrastructure services are frequently being targeted with malware or ransomware with a motive for financial gain or disruption. (Venkatachary et al., 2017 ; Venkatachary et al., 2018a ; Venkatachary et al., 2018 b). They are thus providing a way for enhancing security mechanisms across the network. Therefore, this new edge concept also offers the opportunity to deploy new based security solutions on the end devices, thus optimising performance. (Montero et al., 2016 ; Mach et al., 2017 ; Errabelly et al., 2017 ; Tao et al., 2017 ; Hsu et al., 2018 ).

Against this backdrop, this paper aims to provide an insight into various cybersecurity threats that emanate from these advance technological applications. Section 2 provides a detailed insight into cybersecurity trends and facilities attacked, and the need for better security. Section 3 discusses at length the proposed Edge-based solutions towards enhancing security in virtual power plants. Section 4 and 5 provides a detailed discussion and conclusions.

Cybersecurity trends and the edge centric architecture for VPP

Among the sectors, the energy sector is one of the most targeted sectors in recent times. The motivation of the attackers has changed over time. Though the primary motivation still remains money, other motivations like cyber warfare and causing disruptions have also witnessed an increase Figs.  2 & 3 , and Table  1 outlines the basis and the sectors targeted. As can be seen, the trends during 2020 have changed an increase in health care facilities being targeted more than other industries. Given the vulnerabilities in the firmware of different types of equipment and addressing the vulnerabilities through patch mechanisms a nightmare for security firms, the energy sector is a primary motivator for cyber-attacks. According to data by Kaspersky labs, the attack vectors included DDos, Java Script, BAT, V.B. Script, Python, Word on the platforms (Kaspersky Labs, 2020 ).

figure 2

Motivation trends for Attacks from 2019 to 2020

figure 3

Sectors targeted from 2019 to 20

The traditional approaches to handling cybersecurity using firewalls and cryptography incidents are outmoded due to the variety and complexity of attacks in recent times. The complexity of cybersecurity attacks in the form of disabling, tampering, reprogramming the control systems can lead to malfunctions, unavailability of system services during critical operations, which could lead to other consequences in the form of human life. (Venkatachary et al., 2018a ; Venkatachary, 2018b ; Venkatachary et al., 2020 ) In short, the cybersecurity attacks in the recent past has undergone a sea change. Some notable examples are black energy, Stuxnet and so on (Symantec, 2009 ; Symantec, 2011 ; Liu et al., 2012 ).

Overview of cyber attacks and the need for better security to secure energy systems

With the rise in energy demand, the distributed generators play a vital role in bridging the gap between demand and supply, securing the devices gain prominence. Security in device controllers is often overlooked as it is mostly isolated and tied to the infrastructure. This poses a problem of often not getting the control devices patched, thereby exposing them to vulnerabilities and attacks. An underlying problem in securing devices is the responsibility attached to the person. Often, it is found that most operators operating these machines simply do not have the experience or expertise and the knowledge of how these I.T. systems function and vice versa applies to the I.T. personnel developing necessary patches etc. (Brook, 2018 ).

The complexity of the distributed generators also poses a considerable risk, unlike computers and other devices, which can be managed through upgrades and patches (Bekara, 2014 ). The different layers that encompass the virtual power plant are complex, and the interlinks in each layer interwinds with the other layers. The nature of architecture in VPP has many ICS devices interconnected, and the attacks can take place on any of the devices like AMI, SCADA, control and monitoring devices. Taking this into account, the entire network can be made unavailable with a single point of failure.

The number of critical infrastructures targeted across the countries is tabled in Table  2 . Some notable special attacks between Jan-20 to June 2020 on the critical infrastructures is tabled in Table  3 . As can be seen from the table, there is a rising volume and sophistication of the attacks on the infrastructure services and the need to safeguard the equipment, data becomes critical (Lathrop et al., 2016 ; Kimani et al., 2019 ).

Security breaches are a significant concern in virtual power plant systems and could lead to colossal property losses (Sha et al., 2016 ) in millions. Although the overall security apparatus in the virtual power plant is challenged due to many factors involved in the design; among them, the serious is the availability. Many security features are employed to protect and ensure availability, including some of the advanced access control mechanism (Alramadhan et al., 2017 ), signature-based authentication (Chen et al., 2018a , b , c ), homomorphic encryption (Wang et al., 2013 ).

Edge centric VPP architecture

Security research on IoT-based platforms that intends to provide security solutions have been carried out by many researchers, and these efforts include Edge-based security solutions. (Mach et al., 2017 ; Errabelly et al., 2017 ; Montero et al., 2016 ; Hsu et al., 2018 ), firewall protection (Hu et al., 2014 ), IDS (Roman et al., 2018 ; Haddadi et al., 2018 ), IPS, privacy preservation (Lu et al., 2017 ; Du, 2018 ; Singh et al., 2017 ), authentication protocols (Ali et al., 2018 ) etc. Edge-based protection in IoT centric devices mainly is concentrated on the user (Montero & Serral-Gracia, 2016 ; Montero, 2015 ), device (Errabelly et al., 2017 ; Hsu et al., 2018 ) and endpoint security (Mukherjee et al., 2017 ).

The edge centric VPP architecture contains four major components, the cloud architecture, the edge layer, VPP operators, VPP end consumers/prosumers. Though resource-intensive, the cloud architecture is located far away from the virtual power plants consumers/ prosumers. Therefore the architecture cannot function efficiently, just as in IoT (Chen et al., 2016 ) due to its real-time application of distributing power on the grids. With the edge layer coming into effect, the components and the dynamics of the fundamental architecture changes with the Edge being the core as it can coordinate with different VPP’s while at the same time complement and ensure optimised performance of the plant. The edge layer handles the VPP consumers queries or demand response in the edge environment, thus acting as a bridge between the users and the cloud (Sha et al., 2020 ). Researchers have made efforts to study and design appropriate security solutions for Edge. However, as the Edge is still in its infancy stage, security is still a long way to go (Sha et al., 2016 ). There needs to be continuous research for enhancing general cybersecurity (Venkatachary et al., 2018a ).

Edge provides a new opportunity to explore new security mechanism for a virtual power plant. Most edge designs target offloading endpoint protection on the devices to edge. This could, in turn, pose new challenges in the form of resource constraints at the Virtual Power Plant layer.

User-centric edge-based VPP security

The key to cybersecurity is the weakest link, and the security is as good as the weakest link in the virtual power plant. With numerous VPP devices connected in a network, the prosumers/consumers access to generation, transmission & distribution of energy and data using terminal devices is imminent. When considering the security aspects, significant concerns arise. For example, the consumer may either login in from a terminal device, which is trusted and secure or from an untrusted device. In the event of the prosumer logging from an untrusted device, the security could be compensated with additional security control measures as in the case of untrusted networks. The second aspect is that the consumer may not be aware of the security or have enough knowledge to manage the infrastructure, thereby resulting in potential risk effectively. Incorporating the Edge layer in managing such as scenario is an option; however, the drawbacks could be network challenges. The additional aspect could be on the personal security of the data on the network edge (Montero et al., 2016 ) and the virtual guard in Edge (Montero, 2015 ).

Figure  4 provides a brief overview of user-centric VPP security architecture. The design incorporates a trusted domain on the edge layer. The consumers/prosumers who generate, distribute and access data incorporate additional endpoint security. This translates to user security policy such as antivirus, firewalls (Basile et al., 2010 ), SCADA device isolations and other inspection tools. The edge layer, which is the trusted domain, will manage the secure access to the virtual power plant operator or the virtual power transmission system operator. The trusted domain, in this case, acts as an encapsulation layer to user-specific policy. The user is verified using RVA techniques to ensure trust between the prosumer. This design is based on the Network Functions Virtualisation technology to construct the edge layer. In this way, security can effectively be managed by deploying Edge.

figure 4

User-centric Edge-based VPP Security

Device-centric edge security for VPP

Unlike the user-centric security layer, the Device-Centric security layer is tailored to suit the prosumer or the consumer’s requirement based on the resource availability, the data sensitivity and its impact on tasks and in consideration with the security needs of the endpoint VPP devices. Erabally et al. (Errabelly et al., 2017 ), in their paper, discuss the device-centric edge layer security comprising of six modules that function in a synchronised manner to handle specific security challenges in the IoT systems. The individual modules in each case include a systematic analysis of security profile, protocols, simulation, communication and request handling.

Figure  5 shows Device-Centric Edge security for Virtual Power Plant based on EdgeSec Model. In this model, each prosumer registers the devices with a specific security profile managing the module. The prosumer specific security details are then collected, and device-specific requirements are then identified. A detailed security check is implemented carrying out particular functions, one to verify the security dependency on the specific device registered and second to deploy the security function accordingly. The Edge then identifies a suitable protocol for each of the prosumer based on the resource availability and prosumer security profile. The security simulation model in the Edge simulates the instructions before deployment. This is done to protect the safety of the virtual plant prosumer’s physical system. Other functions such as encrypting communication, coordination etc., work together.

figure 5

Device-Centric Edge Security for VPP

Firewall edge security for VPP

Edge-based firewall systems is an innovative approach to protecting resources. Hu et al. base their research using software-defined networking and suggest a comprehensive framework to detect anomalies and offer effective firewall policy resolutions accurately. This SDN based firewall has three functional components, violation detection, flow tracking and authorisation. Violation detection is handled using traditional firewall packet filtering techniques. Flow tracking is based on headers using a Header Space Analysis (HAS) tool, one of the several invariant verification tools. (Kazemian et l., 2012 ; Kazemian et al., 2013 ; Khurshid et al., 2013 ). The authors further define Firewall Authorisation Space to allow or deny packets based on the firewall rules, thereby enabling conversion into smaller denied and allowed spaces. On the other hand, the distributed firewall architecture is placed at the network edge and adopts a master-slave architecture, thereby providing centralised management (Markham et al., 2001 ).

Most prosumers in a virtual power plant are small-time operators and cannot support huge firewalls or necessary infrastructure to support them. Assuming that a single virtual power plant operator has a considerable number of generators connected, it will be too costly to manage the installation of firewalls.

Figure  6 describes an edge-based firewall design. The firewall policies are converted into flow policies. The conflictions in these policies are resolved and later applied as a firewall rule. These firewall rules are applied in the edge layer. The incoming and the outgoing traffic out of the individual prosumers/consumers are examined and later allowed or disallowed. The edge-based firewalls are feasible and easier to deploy. The managing of the firewall is also easy as there is only one centralised firewall. Further, the system can be modified to suit the need-base security model.

figure 6

Distributed Edge Based Firewall

Edge-based intrusion detection systems (EIDS)

According to security researchers, the energy sector is the most frequently targeted sector by cybercriminals. As of 2019, 16% of the attacks were concentrated on energy with advance attacks and remained at the top 10 targeted industries (Kreyenber, 2019 ). The recent DDoS attacks in 2016 caused significant losses (Brewster, 2016 ). The availability of a distributed intrusion detection could significantly have enabled the security researchers to detect these type of security attacks at an early stage and prevent it (Sha et al., 2020 ). The availability of the information in this makes a vital difference. Researchers. The use of A.I. and machine learning algorithms in the security layer could significantly change the dynamics of security due to learning from multiple sources. The ease of adaptability to the changing scenarios could make a huge difference. Some notable research in apply edge-based IDS is discussed in papers by several researchers Yaseen et al. (Yaseen et al., 2016 ). (Roman et al., 2018 ). (Haddadi et al., 2018 ). (Roman et al., 2018 ) suggest a VIS (Virtual Immune System) to analyse network traffic with two functions: the kernel and the immune cells. The orchestrator inside the kernel is used for the configuration and deployment of the immune cells. The immune cells scan, analyse, manages the traffics and is also responsible for storing logs. Haddadi et al., in their research paper on SIOTOME, illustrate Edge-based architecture for IoT security. Here, the edge data collector is used for monitoring the network traffic information in the IoT devices. The edge layer analyses the traffic collected information on network threats, attacks, and feedback on the controller’s collected information. The SIOTOME also enables the defence mechanism like network isolation (Nunes et al. 2014 ), limiting the attack surface area. They also aid in stopping vulnerability scans and DDoS attacks.

Figure  7 and Fig.  8 shows a simple Edge-based IDS system design and Virtual Immune System. The DTM (Distributed Traffic Monitoring System) collects the information from the individual prosumers in real-time. The system then runs the intrusion detection algorithms. There is a collaborative compilation of the traffic, and the results are then enforced on to the network controller.

figure 7

Edge Based Intrusion Detection System (EIDS)

figure 8

Edge-based Virtual Immune System

Edge-based authentication and authorisation in virtual power plants

Industrial Control system attacks in the energy sector have witnessed a surge in recent times (Wilhoit et al., 2013 ; Dasgupta et al., 2017 ). This brings into focus two main features, authentication and authorisation, which can unauthorised attacks and DDoS attacks (Kolias et al., 2017 ). The drawback in the devices using end to end communication is difficult to create due to heteromerous peers. Secondly, signature-based algorithms can only be employed in the traditional authentication mechanism, making it difficult to apply in virtual power plant areas. The insertion of an Edge layer improves the prospects of utilising multi-authentical protocols and multiple phase authorisation. Sha et al., in their paper, discuss the Edge-based device as a mutual authenticator with a two-phase authentication protocol. In the first stage, the edge authenticator authenticates using a digital signature and gathers users credentials. The credentials obtained are then reauthenticated using a mutual authenticator using a symmetric key-based algorithm (Sha et al., 2014 ; Sha et al., 2017 ). Researchers have also attempted to enhance the authentication protocols using RFID based algorithms. (Fan et al., 2012 ; Gope et al., 2018 ).

The process of authenticating prosumers in a virtual power plant is segmented, including the prosumers end devices and the edge layer. Depending on the characteristics of the communication, the protocols can be customised. Thus, the Edge layer works as the man in the middle, which helps set up mutual authentication and authorisation. As the Edge provides multiple authentication interfaces; thus, it provides a secure interface (Dasgupta et al., 2017 ).

Edge-based privacy-preserving designs

Virtual power plants are a host of data hubs as prosumers and consumers contribute to power generation and attract vast cybercriminals. Data privacy takes precedence and requires stringent policies, monitoring and protection. As more and more devices get connected to virtual power plant operators, the data available to the plant operators is vast and needs to be protected from both the prosumer and operator levels. It is possible to achieve greater privacy by adapting different privacy protection algorithms like differential privacy (Dwork, 2014 ), k-anonymity (Sweeney, 2002 ; Sha et al., 2006 ; Xi et al., 2007 ), privacy preservation aggregation (Lu et al., 2017 ) etc.

Lu et al., in their paper on privacy protection, suggest a method to keep the privacy intact by using a lightweight privacy-preserving data aggregation scheme for IoT devices. They use a message authentication code to process the information reported by the devices. Once the Edge receives the authenticate of the devices by comparing the MAC and then generate a value for the IoT applications. Gentry, in his thesis, for solving a cryptographic problem, present fully homomorphic encryption. They use a simple algorithm based on a bootstrap mechanism for encryption through a recursive self-embedding algorithm “Paillier” (Gentry, C, 2009 ). One way hashing technique and the Chinese remainder theorem have also been used to address the privacy problem (Pei et al., 1996 ; McSherry & Talwar, 2007 ).

Figure  9 shows a brief overview of applying Edge design for preserving privacy. The Edge architecture uses privacy-preserving aggregation, k-anonymity and differential privacy together to decipher the queried data and responses between the prosumers and virtual plant operators to ensure data protection at either end. Data transmitted is verified, authenticated and established, thus ensuring privacy protection.

figure 9

Edge-Based Privacy-Preserving Model

The previous section portrays different research techniques that have been applied in different platforms and suggest applications in virtual power plant areas. The Edge computing methods are still in their infancy, and there are still numerous challenging issues that need to be addressed. Though the Edge layer provides a new model for providing security solution, the Edge has a vast surface area and could, in turn, be subjected to attack. Addressing the security concerns in the Edge layer is not a huge task as opposed to other data centre securities. Thus, warranting more research in the area.

Though there are several Edge-based privacy protection techniques, the Edge protocols applied may, in turn, start to track the data and may have vested interests. (Razeghi & Voloshynovski, 2018 ) (Sharma & Chen, 2017 ). This in-turn, will warrant other innovative security solutions for protecting privacy. Studies have been carried out using Isolation techniques, but it remains to be seen how to implement the techniques in the edge layer effectively. It also remains to be seen how to effectively adopt new algorithms to establish trusted security between the Edge devices and the prosumer devices. Researchers have also proposed adopting machine learning algorithms to advance researches in intrusion detection techniques. Buczak et al. present a survey on using data mining and machine learning techniques as methods for intrusion detection. (Buczak & Guven, 2016 ). The popularity of deep learning has also contributed to understanding intrusion detection (Yin et al., 2017 ). However, the machine learning algorithmic methods require huge data sets and are most central to the environment and hence is a drawback for deployment in small Edge environments. Secondly, machine learning algorithms are more suited and beneficial in the cloud. This provides us with an opportunity to research and deploy cross-domain algorithms for intrusion detection.

Machine learning algorithms are learners, and they learn from the different attack detection techniques employed for intrusion detection. Therefore, the returned data has to be accurate and correct, on which decisions are based (Sha & Zeadally, 2015 ). However, there is a lack of data protocols to analyse and ensure the correctness of a high-quality dataset. In this environment, cross-domain verifications would be of great interests. (Sha et al., 2010 ). There has been a little contribution towards researching the cost impacts in the Edge environment. Research in the cost-benefit analysis of deploying Edge should be encouraged with active participation and collaboration. Though the safety of the prosumer equipment is extremely important, the research in this field is limited to a few. As virtual power plants are real-time, the requirements are real-time, thus complicating the simulations and modelling a suitable design (Weber & Studer, 2016 ). This also poses a challenge for response time to potential safety risks to minimise damages caused towards the equipment etc.

Virtual machines have found widespread use in many areas, and it is being researched in the application of the Edge layer. The ease of deploying V.M.s in the environment also pose a security threat as more than one V.M. could be deployed in the layer (Tsai, 2012 ; Eldefrawy et al., 2017 ). Considering the virtual power plant environment, these machines need to be simple, light and should meet the requirements of the prosumers. Thus, there is a huge scope for researching in this area.

Remarks and conclusions

The challenge of securing virtual power plants systems has generated great interests among researchers. The nature and operations of the virtual plants and prosumer/consumer generators pose significant challenge and risks. The advancement of new technologies in computing like edge computing has resulted in researching edge-based security systems for virtual power plants and distributed generators. This paper aims to present an assessment and a way of adopting Edge-based security systems in virtual power plants. In this context, it has defined to provide Edge-centric architecture. These solutions aim to address key protection of VPP devices, including a comprehensive cybersecurity architecture, application of Edge-based firewalls, intrusion detection systems, Edge-based authentication and authorisations.

Abbreviations

Internet of Energy

Distributed Denial of Service

Remote Terminal unit

Master Terminal Unit

Supervisory Control and Data Acquisition

Transmission System Operator

Distribution System Operator

Advanced Metering Infrastructure

Artificial Intelligence

Alexander, G. (2012). The Flame: Questions and Answers. Kaspersky Labs, Kaspersky Labs. Retrieved 07 06, 2017, from https://securelist.com/34344/the-flame-questions-and-answers-51/

Ali Z, Hossain MS, Muhammad G, Ullah I, Abachi H, Alamri A (2018) Edge-centric multimodal authentication system using encrypted biometric templates. Futur Gener Comput Syst 85:76–87. https://doi.org/10.1016/j.future.2018.02.040

Article   Google Scholar  

Alramadhan, M., K. Sha, (2017). An overview of access control mechanisms for the internet of things. 26th International Conference on Computer Communications and Networks (ICCCN) (pp. 1-7). Vancouver, Canada: IEEE doi: https://doi.org/10.1109/ICCCN.2017.8038503

Basile C, Lioy A, Scozzi S, Vallini M (2010) Ontology-based security policy translation. J Information Assurance Security 5(1):437–445

MATH   Google Scholar  

BBC. (2014). Energy firms hacked by 'cyber-espionage group Dragonfly. BBC News (Online), BBC. BBC. Retrieved 06 09, 2017, from http://www.bbc.com/news/technology-28106478

Bekara, C. (2014). Security issues and challenges for IoT based smart grid. International Workshop on communicating objects and machine to machine for mission-critical applications (COMMCA). Doi: https://doi.org/10.1016/j.procs.2014.07.064

Boldizsar B, Gabor, P´., Levente, B., Mark, F. (2012) The cousins of Stuxnet: Duqu, flame, and gauss. Future internet , MDPI 4(4):971–1003. https://doi.org/10.3390/fi4040971

Boldizsár, B., Gábor, P., Levente, B., Félegyházi, M. (2011). Duqu: A Stuxnet-like malware found in the wild. Budapest University of Technology and Economics, Department of Telecommunications. Budapest, Hungary: Laboratory of Cryptography and System Security (CrySyS). Retrieved 06 11, 2017, from https://www.crysys.hu/publications/files/bencsathPBF11duqu.pdf

Brewster, T. (2016). How hacked cameras are helping launch the biggest attacks on the Internet has ever seen . Retrieved from www.forebes.com/sites : https://www.forbes.com/sites/thomasbrewster/2016/09/25/briankrebs-overwatch-ovh-smashed-bylargest-ddos-attacks-ever/$705007235899

Brook, C. (2018, 12, 05). Data Protection 101: What is ICS Security . Retrieved from www.digitalguardian.com : https://digitalguardian.com/blog/what-ics-security

Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Communications Surveys & Tutorials 18(2):1153–1176. https://doi.org/10.1109/COMST.2015.2494502

Cai Z, He Z (2019) Trading private range counting over big IoT data. In: IEEE 39th International Conference on Distributed Computing Systems. IEEE, Texas, pp 144–153

Google Scholar  

Cai Z, Zheng X (2019) A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Transactions on Network Science and Engineering 7(2):766–775. https://doi.org/10.1109/TNSE.2018.2830307

Article   MathSciNet   Google Scholar  

Cai Z, Zheng X, Yu J (2019) A differential-private framework for urban traffic flows estimation via taxi companies. IEEE Transactions on Industrial Informatics 15(12):6492–6499. https://doi.org/10.1109/TII.2019.2911697

Chen M, Hao Y, Gharavi H, Leung V (2019) Cognitive information measurements: a new perspective. Inf Sci 505:487–497. https://doi.org/10.1016/j.ins.2019.07.046

Article   MathSciNet   MATH   Google Scholar  

Chen M, Hao Y, Lai C, Wu D, Li Y, Hwang K (2018a) Opportunistic task scheduling over co-located clouds in the mobile environment. IEEE Transaction on Services Computing 11(3):549–561. https://doi.org/10.1109/TSC.2016.2589247

Chen M, Zhou J, Tao G, Yang J, Hu L (2018b) Wearable effective robot. IEEE Access 6:64766–64776. https://doi.org/10.1109/ACCESS.2018.2877919

Chen S, Zeng P, Choo KR, Dong X (2018c) Efficient ring signature and group signature schemes based on Q-ary identification protocols. Comput J 61(4):545–560. https://doi.org/10.1093/comjnl/bxx112

Chen X, Jiao L, Li W, Fu X (2016) Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans Networking 5(1):2795–2808

Dasgupta D, Roy A, Nag A (2017) Multi-factor authentication. Advances in User Authentication, pp 185–233. https://doi.org/10.1007/978-3-319-58808-7_5

Book   Google Scholar  

David. (2014). Havex Hunts For ICS/SCADA Systems. (F-Secure Labs) Retrieved 06 15, 2017, from https://www.f-secure.com/weblog/archives/00002718.html

Desarnaud G (2017) Cyber attacks and energy infrastructures - anticipating risks. IFRI Centre for Energy, Paris

Doffman, Z. (2020). Warning : You must not download this dangerous Coronavirus map. Retrieved from www.forbes.com : https://www.forbes.com/sites/zakdoffman/2020/03/11/warning-you-must-not-download-this-dangerous-coronavirus-map/#4049aef83253

Du M (2018) Big data privacy-preserving in multi-access edge computing for heterogeneous internet of things. IEEE Communication Magazine 56(8):62–67. https://doi.org/10.1109/MCOM.2018.1701148

Dwork C, Roth A (2014) The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, pp 211–407

Eldefrawy, K., Rattanavipanon, N., Tsudik, G. (2017). Fusing hybrid remote attestation with a formally verified microkernel: lessons learned. 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W) (pp. 141-144). Denver, USA: IEEE. doi: https://doi.org/10.1109/DSN-W.2017.31

ENISA. (2019, 01 07). Shamoon Campaigns with Disttrack. (European Union) retrieved 08 04, 2019, from European Union Agency for cyber security: https://www.enisa.europa.eu/publications/info-notes/shamoon-campaigns-with-disttrack

Errabelly, R., Sha, K., Wei, W., Yang, T.A., Wang, Z. (2017). Edges: design of an edge layer security service to enhance internet of things security. First IEEE International Conference on Fog and Edge Computing (ICFEC 2017) . IEEE

Falliere, N., Liam O.M., Chien, E. (2011). Symantec Response - W32.Stuxnet Dossier. Symantec Labs, Symantec. Symantec. Retrieved from https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf

Fan, K., Li, J., Li, H., Liang, X., Shen, X., Yang, Y. (2012). ESLRAS: a lightweight RFID authentication scheme with high efficiency and strong security for IoT. 2012 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS) (pp. 323-328). Bucharest: IEEE. doi: https://doi.org/10.1109/iNCoS.2012.48

Gentry, C. (2009). A fully Homomorphic encryption scheme. (Thesis) , 1-209. Stanford University

Glyer, C., Perez, D., Jones, S., Miller, S. (2020). This Is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits Retrieved from www.fireeye.com : https:// www.fireeye.com /blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html

Glymin, E. (2017). Detailed Threat Analysis of Shamoon 2.0 Malware. Retrieved 08 04, 2019, from global secure solutions: https://globalsecuresolutions.com/detailed-threat-analysis-of-shamoon-2-0-malware/

Goodin, D. (2012). Discovery of new "zero-day" exploit links developers of Stuxnet, Flame. (arstechnica) retrieved 06 12, 2017, from https://arstechnica.com/security/2012/06/zero-day-exploit-links-stuxnet-flame/

Gope P, Amin R, Islam H, Kumar N, Bhalla VK (2018) Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localisation services for the smart city environment. Futur Gener Comput Syst 83:629–637. https://doi.org/10.1016/j.future.2017.06.023

Gorman, S. (2009). FAA's Air-Traffic Networks Breached by Hackers. (the wall street journal) retrieved 06 12, 2017, from http://online.wsj.com/articles/SB124165272826193727

Guilherme, V., Peter, S. (2011). The Day of the Golden Jackal – The Next Tale in the Stuxnet Files: Duqu. McAfee. McAfee. Retrieved 06 09, 2017

Haddadi, H., Christophides, V., Teixeira, R., Cho, K., Suzuki, S., Perrig, A. (2018). Siotome: an edge-isp collaborative architecture for IoT security. 1st International Workshop on Security and Privacy for the Internet-of-Things (IoTSec) , (pp. 42–45). Florida, USA

Hsu R, Lee J, Quek T, Chen J (2018) Reconfigurable security: edge computing based framework for IoT. IEEE Netw 30(5):92–99

Hu, H., Han, W., Ahn, G., Zhao, Z. (2014). Flow guard: building robust firewalls for software-defined networks. 3rd Workshop on hot topics in software-defined networking. ACM

Huang, C., Wu, Z., Lin, S. (2019). The mobile edge computing (MEC)-based VANET data offloading using the staying-time-oriented k-hop away offloading agent. 2019 International Conference on Information Networking (pp. 357-362). Kuala Lumpur, Malaysia: IEEE

Jaber M, Imran MA, Tafazolli R, Tukmanov A (2016) 5G backhaul challenges and emerging research directions: a survey. IEEE Access 4:1743–1766. https://doi.org/10.1109/ACCESS.2016.2556011

Kaspersky Corp. (2011). Duqu: Steal Everything. (Kaspersky Labs) retrieved 05 09, 2017, from http://www.kaspersky.com/about/press/major_malware_outbreaks/duqu

Kaspersky Corp. (2015). The DuQu 2.0 Technical Details- The Mystery of DuQu 2.0 - Sophisticated Cyber Espionage Actor. Kaspersky Labs, research Labs. Kaspersky Labs

Kaspersky Labs. (2020, 07). Kaspersky ICS-CERT. (Kaspersky) retrieved 08 10, 2020, from https://ics-cert.kaspersky.com/

Kazemian, P., Chang, M., Zeng, H., Varghese, G., McKeown, N., Whyte, S. (2013). Real-time network policy checking using header space analysis. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI'13) (pp. 99-111). USENIX association. Retrieved from https://www.usenix.org/system/files/conference/nsdi13/nsdi13-final8.pdf

Kazemian, P., Varghese, G., McKeown, N. (2012). Header space analysis: static checking for networks. 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI'12) (pp. 1-14). USENIX association

Khodashenas, Aznar, J., Legarrea, A., Ruiz, M., Siddiqui, S., Escalona, E., Figuerola, S. (2016). 5G network challenges and realisation insights. IEEE Xplore, 1–4. doi: https://doi.org/10.1109/ICTON.2016.7550539

Khurshid, A., Zou, X., Zhou, W., Caesar, M., Godfrey, P.B. (2013). Veriflow: verifying network-wide invariants in real-time. 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI'13) (pp. 15-27). USENIX association

Kimani K, Oduol V, Langat K (2019) Cyber security challenges for IoT based smart grid networks. Int J Crit Infrastruct Prot 25:36–49. https://doi.org/10.1016/j.ijcip.2019.01.001

Kochman, B. (2020). How criminals are exploiting the coronavirus outbreak. Retrieved from www.law360.com : https://www.law360.com/cybersecurity-privacy/articles/1255130/how-cybercriminals-are-exploiting-the-coronavirus-outbreak

Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80–84. https://doi.org/10.1109/MC.2017.201

Kreyenberg, H. (2019). The energy sector as target of cyber attacks . HornetSecurty: Security Information. Retrieved from https://www.hornetsecurity.com/data/downloads/reports/document-cybersecurity-special-energy-en.pdf

Kumagai J (2012) Virtual power plants, real power, 5 kw here and 100 kw there it all adds up

Kushner D (2013) The real story of Stuxnet. IEEE Spectrum Posted

Langill, J.T. (2014). Defending Against the Dragonfly Cyber Security Attacks . BELDEN. BELDEN. Retrieved 06 09, 2017

Langner, R., (2013). To Kill a Centrifuge - Technical Analysis of What Stuxnet's Creators tried to Achieve. The Langer group. Munich: the Langer group. Retrieved 06 11, 2017, from https://www.langner.com/wp-content/uploads/2017/03/to-kill-a-centrifuge.pdf

Lathrop AJ, Stanisz HM (2016) Hackers are after more than just data: will your company property policies respond when cyberattacks cause physical damage and shut down operations? Environmental Claims J 28(4):286–303. https://doi.org/10.1080/10406026.2016.1197653

Lee, R.M., Michael, J. A., Conway, T. (2016). Analysis of the Cyber Attack on the Ukrainian Power Grid Defense Use Case. SANS. Washington, DC: SANS. Retrieved 05 08, 2017, from https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf

Leyden, J. (2012). Hack on Saudi Aramco hit 30,000 workstations, oil firm admits - First hacktivist-style assault to use malware? (TheRegister) retrieved 06 12, 2017, from http://www.theregister.co.uk/2012/08/29/saudi_aramco_malware_attack_analysis

Li, P., Liu, Y., Xin, H., Jiang, X. (2018). A robust distributed economic dispatch strategy of the virtual power plant under cyber-attacks. IEEE Transactions on Industrial Informatics, 4343-4352

Liu, J., Xiao, Y., Li, S., Liang, W., Chen, C.L.P. (2012). Cyber security and privacy issues in smart grids. IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 14(4, fourth quarter)

Lu R, Heung K, Lashkari A, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312. https://doi.org/10.1109/ACCESS.2017.2677520

Mach P, Becavar Z (2017) Mobile edge computing a survey on architecture and computation offloading. IEEE Communications Surveys & Tutorials 19(3):1628–1656. https://doi.org/10.1109/COMST.2017.2682318

Markham T, Payne C (2001) Security at the network edge: a distributed firewall architecture. DARPA Information Surviv ability Conference and Exposition II, DISCEX'01 (pp. 279–286). IEEE, Anaheim

McElroy, D., Williams, C. (2012). Flame: world's most complex computer virus exposed. (the telegraph) retrieved 06 12, 2017, from http://www.telegraph.co.uk/news/worldnews/middleeast/iran/9295938/Flame-worlds-most-complex-computer-virus-exposed.html

Mcguinn MG (2004) Prioritising cyber vulnerabilities . Homeland Security, National Infrastructure Advisory Council. Homeland Security

McSherry, F., Talwar, K. (2007). Mechanism design via differential privacy. 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07) (pp. 94-103). IEEE. doi: https://doi.org/10.1109/FOCS.2007.66

Miller, B., Rowe, D.C. (2012). A Survey of SCADA and Critical Infrastructure Incidents. Annual Conference on Research in Information Technology (pp. 51–56). New York, ISA: ACM

Mills, E. (2009). Report: Hackers have broken into the air traffic control mission-support systems of the U.S. Federal Aviation Administration several times in recent years. (ZDNet) retrieved 06 12, 2017, from http://www.zdnet.com/news/report-us-airtraffic-control-systems-hacked/300164

Montero D (2015) Virtualised security at the network edge: a user-centric approach. IEEE Commun Mag 53(4):176–186. https://doi.org/10.1109/MCOM.2015.7081092

Montero, D., Serral-Gracia, R. (2016). Offloading personal security applications to the network edge: A mobile user case scenario. 2016 International conference on wireless communication and Mobile computing . IEEE

Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N. (2003). Inside the slammer worm. (IEEE, Ed.) IEEE Computer and Security, 99(4), 33-39. Retrieved 06 15, 2017, from http://cseweb.ucsd.edu/~savage/papers/IEEESP03.pdf

Mukherjee, B., Neupane, R., Calyam, P. (2017). End to end IoT security middleware for cloud-fog communication. IEEE 4th International Conference on Cyber Security and Cloud Computing (pp. 151-156). New York, USA: IEEE. doi: https://doi.org/10.1109/CSCloud.2017.62

Nakashima, E., Miller, G., Tate, J. (2017, 06, 12). U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say. (Washington post) retrieved 06 12, 2017, from https://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html

Nakashima, E., Warrick, J. (2012). Stuxnet was work of U.S. and Israeli experts, officials say. (Washington post) retrieved 06 12, 2017, from https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html

Naraine, R. (2010). Stuxnet attackers used 4 Windows zero-day exploits. (ZDNet) retrieved 06 12, 2017, from http://www.zdnet.com/blog/security/stuxnet-attackers-used-4-windows-zero-day-exploits/7347

Nelson, N. (2016). The Impact of Dragonfly Malware on Industrial Control Systems. SANS institute, SANS institute InfoSec Reading room. SANS. Retrieved 06 15, 2017, from https://www.sans.org/reading-room/whitepapers/ICS/impact-dragonfly-malware-industrial-control-systems-36672

NewYork Times. (2012). Aramco Says Cyberattack Was Aimed at Production. (the Newyork Times) retrieved 06 12, 2017, from http://www.nytimes.com/2012/12/10/business/global/saudi-aramco-says-hackers-took-aim-at-its-production.html

Nunes R, Pontes R, Guedes D (2014) Virtualised network isolation using software defined networks (SDN). 38th Annual IEEE Conference on Local Computer Networks (pp. 683–686). IEEE, Sydney

Panda. (2015). Critical Infrastructure. Panda security. Retrieved from www.pandasecurity.com/mediacenter/src/uploads/2018/10/1611-WP-CriticalInfrastructure-EN.pdf

Pei D, Salomaa A, Ding C (1996) Chinese remainder theorem: applications. Computing, Coding , Cryptography - World Scientific Forum

Perlroth, N. (201210, 2,3). In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back. (the Newyork Times) retrieved 06 12, 2017, from http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html

Pop C, Antal M, Cioara T, Anghel I, Salomie I, Bertoncini C (2019) A fog computing enabled virtual power plant model for delivery of frequency restoration reserve services. Sensors, pp 1–20. https://doi.org/10.3390/s19214688

Poulsen, K. (2003). Slammer worm crashed Ohio nuke plant network. (SecurityFocus) retrieved 06 12, 2017, from http://www.securityfocus.com/news/6767

Poulsen, K. (2004). South Pole' cyberterrorist' hack wasn't the first. (TheRegister) retrieved 06 12, 2017, from http://www.theregister.co.uk/2004/08/19/south_pole_hack

Rausch, T., Dustdar, S. (2019). Edge intelligence: the convergence of humans, things, and a.I. 2019 IEEE International Conference on Cloud Engineering, IC2E (pp. 86-96). Prague, Chech Republic: IEEE

Razeghi, B., Voloshynovski, S. (2018). Privacy-preserving out-sourced media search using secure sparse ternary codes. 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 1992-1996). Calgary: IEEE. doi: https://doi.org/10.1109/ICASSP.2018.8461862

Rene, M. (2015, 06, 22). Hackers successfully ground 1,400 passengers. (CNN) retrieved 06 12, 2017, from http://edition.cnn.com/2015/06/22/politics/lot-polish-airlines-hackers-ground-planes/index.html

Rennie, M. (2019). Virtual Power Plants: On the Edge or the in the cloud. Retrieved from linkedin.com

Roman R, Rios R, Onieva J, Lopez J (2018) The immune system for the internet of things using edge technologies. IEEE Internet of Things Journal, pp 1–8

Sanger, D.E. (2012). Obama Order Sped Up Wave of Cyberattacks Against Iran. (the Newyork Times) retrieved 06 12, 2017, from http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html

Sha K, Alatrash N, Wang A (2017) A secure and efficient framework to read isolated smart grid devices. IEEE Transactions on Smart Grid 8(6):2519–2531. https://doi.org/10.1109/TSG.2016.2526045

Sha K, Wang S, Shi W (2010) Rd4: role differentiated cooperative deceptive data detection and filtering in vanets. IEEE Trans Veh Technol 59(3):1183–1190

Sha K, Wei W, Yang A, Shi W (2016) Security in the internet of things: opportunities and challenges. International conference on identification, information and knowledge in the Internet of things (pp. 512-518). IEEE, Beijing. https://doi.org/10.1109/IIKI.2016.35

Sha, K., Xi, Y., Shi, W, Schwiebert, L., Zhang, T. (2006). Adaptive privacy-preserving authentication in vehicular networks. 2006 First International Conference on Communications and Networking in China (pp. 1-8). Beijing, China: IEEE. doi: https://doi.org/10.1109/CHINACOM.2006.344746

Sha, K., Xu, C., Wang, Z. (2014). One-time symmetric key-based cloud supported secure smart meter reading. 2014 23rd International Conference on Computer Communication and Networks (ICCCN) (pp. 1-6). Shanghai: IEEE. doi: https://doi.org/10.1109/ICCCN.2014.6911854

Sha K, Yang AT, Wei W, Davari S (2020) A survey of edge computing-based designs for IoT security. Digital communication networks 6(2):195–202. https://doi.org/10.1016/j.dcan.2019.08.006

Sha, K., Zeadally, S. (2015). Data quality challenges in cyber-physical systems. Journal of Data and Information Quality (JDIQ), 6(2-3). Doi: https://doi.org/10.1145/2740965

Sharma, S., Chen, K. (2017). Privategraph: a cloud-centric system for spectral analysis of large encrypted graphs. 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (pp. 2507-2510). Atlanta, GA: IEEE. doi: https://doi.org/10.1109/ICDCS.2017.189

Singh, A., Auluck, N., Rana, O.F., Jones, A.C., Nepal, S. (2017). Rt-sane: real-time security-aware scheduling on the network edge. Proceedings of the 10th International Conference on Utility and Cloud Computing. doi: https://doi.org/10.1145/3147213.3147216

sKyWiper Analysis Team. (2012). sKyWIper (a.k.a. Flame a.k.a. Flamer - A complex malware for targeted attacks. Budapest University of Technology and Economics, Department of Telecommunications. Budapest: Laboratory of Cryptography and System Security (CrySyS Lab). Retrieved 06 11, 2017, from http://www.bme.hu/

Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertainty, Fuzziness and Knowledge-based Systems 10(5):557–570. https://doi.org/10.1142/S0218488502001648

Symantec Corp. (2009). Symantec global internet security threat report trends . Symantec

Symantec Corp. (2011). Internet security threat report . Symantec

Symantec Corp. (2014). Security Response - Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Symantec Labs, Symantec Labs. Symantec. Retrieved 06 11, 2017

Symantec Corp. (2018). Shamoon: Destructive Threat Re-Emerges with New Sting in its Tail. (Symantec response team) retrieved 08 04, 2019, from Symantec: https://www.symantec.com/blogs/threat-intelligence/shamoon-destructive-threat-re-emerges-new-sting-its-tail

Symantec Crop. (2017). Shamoon: Multi-staged destructive attacks limited to specific targets . (Symantec Labs) retrieved 06 08, 2017, from https://www.symantec.com/connect/blogs/shamoon-multi-staged-destructive-attacks-limited-specific-targets

Tao X, Ota K, Dong M, Qi H, Li K (2017) Performance guaranteed computation offloading for mobile edge cloud computing. IEEE Wireless Communication Letters 6(6):774–777. https://doi.org/10.1109/LWC.2017.2740927

Thomson, L. (2013). Snowden: U.S. and Israel did create Stuxnet attack code . (TheRegister) retrieved 06 12, 2017, from http://www.theregister.co.uk/2013/07/08/snowden_us_israel_stuxnet

Tian L, Li J, Li W, Ramesh B, Cai Z (2019) Optimal contract-based mechanisms for online data trading markets. IEEE Internet Things J 6(5):7800–7810. https://doi.org/10.1109/JIOT.2019.2902528

Trend Micro. (2018). New Version of Disk-Wiping Shamoon/Disttrack Spotted What you need to know . (T. Micro, producer) retrieved 08 04, 2019, from trend Micro: https://www.trendmicro.com/vinfo/hk-en/security/news/cybercrime-and-digital-threats/new-version-of-disk-wiping-shamoon-disttrack-spotted-what-you-need-to-know

Tsai H (2012) Treat as a service: Virtualisations impact on cloud security. I.T . Professional 14(1):32–37. https://doi.org/10.1109/MITP.2011.117

Venkatachary SK, Prasad J, Samikannu R (2017) Economic impacts of cyber security in energy sector: a review. (IJEEP, Ed.). Int J Energy Econ Policy 7(5):250–262 Retrieved from www.econjournals.com

Venkatachary SK, Prasad J, Samikannu R (2018a) A critical review of cyber security and cyber terrorism - threats to critical infrastructure in the energy sector. International Journal of Critical Infrastructures 14(2):101–119

Venkatachary, S.K., Prasad, J., Samikannu, R. (2018b). Cyber security and cyber terrorism in energy sector - a review. Journal of Cyber Security Technology , 2(3–4), 111–130. doi: https://doi.org/10.1080/23742917.2018.1518057

Venkatachary SK, Prasad J, Samikannu R, Alagappan A, Andrews LJB (2020) Cybersecurity infrastructure challenges in IoT based virtual power plants. Journal of Statistics and Management Systems 23(2):263–276. https://doi.org/10.1080/09720510.2020.1724625

Wang Z, Sha K, Lv W (2013) Slight homomorphic signature for access controlling in cloud computing. Wirel Pers Commun 73(1):51–61. https://doi.org/10.1007/s11277-012-0977-8

Weber RH, Studer E (2016) Cybersecurity in the internet of things: legal aspects. Comput Law Secur Rev 32(5):715–728. https://doi.org/10.1016/j.clsr.2016.07.002

Wilhoit, K. (2013). Who's really attacking your ICS equipment? Retrieved 11 28, 2020, from www.trendmicro.com : https://www.trendmicro.com.tr/media/wp/whos-really-attacking-your-ics-equipment-whitepaper-en.pdf

Xi, Y., Sha, K., Shi, W., Schwiebert, L., Zhang, T. (2007). Enforcing privacy using symmetric key-set in vehicular networks. Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07) (pp. 344-351). Sedona: IEEE

Yaseen, Q., Al-Balas, F., Jararweh, Y., Al-Ayyoub. (2016). A FOG computing-based system for selective forwarding detection in mobile wireless sensor networks. 2016 IEEEE 1st International Workshop on Foundations and Applications of Self* Systems (pp. 256-262). Augsburg: IEEE doi: https://doi.org/10.1109/FAS-W.2016.60

Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5:21954–21961. https://doi.org/10.1109/ACCESS.2017.2762418

Zaho, Q., Gerla, M. (2019). Energy efficiency enhancement in 5G mobile networks. IEEE 20th International Symposium on a world of wireless mobile and multimedia networks (pp. 1-3). Washington, USA: IEEE explore

Zakhmatov, V.D., Glushkova, V.V., Kryazhich, O.A. (2011). Explosion , Which was not. Retrieved from ogas.kiev.ua: http://ogas.kiev.ua/perspective/vzryv-kotorogo-ne-bylo-581

Zhou, Z., Chen, X., Li, E., Zeng, L., Luo, K., Zhang, J. (2019). Edge intelligence: paving the last mile of artificial intelligence with edge computing. Proc. IEEE, 1738-1762

Download references

Author information

Authors and affiliations.

Grant Thornton, Plot 50370, Acumen Park, Fairgrounds, Gaborone, Botswana

Sampath Kumar Venkatachary

Department of Network and Infrastructure Management, Faculty of Engineering and Technology, Botho University, Gaborone, Botswana

Annamalai Alagappan

Department of Information Technology, Faculty of Engineering and Technology, Botho University, Gaborone, Botswana

Leo John Baptist Andrews

You can also search for this author in PubMed   Google Scholar

Contributions

The author(s) read and approved the final manuscript.

Corresponding author

Correspondence to Sampath Kumar Venkatachary .

Ethics declarations

Competing interests.

The authors declare that they have no competing interests.

Additional information

Publisher’s note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Cite this article.

Venkatachary, S.K., Alagappan, A. & Andrews, L.J.B. Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?. Energy Inform 4 , 5 (2021). https://doi.org/10.1186/s42162-021-00139-7

Download citation

Received : 01 December 2020

Accepted : 11 March 2021

Published : 31 March 2021

DOI : https://doi.org/10.1186/s42162-021-00139-7

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Edge computing
  • Virtual power plants (VPP)
  • Distributed energy resource (DER)
  • Security architecture
  • Authentication and authorisation

thesis on virtual power plant

Interactive Power Prediction Model for Virtual Power Plant Based on Wave-Attention Network

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

News & Updates

What are states doing to make virtual power plants a reality.

By: Brian Lips, Senior Policy Project Manager

Virtual Power Plants (VPPs) are attracting a lot of attention at the moment. Our upcoming 50 States of Grid Modernization Q1 2024 report documents numerous policy and program actions taken by several states, and our very own Autumn Proudlove moderated a session on VPPs at the 2024 North Carolina State Energy Conference . Additionally, the U.S. Department of Energy published an extensive report on VPPs last year, and even mainstream media is publishing articles on their potential. But what exactly are VPPs, and what are states doing to enable their development?

VPPs can incorporate a variety of technologies with different characteristics, leading to the challenge of adequately defining them. However, all VPPs share the common elements of quantity and controllability. At their heart, VPPs involve the aggregation of a large number of distributed energy resources (DERs), which can be collectively controlled to benefit the grid and potentially obviate a utility’s need to activate a traditional peaking power plant.

The Smart Electric Power Alliance (SEPA) groups VPPs into three general categories: Supply VPPs, Demand VPPs, and Mixed Asset VPPs. Supply VPPs involve electricity-generating DERs, such as solar-plus-storage systems, which can be aggregated and controlled as a single resource when needed. Demand VPPs build off traditional demand response programs by aggregating curtailable load at a scale that can have a meaningful impact on the grid. Mixed Asset VPPs include a mix of both supply and demand resources.

While the benefits of VPPs are clear, the pathway to greater deployment is not. However, state policymakers are currently testing a variety of methods to encourage their development. Common approaches include a mix of mandates for utilities to procure energy from VPPs, incentives for utility customers to deploy DERs and participate in utility programs, and market access reforms to allow third-party aggregators to participate. Different varieties of these approaches have been considered by several states and utilities over the past year.

Recent Notable Virtual Power Plant Actions

thesis on virtual power plant

The California Energy Commission (CEC) approved a new incentive program for VPPs in July 2023. The Demand Side Grid Support (DSGS) program compensates eligible customers for upfront capacity commitments and per-unit reductions in net energy load during extreme events achieved through reduced usage, backup generation, or both. Third-party battery providers, publicly-owned utilities, and Community Choice Aggregators (CCAs) are eligible to serve as VPP aggregators. At a minimum, each individual customer site participating in the program must have an operational stationary battery system capable of discharging at least 1 kW for at least 2 hours. Incentive payments will be made to VPP aggregators based on the demonstrated battery capacity of an aggregated VPP. VPP aggregators will then allocate incentive payments between the VPP aggregator and its participants based on their own contractual agreement.

California lawmakers are also currently considering legislation to stimulate the market for VPPs. S.B. 1305 requires the California Public Utilities Commission to estimate the resource potential of VPPs in the state, and to develop procurement targets for each utility to be achieved by December 31, 2028 and December 31, 2033.

The Colorado Public Utilities Commission opened a new proceeding in September 2023 to explore third-party implementation of virtual power plant pilots in Xcel Energy’s service area. The Commission issued a decision in April 2024 requiring Xcel to issue an RFP for a distributed energy management system (DERMS), which would then be used to manage a VPP. The Commission stopped short of directing Xcel to file a VPP tariff, but speaks of their merit and suggests that Xcel should propose  separate “prosumer tariffs” for residential and non-residential customers, including different aggregation capacities.

A stipulation agreed to by the Public Interest Advocacy Staff and Georgia Power in its 2023 Integrated Resource Plan Update proceeding commits the utility to developing a residential and small commercial solar and battery storage pilot program that will provide grid reliability and capacity benefits. Georgia Power will work with interested stakeholders to develop the program and will file it for approval with its 2025 Integrated Resource Plan.

In December 2023, the Hawaii Public Utilities Commission approved a new VPP program for the Hawaiian Electric Companies (HECO). The Bring-Your-Own-Device (BYOD) will replace HECO’s Battery Bonus Program and will provide varying levels of incentives based on the value of the grid services provided. The program will only allow energy storage systems at first, but may be expanded in the future to include other DERs.

The Maryland General Assembly enacted a bill in April 2024, which opens the door to VPPs in the state. H.B. 1256 requires investor-owned utilities in the state to develop pilot programs to compensate owners and aggregators of DERs for distribution system support services. The programs must be filed for approval with the Public Service Commission by July 1, 2025.

Michigan lawmakers introduced legislation in 2024 related to VPPs. S.B. 773 requires the Public Service Commission to develop requirements for programs that would allow behind-the-meter generation and energy storage owners to be compensated for services they provide to the distribution system, including through aggregators of DERs. Utilities would then need to file applications for these programs during their rate cases.

Massachusetts

In January 2024, the state’s three investor-owned utilities filed their Electric Sector Modernization Plans (ESMPs) with the Commission for approval. The three ESMPs include plans to invest in DERMS and customer programs to advance VPPs.

In December 2023, Public Service Electric & Gas (PSEG) New Jersey filed a petition for a VPP demonstration as part of its energy efficiency and peak demand reduction programs. The VPP demonstration will network behind-the-meter energy storage to provide grid services. The petition contains an energy storage incentive of $8,000 to $16,000 for 8 kW energy storage systems. Battery costs over the incentive amount would be eligible for on-bill repayments to PSEG.

In April 2024, the Governor announced a new proceeding within the Public Service Commission to “develop a comprehensive New York Grid of the Future plan that establishes targets for the deployment of flexible resources such as virtual power plants and identifies the utility investments needed to enable the grid of the future.”

North Carolina

In January 2024, the North Carolina Utilities Commission approved Duke Energy’s application for PowerPair, a solar-plus-storage incentive program. Through the program, Duke Energy Carolinas and Duke Energy Progress will each provide incentives of $0.36/Watt for 30 MW of solar systems, plus $500/kWh for paired energy storage devices. Participants will be divided into two cohorts. One cohort will be on the utilities’ new Solar Choice Tariffs, which is coupled with time-of-use rates. These customers will retain complete control of their energy storage devices, but the time-of-use rates will incentivize them to configure them to provide energy during peak times. The other cohort will be on the utilities’ Bridge Tariff, which does not use time-of-use rates. These customers will grant full control of their systems to the utility to use as part of a VPP in exchange for an additional monthly incentive.

Lawmakers in Virginia passed a pair of bills related to VPPs in 2024. H.B. 1062 and S.B. 271 clarify that customer-generators may participate in demand response, energy efficiency, or peak reduction programs from dispatch of on-site battery service, provided that the compensation received is in exchange for a distinct service that is not already compensated by net metering.

In November 2023, Avista Utilities filed a proposed tariff for the Spokane Connected Communities Pilot Program. The program will provide a variety of incentives to different customer classes for a mix of customer products including smart thermostats, residential energy storage batteries, building control systems, and heat pumps.

Looking Ahead

As trendy as VPPs are today, we are still in the early stages of their development. Wider electrification and the growing body of connected devices, in addition to the further proliferation of solar-plus-storage, will unlock more potential flavors of VPPs. Overtime, technological advances will also open the door to new policy solutions to better harness their benefits. With policymakers, utilities, and private enterprise working collaboratively to find solutions that work for a given state’s unique circumstances, we will surely see continued growth of VPPs.

Upcoming Events

The open sustainability policy summit.

NCCETC’s Executive Director, Steve Kalland, will be speaking at the all new Open Sustainability Policy Summit May 2-3 in Washington, DC. Hear from him during the “Node Collective’s Open Data […]

Sustainable Fleet Technology Webinar Series: Hydrogen: Considerations in Fleet Use

This webinar will focus on hydrogen as a transportation fleet. Come listen to subject matter experts discuss the logistics you should consider when using hydrogen as a fuel for your […]

Get Involved

Newsletter signup, take action.

IMAGES

  1. What is a Virtual Power Plant? VPP Explained

    thesis on virtual power plant

  2. Virtual Power Plant (VPP): What are they and their benefits?

    thesis on virtual power plant

  3. Model of the proposed virtual power plant.

    thesis on virtual power plant

  4. Virtual Power Plants: Balancing the Grid with Solar and Batteries

    thesis on virtual power plant

  5. Comprehensive review on structure and operation of virtual power plant

    thesis on virtual power plant

  6. Basic elements in a Virtual Power Plant.

    thesis on virtual power plant

VIDEO

  1. Virtual Power Plant

  2. Virtual Power Plants In The 20s Moving From Theory To Practice

  3. Powering a real city with a virtual power plant

  4. Synergy Pilots and Trials

  5. How to Build Virtual Power Plant in 1 Minute

  6. Virtual Power Plant (VPP): A New Form of Energy Management

COMMENTS

  1. PDF Developing Virtual Power Plant for Optimized Distributed Energy

    This thesis was prepared at the Center for Electric Technology (CET), Department of Electrical Engineering of Technical University of Denmark (DTU) in partial fulfillment of the requirements for the Ph. D degree in Denmark. It was financed by the Danish ... C Virtual Power Plant Related Researches ...

  2. Model of virtual power plant as a part of Msc thesis

    The repository is a part of the thesis about the system for Negawatt Virtual Power Plant, which heads up groups of heat pumps. Virtual Power Plant is a concept of connected power plants and regular users of electric power. The main aim of such a system is to take control over dependent installations in order to maintain good collaborations with ...

  3. PDF Coordinated Control and Optimization of Virtual Power Plants for Energy

    power plants, power system operators are facing difficulties in frequency control and other services which are essential to system reliability [2]. For example, it is possible to integrate 20% renewable energy into California electric system. However, the frequency regulation capacity needs to increase by 170 MW to 250 MW for ―Up Regulation ...

  4. PDF Characterisation of Virtual Power Plants

    CHARACTERISATION OF VIRTUAL POWER PLANTS A thesis submitted to the University of Manchester for the degree of PhD in the Faculty of Engineering and Physical Sciences 2010 Guy Newman School of Electrical and Electronic Engineering View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by OpenGrey Repository

  5. PDF Virtual Power Plant Construction and Coordination Strategies and

    Chapter 4 of this thesis is published as [X. Lu, J. Qiu, C. Zhang, G. Lei and J. Zhu. Assembly and Competition for Virtual Power Plants with Multiple ESPs Through a "Recruitment-Participation" Approach. IEEE Transactions on Power Systems, 39(2), 4382-4396]. I designed the study, analyzed the data, and wrote the drafts.

  6. Model-Free Economic Dispatch for Virtual Power Plants: An Adversarial

    To address the model inaccuracy and uncertainty of virtual power plants (VPPs), a model-free economic dispatch approach for multiple VPPs is studied in this article, which does not rely on an accurate environmental model. An adversarial safe reinforcement learning approach is proposed, which promotes the safety of the actions and makes the model robust to deviations between the training and ...

  7. Energies

    Recently, the integration of distributed generation and energy systems has been associated with new approaches to plant operations. As a result, it is becoming increasingly important to improve management skills related to distributed generation and demand aggregation through different types of virtual power plants (VPPs). It is also important to leverage their ability to participate in ...

  8. Optimization of Solar Grid-Based Virtual Power Plant Using ...

    The need for future sustainable energy and better transmission efficiency has advocated the large-scale integration of distributed energy resources (DER) in the utility network. The high penetration of DERs such as solar PV can potentially result in serious issues such as reverse power flow, voltage fluctuations, and utility revenue loss. The concept of a virtual power plant (VPP) can be a ...

  9. Dissertations / Theses: 'Virtual Power Plant'

    In this thesis, we build a virtual power plant model and use the concept of demand response and time of use pricing to control the distributed energy resources, such as battery energy storage system, to maximize the profits. A demand response contract is designed and different factors are taken into account in operation scheduling.

  10. PDF Mechanism Design for Virtual Power Plant with

    Mechanism Design for Virtual Power Plant with Independent Distributed Generators Thesis by Al ya Kulmukhanova In Partial Ful llment of the Requirements For the Degree of Masters of Science King Abdullah University of Science and Technology Thuwal, Kingdom of Saudi Arabia May, 2018. 2

  11. Virtual Power Plants and Integrated Energy System: Current ...

    In the process of decentralization, local energy markets are forming at various places. A virtual power plant (VPP) is a by-product of this digitalization capitalizing on the opportunity to further promote renewable resources, demand-side flexibility, and sector coupling. A VPP enables resilient operation of power system while assembling small ...

  12. PDF Distributed Generation and Virtual Power Plants: Barriers and Solutions

    and Virtual Power Plants: Barriers and Solutions Master Thesis Sustainable Development - Energy and Resources Tomas Olejnczak 0357022 Date : 26-03-2011 ... In 1.6, an outline of the thesis is presented. 1.1 Background The transition from conventional to renewable energy sources is on-going. In 2008, the EU

  13. PDF A Market Analysis of Virtual Power Plants and Some Ideas for Potential

    Virtual Power Plants (VPPs) aggregate a group of small/medium distributed supply-side energy resources (DERs), such as PV, wind, electric generators, and even demand side response, and control this potential net supply, such that they act as a single power plant for grid operations and energy trading.

  14. A review on virtual power plant for energy management

    A Virtual Power Plant (VPP) is a practical concept that aggregates various Renewable Energy Sources (RESs) to improve energy management efficiency and facilitate energy trading. Operation scheduling for all energy components in VPPs plays a vital role from an energy management perspective. Technical and economic constraints and uncertainties ...

  15. Concept and controllability of virtual power plant (Thesis/Dissertation

    This thesis presents definitions and types of Virtual Power Plants (VPP), then developing control through numerical simulation. The thesis proposes three DG controls namely Basic Autocontrol System (BAS), Smart Autocontrol System (SAS) and Tracking Efficiency Autocontrol System (TEAS). The BAS controls the DG output power with the objective to ...

  16. Virtual power plant models and electricity markets

    Virtual power plants represent the most immediate future of electricity generation, as they allow for intelligent consumption of energy in a distributed environment through the optimal management of demand and power generation. This means that users produce and consume their own energy, which leads to more active consumer participation in ...

  17. Characterisation of Virtual Power Plants

    Student thesis: Phd. ... One of the techniques for considering the impacts of thesedevices is the Virtual Power Plant (VPP).The VPP is the aggregation of all the Distributed Generation (DG) connected into thenetwork up to and including the connection voltage of the VPP, such that thecumulative power up the voltage levels can be seen in the ...

  18. Research on Optimal Operation Model of Virtual Electric Power Plant

    Huang, H. Economic Dispatch of Virtual Power Plant Considering Demand Response Uncertainty and Conditional Risk. Ph.D. Thesis, Wuhan University, Wuhan, China, 2018. [Google Scholar] Liu, X. Research on the Economy Dispatch and Optimal Allocation of a Virtual Power Plant. Master's Thesis, Hefei Polytechnic University, Hefei, China, 2020.

  19. Cybersecurity challenges in energy sector (virtual power plants)

    Distributed generators (D.G.'s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements. With this also comes challenges associated with securing physical ...

  20. Interactive Power Prediction Model for Virtual Power Plant Based on

    Virtual power plant technology has emerged as a crucial technical solution for addressing the challenges related to scheduling of new energy and distributed power grids. However, the interactive power characteristic of virtual power plant is affected by the power generator, renewable energy and load, which results in the characteristics of non-linearity, time series coupling and time variation ...

  21. PDF Design and Optimal Operation of a Virtual Power Plant with

    Virtual power plants (VPPs) can enhance reliability and efficiency of power systems with a high share of renewables. However, their adoption largely ... This thesis is the original work by Saidur Rahman. The results that are presented in Chapter 4 of this thesis are based on a conference publication

  22. What are States Doing to Make Virtual Power Plants a Reality?

    Virtual Power Plants (VPPs) are attracting a lot of attention at the moment. Our upcoming 50 States of Grid Modernization Q1 2024 report documents numerous policy and program actions taken by several states, and our very own Autumn Proudlove moderated a session on VPPs at the 2024 North Carolina State Energy Conference.

  23. Virtual Power Plants Optimization Issue: A Comprehensive Review on

    Y ou, S. Developing Virtual Power Plant for Optimized Distributed Energy Resources Operation and Integration. Ph.D. Thesis, Ph.D. Thesis, T echnical University of Denmark, Kgs.

  24. Design and Evaluation of a Secure Virtual Power Plant

    Therefore, it is believed VPP deployment will have far-reaching positive consequences for grid operations and may provide a robust pathway to high penetrations of renewables on US power systems. In this report, we design VPPs to provide a range of grid-support services and demonstrate one VPP which simultaneously provides bulk-system energy and ...