Applications of Bilevel Mixed-Integer Programming to Power Systems - - PowerPoint PPT Presentation
Applications of Bilevel Mixed-Integer Programming to Power Systems - - PowerPoint PPT Presentation
Applications of Bilevel Mixed-Integer Programming to Power Systems Resilience Devendra Shelar Joint work with Saurabh Amin and Ian Hiskens January 19, 2018 Outline Motivation Modeling Network model Generalized disruption model
Outline
- Motivation
- Modeling
- Network model
- Generalized disruption model
- Multi-regime System Operator (defender) model
- Grid-connected, cascade, islanding
- Bilevel formulation
- Benders decomposition
- Resource dispatch
- Controllable DGs, islanding capabilities
- Trilevel formulation β solution approach
2
Cyberphysical disruptions
Hurricane Maria (September 2017)
- Customers facing
blackouts for months
3
Metcalf Substation (April 2013)
- Sniper attack on 17
transformers
- Telecommunication cables cut
- 15 million $ worth of damage
- 100 mn $ for security upgrades
Ukraine attack (Dec 2015- 2016)
- First ever blackouts
caused by hackers
- Controllers damaged for
months
Attack scenarios
8
=> supply-demand imbalance (sudden / prolonged)
Three regimes of SO operation
Distribution substation π
" #, π " #
π
" #
π
" ', π " '
π
" '
Transmission network βΞπ TN level disturbance Attack-induced DN level supply-demand imbalance SO response DER disconnect -- cascade load disconnect Microgrid islanding
When TN and DN level disturbances clear, the system can return to its nominal regime
5
Grid-connected regime
- Can absorb the impact of
disturbances Islanding mode regime
- Larger disturbances may
force microgrid islanding Cascade regime
- High severity voltage
excursions, then more DER disconnects (cascades), more load shedding
Our approach
Most attacker-defender interactions can be modeled as
- Supply-demand imbalance induced by attacker
- Control (reactive and proactive) by the system operator
- Abstraction: Bilevel (or multilevel) optimization problems
- Flexible to allow for both continuous and discrete variables
- Good solution approaches: Duality, KKT conditions, Benders cut, MILP
- Provide practically useful insights to determine critical scenarios
- Supplements simulation based approaches
- For example, co-simulation of cyber and power simulators
Our contributions
Bilevel problem Regime?
7
[1] Shelar D. and Amin. S - "Security assessment of electricity distribution networks under DER node compromisesβ [2] Shelar D., Amin. S and Hiskens I. β βTowards Resilience-Aware Resource Allocation and Dispatch in Electricity Distribution Networksβ [3] Shelar D., Sun P., Amin. S and Zonouz S. - βCompromising Security of Economic Dispatch softwareβ
Attacker model Regulation objectives Defender model Grid-Connected regime Cascade / Islanding regimes DER disruptions
- Greedy Approach
- IEEE TCNS 2016 [1]
DN vulnerability to simultaneous EV
- vercharging [2]
Security of Economic Dispatch
- KKT based reformulation
- DSN 2017 [3]
Multiple regimes
- Inner problem: mixed-integer vars
- Benders decomposition
Related Work (partial)
(T1) Interdiction and cascading failure analysis of power grids
- R. Baldick, K. Wood, D. Bienstock: Network Interdiction, Cascades
- A. Verma, D. Bienstock: N-k vulnerability problem
- D. Papageorgiou, R. Alvarez, et al.: Power network defense
- X. Wu, A. Conejo: Grid Defense Planning
(T2) Cyber-physical security of networked control systems
- E. Bitar, K. Poolla, A Giani: Data integrity, Observability
- H. Sandberg, K. Johansson: Secure control, networked control
- B. Sinopoli, J. Hespanha: Secure estimation and diagnosis
- T. Basar, C. Langbort: Network security games
8
Network model
Power flow on tree networks - Baran and Wu model (1989):
- π£ = (πͺ, β°)β tree network of nodes and edges
- ππ2,ππ2 - real and reactive nominal power demand at node π
- ππ2, ππ2 - real and reactive nominal power from uncontrollable generation at node π
- π
2 - voltage magnitude at node π
- z28 = r28 + π€x28 - impedance on line (π,π)
- π
28, π 28 - real and reactive power from node π to node π
- π2, π2 - net real and reactive power consumed at node π
9
Generalized disruption model
Attacker strategy: π = π, ππA,ππA, Ξπ
"
- π: attack vector, with π2 = 1 if node π is attacked and 0 otherwise
- Satisfy β π2
2
β€ π (attackerβs resource budget)
- ππ2
A, ππ2 A - attackerβs active/reactive power disturbance at node π
(general model: captures various attack scenarios)
- Ξπ
": voltage drop at substation node
- Due to physical disturbance or temporary fault in the TN
Attacker strategy:
- Which nodes to compromise?
- What set-points to choose?
10
Defender model: Grid-connected regime
Defender response: π = πΎ
- πΎ2 β πΎ2,1 : load control parameter at node π
- ππ2 = πΎ2 ππ2, ππ2 = πΎ2 ππ2
Defender response: How much load control should be exercised?
11
ππ2,ππ2 - nominal power demand at node π
Defender model: Cascade regime
Defender response: π = πΎ, ππ, ππ
- ππ2 = 0 if load is connected, 1 otherwise.
- ππ2 = 0 if uncontrolled DG is connected, 1 otherwise.
- Voltage constraints for connectivity:
ππ2 = 0 βΉ π
2 β π '2,π '
L 2 ππ2 = 0 βΉ π
2 β π M 2
, π
M
L
2
Defender response: Which loads and DGs to disconnect?
12
voltage bounds for load (resp. generation) connectivity
Defender model: Islanding regime
Defender response: π = πΎ, ππ, ππ, ππ , ππ , ππ
- ππ , ππ - dispatch of resources (DERs)
- ππ28 = 1, if line π, π β π is open, 0 otherwise.
- Microgrid formation affects power flows and voltages:
ππ28 = 1 βΉ Q π
28 = π 28 = 0
π
8 = πRST
ππ28 = 0 βΉ ππ
8 = 0, ππ 8 = 0
Defender response: Which lines to disconnect?
13
π - set of lines which can be disconnected to form microgrids
Power flow constraints before disruption
- Net power consumed at a node
- Linear Power flows (LPF)
- Voltage drop equation
14
π
28 = U π 8V V:8βV
+ π2 π 28 = U π 8V
V:8βV
+ π2 π
8 = π 2 β (r28π 28 + x28π 28)
π2 = ππ2 β ππ2 π2 = ππ2 β ππ2 π
" = π " RST
Power flow constraints after disruption
- Net power consumed at a node
- Linear Power flows (LPF)
- Voltage drop equation
15
π
28 = U π 8V V:8βV
+ π2 π 28 = U π 8V
V:8βV
+ π2 π
8 = π 2 β (r28π 28 + x28π 28)
π2 = ππ2 β ππ2 + π2ππA2
β
π2 = ππ2 β ππ2 + π2ππA2
β
π
" = π " RST β Ξπ "
Power flow constraints after SO dispatch
- Net power consumed at a node
- Linear Power flows (LPF)
- Voltage drop equation
16
π
28 = U π 8V V:8βV
+ π2 π 28 = U π 8V
V:8βV
+ π2 π
8 = π 2 β (r28π 28 + x28π 28)
π2 = ππ2 β ππ2 + π2ππA2
β β ππ 2
π2 = ππ2 β ππ2 + π2ππA2
β β ππ 2
π
" = π " #YZ β Ξπ "
Losses
Cost of active power supply : Loss of voltage regulation : where π’2 β₯ π
2 β πRST
Cost incurred due to load control : Loss in Grid-Connected regime :
17
π^_ π¦ β‘ π
cdπ "
πef π¦ β‘ π
ef Uπ’2 2βg
, πh_ π¦ β‘ U π
h_,2(1 β πΎ2) 2βg
πid jkM2Zk π¦ = π^_ π¦ + πef π¦ + πh_(π¦)
Attacker-Defender problem [AD] - Bilevel formulation
AD β βΆ= max
Aβπ min wβπ πy_ z{|}T{ π¦ π, π
- Powerflows, DER capabilities, voltage bounds
- Defender model (resources and capabilities)
- Attacker model (resources and capabilities)
18
System State π¦ = (π, π, π, π , π)
Attacker-Defender problem [AD] β Cascade regime
AD β βΆ= max
Aβπ min wβπ π_~ z{|}T{ π¦ π, π
- Powerflows, DER capabilities, voltage bounds
- Defender model (resources and capabilities)
- Attacker model (resources and capabilities)
19
Where π_~ z{|}T{ π¦ β‘ πy_ z{|}T{ π¦ + π~β’ π¦
- Cost of load shedding
π~β’ π¦ β‘ U π
~β’,2 ππ2 2βπͺ
- π
~β’,2 : cost of unit load shedding
Attacker-Defender problem [AD] β Islanding regime
AD β βΆ= max
Aβπ min wβπ πβ¬β’ z{|}T{ π¦ π, π
- Powerflows, DER capabilities, voltage bounds
- Defender model (resources and capabilities)
- Attacker model (resources and capabilities)
20
Where πβ¬β’ z{|}T{ π¦ β‘ πy_ z{|}T{ π¦ + πβ¬y π¦
- Cost of microgrid islanding
πβ¬y π¦ β‘ U π
β¬y,28 ππ28 (2,8)ββ
- π
β¬y,28 : cost of a single microgrid island formation at node π
Benders cut approach
2 5 6 7 8 12 11 9 1 3 4 10
21
Computational results for Cascade regime
22
ππAβ π‘π L
Load shedding vs
ββ¦ ββ
23
No response - (multi-round) cascade
Worst-case loss under no defender response An algorithm
- Initial contingency
- For r = 1,2,β¦
- Compute new power flows
- Determine a single loads or DG that maximally violates its voltage bounds
- Disconnect that device accordingly
24
Online vs Sequential vs Islanding
25
Value of timely disconnections Value of timely Islanding
Defender Response and Allocation: Diversification
- Some DERs contribute
to πefmore than π^_, and vice versa
26
2 5 6 7 8 12 11 9 1 3 4 10
Left lateral (l) AC > V R Right lateral (r) V R > AC Attacked nodes
Special case of π = 0,1
Defender Response and Allocation: Diversification
- Diversification holds for
βheterogeneous allocationβ with downstream DERs with more reactive power
27
2 5 6 7 8 12 11 9 1 3 4 10
Left lateral (l) AC > V R Right lateral (r) V R > AC Attacked nodes
- Post-contingency losses
are the same for uniform vs. heterogeneous resource allocations
- Pre-contingency voltage
profile is better for heterogeneous resource allocation Heterogeneous resource allocation can support more loads than uniform one.
Defender Response and Allocation: Diversification
28
2 5 6 7 8 12 11 9 1 3 4 10
Left lateral (l) AC > V R Right lateral (r) V R > AC Attacked nodes
Big picture: Where does it all fit?
min
jββ π·Aβ°β°Y' π¦Y π
+ max
Aβπ min wβπ π π¦' π , π, π
- Powerflows, DER capabilities, voltage bounds
- Defender model (resources and capabilities)
- Attacker model (resources and capabilities)
Resilience-Aware Optimal Power Flow (RAOPF)
29
Voltage deviation model π#YZ β π
" ' = βπjkM π " Y β π " '
Frequency deviation model π#YZ β π' = βπjkM π "
Y β π " '
Pre-contingency resource allocation π = (ππ Y, ππ Y)
30
Resiliency-Aware OPF - Trilevel formulation
Final example: DN resiliency is indeed important
31
DN 1 DN 2 DN 3 DN 4
60 MW 60 MW 60 MW 60 MW
π»Ε π»β’
240 MW 120 MW DN 1 DN 2 DN 3 DN 4
60 MW 60 MW 60 MW 60 MW
π»Ε π»β’
120 MW 120 MW 0 MW
π
- = 80 MW
π
Ε = 80 MW
DN 1 DN 2 DN 3 DN 4
30 MW 30 MW 30 MW 30 MW
π»Ε π»β’
40 MW 80 MW
- Normal operating scenario
- Lightning strikes - recloser opens temporarily
- Voltage drops at the DN substations
- Microgrid islanding reduces net load
- Infeasible power flow in TN
Summary
- Resource allocation and dispatch in electricity DNs
- under strategic cyber-physical failures
- trilevel mixed-integer formulation
- Multi-regime defender response
- Application of Benders cut approach for solving bilevel MILPs
- Structural results on worst-case attacks and tradeoffs for defender response
Future work
- Design of decentralized defender response using message passing
- Power restoration over multiple time periods
32
Optimal attacker set-points
Typically,
- Small line losses: in comparison to power flows
- Small impedances: sufficiently small line resistances
Assume for simplicity:
- No reverse power flows: power flows from substation
to downstream
33
What are optimal attacker set-points? Proposition: For a defender action π, and given attacker choice of π, the optimal attacker disturbance is given by: ππAβ = ππ2
Y, ππAβ = ππ2 Y + πππ (in case of attack on DERs)
ππAβ = πππ2
Y, ππAβ = πππ2 Y (in case of attack on EVs)
Benders cut approach
Proposition (Bienstock 2009) Optimal value attack problem for a fixed attack cardinality is equivalent to a minimum cardinality attack problem for a fixed target loss value.
34
Benders cut approach
Attacker Master problem
- Initialize with no cuts
min Uπ2
2
- s. t. cuts
π2 β {0,1}
Defender problem min
wβπ π(π¦)
s.t.
- Powerflows, DER capabilities, voltage bounds
- Defender model (resources and capabilities)
Optimal value attack problem for a fixed attack cardinality is equivalent to a minimum cardinality attack problem for a fixed target loss value. πβ’AjMkβ’ : minimum loss that the attacker wants to inflict upon the defender
35
Benders cut
- Let π2β’kj be fixed attacker strategy for current iteration
- Let πΕΎ (resp. πd) denote a defender response with fixed integer variables
- Then the inner problem becomes a linear program (LP)
min πΕΈπ§ π·π§ = π + π π2β’kj π‘. π’. π΅π§ β₯ π ππ π2β’kj, πΕΎ β‘
- Let (πβ, π½β) be the optimal dual variable solution to this LP
. Benders cut is given by : πβΕΈπ + π½βΕΈ π + π π β₯ πβ’AjMkβ’
- This cut eliminates π2β’kj from feasible space of attacker strategies
36
Controllable distributed generation model
pr qr qr
Reactive power Real power
Reactive power pr qr qr Real power sr
37
0 β€ ππ
2 β€ ππ 2,
ππ
2
- + ππ
2
- β€ π‘π
L2
- ππ 2 - maximum active power capacity
π‘π L2 - apparent power capability of inverter Polytopicmodel used for computational simplicity
Uncontrolled cascade vs Sequential
38
Value of timely response
N = 37 nodes
Microgrid island formation
2 5 6 7 8 12 11 9 1 3 4 10 2 5 6 7 8 12 11 9 1 3 4 10 2 5 6 7 8 12 11 9 1 3 4 10
- π =
0,1 , 4,5 , 4,9
- 3 out of 8 = 2 β possible configurations β 13 node network
39
Linear power flows after dispatch
π2 = ππ2 β ππ2 β ππ
2 + π2ππA2 β
π2 = ππ2 β ππ2 β ππ
2 + π2ππA2 β
Net power consumed at a node π Power flow on line π β π Voltage drop equations
40
π
" = π " Y β Ξπ
π
28 = U π 8V V:8βV
+ π2 π 28 = U π 8V
V:8βV
+ π2 π
8 = π 2 β (π 28π 28 + π¦28π 28)
Islanding regime (contβd)
Updated constraints
- An (emergency) distributed generator is started at node π in a microgrid island
ππ
8 β€ π‘π
L8 ππ28 ππ β€ π‘π L8 ππ28 Where ππ
8,ππ 8 is active and reactive power output; π‘π
L8 is the apparent power capability of the emergency generator at node π
- The net power flow into the node π from the substation is 0, i.e.
ππ28 = 1 βΉ π28 = π 28 = 0
- The nodal voltage at node π is the nominal voltage,
π
8 = Qπ 2 β π 28π 28 + π¦28π 28 ,
if ππ28 = 0 πRST,
- therwise.
41
Whatβs next?
42
- What is a good resiliency metric?
- Allowable Ξ π, π, π without exceeding target 20% π¡¢
- General case π > 1
- Diversification?
- Solution approach for RAOPF (trilevel)?
Resiliency-aware Resource Allocation
Stage II - Adversarial node disruptions
- a. Which nodes to compromise (π)?
- b. Set-point manipulation (π‘πA)?
Stage I - Allocation of DERs over radial networks
- a. Size and location
- b. Active and reactive power setpoints (π¦#)?
Stage III - Optimal dispatch / response (π¦')
- a. Maintain voltage
- b. Exercise load control or not
Goals:
- 1. Determine the best resource allocation
- 2. Identify vulnerable / critical nodes
- 3. Determine optimal dispatch post-contingency
43
Microgrid formation (contβd)
Updated constraints π2 = ππ2 β ππ2 β ππ
2 + π2ππA2 β β ππ2
π2 = ππ2 β ππ2 β ππ
2 + π2ππA2 β β ππ2
|π28| β€ π·ππ28 1 β ππ28 |π 28| β€ π·ππ28 1 β ππ28 |π8 β π#YZ| β€ 1 β ππ28 |π8 β π2 β 2 π
28π 28 + π¦28π 28
| β€ ππ28
- An emergency generator of microgrid is on only if it is in islanded state
ππ
8 β€ π‘π 8 ππ28
ππ
8 β€ π‘π 8 ππ28
44