A Two-stage Autonomous EV Charging Coordination Method Enabled by Blockchain

نویسندگان

چکیده

Increasing electric vehicle (EV) penetration in distribution networks necessitate EV charging coordination. This paper proposes a two-stage coordination mechanism that frees the system operator (DSO) from extra burdens of The first stage ensures total demand meets facility constraints, and second fair welfare allocation while maximizing via Nash-bargaining trading. A decentralized algorithm based on alternating direction method multipliers (ADMM) is proposed to protect individual privacy. implemented blockchain enable trustworthy case third-party coordinator absent. Simulation results demonstrate effectiveness efficiency approach.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Congestion Games for V2G-Enabled EV Charging

A model of the problem of charging and discharging electrical vehicles as a congestion game is presented. A generalization of congestion games – feedback congestion games (FCG) – is introduced. The charging of gridintegrated vehicles, which can also discharge energy back to the grid, is a natural FCG application. FCGs are proven to be exact potential games and therefore converge to a pure-strat...

متن کامل

Stochastic Charging Coordination Method for Electric Vehicle (EV) Aggregator Considering Uncertainty in EV Departures

This paper presents a stochastic method for an electric vehicle (EV) aggregator to coordinate EV charging schedule considering uncertainty in EV departures. The EV aggregator is responsible for managing the charging schedule of EVs while participating in the electricity markets. The managed EV charging can provide additional revenues to the aggregator from regulation market participation and ch...

متن کامل

Blockchain Enabled Privacy Audit Logs

Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper...

متن کامل

Securing the information infrastructure for EV charging

We consider the functional and security requirements for the information exchanges in the infrastructure for EV charging being trialled in the Netherlands, which includes support for congestion management using the smart charging protocol OSCP. We note that current solutions do not provide true end-to-end security, even if all communication links are secured (for instance with TLS), as some dat...

متن کامل

A Heuristic Method on Extended Two-Stage Network Structures

Data Envelopment Analysis (DEA) as a non–parametric method is used to measure relative performance of organizational units. The aim of this paper is to develop a new model to evaluate the efficiency of a general two-stage network structures proposed by Li et al.  (2012) for measuring the performance of Decision Making Units (DMUs). In addition, this paper expands the work of Li et al. (2012) an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of modern power systems and clean energy

سال: 2021

ISSN: ['2196-5420', '2196-5625']

DOI: https://doi.org/10.35833/mpce.2019.000139