Next Article in Journal
Kernel Reverse Neighborhood Discriminant Analysis
Next Article in Special Issue
Status and Development of Research on Orderly Charging and Discharging of Electric Vehicles
Previous Article in Journal
Routing Attacks Detection in 6LoWPAN-Based Internet of Things
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Demand Response Management via Real-Time Pricing for Microgrid with Electric Vehicles under Cyber-Attack

1
Faculty of Mathematics and Physics, Huaiyin Institute of Technology, Huai’an 223003, China
2
Jiangsu Smart Factory Engineering Research Center, Huaiyin Institute of Technology, Huai’an 223003, China
3
Basic Teaching and Research Department, Shenyang Urban Construction University, Shenyang 110167, China
4
Department of Mathematics, Aviation University of Air Force, Changchun 130022, China
5
Faculty of Management Engineering, Huaiyin Institute of Technology, Huai’an 223003, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(6), 1321; https://doi.org/10.3390/electronics12061321
Submission received: 4 February 2023 / Revised: 2 March 2023 / Accepted: 7 March 2023 / Published: 10 March 2023
(This article belongs to the Special Issue Advanced Energy Supply and Storage Systems for Electric Vehicles)

Abstract

:
The initiative of users to participate in power grid operation is a key factor in realizing the optimal allocation of power. Demand response (DR) management mechanisms based on real-time pricing (RTP) can effectively promote the enthusiasm of users, stimulate the efficiency of microgrids for power dispatch, and achieve the goasl of power peak shifting and valley filling. In this paper, we consider a microgrid composed of several energy providers (EPs) and multiple users, and each user is equipped with several electric vehicles (EVs). It should be noted that EVs may be attacked by networks in the process of data exchange when EVs connect to the MG. In this environment, we establish a multi-time slots social welfare maximization model that reflects the common interests of EPs and users. To simplify the problem, we decompose this multi-time slots model into a set of single-time slot optimization problems by the relaxation method. Furthermore, the mechanisms of identification and processing (MIP) for EVs under cyber-attack are proposed. The problem is decoupled to EPs and users by duality decomposition. Then, through integration with MIP, a distributed RTP algorithm based on the dual subgradient algorithm is designed to obtain the optimal electricity price. Finally, the simulation results verify the feasibility of the model and the effectiveness of the proposed algorithm. Through comparative analysis, the necessity of identifying EVs under cyber-attack is fully embodied.

1. Introduction

The rapid development of power electronics technology and the strong support of national environmental protection policies promote the large-scale entry of electric vehicles (EVs) into the market as the main development direction of new energy vehicles. Compared with fuel vehicles, EVs have the advantages of energy saving, environmental protection, good power performance, and low noise [1]. In addition, EVs have charge and discharge characteristics and are good mobile energy storage units. Under the background of a microgrid (MG), the development of vehicle-to-grid (V2G) technology can cut peaks and fill valleys, assist frequency modulation, and reduce system operation costs.
However, due to the uncertainty of EV users’ travel rules and charging behavior [2], the distribution of large-scale EV charging load has significant randomness and fluctuations in time and space, which bring certain challenges to the optimal dispatch [3,4,5], safe operation, planning, and construction of power facilities [6,7]. How to mobilize the enthusiasm of users to cooperate with grid operation, ensure that EVs are connected to the grid in an orderly manner, charge to meet the needs of vehicles during periods of low electricity consumption, and take advantage of the characteristics of energy storage batteries during periods of peak electricity consumption are factors of great significance to the wide application of EVs.
Demand response (DR) is an effective tool for integrating EVs, which can realize synchronous optimization of multiple aspects of coordinated operation and improve the electricity market framework [8,9,10,11,12,13]. In [14], a two-stage EV automatic DR optimization method based on generalized Glue value-at-risk was put forward to solve existing problems. In order to obtain the ideal cost and profit, a robust method for MG scheduling and optimization of EVs was provided in [15] by Bender decomposition and the Lagrange method. An incentive mechanism based on contract theory was proposed in [16], which customized various contract terms according to the types of EVs to motivate users to participate in DR. The synchronization method based on a complex network proposed in [17] can effectively analyze the dynamic behavior of V2G mobile energy systems. In fact, prices based on DR mechanisms can better mobilize users’ enthusiasm and participation in power grid operation. In [18], a charging scheduling problem of EVs based on time-of-use (TOU) price and considering the charging cost constraint was studied and a model was constructed. In [19], through studying the factors involved in the daily operation of the market, an optimal bidding strategy for EV aggregators was proposed. A price-responsive charging scheduling model was proposed in [20], and was beneficial in reducing cost and balancing the load. However, in various optimization strategies for V2G, if users focus on power consumption in the trough period, this causes a rebound effect [21].
Real-time pricing reflects the cost at a moment in the process of power sales, reflecting the characteristic that electricity prices change from moment to moment. This pricing mechanism is an ideal one for power systems [22]. Mohsenian-rad et al. proposed a series of highly innovative RTP models based on pricing principles to maximize social welfare [23,24,25]. These researches have attracted the attention of relevant scholars and have further improved the model in the past several years. For example, in the models, household appliances were classified [26], wind energy and solar energy were added [27], and power storage devices were considered [28]. In [29], a charging station system based on RTP for vehicle-free and grid-connected EVs was designed to realize the strategy of automatically meeting DR. In [30], an optimal dispatching strategy for aggregators was proposed to maximize their own interests. In these studies, considering the continuity of electric equipment operation, they are analyzed from multiple periods, with time-coupling constraints, but the operation efficiency of the algorithm is restricted.
When EVs are connected to the grid, there is some uncertainty in the process of information exchange. To ensure the safety of electric systems and prevent the occurrence of dangerous accidents, a number of regulations have been formulated. The safety requirements of EV energy supply equipment and those of EV batteries are the two main driving factors. It is still a challenge to quantitatively evaluate the safety of electricity consumption considering the operating conditions of large EV charging stations. Driven by the hazard control mechanism, a comprehensive evaluation method was proposed in [31] to evaluate the safety of large EV charging stations coupled with renewable energy generation. In [32], a DC microgrid network attack detection method and a distributed generator set were proposed. In [33], based on broadcasting many false information messages to the communication network, a self-learn-based attack detection method was proposed, which turned training and prediction into a closed-loop system. In [34], the economic efficiency of the whole system was considered, and the elastic distributed coordination of PEV charging against network attacks was studied, and the detection, isolation, update, and recovery steps were designed comprehensively. Although the above research contribute to a detailed discussion on the safety of V2G systems, they ignore the fact that there is a lack of studies that combine the DR mechanisms to arouse users’ enthusiasm.
To make up for the shortcomings of the above research, a MG containing energy providers (EPs), users, attacked EVs, and unattacked EVs is studied in this paper. Table 1 compares the research presented in this paper with current research, and highlights the unique aspects of this paper. A multi-time slots social welfare maximization model reflecting the common interests of EPs and users is built. It studies the mechanisms of identification and processing (MIP) for EVs under cyber-attack and provides a RTP strategy to further determine the optimal energy scheduling scheme. Therefore, the innovations and contributions of this paper are as follows:
  • Based on the property that a piecewise linear function can approximate any curve, we choose it as the utility function of EVs;
  • Considering EVs under cyber-attack, we build a social welfare maximization model for the whole system;
  • By smoothing the utility function of EVs, the convex optimization method can be used to solve the model. Furthermore, Lagrange multipliers are introduced to transform the multi-time slots’ coupling constraint problem into multiple single time slots;
  • The MIP mechanism is proposed to identify EVs under cyber-attack and further deal with them;
  • The RTP algorithm based on the dual subgradient algorithm is designed to coordinate the balance between supply and demand, then the optimal MG energy scheduling strategy is given.
The remainder of this paper is organized as follows: The system framework with EPs, users, and EVs is presented in Section 2. In Section 3, we smooth the utility function of EVs; moreover, the Lagrange multipliers are introduced to discretize the model with coupling constraints into a series of single-time slot problems. The dual problem of the constructed model is given in Section 4; at the same time, the MIP considering EVs under cyber-attack is also built. In Section 5, the algorithm combining the RTP information and the dual subgradient algorithm is designed. In Section 6, numerical simulation experiments are carried out to verify the advantages of the model and algorithm through comparative analysis. Section 7 gives the conclusion of the study.

2. System Framework

2.1. Problem Description

We introduce a MG with a power scheduling center (PSC), multiple EPs, and many users equipped with several EVs. Every user is equipped with a smart meter. The PSC is a third-party regulator that coordinates the power supply of EPs and demand of users. EPs provide a unified price to users, which can effectively avoid price competition, and they produce the optimal amount of electricity to ensure maximum use and utility. In addition, we consider that there are EVs under cyber-attack. As a result, the information transmitted in the MG system is no longer accurate. Thus, the production and demand of electrical energy do not converge. Therefore, the price is not optimal. So, in each time slot, the users first need to identify and process EVs under cyber-attack.
In order to solve the above problems, we propose a distributed RTP algorithm based on the dual subgradient algorithm (RTP-DSG), which is suitable to obtain the optimal electricity price and the best electricity production.

2.2. Utility Function of User

Normally, we consider a MG comprising M EPs and N users. Every user is equipped with several EVs and a smart meter. The smart meter can control the operation of household appliances, identify cyber-attacked EVs, and formulate the V2G strategy.
We denote the EP set and the user set as J = { 1 , 2 , , M } and I = { 1 , 2 , , N } , respectively. Suppose one day is a time cycle divided into K time slots; the set is K = { 1 , 2 , , K } . Each user determines how much electricity they use, depending on the price of electricity at different time slots of the day. Denote x L o a d , i k , i I , k K , as the power consumption of an essential appliance (except EVs) of user i in time slot k. Obviously, there is a certain range of user demand, i.e.,
x L o a d , i k , min x L o a d , i k x L o a d , i k , max ,   k K , i I .
Here, x L o a d , i k , min is the electricity consumption meeting the basic needs of user i, and x L o a d , i k , max is the power required for all appliances to operate.
The utility function U L o a d , i k ( x L o a d , i k , ω L o a d , i k ) in microeconomics is used to reflect the satisfaction degree of user i who consumes x L o a d , i k energy in time slot k . Herein, the elastic coefficient which describes the flexibility of electricity consumption is positive, i.e., ω L o a d , i k > 0 . In this study, a nondecreasing piecewise function is selected as the utility function [18,19,20,21].
U L o a d , i k ( x L o a d , i k , ω L o a d , i k ) = { ω L o a d , i k x L o a d , i k α L o a d , i k 2 ( x L o a d , i k ) 2 , 0 x L o a d , i k ω L o a d , i k α L o a d , i k , ( ω L o a d , i k ) 2 2 α L o a d , i k , x L o a d , i k > ω L o a d , i k α L o a d , i k ,
where α L o a d , i k > 0 , i = 1 , 2 , , N is a given constant.

2.3. Cost Function of EP

Let y E P , j k , j J , k K , denote the power generation capacity of EP j in time slot k. It has upper and lower bounds, denoted by y E P , j k , max and y E P , j k , min , respectively. So, we have
y E P , j k , min y E P , j k y E P , j k , max , k K , j J .
Generally speaking, according to the actual situation of the energy system, we usually choose the following quadratic function as the cost function for EPs [18,19,20,21]:
C E P , j k ( y E P , j k ) = a E P , j k ( y E P , j k ) 2 + b E P , j k y E P , j k + c E P , j k ,   k K , j J .
where a E P , j k > 0 , and b E P , j k , c E P , j k 0 are predetermined constants.

2.4. Electric Vehicle Model

We assume that each user is equipped with Q E V i EVs. The EV set of user i is i = { 1 , 2 , , Q E V i } . EVs connect to the grid to charge up to a point where the battery capacity is sufficient for the next driving demand. Because the V2G time can be random, EVs have great flexibility, which ensures that they can be arranged to charge, discharge, or idle in the MG at time slot k. Let k A R , i q , q Q i denote the arrival time of EV q , let k D E , i q denote departure time, and let K E V , i q = [ k A R , i q , k D E , i q ] denote the V2G time. The remaining energy at arrival is E A R , i q and the target level that is expected to be met or exceeded is E T A , i q . The total amount of electricity obtained by EV q from the MG at time slot k after arrival is given by
E i , q k = E A R , i q + t = k A R , i q k x E V , i q , t , q Q i , i I ,
where x E V , i q , k is equal to the charging, discharging, or idle capacity of EV q at time slot k.
g D I S C H , i q x E V , i q , k g C H , i q ,   q Q i , i I .
Here, g D I S C H , i q < 0 and g C H , i q > 0 are the maximum discharge and charge power, respectively. The primary task of EVs is to meet the driving demand of vehicles, so the battery storage capacity needs to satisfy the following conditions:
E A R , i q + k K E V , i q x E V , i q , k E T A , i q , q Q i , i I .
When an EV is not connected to the grid, i.e., k K E V , i q , the power consumption is zero, so Equation (7) can also be written as Equation (8).
E A R , i q + k K x E V , i q , k E T A , i q , q Q i , i I .
Normally, the amount of energy stored E i , q k in EV q needs to be limited to a fixed range in order to prevent over-charging and discharging to ensure battery life, i.e.,
E i , q min E i , q k E i , q max .

2.4.1. Utility Function of EV

As a piece of special electrical equipment with storage characteristics, EVs can meet users’ needs and provide users with a certain satisfaction. In this paper, based on the property that a piecewise linear function can approximate any curve, we choose it as utility function of EV:
U E V , i q , k ( x E V , i q , k , ω E V , i q , k ) = { ω 1 , i q , k x E V , i q , k , 0 x E V , i q , k < a 1 , i q , ω 2 , i q , k x E V , i q , k + ( ω 1 , i q , k ω 2 , i q , k ) a 1 , i q , a 1 , i q x E V , i q , k < a 2 , i q , ω n , i q , k x E V , i q , k + ( ω 1 , i q , k ω 2 , i q , k ) a 1 , i q + + ( ω n 1 , i q , k ω n , i q , k ) a n 1 , i q , a n 1 , i q x E V , i q , k < a n , i q ,
where ω E V , i q , k = [ ω 1 , i q , k , ω 2 , i q , k , , ω n , i q . k ] is the elasticity coefficient vector, which describes the enthusiasm of users to connect EVs to the MG. The parameter ω s , i q , k ( s = 1 , 2 , , n ) is greater than zero, ensuring that the utility function is non-decreasing. Furthermore, the parameter satisfies ω s , i q , k ω s + 1 , i q , k 0 , which ensures that the marginal utility is decreasing. That is to say, the utility function is a concave function. When x E V , i q , k < 0 , the EV is discharging; the primary goal of releasing electricity is to supply energy to household appliances, which can reduce the electricity consumption cost for users. Otherwise, when x E V , i q , k 0 , the EV is charging. To sum up, EV charging can meet driving needs, while discharging can increase utility.

2.4.2. Cost Function of EV

In order to not damage the life of the battery, the energy stored should not fall below the specified threshold, E i , q t h = ( 1 D O D i , q t h ) E i , q min , where D O D i . q t h is the ideal maximum discharge depth of EV q. Thus, the energy storage cost at time slot k can be expressed as
C E V , i q , k = a E V , i q , k E i , q max + b E V , i q , k ( E i , q t h E i , q k ) .
Here, the first item is investment cost, and the second one is operation cost, which is proportional to the change in EV energy (charge and discharge rate).

2.5. EVs under Cyber-Attack

In the context of this study, the data transmission process of EVs may be cyber-attacked. The cyber-attacks mentioned in this paper refer to attacks on the data using loopholes and security defects in the network. If the electricity consumption data exceed the actual data, the EPs provide more electricity and increase the production cost; if the electricity consumption data are lower than the actual data, the actual total electricity production is lower than the total electricity consumption; thus, there is the possibility of power failure. In either case, huge cost losses are caused. Therefore, users must identify and deal with erroneous EV data in a timely manner. We let Q C A i denote the set of all EVs under cyber-attack. Suppose the electricity consumption data sent by EVs to users are under cyber-attack. In that case, users should identify such EVs and cut off the connection.
On the one hand, this is to avoid the impact on the MG and, on the other hand, reminds users to check their EVs.
The next section describes the mechanism for identifying EVs under cyber-attack during information interactions.

3. Problem Formulation

3.1. Problem Formulation

In this system, to motivate users to participate in the operation of the MG, we adopted a RTP mechanism. At the beginning of each time slot, the PSC first announces the unit price of electricity, and users determine electricity consumption according to the price to maximize benefits. On the premise that the total supply level of all EPs meets the needs of all users, the objective function is to maximize the total social welfare which is defined as subtracting the total cost of all EPs in the system from the utility of all users. Mathematically, this energy demand process is modeled as the following problem:
(P1)
max x L o a d , i k , x E V , i q , k , y E P , j k k K i I U L o a d , i k ( x L o a d , i k , ω L o a d , i k ) + k K i I q i C A i , U E V , i q , k ( x E V , i q , k , ω E V , i q , k ) k K j J C E P , j k ( y E P , j k ) k K i I q i i C A C E V , i q , k ( x E V , i q , k )
s . t . i I ( x L o a d , i k + q i C A i x E V , i q , k ) j J y E P , j k , k K ,
E A R , i q + k K x E V , i q , k E T A , i q , q Q i Q C A i . i I ,
E i q , min E i q , k E i q , max , i I , k K , q Q i Q C A i ,
y E P , j k , min y E P , j k y E P , j k , max , j J , k K ,
x L o a d , i k , min x L o a d , i k x L o a d , i k , max , i I , k K ,
x E V , i q , min x E V , i q , k x E V , i q , max , i I , k K , q Q i Q C A i .
The constraint condition (12a) ensures that the amount of electricity produced by EPs is not less than the total energy consumption in time slot k . The constraint (12b) guarantees that EVs meet the driving demand. The remaining restrictions describe the variable range.

3.2. Smoothing the Utility Function of EVs

The utility function U E V , i q , k ( , ) describing the customer satisfaction brought by the operation of EVs is a piecewise linear function. These functions are not differentiable at discontinuities, so the utility function U E V , i q , k ( , ) is not convex. In order to solve this problem and convert it into a convex function, we introduce the smoothing method [35]. A global smooth function U ε , i q , k ( , ) is constructed to replace the piecewise linear function to ensure that the error is within a very small controllable range.
We first give the general form of the smoothing method. We consider a piecewise linear smooth function with one discontinuity s as follows:
f ( x ) = { m 1 x + n 1 , x s , m 2 x + n 2 , x > s .
The smooth approximation of this function, on the one hand, should not destroy the properties of other points except the discontinuity point; on the other hand, it should make the function smooth at the discontinuity point. Let us consider the following smooth function:
f ε ( x ) = { m 1 x + n 1 , x s ε , a x 2 + b x + c , s ε < x < s + ε , m 2 x + n 2 , x s + ε .
Here, the parameters a, b, and c are parameters to be determined. The following equations should be held:
lim x ( s ε ) + f ε ( x ) = f ε ( x ε ) , lim x ( s + ε ) f ε ( x ) = f ε ( x + ε ) , lim x ( s ε ) + f ε ( x ) = m 1 , lim x ( s + ε ) f ε ( x ) = m 2 .
Then, we form equations as follows:
{ a ( s ε ) 2 + b ( s ε ) + c = m 1 ( s ε ) + n 1 , a ( s + ε ) 2 + b ( s + ε ) + c = m 2 ( s + ε ) + n 2 , 2 a ( s ε ) + b = m 1 , 2 a ( s + ε ) + b = m 2 .
By solving the equations, we obtain
a = m 2 m 1 4 ε , b = m 1 + m 2 2 ( m 2 m 1 ) s 2 ε , c = ( s 2 + ε 2 ) ( m 1 m 2 ) 4 ε + n 1 + n 2 2 .
In this way, the smooth approximation function f ε ( x ) of function f ( x ) is obtained. The approximation degree of function f ε ( x ) to f ( x ) increases with a decrease in ε , i.e., when ε 0 + ,   f ε ( x ) f ( x ) .
According to the above method, each discontinuity point of the piecewise linear function can be smoothed, and a smooth function U ε , i q , k ( , ) is obtained to replace function U E V , i q , k ( , ) approximately. Then, question P1 is transformed into P2 in the following form:
(P2)
max x L o a d , i k , x E V , i q , k , y E P , j k k K i I U L o a d , i k ( x L o a d , i k , ω L o a d , i k ) + k K i I q i C A i U ε , i q , k ( x E V , i q , k , ω E V , i q , k ) k K j J C E P , j k ( y E P , j k ) k K i I q i C A i C E V , i q , k ( x E V , i q , k )
s.t. (12a)–(12f)
By definition, utility functions U L o a d , i k ( , ) and U ε , i q , k ( , ) are strictly concave and cost functions C E P , j k ( ) and C E V , i q , k ( ) are strictly convex when k K ,   i I . By virtue of the operation properties of convex functions, it can be concluded that the objective function (17) is strictly concave. In addition, the constraint conditions of P2 are affine, and the constraint set is a nonempty closed convex set. In summary, problem P2 is a strictly convex programming problem. Therefore, problem P2 has a unique global optimum [36].

3.3. Temporally Coupled Constraint and Relaxation

The constraints (12b) and (12c) are actually time-coupled constraints that couple together all time slots of a day. Such constraints make it challenging to solve P2 individually at each time slot. Therefore, we relax the constraints (12b) and (12c) by introducing Lagrange multipliers υ E V , i q 0 , and θ E V , i q 0 for each user as
max x L o a d , i k , x E V , i q , k , y E P , j k k K i I U L o a d , i k ( x L o a d , i k , ω L o a d , i k ) + k K i I q i C A i U ε , i q , k ( x E V , i q , k , ω E V , i q , k ) k K j J C E P , j k ( y E P , j k ) k K i I q i C A i C E V , i q , k ( x E V , i q , k ) i I q i C A i υ E V , i q ( E A R , i q + k K x E V , i q , k E T A , i q ) + i I q i C A i θ E V , i q ( E A R , i q + k K x E V , i q , k E i , q max )
= max x L o a d , i k , x E V , i q , k , y E P , j k k K [ i I U L o a d , i k ( x L o a d , i k , ω L o a d , i k ) + i I q i C A i U ε , i q , k ( x E V , i q , k , ω E V , i q , k ) j J C E P , j k ( y E P , j k ) i I q i C A i C E V , i q , k ( x E V , i q , k ) i I q i C A i ( υ E V , i q θ E V , i q ) x E V , i q , k ] i I q i C A i [ υ E V , i q ( E A R , i q E T A , i q ) θ E V , i q ( E A R , i q E i , q max ) ]
= max x L o a d , i k , x E V , i q , k , y E P , j k k K { i I [ U L o a d , i k ( x L o a d , i k , ω L o a d , i k ) + q i C A i U ε , i q , k ( x E V , i q , k , ω E V , i q , k ) q i C A i C E V , i q , k ( x E V , i q , k ) q i C A i ( υ E V , i q θ E V , i q ) x E V , i q , k ] j J C E P , j k ( y E P , j k ) } i I q i C A i [ υ E V , i q ( E A R , i q E T A , i q ) θ E V , i q ( E A R , i q E i , q max ) ] .
The Lagrange multiplier υ E V , i q corresponding to the constraints of driving needs can be iteratively solved by
υ E V , i q , t + 1 = [ υ E V , i q , t d 1 ( E A R . i q + k K x ˜ E V , i q , t E T A , i q ) ] + ,
where [ ] denotes max { , 0 } , the plus function. The step size d1 can adjust the convergence rate, t N + represents the number of iterations, and x ˜ E V , i q , t is the solution to Equation (8) for a given υ E V , i q , t .
If the driving demand is satisfied, the charging of EVs must be greater than the lower limit. We only need to consider the upper-limit constraint of EV charging. The Lagrange multiplier θ E V , i q corresponding to an upper limit of EV charging can be iteratively solved by
θ E V , i q , t + 1 = [ θ E V , i q , t + d 2 ( E A R . i q + k K x ˜ E V , i q , t E i , q max ) ] + .
Here, parameter d2 is the step size, and υ E V , i q and θ E V , i q are updated by user i without notice to any other user. Therefore, the original problem P2, which considers the whole time cycle, is transformed into each time slot for optimization [37], that is, problem P2 is transformed into equivalent one, P3:
(P3)
max X L o a d k X L o a d k X E V k X E V k y E P k Y E P k i I [ U L o a d , i k ( x L o a d , i k , ω L o a d , i k ) + q i C A i U ε , i q , k ( x E V , i q , k , ω E V , i q , k ) q i C A i C E V , i q , k ( x E V , i q , k ) q i C A i ( υ E V , i q θ E V , i q ) x E V , i q , k ] j J C E P , j k ( y E P , j k )
s . t . i I ( x L o a d , i k + q i C A i x E V , i q , k ) j J y E P , j k .

4. Dual Problem and the MIP

4.1. Dual Problem

We propose a distributed dual subgradient optimization algorithm, which conveniently solves the problem P3 and greatly improves the information exchange rate.
The Lagrange function related to P3 is:
( X L o a d k , X E V k , Y E P k , λ k ) = i I [ U L o a d , i k ( x L o a d , i k , ω L o a d , i k ) + q i C A i U ε , i q , k ( x E V , i q , k , ω E V , i q , k ) q i C A i C E V , i q , k ( x E V , i q , k ) q i C A i ( υ E V , i q θ E V , i q ) x E V , i q , k ] j J C E P , j k ( y E P , j k ) λ k [ i I ( x L o a d , i k + q i C A i x E V , i q , k ) j J y E P , j k ]
= i I [ U L o a d , i k ( x L o a d , i k , ω L o a d , i k ) + q i C A i U ε , i q , k ( x E V , i q , k , ω E V , i q , k ) q i C A i C E V , i q , k ( x E V , i q , k ) q i C A i ( υ E V , i q θ E V , i q ) x E V , i q , k λ k ( x L o a d , i k + q i C A i x E V , i q , k ) ] + j J [ λ k y E P , j k C E P , j k ( y E P , j k ) ] .
The Lagrange multiplier λ k 0 , associated with global inequality constraints, is usually used to indicate electricity price.
Mathematically, the Lagrange function is as follows:
D ( λ k ) = max X L o a d k , X E V k , Y E P k ( X L o a d k , X E V k , Y E P k , λ k ) = i I S i k ( λ k ) + j J T j k ( λ k ) ,
where λ k 0 ,   k K , and
S i k ( λ k ) = max X L o a d k , X E V k [ U L o a d , i k ( x L o a d , i k , ω L o a d , i k ) + q i C A i U ε , i q , k ( x E V , i q , k , ω E V , i q , k ) q i C A i C E V , i q , k ( x E V , i q , k ) q i C A i ( υ E V , i q θ E V , i q ) x E V , i q , k λ k ( x L o a d , i k + q i C A i x E V , i q , k ) ] = S i , 1 k ( λ k ) + S i , 2 k ( λ k ) ,
S i , 1 k ( λ k ) = max X L o a d k [ U L o a d , i k ( x L o a d , i k , ω L o a d , i k ) λ k x L o a d , i k ] ,
S i , 2 k ( λ k ) = max X E V k q i C A i [ U ε , i q , k ( x E V , i q , k , ω E V , i q , k ) C E V , i q , k ( x E V , i q , k ) ( υ E V , i q θ E V , i q ) x E V , i q , k λ k x E V , i q , k ] ,
T j k ( λ k ) = max Y E P k [ λ k y E P , j k C E P , j k ( y E P , j k ) ] .
The dual problem is as follows:
min λ k 0 D ( λ k ) .
The gradient projection method is introduced to solve the dual optimization problem iteratively, and the PSC updates the price λ t k according to the following formula:
λ t + 1 k = [ λ t k + d 3 ( i I ( x L o a d , i k + q i C A i x E V , i q , k ) j J y E P , j k ) ] + ,
where d 3 is the iteration step size. Problem P3 can be transformed into solving for EPs, users, and EVs three types of subproblems (23)–(25) due to the separable nature of the dual problem (26).

4.2. Identifying and Processing EVs under Cyber-Attack

Considering that the utility function of EVs is described by a piecewise function (10), we consider a segmentation point, and the others are similar. Near the segmentation point a 1 and with the aid of Equation (16), we have
U ε , i q , k = { ω 1 , i q , k x E V , i q , k , 0 x E V , i q , k a 1 ε , a E V , 1 q , k ( x E V , i q , k ) 2 + b E V , 1 q , k x E V , i q , k + c E V , 1 q , k , a 1 ε x E V , i q , k a 1 + ε , ω 2 , i q , k x E V , i q , k + ( ω 1 , i q , k ω 2 , i q , k ) a 1 , a 1 + ε x E V , i q , k a 2 ε ,
where a E V , 1 q , k = ω 1 , i q , k ω 2 , i q , k 4 ε ,   b E V , 1 q , k = ω 1 , i q , k + ω 2 , i q , k 2 a 1 ( ω 1 , i q , k ω 2 , i q , k ) 2 ε and
c E V , 1 q , k = ( a 1 2 + ε 2 ) ( ω 1 , i q , k ω 2 , i q , k ) 4 ε + a 1 ( ω 1 , i q , k ω 2 , i q , k ) 2 .
Furthermore, according to Equations (24) and (28), we obtain
x E V , i q , k * ( λ t k ) = argmax q i C A i [ U ε , i q , k ( x E V , i q , k , ω E V , i q , k ) C E V , i q , k ( x E V , i q , k ) ( υ E V , i q θ E V , i q ) x E V , i q , k λ k x E V , i q , k ] .
In this paper, the parameter ω E V , i q , k = [ ω 1 , i q , k , ω 2 , i q , k , , ω n , i q . k ] involves n different constants at time slot k of user i. In time slot k, if PSC has received n different values of optimal power demand in the tth iteration to the (t + n − 1)th one, denoted by x E V , i q , k * ( λ t k ) to x E V , i q , k * ( λ t + n 1 k ) , respectively. Next, we determine whether x E V , i q , k * ( λ r k ) ,   r = t , t + 1 , , t + n 1 , is equal to x E V , i q , min or x E V , i q , max . If neither is true, then user i needs to solve the following Equation (30) and obtain the parameters ω E V , i q , k of EV q in time slot k.
[ U ε , i q , k ( x E V , i q , k , ω E V , i q , k ) C E V , i q , k ( x E V , i q , k ) ( υ E V , i q θ E V , i q ) x E V , i q , k λ r k x E V , i q , k ] x E V , i q , k * ( λ r k ) = 0 .
Suppose user i receives the rth optimal power capacity data value x E V , i q , k * ( λ r k ) , which is neither identical to x E V , i q , min nor x E V , i q , max from EV q. In such a case, user i needs to verify that Equation (30) holds.
Here, n values in the parameter vector ω E V , i q , k = [ ω 1 , i q , k , ω 2 , i q , k , , ω n , i q . k ] can be obtained through n iterations. After this process, if the data obtained do not satisfy the equation when substituted into Equation (30), the data are judged as abnormal values. That means, if Equation (30) is satisfied, the EV q of user i is normal; otherwise, the EV is considered to have been cyber-attack. Once the EVs under cyber-attack are identified, the smart meters of users should cut off the connection.
The process of identifying EVs under cyber-attack and processing power data is summarized as follows:
Step (1): User i initializes the parameter set of EV q, i.e., ω E V , i q , k = [ ω 1 , i q , k , ω 2 , i q , k , , ω n , i q . k ] = [ 0 , 0 , , 0 ] ;
Step (2): If user i receives n optimal power data not equal to x E V , i q , min or x E V , i q , max from EV q, then the elastic coefficient of EV q needs to be calculated according to Equation (30), and ω E V , i q , k is updated;
Step (3): When user i receives an rth optimal power data value from EV q that is not equal to x E V , i q , min or x E V , i q , max the user verifies that Equation (30) is true. If Equation (30) is satisfied, then EV q is normal, else, the EV q is believed to be under cyber-attack.

5. Distribute RTP-DSG Algorithm

We combined the real-time price information a dual subgradient algorithm to design a distributed RTP-DSG algorithm. It consists of three parts: EPs, users, and PSC, shown in Figure 1.
According to Equations (23)–(27), we know that the PSC updates electricity prices while users and EPs calculate the optimal power demand and production, respectively.
Combining with MIP, users identify and deal with EVs under cyber-attack, and we obtain the framework of the RTP-DSG algorithm.
As illustrated in Figure 1, at the beginning of each time slot, the PSC initializes the price of electricity and informs all EPs and users about it. Using MIP, users process EVs’ feedback power consumption depending on the given price, and then the attacked EVs are identified. The EPs update the power capacities according to Equation (25). Afterwards, all the users and EPs send the optimal data to the PSC, who updates the price according to Equation (27) and broadcasts it to users and EPs. Each time slot contains several iterations, which end when the price of electricity tends toward stability.

6. Simulation Results

This paper ran a simulation experiment several times, and the average results are given. To test the performance of the algorithm, a large number of results are presented. Unless otherwise specified, the functions and parameter settings involved are as follows:
The research considers a scenario wherein there are 5 EPs and 50 users, each equipped with 2 EVs. Among them, EVs under cyber-attack are included. We divide the time cycle of a day into 24 time slots, i.e., K = { 1 , 2 , , 24 } , each of which lasts 1 h. Other relevant data for the simulations are presented in Table 2. In general, the utility function with ω i k [ 1 , 3.5 ] is as follows:
U L o a d , i k ( x L o a d , i k , ω L o a d , i k ) = { ω L o a d , i k x L o a d , i k 1 8 ( x L o a d , i k ) 2 , 0 x L o a d , i k 4 ω L o a d , i k , 2 ( ω L o a d , i k ) 2 , x L o a d , i k > 4 ω L o a d , i k .

6.1. Results Analysis

Depending on the electricity price offered by the PSC, users calculate their optimal power consumption x L o a d , i k ( λ t k ) in time slot k after identifying and processing the power consumption of EVs under cyber-attack. Then, each user provides their total power consumption x L o a d , i k ( λ t k ) + q i C A i x E V , i q , k ( λ t k ) to the PSC. The EPs also send their optimal amount of electricity information to the PSC. After collecting all information from the users and EPs, the PSC updates the price λ t + 1 k based on the proposed RTP-DSG algorithm. When the algorithm satisfies the termination condition | λ t + 1 k λ t k | < ε , this means the information exchange has reached the equilibrium state, then the optimal solution can be received.
The real-time electricity price of one day is shown in Figure 2. It can be seen that in the evening, the electricity price is high at the peak of power consumption, which inhibits the power demand of users. In the midnight electricity trough, the electricity price is low, encouraging users to store energy and other flexible household appliances to work. This process is helpful for the power grid to achieve the goal of peak shaving and valley filling.
When the electricity price is set, the amount of electricity used by EVs is determined. We assume that the EVs leave home at eight in the morning and get home at seven in the evening. As shown in Figure 3, the optimal power consumption of two EVs at each time slot of user i is obtained. At the peak of power consumption in the evening, the EVs are in the discharge state. The EVs are assessed to ensure their demand the next night. This makes full use of the mobile energy storage function of EVs.
Figure 4 compares the total power generation and consumption at each time slot of a day. The power generation is higher than the power consumption to ensure no possibility of power failure. It can also be seen in Figure 4 that there are three power consumption peaks in a day. After the electricity price, power consumption, and generation are apparent, the social welfare value is naturally determined, as shown in Figure 5.

6.2. Comparison with Temporally Coupled Constraint and Relaxation

By introducing Lagrange multipliers, we relax a temporally coupled constraint in P2. This operation dramatically improves the operation efficiency of the algorithm. See Figure 6 for details. The convergence speed of the algorithm is fast in both decoupled model and coupled model cases. However, the algorithm proposed in this paper can obtain more excellent social welfare value. In order to obtain a more comprehensive understanding of the social welfare obtained under the two cases, Figure 7 compares the social welfare in two cases to more intuitively show the effect of the algorithm. Our proposed algorithm is closer to the optimal solution of the model.

6.3. Contrast Reflects the Role of MIP

The scenario we considered contains EVs under cyber-attack. If the unstable factors are not found out in time, this causes serious consequences. Next, we discuss it in two cases. In one situation, the EVs attacked by the network are not identified, leading to two consequences: one is that the optimal total power consumption (OTPC) of the users exceeds the actual power consumption (Unidentified-1), and the other is that the OTPC of the users is lower than the actual power consumption (Unidentified-2). Comparisons of convergence of electricity prices and social welfare values in cases Identified, Unidentified-1, and Unidentified-2 are shown in Figure 8 and Figure 9, respectively. The Unidentified-1 case results in a higher electricity price than the actual value. On the EP side, this leads to excess power production and waste of power. Users need to pay more for using the same amount of power. The loss of benefits for users and EPs results in the reduction of social welfare value. Conversely, in the Unidentified-2 case, the price decreases, also hurting EPs and users. Similarly, the value of social welfare falls.

7. Conclusions

In this paper, an energy system with EVs under cyber-attack is considered. We construct a social welfare maximization model to make full use of the bi-directional influence between EPs and users to ensure the interests of both supply and demand. In order to reflect the utility of V2G systems, we introduce a piecewise linear function with general characteristics. This function is further smoothed to make the social welfare maximization model a convex optimization problem. Furthermore, through introducing Lagrange multipliers, we relax the time constraint condition. This guarantees that the multi-time slots social welfare model can solved separately at each time slot. The duality method is used to divide the problem into user and EP sub-problems, while protecting users’ privacy. In addition, the MIP method for EVs under cyber-attack has been developed to improve the safe and stable operation of the smart grid. Through the exchange of information, the MIP identifies the EVs that have been cyber-attacked and disconnects them from the grid.
Solving the model, we obtain the RTP strategy and optimal production and demand power. The results show that the RTP can effectively realize peak cutting and valley filling. The efficiency of the solution method given in this paper is verified by comparing the time-coupling constraints and relaxation. The algorithm proposed in this paper not only converges fast but is also closer to the real optimal solution. If the EVs under cyber-attack are not identified, the utility of users is affected and the total social welfare is reduced. Finally, simulation results show that MIP can effectively screen out cyber-attacked EVs.

Author Contributions

Methodology, H.Z. and Z.W.; Software, H.Y. and X.Z.; Validation, X.F. and X.Z.; Formal analysis, H.Y. and Z.W.; Investigation, H.Z. and H.Y.; Resources, X.F.; Writing—original draft preparation, H.Z.; Writing—review and editing, Z.W. and H.Y.; Funding acquisition, H.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Social Science Foundation Project of Jiangsu, grant number [19GLB022] and the MOE (Ministry of education in China) Project of Humanities and Social Sciences, grant number [16YJA630032]. This work is also financially supported by the open fund for the Jiangsu Smart Factory Engineering Research Center (Huaiyin Institute of Technology).

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

Nomenclature

Nomenclature Parameters
Abbreviations x L o a d , i k power consumption of essential appliance (except EVs) of user i in time slot k
RTPreal-time pricing x L o a d , i k , min , x L o a d , i k , m ax minimum and maximum power consumption of essential appliance of user i in time slot k
EPenergy provider ω L o a d , i k elastic coefficient of user i in time slot k
EVelectric vehicle y E P , j k power generation capacity of EP j in time slot k
MIPmechanisms of identification and processing y E P , j k , min , y E P , j k , max minimum and maximum power generation of EP j in time slot k
MGmicrogrid k A R , i q , k D E , i q arrival time and departure time of EV q
V2Gvehicle-to-grid E A R , i q remaining energy at arrival time
DRdemand response E T A , i q target level to be met or exceeded
TOUtime of use x E V , i q , k charging, discharging, or idle capacity of EV q
PSCpower scheduling center K E V , i q V2G time
DSGdual subgradient g D I S C H , i q g C H , i q maximum discharge and charge power
Sets and indices E i , q min , E i , q max minimum and maximum energy stored of EV q
J set of energy providers ω E V , i q , k elasticity coefficient vector of EV q
I set of users D O D i , q t h ideal maximum discharge depth of EV q
K set of time slots λ k electricity price of time slot k
i set of electric vehicles of user i υ E V , i q , θ E V , i q Lagrange multipliers
Q C A i set of all the EVs under cyber-attack Q E V i number of electric vehicles of user i
jindex for energy provider ε error precision
iindex for user d 1 , d 2 , d 3 step sizes
kindex for time slot α L o a d , i k parameter of the utility function
qindex for electric vehicle a E P , j k , b E P , j k , c E P , j k parameters of the cost function

References

  1. Zishan, A.A.; Haji, M.M.; Ardakanian, O. Adaptive congestion control for electric vehicle charging in the smart grid. IEEE Trans. Smart Grid 2021, 12, 2439–2449. [Google Scholar] [CrossRef]
  2. Srilakshmi, E.; Singh, S.P. Energy regulation of EV using MILP for optimal operation of incentive based prosumer microgrid with uncertainty modelling. Int. J. Electr. Power Energy Syst. 2022, 134, 107353. [Google Scholar] [CrossRef]
  3. Fotis, G.; Vita, V.; Maris, T.I. Risks in the European transmission system and a novel restoration strategy for a power system after a major blackout. Appl. Sci. 2023, 13, 83. [Google Scholar] [CrossRef]
  4. Vita, V.; Fotis, G.; Pavlatos, C. New restoration strategy in microgrids after a blackout with priority in critical loads. Sustainability 2023, 15, 1974. [Google Scholar] [CrossRef]
  5. Zafeiropoulou, M.; Mentis, I.; Sijakovic, N. Forecasting transmission and distribution system flexibility needs for severe weather condition resilience and outage management. Appl. Sci. 2022, 12, 7334. [Google Scholar] [CrossRef]
  6. Zhang, X.; Chan, K.W.; Li, H. Deep-learning-based probabilistic forecasting of electric vehicle charging load with a novel queuing model. IEEE Trans. Cybern. 2021, 51, 3157–3170. [Google Scholar] [CrossRef]
  7. Wang, F.; Ge, X.; Li, K.; Mi, Z. Day-ahead market optimal bidding strategy and quanti-tative compensation mechanism design for load aggregator engaging demand response. In Proceedings of the IEEE/IAS 55th Industrial and Commercial Power Systems Technical Conference, Calgary, AB, Canada, 5–8 May 2019; p. 8740412. [Google Scholar] [CrossRef]
  8. Dai, Y.M.; Yang, X.Y.; Leng, M.M. Forecasting the power load: A three-stage hybrid prediction model. Technol. Forecast. Soc. Change 2022, 182, 121858. [Google Scholar] [CrossRef]
  9. Dai, Y.M.; Wang, Y.X.; Leng, M.M. Lowess smoothing and random forest based GRU model: A short-term photovoltaic power generation forecasting method. Energy 2022, 256, 124661. [Google Scholar] [CrossRef]
  10. Zhu, H.B.; Gao, Y.; Hou, Y. Multi-time slots real-time pricing strategy with power fluctuation caused by operating continuity of smart home appliances. Eng. Appl. Artif. Intell. 2018, 71, 166–174. [Google Scholar] [CrossRef]
  11. Tao, L.; Gao, Y.; Zhu, H.B. Distributed genetic real-time pricing for multiseller-multibuyer smart grid based on bilevel programming considering random fluctuation of electricity consumption. Comput. Ind. Eng. 2019, 135, 359–367. [Google Scholar] [CrossRef]
  12. Dai, Y.M.; Sun, X.L.; Qi, Y. A real-time personalized consumption-based pricing scheme for the consumptions of traditional and renewable energies. Renew. Energy 2021, 180, 452–466. [Google Scholar] [CrossRef]
  13. Zhang, L.; Gao, Y.; Zhu, H.B. Bi-level stochastic real-time pricing model in multi-energy generation system: A reinforcement learning approach. Energy 2022, 239, 121926. [Google Scholar] [CrossRef]
  14. Gao, J.W.; Yang, Y.; Ma, Z.Y. GGlueVaR-based participation of electric vehicles in automatic demand response for two-stage scheduling. Int. J. Energy Res. 2021, 45, 1128–1141. [Google Scholar] [CrossRef]
  15. Mao, T.; Lau, W.H.; Chong, S. A regulation policy of EV discharging price for demand scheduling. IEEE Trans. Power Syst. 2018, 33, 1275–1288. [Google Scholar] [CrossRef]
  16. Zhou, Z.; Wang, B.C.; Guo, Y.F. Blockchain and computational intelligence inspired incentive-compatible demand response in internet of electric vehicles. IEEE Trans. Emerg. Top. Comput. Intell. 2019, 3, 205–216. [Google Scholar] [CrossRef]
  17. Yu, R.; Zhong, W.; Xie, S. Balancing power demand through EV mobility in vehicle-to-grid mobile energy networks. IEEE Trans. Ind. Inform. 2016, 12, 79–90. [Google Scholar] [CrossRef]
  18. Sharma, S.; Jain, P. Risk-verse integrated demand response and dynamic G2V charge scheduling of an electric vehicle aggregator to support grid stability. Int. Trans. Electr. Energy Syst. 2021, 31, e12867. [Google Scholar] [CrossRef]
  19. Zheng, Y.; Yu, H.; Shao, Z. Day-ahead bidding strategy for electric vehicle aggregator enabling multiple agent modes in uncertain electricity markets. Appl. Energy 2020, 280, 115977. [Google Scholar] [CrossRef]
  20. Cao, Y.; Tang, S.; Li, C. An optimized EV charging model considering TOU price and SOC curve. IEEE Trans. Smart Grid 2012, 3, 388–393. [Google Scholar] [CrossRef]
  21. Chang, T.H.; Alizadeh, M.; Scaglione, A. Real-time power balancing via decentralized coordinated home energy scheduling. IEEE Trans. Smart Grid 2013, 4, 1490–1504. [Google Scholar] [CrossRef] [Green Version]
  22. Ding, T.; Qu, M.; Amjady, N. Tracking equilibrium point under real-time price-based residential demand response. IEEE Trans. Smart Grid 2020, 12, 2736–2740. [Google Scholar] [CrossRef]
  23. Mohsenian-Rad, A.H.; Wong, V.W.S.; Jatskevich, J. Autonomous demand-side management based on game-theoretic energy consumption scheduling for the future smart grid. IEEE Trans. Smart Grid 2010, 1, 320–331. [Google Scholar] [CrossRef] [Green Version]
  24. Samadi, P.; Mohsenian-Rad, A.H.; Schober, R. Optimal real-time pricing algorithm based on utility maximization for smart grid. In Proceedings of the 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010; pp. 415–420. [Google Scholar] [CrossRef] [Green Version]
  25. Samadi, P.; Mohsenian-Rad, A.H.; Schober, R. Advanced demand side management for the future smart grid using mechanism design. IEEE Trans. Smart Grid 2012, 3, 1170–1180. [Google Scholar] [CrossRef]
  26. Zhu, H.B.; Gao, Y.; Hou, Y. Real-time pricing considering different type of smart home appliances based on Markov decision process. Int. J. Electr. Power Energy Syst. 2019, 107, 486–495. [Google Scholar] [CrossRef]
  27. Tao, L.; Gao, Y. Real-time pricing for smart grid with distributed energy and storage: A noncooperative game method considering spatially and temporally coupled constraints. Int. J. Electr. Power Energy Syst. 2020, 115, 105487. [Google Scholar] [CrossRef]
  28. Zoltowska, I.; Cichosz, P.; Kolodziejczyk, W. Real-time energy purchase optimization for a storage-integrated photovoltaic system by deep reinforcement learning. Control. Eng. Pract. 2021, 106, 104598. [Google Scholar] [CrossRef]
  29. Chen, Q.; Wang, F.; Hodge, B.M. Dynamic price vector formation model-based automatic demand response strategy for PV-assisted EV charging stations. IEEE Trans. Smart Grid 2017, 8, 2903–2915. [Google Scholar] [CrossRef]
  30. Ren, H.; Zhang, A.; Wang, F. Optimal scheduling of an EV aggregator for demand response considering triple level benefits of three-parties. Int. J. Electr. Power Energy Syst. 2021, 125, 106447. [Google Scholar] [CrossRef]
  31. Wang, B.; Dehghanian, P.; Wang, S. Electrical safety considerations in large-scale Electric vehicle charging stations. IEEE Trans. Ind. Appl. 2019, 55, 6603–6612. [Google Scholar] [CrossRef]
  32. Cui, H.; Dong, X.; Deng, H. Cyber attack detection process in sensor of DC micro-grids under electric vehicle based on Hilbert–Huang transform and deep learning. IEEE Sens. J. 2020, 21, 3027778. [Google Scholar] [CrossRef]
  33. Zhang, Y.Y.; Shang, J.; Chen, X. A self-learning detection method of sybil attack based on LSTM for electric vehicles. Energies 2020, 13, 1382. [Google Scholar] [CrossRef] [Green Version]
  34. Weng, S.; Li, Y.; Ding, X. Resilient distributed coordination of plug-in electric vehicles charging under cyber-attack. Electronics 2020, 9, 770. [Google Scholar] [CrossRef]
  35. Gao, Y. Nonsmooth Optimization; Science Press: Beijing, China, 2019. [Google Scholar]
  36. Bertsekas, D.P. Nonlinear Programming. In Proceedings of the Second Berkeley Symposium on Mathematical Statistics and Probability, Berkeley, CA, USA, 31 July–12 August 1950; Neyman, J., Ed.; University of California Press: Oakland, CA, USA, 1999. [Google Scholar] [CrossRef]
  37. Deng, R.L.; Yang, Z.Y.; Hou, F. Distributed real-time demand response in multiseller–multibuyer smart distribution grid. IEEE Trans. Power Syst. 2015, 30, 2364–2374. [Google Scholar] [CrossRef]
Figure 1. Microgrid with multiple energy providers. (Red is electricity resources, blue is price information, and purple is electricity consumption information.)
Figure 1. Microgrid with multiple energy providers. (Red is electricity resources, blue is price information, and purple is electricity consumption information.)
Electronics 12 01321 g001
Figure 2. Real-time price of a day.
Figure 2. Real-time price of a day.
Electronics 12 01321 g002
Figure 3. Power consumption of user at each time slot.
Figure 3. Power consumption of user at each time slot.
Electronics 12 01321 g003
Figure 4. Total power consumption and generation.
Figure 4. Total power consumption and generation.
Electronics 12 01321 g004
Figure 5. Social welfare of each time slot.
Figure 5. Social welfare of each time slot.
Electronics 12 01321 g005
Figure 6. Comparison of the convergences of the models.
Figure 6. Comparison of the convergences of the models.
Electronics 12 01321 g006
Figure 7. Comparison of the social welfare of two cases.
Figure 7. Comparison of the social welfare of two cases.
Electronics 12 01321 g007
Figure 8. Comparison of price with Identify case and Unidentified cases.
Figure 8. Comparison of price with Identify case and Unidentified cases.
Electronics 12 01321 g008
Figure 9. Comparison of social welfare with Identify case and Unidentified cases.
Figure 9. Comparison of social welfare with Identify case and Unidentified cases.
Electronics 12 01321 g009
Table 1. Summary of some studies on the energy scheduling problems in microgrid.
Table 1. Summary of some studies on the energy scheduling problems in microgrid.
ReferencesRTPWelfareEVMulti-EPsMulti-Time SlotsDRCyber Attack
[10]---
[11]---
[12]---
[13]--
[14]---
[15]----
[16]----
[29]----
[30]----
[31]---
[32]---
[33]---
[34]----
This article
● It is mentioned in the article. - It is not mentioned in the article.
Table 2. Parameters settings.
Table 2. Parameters settings.
ParameterValueParameterValueParameterValue
y E P , j k , min 500 y E P , j k , max 1000 x L o a d , i k , min 1
x L o a d , i k , m ax 5 D O D i , q t h [0.8, 0.95] E i , q min 5
E i , q max [30, 50] a E V , i q , k 0.2 b E V , i q , k 0.1
ω E V , i q , k [0.4; 0.3; 0.2; 0.1] a E V , i q [3; 4; 5; 6] [ a E P , j k , b E P , j k , c E P , j k ] [0.05, 0.1, 0]
g D I S C H , i q −6 g C H , i q 6 E A R , i q [5, 20]
E T A , i q [25, 45] d 1 , d 2 , d 3 0.05 ε 0.01
K E V , i q [ 19 , 24 ] [ 1 , 8 ] Q E V i 2 K 24
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhu, H.; Yin, H.; Feng, X.; Zhang, X.; Wang, Z. Demand Response Management via Real-Time Pricing for Microgrid with Electric Vehicles under Cyber-Attack. Electronics 2023, 12, 1321. https://doi.org/10.3390/electronics12061321

AMA Style

Zhu H, Yin H, Feng X, Zhang X, Wang Z. Demand Response Management via Real-Time Pricing for Microgrid with Electric Vehicles under Cyber-Attack. Electronics. 2023; 12(6):1321. https://doi.org/10.3390/electronics12061321

Chicago/Turabian Style

Zhu, Hongbo, Hui Yin, Xue Feng, Xinxin Zhang, and Zongyao Wang. 2023. "Demand Response Management via Real-Time Pricing for Microgrid with Electric Vehicles under Cyber-Attack" Electronics 12, no. 6: 1321. https://doi.org/10.3390/electronics12061321

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop