
Software defined networks (SDN) has been proposed to monitor and manage the
communication networks globally. SDN revolutionized the way the communication
network managed previously. By segregating the control plane from the data
plane, SDN helps the network operators to manage the network flexibly. Since
smart grid heavily relies on communication networks, therefore, SDN has also
paved its way into the smart grid. By applying SDN in SG systems, efficiency
and resiliency can potentially be improved. SDN, with its programmability,
protocol independence, and granularity features, can help the smart grid to
integrate different SG standards and protocols, to cope with diverse
communication systems, and to help SG to perform traffic flow orchestration and
to meet specific SG quality of service requirements. This article serves as a
comprehensive survey on SDNbased smart grid. In this article, we first discuss
taxonomy of advantages of SDNbased smart grid. We then discuss SDNbased smart
grid architectures, along with case studies. Our article provides an indepth
discussion on multicasting and routing schemes for SDNbased smart grid. We
also provide detailed survey of security and privacy schemes applied to
SDNbased smart grid. We furthermore presents challenges, open issues, and
future research directions related to SDNbased smart grid.

The evolution of smart microgrid and its demandresponse characteristics not
only will change the paradigms of the centuryold electric grid but also will
shape the electricity market. In this new market scenario, once always energy
consumers, now may act as sellers due to the excess of energy generated from
newly deployed distributed generators (DG). The smart microgrid will use the
existing electrical transmission network and a pay per use transportation cost
without implementing new transmission lines which involve a massive capital
investment. In this paper, we propose a novel algorithm to minimize the
electricity price with the optimal trading of energy between sellers and buyers
of the smart microgrid network. The algorithm is capable of solving the optimal
power allocation problem (with optimal transmission cost) for a microgrid
network in a polynomial time without modifying the actual marginal costs of
power generation. We mathematically formulate the problem as a nonlinear
nonconvex and decompose the problem to separate the optimal marginal cost
model from the electricity allocation model. Then, we develop a
divideandconquer method to minimize the electricity price by jointly solving
the optimal marginal cost model and electricity allocation problems. To
evaluate the performance of the solution method, we develop and simulate the
model with different marginal cost functions and compare it with a first come
first serve electricity allocation method.

Cooperative relaying is often deployed to enhance the communication
reliability (i.e., diversity order) and consequently the endtoend achievable
rate. However, this raises several security concerns when the relays are
untrusted since they may have access to the relayed message. In this paper, we
study the achievable secrecy diversity order of cooperative networks with
untrusted relays. In particular, we consider a network with an Nantenna
transmitter (Alice), K singleantenna relays, and a singleantenna destination
(Bob). We consider the general scenario where there is no relation between N
and K, and therefore K can be larger than N. Alice and Bob are assumed to be
far away from each other, and all communication is done through the relays,
i.e., there is no direct link. Providing secure communication while enhancing
the diversity order has been shown to be very challenging. In fact, it has been
shown in the literature that the maximum achievable secrecy diversity order for
the adopted system model is one (while using artificial noise jamming). In this
paper, we adopt a nonlinear interference alignment scheme that we have proposed
recently to transmit the signals from Alice to Bob. We analyze the proposed
scheme in terms of the achievable secrecy rate and secrecy diversity order.
Assuming Gaussian inputs, we derive an explicit expression for the achievable
secrecy rate and show analytically that a secrecy diversity order of up to
min(N,K)1 can be achieved using the proposed technique. We provide several
numerical examples to validate the obtained analytical results and demonstrate
the superiority of the proposed technique to its counterparts that exist in the
literature.

Real interference alignment is efficient in breakingup a onedimensional
space over timeinvariant channels into fractional dimensions. As such,
multiple symbols can be simultaneously transmitted with fractional
degreesoffreedom (DoF). Of particular interest is when the one dimensional
space is partitioned into two fractional dimensions. In such scenario, the
interfering signals are confined to one subspace and the intended signal is
confined to the other subspace. Existing real interference alignment schemes
achieve nearcapacity performance at high SNR for timeinvariant channels.
However, such techniques yield poor achievable rate at finite SNR, which is of
interest from a practical point of view. In this paper, we propose a radically
novel nonlinear interference alignment technique, which we refer to as
Interference Dissolution (ID). ID allows to breakup a onedimensional space
into two fractional dimensions while achieving nearcapacity performance for
the entire SNR range. This is achieved by aligning signals by signals, as
opposed to aligning signals by the channel. We introduce ID by considering a
timeinvariant MISO channel. This channel has a onedimensional space and
offers one DoF. We show that, by breakingup the one dimensional space into two
subspaces, ID achieves a rate of two symbols per channel use while providing
$\frac{1}{2}$ DoF for each symbol. We analyze the performance of the proposed
ID scheme in terms of the achievable rate and the symbol error rate. In
characterizing the achievable rate of ID for the entire SNR range, we prove
that, assuming Gaussian signals, the sum achievable rate is at most one bit
away from the capacity. We present numerical examples to validate the
theoretical analysis. We also compare the performance of ID in terms of the
achievable rate performance to that of existing schemes and demonstrate ID's
superiority.