Quantized Distributed Economic Dispatch for Microgrids: Paillier Encryption-Decryption Scheme

This article is concerned with the secure distributed economic dispatch (DED) problem of microgrids. A quantized distributed optimization algorithm using the Paillier encryption-decryption scheme is developed. This algorithm is designed to optimally coordinate the power outputs of a collection of di...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on industrial informatics Vol. 20; no. 4; pp. 6552 - 6562
Main Authors: Chen, Wei, Wang, Zidong, Ge, Quanbo, Dong, Hongli, Liu, Guo-Ping
Format: Journal Article
Language:English
Published: Piscataway IEEE 01.04.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:1551-3203, 1941-0050
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This article is concerned with the secure distributed economic dispatch (DED) problem of microgrids. A quantized distributed optimization algorithm using the Paillier encryption-decryption scheme is developed. This algorithm is designed to optimally coordinate the power outputs of a collection of distributed generators (DGs) in order to meet the total load demand at the lowest generation cost under the DG capacity limits while ensuring communication efficiency and security. First, to facilitate data encryption and reduce data release, a novel dynamic quantization scheme is integrated into the DED algorithm, through which the effects of quantization errors can be eliminated. Next, utilizing matrix norm analysis and mathematical induction, a sufficient condition is provided to demonstrate that the developed DED algorithm converges precisely to the optimal solution under finite quantization levels (and even the three-level quantization using sign transmissions). Moreover, an encryption-decryption scheme is developed based on quantized outputs, which ensures confidential communication by leveraging the homomorphic property of the Paillier cryptosystem. Finally, the effectiveness and superiority of the implemented secure distributed algorithm are confirmed through a simulated example.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1551-3203
1941-0050
DOI:10.1109/TII.2023.3348816