张赟宁, 涂迅, 付文龙, 高以恒. 基于状态分解的综合能源系统完全分布式调度算法[J]. 电网技术, 2024, 48(12): 4928-4937. DOI: 10.13335/j.1000-3673.pst.2024.0662
引用本文: 张赟宁, 涂迅, 付文龙, 高以恒. 基于状态分解的综合能源系统完全分布式调度算法[J]. 电网技术, 2024, 48(12): 4928-4937. DOI: 10.13335/j.1000-3673.pst.2024.0662
ZHANG Yunning, TU Xun, FU Wenlong, GAO Yiheng. Fully Distributed Dispatch Algorithm for Integrated Energy System Based on State Decomposition[J]. Power System Technology, 2024, 48(12): 4928-4937. DOI: 10.13335/j.1000-3673.pst.2024.0662
Citation: ZHANG Yunning, TU Xun, FU Wenlong, GAO Yiheng. Fully Distributed Dispatch Algorithm for Integrated Energy System Based on State Decomposition[J]. Power System Technology, 2024, 48(12): 4928-4937. DOI: 10.13335/j.1000-3673.pst.2024.0662

基于状态分解的综合能源系统完全分布式调度算法

Fully Distributed Dispatch Algorithm for Integrated Energy System Based on State Decomposition

  • 摘要: 分布式调度因其鲁棒性和灵活性成为了综合能源系统(integrated energy system,IES)的新型调度策略。然而,分布式框架下的频繁信息交互会导致通信路径上的隐私信息被外部攻击者窃取,从而影响系统的最优运行状态。针对这一问题,该文首先将多智能体一致性理论引入分布式框架,给出了IES的协同经济方程,并考虑了两种典型的窃听者模型。其次,利用各个智能体的实时状态信息可进行拆分组合的思想,提出了一种基于状态分解的隐私保护分布式调度算法,并从理论上严格证明了所提出算法的收敛性和在窃听者攻击环境下的隐私保护能力。最后,基于IEEE39-32热电耦合能源系统进行算例分析,分别从理想通信环境、即插即用特性、与差分隐私应对窃听者的能力对比等几个不同的角度验证了该文所提出算法的可行性和优越性。

     

    Abstract: Distributed scheduling has become a novel dispatch strategy for integrated energy systems (IES) due to its robustness and flexibility. However, frequent information exchanges under a distributed framework can lead to the leakage of private information via communication pathways to external attackers, thereby affecting the optimal operational state of the system. This paper first introduces multi-agent consensus theory into the distributed framework to address this issue, presenting a collaborative economic equation for IES and considering two typical eavesdropping models. Secondly, using the concept of splitting and recombining the real-time status information of each agent, a privacy-preserving distributed dispatch algorithm based on state decomposition (PPDDASD) is proposed, and its convergence and the ability to protect privacy under an eavesdropping attack environment are rigorously proven theoretically. Finally, the feasibility and superiority of the proposed algorithm are validated from different perspectives, such as ideal communication environment, plug-and-play characteristics, and comparison with differential privacy to counter eavesdroppers, based on a case study of the IEEE39-32 thermoelectric coupled energy system.

     

/

返回文章
返回