Mobile users can open program in new tab for better viewing.

Open program in new tab

Day 1 12/12/2020
Room #1

Welcome message by the General Chair, Maggie Cheng 09:10 - 09:15

starts at 9:10 China Standard Time

Welcome message by the Conference Manager 09:15 - 09:20

Natasha Onofrei

Welcome message by EAI Community Manager 09:15 - 09:20

Michal Dudic

Keynote: Prof. Jianhui Wang 09:20 - 10:25

Title: Grid Modernization: Challenges, Opportunities, and Solutions

Coffee Break 10:25 - 10:35

Technical Session I 10:35 - 11:55

Session Chair: Yuan Hong
10:35 - 10:55
A New Similarity Measurement method for The Power Load Curves Analysis

In order to improve the quality of the power load curves similarity measurement, a new similarity measurement method based on Euclidean distance is proposed in this paper. Among the commonly used similarity measurement methods, Euclidean distance is not sensitive to the fluctuation of the load curves, which results in the lack of shape measurement capability. For the numerical distribution on the timeline is not concerned, the dynamic time warping (DTW) distance is not accord with the requirement of the power system load analysis. Focus on those issues, the proposed method introduced a correction factor that contains the dynamic characteristics of the numerical difference between two power load curves without compromising time warping. The advantages and performance of the proposed method are evaluated by similarity computing and clustering analysis. It shows that the proposed method has higher tracking accuracy compared with Euclidean distance and faster calculating speed compared with DTW distance.
Authors: Xin Ning (State Grid Sichuan Electric Power Research Institute), Ke Zhu (State Grid Sichuan Electric Power Research Institute), Yuanshi Deng (State Grid Sichuan Electric Power Research Institute), Rui Zhang (State Grid Sichuan Electric Power Research Institute), Qi Chen (North China Electric Power University), Zhong Li (North China Electric Power University),
Hide Authors & Abstract

Show Authors & Abstract
10:55 - 11:15
Resource Prediction and Allocation Method for 5G C-RAN Based on Power Internet of Things

The construction of power Internet of things is an important practice of network power strategy, which can greatly improve the coordination and data connectivity between various businesses of power grid. With the continuous maturity of 5G technology, it also can be used as an alternative access network solution. Facing the power Internet of things, this paper discusses the feasibility of C-RAN cloud wireless access network architecture in the power Internet of things access. Furthermore, this paper designs the base station traffic prediction algorithm based on LSTM and the network resource allocation algorithm based on genetic algorithm, which improves the utilization efficiency of network resources, and is of great significance for the future access network in the power industry to save construction costs and energy consumption.
Authors: Junfeng Lv (State Grid Information and Telecommunication Branch), Zifan Li (State Grid Information and Telecommunication Branch), Bozhong Li (State Grid Information and Telecommunication Branch), Fang Chen (State Grid Information and Telecommunication Branch), Zhengyuan Liu (Beijing University of Posts and Telecommunications), Peng Yu (Beijing University of Posts and Telecommunications),
Hide Authors & Abstract

Show Authors & Abstract
11:15 - 11:35
Design and implementation of D2D Communication-based 5G Cloud Radio Access Networks Cell Outage Compensation Method

As 5G officially enters the commercial era, heterogeneous networks will face massive data traffic requirements and frequent communication overheads in the future. How to ensure user service quality and reduce energy consumption is a key challenge for major operators. The wireless cloud network is considered as one of the architectures to solve this problem, and its biggest advantage is that it can quickly and flexibly access the dynamically configured resources of the shared pool. Existing research on cell interruption compensation technology mainly focuses on the optimization and adjustment of parameters of neighboring cells, which easily affects the original network topology. This paper proposes a cell interruption compensation scheme based on D2D technology, focusing on routing and resource allocation In two stages of research, a routing algorithm based on the attributes of social networks was proposed, and the encounter model in social networks was introduced in the resource allocation link. Simulation results show that the scheme further reduces system energy consumption and delays the growth rate of energy consumption compared with traditional methods.
Authors: Junli Mao (The 54th Research Institute of CETC), Donghong Wei (The 54th Research Institute of CETC), Qicai Wang (The 54th Research Institute of CETC), Haoyu Wang (Beijing University of Posts and Telecommunications), Peng Yu (Beijing University of Posts and Telecommunications),
Hide Authors & Abstract

Show Authors & Abstract
11:35 - 11:55
Service Capability Optimization Algorithm for Power Communication Network Service Providers in Competitive Game Environment

In order to solve the problem of low resource utilization rate of multiple power communication network service providers, this paper proposes a power communication network resource management system, which consist-ing of the self-built power communication network service provider, the third-party power communication network service provider, a power com-munication network resource allocation center, and the demand side of pow-er communication network. Secondly, the competitor's service cost coeffi-cient is solved to obtain the competitor's competitive strategy, using the pre-dictive mechanism of the service cost coefficient probability density func-tion; and the reaction function based inference process is transformed to ob-tain the Jacobin iterative formula of service capability. Finally, a service ca-pability optimization algorithm based on Jacobi iteration is proposed. In the simulation experiment part, the competition game model is simulated, which proves that the algorithm is more in line with the real environment than the competition game under the complete information. It is more practical for the power company to choose the power communication network service pro-vider.
Authors: Zhi Li (Marketing Service Center (Measurement Center) of State Grid Chongqing Electric Power Company), Kai Duan (Marketing Service Center (Measurement Center) of State Grid Chongqing Electric Power Company), Tingting Xu (Marketing Service Center (Measurement Center) of State Grid Chongqing Electric Power Company),
Hide Authors & Abstract

Show Authors & Abstract

Lunch 11:55 - 13:00

Technical Session II 13:00 - 14:20

Session Chair: Peng Yu
13:00 - 13:20
Multi-domain Cooperative Service Fault Diagnosis Algorithm under Network Slicing with Software Defined Networks

In order to solve the problem of low accuracy of fault diagnosis algorithms in multiple management domain environments such as such as Software De-fined Networks (SDN), this paper proposes a multi-domain cooperative ser-vice fault diagnosis algorithm under network slice based on the correlation between faults and symptoms. According to the relationship between the management domain and the symptoms, the network resources correspond-ing to the symptoms are divided into resources within the management do-main and inter-domain resources. When constructing a suspected fault set, the suspected fault set is constructed according to the number of simultane-ous faults, and the final suspected fault set is determined by calculating the interpretation capability of the suspected fault. Finally, according to Bayesi-an theory, the fault set with the highest probability is regarded as the most probable fault set. Compared with the existing classical algorithms in the ex-perimental part, it is verified that the algorithm in this paper improves the accuracy of fault diagnosis and reduces the false alarm rate of fault diagno-sis.
Authors: Wei Li (Communication branch, State Grid Jiangsu Electric Power Co.,LTD., Jiangsu, China), Yong Dai (Communication branch, State Grid Jiangsu Electric Power Co.,LTD., Jiangsu, China), Yong Xu (Communication branch, State Grid Jiangsu Electric Power Co.,LTD., Jiangsu, China), Xilao Wu (Communication branch, State Grid Jiangsu Electric Power Co.,LTD., Jiangsu, China), Wei Li (Communication branch, State Grid Jiangsu Electric Power Co.,LTD., Jiangsu, China), Peng Lin (Beijing Vectinfo Technologies Co., LTD.),
Hide Authors & Abstract

Show Authors & Abstract
13:20 - 13:40
Fault Diagnosis Algorithm Based on Service Characteristics under Software Defined Network Slicing

In order to solve the problem of low accuracy of fault diagnosis algorithms brought by network dynamics, this paper proposes a fault diagnosis algo-rithm based on service characteristics under software defined network slic-ing. In order to reduce the problem of inaccurate symptom information caused by network dynamics, the credibility of symptoms is calculated based on the alternative probabilistic characteristics of network nodes, and the symptom information is corrected. The node importance is analyzed from the two dimensions of node centrality and number of links. Based on the node importance and symptom information, the reliability of the node fail-ure is ranked. Finally, based on the maximum coverage algorithm, the opti-mal set of suspected faults is selected from the set of suspected faults as the final set of faults. The experiment compares the algorithm in this paper with the existing algorithm, and verifies that the algorithm in this paper effective-ly improves the accuracy of fault diagnosis.
Authors: Wei Li (Communication branch, State Grid Jiangsu Electric Power Co.,LTD., Jiangsu, China), Hao Cai (Communication branch, State Grid Jiangsu Electric Power Co.,LTD., Jiangsu, China), Chunxia Jiang (Communication branch, State Grid Jiangsu Electric Power Co.,LTD., Jiangsu, China), Ping Xia (Communication branch, State Grid Jiangsu Electric Power Co.,LTD., Jiangsu, China), Song Jiang (Communication branch, State Grid Jiangsu Electric Power Co.,LTD., Jiangsu, China), Peng Lin (Beijing Vectinfo Technologies Co., LTD.),
Hide Authors & Abstract

Show Authors & Abstract
13:40 - 14:00
Security Situation Awareness and Interference Control Method for Power Wireless Private Networks based on Dynamic Baseline

The interference of the power wireless private network will directly affect the service quality of the power business, and then affect the stable operation of the power distribution network. Therefore, it is of great value to study the security situation awareness and interference control technology of electric power wireless private network. Existing research has seldom considered security situational awareness and control methods for power wireless private networks. Firstly, according to the signal-to-noise ratio data obtained by the network management system, combined with the upper and lower baselines and user proportion, the interference is identified. According to the interference scenario, the corresponding power adjustment scheme is proposed according to the different scale of users to ensure the stability of the system. In view of the influence of power adjustment, the dynamic change method of interference identification baseline is proposed, which provides reasonable interference control requirement standard for base station to adjust transmission power control interference, and improves the flexibility of service performance guarantee.
Authors: Jin Huang (State Grid Jiangsu Electric Power Co., Ltd. Information & Telecommunication Branch), Weiwei Miao (State Grid Jiangsu Electric Power Co., Ltd. Information & Telecommunication Branch), Junzhong Yang (State Grid Jiangsu Electric Power Co Ltd.,Taizhou Power Supply Branch), Xinglong Wang (State Grid Jiangsu Electric Power Co Ltd.,Taizhou Power Supply Branch), Linshan Shi (State Grid Chongqing Electric Power Company), Zhengyuan Liu (Beijing University of Posts and Telecommunications), Peng Yu (Beijing University of Posts and Telecommunications),
Hide Authors & Abstract

Show Authors & Abstract
14:00 - 14:20
Energy-Aware Blockchain Resource Allocation Algorithm with Deep Reinforcement Learning for Trusted Authentication

Internet of things (IoT) technology is in continuous development, and the ac-cess of the IoT power terminal is facing various security threats such as data tampering and malicious attacks. Thus, we propose a blockchain-based edge-terminal collaborative resource allocation architecture to solve these security problems, which places the terminal trusted authentication data on the block-chain to realize the security of the terminal authentication information. Since the mining process of the blockchain system will generate a large number of computing intensive tasks, this paper establishes an energy-oriented block-chain mining task offloading model, and proposes the energy-aware block-chain resource allocation (EABRA) algorithm with deep reinforcement learn-ing (DRL) to jointly optimize the offloading decision and transmission power allocation decision. Finally, the simulation results show that the EABRA al-gorithm can save 68.87% energy consumption than the Random algorithm, which verifies the correctness and feasibility of the scheme.
Authors: Lifang Gao (State Grid Hebei Information & Telecommunication Branch Shijiazhuang, China), Xiaotao Zhang (AOSTAR INFORMATION TECHNOLOGIES CO., LTD. 2688 Xiyuan Dadu, South of Modern Industrial Port, Chengdu, China), Tingfeng Liu (AOSTAR INFORMATION TECHNOLOGIES CO., LTD. 2688 Xiyuan Dadu, South of Modern Industrial Port, Chengdu, China), Huifeng Yang (State Grid Hebei Information & Telecommunication Branch Shijiazhuang, China), Boxian Liao (Beijing University of Posts and Telecommunications), Jing Guo (AOSTAR INFORMATION TECHNOLOGIES CO., LTD. 2688 Xiyuan Dadu, South of Modern Industrial Port, Chengdu, China),
Hide Authors & Abstract

Show Authors & Abstract

Coffee Break 14:20 - 14:30

Technical Session III 14:30 - 15:30

Session Chair: Huibin Jia
14:30 - 14:50
IPv6 Header Compression Scheme for Power Internet of Things

In power Internet of Things, to enable the underlying nodes to communicate with an IPv6 network, a 6LoWPAN adaptation layer must be supported through a gateway to seamlessly connect them to implement IPv6 and IEEE802.15.4 protocols. The 6LoWPAN adaptation layer can improve the transmission efficiency of data packets by compressing IPv6 data headers. According to the characteristics of energy metering systems in smart grids, UDP is used as a default transmission layer protocol. Based on existing header compression schemes, an adaptive hybrid header compression scheme was proposed for energy metering systems. The experimental results illustrated that the scheme performs satisfactorily in both local and global links, and its compression efficiency is approximately 2% higher than that of existing compression schemes.
Authors: Xiaoyu Wang (China Institute of Information and Communication), Xu Lu (China Institute of Information and Communication), Chuan Liu (Global Energy Interconnection Research Institute Co., Ltd, State Grid Laboratory of Electric Power Communication Network Technology), Jing Tao (Global Energy Interconnection Research Institute Co., Ltd, State Grid Laboratory of Electric Power Communication Network Technology), Zhonghua Liang (China Institute of Information and Communication),
Hide Authors & Abstract

Show Authors & Abstract
14:50 - 15:10
IPV6 address configuration method in 6LoWPAN oriented to the Internet of Power Things

Taking the location information as the focus, we analyze the accurate algorithm of the location-based 6LoWPAN network to automatically configure the address, and conducts a feasibility study. The main content includes the establishment of a LINA network architecture based on location information. Based on the location information of the node, the router at the edge is used as the center, and the plane projected on the 6LoWPAN network is used as the medium to form many grids and achieve the goal of rapid clustering; each grid is independent of each other and can configure the address effectively at the same time, so that the delay of the network can be greatly reduced; the feasibility of the address configuration scheme is verified by comparing the overhead of the traditional address configuration scheme.
Authors: Xu Lu (China Institute of Information and Communication), Jianwei Li (China Institute of Information and Communication), Hao Jiang (China Institute of Information and Communication), Dan Luo (China Institute of Information and Communication), Han Cao (China Institute of Information and Communication),
Hide Authors & Abstract

Show Authors & Abstract
15:10 - 15:30
A Resource Consumption Attack Identification Method Based on Data Fusion

Data fusion can make use of information from different sources or different representations to describe the target more accurately, which has important research significance. Aiming at the network running node may be attacked or there is measurement error, this paper comprehensively utilizes the infor-mation of each node, and proposes a resource consumption attack identifica-tion method based on node multi-dimensional data fusion. First, construct a correlation matrix between nodes, identify normal nodes and possible ab-normal nodes, and assign different weights to each node. Then, calculating the support of the node's system attributes for the attack type, and adopting the D-S evidence theory to effectively identify the network attack. The simu-lations demonstrate the effectiveness and certain advantages of the proposed algorithm.
Authors: Libin Jiao (Science and Technology on Communication Networks Laboratory, The 54th Research Institute of CETC, Shijiazhuang, Hebei, Peoples R China), Yonghua Huo (Science and Technology on Communication Networks Laboratory, The 54th Research Institute of CETC, Shijiazhuang, Hebei, Peoples R China), Ningling Ge (R & D Department, Agricultural Bank of China, Shanghai, Peoples R China), Zhongdi Ge (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, Peoples R China), Yang Yang (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, Peoples R China),
Hide Authors & Abstract

Show Authors & Abstract

Closing remarks 15:30 - 15:50

Best Paper Announcement