Search results for "peer to peer"
showing 10 items of 11 documents
Aggregation and remuneration in Demand-Response with a blockchain-based framework
2020
This paper describes the possibility to use the blockchain technology for load and generation aggregation in a new distributed Demand Response (DR) service and customers remuneration system. The blockchain technology and the use of smart contracts for DR allow the creation of a distributed system in which customers can communicate directly, in a transparent, secure and traceable way, with the grid operator to provide their flexibility. In this paper, the DR problem formulation takes into account several aspects, which are periodically executed. First, the blockchain records customers’ energy consumption or production, then, the smart contract starts calculating the baseline and the potentia…
An Energy Blockchain, a Use Case on Tendermint
2018
The recent advances in distributed energy systems require new models for exchanging energy among prosumers in microgrids. The blockchain technology promises to solve the digital issues related to distributed systems without a trusted authority and to allow quick and secure energy transactions, which are verified and cryptographically protected. Transactions are approved and subsequently recorded on all the machines participating in the blockchain. This work demonstrates how users, which are nodes of the energy and digital networks, exchange energy supported by a customized blockchain based on Tendermint. We focus on the procedures for generating blocks and defining data structures for stori…
Privacy-Preserving Overgrid: Secure Data Collection for the Smart Grid
2020
In this paper, we present a privacy-preserving scheme for Overgrid, a fully distributed peer-to-peer (P2P) architecture designed to automatically control and implement distributed Demand Response (DR) schemes in a community of smart buildings with energy generation and storage capabilities. To monitor the power consumption of the buildings, while respecting the privacy of the users, we extend our previous Overgrid algorithms to provide privacy preserving data aggregation (PP-Overgrid). This new technique combines a distributed data aggregation scheme with the Secure Multi-Party Computation paradigm. First, we use the energy profiles of hundreds of buildings, classifying the amount of &ldquo
Autonomy, Heterogeneity and Trust in Mobile P2P environments
2007
Mobile P2P environments are emerging as a result of rapid expansion of portable terminals that are able to establish direct wireless communication links among themselves. These kinds of terminals are under the control of persons and allowing interactions between their terminals is subject to trust between the individuals and their desire to preserve various aspects of autonomy against each other. In this paper we relate the concepts of node autonomy, heterogeneity and trust with each other, defining also numeric measures for them. We also investigate what kind of interactions (such as transactions, file exchanges) are possible at certain heterogeneity, autonomy and trust level between the t…
Implementation Challenges for Supporting Coworking Virtual Enterprises
2013
The creation of co working alliances is usually restricted to the coworkers in the same workspace. However, they might not necessarily be best partners to take advantage of a collaboration opportunity. To break the spatial constrains and find the best partners irrespective of their co working spaces location, our proposal is to represent and manage the co working alliances as virtual enterprises (VEs) and to develop a multi-agent system (MAS) that serves as Virtual Breeding Environment (VBE). In this paper we provide the basis for the future development of this system. Thus, we introduce the co working VEs distinguishing features and the initial proposals on how to implement the MAS to addr…
Peer to Peer Equation Augmentation for an Altitude Aided GNSS Receiver
2010
This paper considers the possibility to integrate external altitude measurements with a Kalman based Global Navigation Satellite System (GNSS) receiver in a peer to peer scenario. The performance of such a system is investigated for different characteristics of the aiding measurement and for different degree of trust of the receiver upon the aiding measurement. The aiding measurement is obtained starting from the altitude measurements that the other peers in the network send to the aided user. The experiments highlight the need for a parameter that points out the effectiveness and the consistency of the computed aiding measurement. To this purpose, a reliability index is proposed, on the ba…
A trust-based security enforcement in disruption-tolerant networks
2017
We propose an approach to enforce security in disruption- and delay-tolerant networks (DTNs) where long delays, high packet drop rates, unavailability of central trusted entity etc. make traditional approaches unfeasible. We use trust model based on subjective logic to continuously evaluate trustworthiness of security credentials issued in distributed manner by network participants to deal with absence of centralised trusted authorities.
A Survey on Privacy in Decentralized Online Social Networks
2018
Decentralized Online Social Networks (DOSNs) have recently captured the interest of users because of the more control given to them over their shared contents. Indeed, most of the user privacy issues related to the centralized Online Social Network (OSN) services (such as Facebook or Google+) do not apply in the case of DOSNs because of the absence of the centralized service provider. However, these new architectures have motivated researchers to investigate new privacy solutions that allow DOSN’s users to protect their contents by taking into account the decentralized nature of the DOSNs platform. In this survey, we provide a comprehensive overview of the privacy solutions adopted by…
A new architecture for Smart Contracts definition in Demand Response Programs
2019
The present paper shows the possibility to use a smart contract for defining a distributed Demand Response mechanism. The use of the blockchain and smart contracts for the Demand Response mechanism allows the creation of an automatic system, where network users can communicate with the DSO to provide their flexibility. The blockchain ensures that the same information is shared among the users of the grid, while preserving user privacy. The DSO notifies the request to increase or reduce the load in a given period of the day using channels, a native abstraction of Hyperledger Fabric. The smart contract computes the support provided by each user to fulfill the requested load adaptation and aut…
Improving Chord Lookup Protocol for P2PSIP-Based Communication Systems
2009
Chord has been suggested as mandatory overlay technology in the future P2PSIP-based communication systems. Chord allows for the available peer/resource lookup in no more than hops, where N is the total number of the peers in the overlay network. However, as a protocol originally designed for background downloading applications, Chord has a few drawbacks when supporting P2PSIP real-time communication systems. These drawbacks are related to ID assignment, the relation between ID and physical location, the routing styles and lack of cache, etc. In this paper, we investigate several approaches that can improve the efficiency of the peer/resource lookup algorithm. After that, we simulate two sys…