1. Introduction
Extreme weather and cyber–physical attacks threaten the security and invulnerability of power systems. Furthermore, increasing consumer demand has become a major trend in the development of power grids, and the complexity of the load types has significantly escalated, making systems more fragile than before [
1]. At the same time, the large proportion of variable renewable energy (VRE) integration poses great challenges for stable system operation [
2,
3]. In such cases, the safety stability margin of a power system decreases, increasing the probability of power outage accidents when the system is disturbed [
4,
5]. Due to the occurrence of high-impact low-probability (HILP) events, researchers’ attention has been drawn to invulnerability assessment.
Invulnerability mainly refers to the fault tolerance and survival ability of a system under extreme conditions, with an important aspect being the continuity of the power supplied to the loads. The
security criterion (
) has been presented to constrain the safe and stable operation of power systems [
6,
7,
8]. However, traditional
security-constrained invulnerability enhancement studies have a fatal disadvantage, which is the excessive system development and serious resource waste with the growth of
k and expansion of the system scale. Essentially, to overcome this disadvantage, the invulnerability requirements of each bus should be determined based on their relative importance instead of being unified. Therefore, the nodal
security criterion has emerged.
First, buses can be divided into power supply and load buses based on their net load, which is obtained by subtracting the power generation capacity from the load demand. Power supply buses prioritize meeting their own load demands and are unlikely to lose load. Thus, the nodal
security criterion solely constrains load buses, corresponding to buses 4–9 in the example depicted in
Figure 1. It declares that if a bus does not shed load when any
k components fail due to damage, this bus is considered to meet the nodal
security criterion. Compared to the traditional standard, this criterion shifts the core research object from the system as a whole to a single bus, emphasizing the distinctions between buses. Furthermore, it allows buses to be separated into different sets based on their significance, with each set corresponding to an invulnerability level. If the invulnerability requirements of each bus in a system cannot be met, the nodal invulnerability can be upgraded through transmission line expansion planning (TEP), which is related to topology optimization [
9,
10,
11].
Figure 1 illustrates the upgrade strategy for a nine-bus system, in which all load buses can meet their invulnerability requirements benefit from the invested transmission lines, represented by dashed lines. This paper considers the case in which TEP has already been implemented to upgrade each bus to its corresponding invulnerability level, and explores a method for quickly restoring nodal invulnerability in the event of system damage when short-term repair is not available.
Providing mobile or portable emergency generators for endangered areas plays an indispensable role in re-establishing the power supply after a system is devastated [
12]. For some remote but crucial loads, the functionality of the power system can be partially restored by means of a suitable configuration of emergency generators providing electrical energy support [
13,
14,
15]. The authors of [
16] combined the long-term planning of newly added underground cables with a short-term configuration of mobile generators (MGs) to enhance system invulnerability, demonstrating better performance compared to simply considering cable investment. However, current research on allocating MGs overlooks the distinctions between buses. MGs are often expensive; therefore, it is more practical to configure them in accordance with nodal invulnerability requirements rather than uniform standards. Additionally, the normal operation of a generator entails a suitable load rate, between 60% and 90%. An excessively low rate will result in an uncontrolled rotor speed, while an particularly high load rate will cause a sharp increase in the unit temperature, resulting in components blowing out easily. Both situations can lead to internal power outages in the absence of external disturbances. Therefore, in this paper, the power generation balance is considered when allocating MGs for nodal invulnerability recovery after transmission line damage provoked by attacks. Furthermore, in order to address the uncertainty of attacks, we adopt a robust optimization (RO) approach [
17], leading to a bi-objective RO planning problem.
Generally, there are two kinds of methods for solving optimization problems: analytical and numerical [
18]. Analytical methods follow a rigorous mathematical derivation process and enable it to produce precise solutions. Numerical methods can be further divided into two categories: classical and intelligent. The representatives of classical numerical solving methods for multi-objective optimization are linear weighting method [
19] and the
-constraint manner [
20]. Intelligent optimization methods represented by evolutionary algorithms [
21] and swarm intelligence [
22], have also received widespread attention in recent years because of their efficient solving performance. Moreover, fuzzy optimization is becoming a rising star, whose basic principle is to seek satisfactory solutions that make each objective as optimal as possible within the fuzzy set of optimal solutions for every single objective [
23]. Reference [
24] systematically reviewed numerous methods of fuzzy optimization. In contrast to the multi-objective optimization algorithms mentioned previously, fuzzy optimization avoids the problems of subjectivity that may arise when converting multiple objectives into a single objective. Meanwhile, as this study does not concentrate on intelligent optimization methods, fuzzy optimization works harmoniously with the RO solution framework employed in this paper.
The prominent contributions and novelty of the present study are outlined as follows:
Oriented by decoupling the invulnerability recovery from the system level to individual nodes, a defender–attacker–defender (DAD) model is established in combination with the nodal security criterion, and the power generation balance is considered when allocating MGs through a bi-objective optimization problem.
An improved column-and-constraint generation (C&CG) algorithm is developed, which combines fuzzy mathematics with RO to empower the solution of bi-objective programming problems.
The invulnerability requirement of each bus is optimized subject to resource constraints, aiming to maximize benefits at the same or even lower cost as directly restoring to the original nodal invulnerability.
The remainder of this paper is organized as follows: In
Section 2, the DAD model based on the uncertainty of attacks on transmission lines is established, in which the bi-objective and nodal
security criterion are reflected in the first and third layers, respectively. Then, the modified C&CG algorithm framework and the optimization of the
k-value settings under limited resources are provided in
Section 3. Additionally, extensive numerical experiments are implemented and the findings are discussed in
Section 4 to manifest the effectiveness and rationality of the proposed method. We conclude this study and outline promising future research directions in
Section 5.
2. Model Formulation
The model proposed in this paper is designed from the perspective of the DAD architecture based on an attack–defense game [
25], and the scenario of interest is the restoration of the invulnerability of each bus to a certain level via a suitable configuration of MGs after the system is subjected to physical transmission line attacks. The upper level generates an optimal configuration strategy of MGs, taking both investment cost and power generation balance into account. The uncertainty of attacked lines are depicted in the middle level, and the optimal power flow (OPF) that cooperates with the nodal
security criterion is implemented in the lower level.
Compared to AD models that only optimize at the operational level or single-layer optimization models that cannot consider fault scenarios, DAD models have significant advantages. Benefiting from taking another interaction level between the attacker and the defender into account, the tri-level model yields the optimal strategy from a global perspective. It provides not only the optimal configuration scheme of MGs but also an operational condition to maximize the protection of critical loads.
Figure 2 depicts the results of nodal invulnerability recovery, where the red dashed lines represent lines that are attacked and removed from the system topology due to the inability to conduct line maintenance within a short period of time.
In the example presented in
Figure 2, there were originally only three generators in the system, located at buses 1–3, i.e.,
. As indicated by the colors of the dashed boxes, bus 8 is configured with a type-1 MG for resisting subsequent
fault, and the other two correspond to recovering bus 9 to the nodal
security level. The recovery strategy for the buses is hierarchical, with each round of restoration corresponding to a particular attack intensity. That is, after
the first round of recovery, all buses fulfill the
security criterion, and after
the second round of restoration, buses 5, 6, and 9 satisfy the nodal
security constraint until bus 9 regains its original invulnerability after
the final round.The model formulated in this section is based on a single round of recovery as part of the whole recovery process, and it is divided into three layers. Equations (
1)–(
16) represent the upper layer of the DAD model, corresponding to the behavior of the defender:
where
denote load rate on original generator
j/corrected load rate on type-
t MG at bus
i under normal operating conditions, respectively.
and
are sets of MG types and buses.
and
are two objective functions of the upper level. The investment cost of MGs is shown in (
2); note that the relationship between investment cost and generator capacity is assumed to be linear.
is a binary decision variable; it takes 1 if a type-
t MG is integrated at bus
i in this round of recovery, where different MG types are relevant to different power limits.
The balance of generation load rates is measured by the variance in (
3), where
and
n are the number of generators and buses in the system.
denotes the number of decision variables related to the calculation of variance, and the denominator is subtracted by one on this basis because the degree of freedom is one less than the total number of data. Moreover,
v is the mean load rate. This method is simple and is capable of effectively capturing fluctuations in data. Excessive variance reflects that the generator load rate is either very low or high, which is apparently unacceptable. However, a low variance does not necessarily indicate that the allocation plan is reasonable because high investment cost may occur, leading to the overbuilding of the system. Therefore, the mutual game between the two objectives determines that the optimal configuration of capacities and load rates are both rational.
Compared with the traditional DAD models, consideration is given to both the investment cost of MGs and the balance of generation load rates, which is unfulfillable by the single objective model. The configuration strategy can not only provide the capacity of MGs located at each bus but also offer a suitable operation power output of generators. It can be obtained from
Figure 2 that in the first round,
,
are the load rates of the three original generators and
denotes the load rate of type-1 MG at bus 8.
Constraint (
4) restricts two binary variables, where
is an auxiliary variable, indicating the current configuration status of the type-
t MG at bus
i. Constraints (
5)–(
8) describe the constraints that need to be met for each generator in terms of total, and mean load rate. To facilitate the classification of variables, the generation power and load rates of the original generators and MGs are represented separately. In (
5),
is the set of original generators of the system, and the power generation of original generator
j under normal operating conditions denoted by
is determined by its load rate and upper limit
. A constraint for MGs at each bus is given in (
6), where
is the power generation of the type-
t MG at bus
i under normal operating conditions and
is the upper limit of type-
t MG. The summation and average value of load rate are shown in (
7) and (
8).
Due to the lack of MG expansion at some buses, i.e.,
, the load rate obtained from (
6) can take any value. In response to this situation, constraint (
9) corrects
to the mean load rate, this correction ensures that the result of solving the variance will not be affected in any way. Taking the 9-bus system in
Figure 2 as an example, in the first round of restoration, no other buses except bus 8 have MGs, so it is necessary to correct
of the other 8 buses to
v so that only the generators actually in the system contribute to the results when calculating the variance.
Constraint (
10) implies a rule that if a type-
t MG has already been configured at bus
i before this round of restoration, i.e.,
, then the same configuration decision will not be made again; that is, each bus will be allocated at most one MG of each type. In the first round of restoration,
since no MGs were previously invested. However, as seen from
Figure 2,
in the subsequent recovery process. Equations (
11)–(
16) are the constraints on the auxiliary decision variables created to solve for the generation load rates, which correspond to the system operation rules under normal operating conditions. Generation constraints of the original generators are given in (
11). Likewise, the power generation of newly added MGs are confined by the investment status and their types, as presented in (
12).
The node power balance equation is given in (
13), where
R is the generator–node correlation matrix
, and
is the
i-th row of the matrix. Moreover,
is a column vector with dimensions of
. Therefore, the former two terms are the power generation of the original generator and MGs located at bus
i, respectively. Additionally, net power injection through transmission lines is expressed by
, where
is the power flow on transmission line
l under normal operating conditions, and
are the receiving/sending ends of line l, respectively. DC power flow equation is expressed in (
14), where
is the susceptance of line
l,
signifies the power angle difference between the beginning and end of the line, and
is the set of all transmission lines. The power flow equation reveals the corresponding relationship between power flow of lines and power angle of buses. Constraint (
15) restricts the range of power transmission flow, and (
16) confines the node power angle to be between
. It is worth noting that the main decision variables in the upper layer are
,
and
, while the others are auxiliary variables.
The middle layer of the model is formulated as (
17)–(
19), relating to the actions of the attacker:
where (
17) indicates the target of the attacker, who seeks to obtain the maximum attack revenue under limited attack resources.
denotes the power imbalance penalty, which is calculated in the third layer. The binary decision variable
in (
18) takes 1 if line
l is damaged. The attack mode shown in (
19) is a random attack against multiple transmission lines, where
k limits the attack resources.
A detailed description of the defender’s actions in a fault scenario is given below, aiming to reduce the power imbalance penalty to 0 through the adjustment of various electrical decision variables:
where the main decision variables in the lower level are
and
, denoting the power surplus and load shedding of bus
i, while the remaining electrical quantities are auxiliary variables. The first term in (
20) penalizes the power imbalance among the buses in
, which is the set of upgraded buses. For the example shown in
Figure 2,
in the second round of restoration. Moreover,
A is a penalty factor with a larger value, the purpose of which is to dominate the direction of iteration. The second term is designed to enforce that for a real system in operation, the power surplus on any bus should be 0 to avoid resource waste, here,
is the set of unupgraded buses. The value of
B is much smaller than that of
A, consequently, the former plays only the role of making the second term of the objective function gradually approach and eventually equal 0 in the iterative process. The objective function is consistent with the nodal
security criterion, indicating buses that satisfy the invulnerability level of
k are not allowed to shed load. Nevertheless, the same requirement does not apply to buses with lower invulnerability.
Constraint (
21) shows the node power balance equation in a fault scenario. The third term denotes the total power injected from transmission lines into bus
i, while the fourth term represents the amount of power flowing out from bus
i. The system may experience load shedding at some buses, and
is introduced to guarantee that the equation holds at all times. The DC power equation is transformed into the form of inequality in (
22), the power on line
l will be 0 in the case of an open circuit fault, and the relaxation factor
M will take effect when
. Constraint (
23) associates line power with its state, (
25) and (
26) stipulates that variables denoted with power imbalance are non-negative values, and the power generation of MGs relates to their configuration situation in (
28).
4. Case Studies
In order to confirm the validity of the proposed method, substantial experiments were conducted on the IEEE 24-bus system. The data are contained in the MATPOWER toolbox [
29]. The proposed method is programmed with MATLAB 2021b (The MathWorks Inc., Natick, Massachusetts, USA) and solved by Gurobi 10.0.1 (Gurobi Optimization LLC., Houston, Texas, USA) on a laptop with an Intel i9-12900H CPU and 16 GB of memory.
The IEEE 24-bus system commonly used for reliability tests is composed of 33 generators and 38 transmission lines. A total of 11 out of the 17 buses with load demands belong to
, making them the primary research subjects for these experiments. Others are classified as power supply buses, which are not within the scope of the invulnerability recovery discussed below. The generation capacity and load demand of each bus are given in
Figure 6, where the former is expressed as a negative number for the convenience of display.
The invulnerability levels of the 11 load buses and the corresponding line reinforcement scheme based on the primary topology are shown in
Table 1. The transmission capability of each line is set to 500 MW and
.
4.1. Restoration of Nodal Invulnerability through the Configuration of MGs
When the system is subjected to physical attacks targeting transmission lines, the invulnerability level of each bus will decrease to varying degrees, implying that the buses are not capable of achieving the nodal security constraints. In military operations or other situations where remedial measures such as line repairs cannot be carried out immediately, a suitable configuration of MGs becomes an excellent choice for maintaining and restoring power supply capabilities. The upper generation limits for the three types of MGs are 50 MW, 100 MW, and 200 MW. In conjunction with it, the values of the factors A and B in the third layer of the model are 500 and 100, respectively. In the following, these parameters remain unchanged if there are no special explanations.
Single-objective optimization oriented by is implemented to demonstrate the effectiveness of mobile power investment for nodal invulnerability recovery. The attacked lines in this case are 9–12, 10–12, 11–14, and 20–23, which are removed from the system topology. Therefore, the number of binary variables is 250, while the number of continuous variables is 374. On this basis, the most severe load-shedding scenarios under each attack intensity before and after MG allocation are utilized to measure the overall capability of the system.
According to the results illustrated in
Table 2 (where, for example, 4:74 represents that bus 4 loses 74 MW of load), if the system is attacked without the support of a mobile power supply, even the basic
security criterion cannot be met. In addition, buses 10 and 14 violate their respective invulnerability criterion and the overall load shedding situation is relatively woeful. However, the above matter does not exist after the investment of MGs. Therefore, the invulnerability of each bus has been properly restored, and—as seen in
Table 2—no buses violate the constraints. In addition, the overall load shedding is much lower than that before the allocation of MGs.
4.2. Nodal Invulnerability Restoration Considering Power Generation Balance
Although the effectiveness of restoring nodal invulnerability through configuring MGs has been proven via the above experiment, if adequate measures are not taken, radically undesirable situations are likely to occur, as shown in
Figure 7. For the convenience of the display, all generation at a single bus has been integrated, and buses 1, 14, 20, and 21 are equipped with MGs. On the one hand, the generators at buses 1, 2 and 7 are completely idle, leading to a waste of resources in the system. On the other hand, the components of the heavily loaded generators located on buses 16, 18, and 20–23 will age rapidly and be prone to other failures due to temperature rise. Both of these circumstances are extreme operating conditions that are not conducive to the long-term stable operation of the system. The above experimental results have exposed the shortcomings of single-objective optimization for traditional generator configuration problems, and it is necessary to consider the load balancing of power generation.
Thus, based on the single-objective solution of the configuration scheme, further optimization is carried out with the goal of
. The results are depicted in
Figure 8.
Although the actual power outputs in both
Figure 7 and
Figure 8 are feasible from the perspective of nodal power balance equation (i.e., Equation (
13)), the optimized power generation load rates of
Figure 8 are within the range of 60–80%, and extreme operating conditions are eliminated, proving the rationality of considering power generation balance.
Moreover, to clarify the superiority of the proposed bi-objective integrated optimization framework, the stratified sequencing method is introduced for comparison. Both approaches are used to restore nodal invulnerability after damage to lines 9–12, 10–12, 11–14, and 20–23. The comparison is listed in
Table 3, where Case 1 concerns optimizing the load rates of generators based on the configuration scheme obtained from single-objective optimization, which only considers investment cost. Case 2 corresponds to the bi-objective optimization. The round number represents the round of recovery process in which the invulnerability level is restored to
, 2 or 3. For instance, the second round signifies recovering the nodal invulnerability of relevant buses from
to
. The explanation of bus 20(I, III) is to allocate 1 type-1 MG and 1 type-3 MG at bus 20. Moreover, – denotes that no additional MG is invested in this round.
According to the results, although the power investment is 800 MW in Case 1 versus 1150 MW in Case 2, bi-objective optimization further alleviates the data fluctuations. Taking the final round for each of the two cases as an example, the variance differs between them by a factor of approximately 22. Under the condition that both cases have 250 binary decision variables, the number of continuous variables in the single-objective optimization problem considering only is 374, while the number is 553 in the bi-objective optimization problem. Thus, 179 continuous variables related to load rates are solved in the second step of Case 1. 553 continuous variables are directly optimized in Case 2, but due to the increase in the size of the master problem from one to three, its solving process is more complex than Case 1. Although the solving time of Case 2 is longer than Case 1, the time difference is acceptable during the planning stage. In addition, the results obtained from bi-objective optimization are more conducive to system operation, and the practical significance is demonstrated.
The final load rates on the generators calculated in Case 2 are investigated in
Figure 9.
Contrasting to the results given in
Figure 8, although the configuration scheme is different, bi-objective optimization results in more balanced load rates, and the overall value is also appropriate. It should be noted that the schemes in
Figure 8 and
Figure 9 are both feasible, and decision makers can choose between them based on the actual situation or their own preferences.
Notably, it is unrealistic to obtain a configuration strategy solely based on . For instance, in the first round of recovery, such an approach would indicate that the numbers of the three types of MGs that should be allocated are 18, 11, and 14, which is obviously unacceptable. Although balanced power generation load rates would be achieved, the invested power would be extremely high, causing serious resource waste. Instead, the solution in Case 2 offers a compromise between the two objectives, making it the final solution.
4.3. Optimal k-Value Settings under Limited Resources
The total power investment required to restore the invulnerability level of each bus to the original standard under the attack scheme of 9–12, 10–12, 11–14 and 20–23 is 800 MW. In order to reset the settings for
k, it is essential to first calculate the nodal invulnerability after attack, which is denoted by
. Then, the optimal settings of
k can be obtained under the current power resources, and the results are given in
Table 4.
The results indicate that the damage to these 4 lines posed a significant threat to the invulnerability of most buses, only the security levels of buses 3, 9 and 15 did not decrease. Further examination of
Table 4 reveals that the access of MGs enables buses 14 and 20 to achieve and even exceed their original invulnerability, where
denotes the theoretical value of
and
represents the real value after nodal invulnerability restoration via MG configuration, indicating that we have traded lower costs for higher returns than expected. Therefore, when evaluating the
k-value settings, the real values rather than the theoretical values should be considered.
Interestingly, buses 5, 14, 15, and 20 are all assigned to a higher level based on the comparison between and . Furthermore, there may also be situations in which the invulnerability requirements of some buses are reduced after optimization, while the values of another part of buses are increased. It seems clear that the expected load shedding value under the security analysis performed after changing the k-value settings has been effectively decreased. Moreover, the system capability as evaluated in terms of the indicator I has become larger, confirming the rationality of the estimation mechanism.
According to this key discovery, the overall system capability can be further enhanced by fine-tuning the requirements for nodal invulnerability under the premise of allowable conditions or special needs.