Quantized Distributed Economic Dispatch for Microgrids: Paillier Encryption-Decryption Scheme
This article is concerned with the secure distributed economic dispatch (DED) problem of microgrids. A quantized distributed optimization algorithm using the Paillier encryption-decryption scheme is developed. This algorithm is designed to optimally coordinate the power outputs of a collection of di...
Saved in:
| Published in: | IEEE transactions on industrial informatics Vol. 20; no. 4; pp. 6552 - 6562 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Piscataway
IEEE
01.04.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects: | |
| ISSN: | 1551-3203, 1941-0050 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | This article is concerned with the secure distributed economic dispatch (DED) problem of microgrids. A quantized distributed optimization algorithm using the Paillier encryption-decryption scheme is developed. This algorithm is designed to optimally coordinate the power outputs of a collection of distributed generators (DGs) in order to meet the total load demand at the lowest generation cost under the DG capacity limits while ensuring communication efficiency and security. First, to facilitate data encryption and reduce data release, a novel dynamic quantization scheme is integrated into the DED algorithm, through which the effects of quantization errors can be eliminated. Next, utilizing matrix norm analysis and mathematical induction, a sufficient condition is provided to demonstrate that the developed DED algorithm converges precisely to the optimal solution under finite quantization levels (and even the three-level quantization using sign transmissions). Moreover, an encryption-decryption scheme is developed based on quantized outputs, which ensures confidential communication by leveraging the homomorphic property of the Paillier cryptosystem. Finally, the effectiveness and superiority of the implemented secure distributed algorithm are confirmed through a simulated example. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 1551-3203 1941-0050 |
| DOI: | 10.1109/TII.2023.3348816 |