-
Joint Distributed Generation Maximization and Radial Distribution Network Reconfiguration
Authors:
Kin Cheong Sou,
Gabriel Malmer,
Lovisa Thorin,
Olof Samuelsson
Abstract:
This paper studies an optimization problem for joint radial distribution system network reconfiguration and power dispatch for distributed generation (DG) maximization. We provide counterexamples to show that for DG maximization, standard techniques such as interior point method (as in Matpower), linear approximation and second order cone relaxation (e.g., by Jabr et.~al.~and by Farivar and Low) d…
▽ More
This paper studies an optimization problem for joint radial distribution system network reconfiguration and power dispatch for distributed generation (DG) maximization. We provide counterexamples to show that for DG maximization, standard techniques such as interior point method (as in Matpower), linear approximation and second order cone relaxation (e.g., by Jabr et.~al.~and by Farivar and Low) do not deliver the desired control. Instead, we propose a control decision model based on exact DistFlow equations bypassing relaxation and a solution approach based on spatial branch-and-bound algorithm. We justify our work with comparative studies and numerical demonstrations with benchmarks and a 533-bus real example, performing reconfiguration and power dispatch in a time scale relevant for control center applications.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
Distributed Online Optimization with Coupled Inequality Constraints over Unbalanced Directed Networks
Authors:
Dandan Wang,
Daokuan Zhu,
Kin Cheong Sou,
Jie Lu
Abstract:
This paper studies a distributed online convex optimization problem, where agents in an unbalanced network cooperatively minimize the sum of their time-varying local cost functions subject to a coupled inequality constraint. To solve this problem, we propose a distributed dual subgradient tracking algorithm, called DUST, which attempts to optimize a dual objective by means of tracking the primal c…
▽ More
This paper studies a distributed online convex optimization problem, where agents in an unbalanced network cooperatively minimize the sum of their time-varying local cost functions subject to a coupled inequality constraint. To solve this problem, we propose a distributed dual subgradient tracking algorithm, called DUST, which attempts to optimize a dual objective by means of tracking the primal constraint violations and integrating dual subgradient and push sum techniques. Different from most existing works, we allow the underlying network to be unbalanced with a column stochastic mixing matrix. We show that DUST achieves sublinear dynamic regret and constraint violations, provided that the accumulated variation of the optimal sequence grows sublinearly. If the standard Slater's condition is additionally imposed, DUST acquires a smaller constraint violation bound than the alternative existing methods applicable to unbalanced networks. Simulations on a plug-in electric vehicle charging problem demonstrate the superior convergence of DUST.
△ Less
Submitted 4 September, 2023;
originally announced September 2023.
-
Resilient Scheduling of Control Software Updates in Radial Power Distribution Systems
Authors:
Kin Cheong Sou,
Henrik Sandberg
Abstract:
In response to newly found security vulnerabilities, or as part of a moving target defense, a fast and safe control software update scheme for networked control systems is highly desirable. We here develop such a scheme for intelligent electronic devices (IEDs) in power distribution systems, which is a solution to the so-called software update rollout problem. This problem seeks to minimize the ma…
▽ More
In response to newly found security vulnerabilities, or as part of a moving target defense, a fast and safe control software update scheme for networked control systems is highly desirable. We here develop such a scheme for intelligent electronic devices (IEDs) in power distribution systems, which is a solution to the so-called software update rollout problem. This problem seeks to minimize the makespan of the software rollout, while guaranteeing safety in voltage and current at all buses and lines despite possible worst-case update failure where malfunctioning IEDs may inject harmful amounts of power into the system. Based on the nonlinear DistFlow equations, we derive linear relations relating software update decisions to the worst-case voltages and currents, leading to a decision model both tractable and more accurate than previous models based on the popular linearized DistFlow equations. Under reasonable protection assumptions, the rollout problem can be formulated as a vector bin packing problem and instances can be built and solved using scalable computations. Using realistic benchmarks including one with 10,476 buses, we demonstrate that the proposed method can generate safe and effective rollout schedules in real-time.
△ Less
Submitted 23 July, 2023;
originally announced July 2023.
-
Protection Placement for State Estimation Measurement Data Integrity
Authors:
Kin Cheong Sou
Abstract:
In this paper a protection placement problem for power network measurement system data integrity is considered. The placement problem is motivated from the data secure power network design applications in [Dan and Sandberg 2010]. The problem is shown to be NP-hard and an integer linear programming formulation is provided based on the topological observability condition by [Krumpholz, Clements and…
▽ More
In this paper a protection placement problem for power network measurement system data integrity is considered. The placement problem is motivated from the data secure power network design applications in [Dan and Sandberg 2010]. The problem is shown to be NP-hard and an integer linear programming formulation is provided based on the topological observability condition by [Krumpholz, Clements and Davis 1980]. The incorporation of the observability condition requires a graph connectivity constraint which is found to be most effectively described by the Miller-Tucker-Zemlin (MTZ) conditions. For a specialization without line power flow measurements, the protection placement problem can be modeled by a domination type integer linear program much easier to solve than the general formulation requiring graph connectivity. Numerical studies with IEEE benchmark and other large power systems with more than 2000 buses indicate that using the proposed formulations, the protection placement problem can be solved in negligible amount of time in realistic application settings.
△ Less
Submitted 13 November, 2018;
originally announced November 2018.
-
Relaxed Connected Dominating Set Problem with Application to Secure Power Network Design
Authors:
Kin Cheong Sou,
Jie Lu
Abstract:
This paper investigates a combinatorial optimization problem motived from a secure power network design application in [Dán and Sandberg 2010]. Two equivalent graph optimization formulations are derived. One of the formulations is a relaxed version of the connected dominating set problem, and hence the considered problem is referred to as relaxed connected dominating set (RCDS) problem. The RCDS p…
▽ More
This paper investigates a combinatorial optimization problem motived from a secure power network design application in [Dán and Sandberg 2010]. Two equivalent graph optimization formulations are derived. One of the formulations is a relaxed version of the connected dominating set problem, and hence the considered problem is referred to as relaxed connected dominating set (RCDS) problem. The RCDS problem is shown to be NP-hard, even for planar graphs. A mixed integer linear programming formulation is presented. In addition, for planar graphs a fixed parameter polynomial time solution methodology based on sphere-cut decomposition and dynamic programming is presented. The computation cost of the sphere-cut decomposition based approach grows linearly with problem instance size, provided that the branchwidth of the underlying graph is fixed and small. A case study with IEEE benchmark power networks verifies that small branchwidth are not uncommon in practice. The case study also indicates that the proposed methods show promise in computation efficiency.
△ Less
Submitted 27 February, 2017; v1 submitted 16 March, 2016;
originally announced March 2016.
-
A Branch-Decomposition Approach to Power Network Design
Authors:
Kin Cheong Sou
Abstract:
This paper proposes a procedure to solve combinatorial power network design problems such as phasor measurement unit (PMU) placement and protection assignment against cyber-physical attacks. The proposed approach tackles the design problems through solving a dominating set problem on the power network graph. A combined branch-decomposition and dynamic programming procedure is applied to solve the…
▽ More
This paper proposes a procedure to solve combinatorial power network design problems such as phasor measurement unit (PMU) placement and protection assignment against cyber-physical attacks. The proposed approach tackles the design problems through solving a dominating set problem on the power network graph. A combined branch-decomposition and dynamic programming procedure is applied to solve the dominating set problem. Contrary to standard integer programming and heuristic/evolutionary approaches for power network design, the proposed approach is exact and requires only polynomial computation time if the graph is planar and has small branch-width. A planarization technique is explored for problem instances with nonplanar graphs. A case study in this paper with benchmark power networks verifies that planarity and small branch-width are not uncommon in practice. The case study also indicates that the proposed method shows promise in computation efficiency.
△ Less
Submitted 18 February, 2016; v1 submitted 28 November, 2015;
originally announced November 2015.
-
Minimum Equivalent Precedence Relation Systems
Authors:
Kin Cheong Sou
Abstract:
In this paper two related simplification problems for systems of linear inequalities describing precedence relation systems are considered. Given a precedence relation system, the first problem seeks a minimum subset of the precedence relations (i.e., inequalities) which has the same solution set as that of the original system. The second problem is the same as the first one except that the ``subs…
▽ More
In this paper two related simplification problems for systems of linear inequalities describing precedence relation systems are considered. Given a precedence relation system, the first problem seeks a minimum subset of the precedence relations (i.e., inequalities) which has the same solution set as that of the original system. The second problem is the same as the first one except that the ``subset restriction'' in the first problem is removed. This paper establishes that the first problem is NP-hard. However, a sufficient condition is provided under which the first problem is solvable in polynomial-time. In addition, a decomposition of the first problem into independent tractable and intractable subproblems is derived. The second problem is shown to be solvable in polynomial-time, with a full parameterization of all solutions described. The results in this paper generalize those in [Moyles and Thompson 1969, Aho, Garey, and Ullman 1972] for the minimum equivalent graph problem and transitive reduction problem, which are applicable to unweighted directed graphs.
△ Less
Submitted 13 March, 2015;
originally announced March 2015.
-
D2D-based V2V Communications with Latency and Reliability Constraints
Authors:
Wanlu Sun,
Erik G. Ström,
Fredrik Brännström,
Yutao Sui,
Kin Cheong Sou
Abstract:
Direct device-to-device (D2D) communication has been proposed as a possible enabler for vehicle-to-vehicle (V2V) applications, where the incurred intra-cell interference and the stringent latency and reliability requirements are challenging issues. In this paper, we investigate the radio resource management problem for D2D-based V2V communications. Firstly, we analyze and mathematically model the…
▽ More
Direct device-to-device (D2D) communication has been proposed as a possible enabler for vehicle-to-vehicle (V2V) applications, where the incurred intra-cell interference and the stringent latency and reliability requirements are challenging issues. In this paper, we investigate the radio resource management problem for D2D-based V2V communications. Firstly, we analyze and mathematically model the actual requirements for vehicular communications and traditional cellular links. Secondly, we propose a problem formulation to fulfill these requirements, and then a Separate Resource Block allocation and Power control (SRBP) algorithm to solve this problem. Finally, simulations are presented to illustrate the improved performance of the proposed SRBP scheme compared to some other existing methods.
△ Less
Submitted 13 January, 2015;
originally announced January 2015.
-
Efficient Computations of a Security Index for False Data Attacks in Power Networks
Authors:
Julien M. Hendrickx,
Karl Henrik Johansson,
Raphael M. Jungers,
Henrik Sandberg,
Kin Cheong Sou
Abstract:
The resilience of Supervisory Control and Data Acquisition (SCADA) systems for electric power networks for certain cyber-attacks is considered. We analyze the vulnerability of the measurement system to false data attack on communicated measurements. The vulnerability analysis problem is shown to be NP-hard, meaning that unless $P = NP$ there is no polynomial time algorithm to analyze the vulnerabi…
▽ More
The resilience of Supervisory Control and Data Acquisition (SCADA) systems for electric power networks for certain cyber-attacks is considered. We analyze the vulnerability of the measurement system to false data attack on communicated measurements. The vulnerability analysis problem is shown to be NP-hard, meaning that unless $P = NP$ there is no polynomial time algorithm to analyze the vulnerability of the system. Nevertheless, we identify situations, such as the full measurement case, where it can be solved efficiently. In such cases, we show indeed that the problem can be cast as a generalization of the minimum cut problem involving costly nodes. We further show that it can be reformulated as a standard minimum cut problem (without costly nodes) on a modified graph of proportional size. An important consequence of this result is that our approach provides the first exact efficient algorithm for the vulnerability analysis problem under the full measurement assumption. Furthermore, our approach also provides an efficient heuristic algorithm for the general NP-hard problem. Our results are illustrated by numerical studies on benchmark systems including the IEEE 118-bus system.
△ Less
Submitted 15 February, 2013; v1 submitted 27 April, 2012;
originally announced April 2012.
-
On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem
Authors:
Kin Cheong Sou,
Henrik Sandberg,
Karl Henrik Johansson
Abstract:
This paper considers a smart grid cyber-security problem analyzing the vulnerabilities of electric power networks to false data attacks. The analysis problem is related to a constrained cardinality minimization problem. The main result shows that an $l_1$ relaxation technique provides an exact optimal solution to this cardinality minimization problem. The proposed result is based on a polyhedral c…
▽ More
This paper considers a smart grid cyber-security problem analyzing the vulnerabilities of electric power networks to false data attacks. The analysis problem is related to a constrained cardinality minimization problem. The main result shows that an $l_1$ relaxation technique provides an exact optimal solution to this cardinality minimization problem. The proposed result is based on a polyhedral combinatorics argument. It is different from well-known results based on mutual coherence and restricted isometry property. The results are illustrated on benchmarks including the IEEE 118-bus and 300-bus systems.
△ Less
Submitted 17 September, 2012; v1 submitted 22 December, 2011;
originally announced January 2012.
-
Computing Critical $k$-tuples in Power Networks
Authors:
Kin Cheong Sou,
Henrik Sandberg,
Karl Henrik Johansson
Abstract:
In this paper the problem of finding the sparsest (i.e., minimum cardinality) critical $k$-tuple including one arbitrarily specified measurement is considered. The solution to this problem can be used to identify weak points in the measurement set, or aid the placement of new meters. The critical $k$-tuple problem is a combinatorial generalization of the critical measurement calculation problem. U…
▽ More
In this paper the problem of finding the sparsest (i.e., minimum cardinality) critical $k$-tuple including one arbitrarily specified measurement is considered. The solution to this problem can be used to identify weak points in the measurement set, or aid the placement of new meters. The critical $k$-tuple problem is a combinatorial generalization of the critical measurement calculation problem. Using topological network observability results, this paper proposes an efficient and accurate approximate solution procedure for the considered problem based on solving a minimum-cut (Min-Cut) problem and enumerating all its optimal solutions. It is also shown that the sparsest critical $k$-tuple problem can be formulated as a mixed integer linear programming (MILP) problem. This MILP problem can be solved exactly using available solvers such as CPLEX and Gurobi. A detailed numerical study is presented to evaluate the efficiency and the accuracy of the proposed Min-Cut and MILP calculations.
△ Less
Submitted 2 January, 2012;
originally announced January 2012.