You are on page 1of 24

IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO.

2, APRIL 2018 847

Review of Internet of Things (IoT) in Electric


Power and Energy Systems
Guneet Bedi , Graduate Student Member, IEEE, Ganesh Kumar Venayagamoorthy, Senior Member, IEEE,
Rajendra Singh, Life Fellow, IEEE, Richard R. Brooks, Senior Member, IEEE,
and Kuang-Ching Wang, Member, IEEE

Abstract—A transformation is underway in electric power and


energy systems (EPESs) to provide clean distributed energy for
sustainable global economic growth. Internet of Things (IoT)
is at the forefront of this transformation imparting capabil-
ities, such as real-time monitoring, situational awareness and
intelligence, control, and cyber security to transform the exist-
ing EPES into intelligent cyber-enabled EPES, which is more
efficient, secure, reliable, resilient, and sustainable. Additionally,
digitizing the electric power ecosystem using IoT improves asset
visibility, optimal management of distributed generation, elimi-
nates energy wastage, and create savings. IoT has a significant
impact on EPESs and offers several opportunities for growth and
development. There are several challenges with the deployment of
IoT for EPESs. Viable solutions need to be developed to overcome
these challenges to ensure continued growth of IoT for EPESs.
The advancements in computational intelligence capabilities can
evolve an intelligent IoT system by emulating biological nervous Fig. 1. Major drivers of the transformation in electric power industry.
systems with cognitive computation, streaming and distributed
analytics including at the edge and device levels. This review
paper provides an assessment of the role, impact and challenges
of IoT in transforming EPESs.
Index Terms—Challenges of Internet of Things (IoT), com-
munications, networking, and security for IoT, computational
intelligence, impact of IoT, intelligent power and energy systems,
IoT, sensors and devices for IoT, services and applications for
IoT, smart home, SmartPark.

I. I NTRODUCTION
HILE the last half century was dominated by the com-
W munication revolution, the next several decades will
be dominated by electric power and energy systems (EPESs).
Fig. 2. Continuously reducing costs of crystalline Si PV module and Li-ion
EV battery pack [3].

Since the global economic crisis of 2008, energy has


started to dominate the market landscape [1]. However, the
December 2015 with the adoption of the climate change
emergence of a real transformation in EPESs started in
agreement at the Paris UN Climate Change Conference
Manuscript received October 2, 2017; revised December 8, 2017 (COP21) [2]. The transformation in EPESs emphasizes
and January 10, 2018; accepted February 1, 2018. Date of publication increasing efficiency and improving the reliability of elec-
February 5, 2018; date of current version April 10, 2018. This work tric power network operations, energy conservation, renewable
was supported in part by the U.S. National Science Foundation under
Grant 1312260, Grant 1232070, and Grant 1408141, and in part by the Duke sources of distributed power generation, and reduction of car-
Energy Distinguished Professor Endowment Fund. (Corresponding author: bon emissions [2]. The major drivers of this transformation
Guneet Bedi.) are shown in Fig. 1.
G. Bedi, R. Singh, R. R. Brooks, and K.-C. Wang are with the Real-Time
Power and Intelligent Systems Laboratory, Holcombe Department of Driven by the cost reduction of batteries for electric vehi-
Electrical and Computer Engineering, Clemson University, Clemson, cles (EVs) (Fig. 2) [3], it is expected that in the next 3–4 years,
SC 29634 USA (e-mail: gbedi@clemson.edu; srajend@clemson.edu; the cost of battery storage will be less than hydroelectric
rrb@acm.org; kwang@clemson.edu).
G. K. Venayagamoorthy is with the Real-Time Power and Intelligent storage (∼$100/kWh). Therefore, a major shift toward new
Systems Laboratory, Holcombe Department of Electrical and Computer infrastructure based on photovoltaic (PV) and battery for
Engineering, Clemson University, Clemson, SC 29634 USA, and also with electricity supply has already started.
the School of Engineering, University of KwaZulu–Natal, Durban 4041,
South Africa (e-mail: gkumar@ieee.org). Internet of Things (IoT) imparts networked connectivity to
Digital Object Identifier 10.1109/JIOT.2018.2802704 everyday objects in the physical world. All physical entities on
2327-4662 c 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
848 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

• Discussing the role of IoT in transforming the traditional


electric power networks into intelligent power networks.
• Providing an extensive review of IoT-based EPESs appli-
cations and services.
• Providing a survey and technical assessment of smart
home applications IoT sensors.
• Highlighting the economic, societal, and environmental
impact of IoT in EPESs.
• Providing extensive insights into communications,
networking, and security for IoT-based EPESs.
• Enumerating the constraints associated with IoT deploy-
ment in EPESs and recommending solutions to overcome
them.
The rest of this paper is organized as follows. Section II
provides an assessment of the current state of the electric
Fig. 3. DS-EMS [6].
power network and the importance of IoT in moving toward an
intelligent electric power network. Section III briefly touches
upon the economic, societal, and environmental impacts of
earth (e.g., goods, buildings, appliances, machines, vehicles, IoT enabled electric power networks. Section IV discusses
plants, animals, and human beings) are the “Things” in some of the challenges associated with IoT and lists recom-
IoT [4], [5]. mended solutions in overcoming these challenges. Section V
IoT can transform EPESs by providing a sustainable solu- describes a real-world application example of IoT in EPESs.
tion, viz., a dynamic stochastic energy management system The conclusion of this paper is included in the last section.
(DS-EMS) (Fig. 3), which is both intelligent and cyber-
enabled, to meet the growing demands of access to affordable,
clean, and sustainable energy. The goal of DS-EMS is to
maximize revenue generation, minimize energy costs, and II. ROLE OF I OT FOR I NTELLIGENT
reduce carbon emissions by optimizing the electric power flow E LECTRIC P OWER N ETWORKS
in a way that minimum power is drawn from the power grid EPESs are comprised of generation, transmission and dis-
and maximum power is supplied to the power grid. The depen- tribution (T&D) networks, and their customers (residential,
dence on the power grid for meeting the energy demands commercial, and industrial) (Fig. 5) [9].
of a user can be reduced by employing distributed energy EPESs are currently facing numerous limitations includ-
resources (DERs) including renewable energy resources (e.g., ing balancing the fuel mix, reliability of power delivery
solar and wind) and batteries to meet the bulk of the energy and quality, asset level visibility, identifying new revenue
needs. Once the energy needs are satisfied, any excess gen- sources, aging workforce and knowledge capture, and tech-
eration form these DERs can be supplied to the power grid. nology integration [10]. The fuel mix for power generation
The electric power exchanges to-and-from the grid are done is becoming more diverse and flexible comprising of central-
based on time of use rates. With IoT, EPESs will become ized generation (fossil fuels and nuclear), distributed gener-
more efficient, reliable, secure, cost-effective, resilient, and ation (renewables), and energy storage. Balancing this fuel
sustainable [6]. mix is critical for maximizing cost-effectiveness and energy
IoT also imparts real-time feedback capabilities to the output of the EPES. The diversity of fuel mix coupled with
utilities which function to better serve customers through multiplicity of moving parts with different incentives and
enhanced monitoring and control functionalities [4]. This is priorities increases the energy value chain complexity. This
the reason that utilities are among the largest IoT mar- degrades the reliability and quality of power delivery if left
ket and will be the third-largest industry by expenditure unmonitored. Therefore, it is imperative to have asset level
in IoT products and services, with more than $69 bil- visibility through which system operators can continuously
lion already spent worldwide [7]. The adoption of IoT monitor all EPES assets’ state and performance in real-time
in EPESs is also favored by the significant reduction of to assess demand and supply and their responsiveness to price
costs associated with sensors, bandwidth, processing, and signals. The traditional revenue model for EPES where vol-
memory/storage [8]. umetric tariff was used to compensate utilities is becoming
IoT presents numerous opportunities in EPESs having suboptimal. New revenue sources that correctly value and allo-
a significant societal, economic, and environmental impact, cate investment cost and other efforts need to be identified
eventually moving toward the vision of a smarter cities for future EPESs. Such revenue models will induce play-
and world. ers to add value to EPESs through actions and information
The main contributions of this review paper are as follows provision by adequately compensating investment and incen-
(Fig. 4). tivizing innovative experimentation. Population aging presents
• Highlighting the limitations associated with the current the challenge of skills, knowledge, and experience shortage
EPESs. resulting from prospective simultaneous retirement of a large
BEDI et al.: REVIEW OF IoT IN EPESs 849

Fig. 4. Integration of all the phases presented in this paper.

distribution, and consumption that creates a resilient, reli-


able, safe, and sustainable energy delivery network. It has
self-healing and intelligent measurement and control capa-
bilities. It also imparts real-time power network monitoring
capabilities for better failure prediction/diagnosis to iden-
tify irregularities/weak points in a timely manner [6].” The
intelligent electric power networks have several advantages
including increased energy efficiency, reduced cost, better
Fig. 5. Power and energy system (extended version of [9, Fig. 2.1]). demand supply response, and reduced T&D losses [6], [11].
IoT has been an integral part of the transformation toward
intelligent electric power networks. Examples of IoT tech-
nologies that are currently employed in intelligent electric
number of experienced workers. Digital innovations (collab- power networks include advanced metering infrastructure and
oration, communication, and digital memory creation) are supervisory control and data acquisition [12], [13]. There are
needed to capture the knowledge and experience of the senior several benefits of deploying IoT in intelligent electric power
workers, incorporate it in the companies’ institutional memory, networks.
and make it accessible to the new workforce. With the advent • Enhanced reliability, resiliency, adaptability, and energy
of IoT, smart machines, and big data, the traditionally separate efficiency [6].
information technology (IT) and operations technology (OT) • Reduced number of communication protocols [14]–[16].
now need to be integrated to develop a new information-driven • Networked operation and enhanced information operation
infrastructure for enhancing productivity using data. capabilities [17].
To overcome these challenges, existing unidirectional • Improved control over home appliances [18].
EPESs are transforming into bidirectional intelligent elec- • Enable on-demand information access and end-to-end
tric power networks. “The intelligent power network is an service provisioning [18].
automated, flexible, intelligent, robust, and consumer-centric • Improved sensing capabilities [19].
network that supports bidirectional flow of electricity and data. • Enhanced scalability and interoperability [20].
Energy storage plays a key-role in making bidirectional power • Reduced damages from natural disasters [21].
flow feasible enabling active customer participation in sell- • Reduced physical attacks (e.g., substation break-ins [22])
ing/buying power. Intelligent power network is the integration on EPESs by continuously monitoring the electric power
of cyber-secure technologies, intelligent device communi- network’s physical assets in real-time.
cations, and high-penetration distributed energy generation Realizing the full potential of IoT is critical to enhance
across all elements of electricity generation, transmission, the flexibility, asset management, operations, and reliability of
850 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

intelligent electric power networks. To enhance the resiliency


of electric power networks, it is essential to account for fluc-
tuations introduced by decentralized generation from DERs
integration [23]. Smart inverters are a potential IoT solution to
overcome this challenge. To enhance the enablement of elec-
tric power networks, IoT devices and technologies such as
advanced distribution management system (ADMS) collect,
analyze, and disseminate data to all electric power network
stakeholders (e.g., customers, utilities, and regulators). Insights
gained from these data enable stakeholders to make more
informed optimization decisions, resulting in efficient utiliza-
tion of electric power network resources and more efficient
network operations [13].
The benefits associated with digitizing intelligent elec- Fig. 6. Smart home with intelligent loads [27].
tric power networks across generation, T&D networks, and
consumption with IoT are discussed below.
challenges. IoT imparts intelligent monitoring and control
A. Digitizing Electric Power Generation capabilities to existing electric power T&D networks, which
DER generation will dominate the new electric power enable T&D operators to proactively respond to power out-
generation infrastructure. IoT can improve DER generation ages, address customer concerns, and better account for DER
efficiency and therefore must be deployed across all power integration. Additionally, IoT can help reduce power losses
generation phases, viz., power plant portfolio design, sit- and data thefts during transmission and distribution by adjust-
ing, operations, maintenance, and optimization. Additionally, ing electrical parameters (voltage, current, power, and phase)
deploying IoT in power generation guarantees reliable, afford- in real-time and by tracking the source of theft, respectively.
able, and safe access to power [10]. Electric power T&D networks can more efficiently and reli-
For optimal balancing of the generation portfolio of power ably ensure optimal power delivery with IoT. Examples of
plants and intelligent EPES operation, it is important to col- IoT devices and technologies in electric power T&D networks
lect data in real-time from both transmission and distribution include smart meters, smart inverters, ADMS, and distribution
electric power network assets. This subsequently needs to be electric power network sensors [10].
analyzed to perform load forecasts, state predictions and dis-
tributed control of the EPES [10]. This data can be collected C. Digitizing Electric Power Consumption
using IoT devices, such as smart meters, intelligent feeders,
IoT devices and technologies (e.g., IoT sensors) are the
micro phasor measurement units (PMUs), and PMUs [24].
key drivers contributing to the growth of microgrids/nanogrids,
The location of power plants is especially important for
smart homes with intelligent loads (IoT enabled loads), elec-
renewable power plants, where power generation output can
tric transportation, and distributed energy storage systems. As
fluctuate depending on parameters such as clouds related
a result of this growth, customer roles are evolving. Customers
solar intensity fluctuations (for solar power plants) and wind
are now able to generate power locally from renewable sources
patterns (for wind power plants). IoT software solutions
to meet their needs and can participate in power exchanges
to account for such fluctuations include cloud computation,
with the electric power network. Intelligent loads utilize IoT
advanced load, and weather simulation algorithms. IoT hard-
sensors to provide customers with meaningful power genera-
ware solutions include trackers, modular turbines, and power
tion and usage data that helps them utilize power more effi-
storage [10].
ciently, reduce power wastage, and control costs. Distributed
IoT technologies use cloud-based advanced analytics as
energy storage systems are advantageous over centralized
well as a holistic IT and OT perspective to provide real-time
storage systems in terms of having greater flexibility, better
insights into power plant operations, thereby improving visibil-
control, scalability, and enhanced reliability [26]. Distributed
ity across all power plant asset. This helps in ensuring optimal
energy storage systems, such as battery and EVs, are criti-
power plant operations, sustainable generation portfolios, and
cal to account for any fluctuations in power generation from
predictive/timely maintenance [10]. An example of digitized
renewable sources. If the generation falls below the demand,
power generation is the digital twin/virtual power plant, devel-
battery/EV can supplement the shortage. Alternatively, excess
oped by General Electric (GE) using Predix—a cloud-based
generation from renewable sources can be stored in battery/EV
IoT platform [25].
or it can be supplied to the electric power network. Examples
of scenarios where customers are able to participate in power
B. Digitizing Electric Power T&D Network exchanges with the electric power network include smart
Existing electric power T&D network faces a number of home environment (Fig. 6) [27] and SmartParks (Fig. 7) [28].
challenges including delayed outage response times, power Innovative pricing schemes [29] and strategic business models
losses, data thefts, and DER integration. Digitizing the exist- need to be implemented by the utilities to extract maximum
ing electric power T&D network with IoT can alleviate these benefit from these scenarios [6], [10].
BEDI et al.: REVIEW OF IoT IN EPESs 851

detect unexpected movements in the house, monitor pets


and kids to ensure they stay away from “off-limit” areas,
and detect the presence or absence of people in a partic-
ular area and control the lights to turn on/off accord-
ingly [36], [38]. Examples of motion sensors include
passive infrared sensors, microwave sensors, ultrasonic
sensors, area reflective sensors, dual sensors, video sen-
sors, wireless sensors, vibration sensors, and pet immune
sensors [39].
• Open/Close Sensors: These sensors monitor the opening
or closing of cabinets, doors, and windows. Open/close
Fig. 7. SmartParks connected to the electric power network [28]. sensors can also automatically turn on the lights when
a door is opened [36], [38]. Examples of open/close sen-
sors include glassbreak sensors, passive infrared sensors,
and door and window sensors [39], [40].
• Perimeter Sensors: These sensors provide the extra layer
of security by detecting any vehicles or persons approach-
ing the house [36], [38]. Examples of perimeter sen-
sors include active infrared sensors, capacitance sensors,
vibration sensors, radar sensors, fence sensors, driveway
sensors, and electric field sensors [40].
b) IoT smart home environmental sensors: The home-
owners can create a comfortable living environment inside
the house with IoT smart home environment sensors [36].
Fig. 8. Smart home environment (extended version of [65, Fig. 1]). IoT smart home environmental sensors include temperature
and humidity sensors, leak and water sensors, smoke and air
sensors, and light sensors [38].
1) Smart Home Environment: A smart home environment • Temperature and Humidity Sensors: These sensors mon-
(Fig. 8) is comprised of a number of IoT sensors and actuators itor unexpected changes in heating, cooling, and the
(e.g., pressure sensor, lighting sensor, motion sensor, tempera- amount of water vapor inside the house. Temperature
ture sensor, and humidity sensor); a computational system that and humidity sensors also reduce energy waste by turn-
includes wireless communication technologies (e.g., ZigBee, ing off the cooling or heating in an area where there
Bluetooth, Wi-Fi, and IPv6), control systems (e.g., remote con- is no person present [36]. Examples of temperature sen-
trol, smartphone, and tablet), and computation system; and sors include resistive temperature devices, thermometers,
visualizations (both remote and in-house). This imparts sense- thermocouples, infrared sensors, bimetallic devices, sili-
making, decision-making, and adaptation capabilities to differ- con diode, and change-of-state sensors [41]. Examples of
ent home appliances present in the smart home [30]. The key humidity sensors include resistive sensors and capacitive
enablers of smart home power system include advanced IoT sensors [42].
sensor technology, better wireless connectivity, smaller device • Leak and Water Sensors: These sensors alert the home-
size, cheaper price, high volume manufacturing, enhanced owners as soon as a leak is detected, thereby helping to
computing capabilities, and improved control systems. prevent damaging floods that can be costly to repair [36].
IoT sensors offer several benefits when deployed in a smart Examples of leak and water sensors include under carpet
home environment. They help minimize energy wastage, leak detectors, rope-style sensors, spot leak detectors, and
reduce costs, actively monitor home environment, reduces hydroscopic tape-based sensors [43].
the risk to harmful environmental exposures such as carbon • Smoke and Air Sensors: These sensors monitor the air
monoxide and smoke, and make home life more convenient quality inside the house. With smoke and air sensors, the
and comfortable [31]–[34]. The different types of IoT sensors homeowners can detect the presence of smoke, carbon
are listed below: monoxide, or any other harmful gas in the house [36].
a) IoT smart home occupancy sensors: With IoT smart This would in turn help the homeowners to take cor-
home occupancy sensors, the homeowners can monitor all rective measures before any serious harm happens to
movements in and around the house, thereby helping to pro- anyone residing in the house. Examples of smoke and air
tect the house from criminals and vandals. These sensors also sensors include photoelectric sensors, ionization sensors,
reduce energy waste by controlling lighting in an area depen- dual sensors, aspirating sensors, projected beam sensors,
dent on its occupancy. The different types of IoT smart home video sensors, and heat sensors [44].
occupancy sensors include motion sensors, open/close sensors, • Light Sensors: These sensors monitor the lighting lev-
and perimeter sensors [36]–[38]. els inside the house. Light sensors automatically adjust
• Motion Sensors: These sensors monitor movements inside the lighting inside the house depending on the ambi-
the house. With motion sensors, the homeowners can ent natural lighting from the sun [36]. This helps
852 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

Fig. 9. Different types of IoT sensors, with their leading suppliers, which are currently on the market for smart home electric energy usage management.

enhance the lifetime of the light bulbs and reduce affordable way to monitor and stay connected to their
energy wastage. Examples of light sensors include house from anywhere and at all times. Further, the func-
photo-junction sensors, photoconductive sensors, and tionality of these kits can be enhanced by connecting
PV sensors [45]. other compatible peripherals (cameras, alarms, and other
c) IoT smart home power monitors: IoT smart home IoT sensors).
power monitors keep track of the amount of energy used by Fig. 9 shows different types of IoT sensors with their leading
each home appliance or any other device inside the house [36]. suppliers, which are currently on the market for smart home
Using these power monitors, the homeowners can be more applications [36], [37]. A technical assessment of IoT sensors
conscious of their energy usage, adjust their energy usage for smart home environment is provided below.
behaviors to cut down costs and reduce energy wastage, and Technology nodes for IoT ICs: IoT integrated circuits (ICs)
ensure that all home appliances and other devices operate for smart home power systems include IoT sensors, analog to
efficiently and not consume too much power. There are four digital converters, digital processing, and radio frequency (RF)
types of power monitors including readout and history moni- network connection. Currently, these ICs employ the 45/65-
tors (e.g., Wattvision power monitor), instant readout monitors nm node (node 3). In the next five years, it is estimated
(e.g., Blue Line PowerCost monitor), plug in monitors (e.g., that the technology nodes for IoT ICs will vary depend-
Kill a Watt EZ electricity monitor), and circuit by circuit ing on low, medium, or high-end smart home power system
measurement monitors with both history tracking and instant applications [47].
readout capabilities (e.g., eMonitor) [46]. Minimizing cost and power consumption are at the fore-
d) Other IoT smart home sensors: Some of the other IoT front in designing IoT ICs for low-end smart home power
smart home sensors that are currently on market and have not system applications (e.g., connected LED lighting, security
been listed above include the following [36], [37]. sensors, and connected smoke detectors). These ICs will
• Dry Contact Sensors: Detect contact between two wired employ the 55/40-nm ultralow power and leakage technology
contact points. node with the microcontroller (MCU) power of ∼50 dhrystone
• Smart Plugs: Enable homeowners to turn on/off the home million instructions per second (DMIPs). Additional techno-
appliances or other home devices remotely using their logical features for these applications will include integrated
smartphones. security features, eFlash or magnetoresistive random-access
• Current Transformers: Monitor the electricity flow inside memory, power management unit, and integrated radios based
the house. on Bluetooth low energy (BLE) and low-rate wireless personal
• AC/DC Voltage Sensors: Determine the powered state of area networks (802.15.4) [47].
equipment and alert the homeowners if voltage levels Minimizing dynamic power while maximizing battery life
exceed the device ratings. is a key concept in designing IoT ICs for mid-end smart home
• Power Synching Sensors: Create customized triggers in power system applications (e.g., smart meters). These ICs will
response to changing state of the plugged-in device (e.g., employ the 40-, 28-, and 22-nm technology nodes with the
the homeowner can have the TV set the lighting level in MCU power of ∼300 DMIPs. Additional technological fea-
the room when turned on). tures for these applications will include several wireless low
• Smart Home Monitoring Kits: IoT smart home mon- power wide area network (WAN) protocols including LPWAN,
itoring kits are made by incorporating some of the BLE/802.15.4, and Wi-Fi; wired communication protocols
above-mentioned IoT sensors in a single package. These including power line communication (PLC), and Ethernet; and
kits provide the homeowners with a more advanced and more integrated security features [47].
BEDI et al.: REVIEW OF IoT IN EPESs 853

Similarly, minimizing dynamic power while maximizing discontinuous reception, and fully depleted silicon on insu-
battery life is also a key concept in designing IoT ICs for lator), standards (e.g., Unified Power Format 3.0 (IEEE
high-end smart home power system applications (e.g., learn- Standard 1801-2015) [49]), softwares (e.g., dynamic voltage
ing thermostats and home monitoring/security cameras). These and frequency scaling, power and voltage islands, and clock
ICs will employ the 22-, 14-, and 7-nm technology nodes with frequency adjustment based on the chip load), and energy
the MCU power of ∼2000 DMIPs. Additional technological harvesting solutions (e.g., light, heat, RF, and vibration) [50].
features for these applications will include strongest security IoT sensor interoperability and form-factor: Interoperability
features, human–machine interface with high-resolution graph- is essential to integrate multiple IoT sensors in a smart
ics and displays, and wireless connectivity including BLE, home environment and to ensure their seamless opera-
Wi-Fi, and cellular [47]. tion. Developing comprehensive standards is critical to
IoT sensor design, modeling, and testing technologies: In achieve interoperability to increase the penetration of
the past, sensors were designed by considering the electrical IoT sensors in smart home power systems. 5G is one
and physical boundaries as separate entities. Today, IoT sen- such comprehensive standard (currently under develop-
sors have integrated the electrical and the physical boundaries ment) for improving communication efficiency, reduc-
and are therefore designed using co-design methodolo- ing costs, increasing network bandwidths, and extending
gies, co-optimization techniques, and multidomain [micro- coverage [47].
electromechanical system (MEMS), digital, analog, and RF] IoT devices are application-centric, i.e., if built for one
analysis [47]. application, they cannot be used for any other application. For
Standardized MEMS models based on finite element anal- example, one cannot use the IoT devices built for smart homes
ysis are available for modeling IoT sensors. These models with other commercial, industrial, or medical applications. The
employ reduced-order modeling and can be used to simulate IoT devices differ from one application to another regarding
IoT sensors at the system-level [47]. power requirements, form-factor levels, and the user-interface
IoT sensors undergo complicated test cycles using various designs; however, the underlying component technologies and
test equipment to ensure their adequate performance under IoT sensors may be the same. A generalized device design (one
different operating conditions. Increasing the number of test device for different applications) is avoided as it introduces
cycles and amount of equipment lead to better test results, but suboptimality [47].
it also increases the test time and cost. IEEE 1687 IP plug-and- 2) Electric Transportation and SmartPark: Electric trans-
play standard minimizes test times through quick mapping of portation is becoming an essential part of the global automo-
vendor-provided operational and initialization data to the IoT tive industry providing environmental, economic, and energy
sensor [48]. It is necessary to test IoT sensor performance security benefits. Governments around the world are urging the
at near-threshold or subthreshold voltage levels to account automobile manufacturers to develop more EVs and are pro-
for process variations and nonlinear transistor characteristics. viding incentives to the citizens for buying the EVs. Navigant
However, the subthreshold voltage level tests may result in Research has estimated the global light duty EV market to
the sensor operation overshooting the process corners. One increase from 2.7 million vehicle sales in 2014 to 6.4 million
way to prevent this overshooting is by “over-designing” the in 2023 [51]. Integrating EVs into the electric utility grid facil-
IoT sensor with a very conservative design sign-off criteria. itates both vehicle-to-grid (V2G) and grid-to-vehicle applica-
Alternatively, higher levels of manufacturing tests must be tions owing to the bidirectional nature of the power flows
performed on the IoT sensor that would further increase the between the EVs and the grid [52]. Several electric grid ser-
cost [47]. vices can be availed from EVs including regulation, spinning
IoT sensor reliability and power requirement: A few ways reserve, load leveling, storage for renewable sources, demand-
to improve the IoT sensor reliability include lowering current response, and revenue generation through power transactions
densities and operating the IoT sensor at cooler temperatures. with the electric utility grid (e.g., SmartParks). There are also
Improved IoT sensor reliability comes with an additional cost. a few associated challenges with integrating EVs into the elec-
The product life-cycle is directly proportional to and is an tric utility grid, such as variable prices of power transactions
excellent measure of IoT sensor reliability. Consumer wear- at different times and large power swings. Intelligent schedul-
ables and smartphones require very short product life-cycles ing is required for the charging and discharging of EVs to
(around 1–3 years). The IoT sensors for such applications overcome these challenges [28], [53].
are cheaper and less reliable. Other consumer applications A SmartPark is made up of a fleet of plug-in (grid-
including smart appliances in smart home power systems able) vehicles (plug-in hybrid EVs and EVs) performing
require longer product life-cycles (around 3–5 years). The V2G power transactions. Fig. 7 shows two SmartParks con-
IoT sensors for such applications are slightly expensive and nected to the utility grid through a step-up transformer. Each
more reliable. Industrial applications including infrastructure SmartPark can have hundreds of vehicles that can partici-
(bridges, buildings, and pipelines) monitoring require much pate in power transactions with the grid. SmartParks provide
longer product life-cycles (around 10–20 years). The IoT several grid services including load-peak shaving, maximum
sensors for such applications are very expensive and most utilization of renewable sources of energy, minimizing cost
reliable [47]. of energy, and reducing emissions. Major challenges asso-
To improve power consumption efficiency, IoT sen- ciated with numerous distributed SmartParks include grid
sors employ many technologies (e.g., power-save mode, stability and cyber-security. To overcome these challenges,
854 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

in existing devices and infrastructures, further minimizing


expenses.
Currently, there are some barriers to the market entry of IoT
devices and technologies including connectivity, cyber secu-
rity, big data handling, individual privacy, sustainable low cost
power resources, and sensors that are inexpensive, efficient,
and reliable [6]. Viable solutions are needed to overcome these
barriers to ensure the continued growth of IoT for EPESs.

B. Environmental Impact of IoT on Electric Power and


Energy Systems
Fig. 10. Global IoT sensor market forecast ($ billion) (adapted from [58]). With IoT deployed in EPESs, power is utilized more
efficiently. Also, control systems are optimized for maxi-
mum power absorption from renewable sources (solar and
intelligent computing in conjunction with advanced control wind) [5]. This has a positive impact on the environment in
and protection is needed [28]. terms of less energy waste and reduced carbon dioxide (CO2 )
emissions [60]. By 2020, 2-gigaton annual decrease in CO2
emissions is expected [61].
III. I MPACT OF I OT ON E LECTRIC
P OWER AND E NERGY S YSTEMS
In this section, economic, environmental, and societal C. Societal Impact of IoT on Electric Power and
impact of IoT on EPESs is discussed. Energy Systems
As world’s population continues to grow, it becomes
A. Economic Impact of IoT on Electric Power and increasingly necessary for its inhabitants to care for the avail-
Energy Systems able resources. With rising living standards globally, health,
McKinsey Global Institute has estimated that by 2025, the convenience, and comfort have become personal priorities. IoT
economic impact of IoT for energy and power systems will can meet all of these needs and desires through its abilities to
be in the range of $200 billion to $500 billion [54]. Cisco sense, collect, transmit, analyze, and distribute big data.
Systems, Inc., has estimated that between 2013 and 2022, To meet these demands, organizations and institutions will
the net profit accrued from IoT deployment in EPESs will deploy IoT EPESs, leading to increased energy efficiency and
be $757 billion [55]. GE has estimated significant revenue greater control and auditing capabilities. With greater amounts
gains from digitization of EPESs: $230 million from new com- of personal data collected from smart meters to decrease
bined cycle gas plants, $100 million from new wind farms, energy waste (e.g., energy usage data and user movements
and $50 million from existing combined cycle gas plants [10]. and activities tracking data), personal security could be jeop-
Frost & Sullivan reported that approximately 37 million smart ardized if the meter is hacked. For instance, a hacker could
meters were shipped in the United States between 2011 and determine if a user is home or not or if a child at home alone.
2014 [56]. While there are cyber-security and privacy risks associ-
The market for IoT sensors for EPESs is undergoing a favor- ated with IoT deployment in EPESs, there are overwhelming
able progression as well and offers numerous opportunities societal benefits including lifestyle convenience, public safety,
for growth and development. Driven by reduction in cost and energy conservation, expense reduction, and a healthy living
energy per sensor, IoT sensors are now becoming more popular environment [62]. Individuals and corporations must decide
for industrial and consumer applications [57]. Transparency the optimal use of the technology for their needs based on
Market Research has estimated the increase in global market these tradeoffs [6], [63].
for IoT sensors from $9 billion in 2012 up to $21.60 billion IoT deployment cannot be pushed onto the society and
by 2019, growing at a compound annual growth rate of 12.2% expected to be readily accepted. People like to take responsi-
(Fig. 10) [58]. bility for their well-being. Considering the numerous benefits
ABI Research has estimated an increase in the market value of the deployment of IoT technology, a lot of people might be
of enterprise IoT analytics from $4.2 billion in 2014 to $23 bil- willing to try it out. But there will be some people who will
lion by 2020, indicating the increasing investment in IoT resist this technology, even after being aware of its benefits.
analytics [59]. For them, IoT technology might not be the need of the hour, or
While there are considerable opportunities for increased they might just fear the unknown. Additionally, the competi-
revenue in EPESs, these impressive statistics must be bal- tion between nations to excel at IoT device manufacturing and
anced with the costly investments companies must make technology development makes it difficult for a company to
upfront when employing novel IoT devices and technologies. establish a base in a foreign country and utilize its resources.
Nevertheless, the surplus generated will outweigh the ini- An instance of this was reported recently in [64] where GE
tial expenses. Additionally, IoT technologies can be deployed launched its digital foundry in Shanghai and is facing tough
BEDI et al.: REVIEW OF IoT IN EPESs 855

• Developing smart control algorithms to improve IoT


sensors power, fault tolerance, and bandwidth [69].
• Employing fuzzy logic and statistical outlier detection
algorithm (e.g., FindCBLOF) to better detect abnormal
sensor events [70], [71].
• Integrating robust communication technologies (e.g.,
PLC) with IoT sensor networks to resolve communica-
tion network issues (wireless interferences, packet losses,
and transmission errors) [72].
• Using service-based proxy frameworks to resolve
interoperability challenges between IoT sensors and het-
Fig. 11. Technological innovations for intelligent cyber-secured electric erogeneous devices [73].
power networks [4]. • Integrating gesture recognition and brain–computer
interface with IoT sensors to better monitor the physically
impaired and elderly [74], [75].
competition from the Chinese local firms. In any case, peo- • Implementing energy harvesting technologies in IoT sen-
ple’s choices must be respected, and they should not be forced sors to do away with batteries [76].
down a path that makes them uncomfortable. • Reducing the complexity of programming platforms for
IoT sensor network to enable average users program them
IV. C ONSTRAINTS FOR D EPLOYMENT OF I OT IN as required [77].
E LECTRIC P OWER AND E NERGY S YSTEMS • Employing aggregation-based data privacy preserving
protocols to secure the IoT sensor data [78].
Deploying IoT in EPESs has several advantages, but some
• Using context-aware computing to better understand the
associated challenges exist. These challenges include sens-
IoT sensor data [79].
ing, connectivity, power management, big data, computation,
• Virtualizing the IoT sensor infrastructure and making it
complexity, and security [4]. Technological innovations are
available for use by multiple applications [80].
necessary to overcome these challenges and achieve the
• Analysis of privacy and cyber security risks in IoT
vision of an intelligent cyber-secured electric power network
devices and softwares for smart home automation
(Fig. 11).
system [81], [82].
• Advancements in detection technologies to counter cyber
A. Sensing Challenges and Recommended Solutions attacks [82], [83].
Advancements in sensor technology have resulted in IoT
sensors becoming more powerful, cheaper and smaller in size.
This, in turn, has led to their large scale deployment in EPESs. B. Connectivity Challenges and Recommended Solutions
IoT sensors currently on the market lack some critical features 1) Need for Comprehensive Connectivity Standards
viz., situational intelligence, efficient power management, and for IoT: There are many connectivity standards for IoT
enhanced cyber security, which must be incorporated into applications that can broadly be classified into three cate-
future IoT sensors to enhance their functionalities [23]. gories: 1) service-related; 2) communications-related; and
Near-future situational intelligence can be implemented 3) data-related [84]. The service-related connectivity standards
by integrating historical IoT sensor data with IoT sen- provide definitions for common services to support IoT appli-
sor data obtained in real time. Benefits of implementing cations. They provide definitions for common capabilities,
near-future situational intelligence in IoT sensors include their respective access interfaces, and the protocols employed
security and stability limit prediction with contingency anal- over these interfaces in a manner that enables different
ysis, load and generation forecasting, cyber security, and IoT applications to gain access to these capabilities across
real-time/predictive visualizations [65]. For efficient power protocol stacks developed by different standard organizations
management, solutions include using arrays of low-accuracy (e.g., International Telecommunication Union [85], European
sensor modules with subsequent data fusion to generate high- Telecommunication Standards Institute [86], oneM2M [87]).
accuracy information, employing energy harvesting solutions Additionally, the service-related connectivity standards
(e.g., light, heat, RF, and vibration) to prolong battery life develop access-independent interface standards (e.g., [88]
(discussed in Section IV-C below), and using digital circuits by Telecommunications Industry Association), addresses
to design low power sensor nodes [19]. carrier portability matters (e.g., [89] by ATIS), and network
Cyber security solutions include embedding hardware secu- security concerns (e.g., [89] by ATIS) for IoT applications.
rity features, adding more layers of security, and advanced The communications-related connectivity standards provide
virtualization, which are discussed in detail in Section IV-G definitions for efficient communication mechanisms for sup-
below [66]–[68]. porting IoT applications. They provide application guidelines
The various ongoing research initiatives directed toward to fit the operation of particular standards, like transport
improving the existing IoT sensor functionality include the layer security (TLS), in an IoT setting [e.g., [90] and [91] by
following. Internet Engineering Task Force (IETF)]. They also define
856 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

additional protocols, like RPL (pronounced “ripple”) routing


protocol for 6LowPAN, to fill gaps in the protocol solution
set for IoT (e.g., [92] by IETF). They also provide support for
multiple vertical application domains (e.g., [93] by the IEEE).
The data-related connectivity standards provide definitions for
generic mechanisms for supporting versatile data usage and
interoperable data exchange in IoT applications. They provide (b)
technology-independent interfaces for generic data definition
and access (e.g., [94] by Open Geospatial Consortium
and [95] by Object Management Group). Additionally, they
provide flexible mechanisms for defining object identity
information and exchanging this information with other
administrative domains (e.g., [84], and [96] and [97] by
OASIS).
Interoperability between all the different standards avail- (a) (c)
able for IoT applications is critical to support the integration Fig. 12. (a) Application of wireless convergence module in a home automa-
of different types of data generated from a variety of sources. tion scenario [4]. Redpine RS9113 module (b) with built-in antenna [100] and
Interoperability enables the IoT devices to support the cura- (c) without built-in antenna [100].
tion, provenance and exposure of data to third party applica-
tions enabling rapid innovations in the application and service
ecosystems [84], [98]. sharing [103]. The fair channel assignment approaches ensure
Without interoperability, there will be challenges with fair allocation of radio resources to links or flows to achieve
data representation formats, data dissemination mechanisms, seamless transmission [102]. The dynamic licensed spectrum
and data management platforms. For EPESs, the diverse phys- sharing approaches allow mobile operators to make use of
ical and virtual assets can no longer remain disparate entities. underutilized licensed spectrum bands based on service level
They must be interoperable entities across IoT applications. agreements [103].
These challenges along with the continuously increasing num-
ber of IoT devices demand the development and implemen- C. Power Management Challenges and
tation of comprehensive connectivity standards that will be Recommended Solutions
critical in achieving interoperability and seamless transitions Incorporating power management is critical for an IoT
between the physical and virtual domains of IoT [84], [98]. device to perform its designated functions. Based on the
With the emerging 5G cellular communication standard, position and functionality of IoT devices in EPESs, their
low-cost and efficient communication with increased network power collection methods vary. This makes it challenging to
coverage and bandwidths are expected to support a sheer scale incorporate power management in IoT devices.
of IoT devices, the continuously increasing multimedia appli- The recommended solutions to overcome the power man-
cations, and an exponential increase in wireless data [99]. agement challenge in IoT devices are discussed below.
2) Coexistence Challenge and Recommended Solutions: 1) Energy Harvesting System: IoT devices in EPESs may
IoT applications in EPESs utilize several connectivity pro- be installed in locations that are not easily accessible (haz-
tocols (e.g., Wi-Fi, Bluetooth, ZigBee, and BLE) for ardous, toxic, or hard-to-reach areas) making grid connection
data transmission [100], [101]. Such heterogeneous connec- or battery replacement a complex and expensive approach to
tivity scenarios are faced with the coexistence challenge— power these devices. In such scenarios, an energy harvesting
interferences resulting from interaction between wireless con- system can be a promising alternative to prolong the lifetime
nectivity protocols that share the same (2.4 GHz) frequency of the IoT device and reduce their dependency on the grid or
band. These interferences significantly degrade the network’s battery [104].
quality of service [100]. The energy harvesting system comprises of three com-
A solution for overcoming the coexistence challenges is ponents: 1) energy source; 2) harvesting architecture; and
with wireless convergence modules since they can handle 3) load (sink for the harvested energy) [105]. An energy source
multiple connectivity protocols simultaneously using advanced is the source of energy to be harvested. The energy sources
coexistence algorithms. Fig. 12(a) shows a home automa- that are present in the surrounding environment are called
tion scenario where the wireless convergence module han- ambient energy sources, for example solar, wind and vibra-
dles different connectivity protocols, enabling data transfer tions. Energy may also be harvested using body movements
between IoT sensors and the cloud. An example of a wire- of humans and is called human power. Human power can
less convergence module is Redpine RS9113, which sup- be active or passive depending on whether the body move-
ports the heterogeneous connectivity scenarios of IoT and ments are controllable by the user or not. Examples of active
addresses coexistence challenges through its innovative coex- human power include finger motions and footfalls; and exam-
istence algorithms [Fig. 12(b) and (c)] [100]. Other solu- ples of passive human power include exhalation, breathing,
tions for overcoming the coexistence challenge include fair and blood pressure. In general, energy sources can either be
channel assignment [102] and dynamic licensed spectrum controllable or noncontrollable. Controllable energy sources
BEDI et al.: REVIEW OF IoT IN EPESs 857

can be harvested as needed. There is no need to predict to be developed to overcome this issue. Energy-efficient com-
energy availability before harvesting them. Examples of con- munication networks for EPESs can be achieved by incorpo-
trollable energy sources include finger motions and footfalls. rating power management in both peripheral (e.g., IoT sensor
Noncontrollable energy sources must be harvested whenever nodes and smartphones) and access (e.g., base stations (BSs),
they are available. Prediction models are needed for noncon- switches, and routers) network equipment of the communi-
trollable energy sources to forecast their availability to plan cation network. This section discusses the energy-efficient
the next recharge cycle. Examples of noncontrollable energy communication techniques for wireless, wired, optical, and
sources include (solar, wind, and vibrations) [105]. Out of optical-wireless communication networks [108].
all the different energy sources, solar energy emerges as the a) Energy-efficient wireless communication networks:
most promising harvestable energy source due to the following Applications of wireless communication networks in EPESs
reasons [104]. include meter data collection, demand management, substa-
• Solar energy is freely available and easily accessible tion monitoring and protection, and power line monitoring
energy source. and protection. Cellular networks including 3G, 4G, 5G (yet
• The amount of energy harvested from solar is to be launched), WiMAX, ZigBee, and Wi-Fi are utilized
24 mW/cm2. in wireless communication. The metric for energy efficiency
• It is uncontrollable but predictable. in wireless networks is “bits-per-joule” and is a measure of
• Solar panels can be made small enough to fit the form throughput with regards to unit energy consumption [108].
factor of wireless IoT sensor nodes. The following power management solutions can be incor-
A harvesting architecture is a mechanism to collect and porated in wireless communication networks to make them
convert ambient energy to electrical energy. It either harvests energy-efficient.
the source energy for just-in-time use (harvest-use architec- • Employing the relaying technique using mobile relays
ture) or stores the harvested source energy for future use between IoT entities that are geographically spread
(harvest-store-use architecture). The energy conversion mech- (WANs), resulting in shorter transmission range requiring
anism in the energy harvesting architecture depends on the low transmission power [109], [110].
energy source being harvested. For example, solar panels are • Using the cooperative communication technique for IoT
used to convert solar energy into electrical energy; piezoelec- entities that have different channel conditions (channel
tric elements are used to convert mechanical energy sources diversity) [109].
such as walking, paddling, pushing buttons/keys, into electri- • Placing the BS in sleep mode during low traffic vol-
cal energy; and rotors and turbines are used to convert wind ume since they account for 60–80% of the whole power
energy into electrical energy [105]. consumption in a wireless network [111], [112].
Employing energy harvesting systems exclusively to power • Using the coordinated multipoint technology for WAN
IoT devices that have low-energy requirements can make applications, where the function of the BS is sepa-
these devices truly portable and self-sustaining in addition rated into baseband unit and remote radio unit parts.
to helping reduce the carbon footprint [104], [105]. Studies By doing so, the distance between the user and anten-
have shown that an energy harvesting system has the poten- nas decreases, resulting in reduced system transmission
tial to prolong the lifetime of low-power IoT sensor nodes power consumption [113].
when deployed in randomly distributed multihop topology and • Adoption of the power saving mode by IEEE 802.11 stan-
uniformly distributed ring topology [106]. Although energy dards that allow the wireless nodes to go into sleep mode
harvesting systems offer promising benefits, they also have when they are neither receiving nor transmitting [114].
the following associated drawbacks [104]. • Employing networks like ZigBee [115] and ultralow
• The random and intermittent nature of the renewable power Wi-Fi [15], which are inherently energy efficient,
sources of energy (e.g., solar and wind) for energy har- for home area network.
vesting systems makes it challenging to provide a stable • Connecting IoT devices in mesh topology to improve
power source to the IoT devices. power efficiency and communication capability [116].
• RF Energy harvesting systems have very low efficiencies • Using RF energy harvesting to power the wireless com-
(around 16.3% [107]). munication networks [117].
Therefore, there is a need to overcome these drawbacks for • Deploying turbo codes in energy-constrained wireless
successful deployment of ambient energy harvesting solutions communication applications can help decrease RF band-
to power the IoT devices. A solution to account for the inter- width requirements and/or increase information bit rates
mittent nature of renewable sources of energy is to employ significantly, without having to increase the transmission
storage technologies (e.g., NiMH batteries, Li-ion batteries, energy consumption [118].
and supercapacitors) to store the harvested energy [105]. b) Energy-efficient wired communication networks:
2) Energy-Efficient Communication Networks: Energy con- Applications of wired communication networks in EPESs
sumption in communication networks is increasing at include load control and remote metering. PLC and
a tremendous rate, which is attributed to the rapid rise in the energy efficient Ethernet (EEE) are utilized in wired
number of IoT devices with networking capabilities and the communication [108]. The following power management solu-
progressive growth of information and communication tech- tions can be incorporated in wired communication networks
nology. Therefore, effective power management solutions need to make them energy-efficient.
858 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

• Incorporating spectrum sensing scheme in PLC to reduce challenging to process big data using traditional data process-
its power consumption [119], [120]. ing applications due to the following unique characteristics
• Incorporating green resource allocation scheme in that are associated with big data [137].
PLC that optimizes data allocation to the available • Large volume/quantity of generated data.
channels [121]. • Variety in the type of generated data.
• Adoption of the power saving mode by HomePlug • Different velocity/speed of data generation.
Alliance (PLC standard for smart grid applications) • Variation in the veracity/quality of source data.
within its Green PHY 1.1 definition [122]. • Data inconsistency/variability.
• Employing low-power cycles in EEE with periodic Big data must be transformed to actionable/intelligent infor-
refresh intervals to maintain the transmitter-receiver mation, knowledge, and understanding to extract value from it.
alignment and save energy [123]. Understanding is a process by which individuals attach mean-
c) Energy-efficient optical communication networks: An ing to an experience. Understanding of what matters must
application of optical communication networks in EPESs is be a priority, especially for critical operations. Additionally,
the information flow between independent system operators understanding must be gained from a shared view due to the
in distant regions. Fiber optical communication networks offer interconnected (spatial and temporal) nature of the electric
several advantages including high speed, large bandwidth, and power grid dynamics [65].
a high degree of reliability. These networks follow a hier- A recommended solution to overcome big data storage and
archical organization consisting of core (providing coverage processing challenge is Apache Hadoop—an open-source soft-
ranging from a few hundred to a few thousand kilometers), ware framework. Hadoop utilizes large clusters of commodity
metro (providing coverage ranging from a few tens to a few servers to enable distributed processing of big data. Hadoop
hundred kilometers), and access (providing coverage rang- has a number of advantages including hardware infrastruc-
ing over a few kilometers) domains [108]. The following ture scalability, cost efficiency, data type flexibility, and fault
power management solutions can be incorporated in optical tolerance, which makes it a leading candidate for storing, man-
communication networks to make them energy-efficient. aging, and processing big data [137]. Another recommended
• Turning off the network equipment (e.g., switches, line solution to overcome the big data handling and storage chal-
cards or the links) that is in its idle state during low traffic lenge involves a collaborative effort from all leading cloud
volume [124], [125]. providers to develop a new IoT cloud ecosystem [136].
• Employing lightpath bypass technique over lightpath
nonbypass technique to provision survivable demands
with minimized power consumption in IP-over-WDM E. IoT Computational Requirements and Capabilities
networks [126], [127]. As compared to human brain, IoT infrastructure is not that
• Incorporating techniques like multipath selection [128], complicated. In a human brain, there are 100 billion neurons
multigranular switching [129], and energy-aware with each neuron connected to 10 000 other neurons [138].
routing [130] to save energy. Imparting computational capabilities to the IoT devices and
• Employing energy-efficient access technologies such the network-edge devices (e.g., gateways and routers) have
as passive optical networks [131], Ethernet passive resulted in a paradigm shift from connected/networked IoT
optical networks [132], [133], long-reach passive devices to intelligent IoT devices.
optical networks [134], and point to point optical The advancements in computational intelligence capabilities
networks [131]. can evolve an intelligent IoT system by emulating biological
d) Energy-efficient optical-wireless communication nervous systems with cognitive computation, streaming, and
networks: Optical-wireless communication networks, com- distributed analytics including at the edge and device levels.
monly known as fiber-wireless communication networks, Cognitive computation emulates biological thinking, analy-
combine the ubiquity, coverage and flexibility of wireless sis, and strategy, serving as a learning mechanism for the
communication networks with the speed and the reliability entire IoT ecosystem. It can identify patterns from large and
of optical communication networks. To make the optical- diverse data sequences in real-time by weighing the incoming
wireless communication networks energy-efficient, the optical data against the long-term information and making strong deci-
network unit (ONU) module of a joint ONU-BS node can be sions. Several companies such as Intel and CognitiveScale are
placed in sleep mode during low traffic volumes. In this case exploring intelligent interactions by combining sensors, con-
only the BS module from the joint ONU-BS node handles textual data, and cognitive computing to drive new strategies
data forwarding to the peers [108], [135]. for various industries including home automation, healthcare,
and traffic management. Streaming analytics mimics the bio-
logical spinal cord by controlling the reflex actions that do
D. Big Data Challenges and Recommended Solutions in not need extensive computations to make decisions in real
Support of IoT Deployment in Power and Energy Systems time. It weighs the incoming analytical data with historical
Thousands of IoT devices connected across EPESs gener- information in real time to make quick decisions (very low
ate large amounts of data (or big data), making it challenging latency). The decision making with streaming analytics is
to store, track, analyze, capture, cure, search, share, transfer, much faster than batch processing large amounts of data. There
secure, visualize, and interpret the generated data [136]. It is are several cloud solutions (e.g., Amazon Kineses and Azure
BEDI et al.: REVIEW OF IoT IN EPESs 859

Streaming Analytics) and cloud-based, open source or on- complex analysis and long-term data storage in the
premise applications (e.g., Apache Spark and Apache Storm) cloud [141], [144], [145].
that support streaming analytics. Edge and device computation The following are the advantages of employing fog com-
mimics biological nerves and neurons that filter the incoming puting in the IoT ecosystem. Many of these advantages are
data, retain the data that can be processed locally in the edge a result of the proximity of fog computing devices to con-
devices (impacting only a small part of the IoT ecosystem), sumers, their dense geographical distribution, and mobility
and forward the remaining data to be processed in the cloud support [142], [147].
(impacting a larger part of the IoT ecosystem). An example of • Refining the generated IoT data by distributing it among
a small and inexpensive edge computing device is Raspberry the edge devices [59].
Pi [139], [140]. • Lowering latency and saving bandwidth by process-
The number of IoT devices and applications are continu- ing IoT applications’ service requests at the network
ously growing leading to a significant increase in IoT data vol- edge [59], [142].
ume. ABI Research has estimated the IoT data volume to grow • Improving availability through local storage and
from 233 EB in 2014 to 1.6 ZB in 2020 [59]. The differ- analytics [59].
ent IoT devices and applications generating real-time data are • Providing location awareness, improved quality of ser-
dispersed over large geographical areas and support a vari- vice, heterogeneity support, fault tolerance, scalability,
ety of use cases and domains. A centralized computation and and reliability [147].
storage solution (e.g., cloud) for real-time heterogeneous IoT • Reducing network traffic by increasing the operational
data is not ideal. IoT applications have strict requirements like size of the network [148].
high throughput during short time periods, very low latency, • Maximizing security and compliance by encrypting crit-
and prompt decision making based on real-time data ana- ical data packets at the source [59].
lytics, which cloud computation cannot satisfy. With all the • Saving both time and cost of transmitting the locally gen-
IoT devices and applications sending service requests to the erated IoT data to the cloud over the Internet (high latency
cloud, it would be challenging to serve these requests in real- network) [149].
time resulting in inefficient service-provisioning and increased • Optimizing the total cost of ownership by reducing the
latency. Additionally, IoT ecosystems are constrained in terms connectivity costs and increasing the lifetime of battery-
of low power communications, scarce energy, and lossy com- operated IoT devices [59].
munications, which necessitates localized computation and Although there are several advantages, associated challenges
storage solutions for processing, analyzing, and storing IoT with fog computing also exist.
data [141]–[145]. • Handling data generated from dissimilar sources because
Two approaches for overcoming the IoT data computation of different protocols and data formats [148].
challenge are discussed below viz., fog computing and IoT • Cyber attacks [e.g., node-compromised attack and man-
data footprint reduction methods. Deploying these solutions in-the-middle (MITM) attack] and privacy concerns (e.g.,
in the IoT ecosystem will drive the EPES operations using data protection and data management issues) [149].
hard evidence and statistical probabilities rather than relying • The unpredictability of the computational availability of
on soft opinions and intuitions. the edge devices [150].
1) Fog Computing: The term fog computing was coined Several fog computing techniques have been proposed
by Cisco Systems, Inc., in 2012 [146]. Fog computing is to overcome these challenges including software defined
a distributed computing infrastructure that provides computa- network and network functions virtualization [147], schema-
tional and storage capabilities to the network devices located less database record [148], task execution by idle edge
at different levels in the IoT hierarchy viz., endpoint level, resources [150], and smart shadow technique [151].
gateway/server level, and cloud level [141]. 2) IoT Data Footprint Reduction Methods: As mentioned
Fog computing is based on the principle of edge computing before, centralized computation and storage are not ideal for
where IoT application service requests, requiring low latency, IoT applications. The increased IoT data velocity and vol-
support for mobility, and real-time data analysis with deci- ume from the growing scale of IoT devices can elevate the
sion making abilities (e.g., smart grid, smart traffic monitoring, stress on the communication network resources to a point
and smart parking), are processed locally within the fog com- where resource starvation occurs. Therefore, it is critical to
puting devices (e.g., gateways, routers, and access points). minimize the traffic inserted into the communication network.
Alternatively, the requests that demand extensive analysis One way to reduce the data traffic is by appropriately dis-
involving historical datasets, or semipermanent and permanent tributing the data between the network elements based on
storage (e.g., social media data, photographs, videos, medical their computation capabilities and available resources. Another
history, and data backups), are forwarded to the cloud by the way to reduce the IoT data footprint is dimensionality reduc-
fog computing devices [141]. tion method. This method relies on the global awareness and
Therefore, fog computing and cloud computing are knowledge of the IoT ecosystem for eliminating redundancy
not competing computation technologies, but are instead and filtering out the noise from IoT data packets. The draw-
complementary. Together they support the IoT appli- back with the dimensionality reduction method is that it does
cations’ real-time and low latency service requests at not address the impact of IoT data exchanges on the commu-
the network edge, as well as applications requiring nication network. Data filtering methods are used to address
860 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

the impact of IoT data exchanges at an operational level. Although SDN provides many benefits to overcome the
These methods are distributed throughout the communication complexity issue, it also has some associated challenges
infrastructure, monitoring the IoT data in transit for significant including SDN interoperability issues with legacy network
events. Once a significant event is detected, data filtering meth- devices, performance and privacy concerns with central-
ods label them with critical local information (e.g., network ized control, and lack of experts for technical support.
load) resulting in a more efficient treatment for these events Additionally, the shift from traditional networking to SDN can
at the operational level. The IoT data footprint on the commu- be disruptive [152].
nication networks can be further reduced by employing both
data filtering and data processing methods within the same IoT
node [148].
G. Security Challenges and Recommended Solutions
“A cyber security vulnerability is a weakness in a com-
F. Complexity Challenges and Recommended Solutions puting system that can result in harm to the system or its
The expansion of network infrastructure due to the wide operation, especially when this weakness is exploited by
penetration of IoT devices has resulted in increased network a hostile actor or is present in conjunction with particu-
size, heterogeneity (different vendors providing services, lar events or circumstances [160].” Consider the hypothetical
equipment, and applications), and complexity [152], [153]. threat where an adversary can steal information or take down
For a lot of these devices, networked connectivity is a brand servers, which could disrupt power network operations [161].
new feature. To continue this trend of adding more IoT Cyber security is a potential issue for EPES modernization.
devices with networked connectivity that seamlessly inte- Recent cyber attacks on IoT devices include the distributed
grate with EPESs, IoT device design and development must denial of service (DDoS) attack on Dyn’s managed domain
be simplified [101], [136]. Further, the wireless capabilities name system infrastructure using Mirai botnet affecting over
must be encapsulated and instead easier to understand ref- 100 000 endpoints [162], ransomware for smart thermostats
erence designs, modules, and on-chip connectivity stack and that lock the user out and demand bitcoins to release
development environment must be provided [136]. the thermostat [163], Bluetooth smart locks that are easily
The traditional approaches for network optimization, con- hacked [164], denial of service (DoS) attacks by a lightbulb
figuration, and troubleshooting are cumbersome, error-prone, that froze the controls of the entire smart home [165], and
and have proved to be inefficient in resolving the com- the ease by which a neighbor was able to unlock the resi-
plexity issue [152]. For example, autonomous system-based dent’s front door smart lock, connected over Apple HomeKit,
approaches have resulted in suboptimal performance, local and gained entry into the house by simply issuing the unlock
optimization methods have resulted in conflicting operations, voice command to Siri [166].
and the lack of inbuilt programmability, flexibility, and sup- Security solutions developed for IT computer systems will
port has resulted in service interruptions while implement- typically be inappropriate for EPESs. The attack incident tax-
ing new ideas [154]–[156]. Additionally, the development, onomy used by computer emergency response team (CERT)
implementation, and testing of new methods for network to describe security incidents is shown in Fig. 13 [167]. This
optimization, configuration, and troubleshooting takes sev- taxonomy provides uniform terminology and useful frame-
eral years before they can be deployed, which may render work to the security research community. Incidents consist of
them useless [157], [158]. A promising solution to man- a set of attacks that are executed to achieve the desired objec-
age the growing network complexity is software-defined tives. Attacks produce unauthorized results by using tools to
networking (SDN) [152], [153]. exploit system/network vulnerabilities. An attack consists of
The Open Networking Foundation defines SDN as a sequence of events.
“an emerging network architecture where network con- Fig. 14 shows a modified attack taxonomy that adapts this
trol is decoupled from forwarding and is directly pro- approach to the EPES network. As before, attackers use tools
grammable [159].” SDN decouples the control plane from the to exploit the vulnerabilities of the IoT devices in EPESs
data plane. The data plane includes devices such as routers and launch attacks against targets to obtain unauthorized
and switches that follow the controller rules to perform packet results.
forwarding. The control plane includes controllers that oversee There are four general classes of attacks for the integrity,
the network operations and provide a platform for the imple- availability, confidentiality, access control, authentication, and
mentation of different network services and applications. The nonrepudiation security aspects [168], [192].
main advantage of SDN is that it offers the rapid implemen- • Interruption: Asset availability is disrupted.
tation and deployment of innovative solutions (e.g., network • Interception: Unauthorized asset access.
security, network virtualization, and green networking) in the • Modification: Unauthorized asset tampering.
form of software. Additionally, SDN uses the cross-layer infor- • Fabrication: Fictitious asset creation.
mation and global network view in the logical centralization Security solutions are needed to overcome these risks and
of feedback control to make better decisions. Therefore, SDN protect the IoT devices, networks, and sensitive data from
provides enhanced network configuration, improved network security breaches and unauthorized access. Discussed below
performance, and higher network flexibility to accommodate are some of the security challenges and recommended solu-
innovative architectures and operations [152]. tions for IoT devices in EPESs [169].
BEDI et al.: REVIEW OF IoT IN EPESs 861

Fig. 13. Attack taxonomy by CERT [167].

Fig. 14. Modified attack taxonomy for EPES networks.

1) Interruption Attacks: An interruption attack includes attacks. A study conducted by the National Academy of
both hardware-based DoS attack or sabotage and software- Sciences projected a high risk of ground or air assault to
based DoS attack [170]. nuclear power plants, which could result in a core meltdown
a) Sabotage and countermeasures: IoT device hardware and failure of the containment infrastructure releasing a large
or infrastructure sabotage (e.g., cutting a cable or inflicting amount of radioactive substances [176], [177]. Sabotage of
damage to a physical IoT device) result in the disconnec- nuclear power plants can potentially have a long-lasting and
tion of the device from the network. Examples of sabotage devastating effect on the environment, public health, and econ-
in the EPES include cutting a network connection between omy. These attacks can be reduced by limiting access to
the PMU and phasor data concentrator (PDC), PDCs and critical IoT infrastructure.
a super PDC, or inflicting physical damage to PMUs and smart b) DoS attacks and countermeasures: In DoS attacks,
meters [171]–[174]. Power stations are susceptible to sabo- the attacker compromises several machines (or zombies) and
tage as well. An example includes the sniper attack on the consumes network resources, which overloads the bandwidth
California power station where 17 giant transformers funnel- of the target and results in slowed or dropped legitimate
ing power to Silicon Valley were knocked out [175]. Nuclear traffic (also known as DDoS). For instance, DoS attacks on
power plants are also vulnerable to sabotage by terrorist EPES devices (e.g., PMUs and smart meters) relying on the
862 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

real-time measurement data cause delayed or lost measure- tunnel, which is created by embedding an IP tunnel (with
ments from these devices. This results in inaccurate predictions encryption) within the normal IP network payload. The
of the transmission system status, delayed resolution of power encryption hides the data from the attackers, making the
system complications, or complete failure of network measure- network private, in addition to being virtual [185]. The com-
ment devices. Other examples of DoS attacks include network munications between VPNs are secured using the TLS proto-
layer attacks, transport layer attacks, local area network denial col. The connections between different parties on the EPES
attacks, and teardrop attacks [178]. In teardrop attacks, the network are secured using the X.509 certificates, which first
attackers transmit fragmented packets to a target. Due to a bug authenticate users and subsequently exchange symmetric keys.
in transmission control protocol (TCP)/Internet protocol (IP) However, there is a possibility that the X.509 certificates are
fragmentation reassembly, the target is not able to reassemble compromised or are issued in error [172]. An instance of com-
the received packets resulting in overlapping packets, which promised certificates was reported in [187], where an imposter
crash the target network device [179]. DoS attacks have the tricked VeriSign in to issuing two certificates for Microsoft.
capability to inflict serious damage to the EPES and therefore, Although using VPN tunnels provide EPES network security,
must be reduced by using network security techniques such as they have associated implementation and design errors. For
air gapped network, anomaly detection approaches, big pipes, example, an attack on a VPN tunnel was reported in [172],
and traffic filtering. where the Heartbleed bug was discovered in the OpenSSL
An air gapped network is a network security technique cryptography library leaving around half a million supposedly
that physically isolates a secure computer network from other secure Web servers vulnerable to cyber attacks. Therefore, it
insecure networks (e.g., public Internet or an insecure local is essential to verify the security of VPN tunnels during their
area network). It eliminates any communication with the implementation [172], [177], [185], [188]. Using preshared
machines not connected to the local segment. However, there keys is usually effective. Also, secure sockets layer certifi-
is a drawback to this technique in terms of the high costs cates or TLS certificates, which are generated by a common
associated with building separate network infrastructures for root of trust controlled by a trusted entity, can be used.
the EPES. b) Side channel attacks and countermeasures: From
Anomaly detection approaches are used to detect DoS the above discussion, even though VPN encryption pro-
attacks on EPES networks. Experimental results have shown vides security for network connections, side-channel attacks
that the detection performance is inversely proportional to the are still possible. In side-channel attacks, sensitive infor-
network utilization. Also, the optimal detection parameters mation can be extracted by observing implementation arti-
have a strong dependence on the network utilization [180]. facts [169], [189]. An example side-channel attack is in [179],
Big pipes are large bandwidth network connections that where the protocol information was extracted by using
can absorb attack traffic to mitigate the DoS attack on the a timing side-channel vulnerability for secure shell—a cryp-
EPES. However, there is a drawback to this technique in terms tographic network protocol [190]. Other instances of side
of the high costs associated with it. channel attacks were reported in [191] and [192], where the
A less expensive approach to mitigate DoS attacks on EPES authors indicated the possibility to identify VPN-encrypted
networks is traffic filtering. This approach utilizes distributed PMU measurement sessions allowing attackers to reroute,
or redundant infrastructure to redirect attack traffic [181]. delay, or drop data packets [191], and analyze VPN power
However, there are a couple of drawbacks with this tech- consumption [192]. This could severely degrade the EPES
nique including the lack of documentation to support the monitoring as the attacker can stop parts of the system’s
claim of filtering DoS traffic from normal traffic and the diffi- feedback control and hide inefficiencies or instabilities in the
culty of employing this technique, especially with large traffic EPES.
volume [170]–[172], [177], [181]–[186]. To counter side channel attacks on EPES, the commu-
2) Interception Attacks: An interception attack gains access nication channel bandwidth could be saturated to disallow
to the information that is traversing the network between any new patterns to emerge. However, this approach has an
EPES devices (e.g., between PMU and PDC). These attacks extreme resource requirement and can only be used in extreme
can either be passive or active. Two types of interception cases [193]. Additionally, the detection of saturated channels,
attacks, packet sniffing and side channel attacks, are discussed which can potentially be side channels, helps mitigate side
below [180]. channel attacks in EPES. Also, building a separate infrastruc-
a) Packet sniffing and countermeasures: Attackers can ture for EPES device communications can help resolve side
gain access to the contents of the PMU or smart meter TCP/IP channel attacks, but it is an expensive approach [191].
packets that are sent across the EPES network using software 3) Modification Attacks: Modification attacks exploit secu-
programs such as Wireshark [170]. This is known as packet rity vulnerabilities in EPESs for corrupting, highjacking, or
analysis or packet sniffing. In the absence of encryption, the altering a legitimate process. Examples of modification attacks
attacker can see and harvest all the sensitive information in include MITM attack and Structured Query Language (SQL)
the data packet. An instance of packet sniffing was reported injection [169].
in [185], where the authors used Wireshark to analyze the a) MITM attacks and countermeasures: In MITM
network traffic in a synchrophasor network. attacks, the attacker poses as the legitimate target to both legit-
Packet sniffing can be mitigated by using a security gateway imate client and server during the protocol session. In other
that sends packets through a virtual private network (VPN) words, if A and B are communicating with each other, the
BEDI et al.: REVIEW OF IoT IN EPESs 863

intruder I disguises itself as B in front of A and as A in an application program interface. Dynamic SQL use should
front of B, thereby replacing the AB link with two links AI be avoided and user inputs should be forced to use static
and IB [169]. MITM attack in an EPES network splits the templates and existing tables [172], [197], [198].
PMU-PDC communication link with two links PMU-I and 4) Fabrication Attacks: In fabrication attacks, the attacker
I-PDC. Some of the MITM attack methods include route creates a fictitious asset on the EPES network that trans-
table poisoning, modified packet source and destinations, mits fabricated data across the network, which may be
and compromised certificates [169]. An instance of compro- accepted by other network assets if not properly authenti-
mised certificate of hypertext transfer protocol (HTTP) over cated. Data spoofing—a type of fabrication attack is discussed
TLS (HTTPS) connection was reported in [194], where the below [169].
authors used fake certificates to initiate a MITM attack. PMU a) Data spoofing and countermeasures: The accuracy
communications with PDC in a EPES network uses X.509 cer- of data in the EPES network is critical for its efficient
tificates for authentication, which can be compromised making and reliable operation. In data spoofing, fabricated (inaccu-
PMU-PDC communication vulnerable to a MITM attack. rate) data is injected into the control centers. An instance
To counter the MITM attacks, the network traffic should be of data spoofing on EPES network was reported in [186],
encrypted using security gateways [189]. The security gate- where the authors injected fabricated data (voltage, current,
way creates a VPN tunnel (unsecure network) connecting two frequency, or GPS time stamp data) into the system. Another
secure networks. To ensure that the sensitive data is pro- instance of a data spoofing was reported in [200], where
tected when passing through the VPN tunnel, the security the authors injected a fabricated GPS time stamp data into
gateway encrypts the data at the source and decrypts the data at the system for measurements. Data spoofing severely degrade
the target. This encryption is typically done in hardware and the EPES operation, stability, security, and reliability, which
can be efficient. Security gateways support EPES communica- may result in an outage.
tions and interoperability by employing the IP security (IPsec) To counter data spoofing, Muthyala [171] advised using
protocol. IPsec secures the communication link by ensur- a single data feed. Additionally, multiple/redundant EPES
ing that the data stays authentic, unaltered, and confidential devices (smart meters or PMUs) can be used to monitor the
throughout the communication process [189]. Additionally, to same electrical transmission bus to reduce data spoofing [173].
mitigate MITM attacks, both system client and server need Other approaches to mitigate data spoofing include col-
to be authenticated [188]. TLS protocols have in-built pub- laboration among GPS receivers to efficiently detect any
lic key cryptography mechanisms that can promptly detect spoofing [201] and synchronizing measurements using the
and correct any errors to avoid the occurrence of MITM network time protocol (NTP) across different locations in
attacks [170]–[172], [177], [183], [188], [195]. real time [202]. A combination of NTP and GPS is recom-
b) SQL injection and countermeasures: In SQL injec- mended to limit the modification of timestamps through GPS
tion, the attacker alters the database by inserting new script spoofing [167], [171]–[173], [177], [183], [185], [200].
commands [169]. Smart meters continuously send energy Table I provides a summary of the challenges and proposed
usage data to the utilities and the users, which is stored in solutions for IoT deployment in EPESs.
a database. The SQL injection occurs if the queries formu-
lated by the user are not properly validated before inclusion
in the SQL query [196]. This attack can send malicious queries V. B UILDING AUTOMATION —R EAL -W ORLD
to the database management system to add, delete, or mod- A PPLICATION E XAMPLE OF I OT IN E LECTRIC
ify the database contents and take control of the system. This P OWER AND E NERGY S YSTEMS
can disrupt the EPES operations as the attacker can indicate In current building environments, there exists problems
a normal operation state even when it is not, which might including inefficient energy management, wasted energy
eventually result in an outage. resources, and expensive energy costs. IoT-enabled building
SQL injection on EPES networks can be mitigated by automation can overcome these challenges and improve oper-
using measures including input type checking, positive pattern ational efficiency and productivity gains thereby boosting the
matching, penetration testing, static code checking, limit- bottom line by providing building managers full visibility,
ing database access to remote users, and avoiding dynamic flexibility, and control of all building assets. Fig. 15 shows
SQL use [197], [198]. In input type checking, the characters a reference model that describes the layered architecture of
that can be abused, like “;” are filtered out by the pro- applying IoT in a smart building environment. This model
grammer to avoid any malformed input. This is not simple; can be adapted for any IoT application in EPESs.
Hooimeijer et al. [199] have showed that most existing tools The architecture shown in Fig. 15 includes four layers viz.,
for sanitizing inputs have errors. In positive pattern match- physical layer, communication layer, computational layer, and
ing, the user input is matched with the format of a good control and visualization layer. The physical layer comprises
input. In penetration testing, SQL injection is attempted on of IoT sensors (e.g., temperature and humidity sensor, motion
the interface to ensure that these attacks are properly detected. sensor, and light sensor) and IoT actuators (e.g., light con-
In static code checking, the program is checked for correct- troller and HVAC controller). IoT sensors monitor the smart
ness using code checking tools. Limiting database access to building environment and assets’ operation state. The opera-
remote users means that the remote users should have limited tional data is transmitted to the communication layer using
rights on the database and all their inputs should go through some communication technology (e.g., ZigBee, Wi-Fi, and
864 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

TABLE I
S UMMARY OF C HALLENGES AND P ROPOSED S OLUTIONS FOR I OT D EPLOYMENT IN EPES S

RFID). The communication layer comprises of IoT gateway devices (e.g., tablet, desktop computer, laptop, smart phone,
that receives the operational data and transmits it to compu- and smart watch) that perform three tasks.
tational layer (using 4G) and control and visualization layer 1) Generate visualizations using the operational data from
(using Wi-Fi). The computational layer comprises of the cloud IoT sensors.
for storing, computing, and analyzing the operational data to 2) Generate control parameters using the actionable infor-
generate actionable information. This information is also trans- mation from the cloud.
mitted to the control and visualization layer via IoT gateway. 3) Transmit the generated control parameters to IoT actu-
The control and visualization layer includes user interface ators in the physical layer via IoT gateway.
BEDI et al.: REVIEW OF IoT IN EPESs 865

R EFERENCES
[1] B. Gokay, The 2008 World Economic Crisis: Global Shifts and
Faultlines, Glob. Res., Montreal, QC, Canada, Feb. 2009. [Online].
Available: http://www.globalresearch.ca/the-2008-world-economic-
crisis-global-shifts-and-faultlines/12283
[2] European Commission, “Paris agreement,” in Proc. PARIS UN Clim.
Change Conf. COP21·CMP11, Paris, France, Dec. 2015. [Online].
Available: http://ec.europa.eu/clima/policies/international/negotiations/
paris/index_en.htm
[3] M. Liebreich, “Lithium-ion EV battery experience curve com-
pared with solar PV experience curve,” in Proc. Bloomberg
New Energy Finance Summit, Apr. 2015, p. 14. [Online].
Available: https://data.bloomberglp.com/bnef/sites/4/2015/04/Final-
keynote_ML.pdf
[4] G. Bedi, G. K. Venayagamoorthy, and R. Singh, “Navigating the chal-
lenges of Internet of Things (IoT) for power and energy systems,” in
Proc. Clemson Univ. Power Syst. Conf. (PSC), Clemson, SC, USA,
Fig. 15. Layered architecture of applying IoT in a smart building 2016, pp. 1–5.
environment.
[5] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and
M. Ayyash, “Internet of Things: A survey on enabling technologies,
protocols, and applications,” IEEE Commun. Surveys Tuts., vol. 17,
The smart building assets are regulated based on the con- no. 4, pp. 2347–2376, 4th Quart., 2015.
[6] G. Bedi, G. K. Venayagamoorthy, and R. Singh, “Towards an intelligent
trol parameters to improve both their energy and operation power network with Internet of Things (IoT),” unpublished.
efficiencies. [7] R. Bigliani, J.-F. Segalotto, and G. Gallotti, Shaping a
New Battleground in the IoT Era: Highlights From the
2016 IDC Pan–European Utilities Executive Summit, IDC
VI. C ONCLUSION Energy Insights, Framingham, MA, USA, Jun. 2016. [Online].
Available: https://www.ericsson.com/res/narratives/docs/industries/iot-
Important role of IoT in transforming EPESs was presented utilities-era-new-battleground-idc-summit-report-2016.pdf
in this paper. Digitizing the electric power ecosystem using [8] S. Jankowski, J. Covello, H. Bellini, J. Ritchie, and D. Costa,
“The Internet of Things: Making sense of the next mega-
IoT helps to better account for DER integration; reduce energy trend,” Goldman Sachs IoT Primer, New York, NY, USA, Rep.,
wastage; generate savings; and improve the efficiency, reliabil- Sep. 2014. [Online]. Available: http://www.goldmansachs.com/our-
ity, resiliency, security, and sustainability of the electric power thinking/outlook/internet-of-things/iot-report.pdf
[9] “Final report on the August 14, 2003 blackout in the United
networks. The role of IoT sensors for smart home scenario States and Canada: Causes and recommendations,” U.S.–
was also presented in this paper, wherein a detailed assess- Canada Power Syst. Outage Task Force, Washington, DC, USA,
ment of the technical parameters of IoT sensors was provided. Apr. 2004. [Online]. Available: http://energy.gov/sites/prod/files/
oeprod/DocumentsandMedia/BlackoutFinal-Web.pdf
Additionally, IoT sensors that are currently on the market were
[10] M. Annunziata, G. Bell, R. Buch, S. Patel, and N. Sanyal, Powering
surveyed. the Future: Leading the Digital Transformation of the Power
IoT for EPESs presents an exciting area of innovative Industry, GE Power Digit. Solutions, Boston, MA, USA, 2016.
growth and development and has a significant impact on the [Online]. Available: https://www.gepower.com/content/dam/gepower-
pw/global/en_US/documents/industrial%20internet%20and%20big%20
economy, society, and environment; in terms of increased data/powering-the-future-whitepaper.pdf
revenue in EPESs, reduced CO2 emissions, lifestyle conve- [11] X. Fang, S. Misra, G. Xue, and D. Yang, “Smart grid—The new and
nience, public safety, energy conservation, expense reduction, improved power grid: A survey,” IEEE Commun. Surveys Tuts., vol. 14,
no. 4, pp. 944–980, 4th Quart., 2012.
and a healthy living environment. [12] S. Jain et al., “Survey on smart grid technologies-smart metering, IoT
Apart from the numerous advantages of IoT for EPESs, it and EMS,” in Proc. IEEE Stud. Conf. Elect. Electron. Comput. Sci.
also has some associated challenges, viz., sensing, connec- (SCEECS), Bhopal, India, 2014, pp. 1–6.
tivity, power management, big data, computation, complexity, [13] R. Young, J. McCue, and C. Grant, “The power is on: How
IoT technology is driving energy innovation,” Deloitte Center
and security. To ensure continued growth of IoT for EPESs, it Energy Solutions, Houston, TX, USA, Rep., Jan. 2016. [Online].
is essential to develop viable solutions to handle its grow- Available: http://dupress.com/articles/internet-of-things-iot-in-electric-
ing complexity. Some of the recommended solutions were power-industry/
[14] A. Al-Ali and R. Aburukba, “Role of Internet of Things in the smart
reviewed in this paper. grid technology,” J. Comput. Commun., vol. 3, pp. 229–233, May 2015.
A potential direction to handle complexity of future IoT can [15] L. Li, H. Xiaoguang, C. Ke, and H. Ketai, “The applications of WiFi-
be inspired from brain computing (with 100 billion neurons in based wireless sensor network in Internet of Things and smart grid,”
in Proc. 6th IEEE Conf. Ind. Electron. Appl., Beijing, China, 2011,
a human brain, where each neuron is connected to 10 000 other pp. 789–793.
neurons). Computational intelligence is the future to handling [16] C. Bekara, “Security issues and challenges for the IoT-based smart
complexity in artificial systems. grid,” Procedia Comput. Sci., vol. 34, pp. 532–537, Dec. 2014.
[17] M. Yun and B. Yuxin, “Research on the architecture and key technology
of Internet of Things (IoT) applied on smart grid,” in Proc. Int. Conf.
Adv. Energy Eng. (ICAEE), Beijing, China, 2010, pp. 69–72.
ACKNOWLEDGMENT
[18] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of
Any opinions, findings, and conclusions or recommenda- Things (IoT): A vision, architectural elements, and future directions,”
Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, 2013.
tions expressed in this paper are those of the author(s) and do
[19] J. Liu, X. Li, X. Chen, Y. Zhen, and L. Zeng, “Applications of Internet
not necessarily reflect the views of the NSF and Duke Energy of Things on smart grid in China,” in Proc. 13th Int. Conf. Adv.
Foundation. Commun. Technol. (ICACT), Seoul, South Korea, 2011, pp. 13–17.
866 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

[20] N. Bui, A. P. Castellani, P. Casari, and M. Zorzi, “The Internet of [41] The Seven Basic Types of Temperature Sensors, Water & Wastes
energy: A Web-enabled smart grid system,” IEEE Netw., vol. 26, no. 4, Dig., Arlington Heights, IL, USA, Dec. 2000. [Online]. Available:
pp. 39–45, Jul./Aug. 2012. http://www.wwdmag.com/water/seven-basic-types-temperature-sensors
[21] Q. Ou, Y. Zhen, X. Li, Y. Zhang, and L. Zeng, “Application of Internet [42] D. K. Roveti, “Choosing a humidity sensor: A review of three technolo-
of Things in smart grid power transmission,” in Proc. 3rd FTRA Int. gies,” Sensors, vol. 18, no. 7, pp. 54–58, Jul. 2001. [Online]. Available:
Conf. Mobile Ubiquitous Intell. Comput. (MUSIC), Vancouver, BC, http://www.sensorsmag.com/sensors/humidity-moisture/choosing-a-hu
Canada, 2012, pp. 96–100. midity-sensor-a-review-three-technologies-840
[22] R. Smith, How America Could Go Dark, Wall Street J., New York, NY, [43] Water Detection Sensors: Types and Applications, Netw. Technol.
USA, Jul. 2016. [Online]. Available: http://www.wsj.com/articles/how- Incorporat., Aurora, OH, USA, Sep. 2013. [Online]. Available: http://
america-could-go-dark-1468423254 www.networktechinc.com/blog/water-detection-sensors-types-and-appl
[23] Contributions of Supply and Demand Resources to Required ications/303/
Power System Reliability Services, Elect. Power Res. Inst., [44] Types of Smoke Alarms and Detectors, Grainger, Lake Forest,
Palo Alto, CA, USA, May 2015. [Online]. Available: IL, USA, accessed: Apr. 11, 2016. [Online]. Available: https://
http://www.epri.com/abstracts/Pages/ProductAbstract.aspx?ProductId= www.grainger.com/content/qt-types-smoke-alarms-detectors-366
000000003002006400 [45] C. Mathas, Light Sensors: An Overview, Digi-Key Electron.,
[24] R. Gore and S. P. Valsan, “Big data challenges in smart grid IoT Thief River Falls, MN, USA, Sep. 2012. [Online]. Available:
(WAMS) deployment,” in Proc. 8th Int. Conf. Commun. Syst. Netw. http://www.digikey.com/en/articles/techzone/2012/sep/light-sensors-an-
(COMSNETS), Bengaluru, India, 2016, pp. 1–6. overview
[25] GE Reports. The Digital Power Plant: Bridging the Intelligence [46] Energy Monitoring, Green Step, Gaithersburg, MD, USA, accessed:
Gap Between People and Machines. Accessed: Jun. 14, 2016. Apr. 11, 2016. [Online]. Available: http://www.greensteptoday.com/
[Online]. Available: https://www.ge.com/digital/sites/default/files/GE- energy-monitoring
Digital-Power-Plant-Brochure.pdf [47] E. D. Korczynski, “IoT demands: Are we ready?” Solid State Technol.,
[26] D. Lounsbury, Weighing the Advantages of Distributed vol. 59, no. 4, pp. 19–23, Jun. 2016.
and Centralized Energy Storage, Renew. Energy World, [48] S. Pateras, Dreaming of Plug-and-Play IP, Solid State Technol., San
Elkridge, MD, USA, Apr. 2015. [Online]. Available: Francisco, CA, USA, accessed: Jul. 15, 2016. [Online]. Available:
http://www.renewableenergyworld.com/articles/2015/04/weighing-the- http://electroiq.com/blog/2012/12/dreaming-of-plug-and-play-ip/
advantages-of-distributed-energy-storage-and-centralized-energy-stora [49] 1801–2015—IEEE Standard for Design and Verification of
ge.html Low-Power, Energy-Aware Electronic Systems, ANSI/IEEE
[27] A. A. Asif, R. Singh, and G. K. Venayagamoorthy, “Ultra-low cost Standard 1801-2105, accessed: Apr. 9, 2016. [Online]. Available:
and solar storm secured local DC electricity to address climate change https://standards.ieee.org/findstds/standard/1801-2015.html
challenges for all economies,” in Proc. Clemson Univ. Power Syst. [50] E. Sperling, What’s Important for IoT—Power, Performance or
Conf. (PSC), Clemson, SC, USA, 2016, pp. 1–7. Integration? Semicond. Eng., Aug. 2016. [Online]. Available: http://
[28] G. K. Venayagamoorthy, P. Mitra, K. Corzine, and C. Huston, “Real- semiengineering.com/whats-important-for-iot-power-performance-or-
time modeling of distributed plug-in vehicles for V2G transactions,” in integration/
Proc. IEEE Energy Convers. Congr. Exp., San Jose, CA, USA, 2009, [51] Sales of Light Duty Electric Vehicles Are Expected to
pp. 3937–3941. Reach 6.4 Million Annually by 2023, Navigant Res.,
[29] J. S. Vardakas, N. Zorba, and C. V. Verikoukis, “A survey on demand Boulder, CO, USA, Jan. 2015. [Online]. Available:
response programs in smart grids: Pricing methods and optimization https://www.navigantresearch.com/newsroom/sales-of-light-duty-
algorithms,” IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 152–178, electric-vehicles-are-expected-to-reach-6-4-million-annually-by-2023
1st Quart., 2015. [52] W. Kempton and J. Tomicì, “Vehicle-to-grid power fundamentals:
[30] Y.-K. Chen, “Challenges and opportunities of Internet of Things,” Calculating capacity and net revenue,” J. Power Sources, vol. 144,
in Proc. 17th Asia South Pac. Design Autom. Conf., Sydney, NSW, no. 1, pp. 268–279, Jun. 2005.
Australia, 2012, pp. 383–388. [53] C. M. Hutson, G. K. Venayagamoorthy, and K. A. Corzine,
[31] D. Partynski and S. G. M. Koo, “Integration of smart sensor networks “Intelligent scheduling of hybrid and electric vehicle storage capacity
into Internet of Things: Challenges and applications,” in Proc. IEEE in a parking lot for profit maximization in grid power transac-
Int. Conf. IEEE Cyber Phys. Soc. Comput. Green Comput. Commun. tions,” in Proc. IEEE Energy 2030, Atlanta, GA, USA, Nov. 2008,
(GreenCom) IEEE Internet Things (iThings/CPSCom), Beijing, China, pp. 1–8.
2013, pp. 1162–1167. [54] J. Manyika et al., Disruptive Technologies: Advances That Will
[32] S. D. T. Kelly, N. K. Suryadevara, and S. C. Mukhopadhyay, “Towards Transform Life, Business, and the Global Economy, McKinsey Glob.
the implementation of IoT for environmental condition monitoring in Inst., San Francisco, CA, USA, May 2013. [Online]. Available:
homes,” IEEE Sensors J., vol. 13, no. 10, pp. 3846–3853, Oct. 2013. http://www.mckinsey.com/business-functions/business-technology/our-
[33] J. Pan, R. Jain, and S. Paul, “A survey of energy efficiency in build- insights/disruptive-technologies
ings and microgrids using networking technologies,” IEEE Commun. [55] J. Bradley, J. Barbier, and D. Handler, Embracing the Internet
Surveys Tuts., vol. 16, no. 3, pp. 1709–1731, 3rd Quart., 2014. of Everything to Capture Your Share of $14.4 Trillion: More
[34] J. Shah and B. Mishra, “Customized IoT enabled wireless sensing and Relevant, Valuable Connections Will Improve Innovation, Productivity,
monitoring platform for smart buildings,” in Proc. 3rd Int. Conf. Innov. Efficiency & Customer Experience, Cisco Syst., Inc., San Jose,
Autom. Mechatronics Eng. (ICIAME), vol. 23, Feb. 2016, pp. 256–263. CA, USA, 2013. [Online]. Available: http://www.cisco.com/c/dam/
[35] G. Bedi, G. K. Venayagamoorthy, and R. Singh, “Internet of Things en_us/about/ac79/docs/innov/IoE_Economy.pdf
(IoT) sensors for smart home electric energy usage management,” in [56] AT&T and the Utilities, An Insight Into Best Practice Enablers
Proc. IEEE Int. Conf. Inf. Autom. Sustainability, Galle, Sri Lanka, 2016, in the U.S. Utility Sector, M2M Now Mag., Kings Hill,
pp. 1–6. U.K., Jul./Aug. 2015. [Online]. Available: http://www.m2mnow.biz/
[36] Sensors & Security. Accessed: Jun. 14, 2016. [Online]. Available: 2015/07/08/34626-m2m-now-magazine-july-august-2015-edition
http://www.smarthome.com/sensors-security.html [57] The Evolution of Wireless Sensor Networks, Silicon Lab., Inc.,
[37] Wireless Home Sensor Systems. Accessed: Jun. 14, 2016. [Online]. Austin, TX, USA, 2013. [Online]. Available: http://www.silabs.com/
Available: http://postscapes.com/home-wireless-sensor-systems Support%20Documents/TechnicalDocs/evolution-of-wireless-sensor-ne
[38] W. Lee et al., “Automatic agent generation for IoT-based smart house tworks.pdf
simulator,” Neurocomputing, vol. 209, pp. 14–24, Oct. 2016. [Online]. [58] Smart/Intelligent Sensors Market-Global Industry Analysis, Size,
Available: http://www.sciencedirect.com/science/article/pii/S0925231 Share, Growth, Trends and Forecast 2013–2019, Transparency
21630580X Market Res., Pune, India, Apr. 2014. [Online]. Available: http://
[39] The Beginner’s Guide to Motion Sensors, SafeWise, Bournemouth, www.transparencymarketresearch.com/smart-intelligent-sensor-market.
U.K., 2013. [Online]. Available: http://www.safewise.com/resources/ html
motion-sensor-guide [59] A. Markkanen, Competitive Edge From Edge Intelligence
[40] Perimeter Security Sensor Technologies Handbook, Defense Adv. IoT Analytics Today and in 2020, ABI Res., London, U.K.,
Res. Projects Agency, Arlington, VA, USA, and Nat. Inst. May 2015. [Online]. Available: https://www.thingworx.com/wp-
Justice, Washington, DC, USA, Jul. 1998. [Online]. Available: content/uploads/2016/05/WP_abi-research_iot-analytics-today-and-in-
https://www.ncjrs.gov/pdffiles1/Digitization/206415NCJRS.pdf 2020_EN.pdf
BEDI et al.: REVIEW OF IoT IN EPESs 867

[60] R. Hledik, “How green is the smart grid?” Electricity J., vol. 22, no. 3, [81] A. Jacobsson, M. Boldt, and B. Carlsson, “A risk analysis
pp. 29–41, Apr. 2009. of a smart home automation system,” Future Gener. Comput.
[61] M. Cullinen, “Machine to machine technologies: Unlocking the Syst., vol. 56, pp. 719–733, Mar. 2016. [Online]. Available:
potential of a $1 trillion industry,” AT&T Carbon War Room, http://www.sciencedirect.com/science/article/pii/S0167739X15002812
Washington, DC, USA, Rep., Feb. 2013. [Online]. Available: http:// [82] Y. Liu and S. Hu, “Chapter–10 smart home scheduling and cyber-
carbonwarroom.com/sites/default/files/reports/M2M%20Technologies% security: Fundamentals,” in Smart Cities and Homes, M. S. Obaidat
20%28Carbon%20War%20Room%29.pdf and P. Nicopolitidis, Eds. Boston, MA, USA: Morgan Kaufmann,
[62] Clean Power Plan Saves Nearly $40 Billion on Health, 2016, pp. 191–217. [Online]. Available: http://www.sciencedirect.com/
Too, CleanTechnica, Jul. 2016. [Online]. Available: http:// science/article/pii/B9780128034545000109
cleantechnica.com/2016/07/15/clean-power-plan-saves-nearly-40-billio [83] Y. Liu et al., “Chapter 9—Smart home cybersecurity consider-
n-health/?utm_source=feedburner&utm_medium=feed&utm_ ing the integration of renewable energy,” in Smart Cities and
campaign=Feed%3A+IM-cleantechnica+%28CleanTechnica%29 Homes, M. S. Obaidat and P. Nicopolitidis, Eds. Boston, MA, USA:
[63] “The societal impact of the Internet of Things,” BCS-OII Morgan Kaufmann, 2016, pp. 173–189. [Online]. Available: http://
Forum, London, U.K., Rep., Mar. 2013. [Online]. Available: www.sciencedirect.com/science/article/pii/B9780128034545000092
https://www.bcs.org/upload/pdf/societal-impact-report-feb13.pdf [84] V. Gazis, “A survey of standards for machine-to-machine and the
[64] The Great Convergence China Aims to Lead the World in Internet of Things,” IEEE Commun. Surveys Tuts., vol. 19, no. 1,
Connecting the Factory, Economist, London, U.K., Jul. 2016. [Online]. pp. 482–511, 1st Quart., 2017.
Available: http://www.economist.com/news/business/21702487-china- [85] Focus Group on M2M Service Layer, ITU-T, Geneva, Switzerland,
aims-lead-world-connecting-factory-great-convergence accessed: Jul. 30, 2016. [Online]. Available: http://www.itu.int/en/ITU-
T/focusgroups/m2m/Pages/default.aspx
[65] G. K. Venayagamoorthy, “Dynamic, stochastic, computational, and
[86] TS 102 689; Machine-to-Machine Communications (M2M); M2M
scalable technologies for smart grids,” IEEE Comput. Intell. Mag.,
Service Requirements Release 2, ETSI Standard TS 102 689, 2013,
vol. 6, no. 3, pp. 22–35, Aug. 2011.
accessed: Jul. 30, 2016. [Online]. Available: http://webapp.etsi.org/
[66] A. Jha and M. C. Sunil, Security Considerations for Internet of Things, workprogram/Report_WorkItem.asp?WKI_ID=38384
L&T Technol. Services, Gujarat, India, 2014. [Online]. Available: [87] oneM2M Partners. (Jul. 2012). oneM2M Partnership
http://www.lnttechservices.com/media/30090/whitepaper_security-con Agreement. [Online]. Available: http://www.onem2m.org/
siderations-for-internet-of-things.pdf docs/oneM2M_Partnership_Agreement.pdf
[67] IC Industry Waking Up to Security. Accessed: Jun. 15, 2016. [Online]. [88] TIA-4940.005: Smart Device Communications Reference
Available: http://semiengineering.com/ic-industry-waking-up-to- Architecture, Telecommunications Industry Association Standard
security/ TIA-4940.005, 2012, accessed: Jul. 30, 2016. [Online]. Available:
[68] Cyber Defense: Businesses Need Effective Security Partnerships to Stop http://global.ihs.com/search_res.cfm?RID=TIA&INPUT_DOC_NUMB
Advanced Attacks, Bloomberg Businessweek, New York, NY, USA, ER=TIA-4940
Jul. 2016. [89] Assessments and Recommendations, ATIS, Washington, DC,
[69] P. K. Choubey et al., “Power efficient, bandwidth optimized and fault USA, 2013, accessed: Jul. 30, 2016. [Online]. Available:
tolerant sensor management for IoT in smart home,” in Proc. IEEE Int. http://atis.org/M2M/index.asp
Adv. Comput. Conf. (IACC), Bengaluru, India, 2015, pp. 366–370. [90] T. Dierks and E. Rescorla, “The transport layer security (TLS) pro-
[70] M. Usman, V. Muthukkumarasamy, and X.-W. Wu, “Mobile agent- tocol version 1.2,” Internet Eng. Task Force, Fremont, CA, USA,
based cross-layer anomaly detection in smart home sensor networks RFC 5246, Aug. 2008, accessed: Jul. 30, 2016. [Online]. Available:
using fuzzy logic,” IEEE Trans. Consum. Electron., vol. 61, no. 2, http://www.ietf.org/rfc/rfc5246.txt
pp. 197–205, May 2015. [91] E. Rescorla and N. Modadugu, “Datagram transport layer secu-
[71] J. Ye, G. Stevenson, and S. Dobson, “Fault detection for binary sen- rity version 1.2,” Internet Eng. Task Force, Fremont, CA, USA,
sors in smart home environments,” in Proc. IEEE Int. Conf. Pervasive RFC 6347, Jan. 2012, accessed: Jul. 30, 2016. [Online]. Available:
Comput. Commun. (PerCom), St. Louis, MO, USA, 2015, pp. 20–28. http://www.ietf.org/rfc/rfc6347.txt
[72] M. Li and H.-J. Lin, “Design and implementation of smart home control [92] P. Thubert, “Objective function zero for the routing protocol for low-
systems based on wireless sensor networks and power line communi- power and lossy networks (RPL),” Internet Eng. Task Force, Fremont,
cations,” IEEE Trans. Ind. Electron., vol. 62, no. 7, pp. 4430–4442, CA, USA, RFC 6552, Mar. 2012, accessed: Jul. 30, 2016. [Online].
Jul. 2015. Available: http://www.ietf.org/rfc/rfc6552.txt
[73] Y. Tao, X. Xu, and X. Wang, “Service-based interactive proxy for [93] IEEE 802.24 Vertical Applications TAG, IEEE Standard 802.24,
sensor networks in smart home: An implementation of home service 2014, accessed: Jul. 30, 2016. [Online]. Available:
bus,” in Proc. 5th Int. Conf. Digit. Home (ICDH), Guangzhou, China, http://www.ieee802.org/24/
2014, pp. 237–241. [94] Sensor Web Enablement Architecture, Open Geospatial Consortium,
[74] V. Tulceanu, “A matter of trust: Smart home system relying on Wayland, MA, USA, accessed: Jul. 30, 2016. [Online]. Available:
logic, BCI, and sensor agents,” in Proc. 17th Int. Symp. Symbolic http://portal.opengeospatial.org/
Numer. Algorithms Sci. Comput. (SYNASC), Timişoara, Romania, 2015, [95] Data Distribution Service (DDS), Object Manag. Group TS, Needham,
pp. 177–180. MA, USA, 2005, accessed: Jul. 30, 2016. [Online]. Available:
http://www.omg.org/spec/DDS/
[75] Q. Wan, Y. Li, C. Li, and R. Pal, “Gesture recognition for smart
[96] Extensible Resource Identifier (XRI) Version 2.0, OASIS, Burlington,
home applications using portable radar sensors,” in Proc. 36th Annu.
MA, USA, 2005, accessed: Jul. 30, 2016. [Online]. Available:
Int. Conf. IEEE Eng. Med. Biol. Soc., Chicago, IL, USA, 2014,
http://docs.oasis-open.org/xri/xri/V2.0/xri-syntax-V2.0-cd-01.pdf
pp. 6414–6417.
[97] Extensible Resource Descriptor (XRD) Version 1.0, OASIS, Burlington,
[76] P. Györke and B. Pataki, “Energy harvesting wireless sensors for smart MA, USA, 2010, accessed: Jul. 30, 2016. [Online]. Available:
home applications,” in Proc. IEEE Int. Instrum. Meas. Technol. Conf. http://docs.oasis-open.org/xri/xrd/v1.0/cd02/xrd-1.0-cd02.html
(I2MTC), Pisa, Italy, 2015, pp. 1757–1762. [98] M. R. Palattella et al., “Standardized protocol stack for the Internet
[77] M. Á. Serna, C. J. Sreenan, and S. Fedor, “A visual programming of (important) Things,” IEEE Commun. Surveys Tuts., vol. 15, no. 3,
framework for wireless sensor networks in smart home applications,” pp. 1389–1406, 3rd Quart., 2013.
in Proc. IEEE 10th Int. Conf. Intell. Sensors Sensor Netw. Inf. Process. [99] M. Agiwal, A. Roy, and N. Saxena, “Next generation 5G wireless
(ISSNIP), Singapore, 2015, pp. 1–6. networks: A comprehensive survey,” IEEE Commun. Surveys Tuts.,
[78] A. Alami, L. Benhlima, and S. Bah, “An overview of privacy preserving vol. 18, no. 3, pp. 1617–1655, 3rd Quart., 2016.
techniques in smart home wireless sensor networks,” in Proc. 10th [100] N. Venkatesh, “Ensuring coexistence of IoT wireless protocols using
Int. Conf. Intell. Syst. Theories Appl. (SITA), Rabat, Morocco, 2015, a convergence module to avoid contention,” in Embedded Innovator,
pp. 1–4. 12th ed. Santa Clara, CA, USA: Intel IoT Solutions Alliance, 2015.
[79] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context [101] J. Chase, The Evolution of the Internet of Things, Texas
aware computing for the Internet of Things: A survey,” IEEE Commun. Instrum., Dallas, TX, USA, Sep. 2013. [Online]. Available:
Surveys Tuts., vol. 16, no. 1, pp. 414–454, 1st Quart., 2014. http://www.ti.com/lit/ml/swrb028/swrb028.pdf
[80] I. Khan et al., “Wireless sensor network virtualization: A survey,” [102] H. Shi, R. V. Prasad, E. Onur, and I. G. M. M. Niemegeers, “Fairness in
IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 553–576, 1st Quart., wireless networks: Issues, measures and challenges,” IEEE Commun.
2016. Surveys Tuts., vol. 16, no. 1, pp. 5–24, 1st Quart., 2014.
868 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

[103] R. H. Tehrani, S. Vahid, D. Triantafyllopoulou, H. Lee, and [127] B. Kantarci and H. T. Mouftah, “Greening the availability design of
K. Moessner, “Licensed spectrum sharing schemes for mobile oper- optical WDM networks,” in Proc. IEEE Workshop Green Commun.
ators: A Survey and outlook,” IEEE Commun. Surveys Tuts., vol. 18, (GLOBECOM), Dec. 2010, pp. 1417–1421.
no. 4, pp. 2591–2623, 4th Quart., 2016. [128] B. G. Bathula and J. M. H. Elmirghani, “Green networks: Energy effi-
[104] M.-L. Ku, W. Li, Y. Chen, and K. J. R. Liu, “Advances in energy cient design for optical networks,” in Proc. IFIP Int. Conf. Wireless
harvesting communications: Past, present, and future challenges,” IEEE Opt. Commun. Netw., Apr. 2009, pp. 1–5.
Commun. Surveys Tuts., vol. 18, no. 2, pp. 1384–1412, 2nd Quart., [129] N. Naas, B. Kantarci, and H. T. Mouftah, “Energy-efficient real-
2016. istic design and planning of optical backbone with multi-granular
[105] S. Sudevalayam and P. Kulkarni, “Energy harvesting sensor nodes: switching,” in Proc. ICTON, Jul. 2012, pp. 1–4.
Survey and implications,” IEEE Commun. Surveys Tuts., vol. 13, no. 3, [130] J. Chabarek et al., “Power awareness in network design and routing,”
pp. 443–461, 3rd Quart., 2011. in Proc. IEEE INFOCOM, 2008, pp. 1130–1138.
[106] P. Kamalinejad et al., “Wireless energy harvesting for the Internet of [131] J. Baliga, R. Ayre, K. Hinton, and R. S. Tucker, “Energy consumption
Things,” IEEE Commun. Mag., vol. 53, no. 6, pp. 102–108, Jun. 2015. in wired and wireless access networks,” IEEE Commun. Mag., vol. 49,
[107] A. Sample and J. R. Smith, “Experimental results with two wireless no. 6, pp. 70–77, Jun. 2011.
power transfer systems,” in Proc. 4th Int. Conf. Radio Wireless Symp., [132] M. Maier, “Fiber-wireless sensor networks (FI-WSNs) for smart grids,”
San Diego, CA, USA, Jan. 2009, pp. 16–18. in Proc. 13th IEEE ICTON, Jun. 2011, pp. 1–4.
[108] M. Erol-Kantarci and H. T. Mouftah, “Energy-efficient information and [133] N. Zaker, B. Kantarci, M. Erol-Kantarci, and H. T. Mouftah, “Quality-
communication infrastructures in the smart grid: A survey on interac- of-service-aware fiber wireless sensor network gateway design for the
tions and open issues,” IEEE Commun. Surveys Tuts., vol. 17, no. 1, smart grid,” in Proc. IEEE Int. Conf. Commun. Workshops (ICC),
pp. 179–197, 1st Quart., 2015. Budapest, Hungary, 2013, pp. 863–867.
[134] D. P. Van et al., “Energy-efficient dynamic bandwidth allocation for
[109] D. Feng et al., “A survey of energy-efficient wireless communications,”
long-reach passive optical networks,” in Proc. OptoElectron. Commun.
IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 167–178, 1st Quart.,
Conf. Aust. Conf. Opt. Fibre Technol., Melbourne, VIC, Australia,
2013.
2014, pp. 999–1001.
[110] G. Y. Li et al., “Energy-efficient wireless communications: Tutorial, [135] J. Liu et al., “New perspectives on future smart FiWi networks:
survey, and open issues,” IEEE Wireless Commun., vol. 18, no. 6, Scalability, reliability, and energy efficiency,” IEEE Commun. Surveys
pp. 28–35, Dec. 2011. Tuts., vol. 18, no. 2, pp. 1045–1072, 2nd Quart., 2016.
[111] M. A. Marsan, L. Chiaraviglio, D. Ciullo, and M. Meo, “Optimal [136] The Internet of Things: Opportunities & Challenges, Texas
energy savings in cellular access networks,” in Proc. IEEE ICC Instrum., Dallas, TX, USA. [Online]. Available: http://
Workshops, Dresden, Germany, 2009, pp. 1–5. www.ti.com/ww/en/internet_of_things/pdf/14-09-17-IoTforCap.pdf
[112] J. Gong, S. Zhou, Z. Niu, and P. Yang, “Traffic-aware base station [137] H. Hu, Y. Wen, T.-S. Chua, and X. Li, “Toward scalable systems
sleeping in dense cellular networks,” in Proc. IWQoS, Beijing, China, for big data analytics: A technology tutorial,” IEEE Access, vol. 2,
2010, pp. 1–2. pp. 652–687, 2014.
[113] C. Zhang, T. Zhang, Z. Zeng, L. Cuthbert, and L. Xiao, “Optimal [138] Neurons and Synapses. Accessed: Sep. 4, 2016. [Online]. Available:
locations of remote radio units in coMP systems for energy efficiency,” http://www.human-memory.net/brain_neurons.html
in Proc. IEEE VTC-Fall, Ottawa, ON, Canada, 2010, pp. 1–5. [139] M. Trevathan, Why the IoT Ecosystem Is Like the Nervous System,
[114] G. Gür and F. Alagöz, “Green wireless communications via cogni- Internet Things Inst., San Francisco, CA, USA, Jul. 2016. [Online].
tive dimension: An overview,” IEEE Netw., vol. 25, no. 2, pp. 50–56, Available: http://www.ioti.com/iot-strategy/why-iot-ecosystem-
Mar./Apr. 2011. nervous-system
[115] M. Erol-Kantarci and H. T. Mouftah, “Wireless sensor networks for [140] K. Ashton. The Internet of Things Is Becoming a Nervous
cost-efficient residential energy management in the smart grid,” IEEE System. Accessed: Aug. 4, 2016. [Online]. Available: https://www.
Trans. Smart Grid, vol. 2, no. 2, pp. 314–325, Jun. 2011. theintelligenceofthings.com/article/the-internet-or-things-is-becoming-
[116] D. Bandyopadhyay and J. Sen, “Internet of Things: Applications and a-new-nervous-system/
challenges in technology and standardization,” Wireless Pers. Commun., [141] S. Sarkar, S. Chatterjee, and S. Misra, “Assessment of the suitability
vol. 58, no. 1, pp. 49–69, May 2011. of fog computing in the context of Internet of Things,” IEEE Trans.
[117] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks Cloud Comput., to be published.
with RF energy harvesting: A contemporary survey,” IEEE Commun. [142] S. K. Datta, C. Bonnet, and J. Haerri, “Fog computing architec-
Surveys Tuts., vol. 17, no. 2, pp. 757–789, 2nd Quart., 2015. ture to enable consumer centric Internet of Things services,” in
[118] M. F. Brejza et al., “20 years of turbo coding and energy-aware Proc. Int. Symp. Consum. Electron. (ISCE), Madrid, Spain, 2015,
design guidelines for energy-constrained wireless applications,” IEEE pp. 1–2.
Commun. Surveys Tuts., vol. 18, no. 1, pp. 8–28, 1st Quart., 2016. [143] A. Bader, H. Ghazzai, A. Kadri, and M. S. Alouini, “Front-end intel-
[119] H. Sun, A. Nallanathan, and J. Jiang, “Improving the energy efficiency ligence for large-scale application-oriented Internet-of-Things,” IEEE
of power line communications by spectrum sensing,” in Proc. Int. Conf. Access, vol. 4, pp. 3257–3272, 2016.
Adv. Comput. Commun. Informat., 2012, pp. 758–762. [144] M. Yannuzzi, R. Milito, R. Serral-Gracià, D. Montero, and
M. Nemirovsky, “Key ingredients in an IoT recipe: Fog comput-
[120] H. Sun, A. Nallanathan, N. Zhao, and C.-X. Wang, “Green data trans-
ing, cloud computing, and more fog computing,” in Proc. IEEE 19th
mission in power line communications,” in Proc. IEEE GLOBECOM,
Int. Workshop Comput.-Aided Model. Design Commun. Links Netw.
Dec. 2012, pp. 3702–3706.
(CAMAD), Athens, Greece, 2014, pp. 325–329.
[121] A. Hamini, J.-Y. Baudais, and J.-F. Hélard, “Green resource allocation [145] S. Sarkar and S. Misra, “Theoretical modelling of fog computing: A
for powerline communications,” in Proc. IEEE ISPLC Appl., Apr. 2011, green computing paradigm to support IoT applications,” IET Netw.,
pp. 393–398. vol. 5, no. 2, pp. 23–29, Mar. 2016.
[122] HomePlug Green PHY 1.1 Specification, HomePlug Alliance, Portland, [146] (Jan. 2014). Cisco Delivers Vision of Fog Computing to Accelerate
OR, USA, 2012, accessed: Jul. 30, 2016. [Online]. Available: Value From Billions of Connected Devices. [Online]. Available:
http://www.homeplug.org/tech/whitepapers/HomePlug_Green_PHY_w http://newsroom.cisco.com/release/1334100/Cisco-Delivers-Vision-
hitepaper_121003.pdf of-Fog-Computing-to-Accelerate-Value-from-Billions-of-Connected-
[123] K. Christensen et al., “IEEE 802.3az: The road to energy efficient Devices-utm-medium-rss
Ethernet,” IEEE Commun. Mag., vol. 48, no. 11, pp. 50–56, Nov. 2010. [147] O. Salman, I. Elhajj, A. Kayssi, and A. Chehab, “Edge computing
[124] L. Chiaraviglio, M. Mellia, and F. Neri, “Reducing power consump- enabling the Internet of Things,” in Proc. IEEE 2nd World Forum
tion in backbone networks,” in Proc. IEEE ICC, Dresden, Germany, Internet Things (WF IoT), Milan, Italy, 2015, pp. 603–608.
Jun. 2009, pp. 1–6. [148] V. Gazis et al., “Components of fog computing in an industrial
[125] F. Idzikowski, S. Orlowski, C. Raack, H. Woesner, and A. Wolisz, Internet of Things context,” in Proc. 12th Annu. IEEE Int. Conf. Sens.
“Saving energy in IP-over-WDM networks by switching off line Commun. Netw. Workshops (SECON Workshops), Seattle, WA, USA,
cards in low-demand scenarios,” in Proc. Conf. ONDM, Kyoto, Japan, 2015, pp. 1–6.
Feb. 2010, pp. 1–6. [149] K. Lee, D. Kim, D. Ha, U. Rajput, and H. Oh, “On security and privacy
[126] G. Shen and R. S. Tucker, “Energy-minimized design for IP over issues of fog computing supported Internet of Things environment,” in
WDM networks,” IEEE/OSA J. Opt. Commun. Netw., vol. 1, no. 1, Proc. 6th Int. Conf. Netw. Future (NOF), Montreal, QC, Canada, 2015,
pp. 176–186, Jun. 2009. pp. 1–3.
BEDI et al.: REVIEW OF IoT IN EPESs 869

[150] S. Dey, A. Mukherjee, H. S. Paul, and A. Pal, “Challenges [172] H. Lin, S. Sambamoorthy, S. Shukla, J. Thorp, and L. Mili, “A study
of using edge devices in IoT computation grids,” in Proc. Int. of communication and power system infrastructure interdependence
Conf. Parallel Distrib. Syst. (ICPADS), Seoul, South Korea, 2013, on PMU-based wide area monitoring and protection,” in Proc. Power
pp. 564–569. Energy Soc. Gen. Meeting, San Diego, CA, USA, Jul. 2012, pp. 1–7.
[151] D. R. D. Vasconcelos, R. M. D. C. Andrade, and J. N. D. Souza, “Smart [173] R. Brooks, Introduction to Computer and Network Security Navigating
shadow—An autonomous availability computation resource allocation Shades of Gray. Boca Raton, FL, USA: Taylor and Francis Group,
platform for Internet of Things in the fog computing environment,” in 2014.
Proc. Int. Conf. Distrib. Comput. Sensor Syst., Fortaleza, Brazil, 2015, [174] T. Baumeister, “Literature review on smart grid cyber security,”
pp. 216–217. Dept. Inf. Comput. Sci., Univ. Hawaii Manoa, Honolulu, HI, USA,
[152] W. Xia, Y. Wen, C. H. Foh, D. Niyato, and H. Xie, “A survey on Dec. 2010.
software-defined networking,” IEEE Commun. Surveys Tuts., vol. 17, [175] R. Smith, Assault on California Power Station Raises Alarm
no. 1, pp. 27–51, 1st Quart., 2015. on Potential for Terrorism, Wall Street J., New York, NY,
[153] B. A. A. Nunes, M. Mendonca, X.-N. Nguyen, K. Obraczka, and USA, Feb. 2014. [Online]. Available: http://www.wsj.com/articles/
T. Turletti, “A survey of software-defined networking: Past, present, SB10001424052702304851104579359141941621778
and future of programmable networks,” IEEE Commun. Surveys Tuts., [176] Nuclear Security. Accessed: Jan. 19, 2017. [Online].
vol. 16, no. 3, pp. 1617–1634, 3rd Quart., 2014. Available: http://www.ucsusa.org/nuclear-power/nuclear-plant-
[154] H. Xie, Y. Yang, A. Krishnamurthy, Y. Liu, and A. Silberschatz, “P4P: security#.WIEgFlMrJQI
Provider portal for applications,” ACM SIGCOMM Comput. Commun. [177] Defending Against Sabotage and Terrorist Attacks. Accessed:
Rev., vol. 38, no. 4, pp. 351–362, Aug. 2008. Jan. 19, 2017. [Online]. Available: http://www.ucsusa.org/sites/
[155] T.-Y. Huang, N. Handigol, B. Heller, N. McKeown, and R. Johari, default/files/legacy/assets/documents/nuclear_power/NPWWch3.pdf
“Confused, timid, and unstable: Picking a video streaming rate is hard,”
[178] T. Morris et al., “Cyber security testing of substation phasor measure-
in Proc. ACM Internet Meas. Conf., 2012, pp. 225–238.
ment units and phasor data concentrators,” in Proc. 8th Annu. ACM
[156] X. Chen, Z. M. Mao, and J. Van Der Merwe, “ShadowNet: A platform
Cyber Security Inf. Intell. Res. Workshop (CSIIRW), 2011, p. 24.
for rapid and safe network evolution,” in Proc. USENIX Annu. Tech.
Conf., 2009, p. 3. [179] Teardrop Attack. Accessed: Jan. 19, 2017. [Online]. Available:
[157] R. Perlman, “Rbridges: Transparent routing,” in Proc. 23rd Annu. Joint https://security.radware.com/ddos-knowledge-center/ddospedia/teardro
Conf. IEEE INFOCOM, vol. 2, 2004, pp. 1211–1218. p-attack/
[158] R. Perlman, D. Eastlake, III, S. Gai, D. Dutt, and A. Ghanwani, [180] I. Ozcelik, Y. Fu, and R. R. Brooks, “DoS detection is easier now,” in
“Routing bridges (RBridges): Base protocol specification,” Internet Proc. Res. Educ. Exp. Workshop (GREE), 2013, pp. 50–55.
Eng. Task Force, Fremont, CA, USA, RFC 6325, Jul. 2011, accessed: [181] Deflect. Accessed: Sep. 4, 2016. [Online]. Available:
Jul. 30, 2016. [Online]. Available: http://tools.ietf.org/rfc/rfc6325.txt https://equalit.ie/portfolio/deflect
[159] “Software-defined networking: The new norm for networks,” Palo Alto, [182] S. T. Zargar, J. Joshi, and D. Tipper, “A survey of defense mechanisms
CA, USA, Open Netw. Found., White Paper, Apr. 2012, accessed: against distributed denial of service (DDoS) flooding attacks,” IEEE
Jul. 30, 2016. [Online]. Available: https://www.opennetworking.org/ Commun. Surveys Tuts., vol. 15, no. 4, pp. 2046–2069, 4th Quart.,
images/stories/downloads/white- papers/wp-sdn-newnorm.pdf 2013.
[160] Vulnerability Analysis of Energy Delivery Control Systems, Idaho [183] Y. Yan, Y. Qian, H. Sharif, and D. Tipper, “A survey on cyber security
Nat. Lab., Idaho Falls, ID, USA, Sep. 2011. [Online]. Available: for smart grid communications,” IEEE Commun. Surveys Tuts., vol. 14,
http://energy.gov/sites/prod/files/Vulnerability%20Analysis%20of%20 no. 4, pp. 998–1010, 4th Quart., 2012.
Energy%20Delivery%20Control%20Systems%202011.pdf [184] W. F. Boyer and S. A. McBride, “Study of security attributes of smart
[161] N. Komninos, E. Philippou, and A. Pitsillides, “Survey in smart grid systems–current cyber security issues,” Battelle Energy Alliance
grid and smart home security: Issues, challenges and countermea- LLC., Idaho Nat. Lab., U.S. Dept. Energy, Washington, DC, USA,
sures,” IEEE Commun. Surveys Tuts., vol. 16, no. 4, pp. 1933–1954, Rep. INL/EXT-09-15500, Apr. 2009.
4th Quart., 2014. [185] J. Stewart, T. Maufer, R. Smith, C. Anderson, and E. Ersonmez,
[162] S. Hilton. (Oct. 2016). Dyn Analysis Summary of Friday October “Synchrophasor security practices,” in Proc. 14th Annu. Georgia Tech
21 Attack. [Online]. Available: http://dyn.com/blog/dyn-analysis- Fault Disturb. Anal. Conf., Atlanta, GA, USA, 2011, pp. 1–10.
summary-of-friday-october-21-attack/ [186] S. Siddharth, A. Hahn, and M. Govindarasu, “Cyber–physical system
[163] C. Doctorow, Proof-of-Concept Ransomware for Smart Thermostats security for the electric power grid,” Proc. IEEE, vol. 100, no. 1,
Demoed at Defcon, Boingboing, Aug. 2016. [Online]. Available: http:// pp. 210–224, Jan. 2012.
boingboing.net/2016/08/08/proof-of-concept-ransomware-fo.html [187] R. Lemos, Microsoft Warns of Hijacked Certificates, CNET Tech
[164] M. Frauenfelder, 75 Percent of Bluetooth Smart Locks Can Ind., San Francisco, CA, USA, Jan. 2002. [Online]. Available:
Be Hacked, Boingboing, Aug. 2016. [Online]. Available: https://www.cnet.com/news/microsoft-warns-of-hijacked-certificates/
http://boingboing.net/2016/08/08/75-percent-of-bluetooth-smart.html [188] R. Oppliger, R. Hauser, and D. Basin, “SSL/TLS session-aware user
[165] K. Hill, This Guy’s Light Bulb Performed a DoS Attack authentication,” Computer, vol. 41, no. 3, pp. 59–65, Mar. 2008.
on His Entire Smart House, Fusion, Newberg, OR, USA, [189] X. Zhong et al., “Side channel analysis of multiple PMU data in electric
Mar. 2015. [Online]. Available: http://fusion.net/story/55026/this-guys- power systems,” in Proc. Clemson Univ. Power Syst. Conf. (PSC), 2015,
light-bulb-ddosed-his-entire-smart-house/ Clemson, SC, USA, 2015, pp. 1–6.
[166] How a Few Words to Siri Unlocked a Man’s Front Door
[190] H. Bhanu et al., “Side-channel analysis for detecting protocol tunnel-
and Exposed a Major Security Flaw in Apple’s HomeKit,
ing,” Adv. Internet Things, vol. 1, no. 2, pp. 13–26, 2011.
Forbes, New York, NY, USA, Sep. 2016. [Online]. Available:
http://www.forbes.com/sites/aarontilley/2016/09/21/apple-homekit-siri- [191] C. Beasley, “Electric power synchrophasor network cyber security vul-
security/#f5fa4b6e8a3d nerabilities,” M.S. thesis, Dept. Elect. Comput. Eng., Clemson Univ.,
[167] J. D. Howard and T. A. Longstaff, “A common language for com- Clemson, SC, USA, 2014.
puter security incidents,” Sandia Nat. Lab., Livermore, CA, USA, [192] R. R. Brooks, Disruptive Security Technologies With Mobile Code and
Oct. 1998. [Online]. Available: http://prod.sandia.gov/techlib/access- Peer-to-Peer Networks. Boca Raton, FL, USA: CRC Press, 2005.
control.cgi/1998/988667.pdf [193] Y. Guan et al., “NetCamo: Camouflaging network traffic for QoS-
[168] W. Stallings, Network and Internetwork Security. Upper Saddle River, guaranteed mission critical applications,” IEEE Trans. Syst., Man,
NJ, USA: Prentice-Hall, 1995. Cybern. A, Syst., Humans, vol. 31, no. 4, pp. 253–265, Jul. 2001.
[169] R. R. Brooks, S. Sander, J. Deng, and J. Taiber, “Automotive secu- [194] F. Callegati, W. Cerroni, and M. Ramilli, “Man-in-the-middle attack to
rity concerns: Challenges and state of the art of automotive system the HTTPS protocol,” IEEE Security Privacy, vol. 7, no. 1, pp. 78–81,
security,” IEEE Veh. Technol. Mag., to be published. Jan./Feb. 2009.
[170] C. Beasley, X. Zhong, J. Deng, R. Brooks, and G. K. Venayagamoorthy, [195] S. D’Antonio, L. Coppolino, I. A. Elia, and V. Formicola, “Security
“A survey of electric power synchrophasor network cyber security,” in issues of a phasor data concentrator for smart grid infrastructure,” in
Proc. IEEE PES Innov. Smart Grid Technol. Europe, Istanbul, Turkey, Proc. 13th ACM Eur. Workshop Depend. Comput., Pisa, Italy, 2011,
2014, pp. 1–5. pp. 3–8.
[171] E. Bou-Harb, C. Fachkha, M. Pourzandi, M. Debbabi, and C. Assi, [196] G. J. W. Halfond and A. Orso, “AMNESIA: Analysis and monitoring
“Communication security for smart grid distribution networks,” IEEE for NEutralizing SQL-injection attacks,” in Proc. 20th IEEE/ACM Int.
Commun. Mag., vol. 51, no. 1, pp. 42–49, Jan. 2013. Conf. Autom. Softw. Eng., 2005, pp. 174–183.
870 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018

[197] K. Deltchev, “New Web 2.0 attacks,” Bachelor’s thesis, Dept. Rajendra Singh (S’75–M’79–SM’82–F’02–LF’12)
Elect. Eng. Inf. Sci., Ruhr-Univ. at Bochum, Bochum, Germany, is a D. Houser Banks Professor with the Holcombe
Feb. 2010. [Online]. Available: http://www.slideshare.net/test2v/new- Department of Electrical and Computer Engineering
web-20-attacks and Automotive Engineering, Clemson University,
[198] Tutorial on Defending Against SQL Injection Attacks, Oracle, Redwood Clemson, SC, USA, where he is also the Director
City, CA, USA, accessed: Jan. 19, 2017. [Online]. Available: of the Center for Nanoelectronics. He left India in
http://download.oracle.com/oll/tutorials/SQLInjection/index.htm 1973 and during the energy crisis of 1973 decided
[199] P. Hooimeijer, B. Livshits, D. Molnar, P. Saxena, and M. Veanes, to do Ph.D. dissertation in the area of silicon solar
“Fast and precise sanitizer analysis with BEK,” in Proc. 20th cells. In the last 43 years, he has contributed and
USENIX Conf. Security (SEC), Berkeley, CA, USA, 2011, witnessed the growth of photovoltaic and semicon-
p. 1. [Online]. Available: http://www.msr-waypoint.com/en- ductor industries. With the proven success in opera-
us/um/people/livshits/papers/pdf/usenixsec11a.pdf tions, project/program leadership, research and development, product/process
[200] D. P. Shepard, T. E. Humphreys, and A. A. Fansler, “Evaluation of the commercialization, and start-ups, he is a leading technologist with the focused
vulnerability of phasor measurement units to GPS spoofing attacks,” goal of eradication of energy poverty and poverty of under privileged people
Int. J. Crit. Infrastruct. Protect., vol. 5, nos. 3–4, pp. 146–153, 2012. all over the world.
[201] D.-Y. Yu, A. Ranganathan, T. Locher, S. Capkun, and D. Basin, “Short Dr. Singh was a recipient of number of international awards, and the White
paper: Detection of GPS spoofing attacks in power grids,” in Proc. ACM House Champion of Change for Solar Deployment by former U.S. President
Conf. Security Privacy Wireless Mobile Netw., 2014, pp. 99–104. Barack Obama for his leadership in advancing solar energy with photovoltaics
[202] S. Cui et al., “Coordinated data-injection attack and detection in the technology in 2014. He is a Fellow of the SPIE, ASM, and AAAS.
smart grid: A detailed look at enriching detection solutions,” IEEE
Signal Process. Mag., vol. 29, no. 5, pp. 106–115, Sep. 2012.

Guneet Bedi (GS’13) received the B.E. degree


in electronics and telecommunication from the
University of Pune, Pune, India, in 2011, and the
M.S. degree in electrical engineering from Clemson
University, Clemson, SC, USA, in 2014, where he
is currently pursuing the Ph.D. degree (with a focus
on Internet of Things applications in electric power
and energy systems) at the Department of Electrical
and Computer Engineering. Richard R. Brooks (M’97–SM’04) received
He was a Graduate Research, Teaching, the B.A. degree in mathematical sciences from
Instructional, and Grading Assistant, as well as The Johns Hopkins University, Baltimore, MD,
a Mentor for K-12 and undergraduate science enrichment programs. He has USA, and the Ph.D. degree in computer science
authored or co-authored several peer-reviewed papers and has presented his from Louisiana State University, Baton Rouge, LA,
research at a number of conferences. USA.
Dr. Bedi was a recipient of awards for his outstanding scholarship, leader- He was the Head of the Pennsylvannia State
ship, teaching, and service. He has also served as a Reviewer for the IEEE University ARL Distributed Systems Department,
I NTERNET OF T HINGS J OURNAL and the Elsevier Computers and Security State College, PA, USA, for seven years. He
Journal. Besides his academic pursuits, he has served as the President of is currently a Professor of computer engineering
the Graduate Student Government and International Student Association, with Clemson University, Clemson, SC, USA. His
and the Vice-President of the Clemson Indian Students’ Association. He network security research projects have included funding from the NSF
is a Graduate Student Member of the Omicron Delta Kappa national level (analyzing denial of service), DoE (authentication and authorization), BMW
leadership honor society. Corporation (penetration testing), NIST (standards definition), AFOSR (timing
side-channels), and the U.S. State Department (creating anonymous commu-
nications tools). He finds attacks that disable security measures by working
at a different level of the protocol stack. His Internet freedom work involves
Ganesh Kumar Venayagamoorthy (S’98–M’99–
interactions with at risk populations working for freedom of expression.
SM’02) is currently the Duke Energy Distinguished
Professor of Power Engineering and a Professor
of Electrical and Computer Engineering and
Automotive Engineering with Clemson University,
Clemson, SC, USA, where he is also the Founder
and Director of the Real-Time Power and Intelligent
Systems Laboratory. He is an Honorary Professor
with the School of Engineering, University of
KwaZulu-Natal, Durban, South Africa. He has been
involved in ∼70 sponsored projects in excess of
$10 million. He has authored or co-authored ∼500 refereed technical papers
with ∼14 000 citations and an H-index of 59. His current research interests
include research, development, and innovation of advanced computational
methods for smart grid operations, including intelligent sensing and monitor- Kuang-Ching Wang (S’98–M’04–SM’12) received
ing, power system optimization, stability and control, and signal processing. the B.S. and M.S. degrees in electrical engineering
Dr. Venayagamoorthy was a recipient of several awards from the IEEE and from National Taiwan University, Taipei, Taiwan, in
other professional societies and institutions for his contributions to the field 1997 and 1999, respectively, and the M.S. and Ph.D.
of electrical and electronic engineering. He has served as an Editor/Guest degrees in electrical engineering from the University
Editor of several IEEE and Elsevier journals. He is involved in the leader- of Wisconsin–Madison, Madison, WI, USA, in 2001
ship and organization of several conferences including as the General Chair and 2003, respectively.
of the Power System Conference, Clemson, since 2013, and the pioneer Since 2004, he has been with the Department
and Chair/Co-Chair of the IEEE Symposium of Computational Intelligence of Electrical and Computer Engineering, Clemson
Applications in Smart Grid since 2011. He is currently the Chair of the IEEE University, Clemson, SC, USA, where he is currently
PES Working Group on Intelligent Control Systems and the Founder and a Professor and a Networking CTO. His current
Chair of the IEEE Computational Intelligence Society Task Force on Smart research interests include network communication quality of service, with
Grid. He is a Senior Member of the International Neural Network Society a present focus on software-defined networking and future cloud computing
and a Fellow of the IET, U.K. and SAIEE, South Africa. systems.

You might also like