Device-to-Device Communication For Smart Grid Devices
Device-to-Device Communication For Smart Grid Devices
Device-to-Device Communication For Smart Grid Devices
Abstract—This paper analyzes the applicability of existing Many other applications are conceivable. Applications that
communication technology on the Smart Grid. In particular it belong to different domains (e.g. transmission, distribution,
evaluates how networks, e.g. Peer-to-Peer (P2P) and decentralized markets, customers) evince different communication and infor-
Virtual Private Network (VPN) can help set up an agent-based
system. It is expected that applications on Smart Grid devices will mation structures [2]. To merge these different communication
become more powerful and be able to operate without a central infrastructures, domain independent middleware that ensures a
control instance. We analyze which requirements agents and fast, secure and stable communication and provides interfaces
Smart Grid devices place on communication systems and validate for numerous plug and play feasible devices and applications
promising approaches. The main focus is to create a logical is required. This paper focuses on finding a solution to
overlay network that provides direct communication between
network nodes. We provide a comparison of different approaches reach “network interoperability” considering the GRIDWISE
of P2P networks and mesh-VPNs. Finally the advantages of mesh- Architecture Council (GWAC) Interoperability Stack [3]. In
VPN for agent-based systems are worked out. particular, this paper examines several well-known techniques
Index Terms—Communication networks, Network topology, for building up a logical network towards the applicability in
Smart grids the Smart Grid solutions. We will discuss several problems
which we expect to occur when applying state of the art
I. I NTRODUCTION communication techniques (e.g. VPN or P2P) to Smart Grid
applications.
T HE share of fluctuating renewable energy generation has
significantly increased over the last years. The electrical
system requires generation and consumption to be equal at
This paper is organized as follows. Section II introduces
an agent-based control system for a Smart Grid and points
any point in time. In conventional energy system power out the need for decentralized communication and direct
plants control their generation depending on the demand of information exchange between devices. In Section III we
the consumers and ensure the compliance of this physical define our understanding of the term Device-to-Device (D2D)
conditions. In contrast, renewable generators can only produce and how logical overlay networks help in providing a virtual
power when natural resources are available. This makes the network on top of a heterogeneous network. The required
balancing more challenging. features that a communication network has to provide to
Enhanced consumers and generators are necessary, to be able fulfill the requirements of an agent-based control system are
to react to local and global grid situations. These sophisticated pointed out in Section IV. Section V then compares VPN and
devices in combination with information technology is what P2P as two different approaches to create an overlay network
experts usually call the Smart Grid. and provides a comparison on several projects that implement
Many different approaches exist how this Smart Grid may be those concepts. In Section VI we conclude our results on
realized. Such new approaches can be clustered with respect decentralized communication networks and their applicability
to their realized “control structure“ or “control concept” [1]. to the Smart Grid.
Common to all Smart Grid applications is the need of a reliable
and secure underlying communication infrastructure.
II. AGENT- BASED S MART G RID
For instance, a home energy management (HEM) system
might communicate via the Internet with the control center This section will outline an application much discussed in
of a Virtual Power Plant (VPP) in order to influence the former and current times: agent-based energy management
energy consumption of the building. In this case the two structured in a fully distributed manner and following a grid-
devices which are communicating are the HEM and a server oriented approach [1], [4], [5].
in the control center. In this scenario the HEM will most In an agent-based Electrical Power System (EPS) different
likely use the Asymmetric Digital Subscriber Line (ADSL) or computer systems, distributed in the electric grid and each re-
Cable Internet connection of the household. In another Smart sponsible for the control of an underlying physical system, are
Grid application a charging station of an electric vehicle (EV) interconnected via a heterogeneous communication network.
receives energy tariffs via GSM to charge the battery with On every device one or more software agents are running.
respect to the electricity grid. Such systems are called Multiagent Systems (MASs). Figure 1
depicts a MAS following a fully distributed control structure.
S. Fey, A. H. Christ are with Offenburg University of Applied Science, Within this example the MAS is responsible for controlling
Germany, e-mail: simon.fey@hs-offenburg.de
P. Benoit, G. Rohbogner and C. Wittwer are with the Department Smart the voltage level in a low-voltage grid while trying to allow a
Grid, Fraunhofer Institute for Solar Energy Systems, Freiburg, Germany maximum of renewable energy generation.
Since there is no central control unit for the voltage-grid, authentication is mandatory.
energy agents (A, B and C in Figure 1) have to cooperate and
negotiate when, how and at what intensity each is allowed The initialization of communications between two agents
to use the energy grid. Such an application requires an requires an overlay network which provides the following
appropriate D2D communication, which we will illustrate in functionality and offers an independent interface for any
the following paragraph. application assigned to the Smart Grid:
In our example, agents are located in the same low-voltage 1) Find other agents in the communication network after
grid, willing to cooperate for the purpose of voltage control. first plug-in (Bootstrapping)
The agents differ in the communication transmission mediums 2) Provide information about where detected agents are
they have at their disposal and in the underling physical located in the electric grid and which services they offer
system for which they are responsible (e.g. a combination (Search methods)
of a Combined Heat and Power (CHP) and thermal storage). 3) Ensure fast and reliable communication between agents
Here agent A and agent B have a conventional ADSL con- (Self-healing, Connectivity)
nection whereas agent C uses a Global System for Mobile 4) Ensure secure data exchange and authentication (Secu-
Communications (GSM) connection to the Internet. rity)
GSM
III. D EVICE - TO -D EVICE C OMMUNICATION
Communication between two devices is a commonly used
technique occurring billions of times in every second [6].
GSM Millions of switches and routers, providing the infrastructure
of the Internet, basically exchange data between two devices.
Radio transmitters were already able to communicate between
two devices one century ago. Cell phones communicate with
WWW central stations. These stations are routing calls between the
ADSL two subscribers. Every single transmission takes place between
ADSL
two devices.
This raises the issue about the term D2D in this paper. The
purpose of this section is to define D2D communication and
to distinguish it from the cases explained above.
A. Self-Healing
In the area of small-scale decentralized energy systems it
is expected to have high fluctuations of devices. Since most
of today’s available monitoring and control systems rely on
Fig. 3. Direct Communication Between Logic Nodes Over a Hybrid GSM/GPRS or other telecommunications links such as ADSL
Underlying Network
or Cable the link quality may change over time. Aside from
that, systems may not be supplied by power all-day and might
The small red circles and connections added in Figure 3 switch off when their service is not needed. Therefore the
illustrate D2D communication based on this heterogeneous network has to provide self-healing mechanisms that automat-
underlying network. It forms a new logical network of a ically reconfigure the network to achieve scalability and handle
subset of nodes (Figure 4). disappearing and appearing nodes.
B. Bootstrapping
When a new device or agent is powered on and plugged
to the Internet it will need to gather information about other
network nodes. This process is known from P2P networks and
in the following sections will be defined as bootstrapping. This
process includes steps that a new or existing node is taking to
find network nodes and connect to the network.
V. C OMMUNICATION N ETWORKS nodes and loosely coupled communication for a lot of appli-
Two different communication network types are considered cations. They also provide efficient mechanisms to store and
for decentralized, direct D2D communication. First is solving search data decentralized in, for instance, Distributed Hash
the problem of connectivity on the application layer with Tables (DHTs).
P2P protocols and second is the use of VPN which maps
a heterogeneous to a homogeneous network. Both methods B. Mesh-Virtual Private Network
provide their own advantages and disadvantages.
Mesh-VPN is characterized by more than one network node
Application layer based solutions can be customized for a
that provides packet encapsulation and routing functionality
certain use-case and are independent of underlying systems.
for any kind of application protocol. Mesh-VPN is abandoning
Skype, for instance, solves the challenge of connectivity
the typical client-server structure known from centralized
on the application layer and successfully establishes
VPN by adopting mechanisms from P2P networks. Mesh-
an independent P2P network structure in heterogeneous
VPNs create an overlay network with virtual topology
networks. Unfortunately, it is a closed system. This network
upon existing homogeneous or heterogeneous network. The
cannot be used for other purposes than those it has been
organization of an EPS with overlay networks has already
originally designed for.
been proposed in [10]. In [9] it is examined, how P2P
overlays and mechanisms improve VPNs to easily create
Network layer solutions provide a higher flexibility than
and maintain groups. A high grade of self-organization and
application layer based methods, since network and appli-
automatic configuration is confessed for mesh-VPNs in [8].
cation are separated from each other. Although most VPN
In Table I mesh-VPN networks are analyzed in more detail.
solutions are static and require a lot of configuration, VPN
is widely spread and commonly used for communication
1) tinc-VPN: tinc [14] is an open source project that allows
between nodes in heterogeneous networks. A major advantage
to create a full-mesh VPN across the Internet. According
of VPN technologies is that, due to routing over a VPN server,
to its feature to forward packets between nodes from the
hosts transparently may connect to every other host. Also
entire network, tinc is ideal to set up site-to-site VPNs which
authentication and encryption is shifted to the lower network
means linking several Local Area Networks (LANs) to an
layer. The encapsulated application protocol is not responsible
even bigger network. Tinc requires every connection to be
for security and has not to be aware of threads from outside
manually configured and included to the network with private
the tunnel. Centralized VPN systems are state of the art for
and public keys on every node.
remote monitoring and control of field devices, e.g., a VPP
[7]. Since we are focusing on decentralized applications a
2) P2PVPN: P2PVPN [15] is an open source Java
centralized communication system is not intended. In [8] and
implementation of a full-mesh VPN. It uses BitTorrent
[9] several decentralized, so called mesh-VPNs are examined
trackers for bootstrapping and allows to dynamically integrate
concerning their design and automatic configuration. Hence, in
or remove nodes. P2PVPN tries to directly connect with
the following two subsections P2P networks and mesh-VPNs
every network node and supports relaying packets if nodes
are investigated in detail for agent-based systems.
are unreachable behind a NAT.
TABLE I
C OMPARISON OF DECENTRALIZED COMMUNICATION NETWORKS FOR S MART G RID
were considered as suitable communication networks they with low capability. The automatic management of the overlay
suffer in bootstrapping. Every connection has to be configured can deal with appearing and disappearing nodes. Unfortunately
manually. This will not work out for an agent-based system, it does not provide the ability to exclude a single network node
where including a new agent would require to adjust every without changing the symmetric key on every other node and
other agents configuration. Hence, more dynamic systems have therefor lacks in user management.
been considered, such as Hamachi, N2N and P2PVPN. The idea of P2PVPN in general matches the requirements
Hamachi is very suitable according to its self-organization and of agent-based systems especially concerning bootstrapping.
connectivity features. New nodes can easily be added to the It makes use of BitTorrent trackers and supports peer-
network without manual configuration. The bootstrapping un- information exchange if at least one node is known. Direct
fortunately uses the companies server application and Hamachi communication links are created between two nodes if it is
therefore cannot be considered as an independent system. possible. If not, it communicates through other nodes which
N2N in our evaluation scores in terms of efficiency as the act as a relay unit. Still it is not a sufficient communication
application focuses on a very tiny implementation for devices network for agents in heterogeneous networks as it lacks in
6
NAT traversal and scalability. [7] R. Becker, “Entwurf und Betrieb von Regelungs- und Monitoringsys-
temen für dezentrale Energiesysteme auf der Basis von verteilten
Embedded Systems,” Ph.D. dissertation, Universität Kassel, 2008.
[Online]. Available: http://kobra.bibliothek.uni-kassel.de/bitstream/urn:
VI. C ONCLUSION nbn:de:hebis:34-2009061828307/3/DissertationRainerBecker.pdf
[8] M. Rossberg and G. Schaefer, “A survey on automatic configuration
In this paper we described the need for decentralized of virtual private networks,” Computer Networks, vol. 55, no. 8, pp.
communication in the Smart Grid especially for agent systems. 1684 – 1699, 2011. [Online]. Available: http://www.sciencedirect.com/
science/article/pii/S1389128611000053
The key functionalities of decentralized P2P communication [9] D. Wolinsky, K. Lee, P. Boykin, and R. Figueiredo, “On the design
networks have been pointed out. P2P networks demonstrate of autonomic, decentralized vpns,” in Collaborative Computing: Net-
how robust decentralized networks should be built. They allow working, Applications and Worksharing (CollaborateCom), 2010 6th
International Conference on, oct. 2010, pp. 1 –10.
fast communication with direct communication links between [10] Michele and Amoretti, “Towards a peer-to-peer hydrogen economy
nodes and demonstrate the handling of high node fluctuations. framework,” International Journal of Hydrogen Energy, vol. 36, no. 11,
These key functionalities should be implemented in mesh- pp. 6376 – 6386, 2011. [Online]. Available: http://www.sciencedirect.
com/science/article/pii/S0360319911006288
VPN to support an agent-based Smart Grid in the future. [11] A. Sanna, C. Zunino, and L. Ciminiera, “A distributed jxta-
Agent-based systems will require a middle layer offering basic based architecture for searching and retrieving solar data,” Future
connectivity between applications. The underlying network Generation Computer Systems, vol. 21, no. 3, pp. 349 – 359,
2005, p2P computing and interaction with grids. [Online]. Available:
must help with finding agents, as well as storing and searching http://www.sciencedirect.com/science/article/pii/S0167739X04000561
for information. They therefore have to adopt methods from [12] G. Deconinck, W. Labeeuw, S. Vandael, H. Beitollahi, K. De Craemer,
P2P networks. As pure P2P networks limit the possibilities and R. Duan, Z. Qui, P. Ramaswamy, B. Vande Meerssche, I. Vervenne, and
R. Belmans, “Communication overlays and agents for dependable smart
flexibility of the actual application, we conclude autonomic power grids,” in Critical Infrastructure (CRIS), 2010 5th International
mesh-VPN are the most suitable approach to create an ap- Conference on, sept. 2010, pp. 1 –7.
plication independent plug-and-play communication network [13] H. Beitollahi and G. Deconinck, “Peer-to-peer networks applied to power
grid,” Proceedings of the International conference on Risks and Security
in shared heterogeneous networks. Mesh-VPNs implement of Internet and Systems (CRiSIS), p. 8, 2007. [Online]. Available:
NAT traversal and self-organization from P2P networks and http://www.esat.kuleuven.be/electa/publications/fulltexts/pub 1685.pdf
hence are more flexible regarding the encapsulated application [14] I. Timmermans and G. Sliepen, tinc Manual, 2011. [Online]. Available:
http://www.tinc-vpn.org/documentation-1.1/tinc.pdf
protocol. Several mesh-VPNs have been considered for an [15] W. Ginolas, “Aufbau eines virtuellen privaten Netzes mit Peer-to-Peer-
agent-based Smart Grid, but it turns out more effort has Technologie,” 2009. [Online]. Available: p2pvpn.org/P2PVPN-45.pdf
to be invested on bootstrapping, user management and the [16] LogMeIn, LogMeIn Hamachi User Guide, 2012. [Online].
Available: http://help.logmein.com/KnowledgeLinkPublicRenderer?id=
overlay topology and application services such as searching kA230000000LnQ0CAK
for near-by agents. Addressing those issues and improving the [17] L. Deri and R. Andrews, “N2n: A layer two peer-to-peer vpn,” 2008.
state of the art mesh-VPNs would enable a variety of new [Online]. Available: http://luca.ntop.org/n2n.pdf
decentralized applications in the Smart Grid, not just agent-
based systems. VIII. B IOGRAPHIES