A Judicious Decision-Making Approach for Power Dispatch in Smart Grid Using a Multi-objective Evolutionary Algorithm Based on Decomposition

Chixin Xiao, Danny Sutanto, Kashem M. Muttaqi, Minjie Zhang
2019 IEEE transactions on industry applications  
© 1972-2012 IEEE. Multiobjective evolutionary algorithm based on decomposition (MOEA/D) is an efficient mathematical strategy for solving multiobjective optimization problems. However, the MOEA/D algorithm has not yet been widely used on the multiobjective optimal power flow (MOPF) problems, which consider several conflicting objectives with varying tradeoff levels. This article proposes a novel differential evolution (DE) strategy based on the MOEA/D framework to quickly determine a set of
more » ... mal solutions of MOPFs, in the objective space formed from the different objectives, such as the most optimal economic dispatch, the least environmental emission objectives, and the minimum transmission losses, while considering the power system constraints. A judicious decision can be made by the user from the set of optimal solutions of the MOPF associated with the weight vectors representing the tradeoff levels of the different objectives. For improved performance, two aggregate objective functions, a load flow operator and a self-adaptive DE strategy work cooperatively: 1) to improve the weak convergence of the MOEA/D and to achieve a better decision speed; 2) to obtain more accurate optimal solutions even under non-convex conditions; 3) to ensure that the power system constraints are taken into account; 4) to integrate the above features into a fast and efficient algorithm. The proposed algorithm has been validated using the IEEE 30-bus system and a revised 33-bus radial system added to one node of the 30-bus system. The simulation results show that the proposed algorithm can provide a good accuracy and can converge to a set of optimal solutions of the MOPFs. Disciplines Disciplines Engineering | Science and Technology Studies Abstract-The Information and Communication Technology (ICT) has been used in wide range of applications, such as smart living, smart health and smart transportation. Among all these applications, smart home is most popular, in which the users/residents can control the various smart sensor devices of home by using the ICT. However, the smart devices and users communicate over an insecure communication channel, i.e., the Internet. There might be the possibility of various types of attacks, such as smart device capture attack, user, gateway node and smart device impersonation attacks and privileged-insider attack on a smart home network. An illegal user, in this case, can gain access over data sent by the smart devices. Most of the existing schemes reported in the literature for the remote user authentication in smart home environment are not secure with respect to the above specified attacks. Thus, there is need to design a secure remote user authentication scheme for a smart home network so that only authorized users can have access to the smart devices. To mitigate the aforementioned isses, in this paper, we propose a new secure remote user authentication scheme for a smart home environment. The proposed scheme is efficient for resource-constrained smart devices with limited resources as it uses only one-way hash functions, bitwise XOR operations and symmetric encryptions/decryptions. The security of the scheme is proved using the rigorous formal security analysis under the widely-accepted Real-Or-Random (ROR) model. Moreover, the rigorous informal security analysis and formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. Finally, the practical demonstration of the proposed scheme is also performed using the widely-accepted NS-2 simulation. Index Terms-Smart home, user authentication, key agreement, provable security, AVISPA, NS2 simulation. • M. Wazid is with
doi:10.1109/tia.2019.2960478 fatcat:4rrenc4yq5a6tamfhyyymakxsi