Skip to main content

ORIGINAL RESEARCH article

Front. Energy Res., 11 January 2024
Sec. Process and Energy Systems Engineering
This article is part of the Research Topic Digital Technologies by Empowered Sustainable Electrical Energy Development View all 10 articles

An attack-resilient distributed energy management strategy for integrated energy systems

Tong LiTong Li1Feng SunFeng Sun1Jian ChenJian Chen1Lei WangLei Wang2Zhibin YangZhibin Yang1Ruitong LiuRuitong Liu1Jun Qi
Jun Qi3*
  • 1Electric Power Research Institute of State Grid Liaoning Electric Power Co., Ltd., Shenyang, China
  • 2State Grid Liaoning Electric Power Supply Co., Ltd., Shenyang, China
  • 3School of Automation, Chengdu University of Information Technology, Chengdu, China

The increasing integration of various energy sources and the adoption of smart grid technologies have revolutionized the way we generate, distribute, and consume energy. While these advancements offer numerous benefits, they also introduce vulnerabilities to cyber–physical attacks. To this aim, this paper investigates a resilient energy management strategy for integrated energy systems. By adopting a switched control approach and incorporating a local estimation mechanism, we have developed a resilient distributed energy management strategy to tackle the energy management problem (EMP) in integrated energy systems (IESs). This methodology demonstrates strong robustness and resilience, successfully detecting data integrity attacks and denial-of-service (DoS) attacks. Finally, we provide a case study to demonstrate the effectiveness of our proposed strategy in a real-world scenario.

1 Introduction

Integrated energy systems (IESs), encompassing various energy sources, storage systems, and smart grid technologies (Liu et al., 2023; Liu et al., 2022), have significantly improved the efficiency and sustainability of energy generation and distribution. The energy management problem (EMP) is the core research problem in IESs (Li et al., 2020; Li et al., 2020; Li et al., 2022). EMP can be conceptualized as an optimization challenge constrained by the goal of minimizing overall costs or maximizing societal benefit (Li et al., 2021; Zhang et al., 2023). This optimization aims to achieve these objectives while simultaneously ensuring a balance between energy supply and demand and adhering to operational constraints.

The algorithms designed for EMP can be broadly categorized as either centralized or distributed methods. Traditional centralized algorithms, such as the reinforcement learning algorithm (Yang et al., 2022) and cuckoo algorithm, have been extensively explored in previous research. However, a significant limitation of these algorithms lies in their centralized nature, demanding a central controller to collect and process all relevant information to compute optimal solutions. With the integration of distributed energy resources, there is a growing inclination to shift computationally intensive tasks toward the edge (Teng et al., 2023). Additionally, distributed participants are hesitant to divulge personal data to a centralized controller due to concerns regarding security and financial gain. To address this issue, distributed methods have been proposed, which attract significant attention. The distributed algorithms possess several advantages: 1) Scalability: Distributed methods are highly scalable. They can efficiently handle large-scale problems by dividing the computational workload among multiple agents or nodes. 2) Flexibility: Distributed optimization can adapt to dynamic environments and changing conditions more effectively. Each node can respond to local changes independently, which is particularly useful in rapidly changing or unpredictable environments. 3) Privacy: In distributed optimization, each node or agent can keep its data local, which is beneficial for privacy-sensitive applications. The distributed methods primarily encompass the alternating direction method of multipliers (ADMM)-based approaches and consensus-based methods. As an illustration, a distributed energy management framework and model were introduced in Zhang et al. (2017), taking into account interrelated power, heat, and gas systems. In this context, an innovative distributed consensus-ADMM algorithm was devised to ascertain the global optimal operation for each participating entity. Utilizing a similar approach, the distributed consensus-ADMM algorithm was subsequently extended to address the multi-period energy management problem (EMP) for manufacturing execution systems (MESs), incorporating certain linearized network constraints (Xu et al., 2020). Building upon the foundation laid in Zhang et al. (2017), an asynchronous event-triggering-based distributed energy management algorithm was introduced in Li et al. (2019). This algorithm adeptly manages the distinctive timescales inherent in various energy network types. Furthermore, the concept of the We-Energy (WE) model, akin to the multi-energy prosumer concept, was unveiled in Sun et al. (2019). Concurrently, a distributed double-consensus (DDC) algorithm was introduced to facilitate cooperative energy management among multiple WE entities. Recently, various distributed optimization algorithms have been developed to cater to diverse application requirements. These include the adoption of a Newton-based method to expedite convergence (Li et al., 2021), a federated reinforcement learning algorithm (Lee and Choi, 2022), and a double-side coordinative method (Zhou et al., 2023).

The prior research mentioned above has effectively addressed EMP for IESs, yielding satisfactory results. However, it is worth noting that the efficacy of these methods relies on a fundamental assumption: the reliability of the communication network. The distributed algorithms are executed within a communication network that is susceptible to various malicious cyberattacks. In recent years, notable efforts have been undertaken to investigate the impact of different cyberattacks on distributed energy management algorithms. To elaborate, Zeng et al. (2017), Zhao et al. (2017), and Duan and Chow (2019) delved into the vulnerability of the distributed lambda iteration algorithm in the context of data integrity attacks. In such scenarios, the energy management system’s operation may be compromised by the injection of false data into exchanged information or local utilization data. In contrast, denial-of-service (DoS) attacks are aimed at obstructing and disrupting information sharing among agents. These attacks can have severe consequences for IES security operations, as communication is disrupted during the DoS attack period, resulting in a fractured structure of the distributed communication network. In this scenario, agents cannot exchange real-time and accurate data with their neighbors, potentially causing a global supply and demand mismatch, leading to system failures and substantial economic losses. Developing effective dispatch strategies to withstand such attacks becomes imperative. In response, Zhang et al. (2019) introduced a DoS-attack-robust strategy that combats DoS attacks by implementing a mixed-integer linear programming method to allocate the load demand. Li et al. (2017) proposed a novel robust distributed economic dispatch strategy capable of identifying and isolating misbehaving distributed generators to safeguard the rest of the system. Most recently, Huang et al. (2022) introduced a privacy-preserving protocol-based distributed robust dispatch approach for MESs. This method proficiently addresses both colluding and non-colluding attacks. Additionally, Li et al. (2022) analyzed the impact of DoS attacks and proposed an effectively double-gradient-descent algorithm to resist the DoS attacks.

Although the existing research has investigated EMP under diverse cyberattacks, they still suffer from two key challenges: 1) the existing distributed and resilient energy management strategies are mainly designed to deal with a single type of cyberattack, such as data integrity or DoS attacks. It is highly needed to develop new algorithms that are compatible with integrity and DoS attacks simultaneously; 2) the existing distributed energy management strategies, considering cyberattacks, work on connected communication networks. However, in reality, the communication networks may not be two-way. It is necessary to design distributed algorithms that can handle directed graphs.

To tackle those challenges, we propose an attack-resilient distributed energy management strategy that is capable of handling integrity and DoS attacks and working under a directed communication network. The contributions of this paper are summarized as follows:

1) By introducing a switched control and local estimation mechanism, an attack-resilient distributed energy management strategy can be developed to solve EMP in IESs. The proposed method can well resist both integrity and DoS attacks, resulting in strong robustness and resilience.

2) The proposed energy management strategy fits well with the directed communication network. Compared with the existing distributed studies (Zeng et al., 2017; Zhao et al., 2017; Li et al., 2018; Duan and Chow, 2019; Zhang et al., 2019; Li et al., 2022; Huang et al., 2022), it possesses strong expansibility and universality.

2 Formulation of EMP in IES

An IES consists of numerous interconnected energy bodies (EBs) and principal networks. Each EB integrates a diverse array of energy generation and conversion devices. This includes renewable generators (RGs), renewable heating devices (RHDs), fuel generators (FGs), fuel heating devices (FHDs), combined heat and power (CHP) devices, electricity storage systems (ESSs), heat storage systems (HSs), and gas producers (GPs). Furthermore, every EB encompasses energy loads consisting of power, heat, and gas loads. These loads further comprise must-run and schedulable loads that are connected to their respective energy buses. The EMP of IES is more complex than that of smart grids due to the following two parts. On the one hand, IES typically encompasses a wider array of energy resources compared to a smart grid. While smart grids primarily focus on electrical energy, integrating aspects like renewable energy sources, demand response, and storage, IES includes not only electricity but also other forms of energy, such as heat, gas, and sometimes cooling systems. Managing these diverse energy types, each with its own dynamics and constraints, adds complexity to EMP. On the other hand, the objectives of managing IES are more diverse and complex. In addition to ensuring the reliability and efficiency of each energy system, IES must optimize the overall system operation considering economic factors and the balance between different energy sources. This multifaceted objective set goes beyond the primary electrical focus of smart grids.

2.1 Model of EB

Considering the energy generation and consumption of single EB, electricity is produced from RG, FG, and CHP, represented as prei, pfui, and pchpi, respectively. Similarly, heat is generated from RHD, FHD, and CHP, symbolized as hrei, hfui, and hchpi, respectively. Gas is supplied by GP, signified as ggasi. Regarding ES and HS, depending on their charge and discharge states, they can serve either as energy providers or users. The power and heat exchanges for ES and HS are designated as psti and hsti, respectively. Positive values of psti or hsti indicate discharging, while negative values signify charging. For energy demands, we use lp,mi (or lp,ci), lh,mi (or lh,ci), and lg,mi (or lg,ci) to depict the essential (or adjustable) power, heat, and gas loads, respectively. Motivated by potential profit, each EB can act as both an energy supplier and a user by adeptly managing its internal elements. We define pimi, himi, and gimi to illustrate the imbalance (either deficit or surplus) in power, heat, and gas, respectively. The energy-balancing conditions for the ith EB at instant T can be expressed as follows:

pimi,T=prei,T+pfui,T+pchpi,T+psti,Tlp,mi,Tlp,ci,T,himi,T=hrei,T+hfui,T+hchpi,T+hsti,Tlh,mi,Tlh,ci,T,gimi,T=ggasi,Tlg,mi,Tlg,ci,T.(1)

Beyond the supply–demand balance constraints, each EB adheres to a series of localized operational constraints. Primarily, these constraints fall under six categories:

1) Capability constraints for FG, FHD, and GP are given by

pfu,minipfui,Tpfu,maxi,hfu,minihfui,Thfu,maxi,ggas,miniggasi,Tggas,maxi,(2)

where the superscripts “min” and “max” indicate the respective minimum and maximum permissible values.

2) Forecasting error-adjusted confidence constraints for RG and RHD are given by

pre,mini,Tprei,Tpre,maxi,T,hre,mini,Threi,Thre,maxi,T,(3)

3) The operational feasibility region of CHO is composed of four linear inequality constraints defined as

li,m1pchpi,T+li,m2hchpi,T+li,m30,m=1,2,3,4,(4)

where li,m1, li,m2, and li,m3 are the parameters.

4) Consideration of permissible charging/discharging processes and accumulated energy for ES and HS is given by

pch,maxipsti,Tpds,maxihch,maxihsti,Thds,maxiSOCpi,T=SOCpi,T1psti,T1ΔTSOChi,T=SOChi,T1hsti,T1ΔTSOCp,mini,TSOCpi,TSOCp,maxi,TSOCh,mini,TSOChi,TSOCh,maxi,T,(5)

where pch,maxi and pds,maxi refer to the peak charging and discharging speeds of psti,T. hch,maxi and hds,maxi refer to the peak charging and discharging speeds of hsti,T. SOCpi,T and SOChi,T refer to the state of charge of ES and HS, respectively.

5) Restrictions on energy loads and associated proportions are given by

0lp,ci,T+lp,mi,Tlp,maxi,T0lh,ci,T+lh,mi,Tlh,maxi,T0lg,ci,T+lg,mi,Tlg,maxi,TΓgp,minilp,ci,Tlp,ci,T+ƛlg,mi,TΓgp,maxiΓgh,minilh,ci,Tlh,ci,T+ƛlg,mi,TΓgh,maxiΓhp,minilp,ci,Tlp,ci,T+lh,mi,TΓhp,maxi,(6)

where Γgpi, Γghi, and Γhpi represent the respective fractions of electrical, thermal, and combined energy loads. The coefficient ƛ converts SCM/h to MW.

Next, the calculation of benefits for each individual EB, which directs optimal operational behavior, encompasses the following six components:

1) Derived from fuel costs, the FG and FHD cost functions, along with CHP, are expressed as

Cpfui,T=ap,fuipfui,T2+bp,fuipfui,T+cp,fui+εp,fuiexpξp,fuipfui,T,(7)
Chfui,T=ah,fuihfui,T2+bh,fuihfui,T+ch,fui+εh,fuiexpξh,fuihfui,T,(8)
Cpchpi,T,hchpi,T=achpipchpi,T2+bchpipchpi,T+dchpipchpi,Thchpi,T+echpihchpi,T2+fchpihchpi,T+cchpi,(9)

where Cpfui,T, Chfui,T, and Cpchpi,T,hchpi,T are the cost functions of FG, FHD, and CHP, respectively. ap,fui, bp,fui, cp,fui, εp,fui, ξp,fui, ah,fui, bh,fui, ch,fui, εh,fui, ξh,fui, achpi, bchpi, cchpi, dchpi, echpi, and fchpi are the positive cost coefficients.

2) When contemplating the balance between optimality and generative likelihood, the cost functions of RG and RHD are

Cprei,T=ap,reiprei,T+bp,reiexpξp,reipre,maxi,Tprei,Tpre,maxi,Tpre,mini,T,(10)
Chrei,T=ah,reihrei,T+bh,reiexpξh,reihre,maxi,Threi,Thre,maxi,Thre,mini,T,(11)

where Cprei,T and Chrei,T are the cost functions of RG and RHD, respectively. ap,rei, bp,rei, ξp,rei, ah,rei, bh,rei, and ξh,rei are the positive cost coefficients.

3) The cost functions of ES and HS can be represented as

Cpsti,T=ap,sti,Tpsti,T+bp,sti,T2,(12)
Chsti,T=ah,sti,Thsti,T+bh,sti,T2,(13)

where Cpsti,T and Chsti,T are the cost functions ES and HS, respectively. ap,sti,T, bp,sti,T, ah,sti,T, and bh,sti,T are the positive cost coefficients.

4) The expression of GP’s cost function is

Cggasi,T=agiggasi,T3+bgiggasi,T2+dgiggasi,T+cgi,(14)

where Cggasi,T is the cost function of GP. agi, bgi, cgi, and dgi are the positive cost coefficients. Since the gas generation is non-native, Eq. 14 is convex within the operation region, where ggasi,T0.

5) With demand response in focus, the energy load’s utility function is

Ulp,ci,T,lh,ci,T,lg,ci,T=αpilp,mi,T+lp,ci,T2+βpilp,mi,T+lp,ci,Tαhilh,mi,T+lh,ci,T2+βhilh,mi,T+lh,ci,Tαgilg,mi,T+lg,ci,T2+βgilg,mi,T+lg,ci,T,(15)

where Ulp,ci,T,lh,ci,T,lg,ci,T is the utility function. αpi, βpi, αhi, βhi, αgi, and βgi are the positive utility coefficients.

The reasons for why we chose the second-order form of the load utility function are as follows: first, the second-order utility function provides a more accurate representation of user satisfaction in scenarios where it is not just the service itself but the rate of change in service quality that impacts user perception. Second, the second-order utility function provides the flexibility needed to model various user behaviors and preferences under different conditions. Third, this form of utility function offers a good balance between complexity and analytical tractability. It allows us to derive meaningful insights and results without overly complicating the mathematical framework.

2.2 Model of EMP

The overall objective of EMP of IES is to maximize the social welfare. Its mathematical expression is given by

MaxW=Ulp,ci,T,lh,ci,T,lg,ci,TCpfui,TChfui,TCpchpi,T,hchpi,TCprei,TChrei,TCpsti,TChsti,TCggasi,T,(16)
s.t.i=1nprei,T+pfui,T+pchpi,T+psti,Tlp,mi,Tlp,ci,T=0i=1nhrei,T+hfui,T+hchpi,T+hsti,Tlh,mi,Tlh,ci,T=0i=1nggasi,Tlg,mi,Tlg,ci,T=0equations26.(17)

For the sake of analysis, we stipulate that the three-dimensional vector xij represents the power, heat, and gas attributes of the ith member in the ith EB. It is pertinent to mention that based on the specific traits of the participant, some of these elements might be zero. Furthermore, we characterize lmij as a tri-dimensional vector denoting the power, heat, and gas of the jth indispensable energy load in the ith EB. Each member can modify its variable to resemble xij by ensuring that the maximum and minimum constraints of any zero component are set to zero. Concurrently, any cost function linked with the zero component(s) can be designated as any type of robustly convex function. We then introduce fxij to symbolize the associated cost function or adverse utility function. Then, the studied problem Eqs 16, 17) can be equivalently written as

minf=i=1nj=1mifxij,(18)
s.t.i=1nj=1miBijxijlmij=0xijΩij,(19)

where mi refers to the number of participants in ith EB. Bij=1 when xij signifies the controllable energy load. In all other cases, Bij=1. Ωij refers to the closed convex sets defined by the intrinsic inequality constraints.

Note that the cost function for each component is the convex function within the corresponding local operation region. Meanwhile, the global supply and demand constraint shown in Eq. 19 is the affine function. Thus, our studied problem is a convex problem. According to the convex theory, there is only one optimal point. Thus, in our considered model, there exists only one equilibrium point, which is the optimal point.

3 Attack-resilient distributed energy management strategy

3.1 Attack models

This study delves into the utilization of a distributed algorithm to address EMP. As the operational framework of such algorithms is deeply rooted in a distributed communication network, it becomes inherently vulnerable to diverse cyberattacks. In this paper, we consider data integrity and DoS attacks. The major mechanisms affected by the two types of cyberattacks on EMP are as follows:

1) Data integrity attacks in energy management algorithms refer to cyberattacks where adversaries manipulate or tamper with the data being used by these algorithms, leading to faulty decision-making. Energy management systems rely on accurate data to efficiently control and distribute energy resources. By compromising the integrity of these data, attackers can cause operational inefficiencies, financial losses, system instabilities, and even safety hazards.

2) DoS attacks, in the context of computer networks, refer to attempts to make a machine, service, or network resource unavailable to its intended users by flooding the targeted system with superfluous requests in an effort to overload systems and prevent some or all legitimate requests from being fulfilled. The potential disruption by multiple adversaries targeting the communication flow between EBs is recognized, which can lead to an enduring compromise of essential shared data.

In order to divide the attack and non-attack zones, we provide the following definitions: Starting at a reference point T0, the cumulative time span T0,T is bifurcated into regular intervals and periods of assault. The duration representing the kth attack is denoted as Tk,Tk+σk, wherein Tk signifies the moment the attack is initiated and σk denotes its persistence. The fraction of the overall time occupied by attacks within the interval T0,T is represented by ΦapT=kσk/TT0. Following this, the classification of time spans into attack and non-attack segments is expressed as ΠapT=(Tk,Tk+σk][T0,T and ΠnpT=(Tk+σk,Tk+1][T0,T, respectively. When a node i experiences a DoS attack or data integrity, it is classified as an attack node. Such nodes fall under the category represented by sT.

3.2 Directed communication network

We study a directional communication network, represented by G=V,ξ,A. In this context, V=1,2,,n signifies the group of agents, and ξ encompasses a subset of pairs in V×V, indicating the edges or communication links. The graph G is assumed to be robustly interconnected without any self-linking edges. For an edge originating from node ij¯ and terminating at ij, i is represented by ij,ij¯ξ. The adjacency matrix is denoted by A=aij,ij¯, where aij,ij¯=1 if ij,ij¯ξ is an edge; otherwise, aij,ij¯=0. The in-degree matrix is expressed as Din=diagd1in,d2in,,dnin, where diin is the sum of aij,ij¯ over all ij¯ except when ij¯=ij. Similarly, the out-degree matrix is depicted as Dout=diagd1out,d2out,,dnout, with diout​ being the sum of aij¯ across all ij¯ with the exception of ij¯=ij. Moreover, we have L=DoutA and L=DA. The in-neighbor of ij is defined as Νinij. In this paper, we require that the communication network be strongly connected during the non-attack segment. In addition, there is no limitation on the communication network during the attack segment.

3.3 Main algorithm

In this section, we propose a discrete-time attack-resilient distributed energy management algorithm to solve EMP, considering data integrity and DoS attacks. First, we define the following switched control variables:

υ1ijt1=zijt1,tΠnpTzijTk,tΠnpT&ijsTzijt1,tΠnpT&ijsT,(20)
υ2ijt1=ij¯Ninijaij,ij¯zijt1zij¯t1,tΠnpTij¯Ninijaij,ij¯zijTkzij¯Tk,tΠnpT&ijsTij¯Ninijaij,ij¯zijt1zij¯t1,tΠnpT&ijsT,(21)
υ3ijt1=ij¯Ninijaij,ij¯wijt1wij¯t1,tΠnpTij¯Ninijaij,ij¯wijTkwij¯Tk,tΠnpT&ijsTij¯Ninijaij,ij¯wijt1wij¯t1,tΠnpT&ijsT,(22)

where zij and wij are assistant variables. υ1ij, υ2ij, and υ3ij are control variables. The physical meaning of zij is the energy price, while wij does not have specific physical meaning.

Next, the updating rules of the discrete-time attack-resilient distributed energy management algorithm are given by

xijt=diag2fxijt11ΘΩijxijt1,fxijt1+υ1ijt1,(23)
zijt=υ2ijt1+υ3ijt1xijt1+lmij,(24)
wijt=υ2ijt1,(25)

where ΘΩij refers to the differential projection operation.

We elaborate the updating processes, including the following steps:

Step (1) Each agent tries to send the information of zijt1 and wijt1 to its out-neighbors and receive information of zij¯t1 and wij¯t1 from its neighbors.

Step (2) Each agent should identify whether it is subjected to data integrity attacks and DoS attacks based on the methods proposed in Li T. et al. (2022) and Huang et al. (2022), respectively. Then, each agent is able to identify the current categories for tΠnpT, tΠnpT&ijsT, or tΠnpT&ijsT.

Step (3) Each agent updates υ1ijt1, υ2ijt1, and υ3ijt1 based on Eqs 2022.

Step (4) Each agent updates xijt, zijt, and wijt based on Eqs 2325.

Step (5) Repeat Steps (1–4) until the algorithm converges to stable values.

Based on the aforementioned processes, it can be observed that each agent only needs to share the information of zijt1 and wijt1 with its neighbors. Thus, the proposed method is fully distributed. In addition, we employ the switched strategy, as shown in Eqs 2022, to resist the cyberattacks.

In this paper, we design a discrete-time algorithm to solve EMP. The reasons are as follows: first, by using the discrete-time algorithm, agents are executed at discrete time steps, making it easier to synchronize information sharing across distributed agents. This is particularly useful in IES, where coordinating the timing of operations is crucial. Second, discrete-time algorithms can be more resource-efficient in certain contexts. They can be designed to operate only at specific intervals, reducing the need for continuous computation and potentially saving on energy and computational resources. Last but not least, discrete-time algorithms offer flexibility in implementation, especially in digital systems where time is naturally discretized. This makes them well-suited for implementation in digital computers and microcontrollers.

4 Simulation analysis

4.1 Setting of the test system

The effectiveness of the proposed method will be tested in IES with five EBs. Its physical and communication structures are shown in Figure 1, as described previously in Zhang et al. (2017). We also follow Zhang et al. (2017) to set the parameters of each EB. The communication interval is 0.01 s. We consider that the system is subjected to data integrity attacks during [0.40 s, 0.66 s] and [2.3 s, 2.55 s] and is subjected to DoS attacks during [6.1 s, 6.2 s] and [11.1 s, 11.12 s]. The scales of energy and price are unified as 1 p.u. = 1 MW for power or heat, 1 p.u. = 84 SCM/h for gas, and 1 p.u. = 1 $/MWh for price.

FIGURE 1
www.frontiersin.org

FIGURE 1. IES composed of five EBs.

4.2 Convergence analysis

In this section, the proposed attack-resilient distributed energy management algorithm is performed to solve EMP. The simulation outcomes are shown in Figures 27.

FIGURE 2
www.frontiersin.org

FIGURE 2. Power generation/demand.

FIGURE 3
www.frontiersin.org

FIGURE 3. Heat generation/demand.

FIGURE 4
www.frontiersin.org

FIGURE 4. Gas generation/demand.

FIGURE 5
www.frontiersin.org

FIGURE 5. Power price.

FIGURE 6
www.frontiersin.org

FIGURE 6. Heat price.

FIGURE 7
www.frontiersin.org

FIGURE 7. Gas price.

Specifically, Figures 24 exhibit the estimated calculations for power generation/demand, heat generation/demand, and gas generation/demand across all participating entities. Distinct colors within each graph are employed to differentiate between the various curves, each representing computational and convergence trajectory of each participant. These visual representations indicate that despite the data integrity and DoS attacks, the energy generation/demand (encompassing power, heat, and gas) for every participant is capable of stabilizing at a consistent value.

Additionally, the trajectories for the estimated prices of power, heat, and gas are shown in Figures 57, each progressively settling at three common values, ultimately representing the final market clearing prices for power, heat, and gas, respectively. This occurrence persists even in the face of data integrity and DoS attacks. The final settled values are marked at $32.6887 (p.u.) for the power price, $23.6611 (p.u.) for the heat price, and $15.2825 (p.u.) for the gas price. In addition, the final energy generation and demands are listed in Table 1. These values are consistent with those derived in scenarios devoid of attacks, as referenced from Zhang et al. (2017).

TABLE 1
www.frontiersin.org

TABLE 1. Results of energy generation/demand.

These findings collectively underscore the resilience and robustness of the S-NRBDEM algorithm, affirming its capacity to empower each participant to persistently seek optimal operational states and market clearing prices for energy.

5 Discussion

This paper addresses the pressing need for resilient energy management in the context of IESs; this necessity has become even more urgent due to the ever increasing integration of diverse energy resources and the rapid adoption of IES technologies. Through rigorous investigation and analysis, we have introduced and validated an attack-resilient distributed energy management strategy, augmented by a local estimation mechanism and switched control. This strategy has been meticulously designed to address not only data integrity attacks but also DoS attacks. The simulations conducted in IES with five EBs show that our proposed method enables estimated energy prices and energy generation/demand to converge to the corresponding optimal solutions, although there are both data integrity attacks and DoS attacks. The findings and insights garnered from this case study underscore the potential of our proposed strategy to serve as a reliable safeguard against cyber–physical threats, ensuring uninterrupted and secure energy management.

Data availability statement

The original contributions presented in the study are included in the article/Supplementary Material; further inquiries can be directed to the corresponding author.

Author contributions

TL: methodology, validation, and writing–original draft. FS: conceptualization, investigation, and writing–original draft. JC: formal analysis, validation, and writing–original draft. LW: conceptualization, formal analysis, and writing–original draft. ZY: formal analysis, project administration, and writing–review and editing. RL: data curation and writing–review and editing. JQ: writing–original draft and writing–review and editing.

Funding

The author(s) declare that financial support was received for the research, authorship, and/or publication of this article. This work was supported by the Science and Technology Project of Electric Power Research Institute of State Grid Liaoning Electric Power Supply Co., Ltd. and Research on Network Security Risk Analysis and Attack Recovery Strategies for Integrated Energy Information Systems Facing the Distribution Network Side (2023YF-155).

Conflict of interest

Authors TL, FS, JC, ZY, and RL were employed by Electric Power Research Institute of State Grid Liaoning Electric Power Co., Ltd. Author LW was employed by State Grid Liaoning Electric Power Supply Co., Ltd.

The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

Duan, J., and Chow, M. Y. (2019). A novel data integrity attack on consensus-based distributed energy management algorithm using local information. IEEE Trans. Industrial Inf. 15 (3), 1544–1553. doi:10.1109/TII.2018.2851248

CrossRef Full Text | Google Scholar

Huang, B., Li, Y., Zhan, F., Sun, Q., and Zhang, H. (2022). A distributed robust economic dispatch strategy for integrated energy system considering cyber-attacks. IEEE Trans. Industrial Inf. 18 (2), 880–890. doi:10.1109/TII.2021.3077509

CrossRef Full Text | Google Scholar

Lee, S., and Choi, D. H. (2022). Federated reinforcement learning for energy management of multiple smart homes with distributed energy resources. IEEE Trans. Industrial Inf. 18 (1), 488–497. doi:10.1109/TII.2020.3035451

CrossRef Full Text | Google Scholar

Li, P., Liu, Y., Xin, H., and Jiang, X. (2018). A robust distributed economic dispatch strategy of virtual power plant under cyber-attacks. IEEE Trans. Industrial Inf. 14 (10), 4343–4352. doi:10.1109/TII.2017.2788868

CrossRef Full Text | Google Scholar

Li, T., Chen, L., Jensen, C. S., and Pedersen, T. B. (2021a). TRACE: real-time compression of streaming trajectories in road networks. Proc. VLDB Endow. 14 (7), 1175–1187. doi:10.14778/3450980.3450987

CrossRef Full Text | Google Scholar

Li, T., Chen, L., Jensen, C. S., Pedersen, T. B., Gao, Y., and Hu, J. (2022a). “Evolutionary clustering of moving objects,” in 2022 IEEE 38th International Conference on Data Engineering, Kuala Lumpur, Malaysia, 09-12 May 2022, 2399–2411.

CrossRef Full Text | Google Scholar

Li, T., Huang, R., Chen, L., Jensen, C. S., and Pedersen, T. B. (2020b). Compression of uncertain trajectories in road networks. Proc. VLDB Endow. 13 (7), 1050–1063. doi:10.14778/3384345.3384353

CrossRef Full Text | Google Scholar

Li, Y., Gao, D. W., Gao, W., Zhang, H., and Zhou, J. (2020a). Double-mode energy management for multi-energy system via distributed dynamic event-triggered Newton-raphson algorithm. IEEE Trans. Smart Grid 11 (6), 5339–5356. doi:10.1109/TSG.2020.3005179

CrossRef Full Text | Google Scholar

Li, Y., Gao, D. W., Gao, W., Zhang, H., and Zhou, J. (2021b). A distributed double-Newton descent algorithm for cooperative energy management of multiple energy bodies in energy internet. IEEE Trans. Industrial Inf. 17 (9), 5993–6003. doi:10.1109/TII.2020.3029974

CrossRef Full Text | Google Scholar

Li, Y., Li, T., Zhang, H., Xie, X., and Sun, Q. (2022b). Distributed resilient double-gradient-descent based energy management strategy for multi-energy system under dos attacks. IEEE Trans. Netw. Sci. Eng. 9 (4), 2301–2316. doi:10.1109/TNSE.2022.3162669

CrossRef Full Text | Google Scholar

Li, Y., Zhang, H., Liang, X., and Huang, B. (2019). Event-Triggered-based distributed cooperative energy management for multienergy systems. IEEE Trans. Industrial Inf. 15 (4), 2008–2022. doi:10.1109/TII.2018.2862436

CrossRef Full Text | Google Scholar

Liu, Z., Huang, B., Hu, X., Du, P., and Sun, Q. (2023). Blockchain-based renewable energy trading using information entropy theory. IEEE Trans. Netw. Sci. Eng., 1–12. doi:10.1109/TNSE.2023.3238110

CrossRef Full Text | Google Scholar

Liu, Z., Xu, Y., Zhang, C., Elahi, H., and Zhou, X. (2022). A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles. Digital Commun. Netw. 8 (6), 976–983. doi:10.1016/j.dcan.2022.10.014

CrossRef Full Text | Google Scholar

Mellal, M. A., and Williams, E. J. (2020). Cuckoo optimization algorithm with penalty function and binary approach for combined heat and power economic dispatch problem. Energy Rep. 6, 2720–2723. doi:10.1016/j.egyr.2020.10.004

CrossRef Full Text | Google Scholar

Sun, Q., Fan, R., Li, Y., Huang, B., and Ma, D. (2019). A distributed double-consensus algorithm for residential we-energy. IEEE Trans. Industrial Inf. 15 (8), 1–4842. doi:10.1109/TII.2019.2921431

CrossRef Full Text | Google Scholar

Teng, F., Zhang, Y., Yang, T., Li, T., Xiao, Y., and Li, Y. (2023). Distributed optimal energy management for we-energy considering operation security. IEEE Trans. Netw. Sci. Eng., 1–11. doi:10.1109/TNSE.2023.3295079

CrossRef Full Text | Google Scholar

Xu, D., Wu, Q., Zhou, B., Li, C., Bai, L., and Huang, S. (2020). Distributed multi-energy operation of coupled electricity, heating, and natural gas networks. IEEE Trans. Sustain. Energy 11 (4), 2457–2469. doi:10.1109/TSTE.2019.2961432

CrossRef Full Text | Google Scholar

Yang, L., Sun, Q., Zhang, N., and Li, Y. (2022). Indirect multi-energy transactions of energy internet with deep reinforcement learning approach. IEEE Trans. Power Syst. 37 (5), 4067–4077. doi:10.1109/TPWRS.2022.3142969

CrossRef Full Text | Google Scholar

Zeng, W., Zhang, Y., and Chow, M. Y. (2017). Resilient distributed energy management subject to unexpected misbehaving generation units. IEEE Trans. Industrial Inf. 13 (1), 208–216. doi:10.1109/TII.2015.2496228

CrossRef Full Text | Google Scholar

Zhang, H., Li, Y., Gao, D. W., and Zhou, J. (2017). Distributed optimal energy management for energy internet. IEEE Trans. Industrial Inf. 13 (6), 3081–3097. doi:10.1109/TII.2017.2714199

CrossRef Full Text | Google Scholar

Zhang, X., Li, Y., Li, T., Gui, Y., Sun, Q., and Gao, D. W. (2023). Digital twin empowered PV power prediction. J. Mod. Power Syst. Clean Energy. doi:10.35833/MPCE.2023.000351

CrossRef Full Text | Google Scholar

Zhang, Z., Yue, D., Dou, C., Cheng, Z., and Chen, L. (2019). A robust consensus-based economic dispatch strategy under dos attack. IEEE Int. Conf. Industrial Cyber Phys. Syst. (ICPS) 127–132. doi:10.1109/ICPHYS.2019.8780286

CrossRef Full Text | Google Scholar

Zhao, C., He, J., Cheng, P., and Chen, J. (2017). Analysis of consensus-based distributed economic dispatch under stealthy attacks. IEEE Trans. Industrial Electron. 64 (6), 5107–5117. doi:10.1109/TIE.2016.2638400

CrossRef Full Text | Google Scholar

Zhou, X., Ma, Z., Zou, S., Zhang, J., and Guo, Y. (2023). Distributed energy management of double-side multienergy systems via sub-gradient averaging consensus. IEEE Trans. Smart Grid 14 (2), 979–995. doi:10.1109/TSG.2022.3201814

CrossRef Full Text | Google Scholar

Keywords: cyberattacks, energy management, integrated energy systems, smart grid, distributed optimization

Citation: Li T, Sun F, Chen J, Wang L, Yang Z, Liu R and Qi J (2024) An attack-resilient distributed energy management strategy for integrated energy systems. Front. Energy Res. 11:1341984. doi: 10.3389/fenrg.2023.1341984

Received: 21 November 2023; Accepted: 26 December 2023;
Published: 11 January 2024.

Edited by:

Yushuai Li, University of Oslo, Norway

Reviewed by:

Bi Liu, Anhui University, China
Yihuan Li, North China Electric Power University, China
Xiao Wang, The University of Manchester, United Kingdom

Copyright © 2024 Li, Sun, Chen, Wang, Yang, Liu and Qi. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Jun Qi, 13898177452@163.com

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.