Application of Big Data and Machine Learning in Smart Grid, and Associated Security Concerns: A Review

Eklas Hossain, Imtiaj Khan, Fuad Un-Noor, Sarder Shazali Sikander, Md Samiul Haque Sunny

Research output: Contribution to journalReview articlepeer-review

379 Scopus citations

Abstract

This paper conducts a comprehensive study on the application of big data and machine learning in the electrical power grid introduced through the emergence of the next-generation power system - the smart grid (SG). Connectivity lies at the core of this new grid infrastructure, which is provided by the Internet of Things (IoT). This connectivity, and constant communication required in this system, also introduced a massive data volume that demands techniques far superior to conventional methods for proper analysis and decision-making. The IoT-integrated SG system can provide efficient load forecasting and data acquisition technique along with cost-effectiveness. Big data analysis and machine learning techniques are essential to reaping these benefits. In the complex connected system of SG, cyber security becomes a critical issue; IoT devices and their data turning into major targets of attacks. Such security concerns and their solutions are also included in this paper. Key information obtained through literature review is tabulated in the corresponding sections to provide a clear synopsis; and the findings of this rigorous review are listed to give a concise picture of this area of study and promising future fields of academic and industrial research, with current limitations with viable solutions along with their effectiveness.

Original languageEnglish
Article number8625421
Pages (from-to)13960-13988
Number of pages29
JournalIEEE Access
Volume7
DOIs
StatePublished - 2019

Keywords

  • Big data analysis
  • IoT
  • cyber security
  • machine learning
  • smart grid

Fingerprint

Dive into the research topics of 'Application of Big Data and Machine Learning in Smart Grid, and Associated Security Concerns: A Review'. Together they form a unique fingerprint.

Cite this