Next Article in Journal
Design and Analysis of fT-Doubler-Based RF Amplifiers in SiGe HBT Technology
Previous Article in Journal
Improved Kalman Filter Variants for UAV Tracking with Radar Motion Models
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Resilient Distributed Coordination of Plug-In Electric Vehicles Charging under Cyber-Attack

1
Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
2
NARI Technology Co. Ltd., Nanjing 210023, China
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(5), 770; https://doi.org/10.3390/electronics9050770
Submission received: 21 April 2020 / Revised: 1 May 2020 / Accepted: 3 May 2020 / Published: 7 May 2020
(This article belongs to the Section Electrical and Autonomous Vehicles)

Abstract

:
The coordinated scheduling of plug-in electric vehicle (PEV) charging should be constructed in distributed architecture due to the growing population of PEVs. Since the information and communication technology makes the adversary more permeable, the distributed PEV charging coordination is vulnerable to cyber-attack which may degrade the performance of scheduling and even cause the failure of scheduler task. Considering the tradeoff between system-wide economic efficiency, distribution level limitations and PEV battery degration, this paper investigates the resilient distributed coordination of PEV charging to resist cyber-attack, where the steps of detection, isolation, updating and recovery are designed synthetically. Under the proposed scheduling scheme, the misbehaving PEVs suffering from cyber-attack are gradually marginalized and finally isolated, and the remaining well-behaving PEVs obtain their own optimal charging strategy to minimize the total system cost in distributed architecture. The simulation results verify the effectiveness of theoretical method.

1. Introduction

Due to the growing concerns about carbon emission, fossil energy depletion and climate change, plug-in electric vehicles (PEVs) will be integrated widely into the power system [1,2]. The global sales of PEVs have almost exponential growth over the past 10 years before 2020, and the selling number is predicted to be 30 million and 50 million at the year 2030 and 2040 respectively [3]. The rising population of PEVs facilitates the exploitation of sustainable and renewable energy, reduces environmental pollution and minimizes greenhouse gases [4]. However, their disordered charging behavior introduces significant adverse impacts on power grid including power unbalance between the demand of PEVs’ charging and the supply of power grid, localized overloading, excessive losses and larger voltage deviation [5,6,7]. Therefore, it is desirable to study the proper coordination scheme of PEV charging to minimize the above mentioned negative effects.
Many research works have studied the issue of PEV charging strategy scheduling in centralized architecture. In Reference [8], a centralized minimum-cost load scheduling algorithm was constructed to determine the purchase of energy in the day-ahead market and a dynamic dispatch algorithm was developed for distributing the purchased energy to PEVs. A centralized aggregator was proposed in [9] to compute the optimal charging strategy of each PEV for efficient power utilization. The centralized coordinated PEV charging method aimed to minimize the power losses and maximize the main grid load factor was studied in [10]. The centralized scheduling method mentioned in the existing papers requires a control center to collect the information of all PEVs, make the charging decision and transmit the control signal back to each PEV. In the centralized architecture, expensive high-bandwidth communication infrastructures are required, the system building cost increases, and the reliability and security are vulnerable to a single point of failure [11]. To address this issue, some research works focused on the distributed scheduling method, whose implementation is based on the neighboring communication and local computation without the usage of control center. A distributed cooperative charging control for PEVs was developed in [12] to avoid overload and maximize customer preference where the control center is eliminated. In Reference [13], the distributed consensus protocol contributed to a coordinated charging and discharging strategy of PEVs. The distributed optimal charging scheduling of PEVs considering multiple energy suppliers was studied in [14]. In Reference [15], a consensus algorithm was used in the distributed PEV charging coordination to facilitate the tradeoff between the total generation cost and local costs associated with battery degradation and distribution network overloading, and then the issue about the loading on the transformers was considered further in [16]. Compared with the centralized scheduling method, the distributed one in the above mentioned papers is more suitable for charging coordination with massive PEVs spread over a wide geographical area due to its characteristic of flexibility, scalability, robustness and economy.
In order to realize the centralized or distributed PEV charging coordination, information transmission plays an important role. However, the extensive utilization of information and communication technology makes the adversary more permeable, and causes the PEV charging system more vulnerable to cyber-attack [17]. The cyber-attack can violate the main security attributes of information transmission such as confidentiality, authenticity, integrity and availability [18]. This may degrade the performance of scheduling and control, and even lead to the failure of charging coordination [19]. Several potential failure scenarios for PEV charging system caused by cyber-attacks were defined and the adverse impacts were studied in [20]. Multiple jamming attacks for charging stations and PEVs were considered in [21]. These relative literatures verify the damage of cyber-attack in PEV charging, and it is necessary to identify the resilient PEV charging approach as a major research direction to resist the cyber-attack. In Reference [22], the model-based detection mechanism for cyber-attack was designed to protect the PEV battery packs during charging. The resilient PEV charging policy under price information attacks was considered in [23] where the DoS attack and price manipulation attack can be resisted.
Although there exists some research concerning with the resilient PEV charging method against cyber-attack as mentioned before, the topic about coordinated scheduling of PEV charging in distributed architecture is till lacking to the best of authors’ knowledge, and this motivates our study. This paper concerns on the distributed coordinated scheduling of PEV charging under cyber-attack, where the trade-off between system-wide economic efficiency, distribution level limitations and PEV battery degration are considered. Each participating PEV determines its own charging strategy with respect to an agreed common average price, which is obtained by a distributed consensus protocol of the individual price exchanged among the neighboring PEVs through communication network. The cyber-attack launched by an adversary tampers the individual price by unauthorized attack data injection. The modality and impact of cyber-attack are analyzed, and a novel resilient distributed coordination scheme of PEV charging based on dynamical confidence level is constructed in this paper. It is proved that the system cost function for PEV charging can be minimized even under cyber-attack. The main contributions of this paper are summarized as follows.
(1)
The confidence level based resilient PEV charging coordination in the presence of cyber-attack is proposed, where the detection, isolation, updating and recovery steps are designed synthetically. The misbehaving PEV under cyber-attack is gradually marginalized and finally isolated from the system according to its confidence level calculated in real-time by the above steps. In order to resist the cyber-attack and acquire the optimized charging strategy, these steps are executed at each participating PEV based on the information received from its neighbors.
(2)
The implementation of resilient PEV charging coordination only requires each participating PEV to communicate with its neighboring PEVs in communication network, which implies that the proposed charging scheduling method is compliant with distributed architecture. It is more suitable for the charging system containing massive PEVs.
(3)
The modality of cyber-attack is constructed and its negative effect on PEV charging coordination is analyzed. It is demonstrated that the common average price can not be obtained via the distributed consensus protocol when some PEVs suffer from cyber-attack, and this further results in the failure of traditional charging scheduling algorithm which was constructed without the consideration of cyber-attack.
This paper is organized as follows. The charging model and problem formulation are given in Section 2. Section 3 represents the modality and negative effects of cyber-attack in PEV charging coordination. The resilient distributed coordination of PEV charging against cyber-attack is constructed in Section 4, and the effectiveness of theory is verified by simulation in Section 5. Section 6 states the conclusion and future work.

2. Problem Formulation

2.1. Charging Model of Individual PEV

Consider the optimal charging scheduling of n PEVs labeling from 1 to n over the time horizon T = { 0 , 1 , , T 1 } . For each PEV i ( i = 1 , 2 , , n ) , denote the charging power at time t T as u i t and name the charging strategy over the horizon T as the vector u i = { u i 0 , u i 1 , u i ( T 1 ) } . The charging strategy u i is admissible if
u i t = 0 , t T i = 0 , o t h e r w i s e
and
u i 1 Γ i
where u i 1 t T u i t , Γ i is the energy capacity and T i T is the charging horizon of the PEV i respectively. Denote the set of admissible charging strategies of PEVs i which satisfy the restricted condition (1) and (2) as U i .
As mentioned in [24], the distribution-level harmful impacts caused by coincident high charger power demand of PEVs include line and transformer overloading, low voltages and increased losses. As a consequence, the PEVs are encouraged to charge at lower power level to minimize the above impacts. The strictly monotone increasing function g d e m a n d , i t ( u i t ) is introduced to describe the distribution-level cost corresponding to the charging power u i t of the PEV i at time t. Moreover, the battery degradation cost g c e l l , i ( u i t ) = a n u i t 2 + b n u i t + c n with the constants a n , b n and c n represents the monetary loss of PEV i charging at the rate of u i t for the period Δ T as shown in [24]. The individual local cost of PEV i at time t considering the distribution level cost and battery degration is obtained as
g i t ( u i t ) = g d e m a n d , i t ( u i t ) + g c e l l , i ( u i t )
The individual local cost function g i t ( · ) is assumed to be monotonically increasing, strictly convex and differentiable for all i and t.
According to Reference [9], the benefit function of the PEV i with respect to the total energy delivered over the charging horizon is defined as
h i ( u i 1 ) = δ i ( u i 1 Γ i ) 2
where the positive constant δ i denotes the the relative importance of delivering the full charge to the PEV i.
Based on Equations (3) and (4), the utility function of individual PEV i for the charging strategy u i over the charging horizon satisfies
v i ( u i ) = h i ( u i 1 ) t T g i t ( u i t )

2.2. Communication Network for PEVs Interaction

In order to implement the distributed coordination of PEV charging, the information should be transmitted among the PEVs through the communication network whose topology can be described by an undirected graph G = ( V , E , A ) . The node set V = { 1 , 2 , , n } contains all of the n PEVs, and the edge set E = { ( i , j ) | i f i j } contains all the communication links in G where the symbols i j mean that the information of PEV i can be transmitted to PEV j directly through communication network. Noted that ( i , j ) E if and only if ( j , i ) E since graph G is undirected. The neighboring set of PEV i in communication network G is defined as N i = { j V | ( j , i ) E } , and its cardinal number is | N i | . The element a i j in matrix A = { a i j } R n × n indicates the positive weight of edge ( j , i ) . Mentioned that a i j > 0 if and only if ( j , i ) E , otherwise a i j = 0 .

2.3. Formulation of Distributed Coordination about PEVs Charging

The coordination of PEV charging studies the trade-off between the total cost and the benefit of supplying energy to the PEVs. Considering the utility function (5) and the generation cost function c ( · ) , the system cost function of PEVs coordinated charging is given as
J ( u ) = t T c ( d t + i V u i t ) i V v i ( u i )
where the admissible charging strategies u = { u 1 , u 2 , , u n } U satisfy u i U i , the quadratic function c ( y t ) = 1 2 α y t 2 + β y t + γ with constants α , β and γ approximates the generation cost with respect to the aggregate demand y t = d t + i V u i t based on the analysis in [25,26], and the function d t indicates the aggregate inelastic base demand at time t.
The objective of PEV coordinated charging is to implement a socially optimal collection of charging strategies for all participating PEVs to minimize the system cost function (6) under the restricted condition (1) and (2), which is characterized as the following optimization problem
min u U J ( u )
By introducing the price profile and consensus based price update process, the following Algorithm 1 was constructed in [15] to address the distributed coordination of PEV charging under the parameter restriction A 1 = 1 , 1 T A = 1 T and | 1 η | + 2 n κ ν η < 1 where the n-dimensional vector 1 = { 1 , 1 , , 1 } T , κ is the Lipschitz constant of derived function c ( · ) , and  ν = max i V , t T ν i t where ν i t is the Lipschitz constant of the function [ g i t ] 1 ( · ) over the interval [ g i t ( 0 ) , g i t ( Γ i ) ] . The optimal charging strategy for each PEV can be obtained until the change in price profile is negligible.
Algorithm 1 satisfies the requirement of distributed architecture since the control center unit is nonexistent and each PEV updates its own individual electricity price p ^ i based on neighborhood information transmission through communication network G as shown in (10). Mentioned that the information transmission in Algorithm 1 is required to be ideal. However, the communication network is vulnerable to cyber-attack usually in practical application, and the attack launched by adversary may deteriorate the performance of distributed consensus protocol (10) and even cause the failure of PEV charging coordination. This signifies that the security issue should be a major concern. In the next sections, the modality and impact of cyber-attack on Algorithm 1 will be analyzed, and then the resilient PEV charging coordination scheme will be constructed to resist the cyber-attack.
Algorithm 1: Distributed coordination of PEV charging without the consideration of cyber-attack.
  • Specify the aggregate inelastic base demand d = ( d t , t T ) , total number of PEVs n, time horizon T and parameter η ;
  • Define the allowable deviations ε s t o p and ϵ s t o p to terminate iterations;
  • Initialize the initial common electricity price p 0 = ( p t 0 , t T ) , ε > ε s t o p and m = 0 ;
  • WHILE ε > ε s t o p
    -
    Determine the charging profile u i m + 1 w.r.t. p m for all PEVs i V simultaneously by minimizing the individual cost function
    u i m + 1 ( p m ) = arg min u i U i t T p t m u i t v i ( u i )
    -
    Initialize ϵ > ϵ s t o p and l = 0 ;
    -
    Initialize the initial individual electricity price p ^ i ( 0 ) = ( p ^ i t ( 0 ) , t T ) for each PEV i V and t T as
    p ^ i t ( 0 ) = p t m + η c ( d t + n · u i t m + 1 ) p t m
    -
    WHILE ϵ > ϵ s t o p
    Update the individual price p ^ i ( l ) = ( p ^ i t ( l ) , t T ) by executing the distributed consensus protocol at each PEV i ( i V ) and time t T as
    p ^ i t ( l + 1 ) = j V a i j p ^ j t ( l )
    Update ϵ = max i { p ^ i ( l + 1 ) p ^ i ( l ) 1 } ;
    Update l = l + 1 ;
    -
    END WHILE
    -
    Specify the common price p m + 1 = p ^ i ( l ) ;
    -
    Update ε = p m + 1 p m 1 ;
    -
    Update m = m + 1 ;
  • END WHILE
  • Specify the optimal charging strategy as u i m for PEV i ( i V ) .

3. Cyber-Attack against PEVs Charging Coordination

The distributed consensus protocol (10) in Algorithm 1 aims to drive the individual electricity price p ^ i t of each PEV i to the average value (11) of all participating PEVs’ initial individual prices by neighborhood information transmission through communication network G . This is the precondition of solving the optimization problem (7), and more details can be found in [15].
p ^ t = 1 n i V p ^ i t ( 0 ) = 1 n i V p t m + η c ( d t + n · u i t m + 1 ) p t m
Considering the communication network suffering from cyber-attack, the distributed consensus protocol (10) in Algorithm 1 is affected as
p ^ i t ( l + 1 ) = j V a i j p ^ j t ( l ) + u i t a ( l )
where u i t a ( l ) denotes the attack injection acting on individual price p ^ i t of PEV i at iteration l. The aim of attack injection is to affect the convergence of consensus protocol and modify the convergent value (11), and finally destroy the effectiveness of Algorithm 1.
It can be seen from (12) that the attack injection u i t a ( l ) determines whether the PEV i suffers from cyber-attack. Moreover, the injection u i t a ( l ) describes the attack type launched by adversary. The injection u i t a ( l ) = a i j p ^ j t ( l ) means the PEV j is under DoS attack since the information sent from PEV j to i is erased at iteration l. The injection u i t a ( l ) = c j V a i j p ^ j t ( l ) for all iterations l implies the PEV i is under replay attack with the replay signal c. The random u i t a ( l ) denotes the random attack on PEV i, and  u i t a ( l ) = c i t ( l ) demonstrates PEV i suffers from false data injection attack with the designed injection c i t ( l ) .
The replay attack is given as an illustration to explain the impact of cyber-attack on distributed charging coordination scheme Algorithm 1. Denoting M and H as the sets of misbehaving PEVs under replay attack and well-behaving PEVs respectively, the distributed consensus protocols in Algorithm 1 is affected as
p ^ i t ( l + 1 ) = j V a i j p ^ j t ( l ) , i H p ^ i t ( l + 1 ) = p ^ i t a , i M
where H M = , H M = V , and  p ^ i t a is the replay fake electricity price of the misbehaving PEV i ( i M ) . According to Theorem 1 in [27], we can get that the individual electricity price of each well-behaving PEV converges into the convex hull c o { p ^ j t a , j M } spanned by the fake prices of misbehaving PEVs, i.e.,
lim l p ^ i t ( l ) = j M c i j p ^ j t a , i H
where the constants c i j 0 ( j M ) and they satisfy j M c i j = 1 for each i.
We can consider two cases. The first case is that there exist multiple PEVs under replay attack and the fake prices of these misbehaving PEVs are unequal. This results in the individual electricity prices of all PEVs converging into the convex hull c o { p ^ j t a , j M } , which implies that these prices cannot achieve consensus. This further means that ϵ > ϵ s t o p in Algorithm 1 for any times of iteration, which makes the algorithm loop infinitely and fail. The other case is that the fake prices of all the misbehaving PEVs are equal or there is only one PEV under replay attack. Denoting the fake price of misbehaving PEVs as p ^ t r e p l a y , it can be obtained from (14) that the convex hull c o { p ^ j t a , j M } degrades into the value p ^ t r e p l a y , and the individual electricity prices of all PEVs converge to p ^ t r e p l a y . Although the consensus price can be ensured in this case, the average value p ^ t in (11) cannot be achieved since p ^ t r e p l a y is unequal to p ^ t usually. It mismatches the precondition of solving the optimization problem (7) and leads to the failure of coordination of PEV charging.
Case application: Consider the communication network of five PEVs shown in Figure 1, and PEV 2 is assumed suffering from replay attack with the replay fake electricity price p ^ t r e p l a y = $ 0.9 /kWh. The impact of replay attack on Algorithm 1 is illustrated in this case application. The generation and individual local costs satisfy c ( y t ) = 2.9 × 10 4 y t 2 + 0.06 y t and g i t ( u i t ) = 0.003 u i t 2 + 0.11 u i t 0.02 respectively. The battery capacity of each PEV is 40 kWh and the weight fact in (4) is set as δ i = 0.03 . Assuming the initial and maximum state-of-charge (SoC) of each PEV as s o c 0 = 15 % and s o c h = 90 % respectively, the energy capacity which can be delivered is calculated as Γ i = 40 ( s o c h s o c 0 ) kWh = 30 kWh for all i V . The aggregate inelastic base demand d is shown in Figure 2 which is representative of a typical hot summer day.
The charging strategy given by Algorithm 1 results in the aggregate demand shown in Figure 2, where the results in cases of no attack and replay attack are illustrated in Figure 2a,b respectively. It can be seen that the aggregate demands in these tow cases are different under the same distributed PEV charging coordination scheme Algorithm 1. The system cost function (6) can be quantified according to the simulation result as J ( u a ) = $ 209.66 /day and J ( u ) = $ 183.51 /day where J ( u a ) denotes the system cost function under replay attack and J ( u ) denotes that without attack. The overall waste caused by replay attack is then calculated as J ( u a ) J ( u ) = $ 26.15 /day, which reveals the negative effects of replay attack against Algorithm 1.
Figure 3 and Figure 4 illustrate the SoC and common electricity price evolution of each PEV under the two cases respectively. Since PEV 2 suffers from the replay attack with replay fake price p ^ t r e p l a y = $ 0.9 /kWh, the common electricity price obtained from Algorithm 1 is equal to p ^ t r e p l a y in the whole charging horizon T as shown in Figure 4b. The comparison between Figure 4a,b demonstrates that the adjusting ability of common electricity price with respect to charging profile is lost under the influence of replay attack, and the average common price (11) cannot be obtained under Algorithm 1. It further results that the optimal charging profile obtained from (8) with respect to the average common price (11) cannot be achieved as shown in Figure 3, which makes the overall waste $ 26.15 /day. This case application indicates that the PEV charging strategy profile calculated by Algorithm 1 under replay attack is not the solution of optimization problem (7), and the effectiveness of distributed PEV charging coordination scheme Algorithm 1 is damaged under replay attack.

4. Resilient Distributed Coordination of PEVs Charging

This section proposes the resilient distributed consensus protocol to resist cyber-attack, and then the resilient distributed coordination scheme of PEV charging is constructed based on this novel consensus protocol. Within this resilient protocol, a confidence level is introduced to identify how healthy each participating PEV is, and the confidence level is dynamic updated in real-time based on attack detection mechanism. When some certain PEV is detected to suffer from cyber-attack, its confidence level is decreased to reduce its negative effect on the other PEVs. Consequently, the misbehaving PEV under cyber-attack is gradually marginalized and finally isolated from the charging system. The remaining well-behaving PEVs recover and update their individual electricity price to attain the new common average electricity price without the influence of cyber-attack. The detailed description of resilient distributed consensus protocol is given as follows, where the steps of detection, isolation, updating and recovery are included and constructed synthetically.

4.1. Detection of Cyber-Attack

In this step, each PEV i transmits the received neighboring PEVs’ individual electricity prices p ^ k t ( l ) ( k N i ) and its own individual electricity price p ^ i t ( l + 1 ) to each of its neighboring PEV j ( j N i ) at each iteration l, where the price p ^ i t ( l + 1 ) is calculated at iteration l by the resilient consensus protocol designed later. Based on the received information from the neighboring PEVs, PEV i executes the following attack detection mechanism
H i j ( l ) = H i j ( l 1 ) + 1 , | k V a j k ( l ) p ^ k t ( l ) p ^ j t ( l + 1 ) | θ H i j ( l 1 ) , | k V a j k ( l ) p ^ k t ( l ) p ^ j t ( l + 1 ) | > θ
where H i j ( l ) denotes the total number of verifiable correct price of the neighboring PEV j monitored by PEV i up to iteration l with the initial value H i j ( 0 ) = 0 , the positive constant θ represents the threshold and a j k ( l ) is the positive weight of edge ( k , j ) in communication network G at iteration l.
It should be mentioned that k V a j k ( l ) p ^ k t ( l ) in (15) is the expected normal price of PEV j at iteration ( l + 1 ) in the absence of cyber-attack, while p ^ j t ( l + 1 ) is the actual price of PEV j at iteration ( l + 1 ) which may be affected by cyber-attack injection u j t a ( l ) as shown in (12). The attack detection mechanism (15) counts the number of verifiable correct price of PEV j according to the difference between these two types of prices in the whole iterative process, where the difference threshold θ is introduced to reduce the false positives caused by some normal disturbance. Based on detection mechanism (15), the PEV i constructs an index H i j to each of its neighboring PEV j.

4.2. Isolation of Misbehaving PEVs

PEV i calculates and stores a confidence level to quantitatively measure the credibility for each of its neighboring PEV j in this step. The confidence level is calculated as (16) according to Bayesian Reputation function [28] based on the ratio of the number of verifiable correct price H i j in (15) to the total number of price received.
c o n f i j ( l ) = μ H i j ( l ) + 1 μ l + 2
where c o n f i j ( l ) denotes the confidence level of PEV j calculated at PEV i at iteration l, and the positive coefficient μ is used to adjust the gradient of confidence level. It should be mentioned that 0 < c o n f i j ( l ) < 1 for all edges ( j , i ) E and iterations l.
The confidence level reflects the healthy degree of neighboring PEV. It can seen from (16) that the confidence level c o n f i j decreases if the misbehaving PEV j is detected with abnormal price by attack detection mechanism (15) configured at PEV i, otherwise the confidence level c o n f i j increases. If the confidence level c o n f i j falls below the proposed anomaly threshold Θ , i.e.,  c o n f i j < Θ , the PEV j is identified to be attacked and it will be isolated from the communication network and physically disconnected from the PEV charging system. The anomaly threshold Θ is selected with weighting the false reject rate and the false accept rate in the practical application.

4.3. Updating and Recovery of Distributed Consensus Protocol

For the remaining PEVs after the isolation step, the weight a i j ( l ) is given as follows
a i j ( l ) = min { c o n f i j ( l ) ξ j N i c o n f i j ( l ) , c o n f j i ( l ) ξ i N j c o n f j i ( l ) }
where the constant ξ > 1 . Denoting the set containing all of the remaining PEVs as V ˜ , the resilient distributed consensus protocol for the updating of PEVs’ individual electricity prices is constructed as
p ^ i t ( l + 1 ) = j V ˜ a i j ( l ) p ^ j t ( l )
where the weight a i i ( l ) = 1 j V ˜ , j i a i j ( l ) for all i V ˜ .
Theorem 1.
Denoting the initial individual electricity price of PEV i in set V ˜ as p ^ i t ( l 0 ) where the initial iteration l 0 is the time when the last misbehaving PEV is isolated, the resilient distributed consensus protocol (18) drives the individual electricity price of each PEV to the average value of initial prices, i.e.,  lim l + p ^ i t ( l ) = 1 | V ˜ | i V ˜ p ^ i t ( l 0 ) for each i V ˜ where | V ˜ | is the cardinal number of set V ˜ , provided that the remaining communication network is still connected after the isolation of misbehaving PEVs.
Proof. 
The isolation process described in Section 4.2 and the definition of confidence level (16) indicate that
Θ c o n f i j ( l ) 1
for all ( j , i ) E where i , j V ˜ . Formula (19) means that
n ξ Θ ξ j N i c o n f i j ( l ) n ξ
Combining (19), (20) and (17) yields
Θ n ξ a i j ( l ) 1 n ξ Θ
The definition of a i i ( l ) leads to
1 a i i ( l ) 1 j V ˜ , j i c o n f i j ( l ) ξ j N i c o n f i j ( l ) = 1 1 ξ
Inequations (21) and (22) imply that min { Θ n ξ , 1 1 ξ } a i j ( l ) max { 1 n ξ Θ , 1 } for any node i , j V ˜ and iteration l. This together with the fact j V ˜ a i j ( l ) = 1 for all i V ˜ indicates that the individual electricity price p ^ i t ( l ) of each PEV converges to a common value p ^ t c o m as l + according to Proposition 2 in [29]. Furthermore, it can be seen from (18) that
1 | V ˜ | i V ˜ p ^ i t ( l + 1 ) = 1 | V ˜ | i V ˜ j V ˜ a i j ( l ) p ^ j t ( l ) = 1 | V ˜ | j V ˜ i V ˜ a i j ( l ) p ^ j t ( l ) = 1 | V ˜ | j V ˜ p ^ j t ( l ) = 1 | V ˜ | i V ˜ p ^ i t ( l )
Equation (23) means 1 | V ˜ | i V ˜ p ^ i t ( l ) is constant for all iteration l and thus we have 1 | V ˜ | i V ˜ p ^ i t ( l ) 1 | V ˜ | i V ˜ p ^ i t ( l 0 ) for any l [ l 0 , + ) . This implies p ^ t c o m = 1 | V ˜ | i V ˜ p ^ i t ( l 0 ) by the help of [30,31], which concludes the proof. □
Remark 1.
Formula (17) guarantees a i j ( l ) = a j i ( l ) for any edge ( j , i ) and iteration l, which realizes the weight balance of the remaining communication network, i.e.,  j V ˜ a i j ( l ) = j V ˜ a j i ( l ) for all i V ˜ . This is the precondition of average consensus as shown in the proof of Theorem 1.
Remark 2.
The selection method of weight a i j ( l ) given in (17) demonstrates the ability of the proposed resilient distributed consensus algorithm in adaptive adjusting weight based on confidence level. If PEV j is detected by PEV i with low confidence level c o n f i j , the weight a i j in communication network is decreased. The protocol (18) implies that the decreased weight a i j mitigates the effects of PEV j’s abnormal individual price information on the entire system. As a consequence, the spread speed of the negative effect caused by the potential misbehaving PEV is restrained.
Although the individual electricity prices of the remaining well-behaving PEVs converge to p ^ t c o m = 1 | V ˜ | i V ˜ p ^ i t ( l 0 ) under the protocol (18), the convergent value p ^ t c o m may be not the desired one p ^ t = 1 | V ˜ | i V ˜ p ^ i t ( 0 ) given in (11) which is required by distributed PEV charging coordination. The reason is that the misbehaving PEVs are not fully isolated in the iteration interval [ 0 , l 0 ) , and the contribution of them has already affected the average consensus computation. Therefore, a rollback recovery mechanism should be introduced to set p ^ i t ( l 0 ) = p ^ i t ( 0 ) for each well-behaving PEVs i ( i V ˜ ) in order to restore the average common price p ^ t c o m to the desired value p ^ t . The implementation of recovery mechanism requires each PEV i to save its own initial individual electricity price p ^ i t ( 0 ) . When the misbehaving PEV is isolated, the current individual price of each remaining PEV i is replaced by the saved initial one p ^ i t ( 0 ) and the resilient distributed consensus protocol is resumed.
Integrating the above steps of detection, isolation, updating and recovery, the resilient distributed consensus protocol of PEVs’ individual electricity prices is given in the following Algorithm 2.    
Algorithm 2: Resilient distributed consensus protocol of PEVs’ individual electricity price.
  • Specify the aggregate inelastic base demand d = ( d t , t T ) , total number of the remaining well-behaving PEVs n ˜ , time horizon T and parameter η , μ and ξ ;
  • Define the allowable deviation ϵ s t o p to terminate iterations;
  • Specify the thresholds θ and Θ ;
  • Specify the common electricity price p ˜ = ( p ˜ t , t T ) and the corresponding optimal charging profile u ˜ i ( p ˜ ) = ( u ˜ i t ( p ˜ ) , t T ) ;
  • Initialize ϵ > ϵ s t o p and l = 0 ;
  • Initialize the initial individual electricity price p ^ i ( 0 ) = ( p ^ i t ( 0 ) , t T ) for each PEV i V ˜ and t T as p ^ i t ( 0 ) = p ˜ t + η c ( d t + n ˜ · u ˜ i t ( p ˜ ) ) p ˜ t ;
  • WHILE ϵ > ϵ s t o p
    -
    Update the total number of verifiable correct price H i j ( l ) using (15);
    -
    Update the confidence level c o n f i j ( l ) using (16);
    -
    IF c o n f i j ( l ) < Θ , THEN
    Isolate PEV j from the communication network and disconnect it physically from the PEV charging system;
    Replace the current price of the remaining PEVs by the initial value such that p ^ i t ( l ) = p ^ i t ( 0 ) for each i;
    -
    END IF
    -
    Update the weight a i j ( l ) of edge ( j , i ) using (17);
    -
    Calculate the weight a i i ( l ) = 1 j i a i j ( l ) ;
    -
    Update the individual electricity price p ^ i ( l ) = ( p ^ i t ( l ) , t T ) by executing (18) at each remaining PEV i and time t T ;
    -
    Update ϵ = max i { p ^ i ( l + 1 ) p ^ i ( l ) 1 } ;
    -
    Update l = l + 1 ;
  • END WHILE
  • Specify the common price p ^ = p ^ i ( l ) .

4.4. Resilient Distributed PEVs Charging Coordination

Algorithm 3 represents the resilient distributed coordination of PEV charging considering cyber-attack based on the consensus protocol shown in Algorithm 2. Since Algorithm 2 can drive the common electricity price to the average value of all remaining well-behaving PEVs’ initial individual electricity prices as illustrated in Theorem 1, the following main theorem can be obtained obviously and the proof is omitted. The flowchart of the proposed resilient distributed coordinated charging scheme containing Algorithm 2 and 3 is shown in Figure 5.
Theorem 2.
Supposing the positive constant η satisfies | 1 η | + 2 n κ ν η < 1 and the remaining communication network is connected, Algorithm 3 guarantees the optimal charging strategy u i = ( u i t , t T ) for each remaining well-behaving PEV i even under cyber-attack, which is the solution of optimization problem (7).
Algorithm 3: Resilient distributed coordination of PEV charging considering cyber-attack.
  • Specify the aggregate inelastic base demand d = ( d t , t T ) , total number of PEVs n, time horizon T and parameter η ;
  • Define the allowable deviation ε s t o p to terminate iterations;
  • Initialize the initial common electricity price p 0 = ( p t 0 , t T ) , ε > ε s t o p and m = 0 ;
  • WHILE ε > ε s t o p
    -
    Determine the charging profile u i m + 1 w.r.t. p m for all PEVs simultaneously by minimizing the individual cost function
    u i m + 1 ( p m ) = arg min u i U i t T p t m u i t v i ( u i )
    -
    Specify the price p ˜ = p m and the corresponding charging profile u ˜ i ( p ˜ ) = u i m + 1 ( p m ) , and input p ˜ and u ˜ i ( p ˜ ) into Algorithm 2;
    -
    Determine the common electricity price p m + 1 by the output of Algorithm 2 such that p m + 1 = p ^ ;
    -
    Update ε = p m + 1 p m 1 ;
    -
    Update m = m + 1 ;
  • END WHILE
  • Specify the optimal charging strategy as u i = u i m for the remaining well-behaving PEV i.

5. Simulation

This section verifies the effectiveness of Algorithm 3 by numerical simulation of five PEVs with the communication network shown in Figure 1, where the issue of cyber-attack is considered. The generation cost function c ( y t ) , individual local cost function g i t ( u i t ) , aggregate inelastic based demand d , energy capacity Γ i and weight fact δ i in (4) are the same with those in the case application given in Section 3. The parameter η = 1 in Algorithm 3 to satisfy | 1 η | + 2 n κ ν η < 1 where n = 5 , κ = 5.8 × 10 4 and ν = 166.7 calculated from the above given functions. The parameters satisfy μ = 0.5 in (16) and ξ = 2 in (17). The allowable deviations are set as ε s t o p = 0.001 and ϵ s t o p = 0.002 , and the thresholds are selected as θ = 0.1 and Θ = 0.25 respectively.

5.1. Response under Replay Attack

In this scenario PEV 2 suffered from replay attack with the replay fake electricity price p ^ t r e p l a y = $ 0.9 /kWh, which is the same with that in the case application of Section 3. Figure 6 illustrates the evolution of weight a i j ( l ) in each edge ( j , i ) in communication network under the execution of Algorithm 3, where only the weights of six edges were displayed instead of all 12 edges since a i j ( l ) = a j i ( l ) . It should be mentioned that the weights of edges connected to PEV 2 decreased and these weights finally achieved 0 at the 13th step of iteration shown in Figure 6. This demonstrates that the misbehaving PEV 2 was detected to be attacked and then it was isolated from the communication network under Algorithm 3, which prevented it from negatively affecting the other PEVs.
Figure 7 shows that the common electricity price could still be adjusted adaptively with respect to charging profile under Algorithm 3 even under replay attack, which is different to the result shown in Figure 4b where the price was fixed by the fake replay signal $ 0.9 /kWh under Algorithm 1. This implies that each PEV could obtain its own optimal charging strategy according to the dynamical common price under Algorithm 3 as shown in the evolution of SoC illustrated in Figure 8, and it is different to the constant power charging strategy under Algorithm 1 shown in Figure 3b where the economy was destroyed under replay attack. The aggregate demand under Algorithm 3 is given by Figure 9, and it can be obtained that the system cost function satisfied J ( u r ) = $ 177.82 /day where the optimal charging strategy u r is given by Algorithm 3. Algorithm 3 saved the total cost J ( u a ) J ( u r ) = $ 31.84 /day compared with Algorithm 1 under replay attack. Moreover, the charging strategy for four PEVs calculated under Algorithm 1 without replay attack was the same as shown in Figure 8. This further demonstrates that the optimal charging strategy can be realized for Algorithm 3 after the isolation of misbehaving PEV 2.

5.2. Response under Random Attack

In this scenario, PEV 4 suffered from random attack so that it could randomly set its individual electricity price p ^ 4 t ( l ) which was a random number satisfying the normal distribution N ( 0.1 , 0.03 ) at each iteration l. Because of the stochastic behavior of p ^ 4 t ( l ) , the simulation result indicated that it always had ϵ > ϵ s t o p for any step of iteration under Algorithm 1. This implies that the convergent common price within acceptable deviation range could not be obtained and it led to the failure of Algorithm 1. Algorithm 1 fell into in an endless loop under random attack and the optimal charging strategy could not be acquired. On the other hand, the simulation result for Algorithm 3 under this random attack was the same as those shown in Figure 7, Figure 8 and Figure 9, and the evolution of edge weights is given in Figure 10. This illustrates that the weights of edges connecting to the misbehaving PEV 4 achieved 0 at the 9th step of iteration, and PEV 4 was detected to be under attack and finally isolated by Algorithm 3. Moreover, the remaining well-behaving four PEVs obtained the optimal charging strategy. It verified the effectiveness of the proposed resilient distributed PEV charging coordination scheme Algorithm 3 under random attack.

6. Conclusions

The resilient distributed PEV charging coordination in the presence of cyber-attack is studied in this paper, where the trade-off between total generation cost and local cost associated with overloading and battery degradation is considered. The cyber-attack tampers the individual electricity price by injecting unauthorized attack data to exert its negative influence. In order to resist the cyber-attack, a novel type of resilient charging coordination scheduling method is constructed which contains the steps of detection, isolation, updating and recovery. It is proved theoretically that the misbehaving PEVs under cyber-attack are gradually marginalized and finally isolated according to its real-time updated confidence level, and the remaining well-behaving PEVs obtain their optimal charging strategy to minimize the total system cost in distributed architecture. The simulation result confirms the effectiveness of theoretical method.
Some of the future directions of the present research are given as follows. (i) The unified cooperative optimal dispatch between charging of PEVs and power generation of microgrids cluster can be explored; (ii) The cyber-attack with stealthy characteristic which can cheat the attack detection mechanism should be studied in the PEV charging coordination; (iii) The proposed resilient scheduling framework can be extended considering the discharging behavior of PEV where the energy storage function of PEV is taken into account. These research directions will be considered in our future works.

Author Contributions

S.W. studied the methodology and implemented the experimental simulation. Y.L. and X.D. formulated the PEV charging model and scheduling objective. All authors have read and agreed to the published version of the manuscript.

Funding

This work was sponsored by the Science and Technology Project of NARI Technology Co. Ltd. “Research on key technologies for simulation and evaluation of comprehensive energy systems” (2019out129), Project funded by China Postdoctoral Science Foundation (2018M642294) and Jiangsu Planned Projects for Postdoctoral Research Funds (2018K006A).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chan, C.C. The state of the art of electric, hybrid, and fuel cell vehicles. Proc. IEEE 2007, 95, 704–718. [Google Scholar] [CrossRef]
  2. Iqbal, S.; Xin, A.; Jan, M.U.; Salman, S.; Zaki, A.M.; Rehman, H.U.; Shinwari, M.F.; Abdelbaky, M.A. V2G Strategy for Primary Frequency Control of an Industrial Microgrid Considering the Charging Station Operator. Electronics 2020, 9, 549. [Google Scholar] [CrossRef] [Green Version]
  3. Lü, X.; Wu, Y.; Lian, J.; Zhang, Y.; Chen, C.; Wang, P.; Meng, L. Energy management of hybrid electric vehicles: A review of energy optimization of fuel cell hybrid power system based on genetic algorithm. Energy Convers. Manag. 2020, 205, 112474. [Google Scholar] [CrossRef]
  4. Karmaker, A.K.; Hossain, M.A.; Manoj Kumar, N.; Jagadeesan, V.; Jayakumar, A.; Ray, B. Analysis of Using Biogas Resources for Electric Vehicle Charging in Bangladesh: A Techno-Economic-Environmental Perspective. Sustainability 2020, 12, 2579. [Google Scholar] [CrossRef] [Green Version]
  5. Hadley, S.W.; Tsvetkova, A.A. Potential impacts of plug-in hybrid electric vehicles on regional power generation. Electr. J. 2009, 22, 56–68. [Google Scholar] [CrossRef] [Green Version]
  6. Fernandez, L.P.; San Román, T.G.; Cossent, R.; Domingo, C.M.; Frias, P. Assessment of the impact of plug-in electric vehicles on distribution networks. IEEE Trans. Power Syst. 2010, 26, 206–213. [Google Scholar] [CrossRef]
  7. Hermans, R.; Almassalkhi, M.; Hiskens, I. Incentive-based coordinated charging control of plug-in electric vehicles at the distribution-transformer level. In Proceedings of the 2012 American Control Conference (ACC), Montreal, QC, USA, 27–29 June 2012; pp. 264–269. [Google Scholar]
  8. Wu, D.; Aliprantis, D.C.; Ying, L. Load Scheduling and Dispatch for Aggregators of Plug-In Electric Vehicles. IEEE Trans. Smart Grid 2012, 3, 368–376. [Google Scholar] [CrossRef]
  9. Han, S.; Han, S.; Sezaki, K. Development of an optimal vehicle-to-grid aggregator for frequency regulation. IEEE Trans. Smart Grid 2010, 1, 65–72. [Google Scholar]
  10. Clement-Nyns, K.; Haesen, E.; Driesen, J. The Impact of Charging Plug-In Hybrid Electric Vehicles on a Residential Distribution Grid. IEEE Trans. Power Syst. 2010, 25, 371–380. [Google Scholar] [CrossRef] [Green Version]
  11. Amjad, M.; Ahmad, A.; Rehmani, M.H.; Umer, T. A review of EVs charging: From the perspective of energy optimization, optimization approaches, and charging techniques. Transp. Res. Part D Transp. Environ. 2018, 62, 386–417. [Google Scholar] [CrossRef]
  12. Rahbari-Asr, N.; Chow, M.Y. Cooperative Distributed Demand Management for Community Charging of PHEV/PEVs Based on KKT Conditions and Consensus Networks. IEEE Trans. Ind. Inform. 2014, 10, 1907–1916. [Google Scholar] [CrossRef]
  13. Zeraati, M.; Golshan, M.E.H.; Guerrero, J.M. A consensus-based cooperative control of PEV battery and PV active power curtailment for voltage regulation in distribution networks. IEEE Trans. Smart Grid 2017, 10, 670–680. [Google Scholar] [CrossRef] [Green Version]
  14. Rahbari-Asr, N.; Chow, M.Y.; Chen, J.; Deng, R. Distributed real-time pricing control for large-scale unidirectional V2G with multiple energy suppliers. IEEE Trans. Ind. Inform. 2016, 12, 1953–1962. [Google Scholar] [CrossRef]
  15. Zou, S.; Hiskens, I.; Ma, Z.; Liu, X. Consensus-Based Coordination of Electric Vehicle Charging. IFAC-PapersOnLine 2017, 50, 8881–8887. [Google Scholar] [CrossRef]
  16. Zou, S.; Hiskens, I.; Ma, Z. Consensus-based coordination of electric vehicle charging considering transformer hierarchy. Control Engineering Practice 2018, 80, 138–145. [Google Scholar] [CrossRef]
  17. Mousavian, S.; Erol-Kantarci, M.; Wu, L.; Ortmeyer, T. A risk-based optimization model for electric vehicle infrastructure response to cyber attacks. IEEE Trans. Smart Grid 2017, 9, 6160–6169. [Google Scholar] [CrossRef]
  18. Chhaya, L.; Sharma, P.; Bhagwatikar, G.; Kumar, A. Wireless sensor network based smart grid communications: Cyber attacks, intrusion detection system and topology control. Electronics 2017, 6, 5. [Google Scholar] [CrossRef]
  19. Niyato, D.; Hoang, D.T.; Wang, P.; Han, Z. Cyber insurance for plug-in electric vehicle charging in vehicle-to-grid systems. IEEE Netw. 2017, 31, 38–46. [Google Scholar] [CrossRef]
  20. Reeh, D.; Tapia, F.C.; Chung, Y.W.; Khaki, B.; Chu, C.; Gadh, R. Vulnerability Analysis and Risk Assessment of EV Charging System under Cyber-Physical Threats. In Proceedings of the 2019 IEEE Transportation Electrification Conference and Expo (ITEC), Jeju, Korea, 8–10 May 2019; pp. 1–6. [Google Scholar]
  21. Zhang, Z.; Yuan, W.; You, F. Power allocation of jamming attackers against PEV charging stations: A game theoretical approach. In Proceedings of the 2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR), Fukuoka, Japan, 13–15 November 2015; pp. 111–116. [Google Scholar]
  22. Dey, S.; Khanra, M. Cybersecurity of Plug-in Electric Vehicles: Cyber Attack Detection During Charging. IEEE Trans. Ind. Electron. 2020. [Google Scholar] [CrossRef]
  23. Li, Y.; Wang, R.; Wang, P.; Niyato, D.; Saad, W.; Han, Z. Resilient PHEV charging policies under price information attacks. In Proceedings of the 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm), Tainan, Taiwan, 5–8 November 2012; pp. 389–394. [Google Scholar]
  24. Ma, Z.; Zou, S.; Ran, L.; Shi, X.; Hiskens, I.A. Efficient decentralized coordination of large-scale plug-in electric vehicle charging. Automatica 2016, 69, 35–47. [Google Scholar] [CrossRef]
  25. Bompard, E.; Ma, Y.; Napoli, R.; Abrate, G. The demand elasticity impacts on the strategic bidding behavior of the electricity producers. IEEE Trans. Power Syst. 2007, 22, 188–197. [Google Scholar] [CrossRef]
  26. Gountis, V.P.; Bakirtzis, A.G. Bidding strategies for electricity producers in a competitive electricity marketplace. IEEE Trans. Power Syst. 2004, 19, 356–365. [Google Scholar] [CrossRef]
  27. Liu, H.; Xie, G.; Wang, L. Necessary and sufficient conditions for containment control of networked multi-agent systems. Automatica 2012, 48, 1415–1422. [Google Scholar] [CrossRef]
  28. Franceschelli, M.; Egerstedt, M.; Giua, A. Motion probes for fault detection and recovery in networked control systems. In Proceedings of the 2008 American Control Conference, Seattle, WA, USA, 11–13 June 2008; pp. 4358–4363. [Google Scholar]
  29. Moreau, L. Stability of multiagent systems with time-dependent communication links. IEEE Trans. Autom. Control 2005, 50, 169–182. [Google Scholar] [CrossRef]
  30. Olfati-Saber, R.; Murray, R.M. Consensus problems in networks of agents with switching topology and time-delays. IEEE Trans. Autom. Control 2004, 49, 1520–1533. [Google Scholar] [CrossRef] [Green Version]
  31. Kia, S.S.; Van Scoy, B.; Cortes, J.; Freeman, R.A.; Lynch, K.M.; Martinez, S. Tutorial on dynamic average consensus: The problem, its applications, and the algorithms. IEEE Control Syst. Mag. 2019, 39, 40–72. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Communication topology of five plug-in electric vehicles (PEVs).
Figure 1. Communication topology of five plug-in electric vehicles (PEVs).
Electronics 09 00770 g001
Figure 2. Aggregate demand for Algorithm 1. (a) Without replay attack; (b) under replay attack.
Figure 2. Aggregate demand for Algorithm 1. (a) Without replay attack; (b) under replay attack.
Electronics 09 00770 g002
Figure 3. Evolution of the PEV’s state-of-charge (SoC) for Algorithm 1. (a) Without replay attack; (b) under replay attack.
Figure 3. Evolution of the PEV’s state-of-charge (SoC) for Algorithm 1. (a) Without replay attack; (b) under replay attack.
Electronics 09 00770 g003
Figure 4. Common electricity price updates for Algorithm 1. (a) Without replay attack; (b) under replay attack.
Figure 4. Common electricity price updates for Algorithm 1. (a) Without replay attack; (b) under replay attack.
Electronics 09 00770 g004
Figure 5. The flowchart of resilient distributed coordination of PEV charging.
Figure 5. The flowchart of resilient distributed coordination of PEV charging.
Electronics 09 00770 g005
Figure 6. Edge weights update for Algorithm 3 under replay attack.
Figure 6. Edge weights update for Algorithm 3 under replay attack.
Electronics 09 00770 g006
Figure 7. Common electricity price updates for Algorithm 3 under replay attack or random attack.
Figure 7. Common electricity price updates for Algorithm 3 under replay attack or random attack.
Electronics 09 00770 g007
Figure 8. Evolution of the PEV’s SoC for Algorithm 3 under replay attack or random attack.
Figure 8. Evolution of the PEV’s SoC for Algorithm 3 under replay attack or random attack.
Electronics 09 00770 g008
Figure 9. Aggregate demand for Algorithm 3 under replay attack or random attack.
Figure 9. Aggregate demand for Algorithm 3 under replay attack or random attack.
Electronics 09 00770 g009
Figure 10. Edge weights update for Algorithm 3 under random attack.
Figure 10. Edge weights update for Algorithm 3 under random attack.
Electronics 09 00770 g010

Share and Cite

MDPI and ACS Style

Weng, S.; Li, Y.; Ding, X. Resilient Distributed Coordination of Plug-In Electric Vehicles Charging under Cyber-Attack. Electronics 2020, 9, 770. https://doi.org/10.3390/electronics9050770

AMA Style

Weng S, Li Y, Ding X. Resilient Distributed Coordination of Plug-In Electric Vehicles Charging under Cyber-Attack. Electronics. 2020; 9(5):770. https://doi.org/10.3390/electronics9050770

Chicago/Turabian Style

Weng, Shengxuan, Yanman Li, and Xiaohua Ding. 2020. "Resilient Distributed Coordination of Plug-In Electric Vehicles Charging under Cyber-Attack" Electronics 9, no. 5: 770. https://doi.org/10.3390/electronics9050770

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop