Next Article in Journal
Poiseuille-Type Approximations for Axisymmetric Flow in a Thin Tube with Thin Stiff Elastic Wall
Next Article in Special Issue
An RNN-Based Performance Identification Model for Multi-Agent Containment Control Systems
Previous Article in Journal
Performance Evaluation of Grid-Connected DFIG-Based WECS with Battery Energy Storage System under Wind Alterations Using FOPID Controller for RSC
Previous Article in Special Issue
Learned-Index-Based Semantic Keyword Query on Blockchain
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distributed Finite-Time Cooperative Economic Dispatch Strategy for Smart Grid under DOS Attack

1
Department of Information Science and Engineering, Northeastern University, Shenyang 110819, China
2
Department of Energy Technology, Aalborg University, 9220 Aalborg, Denmark
3
Department of Informatics, University of Oslo, 0373 Oslo, Norway
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(9), 2103; https://doi.org/10.3390/math11092103
Submission received: 24 March 2023 / Revised: 17 April 2023 / Accepted: 25 April 2023 / Published: 28 April 2023
(This article belongs to the Special Issue Mathematical Modeling for Parallel and Distributed Processing)

Abstract

:
This paper proposes an energy management strategy that can resist DOS attacks for solving the Economic Dispatch Problem (EDP) of the smart grid. We use the concept of energy agent, which acts as a hub for the smart grid, and each EA is an integrated energy unit that converts, stores, and utilizes its local energy resources. This approach takes into account the coupling relationship between energy agents (EA) and utilizes the Lyapunov function technique to achieve finite-time solutions for optimization problems. We incorporate strategies to resist DOS attacks when analyzing finite-time convergence using the Lyapunov technique. Based on this, a finite convergence time related to DOS attack time is derived. The integral sliding mode control strategy is adopted and the Lyapunov method is used to analyze it, so that the algorithm can resist DOS attacks and resist external disturbances. Through theoretical analysis, it is shown that the strategy is capable of converging to the global optimal solution in finite time even if it is attacked by DOS. We conducted case studies of six-EA and ten-EA systems to verify the effectiveness of this strategy. The proposed strategy has potential for deployment in distributed energy management systems that require resilience against DOS attacks.
MSC:
49M41; 68R10; 90C05; 90C23; 68Wxx

1. Introduction

In recent years, much attention has been devoted to the smart grid as a potential solution to the world’s environmental issues and resource shortages. By integrating advanced communication technology with power networks, smart grids enable the integrated and efficient use of energy resources, absorb significant proportions of clean energy, and optimize energy utilization efficiency, ultimately realizing intelligent and stable power network operations and reduced carbon emissions [1,2,3,4]. Smart grid economic dispatch problems (EDP) have become a hot topic, as they provide a means to reduce total costs through coordinated management of different-capacity equipment and loads, thus ensuring efficient and smooth operation of the smart grid.
Currently, the prevailing approach to solving EDP is centralized. However, this method has significant challenges such as high sensitivity to single points of failure and privacy constraints [5]. To improve the flexibility, stability, and privacy of the system, distributed solutions are being researched and developed as the best alternative to solve EDP. Distributed methods, such as Alternating Direction Method of Multipliers (ADMM), gradient descent, and consensus-based methods, are progressively replacing centralized methods. ADMM algorithms are highly efficient, and the integration of consensus-based methods with ADMM algorithms has maturity greatly. For instance, Attarha et al. [6] proposes a distributed consensus ADMM algorithm to optimize energy generation and consumption for each participant, while considering system robustness. The consensus-based solutions are also becoming more sophisticated, and in [7], Li et al. proposed a distributed double-consensus approach to facilitate the cooperative energy management of multiple WEs, thereby introducing the concept of WEs. Recently, distributed solutions have evolved based on specific application needs, such as distributed Newtonian descent [8,9,10], and distributed methods based on neurodynamics [11,12].
However, the existing methods such as ADMM, gradient descent, and consensus-based algorithms used for solving the local cost function of EDP are independent, which means the coupling relationship among energy agents is not considered. Hence, these algorithms cannot solve the coupling optimization problem where energy agents interact with each other. Currently, there are few studies in this area. In [13], Knudsen et al. studied the wake effect of wind turbines regarding the influence of capacity equipment. Still, this research solely focuses on the modeling of wind turbines; the problem of distributed coupling optimization for smart grids needs further exploration. In [14], an optimization algorithm was mentioned to solve the distributed coupling optimization problem for the smart grid. However, this approach relies on a stable communication network and does not account for the huge impact of DOS attacks on the communication network of the smart grid.
Distributed methods have significantly contributed to solving the EDP of smart grids. However, with the advancement of industrial technology, convergence speed has emerged as a critical issue for the development of smart grids. Although there are presently numerous convergence methods for EDP [15,16,17], finite time convergence has become more critical. Dai et al. [18] popularized finite-time stability theory in smart grids. In [19] Majid and Amin proposed a finite-time optimization approach to power systems using the Lyapunov function technique. However, the dependable operation of these approaches is based on network stability, and there is no way to handle network attacks. DOS attack, for instance, interferes with the reliable operation of distributed communication structures by consuming system resources. Communication network disruption leads to extensive economic losses due to a lack of prompt exchange of accurate real-time data between the agents involved. Academic research has focused on cyber-attacks on smart grids [20,21]. For example, in [22], Zhang et al. mentioned a robust method based on mixed integer linear programming to mitigate DOS attack impacts. Distributed anomaly detection technology has equally proven effective in solving problems of DOS attacks. In [23], Çakır et al. proposed a machine learning-based model for detecting DOS attacks on smart grids. In [24], Huang et al. also suggested an energy dispatch strategy that isolates the detected fault points. However, more effective methods are required to resist the impacts of DOS attacks, especially those that can solve the EDP of smart grids in a finite time after a network attack. The latest method, proposed by Li et al. [25], can effectively solve the problem of economic dispatch under DOS attacks and the double-gradient descent elastic energy management approach; however, unfortunately, in cannot solve the optimization problem in a finite time. The obtained conclusions about state-of-the-art-works are shown in Table 1.
This paper presents a new finite-time elastic optimization strategy capable of solving EDP with coupled local cost functions in the presence of Distributed Denial of Service (DOS) attacks. The main contributions are:
1.
A cost function model taking coupling relationships into account, which is more complex than previous models that did not consider these relationships. The capacity or consumption of EAs with coupling relationships is included in the intersection terms of local cost functions. Furthermore, we propose an elastic optimization approach that resists the destruction of the smart grid’s distributed coupling optimization during DOS attacks;
2.
We present a finite-time elasticity optimization strategy that adopts sliding mode control and eliminates the information loss incurred by DOS attacks. We analyze the convergence characteristics of the proposed algorithm by using the Lyapunov method and design a finite-time convergence algorithm that ensures the EDP solution can be reached, even after a DOS attack occurs.
The remainder of this paper is organized as follows. Section 2 introduces the system structure, EA model, communication topology, and formulates the EDP that needs to be solved. In Section 3, we provide a brief introduction on DOS attacks, describe the lemma used, propose the elastic optimization algorithm, and analyze its convergence. In Section 4, we verify the results of our proposed algorithm through simulation experiments. Finally, we conclude our findings in Section 5.

2. System Structure and Model

Smart grid refers to the utilization of advanced power technology and equipment information and communication technology to achieve intelligent monitoring, analysis, and decision control of the grid in a systematic manner. The smart grid is designed to be safe, reliable, efficient, highly automated, and equipped with interactive functions for self-healing. In order to establish an effective communication network topology, we introduce the Energy Agent (EA) as the core component of each smart grid in the form of intelligent communication devices. The EA is used for analyzing the energy flow within the large smart grid, which is composed of multiple interconnected smart grids. As the hub of the smart grid, each EA is an integrated energy unit that can convert, store, and utilize its local energy resources, including distributed renewable energy generators (DRGS), distributed fuel generators (DFGS), distributed power storage (DES), and energy loads. Additionally, multiple smart grids are connected through the EA to form a large smart grid, which enables the partial and overall optimal management of energy.

2.1. EA Model

The supply and demand balance constraints for energy conversion, storage, and utilization (i.e., input and output) of EA at time t are given by
p i , t d r g + p i , t d f g + p i , t e s l i , t p = p i , t o u t ,
where l i , t p is the overall power load at time t and equal to the sum of must-run power loads and controllable power loads, expressed by the equation l i , t p = l i , t p , m r + l i , t p , c t r l . l i , t p , m r indicates that the load must be run and l i , t p , c t r l represents controllable load. The notation meanings are shown in Table 2
At time t, the cost function of the equipment included in the EA is shown below.
(1)
The cost function of DRG is
C p i , t d r g = a i p , r p i , t d r g + b i p , r exp η i p , r p i , t d r g , max p i , t d r g p i , t d r g , max p i , t d r g , min ,
where r is the index for renewable devices; a i p , r and b i p , r are non-negative cost coefficients; and η i p , r is penalty coefficient.
(2)
The cost function of DFG is
C p i , t d f g = a i p , f p i , t d f g 2 + b i p , f p i , t d f g + c i p , f ,
where a i p , f , b i p , f , c i p , f represent non-negative cost coefficients; the symbol f denotes fuel devices.
(3)
The cost function of ES is
C p i , t e s = a i p , e s p i , t e s + b i p , e s 2 ,
where a i p , e s and b i p , e s are non-negative cost coefficients, and symbol.
(4)
The cost function of energy loads
We believe that the benefit function of the energy load is consistent with the cost function form, and when p i , t is less than zero, it is considered that this energy form of EA is converted into a load state. When i = 1 n p i , t = 0 is satisfied, it is considered that the balance between supply and demand is met between all EAs.

2.2. Problem Formulation

2.2.1. Graph Theory

There are multiple EAs, and each EA can interact with its neighbor EAs to achieve internal energy demand and global optimal energy distribution by selling surplus energy or purchasing deficient energy. Here, we introduce graph theory to model the energy flow process.
The topology graph between agents is donated as G = V , ξ , W , where V = v 1 , v 2 , , v n is a finite set of vertices representing all EAs, ξ V × V is the edge set representing the communication links, W = w i j n × n is the vertex–edge incidence matrix. The Laplacian matrix of the graph G is defined as follows
L i j = d v i   if   i = j , W i j   if   i j   and   G   is   connected , 0   else ,
d v i = i = 1 , i j n W i j denotes the degree of vertex v i . The pairs of vertices in ξ are ordered; that is, every edge in ξ is oriented, then G is a digraph. When G is undirected, the pairs of vertices are unordered with w i j = w j i ,   i j . The second smallest eigenvalue of the Laplacian matrix of a graph, λ 2 , is defined as algebraic connectivity. If the graph is connected, then the algebraic connectedness is greater than zero, and the graph is divided into two parts when the value is zero. In this paper, we use the undirected connected graph.

2.2.2. Energy Management of EAs

In order to achieve the optimal energy production and utilization of each EA under the balance of supply and demand, we can describe the Economic Dispatch Problem of n agents as follows:
min   C x = i = 1 n C i x + j N i C C i j x , s . t .   i = 1 n x i t = 0 ,     t 0   ,
where C x is the objective function.
x is the optimization variable. We assume the optimization variables x i t is
x i t · = u i 1 t + u i 2 t ,   i = 1 , 2 , , n ,
where the u i t is the control algorithm of agent i . When there is no DOS attack, we achieve finite-time convergence by designing u i 1 t and u i 2 t .
Considering the local interdependence between EAs, the cost j N i C C i j x imposed by the j t h agent on the i t h agent is added on the basis of the i t h EA in addition to its own constant power generation cost C i ( x ) . C i j ( x ) = j = 1 n γ j i x j . Meanwhile, according to the model mentioned above, we can express C i x as
C i x = C p i , t d r g + C p i , t d f g + C p i , t e s + C l i , t .
Assumption 1.
The team objective function  C x  is twice continuously differentiable, and strongly convex, satisfying the condition that  2 C ( x ) θ I n > 0  for real value  θ > 0 .
Definition 1.
In a network with n agents, N i C V is the set of critical neighbors of agent i, which consists of the agent i neighbors where their decision variables directly appear in the local cost   C i ( x ) . Information exchanging with these is required for agent i to compute   C i ( x ) .
Remark 1.
According to the linear equation constraint of the convex function [26],  x *  is the optimal solution to problem (9) if and only if  C ( x * ) = c 1 n  for  c .

3. Main Algorithm

3.1. DOS Attack

A DOS attack can cause a broken communication link. The core content of our research is to use distributed methods to solve the problem of integrated energy systems, which require a distributed network structure to implement distributed algorithms, but this is vulnerable to DOS attacks. When it is attacked by a network, it will lead to the continuous loss of information shared between nodes, and there is a certain probability that the balance of supply and demand between all nodes will be affected. We believe that a DOS attack cannot destroy the entire communication link, even if only one communication line is left in the worst case. Starting from t 0 , the total time t 0 , t can be divided into attacked periods and normal periods. After each attack, there is a recovery period t r . This period counts towards normal periods. We define t k , t k + τ k as the period during which the kth DOS attack was received. t k and τ k are the corresponding launched attack instant and the attack dwell time, respectively. The total dwell time of the DOS attack is = k τ k , whose proportion of the total is φ = / ( t t 0 ) . DOS attack periods and normal periods are defined as ϕ a p = k t k , t k + τ k t 0 , t and ϕ n p = k t k + τ k , t k + 1 t 0 , t , respectively. If a communication link is subjected to a DOS attack, both of its end nodes are considered to be under a network attack.

3.2. Notation

We denote 1 n = 1 , 1 , 1 , , 1 T n , and I n as the n × n identity matrix. For n × n , and α , let sgn ( x ) α = sgn ( x i ) α n , where sgn ( x ) α = s i g ( x i ) x i α , s i g represents the signum function, and x i denotes the absolute value of x i . For a matrix A n × k , A T denotes the transpose of A . For a symmetric matrix A = A T n × n , its eigenvalues are denoted as λ 1 ( A ) λ 2 ( A ) , λ n ( A ) in a non-decreasing order. f ( s ) and 2 f ( s ) , respectively, denote the gradient and the Hessian matrix of the function f ( s ) .

3.3. Useful Lemmas

All of the lemmas mentioned below are used for mathematical derivation in Section 3.4. When these lemmas are used, where they are used is mentioned.
Lemma 1
([27]). Let   ξ 1 , ξ 2 , ξ 3 , ξ n 0 . For all real values   0 < p 1  we have  i = 1 n ξ i p i = 1 n ξ i p . If  1 < p < , then,  i = 1 n ξ i p n 1 p ( i = 1 n ξ i ) p . This lemma is used in Formulae (31), (34), and (39) to transform mathematical formulae to prove finite time convergence.
Lemma 2
([28]). Let G be an undirected and connected graph with   L ( A ) = l i j n × n . Then, for all ξ = ξ i n , we have ξ T L ( A ) ξ = 1 2 i , j = 1 n a i j ( ξ j ξ i ) 2 . This lemma is used in Formula (40) to construct mathematical expressions for the use of lemma 3.
Lemma 3
([18]). Consider the system   x ˙ = f t , x , where   x n  and  f : × n n . Let the origin be an equilibrium point for the system. Let there exist a continuous radially unbounded function  V ( x ) 0  with   V ( x ) = 0 x = 0 . If  V ˙ ( x ) β 0 V ( x ) β 1 V q 1 ( x ) β 2 V q 2 ( x ) , where   β 0 , β 1 , β 2 > 0 ,  0 < q 1 < 1 , and  q 2 > 1 , the origin is a globally finite-time stable equilibrium with the settling time  T S ln ( 1 + β 0 / β 1 ) β 0 ( 1 q 1 ) + ln ( 1 + β 0 / β 2 ) β 0 ( q 2 1 ) . This lemma is used in the Formulae (32), (35), and (60) to calculate the upper limit of time for convergence.
Lemma 4
([19]). Consider  x , y , p , and  p 1 . Then,  sgn ( x ) p sgn ( y ) p 2 1 p x y p . This lemma is used in Formula (38) to transform mathematical formulae to prove finite time convergence.
Lemma 5
([19]). Let A n × n  be a symmetric positive semi-definite matrix, with  0 = λ 1 ( A ) = = λ k 1 ( A ) < λ k ( A ) λ n ( A )  as the eigenvalues. Then,  x T A A x λ k ( A ) x T A x ,   x n . This lemma is used in Formula (48) to calculate the form of the Lyapunov function under DOS attacks.
Lemma 6
([19]). Let  A n × n  be a given positive semi-definite matrix such that  λ 1 ( A ) = 0  is a simple eigenvalue of  A  with the corresponding eigenvector  1 n . Let  C ( x )  be a θ-strongly convex function with respect to  x n , i.e., 2 C ( x ) θ I n > 0  for some positive values θ. Suppose,  x * is a solution of the following convex optimization problem,
min x C ( x ) , s . t : i = 1 n x i = 0 ,
Then, the following inequality holds,
1 2 θ λ 2 ( A ) C ( x ) C ( x * ) C ( x ) T A C ( x ) .
This lemma is used in Formulae (41) and (48) to calculate the form of the Lyapunov function of the algorithm without DOS attack and under DOS attack, respectively.

3.4. Distributed Optimization Strategies to Resist DOS Attacks

Inspired by the sliding-mode control and the energy management strategy based on distributed elastic double-gradient descent, we propose a distributed finite-time convergence algorithm to solve the Energy Distribution Problem (EDP) with energy agents. The algorithm is designed to resist DOS attacks, and its control variables will switch to different states depending on the communication environment. The algorithm can mainly be categorized into three states. Specifically, when the algorithm is not under DOS attack, its mathematical expression is given as follows:
x ˙ = u i 1 ( t ) + u i 2 ( t ) ,
u i 1 = k 0 j N i a i j ( η j η i ) + k 1 j N i a i j s i g ( η j η i ) + k 2 j N i a i j ( sgn ( η j ) p sgn ( η i ) p ) ,
η i = x i C i ( x ) + j N i c x i C j ( x ) ,
u i 2 = c 0 s i c 1 s i g ( s i ) c 2 sgn ( s i ) α ,
s i ( t ) = x i ( t ) t 0 t u i 1 ( τ ) d τ .
where k 0 , k 1 , k 2 , c 0 , c 1 , c 2 , p , α are adjustable constants. u i 1 and u i 2 are part of the algorithm, η i is the ith element of C ( x ) , and s i ( t ) is auxiliary variable. Their roles are described in detail in this section. When subjected to a DOS attack, the state switches to the following form:
x ˙ = u i 1 ( t ) + u i 2 ( t ) ,
u i 1 = k 0 j N i a i j ( η j ( t k ) η i ) + k 1 j N i a i j s i g ( η j ( t k ) η i ) ,
η i = x i C i ( x ) + j N i c x i C j ( x ) ,
u i 2 = c 0 s i c 1 s i g ( s i ) c 2 sgn ( s i ) α ,
s i ( t ) = x i ( t ) k t k 1 t k u i 1 ( τ ) d τ k t k t k + τ k u i 1 ( τ ) d τ ,
w i ( t ) = x i ( t ) t k t k + τ k u i 1 ( τ ) d τ .
In the aforementioned equation, u i 1 and u i 2 represent the u i 1 and u i 2 at the time of receiving DOS attack. They may not be the same in form, but they function the same, the details of which are explained later in this section. w i ( t ) denotes the auxiliary variable, which is utilized to restore the system to its original state after a Denial-of-Service (DOS) attack. Once the incident terminates, the algorithm switches its state once again to initiate adaptive recovery for any information loss, supply, and demand imbalances, or other negative impacts caused by the DOS attack.
x ˙ = u i 1 ( t ) + u i 2 ( t ) + v i ( t ) ,
u i 1 = k 0 j N i a i j ( η j η i ) + k 1 j N i a i j s i g ( η j η i ) + k 2 j N i a i j ( sgn ( η j ) p sgn ( η i ) p ) ,
η i = x i C i ( x ) + j N i c x i C j ( x ) ,
u i 2 = c 0 s i c 1 s i g ( s i ) c 2 sgn ( s i ) α ,
s i ( t ) = x i ( t ) t 0 t u i 1 ( τ ) d τ ,
v i ( t ) = e 0 r i e 1 s i g ( r i ) e 2 sgn ( r i ) β ,
r i ( t ) = x i ( t ) w i ( t k + τ k ) t 0 t u i ( t ) .
where e 0 , e 1 , e 2 , β is an adjustable constant, v i ( t ) is a newly added part of the algorithm in the third part, and r i ( t ) is a newly added auxiliary variable in this part. The algorithm is divided into three states.
When not attacked by the network, the first state of the algorithm is executed, and the state is divided into two parts. One part is u i 1 , based on the KKT condition, so that the local gradient reaches consistency in a finite time, so that the objective function can converge to the optimal solution in a finite time, and the sum of u i 1 and u i 2 of the node is zero has always been established; that is: i u i 1 + u i 2 = 0 . The derivatives of x i of all nodes are added to zero, so that the initial value meets the balance of supply and demand, which can ensure the global balance of supply and demand. The other part is u i 2 ; the purpose of u i 2 is to cancel out the fluctuations caused by too much inertia caused by the rapid convergence of u i 1 , and also to eliminate the disturbance caused by the external environment. u i 2 can also achieve finite-time convergence and assist the overall algorithm to achieve finite time smooth convergence. When the network is not subject to DOS attacks, or the network is attacked by DOS, but the energy agent is not a node that is attacked by DOS, we use the information received in real time to calculate and execute the algorithm of the first state.
The second state of the algorithm is switched when attacked by DOS, and its core is also two parts: u i 1 and u i 2 , which act the same as the first state of the algorithm, except that the u i 1 of the second state is less than the last item k 2 j N i a i j ( sgn ( η j ) p sgn ( η i ) p ) of the first state u i 1 . Although u i 2 and u i 2 may seem different in form, the core methods of both are the same and have the same function. w i ( t ) is an auxiliary variable designed for the third state, and its role can be understood as a sliding surface designed to maintain the balance of supply and demand. When subjected to a DOS attack, and the energy agent is a node attacked by DOS, the latest received information is used to calculate η j ( t k ) and update the control variables.
When the DOS attack ends, the algorithm transitions to a third state, and the third state is the recovery algorithm, in which the control variables are updated with the information received in real time. This part of the algorithm consists of u i 1 , u i 2 , and v i ( t ) , where u i 1 and u i 2 are the same as the first state in action and form. The design of v i ( t ) is inspired by sliding film control, using the second part of w i ( t ) , forming a sliding surface of supply and demand balance, so that the results of the algorithm restore the balance between supply and demand, and the algorithm in the recovery state can achieve finite-time convergence, which can be adaptively adjusted to the first state without DOS attack after the convergence is completed.
By implementing the above algorithm, all energy agents can converge to the optimal state in a finite time.

3.5. Convergence Analysis

In order to test the performance of the algorithm and analyze its convergence. We first introduce the second part of the algorithm u i 2 . u i 2 can cancel the fluctuation caused by the u i 1 part and can also eliminate environmental interference and improve the robustness of the system. Fluctuations can be suppressed for a finite time by u i 2 . Using the derivative of (21):
s ˙ i ( t ) = x ˙ i ( t ) u i 1 ( t ) = u i 2 = c 0 s i c 1 s i g ( s i ) c 2 sgn ( s i ) α .
Construct V d ( t ) = i = 1 n 1 2 s i 2 and derive V d ( t ) to obtain
V ˙ d ( t ) = i = 1 n s i s ˙ i = c 0 i = 1 n s i 2 c 1 i = 1 n s i c 2 i = 1 n s i α + 1 .
According to Lemma 1:
V ˙ d ( t ) c 0 i = 1 n s i 2 c 1 i = 1 n s i 2 1 2 c 2 n 1 α 2 i = 1 n s i 2 α + 1 2 , c 0 V d ( t ) c 1 V d ( t ) 1 2 c 2 n 1 α 2 V d ( t ) α + 1 2 .
Thus, from Lemma 3, the following can be derived: T S 1 2 ln ( 1 + c 0 / c 1 ) c 0 + 2 ln ( 1 + c 0 / c 2 n α + 1 2 ) c 0 ( α 1 ) .
The proof is thus completed. For all nodes i = 1 , 2 , , n , s i ( t ) will converge to zero by T S 1 .When the node is attacked by DOS attack, the algorithm switches to the second state, but s i ( t ) does not participate in communication, and convergence is the same as when it is not attacked by DOS, for all three states of the algorithm, s i ( t ) is the same, and the function of u i 2 is the same.
The role of v i ( t ) in the third state of the algorithm is to recover from the impact of DOS attacks, using the derivative of (28).
r ˙ i ( t ) = x ˙ i ( t ) u i 1 ( t ) u i 2 ( t ) = v i ( t ) , = e 0 r i e 1 s i g ( r i ) e 2 sgn ( r i ) β .
Construct V b ( t ) = i = 1 n 1 2 r i 2 and derive V b ( t ) to obtain:
V ˙ b ( t ) = i = 1 n r i r ˙ i ,     = e 0 i = 1 n r i 2 e 1 i = 1 n r i e 2 i = 1 n r i β + 1 .
According to Lemma 1:
V ˙ b ( t ) e 0 i = 1 n r i 2 e 1 i = 1 n r i 2 1 2 e 2 n 1 β 2 i = 1 n r i 2 β + 1 2 , e 0 V b ( t ) e 1 V b ( t ) 1 2 e 2 n 1 β 2 V b ( t ) β + 1 2 .
Thus, from Lemma 3, the following can be derived: T S 2 2 ln ( 1 + e 0 / e 1 ) e 0 + 2 ln ( 1 + e 0 / ( e 2 n β + 1 2 ) ) e 0 ( β 1 ) .
u i 2 has counteracted the fluctuations caused by part u i 1 , and interference can also be eliminated. The third state of the algorithm v i ( t ) recovers from the impact of DOS attacks in a finite time. During the period when not under DOS attack:
x ˙ i ( t ) = k 0 j N i a i j ( η j η i ) + k 1 j N i a i j s i g ( η j η i ) + k 2 j N i a i j sgn ( η j ) p sgn ( η i ) p .
Let x * = x 1 * , x x * , , x n * T be an optimal solution of the convex optimization problem (6) for which C ( x * ) = c 1 n for c (see Remark 1). Construct V a ( t ) = C ( x ) C ( x * ) .
From Assumption 1, V a ( t ) is positive semi-definite and V a ( t ) = 0 if and only if C ( x ) = C ( x * ) . From (13), η i is the ith element of C ( x ) . Therefore, taking the time derivative of V a ( t ) yields V ˙ a ( t ) = i = 1 n η i x ˙ i .
During any normal period t k + τ k , t k + 1 :
V ˙ a ( t ) = k 0 i = 1 n η i j N i a i j ( η j η i ) + k 1 i = 1 n η i j N i a i j s i g ( η j η i ) + k 2 i = 1 n η i j N i a i j ( sgn ( η j ) p sgn ( η j ) p ) .
From (37), it follows that:
V ˙ a ( t ) = 1 2 k 0 i , j = 1 n a i j ( η j η i ) 2 1 2 k 1 i , j = 1 n a i j η j η i 1 2 k 2 i , j = 1 n a i j ( η j η i ) ( sgn ( η j ) p sgn ( η i ) p ) .
Since s i g ( η j η i ) = s i g ( sgn ( η j ) p sgn ( η i ) p ) , we can have ( η j η i ) ( sgn ( η j ) p sgn ( η i ) p )   = η j η i sgn ( η j ) p sgn ( η i ) p . Then, by simple calculations, from Lemma 4:
V ˙ a ( t ) 1 2 k 0 i , j = 1 n a i j ( η j η i ) 2 1 2 k 1 i , j = 1 n a i j η j η i 2 p k 2 i , j = 1 n a i j η j η i p + 1 , 1 2 k 0 i , j = 1 n a i j ( η j η i ) 2 1 2 k 1 i , j = 1 n ( a i j 2 ( η j η i ) 2 ) 1 2 2 p k 2 i , j = 1 n ( a i j 2 p + 1 ( η j η i ) 2 ) p + 1 2 .
According to Lemma 1,
V ˙ a ( t ) 1 2 k 0 i , j = 1 n a i j ( η j η i ) 2 1 2 k 1 i , j = 1 n a i j 2 ( η j η i ) 2 1 2 2 p k 2 n 1 p 2 i , j = 1 n a i j 2 p + 1 ( η j η i ) 2 p + 1 2 , V ˙ a ( t ) 1 2 k 0 i , j = 1 n a i j ( η j η i ) 2 1 2 k 1 i , j = 1 n a i j 2 ( η j η i ) 2 1 2 2 p k 2 n 1 p 2 i , j = 1 n a i j 2 p + 1 ( η j η i ) 2 p + 1 2 ,
let A 0 = a i j , A 1 = a i j 2 , and A 2 = a i j 2 p + 1 ; therefore, from Lemma 2:
V ˙ a ( t ) 1 2 k 0 ( 2 η T L ( A 0 ) η ) 1 2 k 1 ( 2 η T L ( A 1 ) η ) 1 2 2 p k 2 n 1 p 2 ( 2 η T L ( A 2 ) η ) p + 1 2 ,
where L ( A 0 ) , L ( A 1 ) , and L ( A 2 ) are the Laplacian matrices of undirected graphs G ( A 0 ) , G ( A 1 ) , and G ( A 2 ) , respectively. From Lemma 6:
1 2 θ λ 2 ( L ( A 0 ) ) ( C ( x ) C ( x * ) ) T C ( x ) L ( A 0 ) C ( x ) , 1 2 θ λ 2 ( L ( A 1 ) ) ( C ( x ) C ( x * ) ) T C ( x ) L ( A 1 ) C ( x ) , 1 2 θ λ 2 ( L ( A 2 ) ) ( C ( x ) C ( x * ) ) T C ( x ) L ( A 2 ) C ( x ) ,
Since η = C ( x ) , we obtain
V ˙ a ( t ) 1 2 k 0 θ λ 2 ( L ( A 0 ) ) V a ( t ) 1 2 k 1 θ 1 2 λ 2 ( L ( A 1 ) ) 1 2 V c ( t ) 1 2 2 p k 2 θ p + 1 2 λ 2 ( L ( A 2 ) ) p + 1 2 n 1 p 2 V a ( t ) 1 + p 2 .
During any attack period t k , t k + τ k ,
V a ( t ) = k 0 i = 1 n η i j N i a i j ( η j ( t k ) η i ) + k 1 i = 1 n η i j N i a i j s i g ( η j ( t k ) η i ) .
In period t k , t k + τ k , if it is not subject to a DOS attack, the normal communication value under normal conditions is η j . However, during the DOS attack period, we can only update the control variable with the latest received data η j ( t k ) ; hence, we let the difference between the two be u j .
η j ( t k ) = η j + u j ,
from which we can have,
V a = k 0 i = 1 n η i j N i a i j ( η j η i ) + k 0 i = 1 n η i j N i a i j u j + k 1 i = 1 n η i j N i a i j s i g ( η j + u j η i ) , = 1 2 k 0 i , j = 1 n a i j ( η j η i ) 2 1 2 k 0 i , j = 1 n a i j ( η j η i ) u j 1 2 k 1 i , j = 1 n a i j ( η j η i ) s i g ( η j + u j η i ) .
u j is a function that changes over time, and in the worst case, u j is an incrementing function and the maximum value of the slope is k max within the attack time τ k ,
V a = 1 2 k 0 i , j = 1 n a i j ( η j η i ) 2 1 2 k 0 i , j = 1 n a i j ( η j η i ) k max τ 1 2 k 1 i , j = 1 n a i j ( η j η i ) s i g ( η j + u j η i ) ,
in the worst case, k max is the opposite of η j η i , and s i g ( η j + u j η i ) is the opposite of η j η i ,
V a 1 2 k 0 i , j = 1 n a i j ( η j η i ) 2 + 1 2 k 0 k max τ i , j = 1 n a i j η j η i + 1 2 k 1 i , j = 1 n a i j η j η i .
From Lemma 5 and Lemma 6, we add a limiting factor m :
V a 1 2 k 0 θ λ 2 L ( A 0 ) V a ( t ) + 1 2 m k 0 k max τ + k 1 θ 1 2 λ n L ( A 1 ) 1 2 V a 1 2 ( t ) .
During DOS attacks periods, algorithms cannot converge. Based on the above analysis, we analyze the convergence of the whole.
V t = C x C x * .
Let us start with the case at V t 1 :
V a · ( t ) 1 2 k 0 θ λ 2 L ( A 0 ) V a t 1 2 k θ 1 2 λ 2 1 2 L ( A 1 ) V a 1 2 t 2 P k 2 θ P + 1 2 λ 2 P + 1 2 L ( A 2 ) n 1 P 2 V a P + 1 2 t ,
V a · ( t ) 1 2 k 0 θ λ 2 L ( A 0 ) V a t ,
V a t e 1 2 k 0 θ λ 2 L ( A 0 ) V a t 0 ,
V a · ( t ) 1 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) V a 1 2 t ,
V a t e 1 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) t V a t 0 ,
φ = k = 1 n τ k t .
We combine situations that are subject to DOS attacks with situations that are not subject to DOS attacks:
V t V a 1 φ t e 1 2 m k 0 k max τ + k 1 θ 1 2 λ 2 1 2 L ( A 0 ) φ t V a 1 φ t e 1 2 m k 0 k max τ + k 1 θ 1 2 λ 2 1 2 L ( A 1 ) φ t P + 1 2 ,
V ( t ) 1 φ 1 2 k 0 θ λ 2 L ( A 0 ) V a 1 φ t 1 2 k 1 θ 1 2 λ 2 1 2 L ( A 1 ) V a 1 2 1 φ t 2 P k 2 θ P + 1 2 λ 2 P + 1 2 L ( A 2 ) n 1 P 2 V a P + 1 2 1 φ t e 1 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) φ t P + 1 2 + P + 1 4 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) φ V a 1 φ t e 1 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) φ t P + 1 2 .
Let p + 1 4 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) φ α 1 2 k 0 θ λ 2 L ( A 0 ) , α < 1 φ ,
V ( t ) 1 φ α 1 2 k 0 θ λ 2 L ( A 0 ) V a 1 φ t e 1 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) φ t P + 1 2 1 2 k 1 θ 1 2 λ 2 1 2 L ( A 2 ) V a 1 2 1 φ t e 1 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) φ t P + 1 2 2 P k 2 θ P + 1 2 λ 2 P + 1 2 L ( A 2 ) n 1 P 2 V a P + 1 2 1 φ t e 1 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) φ t P + 1 2 ,
V ˙ ( t ) 1 φ α 1 2 k 0 θ λ 2 L ( A 0 ) V t 1 2 k 1 θ 1 2 λ 2 1 2 L ( A 1 ) V 1 2 t e 1 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) φ t P 2 1 2 P k 2 e P + 1 2 λ 2 p + 1 2 L A 2 n 1 P 2 V P + 1 2 t .
Because e 1 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) φ t > 1 , we can obtain
V · ( t ) 1 φ α 1 2 k 0 θ λ 2 L ( A 0 ) V t 1 2 k 1 θ 1 2 λ 2 1 2 L ( A 1 ) V 1 2 t 2 P k 2 θ P + 1 2 λ 2 P + 1 2 ( L ( A 2 ) ) n 1 P 2 V P + 1 2 t .
This form satisfies the basic form of Lemma 3, from which it can be concluded that when V ( t ) > 1 , V ( t ) converges to V ( t ) = 1 by t ^ 1 .
t ^ 1 2 ln ( 1 + I 1 / I 2 ) I 1 ( p 1 ) .
where I 1 = ( 1 φ α ) k 0 θ λ 2 L A 0 2 , I 2 = 2 p k 2 θ p + 1 2 λ 2 p + 1 2 L A 2 n 1 p 2 .
When 0 V ( t ) 1 , under the situation as that without a DOS attack,
V a · ( t ) 1 2 k 0 θ λ 2 L ( A 0 ) V a t 1 2 k 1 θ 1 2 λ 2 1 2 L ( A 1 ) V a 1 2 t .
We use a for 1 2 k 0 θ λ 2 L ( A 0 ) and b for 1 2 k 1 θ 1 2 λ 2 1 2 L ( A 1 ) . Next, we use the reciprocal to find the original function. The condition 0 < V a t 1 must be met,
V a · ( t ) a V a t b V a 1 2 t ,
d V a d t < a V a b V a 1 2 ,
d t d V a > 1 a V a + b V a 1 2 ,
d t d V a a V a + b V a 1 2 ,
then, we let h = V a , and V a = h 2 is the same,
d V a = 2 h d h ,
d t 2 h d h a h 2 + b h ,
d t 2 a h + b d h ,
d t 2 a h + b d h ,
t + c 2 a ln a h + b ,
a 2 t + c ln a h + b ,
a h + b e a 2 t + c ,
a h e a 2 t + c b ,
h 1 a e a 2 t + c b a , 0 h < 1 ,
where c is constant. If t + , h b / a . Moreover, h is a monotonically decreasing function, so there must be one and only one value of t which can satisfy the function with a value of zero, and the meaningful range is also 0 h 1 ,
V a ( t ) h 2 = 1 a 2 e a t V t 0 2 b a 2 e a 2 t V 1 2 t 0 + b 2 a 2 , 0 V a ( t ) 1 .
Combine the period of attack and the normal period to form the following formula:
V t 1 a 2 V a φ t e a 1 φ t 2 b a 2 V a 1 2 φ t e a 1 φ t 2 + b 2 a 2 ,
Because of 0 V a 1 , we obtain V a 1 2 ( φ t ) V a ( φ t ) ,
V t 1 a 2 V a φ t e a 1 φ t 2 b a 2 V a φ t e a 1 φ t 2 + b 2 a 2 ,
V ( t ) < 1 a 2 φ 1 2 k 0 θ λ 2 L ( A 0 ) V a φ t + 1 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) V a 1 2 t e a 1 φ t 1 φ a V a φ t e a 1 φ t + 1 φ b a e a t 1 φ 2 V a φ t φ 2 b a 2 e a t 2 1 2 k 0 θ λ 2 L ( A 0 ) V a φ t + 1 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) V a 1 2 t ,
V ( t ) φ k 0 θ λ 2 L ( A 1 ) 2 a 2 V a φ t e a 1 φ t + φ 2 a 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) V a 1 2 t e a 1 φ t 1 φ a V a φ t e a 1 φ t + 1 φ b a e a 1 φ t 2 V a φ t + b φ a 2 k 0 θ λ 2 L ( A 0 ) e a 1 φ t 2 V a φ t b φ a 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) V a 1 2 t e a 1 φ t 2 ,
V ( t ) φ k 0 θ λ 2 L ( A 0 ) 2 a 2 + 1 φ a V a φ t e a 1 φ t + φ 2 a 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) V a 1 2 t e a 1 φ t + 1 φ b a e a 1 φ t 2 V a φ t + b φ a 2 k 0 θ λ 2 L ( A 1 ) e a 1 φ t 2 V a φ t b φ a 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) V a 1 2 t a 1 φ t 2 ,
V ( t ) φ k 0 θ λ 2 L ( A 0 ) 2 a 2 + 1 φ a V a φ t e a t + φ 2 a 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) V a 1 2 t e a t 2 + 1 φ b a e a t 2 V a 1 2 φ t + b φ a 2 k 0 θ λ 2 L ( A 0 ) e a t 2 V a 1 2 φ t b φ a 2 m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L ( A 1 ) V a 1 2 t a 1 φ t 2 .
As for V t = 1 a 2 V a φ t e a ( 1 φ ) t 2 b a 2 V a 1 2 φ t e a ( 1 φ ) t 2 + b 2 a 2 , in this situation, we consider the worst-case scenario: V a φ t = 1 . When t = 1 a ( 1 φ ) ln b 2 , V t = 0 , and 2 b a 2 e a 2 t + b 2 a 2 is monotonically increasing with time; so, within the feasible range, 2 b a 2 e a 2 t V a φ t + b 2 a 2 < 0 is always satisfied. Then, we have V a φ t a 2 e a t > V t , and 1 a e a 2 t V a 1 2 φ t e a 2 t > V 1 2 t .
From this, we obtain,
V · ( t ) φ k 0 θ λ 2 L ( A 0 ) 2 a 2 + 1 φ a a 2 V t b φ m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L A 1 a 2 b φ k 0 θ λ 2 L ( A 0 ) a 2 b 1 φ a φ m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L A 1 2 a 2 V a 1 2 φ t e a t 2 .
Further conversion and merging:
V · ( t ) φ k 0 θ λ 2 L ( A 0 ) 2 + a 1 φ V t b φ m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L A 1 2 a b φ k 0 θ λ 2 L A 0 a b 1 φ V 1 2 t .
We let
φ k 0 θ λ 2 L ( A 0 ) 2 a 2 + 1 φ a = I 3 ,
b φ m k 0 k max τ + k 1 θ 1 2 λ n 1 2 L A 1 2 a b φ k 0 θ λ 2 L A 0 a b 1 φ = I 4 .
Both I 3 and I 4 are greater than zero. We can convert the final form to
V · ( t ) I 3 V ( t ) I 4 V 1 2 ( t ) .
From [13], when 0 V ( t ) 1 , u i 1 can converge to zero within t ^ 2 2 ln ( 1 + I 3 / I 4 ) I 3 .
Theorem 1.
Obtained from the above proof. When subjected to a DOS attack, using the energy management strategy proposed in this paper can achieve finite-time convergence. The   u i 1 can complete convergence by   T S 3 t ^ 1 + t ^ 2 . Combined with (33) and (36), when subjected to DOS attacks, the distributed optimization strategy can be optimized within  T T S 1 + T S 2 + T S 3 .

4. Simulation Test

This section presents two cases to confirm the efficacy of the strategy. Firstly, the ability of the six-EA system to resolve the issue within a finite time frame is examined under DOS attacks. The six-EA system is a smart grid consisting of six EAs. EAs can exchange information between one another through communication lines and can also exchange energy through power lines. Each EA can perform distributed calculations, execute the algorithm proposed in this paper according to the given parameters set in advance, and then calculate the optimal economic dispatch strategy by constantly exchanging real-time information. When subjected to a DOS attack, the DOS-attacked EA executes the second part of the algorithm, and after the DOS attack ends, the EA executes the third part of the algorithm and then adaptively adjusts to the first part of the algorithm. An EA that is not attacked by DOS always executes the first part of the algorithm. Figure 1 displays the physical topology and communication topology of the six-EA system. In Figure 1, the green dotted line represents the communication line, the blue implementation represents the power line, and each black dotted box represents an EA, which considers distributed power generator, load, and distributed energy storage in this case study. Each EA includes different devices. Under normal conditions, the connection relationship of the six nodes can be observed in Figure 2a. When a DOS attack occurs, the communication link would be impacted, and thus, it is presumed that the attacked link cannot communicate. The DOS attack time sequence is shown in Figure 3. During a DOS attack, the communication link is illustrated in Figure 2b.
The initial values for these six EAs are set to [4.2; −3.1; 2.5; −3.5; 1.6; −1.7]; we set [ k 0 , k 1 , k 2 , p , c 0 , c 1 , c 2 , α , e 0 , e 1 , e 2 , β ] = [ 5 , 5 , 0.1 , 1.5 , 2 , 1 , 1 , 1.5 , 1.1 , 2 , 0.4 , 1.5 ] . The coupling coefficients between the device for each EA and the parameters of the cost function are shown in Table 3.

4.1. Convergence and Optimality Analysis

Based on the above information, it can be calculated that within time t 2 s, the algorithm will complete convergence. As shown in Figure 4a, x i represents the generation or consumption of electrical energy for each energy agent. As can be seen from the Figure 4a, x i has converged after a short fluctuation, and the convergence time is less than 2 s. We change the initial value 10 times, and the final result converges to the same result when t 2 s. The x i of the ten-EA system is shown in Figure 4b, from which it can be seen that at time t 3 s, the strategy successfully resists DOS attacks and completes convergence.
We use a centralized method to solve this problem for EDP under DOS-free attacks. The centralized method calculated that the final minimum cost of the six-EA system was 779.4. If the strategy proposed in this paper is used to solve EDP under DOS attack, the lowest cost is calculated to be 782, and the gap is less than 0.4%, which is within the allowable range. We use the converged x * to calculate C ( x ) , and finally we obtain C ( x * ) = 8.3830 ; 8.3830 ; 8.3830 ; 8.3830 ; 8.3830 ; 8.3830 , which satisfies Remark 1. The optimality of the proposed strategy is verified.

4.2. Comparative Analysis

We compare the use of this strategy and the absence of this strategy under DOS attacks. Without this strategy, we believe that only the first part of this algorithm is executed, and the protocol cannot be changed when subjected to DOS attacks. The results of the six-EA system and the ten-EA system without this strategy are shown in Figure 5a,b, and the lowest cost shown in Table 4.
As can be seen from Figure 5a, if the strategy is not used, the six-EA system becomes unstable when the EAs are attacked by DOS. After the DOS attack ends, x i will experience fluctuations for a period of time to gradually stabilize. By comparing Table 4, it can be seen that the final convergence value of x i is not the optimal solution. After a DOS attack, the cost nadir shifted, which is caused by information loss and supply and demand imbalance caused by DOS attacks.
It can also be seen from Figure 5b that if the algorithm proposed in this paper is not implemented, the ten-EA system will be very unstable during DOS attacks, and the value of x i will produce a large runout, which will seriously affect the stability of the system and the balance of supply and demand. After the DOS attack is over, the value of x i cannot tend to be stable, which seriously affects the convergence of the algorithm and the optimality of the result.

5. Conclusions

This paper investigates the distributed economic dispatch problem for smart grids in the presence of Denial-of-Service (DOS) attacks. A novel energy management strategy is proposed, which not only resists DOS attacks but also recovers lost information when there is an interruption in the communication link. This approach exhibits strong robustness and adaptability against DOS attacks and deploys the Lyapunov method for achieving optimal energy management within a finite time. The integral sliding mode technique is applied to eliminate disturbances caused by external factors. The effectiveness of the proposed method is verified by Lyapunov analysis, and the convergence time of the algorithm under DOS attack is analyzed—which is related with the length of DOS attack period—and Theorem 1 is obtained. Lastly, simulation results are used to validate the effectiveness and efficiency of the new approach. In the future, we hope to extend this approach to integrated energy systems to solve more complex energy management problems.

Author Contributions

Conceptualization, Z.S. (Zhenghang Song) and B.W.; Methodology, Z.S. (Zhenghang Song), B.W. and Z.S. (Zhengyu Shan); Software, Z.S. (Zhenghang Song); Formal analysis, Z.S. (Zhenghang Song), Z.S. (Zhengyu Shan) and P.G.; Data curation, Z.S. (Zhenghang Song) and X.W.; Writing—original draft, Z.S. (Zhenghang Song) and X.W.; Writing—review & editing, Z.S. (Zhenghang Song) and P.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by The Guangdong Basic and Applied Basic Research Foundation under Grant 2021A1515110239.

Data Availability Statement

The data of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Huang, A.Q.; Crow, M.L.; Heydt, G.T.; Zheng, J.P.; Dale, S.J. The future renewable electric energy delivery and management (FREEDM) system: The energy Internet. Proc. IEEE 2011, 99, 133–148. [Google Scholar] [CrossRef]
  2. Li, T.; Huang, R.; Chen, L.; Jensen, C.S.; Pedersen, T.B. Compression of uncertain trajectories in road networks. Proc. VLDB Endow. 2020, 13, 1050–1063. [Google Scholar] [CrossRef]
  3. Zhou, J.; Xu, Y.; Sun, H.; Li, Y.; Chow, M.-Y. Distributed power management for networked AC–DC microgrids with unbalanced microgrids. IEEE Trans. Ind. Inform. 2020, 16, 1655–1667. [Google Scholar] [CrossRef]
  4. Li, T.; Chen, L.; Jensen, C.S.; Pedersen, T.B.; Gao, Y.; Hu, J. Evolutionary Clustering of Moving Objects. In Proceedings of the 2022 IEEE 38th International Conference on Data Engineering (ICDE), Kuala Lumpur, Malaysia, 9–12 May 2022; pp. 2399–2411. [Google Scholar] [CrossRef]
  5. Li, Y.; Gao, D.W.; Gao, W.; Zhang, H.; Zhou, J. A distributed doublenewton descent algorithm for cooperative energy management of multiple energy bodies in energy internet. IEEE Trans. Ind. Inform. 2021, 17, 5993–6003. [Google Scholar] [CrossRef]
  6. Attarha, A.; Scott, P.; Thibaux, S. Affifinely adjustable robust ADMM for residential DER coordination in distribution networks. IEEE Trans. Smart Grid 2020, 11, 1620–1629. [Google Scholar] [CrossRef]
  7. Li, Y.; Zhang, H.; Liang, X.; Huang, B. Event-triggered based distributed cooperative energy management for multi-energy systems. IEEE Trans. Ind. Inform. 2019, 15, 2008–2022. [Google Scholar] [CrossRef]
  8. Salih, M.; Koch, M.; Baumeister, D.; Wazifehdust, M.; Steinbusch, P.; Zdrallek, M. Adapted Newton-Raphson Power Flow Method for a DC Traction Network including Non-receptive Power Sources and Photovoltaic Systems. In Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), Bucharest, Romania, 29 September–2 October 2019; pp. 1–5. [Google Scholar] [CrossRef]
  9. Hesaroor, K.; Das, D. Improved Modified Newton Raphson Load Flow Method for Islanded Microgrids. In Proceedings of the 2020 IEEE 17th India Council International Conference (INDICON), New Delhi, India, 10–13 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
  10. Li, Y.; Gao, D.W.; Gao, W.; Zhang, H.; Zhou, J. Double-Mode Energy Management for Multi-Energy System via Distributed Dynamic Event-Triggered Newton-Raphson Algorithm. IEEE Trans. Smart Grid 2020, 11, 5339–5356. [Google Scholar] [CrossRef]
  11. Le, X.; Chen, S.; Li, F.; Yan, Z.; Xi, J. Distributed neurodynamic optimization for energy internet management. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1624–1633. [Google Scholar] [CrossRef]
  12. Liu, Q.; Yang, S.; Wang, J. A collective neurodynamic approach to distributed constrained optimization. IEEE Trans. Neural Netw. Learn. Syst. 2017, 28, 1747–1758. [Google Scholar] [CrossRef] [PubMed]
  13. Knudsen, T.; Bak, T.; Svenstrup, M. Survey of wind farm control—Power and fatigue optimization. Wind Energy 2015, 18, 1333–1351. [Google Scholar] [CrossRef]
  14. Firouzbahrami, M.; Nobakhti, A. Finite-Time Distributed Economic Dispatch Over Network Systems with Coupled Local Costs. IEEE Control Syst. Lett. 2023, 7, 325–330. [Google Scholar] [CrossRef]
  15. Utkarsh, K.; Trivedi, A.; Srinivasan, D.; Reindl, T. A Consensus-Based Distributed Computational Intelligence Technique for Real-Time Optimal Control in Smart Distribution Grids. IEEE Trans. Emerg. Top. Comput. Intell. 2017, 1, 51–60. [Google Scholar] [CrossRef]
  16. Yun, H.; Shim, H.; Ahn, H.-S. Initialization-free privacy-guaranteed distributed algorithm for economic dispatch problem. Automatica 2019, 102, 86–93. [Google Scholar] [CrossRef]
  17. Zhao, T.; Li, Z.; Ding, Z. Consensus-based distributed optimal energy management with less communication in a microgrid. IEEE Trans. Ind. Inform. 2019, 15, 3356–3367. [Google Scholar] [CrossRef]
  18. Dai, H.; Jia, J.; Yan, L.; Fang, X.; Chen, W. Distributed Fixed-Time Optimization in Economic Dispatch Over Directed Networks. IEEE Trans. Ind. Inform. 2021, 17, 3011–3019. [Google Scholar] [CrossRef]
  19. Firouzbahrami, M.; Nobakhti, A. Cooperative fixed-time/finite-time distributed robust optimization of multi-agent systems. Automatica 2022, 142, 110358. [Google Scholar] [CrossRef]
  20. Acarali, D.; Rajarajan, M.; Chema, D.; Ginzburg, M. Modelling DoS Attacks & Interoperability in the Smart Grid. In Proceedings of the 2020 29th International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA, 3–6 August 2020; pp. 1–6. [Google Scholar] [CrossRef]
  21. Abdelwahab, A.; Lucia, W.; Youssef, A. A DoS-resilient Set-Theoretic Controller for Smart Grid Applications. In Proceedings of the 2020 IEEE Power & Energy Society General Meeting (PESGM), Montreal, QC, Canada, 2–6 August 2020; pp. 1–5. [Google Scholar] [CrossRef]
  22. Zhang, Z.; Yue, D.; Dou, C. A robust consensus-based economic dispatch strategy under DoS attack. In Proceedings of the 2019 IEEE ICPS, Taipei, Taiwan, 6–9 May 2019; pp. 127–132. [Google Scholar]
  23. Çakır, S.; Sertbaş, A.; Aydın, M.A. Machine Learning-Based Security Test Model and Evaluation for SIP-Based DoS Attacks. In Proceedings of the 2022 International Conference on INnovations in Intelligent SysTems and Applications (INISTA), Biarritz, France, 8–12 August 2022; pp. 1–5. [Google Scholar] [CrossRef]
  24. Huang, B.; Li, Y.; Zhan, F.; Sun, Q.; Zhang, H. A Distributed Robust Economic Dispatch Strategy for Integrated Energy System Considering Cyber-Attacks. IEEE Trans. Ind. Inform. 2022, 18, 880–890. [Google Scholar] [CrossRef]
  25. Li, Y.; Li, T.; Zhang, H.; Xie, X.; Sun, Q. Distributed Resilient Double-Gradient-Descent Based Energy Management Strategy for Multi-Energy System Under DoS Attacks. IEEE Trans. Netw. Sci. Eng. 2022, 9, 2301–2316. [Google Scholar] [CrossRef]
  26. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  27. Zuo, Z.; Tie, L. A new class of finite-time nonlinear consensus protocols for multi-agent systems. Int. J. Control 2014, 87, 363–370. [Google Scholar] [CrossRef]
  28. Olfati-Saber, R.; Murray, R.M. Consensus problems in networks of agents with switching topology and time-delays. IEEE Trans. Autom. Control 2004, 49, 1520–1533. [Google Scholar] [CrossRef]
Figure 1. Physical topology and communication topology of six-EA systems.
Figure 1. Physical topology and communication topology of six-EA systems.
Mathematics 11 02103 g001
Figure 2. (a) Network structure under normal conditions. (b) Network structure under DOS attacks.
Figure 2. (a) Network structure under normal conditions. (b) Network structure under DOS attacks.
Mathematics 11 02103 g002
Figure 3. Sequence of DoS attacks.
Figure 3. Sequence of DoS attacks.
Mathematics 11 02103 g003
Figure 4. (a) Under DOS attack, the optimal capacity or consumption of six EAs with the smallest objective function is achieved. (b) Under DOS attack, the optimal capacity or consumption of ten EAs with the smallest objective function is achieved.
Figure 4. (a) Under DOS attack, the optimal capacity or consumption of six EAs with the smallest objective function is achieved. (b) Under DOS attack, the optimal capacity or consumption of ten EAs with the smallest objective function is achieved.
Mathematics 11 02103 g004
Figure 5. (a) Under DOS attacks, the strategy proposed in this article is adopted. (b) Under DOS attacks, the strategy proposed in this article is not adopted.
Figure 5. (a) Under DOS attacks, the strategy proposed in this article is adopted. (b) Under DOS attacks, the strategy proposed in this article is not adopted.
Mathematics 11 02103 g005
Table 1. The obtained conclusions about state-of-the-art-works.
Table 1. The obtained conclusions about state-of-the-art-works.
ReferenceFinite-Time Convergence or NotResistant to DOS Attack or NotCoupled Cost Function Is ConsideredFeatures of Paper
[14]YesNoYesProposed a finite time convergence algorithm considering coupled agents
[18]YesNoNoPopularized finite-time stability theory analyzed by Lyapunov function technique
[25]NoYesNoProposed a strategy that can resist DOS attacks
Table 2. Frequency used notation.
Table 2. Frequency used notation.
NotationsDescription
i , t Index for EA and time
p Electricity power
d r g , d f g Index for DRG, DFG
e s Index for DES
Table 3. The parameters of the cost function of each EA.
Table 3. The parameters of the cost function of each EA.
a i b i c i γ 1 i γ 2 i γ 3 i γ 4 i γ 5 i γ 6 i
E A 1 0.0417.8817000.090.080.1200
E A 2 0.04317.851200.200.190.120.210
E A 3 0.0527.821600.080.2300.3100.13
E A 4 0.04217.81300.020.110.1500.240.17
E A 5 0.0557.629000.0300.0700.13
E A 6 0.0497.82110000.130.170.210
Table 4. Lowest cost for different strategies.
Table 4. Lowest cost for different strategies.
6-EA SystemLowest Cost10-EA SystemLowest Cost
The centralized
strategy
779.4The centralized
strategy
1325.5
The distributed strategy proposed in this paper under DOS attack782The distributed strategy proposed in this paper under DOS attack1329.4
Normal distributed strategy under DOS attacks803.3Normal distributed strategy under DOS attacks1382.7
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Song, Z.; Wang, X.; Wei, B.; Shan, Z.; Guan, P. Distributed Finite-Time Cooperative Economic Dispatch Strategy for Smart Grid under DOS Attack. Mathematics 2023, 11, 2103. https://doi.org/10.3390/math11092103

AMA Style

Song Z, Wang X, Wei B, Shan Z, Guan P. Distributed Finite-Time Cooperative Economic Dispatch Strategy for Smart Grid under DOS Attack. Mathematics. 2023; 11(9):2103. https://doi.org/10.3390/math11092103

Chicago/Turabian Style

Song, Zhenghang, Xiang Wang, Baoze Wei, Zhengyu Shan, and Peiyuan Guan. 2023. "Distributed Finite-Time Cooperative Economic Dispatch Strategy for Smart Grid under DOS Attack" Mathematics 11, no. 9: 2103. https://doi.org/10.3390/math11092103

APA Style

Song, Z., Wang, X., Wei, B., Shan, Z., & Guan, P. (2023). Distributed Finite-Time Cooperative Economic Dispatch Strategy for Smart Grid under DOS Attack. Mathematics, 11(9), 2103. https://doi.org/10.3390/math11092103

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop