Search results for "peer to peer"

showing 10 items of 11 documents

Aggregation and remuneration in Demand-Response with a blockchain-based framework

2020

This paper describes the possibility to use the blockchain technology for load and generation aggregation in a new distributed Demand Response (DR) service and customers remuneration system. The blockchain technology and the use of smart contracts for DR allow the creation of a distributed system in which customers can communicate directly, in a transparent, secure and traceable way, with the grid operator to provide their flexibility. In this paper, the DR problem formulation takes into account several aspects, which are periodically executed. First, the blockchain records customers’ energy consumption or production, then, the smart contract starts calculating the baseline and the potentia…

blockchaintransactive energyBlockchainSmart contractComputer science020209 energy02 engineering and technologyComputer securitycomputer.software_genreLoad profileIndustrial and Manufacturing EngineeringDemand responseLoad managementenergy market0202 electrical engineering electronic engineering information engineeringRemunerationElectrical and Electronic Engineeringpeer to peerMultitenancySettore INF/01 - InformaticaSettore ING-INF/03 - Telecomunicazioni020208 electrical & electronic engineeringGridSettore ING-IND/33 - Sistemi Elettrici Per L'Energiamicrogriddemand responseControl and Systems Engineeringsmart contractcomputerIEEE Transactions on Industry Applications
researchProduct

An Energy Blockchain, a Use Case on Tendermint

2018

The recent advances in distributed energy systems require new models for exchanging energy among prosumers in microgrids. The blockchain technology promises to solve the digital issues related to distributed systems without a trusted authority and to allow quick and secure energy transactions, which are verified and cryptographically protected. Transactions are approved and subsequently recorded on all the machines participating in the blockchain. This work demonstrates how users, which are nodes of the energy and digital networks, exchange energy supported by a customized blockchain based on Tendermint. We focus on the procedures for generating blocks and defining data structures for stori…

blockchainBlockchaintransactive energyEnvironmental EngineeringComputer science020209 energyEnergy Engineering and Power Technology02 engineering and technologyPeer-to-peercomputer.software_genreEnergy storageIndustrial and Manufacturing Engineeringenergy market0202 electrical engineering electronic engineering information engineeringEnergy marketElectrical and Electronic Engineeringpeer to peerSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniFocus (computing)business.industryRenewable Energy Sustainability and the Environment020208 electrical & electronic engineeringData structureSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiamicrogridHardware and ArchitectureDistributed generationbusinesscomputerEnergy (signal processing)Computer network
researchProduct

Privacy-Preserving Overgrid: Secure Data Collection for the Smart Grid

2020

In this paper, we present a privacy-preserving scheme for Overgrid, a fully distributed peer-to-peer (P2P) architecture designed to automatically control and implement distributed Demand Response (DR) schemes in a community of smart buildings with energy generation and storage capabilities. To monitor the power consumption of the buildings, while respecting the privacy of the users, we extend our previous Overgrid algorithms to provide privacy preserving data aggregation (PP-Overgrid). This new technique combines a distributed data aggregation scheme with the Secure Multi-Party Computation paradigm. First, we use the energy profiles of hundreds of buildings, classifying the amount of &ldquo

Overlay networksComputer scienceDistributed computingOverlay networkSmart grid02 engineering and technologylcsh:Chemical technologyBiochemistryArticlePeer to peerAnalytical ChemistryDemand response0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringSecret sharingInstrumentationOvergridBuilding automationP2P020203 distributed computingbusiness.industryDistributed; Gossiping; Overgrid; Overlay networks; P2P; Peer to peer; Privacy; Secret sharing; Smart grid020206 networking & telecommunicationsEnergy consumptionAtomic and Molecular Physics and OpticsRenewable energyDistributedElectricity generationSmart gridPrivacyGossipingbusinessSensors
researchProduct

Autonomy, Heterogeneity and Trust in Mobile P2P environments

2007

Mobile P2P environments are emerging as a result of rapid expansion of portable terminals that are able to establish direct wireless communication links among themselves. These kinds of terminals are under the control of persons and allowing interactions between their terminals is subject to trust between the individuals and their desire to preserve various aspects of autonomy against each other. In this paper we relate the concepts of node autonomy, heterogeneity and trust with each other, defining also numeric measures for them. We also investigate what kind of interactions (such as transactions, file exchanges) are possible at certain heterogeneity, autonomy and trust level between the t…

business.industryComputer scienceRapid expansionmedia_common.quotation_subjectNode (networking)Control (management)Mobile computingComputer securitycomputer.software_genreTrust levelPeer to peer computingWirelessbusinesscomputerAutonomymedia_common2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07)
researchProduct

Implementation Challenges for Supporting Coworking Virtual Enterprises

2013

The creation of co working alliances is usually restricted to the coworkers in the same workspace. However, they might not necessarily be best partners to take advantage of a collaboration opportunity. To break the spatial constrains and find the best partners irrespective of their co working spaces location, our proposal is to represent and manage the co working alliances as virtual enterprises (VEs) and to develop a multi-agent system (MAS) that serves as Virtual Breeding Environment (VBE). In this paper we provide the basis for the future development of this system. Thus, we introduce the co working VEs distinguishing features and the initial proposals on how to implement the MAS to addr…

AllianceKnowledge managementComputer scienceCo workingbusiness.industryMulti-agent systemHuman resource managementPeer to peer computingWorkspacebusiness2013 IEEE 10th International Conference on e-Business Engineering
researchProduct

Peer to Peer Equation Augmentation for an Altitude Aided GNSS Receiver

2010

This paper considers the possibility to integrate external altitude measurements with a Kalman based Global Navigation Satellite System (GNSS) receiver in a peer to peer scenario. The performance of such a system is investigated for different characteristics of the aiding measurement and for different degree of trust of the receiver upon the aiding measurement. The aiding measurement is obtained starting from the altitude measurements that the other peers in the network send to the aided user. The experiments highlight the need for a parameter that points out the effectiveness and the consistency of the computed aiding measurement. To this purpose, a reliability index is proposed, on the ba…

Computer sciencepeer to peer positioningSettore ING-INF/03 - TelecomunicazioniSatellite systemKalman filterVariance (accounting)Peer-to-peercomputer.software_genreAltitudeGNSS applicationsSatellite navigationSatelliteNoise (video)P2P localization Kalman filtering GNSScomputerSimulationReliability (statistics)
researchProduct

A trust-based security enforcement in disruption-tolerant networks

2017

We propose an approach to enforce security in disruption- and delay-tolerant networks (DTNs) where long delays, high packet drop rates, unavailability of central trusted entity etc. make traditional approaches unfeasible. We use trust model based on subjective logic to continuously evaluate trustworthiness of security credentials issued in distributed manner by network participants to deal with absence of centralised trusted authorities.

Network packetbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreMedical servicesTrustworthiness020204 information systems0202 electrical engineering electronic engineering information engineeringPeer to peer computingComputational trustUnavailabilitySubjective logicbusinessEnforcementcomputerComputer network2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

A Survey on Privacy in Decentralized Online Social Networks

2018

Decentralized Online Social Networks (DOSNs) have recently captured the interest of users because of the more control given to them over their shared contents. Indeed, most of the user privacy issues related to the centralized Online Social Network (OSN) services (such as Facebook or Google+) do not apply in the case of DOSNs because of the absence of the centralized service provider. However, these new architectures have motivated researchers to investigate new privacy solutions that allow DOSN’s users to protect their contents by taking into account the decentralized nature of the DOSNs platform. In this survey, we provide a comprehensive overview of the privacy solutions adopted by…

Information privacyData privacy; Decentralized online social network; Access control; Security; Peer to peer computingGeneral Computer ScienceSocial networkbusiness.industryComputer sciencePrivacy policyControl (management)Internet privacyComputer Science (all)020206 networking & telecommunicationsAccess controlPeer to peer computing02 engineering and technologyService providerTheoretical Computer ScienceOverhead (business)0202 electrical engineering electronic engineering information engineeringSecurityDecentralized online social network020201 artificial intelligence & image processingAccess controlEnforcementbusinessData privacy
researchProduct

A new architecture for Smart Contracts definition in Demand Response Programs

2019

The present paper shows the possibility to use a smart contract for defining a distributed Demand Response mechanism. The use of the blockchain and smart contracts for the Demand Response mechanism allows the creation of an automatic system, where network users can communicate with the DSO to provide their flexibility. The blockchain ensures that the same information is shared among the users of the grid, while preserving user privacy. The DSO notifies the request to increase or reduce the load in a given period of the day using channels, a native abstraction of Hyperledger Fabric. The smart contract computes the support provided by each user to fulfill the requested load adaptation and aut…

Flexibility (engineering)blockchainpeer to peertransactive energySmart contractbusiness.industryComputer sciencePeer-to-peercomputer.software_genreGridDemand responsemicrogridOrder (business)energy marketdemand response.Adaptation (computer science)businesssmart contractcomputerComputer networkAbstraction (linguistics)
researchProduct

Improving Chord Lookup Protocol for P2PSIP-Based Communication Systems

2009

Chord has been suggested as mandatory overlay technology in the future P2PSIP-based communication systems. Chord allows for the available peer/resource lookup in no more than hops, where N is the total number of the peers in the overlay network. However, as a protocol originally designed for background downloading applications, Chord has a few drawbacks when supporting P2PSIP real-time communication systems. These drawbacks are related to ID assignment, the relation between ID and physical location, the routing styles and lack of cache, etc. In this paper, we investigate several approaches that can improve the efficiency of the peer/resource lookup algorithm. After that, we simulate two sys…

business.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal time communication systemsOverlay networkOverlayCommunications systemUploadPeer to peer computingCachebusinessChord (peer-to-peer)Computer network2009 International Conference on New Trends in Information and Service Science
researchProduct