تعداد نشریات | 44 |
تعداد شمارهها | 1,303 |
تعداد مقالات | 16,020 |
تعداد مشاهده مقاله | 52,490,333 |
تعداد دریافت فایل اصل مقاله | 15,217,690 |
A Cyber Secured optimal scheduling framework for AC microgrids based on dragonfly optimization and deep learning | ||
مجله مهندسی برق دانشگاه تبریز | ||
دوره 54، شماره 3 - شماره پیاپی 109، آذر 1403، صفحه 363-372 اصل مقاله (1.3 M) | ||
نوع مقاله: علمی-پژوهشی | ||
شناسه دیجیتال (DOI): 10.22034/tjee.2023.57914.4685 | ||
نویسندگان | ||
علی حیدری1؛ رضا اسلامی* 2 | ||
1دانشکده مهندسی برق دانشگاه صنعتی سهند تبریز | ||
2دانشکده مهندسی برق، دانشگاه صنعتی سهند تبریز، تبریز، ایران | ||
چکیده | ||
Smart grid is a cyber-physical system, a combination of physical devices and computational processes. Enhancing interaction between the cyber and physical layers is crucial for optimizing system operation, management, and security. Motivated by this, in this paper, a framework for solving the optimal scheduling of an AC-microgrid (ACMG) system, is presented. The optimal scheduling of the system is modelled as an optimization problem. Also, the dragonfly is utilized as a powerful optimization technique to solve the proposed optimization problem. On the other side, considering cyber-attacks as a great threat to the system which can cause disruption and outage in smart grids, a deep-learning-based method, long short-term memory (LSTM), along with the concept of prediction interval is utilized to develop a cyber-attack detection model for false data injection attacks on smart meters. In this structure, the optimization is carried out using dragonfly optimization. Also, the LSTM, which is a subset of recurrent neural networks, is designed. With an accuracy of 97%, this model can ensure the cyber-security of the structure. Furthermore, to demonstrate the excellence of the proposed method, it is compared to an Artificial Neural Network (ANN). As the results show, the deep learning LSTM approach outperforms the ANN method in terms of accuracy and cyber-security. The proposed cyber-attack detection model is first trained using historical data and then is used in real-time conditions. For investigating the effectiveness of the proposed approach, the modified IEEE 33-bus test system is utilized. The results significantly show the effectiveness of the proposed methodologies | ||
کلیدواژهها | ||
Optimal scheduling؛ False data injection attacks؛ AC microgrids؛ Dragonfly optimization technique؛ Practical swarm optimization | ||
مراجع | ||
[1] A. Kavousi-Fard, M. Mohammadi, and A. Al-Sumaiti, “Effective Strategies of Flexibility in Modern Distribution Systems: Reconfiguration, Renewable Sources and Plug-in Electric Vehicles, in Flexibility in Electric Power Distribution Networks”, CRC Press. p. 95-119, 2021. [2] M. Mobtahej, et al., “Effective demand response and GANs for optimal constraint unit commitment in solar‐tidal based microgrids”, IET Renewable Power Generation, 2021. [3] B. Papari, et al., “Effective energy management of hybrid AC–DC microgrids with storage devices”, IEEE transactions on smart grid, 10(1), pp. 193-203, 2017. [4] A. Baziar, and A. Kavousi-Fard, “Considering uncertainty in the optimal energy management of renewable micro-grids including storage devices”, Renewable Energy, 59, pp. 158-166, 2013. [5] X. Gong, et al., “A secured energy management architecture for smart hybrid microgrids considering PEM-fuel cell and electric vehicles”, IEEE Access, 8, pp. 47807-47823, 2020. [6] S. Z. Tajalli, et al., “DoS-resilient distributed optimal scheduling in a fog supporting IIoT-based smart microgrid”, IEEE Transactions on Industry Applications, 56(3), pp. 2968-2977, 2020. [7] M. Mohammadi, et al., “Effective management of energy internet in renewable hybrid microgrids: A secured data driven resilient architecture”, IEEE Transactions on Industrial Informatics, 18(3), pp. 1896-1904, 2021. [8] M. Lei, and M. Mohammadi, “Hybrid machine learning based energy policy and management in the renewable-based microgrids considering hybrid electric vehicle charging demand”, International Journal of Electrical Power & Energy Systems, 128, p. 106702, 2021. [9] M. Pourbehzadi, et al., “Optimal operation of hybrid AC/DC microgrids under uncertainty of renewable energy resources: A comprehensive review”, International journal of electrical power & energy systems, 109, pp. 139-159, 2019. [10] M. Pourbehzadi, et al. “Stochastic energy management in renewable-based microgrids under correlated environment”, IEEE International Conference on Environment and Electrical Engineering and 2020 IEEE Industrial and Commercial Power Systems Europe (EEEIC/I&CPS Europe), 2020, IEEE. [11] A. Kavousi-Fard, W. Su, and T. Jin, “A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids”, IEEE Transactions on Industrial Informatics, 17(1), pp. 650-658, 2020. [12] N. T. Mbungu, et al., “Overview of the optimal smart energy coordination for microgrid applications”, IEEE Access, 7, pp. 163063-163084, 2019. [13] M. Mohammadi, et al., “Reinforcing Data Integrity in Renewable Hybrid AC-DC Microgrids from Social-Economic Perspectives”, ACM Transactions on Sensor Networks, 2022. [14] S. Hussain, et al., “Electric theft detection in advanced metering infrastructure using Jaya optimized combined Kernel‐Tree boosting classifier—A novel sequentially executed supervised machine learning approach”, IET Generation, Transmission & Distribution, 16(6), pp. 1257-1275, 2022. [15] A. Darvish, S. Shamekhi, “A hybrid multi-scale CNN-LSTM deep learning model for the identification of protein-coding regions in DNA”, Tabriz Journal of Electrical Engineering, vol. 52, no. 2, pp. 137-146, 2022. [16] M. Vasou Jouybari, E. Ataie, M. Bastam, “An MLP-based Deep Learning Approach for Detecting DDoS Attacks”, Tabriz Journal of Electrical Engineering, vol. 52, no. 3, pp. 195-204, 2022. [17] Y. He, G. J. Mendis, and J. Wei, “Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism”, IEEE Transactions on Smart Grid, 8(5), pp. 2505-2516, 2017. [18] A. Kavousi-Fard, et al., “An effective anomaly detection model for securing communications in electric vehicles”, IEEE Transactions on Industry Applications, 2020. [19] T. Mehra, V. Dehalwar, and M. Kolhe, “Data communication security of advanced metering infrastructure in smart grid”, 5th International Conference and Computational Intelligence and Communication Networks, 2013, IEEE. [20] J. W. Ho, , M. Wright, and S. K. Das, “ZoneTrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing”, IEEE Transactions on Dependable and Secure Computing, 9(4), pp. 494-511, 2011. [21] A. Aflaki, et al., “A hybrid framework for detecting and eliminating cyber-attacks in power grids”, Energies, 14(18), p. 5823, 2021. [22] S. Mirjalili, “Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems”, Neural computing and applications, 27(4), pp. 1053-1073, 2016. [23] S. Hochreiter, and J. Schmidhuber, “Long short-term memory”, Neural computation, 9(8), pp. 1735-1780, 1997. [24] P. J. Werbos, “Backpropagation through time: what it does and how to do it”, Proceedings of the IEEE, 78(10), pp. 1550-1560, 1990. [25] T. Cheng, et al., “Stochastic energy management and scheduling of microgrids in correlated environment: A deep learning-oriented approach”, Sustainable Cities and Society, 69, p. 102856, 2021. [26] H. J. Sadaei, et al., “Short-term load forecasting by using a combined method of convolutional neural networks and fuzzy time series”, Energy, 175, pp. 365-377, 2019.
| ||
آمار تعداد مشاهده مقاله: 167 تعداد دریافت فایل اصل مقاله: 79 |