A preview of the PDF is not available
Making Electric Vehicles Energy Efficient in Smart Grids using Blockchain (PhD Synopsis)
Abstract and Figures
In this work, an encyclopedic study of the blockchain based energy trading, data trading and sharing, and incentive mechanisms, used in various fields of life like energy, finance, business, data trading, healthcare, etc., is presented. The study critically analyzes different survey papers and ranks them using a recency score. This work also presents major blockchain related future research perspectives, which provide solid working directions to the research community. The use of blockchain technology with the Electric Vehicles (EVs) is also discussed to tackle different issues related to existing systems, such as privacy, security, lack of trust, etc., and to promote transparency, data immutability and tamper proof nature. Moreover, in this study, a new and improved charging strategy, termed as Mobile vehicle-to-Vehicle (M2V) charging strategy, is used to charge the EVs. It is further compared with conventional Vehicle-to-Vehicle (V2V) and Grid-to-Vehicle (G2V) charging strategies to prove its efficacy. In the proposed work, the charging of vehicles is done in a Peer-to-Peer (P2P) manner to remove the intermediary parties and deal with the issues related to them. Moreover, to store the data related to traffic, roads and weather conditions, a Transport System Information Unit (TSIU) is used, which helps in reducing road congestion and minimizing road side accidents. In TSIU, the data is stored in InterPlanetary File System (IPFS). Furthermore, mathematical formulation of the total charging cost, the shortest distance between EVs and charging entities, time taken to traverse the shortest distance and to charge the vehicles is done using real time data of EVs. The phenomena of range anxiety and coordination at the crossroads are also dealt with in the study. Moving ahead, edge service providers (edge nodes) are introduced to ensure efficient service provisioning. A caching system is also introduced at the edge nodes to store frequently used services. The power flow and the related energy losses for G2V, V2V and M2V charging strategies are also discussed in this work. In addition, an incentive provisioning mechanism is proposed on the basis of timely delivery of credible messages, which further promotes users’ participation. To check the robustness of the proposed model, an attacker model is designed and tested against different attacks including selfish mining attack. In future, the proposed model robustness will be tested against more attacks. To prove the efficiency of the proposed work, simulations will be performed. Moreover, the security analysis of the proposed work will also be done using Oyente.
Content may be subject to copyright.