Robust Optimization for Microgrid Defense Resource Planning and Allocation Against Multi-Period Attacks

被引:36
作者
Lei, Hongtao [1 ]
Huang, Shengjun [1 ]
Liu, Yajie [1 ]
Zhang, Tao [1 ]
机构
[1] Natl Univ Def Technol, Dept Syst Engn, Changsha 410073, Hunan, Peoples R China
关键词
Robust optimization; microgrid; defense planning and allocation; multi-period attack; column-and-constraint generation; METHODOLOGY; MANAGEMENT; ENERGY;
D O I
10.1109/TSG.2019.2892201
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates a microgrid defense resource planning and allocation problem with the consideration of multi-period attacks. The defensive transmission lines and distributed generators (DGs) are, respectively, planned and allocated to mitigate the multi-period attack damage on transmission lines and minimize the shed loads for microgrid, based on a multi-period defender-attacker-defender model. Robust optimization technique is utilized for the problem formulation, resulting in a two-stage decision process: in the first stage, the defender proposes defensive line plan and DG allocation scheme for the purpose of minimizing the attacker's damage; and in the second stage, the attacker disrupts the transmission lines of microgrid system aiming at the maximum damage by the multi-period attacks, then the defender reacts to optimize the power flow on the remaining microgrid system to minimize the shed loads. Solution process is developed based on the customized column-and-constraint generation algorithm. The effectiveness and superiority of the proposed model and algorithm are validated with numerical experiments. In addition, sensitivity analysis is also carried out with various parameters and settings.
引用
收藏
页码:5841 / 5850
页数:10
相关论文
共 32 条
[1]   A trilevel programming approach for electric grid defense planning [J].
Alguacil, Natalia ;
Delgadillo, Andres ;
Arroyo, Jose M. .
COMPUTERS & OPERATIONS RESEARCH, 2014, 41 :282-290
[2]  
[Anonymous], 2013, EC BEN INCR EL GRID
[3]   Robust optimization - methodology and applications [J].
Ben-Tal, A ;
Nemirovski, A .
MATHEMATICAL PROGRAMMING, 2002, 92 (03) :453-480
[4]   Adaptive Robust Optimization for the Security Constrained Unit Commitment Problem [J].
Bertsimas, Dimitris ;
Litvinov, Eugene ;
Sun, Xu Andy ;
Zhao, Jinye ;
Zheng, Tongxin .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2013, 28 (01) :52-63
[5]   Theory and Applications of Robust Optimization [J].
Bertsimas, Dimitris ;
Brown, David B. ;
Caramanis, Constantine .
SIAM REVIEW, 2011, 53 (03) :464-501
[6]   Robust optimization - A comprehensive survey [J].
Beyer, Hans-Georg ;
Sendhoff, Bernhard .
COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING, 2007, 196 (33-34) :3190-3218
[7]   Methodology for identifying near-optimal interdiction strategies for a power transmission system [J].
Bier, Vicki M. ;
Gratz, Ell R. ;
Haphuriwat, Naraphorn J. ;
Magua, Wairimu ;
Wierzblcki, Kevin R. .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2007, 92 (09) :1155-1161
[8]   Defending critical infrastructure [J].
Brown, Gerald ;
Carlyle, Matthew ;
Salmeron, Javier ;
Wood, Kevin .
INTERFACES, 2006, 36 (06) :530-544
[9]  
Brown Gerald., 2005, ANAL VULNERABILITY C, P102
[10]  
Che L, 2014, IEEE POWER ENERGY M, V12, P70, DOI 10.1109/MPE.2013.2286317