{"title":"Smart meter privacy control strategy based on multi-agent hidden Markov energy management model under low trust communication","authors":"Qingchen Wang, Qing Xu, Xiyu Lei, Dazhong Ma","doi":"10.1049/cth2.12623","DOIUrl":null,"url":null,"abstract":"<p>With the popularity of smart meters, the frequent information exchange between smart grids and consumers leads to easy leakage of consumers' electricity consumption data. These leaked electricity consumption data are obtained by some malicious attackers and used to infer consumers' behavioural patterns by non-intrusive load monitoring (NILM), which seriously threatens consumers' privacy. Therefore, the multi-agent Hidden Markov energy management model is proposed in this paper to safeguard the privacy of consumers. First, a weighted Bayesian risk model is proposed, which combines privacy leakage risks and energy storage system (ESS) losses in a microgrid with multiple agents. Next, a three-loop model for lithium batteries is constructed to quantify the capacity degradation and cost issues of the ESS. Finally, the multi-objective optimization problem is resolved by integrating the Bayesian risk model with a hidden Markov model to simulate attackers. The proposed multi-agent Markov decision process method is validated on Electricity Consumption and Occupancy (ECO) dataset, and control strategies are evaluated based on different weights in the Bayesian risk model. The results demonstrate that by incorporating the multi-agent approach and energy storage system capacity degradation into the privacy protection strategy, the lifespan of the energy storage system can be significantly increased.</p>","PeriodicalId":50382,"journal":{"name":"IET Control Theory and Applications","volume":"18 16","pages":"2192-2202"},"PeriodicalIF":2.2000,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cth2.12623","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Control Theory and Applications","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cth2.12623","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
With the popularity of smart meters, the frequent information exchange between smart grids and consumers leads to easy leakage of consumers' electricity consumption data. These leaked electricity consumption data are obtained by some malicious attackers and used to infer consumers' behavioural patterns by non-intrusive load monitoring (NILM), which seriously threatens consumers' privacy. Therefore, the multi-agent Hidden Markov energy management model is proposed in this paper to safeguard the privacy of consumers. First, a weighted Bayesian risk model is proposed, which combines privacy leakage risks and energy storage system (ESS) losses in a microgrid with multiple agents. Next, a three-loop model for lithium batteries is constructed to quantify the capacity degradation and cost issues of the ESS. Finally, the multi-objective optimization problem is resolved by integrating the Bayesian risk model with a hidden Markov model to simulate attackers. The proposed multi-agent Markov decision process method is validated on Electricity Consumption and Occupancy (ECO) dataset, and control strategies are evaluated based on different weights in the Bayesian risk model. The results demonstrate that by incorporating the multi-agent approach and energy storage system capacity degradation into the privacy protection strategy, the lifespan of the energy storage system can be significantly increased.
期刊介绍:
IET Control Theory & Applications is devoted to control systems in the broadest sense, covering new theoretical results and the applications of new and established control methods. Among the topics of interest are system modelling, identification and simulation, the analysis and design of control systems (including computer-aided design), and practical implementation. The scope encompasses technological, economic, physiological (biomedical) and other systems, including man-machine interfaces.
Most of the papers published deal with original work from industrial and government laboratories and universities, but subject reviews and tutorial expositions of current methods are welcomed. Correspondence discussing published papers is also welcomed.
Applications papers need not necessarily involve new theory. Papers which describe new realisations of established methods, or control techniques applied in a novel situation, or practical studies which compare various designs, would be of interest. Of particular value are theoretical papers which discuss the applicability of new work or applications which engender new theoretical applications.