TY - GEN
T1 - Decentralised Scheduling of Power Consumption in Micro-grids
T2 - Optimisation and Security
AU - Weldehawaryat, Goitom
AU - Ambassa, Pacome
AU - Marufu, Anesu
AU - Wolthusen, Stephen
AU - Kayem, Anne V.D.M.
PY - 2017/6/10
Y1 - 2017/6/10
N2 - We consider a micro-grid architecture that is distributed in nature and reliant on renewable energy. In standard grid architectures, demand management is handled via scheduling protocols that are centrally coordinated. Centralised approaches are however computationally intensive, thus not suited to distributed grid architectures with limited computational power. We address this problem with a decentralised scheduling algorithm. In our scheduling algorithm, the alternating direction method of multipliers (ADMM) is used to decompose the scheduling problem into smaller sub problems that are solved in parallel over local computation devices, which yields an optimal solution. We show that ADMM can be used to model a scheduling solution that handles both decentralised and fully decentralised cases. As a further step, we show that false data injection attacks can be provoked by compromising parts of the communication infrastructure or a set of computing devices. In this case, the algorithm fails to converge to an optimum or converges toward a value that lends the attacker an advantage, and impacts the scheduling scheme negatively.
AB - We consider a micro-grid architecture that is distributed in nature and reliant on renewable energy. In standard grid architectures, demand management is handled via scheduling protocols that are centrally coordinated. Centralised approaches are however computationally intensive, thus not suited to distributed grid architectures with limited computational power. We address this problem with a decentralised scheduling algorithm. In our scheduling algorithm, the alternating direction method of multipliers (ADMM) is used to decompose the scheduling problem into smaller sub problems that are solved in parallel over local computation devices, which yields an optimal solution. We show that ADMM can be used to model a scheduling solution that handles both decentralised and fully decentralised cases. As a further step, we show that false data injection attacks can be provoked by compromising parts of the communication infrastructure or a set of computing devices. In this case, the algorithm fails to converge to an optimum or converges toward a value that lends the attacker an advantage, and impacts the scheduling scheme negatively.
KW - Micro-grid architectures Power consumption scheduling Distributed demand management Energy management Demand response ADMM
U2 - 10.1007/978-3-319-61437-3_5
DO - 10.1007/978-3-319-61437-3_5
M3 - Conference contribution
SN - 978-3-319-61436-6
T3 - Lecture Notes in Computer Science
SP - 69
EP - 86
BT - Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016)
PB - Springer-Verlag
ER -