Affiliation:
1. Kuwait University, Kuwait
2. University of Dubai, United Arab Emirates
Abstract
Energy demand has increased significantly in the recent years due to the emerging of new technologies and industries, in particular in the developing countries. This increase requires much more developed power grid system than the existing traditional ones. Smart grid (SG) offers a potential solution to this problem. Being one of the most needed and complex cyber-physical systems (CPS), SG has been addressed exhaustively by researchers, from different views and aspects. However, energy optimization yet needs much more studying and examination. Therefore, this chapter presents a comprehensive investigation and analysis of the state-of-the-art developments in SG as a CPS with emphasis on energy optimization techniques and challenges. It also surveys the main challenges facing the SG considering CPS factors and the remarkable accomplishments and techniques in addressing these challenges. In addition, the document contrasts between different techniques according to their efficiency, usage, and feasibility. Moreover, this work explores the most effective applications of the SG as a CPS.
Reference86 articles.
1. The role of communication systems in smart grids: Architectures, technical solutions and research challenges
2. Demand side management using meta-heuristic techniques and ToU in smart grid;S.Ansar;Advances in Network-Based Information Systems. NBiS 2017. Lecture Notes on Data Engineering and Communications Technologies,2017
3. Başar, T., & Olsder, G. J. (1999). Dynamic noncooperative game theory. Society for Industrial and Applied Mathematics, Classics in Applied Mathematics.
4. Basu, A. K., Panigrahi, T. K., Chowdhury, S., Chowdhury, S. P., Chakraborty, N., Sinha, A., & Song, Y. H. (2007). Key energy management issues of setting market clearing price (MCP) in micro-grid scenario. In 2007 42nd International Universities Power Engineering Conference (pp. 854–860). Academic Press.
5. Smart grids cyber-physical security as a malicious data attack: An innovation approach