Abstract

The coordinated scheduling of plug-in electric vehicle (PEV) charging should be constructed in distributed architecture due to the growing population of PEVs. Since the information and communication technology makes the adversary more permeable, the distributed PEV charging coordination is vulnerable to cyber-attack which may degrade the performance of scheduling and even cause the failure of scheduler task. Considering the tradeoff between system-wide economic efficiency, distribution level limitations and PEV battery degration, this paper investigates the resilient distributed coordination of PEV charging to resist cyber-attack, where the steps of detection, isolation, updating and recovery are designed synthetically. Under the proposed scheduling scheme, the misbehaving PEVs suffering from cyber-attack are gradually marginalized and finally isolated, and the remaining well-behaving PEVs obtain their own optimal charging strategy to minimize the total system cost in distributed architecture. The simulation results verify the effectiveness of theoretical method.

Highlights

  • Due to the growing concerns about carbon emission, fossil energy depletion and climate change, plug-in electric vehicles (PEVs) will be integrated widely into the power system [1,2]

  • This case application indicates that the PEV charging strategy profile calculated by Algorithm 1 under replay attack is not the solution of optimization problem (7), and the effectiveness of distributed PEV charging coordination scheme Algorithm 1 is damaged under replay attack

  • This section verifies the effectiveness of Algorithm 3 by numerical simulation of five PEVs with the communication network shown in Figure 1, where the issue of cyber-attack is considered

Read more

Summary

Introduction

Due to the growing concerns about carbon emission, fossil energy depletion and climate change, plug-in electric vehicles (PEVs) will be integrated widely into the power system [1,2]. Many research works have studied the issue of PEV charging strategy scheduling in centralized architecture. Electronics 2020, 9, 770 communication infrastructures are required, the system building cost increases, and the reliability and security are vulnerable to a single point of failure [11] To address this issue, some research works focused on the distributed scheduling method, whose implementation is based on the neighboring communication and local computation without the usage of control center. The modality and impact of cyber-attack are analyzed, and a novel resilient distributed coordination scheme of PEV charging based on dynamical confidence level is constructed in this paper.

Charging Model of Individual PEV
Communication Network for PEVs Interaction
Formulation of Distributed Coordination about PEVs Charging
Cyber-Attack against PEVs Charging Coordination
Resilient Distributed Coordination of PEVs Charging
Detection of Cyber-Attack
Isolation of Misbehaving PEVs
Updating and Recovery of Distributed Consensus Protocol
Resilient Distributed PEVs Charging Coordination
Simulation
Response under Replay Attack replay
Response under Random Attack
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call