SHOPS: Towards a Secure System for Identity Management and Payments in the New Electrical Market
نویسندگان
چکیده
By the year 2010, the liberalization of Europe's utilities industry has created a dynamic market of production, distribution and reselling organizations where quality of service, personalization and smart marketing, as well as an attentive attitude towards ecology and preservation of resources play a major role. Advancement in information technology in domains such as remote monitoring, communication networks, security and control of distributed systems, as well as innovative payment schemes enable new ways in which customers consume and pay for their utility services. SHOPS has developed an open, crossdomain and platform-neutral system for describing the services for different equipment and applications. The developed technology allows the reduction of the cost and time for launching new equipment and applications. SHOPS architecture is based on advanced communication networks and web technologies.
منابع مشابه
A New Method for Merchandizing Surplus Allocation
Locational Marginal Pricing (LMP) is a method for energy pricing in deregulated power systems. Loss and congestion cause different prices for energy at load or generation buses. In this pricing method there is a different between payments of customers and revenue of generators which is called Merchandizing Surplus (MS). Independent System Operator (ISO) receives MS and generally renders it to T...
متن کاملOptimal Economic Operation and Battery Sizing for Microgrid Energy Management Systems Considering Demand Response
Microgrids (MGs) contain a diverse mix of energy resources to provide safe and secure power to the consumers. Batteries are utilized in MGs for further energy security assurance as well as cost minimization. In this paper, an efficient approach is introduced for simultaneous energy management and optimal battery sizing to accomplish economic MG operation. Also, demand response programs are empl...
متن کاملA New Framework for Secure Routing in VANET
Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...
متن کاملIncorporating Wind Power Generation And Demand Response into Security-Constrained Unit Commitment
Wind generation with an uncertain nature poses many challenges in grid integration and secure operation of power system. One of these operation problems is the unit commitment. Demand Response (DR) can be defined as the changes in electric usage by end-use customers from their normal consumption patterns in response to the changes in the price of electricity over time. Further, DR can be also d...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کامل