Next Article in Journal
Vibration-Based Non-Contact Activity Classification for Home Cage Monitoring Using a Tuned-Beam IMU Sensing Device
Previous Article in Journal
A KWS System for Edge-Computing Applications with Analog-Based Feature Extraction and Learned Step Size Quantized Classifier
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distributed Secure Economic Dispatch Strategy Based on Robust Graph Theory and W-MSR Algorithm

1
School of Electrical Engineering and Automation, Wuhan University, Wuhan 430072, China
2
Institute of Next Generation Power Systems and International Standards, Wuhan University, Wuhan 430072, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(8), 2551; https://doi.org/10.3390/s25082551
Submission received: 6 February 2025 / Revised: 11 April 2025 / Accepted: 15 April 2025 / Published: 17 April 2025
(This article belongs to the Section Sensor Networks)

Abstract

:
The traditional consensus-based distributed economic dispatch strategy may lose system convergency and cause imbalanced power when facing an information attack on the individual power generation unit; thus, it is unable to achieve the dispatching goal. Taking into consideration several kinds of attack behaviors that may exist in a distributed control system, this paper develops models of node attacks from the two aspects of action mode and deployment scope, and analyzes the influence of attack behaviors on the distributed economic dispatch system. Based on the idea of the W-MSR algorithm that deletes the information received from nodes that may be attacked, a distributed security consensus-based economic dispatch strategy is synthetized with the incremental cost of the power generation unit as the consensus variable. Based on the graph robustness index, this paper gives its conditions along with its proof that the communication network topology of the system should be satisfied when adopting the W-MSR algorithm. The simulation results of the IEEE-39 bus distribution network show that the strategy proposed in this paper can effectively counter various information attacks, enhancing both the security and economic efficiency of the distributed economic dispatch system. In addition, the (F + 1, F + 1)-robust graph is a necessary and sufficient condition to achieve the consensus of the dispatch strategy.

1. Introduction

Distributed economic dispatch means that the distributed mode without a dispatch center is used to calculate and adjust the power of each power generation unit under the premise of meeting the basic constraints of the power system to achieve the most economical (usually manifested as the lowest fuel cost) operating mode. Compared with the traditional centralized economic dispatch, the distributed mode has stronger scalability, higher reliability, and more balanced communication and computing burdens, which satisfy the demands of distributed integration and “plug and play” operation, thereby making this mode a research hotspot of current power systems [1,2,3,4].
At present, the research on distributed economic dispatch has made many advances. Its basic idea is to use multi-agent system (MAS) theories and methods to participate in the exchange of necessary information among individuals. Each distributed generation unit participating in the economic dispatch performs data calculations according to the set distributed strategy, makes independent decisions, and adjusts its own output, collaboratively achieving the goal of economic dispatch. Currently, the main distributed algorithms applied in the field of power system economic dispatch include the distributed gradient descent algorithm [5], alternating direction method of multipliers (ADMM) [6,7], and consensus algorithm. Reference [5] proposes a distributed multi-step gradient descent method based on the upper bound of the second derivative to address the economic dispatch problem in microgrids. The distributed gradient algorithm is simple in principle and easy to implement. However, due to its poor performance in terms of convergence and robustness, it is more suitable for small-scale power systems. Reference [6] introduces a distributed economic dispatch algorithm based on the alternating direction method of multipliers (ADMM). This algorithm can handle both equality and inequality constraints simultaneously. ADMM exhibits good convergence and robustness, and it can also demonstrate excellent control performance in some non-convex problems. However, ADMM is sensitive to the selection of key parameters, and improper parameter selection may affect the algorithm’s convergence speed and stability. Additionally, due to the inherently decentralized nature of ADMM, it has not been widely adopted in economic dispatch.
The consensus algorithm is characterized by good convergence, strong robustness, and high flexibility, making it a pivotal method in the field of distributed control in power systems. It is widely applied in areas such as voltage/frequency control, power optimization control, harmonic mitigation, and economic dispatch [8,9,10,11]. Reference [12] adopted the consensus protocol and proved that the economic dispatch optimum was obtained when the incremental costs of all power generation were the same. References [13,14] adopted the leader–follower model based on the consensus algorithm to design the distributed economic dispatch system, in which the “leader” node acquires the data of system power differences, and the rest of the nodes communicate with each other to exchange the consensus variables, calculating and updating their outputs independently. As a counterpart, reference [15] investigated a distributed consistency improvement algorithm without a leader, which had faster convergence and higher stability.
With the increasing integration of high-proportion distributed energy resources and the surge in regulation demands, the deployment of various intelligent sensing terminals and high-speed communication links has significantly increased. Due to the deep coupling of information and physical systems in the power grid, when the information layer is compromised and malfunctions, the fault issues can propagate across domains to the physical layer, leading to equipment failures or power outages. Moreover, under a decentralized control architecture, attackers can target any communication node or link within the network, posing severe challenges to the defense against cybersecurity threats in power systems [16,17]. At present, information security issues have received sufficient attention in multiagent distributed control. The design of feasible distributed security resilience algorithms can effectively counteract cyber attacks and eliminate their associated adverse impacts. Reference [18] proposed a real-time distributed economic dispatch scheme for grid-connected microgrids to counteract cyber attacks. It established a detection and defense mechanism based on the reputation values of communication nodes, where the reputation values and communication weights of nodes decrease with the frequency of attacks. Once the reputation value falls below a predefined threshold, the node is isolated from the communication network, thereby mitigating the impact of the attacks. Reference [19] proposed a distributed resilience algorithm by integrating an event-triggered mechanism with a reputation protocol. The algorithm employs dynamic threshold detection and a node isolation strategy based on reputation value adjustments to counteract false data injection attacks. This approach effectively eliminates the incremental cost deviations caused by attacks, enabling the economic dispatch of integrated electricity and heat energy systems. These methods primarily focus on attack detection and isolation. While such approaches can mitigate the impact of cyber attacks, they may introduce control deviations due to the lack of communication information. Additionally, isolating the compromised distributed generation units and relying on the remaining distributed generation units for economic dispatch may not necessarily yield the most economical results.
Reference [20] proposed a resilient distributed algorithm based on trusted nodes, which achieved consensus among normal and trusted nodes after excluding selfish nodes. This idea of completely removing malicious information was then further expanded into a family of algorithms known as mean-subsequence-reduced (MSR) algorithms [21]. The idea of this class of methods was that normal nodes ranked the information values received from all of their neighbors in order of magnitude, and then removed the largest and smallest F (F representing the estimated upper limit of maliciously behaving nodes) values, and used only the remaining information to update their own state. The method may delete some normal information, thereby resulting in slower system convergence. To overcome this issue, weighted-MSR (W-MSR) [22] and event-MSR (E-MSR) [23] algorithms had been successively proposed. The former calculated the weighted average of the filtered valid information, and the latter achieved resilient consensus by reducing the frequency of information exchange between nodes through event-triggered mechanisms.
The local communication network topology is a determinant for the performance of the distributed economic dispatch system. It is currently common to use the connectivity index of the topology graph to study its influence on the convergence and robustness of the system. Reference [24] studied the convergence problem of distributed consistent economic dispatch under strong connected topology and proved that the strong connected communication network topology was a sufficient condition for the convergence of the economic dispatch algorithm. It was also shown in [25,26] that the communication topology could affect the convergence speed of the distributed consistent economic dispatch strategy. Reference [27] has shown that communication network topology will determine the ability of the distributed algorithms to counter the attacks carried out by the nodes. However, the MSR family of algorithms all need to remove information, which is equivalent to the switching of the network topology in each iteration. The traditional method of measuring network convergence with network connectivity has been challenged greatly. Providing the global network information needed to calculate connectivity in distributed mode is difficult. Reference [28] proved that when F nodes were attacked in a distributed system, at least 2F + 1 network connections must be provided to ensure security consensus. However, normal nodes are required to have at least some non-local information. Reference [29] further showed that the use of network connectivity in analyzing the convergence of the W-MSR algorithm under the directed graph was inappropriate because even if the connectivity of the directed graph was large, it was not enough to ensure the convergence of normal nodes. Reference [22] emphasized that a graph cannot achieve consensus even if its connectivity is large because the number of neighbor nodes in the complementary subset is insufficient, thereby causing each node to delete all useful information from outside its subset, so that it cannot reach consensus. Furthermore, this research further proposed a new topological property, namely network robustness, to describe the security consensus based on the M-MSR algorithm that uses only local information.
Through the analysis of existing research, research gaps can be summarized as follows:
(1)
Attack detection and isolation methods are widely adopted in the research on information security for distributed economic dispatch. Although these methods are effective to some extent, the isolation of nodes may lead to the infringement of individual rights or impair the system’s power generation capability. Therefore, it is necessary to develop an algorithm that can resist attacks without isolating nodes, ensuring both the information security and system stability of distributed economic dispatch.
(2)
In distributed systems, traditional methods typically rely on network connectivity to measure system convergence. However, in scenarios where network topology dynamically switches, the implementation of such methods faces significant challenges. Additionally, in distributed modes, it is difficult to provide the global network information required for calculating connectivity. Therefore, it is essential to explore new analytical methods to more effectively analyze the communication network topology of distributed systems.
Therefore, to overcome these challenges, this paper studies a secure distributed economic dispatch strategy aiming at strengthening the security of the system in the presence of information attacks. The major contributions of this paper are as follows: (1) A distributed secure economic dispatch method is formulated based on the W-MSR algorithm, which, to our best knowledge, is the first strategy that can ensure the security of a distributed economic dispatching system faced with information attacks. (2) The conditions that the proposed dispatch system under the W-MSR algorithm needs to meet to achieve a consistent communication network topology are given and proved on the basis of the robustness index.
The remainder of this paper is structured as follows: The attack modes and their impacts on a distributed dispatch system are introduced in Section 2. Section 3 proposes the secure dispatch strategy based on the W-MSR algorithm and Section 4 analyses the communication network based on a robust graph. The simulation results of proposed secure dispatch algorithm are provided in Section 5. Finally, in Section 6, the main findings of the paper are summarized.

2. Attack Modes and Their Impacts on a Distributed Dispatch System

2.1. Structure of the Distributed Economic Dispatch System

The distributed economic dispatch system is usually designed and implemented with the help of the MAS concept. As shown in Figure 1, each power generation unit that participates in economic dispatch corresponds to an agent with communication and autonomous computing capabilities, and each agent updates certain variable(s) (i.e., the consensus variable, which is usually the incremental cost of a power generation unit) of itself through an agreed protocol by interacting with information from its neighboring agents, and calculates its own output power. When the consensus variables of all agents take the same value, the system operates at its economic optimum.
In an MAS, the communication network equipped between agents (individuals) is abstracted by its topology graph, and graph theory is always applied to research the relevant characteristics of an MAS [30]. Treating individuals as the vertices and inter-individual communication links as the edges, the topology of a communication network with n agents can be represented as a graph G = (V, E), where V = {1, 2, …, n} is the set of vertices, and EV × V is the set of edges. Ni = {jV: (i,j)∈E} indicates the set of vertices in which each one has a direct communication link with vertex i, and di = |Ni| is the in-degree of vertex i. Define Ji = Ni∪{i}. A\B indicates a set that belongs to A but not B, and Zq is a set of integers greater than or equal to q.

2.2. Node Attack Models

Compared with the centralized structure, a distributed system may suffer a larger range of information attacks caused by the decentralized decision-making fashion; that is, each agent can be a potential target of the attack. In distributed mode, even if only one agent may be attacked, it may destroy the global stability of the system. The model of an attack on the individuals/nodes of a distributed network usually includes two aspects, namely, the mode of operation and the scope of deployment. According to different modes of action, node attacks can be usually divided into several types, such as Crashed, Malicious, and Byzantine [31].
Representing the normal node set and the set of nodes under attack by Vn and Vm respectively, where V n V m = V and V n V m = Ø , various attack models are defined as follows:
Definition 1 
(Crashed attack). For a node i∈Vm, if it stops to update its state at a certain time, and the information that has not been updated is transmitted to its neighbor nodes, then this behavior is called a Crashed attack, and node i is a crashed node.
The attack model is as follows:
x i j [ k ] = x i [ k 0 ] , k [ k 0 , k end ]
where j is a neighbor node of i; x i j [ k ] denotes that node j receives information from node i at the iteration cycle k; k 0 is the moment when the attack starts; and k end is the moment when the attack ends.
Definition 2 
(Malicious attack). For a node i∈Vm, if it does not update its state according to the agreed protocol at some moments, but the information passed to the neighbor nodes at any moment is consistent, then this behavior is called a Malicious attack, and the individual i is a malicious node.
The attack model is as follows:
x i j [ k ] = ω j x i [ k ] ,   k [ k 0 , k end ]
where ω j denotes the scaling rate of the transmitted information and all neighbor nodes of i have the same scaling rate.
Definition 3 
(Byzantine attack). For a node i∈Vm, if it does not update its state according to the agreed protocol at some moments or the information passed to the different neighbor nodes at some moments is inconsistent, then the behavior is called a Byzantine attack, and the node i is a Byzantine node.
The attack model is as follows:
x i j [ k ] = ω j x i [ k ] ,   k [ k 0 , k end ]
where all neighbor nodes of i have different scaling rates.
In addition to the mode of action, the scope of deployment of a node attack is also important. Generally, the deployment range can be expressed by a constant. Currently, three models are commonly used: the F-total (F-total deployment) model, F-local (F-local deployment) model, and f-fraction local (f-local proportion deployment) model. These are defined as follows:
Definition 4 
(F-total model). A maximum of F nodes have attack behavior in the n node system, that is, |Vm| ≤ F, F∈Z+. |·| represents the number of elements in the set, and Z+ represents a set of positive integers.
Definition 5 
(F-local model). A normal node has a maximum of F neighbor nodes that have attack behavior in the n node system, that is, |Vm∩Ni| ≤ F, i V n , FZ+.
Definition 6 
(f-fraction local model). In an n node system, the proportion of attacking nodes in the neighbors of a normal node does not exceed f, that is, |Vm∩Ni| ≤ f |Ni|, i V n , 0 ≤ f ≤ 1.

2.3. Influences of the Attacks

The traditional consensus-based distributed economic scheduling completely relies on the information from neighboring nodes, and all nodes update the consensus variable using the same protocol. In a Crashed attack, the attacked node has always passed the wrong information to its neighbor nodes. The results calculated by other normal nodes according to the consensus protocol are inconsistent with the results of normal nodes that cannot receive error information, thereby leading to the failure of the dispatch task. More seriously, the system power balance may be disrupted because of the presence of erroneous information. For Malicious or Byzantine attacks, short-term attacks cause temporary damage to the system. As the attack stops, the system can re-converge to the optimum. A long attack will have the same effect as a Crashed attack. The traditional distributed consensus algorithm cannot achieve the dispatch goal after being attacked, and because the distributed system has a highly decentralized computing decision-making fashion, a single node attack is likely to affect the stability of the entire system. Therefore, the safe distributed economic dispatch strategy in the presence of attacks should be deeply investigated.

3. Secure Dispatch Strategy Based on W-MSR Algorithm

3.1. Consensus Algorithm

At present, distributed economic dispatch strategies are mostly based on the consensus protocols. The first-order linear discrete consensus protocol commonly used by n agent systems can be expressed as follows:
x i [ k + 1 ] = j J j [ k ] w i j [ k ] x j [ k ]
where xi[k] represents the agent value that corresponds to node i at the iteration cycle k; and wij[k] represents the weight of information exchanged between nodes i and j at cycle k, which usually needs to satisfy the following:
w i j [ k ] = 0 ,   j J i [ k ] w i j [ k ] α ,   j J i [ k ] j = 1 n w i j [ k ] = 1
where α is a constant between (0, 1).
On the premise that wij[k] satisfies Formula (5), when the time-invariant communication network topology of the system has a spanning tree, each agent can update its state iteratively according to protocol (1), and the state of all agents eventually reaches the same, which is as follows:
x 1 = x 2 = = x n
and vice versa [32].
Weight wij[k] largely determines the convergence speed for a consensus-based distributed algorithm. It has been shown in [31] that when the topology is a fixed undirected graph, the weight optimization problem can be converted into a semidefinite program (SDP) problem to obtain a faster convergence speed. However, solving the SDP problem requires global information, and weight optimization does not have a significant impact on the convergence speed when the network scale is relatively small. Therefore, this paper uses the following weighting scheme that only requires local information.
w i j [ k ] = 1 1 + d i ( k ) , j J i [ k ]

3.2. W-MSR Algorithm

The traditional distributed economic dispatch system can achieve the consensus result according to the linear update rule given by Formula (4) and the weight value given by Formula (7). However, information security in a distributed network requires special attention since it cannot defend against attacks.
According to the definition of the attack model, the attacked node propagates wrong or even harmful information to the neighbor nodes. The normal nodes need to update their local states safely by accurately removing the information from the nodes with malicious behaviors, which is the main idea of the W-MSR algorithm. Taking the F-local model as an example, the node i obtains information about itself and all neighbor nodes at iteration cycle k. Among them, at most, F neighbor nodes may be attacked or malicious, and the attacked information evidently deviates from the consistent value. Thus, node i should remove the received values that are strictly greater than and less than its own value, and update its own state with the remaining correct information. The specific implementation of the W-MSR algorithm is presented as follows:
  • Node i obtains the data for itself and all of its neighbors at cycle k and arranges them by size.
  • If there are less than F neighbors strictly greater than its own value xi[k], then all values strictly greater than itself must be removed. Otherwise, the first F maximum values shall be removed. Similarly, if there are less than F neighbors strictly less than its own value xi[k], then all values strictly less than itself must be removed. Otherwise, F minimums must be ignored.
  • Let Ri[k] represent the set of neighbors removed by node i in Step 2, and the state update role of node i is modified to the following:
x i [ k + 1 ] = j J j [ k ] \ R f [ k ] w i j [ k ] x j [ k ]
where Ji[k]/Ri[k] represents the set after Ji[k] after removing Ri[k]. The weight wij[k] still should satisfy Formula (5); one of the simple ways to adjust wij[k] is for any jJi[k]\Ri[k], wij[k] = 1/(1 + di[k] − |Ri[k]|).
Step 2 suggests that the number of removed values is related to the value of node i in cycle k, and the MSR algorithm removes the first F maximum values and the first F minimum values in each iteration cycle. Figure 2 conceptually illustrates the principle of the value filtering of the W-MSR algorithm in coping with an F-local attack.

3.3. Distributed Secure and Economic Dispatch Strategy

The goal of distributed economic dispatch is to minimize the total power generation cost under the premise of meeting the condition constraints. Thus, the objective function is usually defined as follows:
min F = i = 1 n F i P G i
where n is the number of power generation units in the system, and PGi and Fi(PGi) are the output power and cost function of the power-generating unit i, respectively. Although differences in the power generation cost functions of different types of power-generating units are observed, most are currently given in the form of a quadratic convex function [33], which is as follows:
F i P G i = a i P G i 2 + b i P G i + c i
where ai, bi, and ci are the coefficients of the second, first, and constant terms of the cost function for power generation unit i, respectively.
Power balance is a condition that needs to be satisfied for power system operation. Thus, the equation constraint of the economic dispatch optimization model is as follows:
i = 1 n P G i = P D
where PD is the total load of the system.
The inequality constraint of the optimization model is as follows:
P G i min P G i P G i max
where P G i min and P G i max are the maximum and minimum values of the output power-generating unit i, respectively.
Using the Lagrangian multiplier, the optimization model can be expressed as follows:
min F = i = 1 n F i ( P G i ) + λ Δ P s . t . P G i min P G i P G i max
where λ is a Lagrangian multiplier, which is the incremental cost of each power-generating unit, and Δ P = P D i = 1 n P G i is the system power deficit.
The partial derivative of λ and PGi should be determined and set to zero; hence, the following:
F P G i = d F i P G i d P G i λ 1 P D P G i = 0 F λ = P D i = 1 n P G i = 0
The simultaneous solution of the aforementioned equations shows that the optimal solution for economic dispatch is achieved when all power generation units have the same value of λ, since the cost function is a convex one. Therefore, economic dispatch optimization can be transformed into a consensus problem taking λi as the consensus variable. Considering that the distributed economic dispatch system may be attacked, the W-MSR algorithm is applied to obtain the consensus variable update rule:
λ i [ k + 1 ] = j J i [ k ] w i j [ k ] λ j [ k ] + ε Δ P
where ε is the convergence coefficient, a positive number, and the system does not converge if it is too large [34].
Each power-generating unit determines the contribution based on the incremental cost update value obtained by Formula (14):
P G i [ k ] = λ i [ k ] b i a i
Considering the power constraints, Formula (14) can be changed into the following:
P G i [ k ] = P G i min λ i [ k ] b i a i P G i min λ i [ k ] b i a i P G i min λ i [ k ] b i a i P G i max P G i max λ i [ k ] b i a i P G i max
Through these steps, the safe economic dispatch in distributed mode can be obtained while maintaining the consensus of the optimal solution with the centralized method:
λ i * = P D + i = 1 n b i 2 a i / i = 1 n 1 2 a i P G i * = λ i * b i / 2 a i
In summary, the secure W-MSR-based distributed economic dispatch process to deal with attack behavior is depicted in Figure 3.
Compared with traditional distributed economic dispatching, the distributed safe economic dispatching strategy in this paper adopts the W-MSR algorithm to improve the updating rules of consensus variables. The individual ensures that only the correct information is used to update the consensus variables by filtering out the wrong or harmful information to obtain the optimal solution for economic dispatch. However, this process will involve the removal of information and the change in weights; that is, even if the communication network topology is fixed, it will also “induce” the dynamic topology. Therefore, the conditions that the communication network topology of the economic dispatch system based on the W-MSR algorithm needs to meet should be investigated.

4. Topology Analysis of Communication Network Based on a Robust Graph

This study analyzes the communication network topology of the economic dispatch system based on the W-MSR algorithm according to the network robustness index. The following definitions of available sets are given:
Definition 7 
(r-available set). For a graph G = (V, E) and a nonempty subset SV, if there are at least r neighbors of node i∈S from outside the set S, that is, |Ni\S| ≥ r, r∈Z≥0, then the set S is called an r-available set.
Definition 8 
((r, s)-available set). For a graph G = (V, E) and a nonempty node subset SV, if there are no less than s nodes in set S such that each one has at least r neighbor nodes from outside the set S, let set XrS = {i∈S: |Ni\S| ≥ r}, meeting |XrS| ≥ s, r, s∈Z≥0. Then, the set S is called an (r, s)-available set. The (r, 1)-available set is naturally an r-available set.
Take the communication network topology G shown in Figure 4 as an example to illustrate the aforementioned concept. S1 and S2 are the divided subsets of G (disjoint subset). Let r = 3. One power generation unit (represented by a shadow filled cycle) in S1 can receive the information from at least three power generation units in the off-set of S1; hence, S1 is a three-available set. Similarly, two power generation units in S2 can receive the information from at least three power generation units in the off-set of S2; hence, S2 is a (3, 2)-available set.
Based on the available set concept, the robust graph is further defined as follows:
Definition 9
(r-robust graph [30]). A graph G = (V, E) is an r-robust graph if, for any pair of divided subsets S1 and S2 of V, at least one is an r-available set.
Definition 10
((r, s)-robust graph [22]). For a graph G = (V, E) (the number of nodes n ≥ 2), and S1 and S2 as any pair of divided subsets of V, G is an (r, s)-robust graph if the following condition is satisfied:
X S 1 F + 1 + X S 2 F + 1 F
The conditions to be satisfied by the local communication network topology for implementing a distributed safe and economic dispatch strategy based on the W-MSR algorithm are given in the following theorem.
Theorem 1.
For the economic dispatch system with n distributed power units (Figure 1), the communication topology is G = (V, E), and each normal node updates the consensus variable value according to Formula (15). The W-MSR algorithm can reach the optimal solution of economic dispatch if and only if G is a (F + 1, F + 1)-robust graph.
Proof of Theorem 1.
(Necessity.) If G is not an (F + 1, F + 1)-robust graph, then the nonempty disjoint subsets S1 and S2 do not satisfy any condition of Formula (19). Assume that the initial states of each node in S1, S2 are a and b, respectively, and a < b, and set the initial state of others in the range of (a, b). Given that X S 1 F + 1 + X S 2 F + 1 F , it can be supposed that the nodes in X S 1 F + 1 and X S 2 F + 1 are all of the attacked nodes and remain to transmit their initial values. Considering X S 1 F + 1 < S 1 and X S 2 F + 1 < S 2 , at least one normal node can be found in S1 and S2. The normal node(s) cannot reach an agreement because it(they) can only remove F or less than F values received from the neighbor nodes.
(Sufficiency.) Define the set of all normal nodes by N , and N = | N |. M[t] and m[t] are defined as the upper and lower values of the normal node at time t, respectively. M[t] and m[t] are the monotone bounded functions of t and their limits are defined as AM and Am. If AM = Am, the normal nodes can reach consensus. Next, this situation will be proven by contradiction.
Assume AM > Am. Let constant ϵ 0 > 0, and make A M ϵ 0 > A m + ϵ 0 . At moment t for any positive real value x i [ t ] > A M ϵ i , let XM(t, ϵ i ) = { iV: x i [ t ] > A M ϵ i }, which corresponds to all of the nodes greater than A M ϵ i ; let Xm(t, ϵ i ) = { iV: x i [ t ] < A m + ϵ i }, which refers to all of the nodes smaller than A m + ϵ i . The definition of ϵ 0 shows that XM(t, ϵ 0 ) and Xm(t, ϵ i ) are disjoint.
Fix ϵ < α N 1 α N ϵ 0 (α is the line weight), which meets ϵ 0 > ϵ > 0 . Set t ϵ to M [ t ] < A M + ϵ and m [ t ] > A m ϵ , t t ϵ ( t ϵ exists according to the definition of convergence). Nonempty sets XM(t, ϵ 0 ) and Xm(t, ϵ 0 ) are also disjoint. Because G is an (F + 1, F + 1)-robust graph, the number of malicious nodes is not greater than F. Thus, a normal node with at least F + 1 neighbors outside its set exists. Without losing generality, assume that normal node i X M ( t ϵ , ϵ 0 ) N has at least F + 1 neighbors outside the set X M ( t ϵ , ϵ 0 ) . According to the definition, the maximum value of these neighbor nodes is A M ϵ 0 , and at least one of these values is used by node i. Notably, at each step, the value of each normal node is a convex combination of its own value, and the value it uses from its neighbors and each coefficient in the combination are bounded by α. At moment t ϵ , the maximum value used by node i is M [ t ϵ ] . If setting M [ t ϵ ] has the largest possible weight, then the following is obtained:
x i t ϵ + 1 ( 1 α ) M t ϵ + α A M ϵ 0 ( 1 α ) A M + ϵ + α A M ϵ 0 A M α ϵ 0 + ( 1 α ) ϵ
The limit is also suitable for normal nodes that are out of the set X M ( t ϵ , ϵ 0 ) , because these nodes update only using their own value. Similarly, if node j X m ( t ϵ , ϵ 0 ) N has F + 1 neighbors outside set X m ( t ϵ , ϵ 0 ) , then x j t ϵ + 1 A m + α ϵ 0 ( 1 α ) ϵ , and normal nodes that are out of the set X m ( t ϵ , ϵ 0 ) have this limit.
Define ϵ 1 = α ϵ 0 ( 1 α ) ϵ , which meets 0 < ϵ < ϵ 1 < ϵ 0 . Take into account X M ( t ϵ + 1 , ϵ 1 ) and X m ( t ϵ + 1 , ϵ 1 ) . Because at least one normal node in set X M ( t ϵ , ϵ 0 ) reduces to A M ϵ 1 (or smaller) or at least one normal node in set X m ( t ϵ , ϵ 0 ) increases to A m + ϵ 1 (or larger), it must be that either X M ( t ϵ + 1 , ϵ 1 ) N < X M ( t ϵ , ϵ 0 ) N or X m ( t ϵ + 1 , ϵ 1 ) N < X m ( t ϵ , ϵ 0 ) N , or both. Set X M ( t ϵ + 1 , ϵ 1 ) and X m ( t ϵ + 1 , ϵ 1 ) are also disjoint because of ϵ 1 < ϵ 0 . For j ≥ 1, define ϵ j = α ϵ j 1 ( 1 α ) ϵ , and ϵ j < ϵ j 1 . If both sets X M ( t ϵ + 1 , ϵ j ) and X m ( t ϵ + 1 , ϵ j ) have normal nodes, the above analysis can be repeated at time t ϵ + j . In addition, at time t ϵ + j , either X M ( t ϵ + j , ϵ j ) N < X M ( t ϵ + j 1 , ϵ j 1 ) N or X m ( t ϵ + j , ϵ j ) N < X m ( t ϵ + j 1 , ϵ j 1 ) N , or both. There must exist a moment t ϵ + T (T ≤ N) where both X M ( t ϵ + T , ϵ T ) N and X m ( t ϵ + T , ϵ T ) N are empty because X M ( t ϵ + 1 , ϵ 0 ) N + X m ( t ϵ , ϵ 0 ) N N . In the former scenario, the value of each normal node at moment t ϵ + T is mostly A M ϵ T . In the latter scenario, the value of each normal node at moment t ϵ + T is no less than A m + ϵ T .
The following explanation will prove that ϵ T > 0 conflicts with the fact that the maximum value converges monotonically to AM (the former scenario) or the minimum value converges monotonically to Am (the latter scenario). The reason is the following:
ϵ T = α ϵ T 1 ( 1 α ) ϵ = α 2 ϵ T 2 α ( 1 α ) ϵ ( 1 α ) ϵ = α T ϵ 0 ( 1 α ) 1 + α + + α T 1 ϵ = α T ϵ 0 1 α T ϵ α N ϵ 0 1 α N ϵ
Since ϵ < α N 1 α N ϵ 0 , ϵ T > 0 , which contradicts the above analysis. Therefore, ϵ 0 = 0 must obtain AM = Am. □

5. Simulation Verification

5.1. Configuration of the Dispatch System

The IEEE-39 bus distribution network was simulated and analyzed to prove the correctness and feasibility of the strategy presented in this paper [33]. We designed two case studies, connecting 10 and 20 distributed generation units to the network, respectively, to analyze the performance of the proposed algorithm as the scale of the communication network expands. Table 1 lists the basic parameters of each power generation unit.
The initial power of each unit was set to the minimum value of the respective output power, and the initial load of the system was 3440 MW. Figure 5 shows the communication network topology among 10 distributed power generation units.

5.2. Analysis of the System with 10 Distributed Generation Units

5.2.1. Simulation for Crashed Attack

Each agent is assumed to adopt the traditional consensus-based distributed economic dispatch strategy (hereinafter referred to as the consensus algorithm) at the beginning of simulation, and no node attack occurs. When k = 100 (k is the iteration cycle), node 2 is under a Crashed attack, and the information sent to its neighbor nodes in the subsequent iteration process remains at its initial value λ2[0]. When k = 200, the proposed distributed secure economic dispatch strategy based on the W-MSR algorithm (hereinafter referred to as W-MSR algorithm) is activated. The obtained simulation results are shown in Figure 6, and the key information for each simulation stage is listed in Table 2.
Figure 6 and Table 2 show that for the consensus algorithm, the consensus variables of the ten power units begin to deviate from the same value of 9.152 USD/MW right after the Crashed attack and are different from each other. The power balance of the system is also destroyed, and the total generating power is less than the total load demand by 455 MW. Therefore, the distributed economic dispatch system using the traditional consensus algorithm cannot achieve economic dispatch goals after being attacked, and a single node attack may affect the stability of the entire system. After adopting the proposed W-MSR algorithm, the consensus variable of each unit rapidly re-converges to λ* = 9.1522 USD/MW, which is consistent with the calculation result of Formula (18). Moreover, the attacked nodes are not isolated, and the outputs of the generator units remain the same as when no node attacks occur. The overall power generation capability of the system is not compromised, and the dispatch system once again achieves power balance. The simulation results demonstrate that this strategy can effectively address collapse attacks, ensuring the safe and stable operation of the distributed dispatch system in the most economical state.

5.2.2. Simulation for Byzantine Attack

Node 5 is assumed to suffer a Byzantine attack from k = 100 to k = 105 and transmits inconsistent information to its different neighbor nodes. Among these neighbor nodes, 1.1λ5 is transmitted to node 1, 0.9λ5[k] is sent to node 2, 1.08λ5[k] is sent to node 9, and λ5[k] is sent to other neighbor nodes. At k = 180, node 8 is attacked by Byzantine continuously, and 0.92λ8[k] is transmitted to node 4, 0.95λ8[k] is sent to node 9, and λ8[k] is sent to other neighbor nodes. The proposed W-MSR algorithm is applied at k = 200. Figure 7 shows the variations in the consensus variables and system power in these scenarios.
Figure 7 reveals that when the traditional consensus algorithm is adopted, the two Byzantine attacks also prevent the consensus variables of the dispatch system from converging to the same value, and the system power balance is destroyed. However, the influence of this type of attack on the stability of the dispatch system is related to the duration of the attack. Specifically, when the attack time is short, such as the attack at node 5, the dispatch system can return to the optimal state and run stably after a certain number of iteration cycles automatically. A long-term Byzantine attack, such as the attack at node 8, may hinder the consensus variables from converging to the same value, thereby causing continuously unbalanced power in the system. As long the W-MSR algorithm is adopted, the economic dispatch system can resist continuous Byzantine attacks effectively and ensure that the system converges to a consistent state and runs stably at the optimal value.

5.3. Analysis of the System with 20 Distributed Generation Units

5.3.1. Simulation for Crashed Attack

For the system with 20 distributed generation units, the simulation for Crashed attack is conducted with the specific attack scenarios consistent with those described in Section 5.2.1. At k = 100 (k is the iteration cycle), node 2 is under a Crashed attack. When k = 200, the proposed distributed secure economic dispatch strategy based on the W-MSR algorithm is activated. The obtained simulation results are shown in Figure 8, and the key information for each simulation stage is listed in Table 3.
Figure 8 and Table 3 show that for the consensus algorithm, the consensus variables of the twenty power units begin to deviate from the same value of 8.329 USD/MW right after the Crashed attack and are different from each other. The power balance of the system is also destroyed, and the total generating power is less than the total load demand by 103.55 MW. Therefore, the distributed economic dispatch system using the traditional consensus algorithm cannot achieve economic dispatch goals after being attacked, and a single node attack may affect the stability of the entire system. After adopting the proposed W-MSR algorithm, the consensus variable of each unit rapidly re-converges to λ* = 8.329 USD/MW. Moreover, the attacked nodes are not isolated, and the outputs of the generator units remain the same as when no node attacks occur. The overall power generation capability of the system is not compromised, and the dispatch system once again achieves power balance. The simulation results demonstrate that this strategy can effectively address collapse attacks, ensuring the safe and stable operation of the distributed dispatch system in the most economical state.

5.3.2. Simulation for Byzantine Attack

For the system with 20 distributed generation units, the simulation for Byzantine attack is conducted with the specific attack scenarios consistent with those described in Section 5.2.2. Node 5 is assumed to suffer a Byzantine attack from k = 100 to k = 105 and transmits inconsistent information to its different neighbor nodes. At k = 180, node 8 is attacked by Byzantine continuously. The proposed W-MSR algorithm is applied at k = 200. Figure 9 shows the variations in the consensus variables and system power in these scenarios.
Figure 9 reveals that when the traditional consensus algorithm is adopted, the two Byzantine attacks also prevent the consensus variables of the dispatch system from converging to the same value, and the system power balance is destroyed. However, the influence of this type of attack on the stability of the dispatch system is related to the duration of the attack. Specifically, when the attack time is short, such as the attack at node 5, the dispatch system can return to the optimal state and run stably after a certain number of iteration cycles automatically. A long-term Byzantine attack, such as the attack at node 8, may hinder the consensus variables from converging to the same value, thereby causing continuously unbalanced power in the system. As long as the W-MSR algorithm is adopted, the economic dispatch system can resist continuous Byzantine attacks effectively and ensure that the system converges to a consistent state and runs stably at the optimal value.

5.4. Comparative Analysis of Case Study Results

From the simulation results in Section 5.2 and Section 5.3, it can be observed that as more distributed generation units are integrated into the system and the communication network scales up, the proposed distributed secure economic dispatch strategy based on the W-MSR algorithm effectively withstands various modes of node attack, ensuring the secure and stable operation of the distributed dispatch system at the optimal solution. Moreover, the algorithm does not employ isolation measures, and the final result is the most economical dispatch achieved through the collective participation of all distributed generation units, thereby guaranteeing the economic efficiency of system operation. Table 4 presents the number of iterations required for the system to reconverge to the optimal solution using the W-MSR algorithm after being subjected to attacks in the two case study systems.
From Table 4, it can be observed that as the network scale expands, the time required for the W-MSR algorithm to counteract attacks slightly increases. Additionally, the comparison reveals that with the expansion of the network scale, the proposed distributed secure economic dispatch strategy based on the W-MSR algorithm requires more iterations to handle Crashed attacks, while the number of iterations needed to address Byzantine attacks remains almost unchanged. This is because a Crashed attack involves nodes ceasing state updates and propagating information that has not been updated to their neighboring nodes. As the network scale grows, this behavior of not updating states poses greater challenges to the convergence of the consensus protocol, requiring all agents to take longer to converge to a consistent value.

5.5. Verification of Sufficient and Necessary Conditions of Communication Network Topology

Definition 10 suggests that the communication network topology (Figure 4) is (2, 2)-robust. The simulation results in Section 5.2 also show that the economic dispatch system with the W-MSR algorithm under this topology can effectively resist various attacks. To verify the correctness of Theorem 1, some communication lines are disconnected to obtain various topologies, as shown in Figure 10.
Situation 1: Disconnect the communication line between G1 and G4, and the obtained communication topology is still a (2, 2)-robust graph.
Situation 2: Disconnect the communication line between G3 and G6. Subsequently, two subsets, namely, S1 and S2, can be obtained, as shown in Figure 10b. None of the conditions in Formula (19) is satisfied since X S 1 2 = 0 and X S 2 2 = 1 (node 7). Thus, the communication network topology is not a (2, 2)-robust graph at this time.
Situation 3: Disconnect the communication line between G6 and G9. As shown in Figure 10c, two subsets, namely, S1 and S2, can be obtained. These two subsets do not meet any of the conditions in Formula (19). Therefore, the communication network topology at the moment is still not a (2, 2)-robust graph.
Situation 4: The communication between G2 and G5 is further disconnected on the basis of Situation 3. It can be learned from Figure 10d that X S 1 2 = 0 and X S 2 2 = 0 , and the topology connectivity has deteriorated further.
Under the four communication network topologies, the convergences of the consensus variables when adopting the W-MSR algorithm with parameter F = 1 are shown in Figure 11.
Figure 11a shows that when the communication topology graph is still (2, 2)-robust, the distributed economic dispatch system can converge to operate at the optimal solution. Figure 11b–d show that when the communication topology is not a (2, 2)-robust graph, the system cannot converge to a consistent value. In comparison with Situation 3, the topological conditions of Situation 4 are worse, and the differences of the final consensus variables are larger. In fact, the topological graphs of communication networks under the four situations are also strongly connected, and their vertex connectivity is 2, 2, 3, and 3, respectively. Therefore, it can be concluded that using traditional network connectivity to judge the convergence of a distributed control system is not suitable for the distributed secure economic dispatch system, while the network robustness indicator is a more qualified substitute for a communication network that has a switching topology “induced”. In addition, the condition that the communication network graph G is an (F + 1, F + 1)-robust graph is the sufficient and necessary condition for the distributed secure economic dispatch to achieve its dispatch goal under information attacks.

6. Conclusions

This paper focuses on the information security of distributed economic dispatch systems. Considering that the distributed dispatch mode is vulnerable to external attacks and the identification of attacks in the decentralized structure is difficult, a distributed security economic dispatch strategy based on the W-MSR algorithm is proposed. The information that may come from the nodes under several attack modes is filtered out while updating the consensus variable of normal nodes. This strategy is performed by taking the incremental cost of the power generation unit as the consensus variable to realize a safe and economic dispatch. For the switching of communication network topology induced by the W-MSR algorithm, the conditions to be met for the communication network topology of the system are provided on the basis of the network robustness index. Theoretical analysis and simulation results suggest the following:
(1)
The distributed dispatch strategy designed in this paper, based on the W-MSR algorithm, can withstand various modes of node information attacks. It ensures that the system re-establishes power balance and operates stably at the optimal value after suffering node attacks, effectively enhancing both the security and economic efficiency of the distributed economic dispatch system.
(2)
The robustness of the network is suitable for measuring the performance of the communication network with an induced switching topology.
(3)
The condition that the communication network topology of the distributed economic dispatch system is an (F + 1, F + 1)-robust graph, which is the necessary and sufficient condition for implementing the W-MSR algorithm, provides a basis for designing a communication network for a distributed secure and economic dispatch system.
Although the strategy proposed in this paper effectively enhances the security and economic efficiency of distributed systems, future research can further advance and deepen the following aspects:
This paper assumes that the number of attacked nodes and the patterns of information attacks are known. However, in real-world scenarios, attack behaviors may be more complex and difficult to predict. Future research could explore machine learning-based attack detection methods to address unknown attack patterns.

Author Contributions

Conceptualization, J.L. and J.W.; methodology, J.L.; software, J.L. and J.W.; validation, J.W. and W.W.; formal analysis, J.L., J.W. and H.L.; data curation, J.L.; writing—original draft preparation, J.W. and H.L.; writing—review and editing, W.W.; visualization, W.W.; supervision, H.L.; project administration, H.L.; funding acquisition, J.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Program of China, grant number 2022YFF0610601.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Li, H.; Zhang, C.; Wu, L.; Tong, Z. Economic Optimal Dispatching of Microgrid Based on Improved Finite Time Consistency. In Proceedings of the CSU-EPSA, Cologne, Germany, 4–6 July 2024; Volume 36, pp. 38–48. [Google Scholar] [CrossRef]
  2. Zhang, R.; Chen, Y.; Li, Z.; Jiang, T.; Li, X. Two-Stage Robust Operation of Electricity-Gas-Heat Integrated Multi-Energy Microgrids Considering Heterogeneous Uncertainties. Appl. Energy 2024, 371, 123690. [Google Scholar] [CrossRef]
  3. Zheng, X.; Khodayar, M.E.; Wang, J.; Yue, M.; Zhou, A. Distributionally Robust Multistage Dispatch with Discrete Recourse of Energy Storage Systems. IEEE Trans. Power Syst. 2024, 39, 6960–6973. [Google Scholar] [CrossRef]
  4. Wang, Y.; Yu, X.; Zhang, W. An Improved Reinforcement Learning-Based Differential Evolution Algorithm for Combined Economic and Emission Dispatch Problems. Eng. Appl. Artif. Intell. 2025, 140, 109709. [Google Scholar] [CrossRef]
  5. Bai, C.; Li, Q.; Zhou, W.; Li, B.; Yin, X.; Tan, Y. Weighted Matrix Based Distributed Optimization Method for Economic Dispatch of Microgrids via Multi-Step Gradient Descent. Energy Rep. 2022, 8, 177–187. [Google Scholar] [CrossRef]
  6. Chen, G.; Yang, Q. An ADMM-Based Distributed Algorithm for Economic Dispatch in Islanded Microgrids. IEEE Trans. Ind. Inform. 2018, 14, 3892–3903. [Google Scholar] [CrossRef]
  7. Chen, Z.; Guo, C.; Dong, S.; Ding, Y.; Mao, H. Distributed Robust Dynamic Economic Dispatch of Integrated Transmission and Distribution Systems. IEEE Trans. Ind. Appl. 2021, 57, 4500–4512. [Google Scholar] [CrossRef]
  8. Yang, F.; Cao, J.; Ye, L.; Li, D.; Lin, S.; Zhao, Y.; Shen, Y. Incremental Cost Based Hierarchical Distributed Control Strategy for AC/DC Hybrid Microgrid. Autom. Electr. Power Syst. 2024, 48, 199–207. [Google Scholar]
  9. Lin, L.; Jia, Q.; Tian, S.; Liang, J.; Li, T.; Cheng, Z. Distributed Harmonic Mitigation Strategy of Distribution Network Based on Consensus Algorithm. Autom. Electr. Power Syst. 2022, 46, 109–117. [Google Scholar]
  10. Mao, Y.; Yu, X. A Hybrid Forecasting Approach for China’s National Carbon Emission Allowance Prices with Balanced Accuracy and Interpretability. J. Environ. Manag. 2024, 351, 119873. [Google Scholar] [CrossRef]
  11. Hennane, Y.; Berdai, A.; Pierfederici, S.; Meibody-Tabar, F. A Consensus-Based Control for Precise Reactive Power-Sharing in AC Microgrids. Sustain. Energy Technol. Assess. 2023, 60, 103510. [Google Scholar] [CrossRef]
  12. Wang, R.; Li, Q.; Zhang, B.; Wang, L. Distributed Consensus Based Algorithm for Economic Dispatch in a Microgrid. IEEE Trans. Smart Grid 2019, 10, 3630–3640. [Google Scholar] [CrossRef]
  13. Wu, X.; Sun, Y.; Wei, Z.; Sun, G. Distributed Hierarchical Consensus Algorithm for Economic Dispatch in Smart Grid. IET Gener. Transm. Distrib. 2019, 13, 5541–5549. [Google Scholar] [CrossRef]
  14. Le, J.; Zhou, Q.; Zhao, L.; Wang, Y. Research on the Real-Time Distributed Economic Dispatch Strategy for Microgrids. Energies 2019, 12, 4007. [Google Scholar] [CrossRef]
  15. He, Y.; Wang, W.; Wu, X. Multi-Agent Based Fully Distributed Economic Dispatch in Microgrid Using Exact Diffusion Strategy. IEEE Access 2020, 8, 7020–7031. [Google Scholar] [CrossRef]
  16. Xia, Y.; Xu, Y.; Mondal, S.; Gupta, A.K. A Transfer Learning-Based Method for Cyber-Attack Tolerance in Distributed Control of Microgrids. IEEE Trans. Smart Grid 2024, 15, 1258–1270. [Google Scholar] [CrossRef]
  17. Liu, L.; Song, H.; Piao, X.; Wang, S.; Qu, Y. Data Protection of Distributed Economic Dispatch Based on Blockchain. Electr. Power Inf. Commun. Technol. 2022, 20, 44–52. [Google Scholar] [CrossRef]
  18. Huang, C.; Wang, J.; Deng, S.; Yue, D. Real-Time Distributed Economic Dispatch Scheme of Grid-Connected Microgrid Considering Cyberattacks. IET Renew. Power Gener. 2020, 14, 2750–2758. [Google Scholar] [CrossRef]
  19. Liu, J.; Wang, C.; Liu, J.; Xie, P. Attack Resilient Strategy for Event-Triggered Distributed Control Scheme of Multi-Energy Systems. J. Frankl. Inst. 2023, 360, 5333–5353. [Google Scholar] [CrossRef]
  20. Zhao, C.; He, J.; Wang, Q.-G. Resilient Distributed Optimization Algorithm Against Adversarial Attacks. IEEE Trans. Autom. Control 2020, 65, 4308–4315. [Google Scholar] [CrossRef]
  21. Dibaji, S.M.; Ishii, H. Consensus of Second-Order Multi-Agent Systems in the Presence of Locally Bounded Faults. Syst. Control Lett. 2015, 79, 23–29. [Google Scholar] [CrossRef]
  22. LeBlanc, H.J.; Zhang, H.; Koutsoukos, X.; Sundaram, S. Resilient Asymptotic Consensus in Robust Networks. IEEE J. Sel. Areas Commun. 2013, 31, 766–781. [Google Scholar] [CrossRef]
  23. Wang, Y.; Ishii, H. Resilient Consensus Through Event-Based Communication. IEEE Trans. Control Netw. Syst. 2020, 7, 471–482. [Google Scholar] [CrossRef]
  24. Tan, S.; Yang, S.; Xu, J.-X. Consensus Based Approach for Economic Dispatch Problem in a Smart Grid. In Proceedings of the IECON 2013—39th Annual Conference of the IEEE Industrial Electronics Society, Vienna, Austria, 10–13 November 2013; pp. 2011–2015. [Google Scholar]
  25. Zhao, Y.; Chen, B.; Fan, Y.; Xin, H. Convergence Speed Analysis and Optimization for Distributed Control of Virtual Power Plant. Power Syst. Technol. 2016, 40, 2288–2295. [Google Scholar] [CrossRef]
  26. Zhang, Z.; Chow, M.-Y. Convergence Analysis of the Incremental Cost Consensus Algorithm Under Different Communication Network Topologies in a Smart Grid. IEEE Trans. Power Syst. 2012, 27, 1761–1768. [Google Scholar] [CrossRef]
  27. Sundaram, S.; Hadjicostis, C.N. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents. IEEE Trans. Autom. Control 2011, 56, 1495–1508. [Google Scholar] [CrossRef]
  28. Fiore, D.; Russo, G. Resilient Consensus for Multi-Agent Systems Subject to Differential Privacy Requirements. Automatica 2019, 106, 18–26. [Google Scholar] [CrossRef]
  29. LeBlanc, H.J.; Koutsoukos, X.D. Consensus in Networked Multi-Agent Systems with Adversaries. In Proceedings of the 14th International Conference on Hybrid Systems: Computation and Control, Chicago, IL, USA, 12–14 April 2011; Association for Computing Machinery: New York, NY, USA, 2011; pp. 281–290. [Google Scholar]
  30. Cao, Y.; Yu, W.; Ren, W.; Chen, G. An Overview of Recent Progress in the Study of Distributed Multi-Agent Coordination. IEEE Trans. Ind. Inform. 2013, 9, 427–438. [Google Scholar] [CrossRef]
  31. Pasqualetti, F.; Bicchi, A.; Bullo, F. Consensus Computation in Unreliable Networks: A System Theoretic Approach. IEEE Trans. Autom. Control 2012, 57, 90–104. [Google Scholar] [CrossRef]
  32. Ren, W.; Beard, R.W.; Atkins, E.M. Information Consensus in Multivehicle Cooperative Control. IEEE Control Syst. Mag. 2007, 27, 71–82. [Google Scholar] [CrossRef]
  33. Xie, J.; Chen, K.; Yue, D.; Li, Y.; Wang, K.; Weng, S.; Huang, C. Distributed Economic Dispatch Based on Consensus Algorithm of Multi Agent System for Power System. Electr. Power Autom. Equip. 2016, 36, 112–117. [Google Scholar] [CrossRef]
  34. Binetti, G.; Davoudi, A.; Lewis, F.L.; Naso, D.; Turchiano, B. Distributed Consensus-Based Economic Dispatch with Transmission Losses. IEEE Trans. Power Syst. 2014, 29, 1711–1720. [Google Scholar] [CrossRef]
Figure 1. Structure of a distributed economic dispatch system under the concept of an MAS.
Figure 1. Structure of a distributed economic dispatch system under the concept of an MAS.
Sensors 25 02551 g001
Figure 2. Principle of the node information filtering.
Figure 2. Principle of the node information filtering.
Sensors 25 02551 g002
Figure 3. Flow chart of distributed security consensus economic dispatch to deal with attacks.
Figure 3. Flow chart of distributed security consensus economic dispatch to deal with attacks.
Sensors 25 02551 g003
Figure 4. Illustration of the (r, s)-available set.
Figure 4. Illustration of the (r, s)-available set.
Sensors 25 02551 g004
Figure 5. Topology of the communication network.
Figure 5. Topology of the communication network.
Sensors 25 02551 g005
Figure 6. Stimulation results under Crashed attack. (a) Incremental cost of each unit. (b) Power of each unit. (c) Power of the system.
Figure 6. Stimulation results under Crashed attack. (a) Incremental cost of each unit. (b) Power of each unit. (c) Power of the system.
Sensors 25 02551 g006
Figure 7. Simulation results under Byzantine attack. (a) Incremental cost of each unit. (b) Power of the system.
Figure 7. Simulation results under Byzantine attack. (a) Incremental cost of each unit. (b) Power of the system.
Sensors 25 02551 g007
Figure 8. Stimulation results under Crashed attack. (a) Incremental cost of each unit. (b) Power of each unit. (c) Power of the system.
Figure 8. Stimulation results under Crashed attack. (a) Incremental cost of each unit. (b) Power of each unit. (c) Power of the system.
Sensors 25 02551 g008
Figure 9. Simulation results under Byzantine attack. (a) Incremental cost of each unit. (b) Power of the system.
Figure 9. Simulation results under Byzantine attack. (a) Incremental cost of each unit. (b) Power of the system.
Sensors 25 02551 g009
Figure 10. Different communication network topologies.
Figure 10. Different communication network topologies.
Sensors 25 02551 g010
Figure 11. Convergences of the consensus variables under different communication network topologies.
Figure 11. Convergences of the consensus variables under different communication network topologies.
Sensors 25 02551 g011aSensors 25 02551 g011b
Table 1. Parameter values of the generators.
Table 1. Parameter values of the generators.
Unitai (USD/MW2)bi (USD/MW)ci (USD) P G i min (MW) P G i max (MW)
G10.00386.87135.8875500
G20.00347.03214.9280400
G30.00297.58108.2330280
G40.00187.67220.0080420
G50.00168.14232.5650350
G60.00257.1578.0950480
G70.00227.86234.4864300
G80.00266.8074.6045500
G90.00335.99127.6974400
G100.00286.65100.52150600
G110.00406.32128.3680400
G120.00286.79187.6390350
G130.00336.54254.2375450
G140.00228.9798.7640500
G150.00187.32118.4545300
G160.00418.64186.3430420
G170.00357.51225.7965600
G180.00218.28178.6930350
G190.00246.97169.2450480
G200.00278.16169.3160650
Table 2. Key system information under Crashed attack.
Table 2. Key system information under Crashed attack.
ScenarioConsensus Variable (USD/MW)Power of Each Unit (MW)Power Imbalance (MW)
Consensus algorithm
+ no attack
[9.152, 9.152, 9.152, 9.152, 9.152, 9.152, 9.152, 9.152, 9.152, 9.152][300.285, 312.083, 271.063, 411.713, 316.302, 400.433, 293.674, 360.032, 327.601, 446.815]0
Consensus algorithm
+ Crashed attack
[8.576, 8.558, 8.576, 9.051, 8.828, 8.828, 9.051, 9.204, 9.187, 9.204][224.448, 224.768, 171.691, 383.697, 214.949, 335.567, 270.752, 370.003, 332.824, 456.075]455
W-MSR algorithm
+ Crashed attack
[9.152, 9.152, 9.152, 9.152, 9.152, 9.152, 9.152, 9.152, 9.152, 9.152][300.285, 312.083, 271.063, 411.713, 316.302, 400.433, 293.674, 360.032, 327.601, 446.815]0
Table 3. Key system information under Crashed attack.
Table 3. Key system information under Crashed attack.
ScenarioConsensus Variable ($/MW)Power of Each Unit (MW)Power Imbalance (MW)
Consensus algorithm
+ no attack
[8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329][192.038, 191.102, 129.223, 183.192, 59.216, 235.898, 106.702, 201.825, 202.953, 299.909, 251.186, 274.909, 271.135, 40.000, 280.414, 30.000, 117.070, 30.000, 283.227, 60.000]0
Consensus algorithm
+ Crashed attack
[7.892, 8.013, 7.902, 8.203, 8.046, 8.057, 8.223, 8.374, 8.345, 8.301, 8.372, 8.407, 8.450, 8.465, 8.482, 8.501, 8.504, 8.559, 8.585, 8.590][134.427, 144.579, 55.578, 148.020, 50.000, 181.483, 82.587, 210.374, 205.266, 294.891, 256.444, 288.731, 289.386, 40.000, 300.000, 30.000, 141.998, 66.537, 336.520, 79.628]103.55
W-MSR algorithm
+ Crashed attack
[8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329, 8.329][192.038, 191.102, 129.223, 183.192, 59.216, 235.898, 106.702, 201.825, 202.953, 299.909, 251.186, 274.909, 271.135, 40.000, 280.414, 30.000, 117.070, 30.000, 283.227, 60.000]0
Table 4. Number of iterations required for system recovery.
Table 4. Number of iterations required for system recovery.
Attack10 Distributed Generation Units20 Distributed Generation Units
Crashed attack16171
Byzantine attack2331
2746
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Le, J.; Wang, J.; Lang, H.; Wang, W. Distributed Secure Economic Dispatch Strategy Based on Robust Graph Theory and W-MSR Algorithm. Sensors 2025, 25, 2551. https://doi.org/10.3390/s25082551

AMA Style

Le J, Wang J, Lang H, Wang W. Distributed Secure Economic Dispatch Strategy Based on Robust Graph Theory and W-MSR Algorithm. Sensors. 2025; 25(8):2551. https://doi.org/10.3390/s25082551

Chicago/Turabian Style

Le, Jian, Jing Wang, Hongke Lang, and Weihao Wang. 2025. "Distributed Secure Economic Dispatch Strategy Based on Robust Graph Theory and W-MSR Algorithm" Sensors 25, no. 8: 2551. https://doi.org/10.3390/s25082551

APA Style

Le, J., Wang, J., Lang, H., & Wang, W. (2025). Distributed Secure Economic Dispatch Strategy Based on Robust Graph Theory and W-MSR Algorithm. Sensors, 25(8), 2551. https://doi.org/10.3390/s25082551

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop