Privacy-preserving distributed frequency control for AC microgrids with constrained communication.

ISA Trans

School of Electrical Engineering, Xinjiang University, Urumqi 830017, China. Electronic address:

Published: December 2024

Distributed control of AC microgrids is one of the most popular methods in the islanded operation mode. Whereas, most of the existing studies either do not consider the potential threat of privacy security or rely on the assumption of ideal communication networks. To this end, this paper presents a novel privacy-preserving distributed secondary frequency control strategy for the privacy protection problem of an islanded AC microgrid with constrained communication. The key contributions of this paper are threefold. (1) Different from the existing privacy-preserving approaches used in AC microgrids, a time-varying function is introduced to mask interactive information such that the frequency cannot be reconstructed by malicious attackers. (2) An event-triggered communication scheme is employed to cope with the constrained communication environment. (3) A privacy-preserving distributed event-triggered control strategy with communication delay is developed such that the frequency restoration and active power sharing of the microgrid are guaranteed. Moreover, the maximum communication delay that the proposed control can withstand is analyzed. Simulation results show the properties of the privacy preservation, the decrease of communication load, and the bounded communication delay allowed in the proposed control strategy.

Download full-text PDF

Source
http://dx.doi.org/10.1016/j.isatra.2024.09.023DOI Listing

Publication Analysis

Top Keywords

privacy-preserving distributed
12
constrained communication
12
control strategy
12
communication delay
12
communication
9
frequency control
8
control microgrids
8
proposed control
8
control
6
privacy-preserving
4

Similar Publications

Cross-center Model Adaptive Tooth segmentation.

Med Image Anal

December 2024

Stomatology Hospital Affliated to Zhejiang University of Medicine, Zhejiang University, Hangzhou, 310016, China; ZJU-Angelalign R&D Center for Intelligence Healthcare, ZJU-UIUC Institute, Zhejiang University, Haining, 314400, China; Zhejiang Key Laboratory of Medical Imaging Artificial Intelligence, Zhejiang University, Hangzhou, 310058, China. Electronic address:

Automatic 3-dimensional tooth segmentation on intraoral scans (IOS) plays a pivotal role in computer-aided orthodontic treatments. In practice, deploying existing well-trained models to different medical centers suffers from two main problems: (1) the data distribution shifts between existing and new centers, which causes significant performance degradation. (2) The data in the existing center(s) is usually not permitted to be shared, and annotating additional data in the new center(s) is time-consuming and expensive, thus making re-training or fine-tuning unfeasible.

View Article and Find Full Text PDF

Cloud-edge-end computing architecture is crucial for large-scale edge data processing and analysis. However, the diversity of terminal nodes and task complexity in this architecture often result in non-independent and identically distributed (non-IID) data, making it challenging to balance data heterogeneity and privacy protection. To address this, we propose a privacy-preserving federated learning method based on cloud-edge-end collaboration.

View Article and Find Full Text PDF

Background And Objectives: Brain tumors are complex diseases that require careful diagnosis and treatment. A minor error in the diagnosis may easily lead to significant consequences. Thus, one must place a premium on accurately identifying brain tumors.

View Article and Find Full Text PDF

Target informed client recruitment for efficient federated learning in healthcare.

BMC Med Inform Decis Mak

December 2024

Department of Electrical Engineering (ESAT), STADIUS Center for Dynamical Systems, Signal Processing and Data Analytics, KU Leuven, Kasteelpark Arenberg 10, Leuven, 3001, Belgium.

Background: Modern machine learning and deep learning methods have been widely incorporated in decision making processes in healthcare in the form of decision support mechanisms. In healthcare, data are abundant but typically not centrally available and, therefore, require some form of aggregation to facilitate training procedures. Aggregating sensitive data poses a significant privacy risk, which is why, both in Europe and the United States, legal frameworks regulate the treatment of such data.

View Article and Find Full Text PDF

In opportunistic IoT (OppIoT) networks, non-cooperative nodes present a significant challenge to the data forwarding process, leading to increased packet loss and communication delays. This paper proposes a novel Context-Aware Trust and Reputation Routing (CATR) protocol for opportunistic IoT networks, which leverages the probability density function of the beta distribution and some contextual factors, to dynamically compute the trust and reputation values of nodes, leading to efficient data dissemination, where malicious nodes are effectively identified and bypassed during that process. Simulation experiments using the ONE simulator show that CATR is superior to the Epidemic protocol, the so-called beta-based trust and reputation evaluation system (denoted BTRES), and the secure and privacy-preserving structure in opportunistic networks (denoted PPHB+), achieving an improvement of 22%, 15%, and 9% in terms of average latency, number of messages dropped, and average hop count, respectively, under varying number of nodes, buffer size, time to live, and message generation interval.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!