Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2017, Vol 4, Issue 12
Abstract
QoS and Security features are playing an important role in modern network architecures. Dynamic selection of services and by extension of service providers are vital in today’s liberalized market of energy. On the other hand it is equally important for Service Providers to spot the one QoS Module that offers the best QoS level in a given cost. Type of service, response time, availability and cost, consist a basic set of attributes that should be taken into consideration when building a concrete Grid network. In the proposed QoS architecture Prosumers request services based on the aforementioned set of attributes. The Prosumer requests the service through the QoS Module. It is then the QoS Module that seeks the Service Provider that best fits the needs of the client. The aforementioned approach is well supplemented with an in depth analysis on existing authentication and authorization protocols. The authors believe that QoS and security can work in parallel without adding extra burden in the Smart Grid infrastructure. This is feasible by building an in advance system for placing, scheduling, and assigning of the requests for energy consumption or production, thus decongesting the traffic in the whole network.
Authors and Affiliations
C. Chrysoulas, N. Pitropakis
Design of public safety network and emergency alarm for smart trade centre
In the trade centre, there are always unannounced emergencies that need to be addressed to maintain order. Therefore, a smart system is required to detect threats and deal with them. In this paper, we propose a secure ne...
Cloud Based Mobile Network Sharing: A New Model
The tradition network sharing models on existing mobile architecture is a challenging for the mobile operator to cope the future competitive market while increasing average revenue per user. In fact, to sustain the futur...
Attribution of Cyber Attacks on Industrial Control Systems
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or nationa...
Improving Customer Behaviour Prediction with the Item2Item model in Recommender Systems
Recommender Systems are the most well-known applications in E-commerce sites. However, the trade-off between runtime and the accuracy in making recommendations is a big challenge. This work combines several traditional t...
Using Finite Forkable DEVS for Decision-Making Based on Time Measured with Uncertainty
The time-line in Discrete Event Simulation (DES) is a sequence of events defined in a numerable subset of R+. When it comes from an experimental measurement, the timing of these events has a limited precision. This preci...