The final, formatted version of the article will be published soon.
ORIGINAL RESEARCH article
Front. Energy Res.
Sec. Smart Grids
Volume 12 - 2024 |
doi: 10.3389/fenrg.2024.1494164
A Deep Reinforcement Learning-Based Approach for Cyber Resilient Demand Response Optimization
Provisionally accepted- 1 Indian Institute of Information Technology, Allahabad, Allahabad, India
- 2 The Hashemite University, Jordan, Zarqa, Jordan
- 3 University of Reading, Reading, England, United Kingdom
The contemporary smart grid infrastructure, characterized by its bidirectional communication capabilities between prosumers and utility organizations, has revolutionized the efficient execution of fine-grain computational tasks. Ensuring the uninterrupted delivery of power, even in the face of unforeseen contingencies, stands as a paramount concern for utility companies. Peak load forecasting, load balancing, and robust cyberattack detection and prevention mechanisms are integral components in achieving grid reliability. This research endeavors to advance peak load forecasting strategies and demand response optimization at the microgrid level, thereby enhancing grid reliability through the application of Deep Reinforcement Learning (DRL) techniques. Additionally, it investigates the ongoing threat of false data injection attacks. By synergizing these two critical investigations and implementing a novel framework and defense mechanism, this paper proposes a comprehensive approach to fortify the smart grid's reliability and security. The envisioned framework not only refines demand response (DR) optimization but also bolsters the grid's resilience in the face of the everevolving cyber threat landscape. The research outcomes showcase the practicality and effectiveness of the proposed framework, substantiated through extensive experimentation conducted on IEEE-3, IEEE-9, IEEE-14, and IEEE-33 bus systems.
Keywords: Smart grid architecture, load forecasting, demand response, Load profiling, smart grid resilience, FDI attack
Received: 10 Sep 2024; Accepted: 30 Dec 2024.
Copyright: © 2024 Sinha, Vyas, Alasali, Holderbaum and Vyas. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence:
Ayush Sinha, Indian Institute of Information Technology, Allahabad, Allahabad, India
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.