Smart Cities (Sep 2024)

Trustworthy Communities for Critical Energy and Mobility Cyber-Physical Applications

  • Juhani Latvakoski,
  • Jouni Heikkinen,
  • Jari Palosaari,
  • Vesa Kyllönen,
  • Jari Rehu

DOI
https://doi.org/10.3390/smartcities7050102
Journal volume & issue
Vol. 7, no. 5
pp. 2616 – 2644

Abstract

Read online

The aim of this research has been to enable the management of trustworthy relationships between stakeholders, service providers, and physical assets, which are required in critical energy and mobility cyber–physical systems (CPS) applications. The achieved novel contribution is the concept of trustworthy communities with respective experimental solutions, which are developed by relying on verifiable credentials, smart contracts, trust over IP, and an Ethereum-based distributed ledger. The provided trustworthy community solutions are validated by executing them in two practical use cases, which are called energy flexibility and hunting safety. The energy flexibility case validation considered the execution of the solutions with one simulated and two real buildings with the energy flexibility aggregation platform, which was able to trade the flexibilities in an energy flexibility marketplace. The provided solutions were executed with a hunting safety smartphone application for a hunter and the smartwatch of a person moving around in the forest. The evaluations indicate that conceptual solutions for trustworthy communities fulfill the purpose and contribute toward making energy flexibility trading and hunting safety possible and trustworthy enough for participants. A trustworthy community solution is required to make value sharing and usage of critical energy resources and their flexibilities feasible and secure enough for their owners as part of the energy flexibility community. Sharing the presence and location in mobile conditions requires a trustworthy community solution because of security and privacy reasons, but it can also save lives in real-life elk hunting cases. During the evaluations, the need for further studies related to performance, scalability, community applications, verifiable credentials with wallets, sharing of values and incentives, authorized trust networks, dynamic trust situations, time-sensitive behavior, autonomous operations with smart contracts through security assessment, and applicability have been detected.

Keywords