Introduction

Background and motivation

With the introduction of computing, communication, and sensing technologies, distribution systems are undergoing digital and intelligent transformation into cyber-physical distribution systems (CPDS)1. However, deep cyber-physical coupling makes the distribution system face severe operation risks under small probability and high-impact natural disasters. For example, the 2008 ice storm that caused outages in the Southern Chinese Power Grid and the 2016 Xiamen Island blackout caused by Typhoon Meranti provide a factual basis to confirm that cyber-physical coupling failures can lead to catastrophic cascading failures in the CPDS2. In recent years, the increasing frequency of extreme weather disasters due to global warming has posed significant challenges to the resilience of the CPDS3. Against this background, it is urgent to develop resilience strategies for the CPDS against cyber-physical coupling failures during extreme disasters.

State-of-the-Art

To realize the ambitious vision of the resilient power system, many studies make a great effort to develop effective resilience enhancement strategies. On the physical side, reinforcement strategies, as planning-oriented measures, can protect the CPDS from natural disasters4. However, strengthening and upgrading the entire CPDS is too expensive to achieve large-scale and all-around reinforcement. Accordingly, researchers try to achieve an economic combination of various planning strategies, including the deployment of distribution generators (DGs)5, battery storage systems (BSSs)6, and soft open points (SOPs)7, as well as microgrid formation in references8,9, etc. Notably, the effectiveness of these measures needs to be ensured with consideration of the interaction between the cyber and physical systems. The reason is that the CPDS relies on communication networks for control. However, since communication fiber is laid along the overhead ground wire to form an optical fiber composite overhead ground wire (OPGW), extreme disasters can simultaneously damage both power lines and communication links2,10,11, leading to cyber-physical coupling failures.

In terms of the impact of communication failures on distribution systems, an integrated planning framework is proposed for cyber-physical active distribution systems in reference12, where the working status of BSS relies on control commands from the control center. Nevertheless, the cyber-physical interdependence of DGs is ignored here. According to IEEE Standard 154713, it is recommended that DG disconnected from communication with the control center, shall be divorced from the distribution system14. Reference15 presents that the operational state of SOP is controlled by communication systems under cyber attacks. However, the advantages of DG and BSS to improve the resilience of CPDSs and the corresponding cyber-physical interaction are not discussed in reference15. Besides, the load control is also missing in references12,14,15. To this end, the authors of references16,17 believe that when load buses cannot receive control commands, local controllers are activated to support the continued operation of load buses if the load power can be supplied. Despite the cyber-physical coupling modeling for load buses in references16,17, other flexible resources like BSS and DG are utilized to improve the resilience of the CPDS therein. Based on the above discussion, it is necessary that multiple resources be coordinately planned and dispatched for resilient CPDS while modeling their cyber-physical interdependence.

Another measure to improve the resilience of CPDSs is designing redundant communication measures against communication failures. In reference18, a main-alternate routing strategy is proposed for the remedial control services of smart grids. On this basis, a saturation defense method is developed against cyber-attacks in reference19. To ensure the effectiveness of the strategy and method mentioned in the literature above, backup communication should be considered to support the operation of the CPDS. Due to advanced 5G technology, wireless communication technologies are competent alternatives as they can well ensure remote control and monitoring functions for the power grid20,21. In reference22, emergency communication vehicles are utilized to construct a wireless communication network, which helps restore the unserved customers as quickly as possible. In reference23, the ad hoc wireless device-to-device communication can assist the power network reconfiguration and form stable microgrids efficiently after disasters. However, wireless communication measures utilized in references20,21,22,23 are just for quick post-disaster restoration. How to effectively and economically deploy wireless communication before disasters is pending.

Moreover, it is essential to consider the uncertainty of cyber-physical coupling failures when making proactive decisions for the CPDS against natural disasters. As a result, numerous studies have focused on stochastic programming (SP)7,8,24,25, robust optimization (RO)8,12, and the combination of these two techniques26,27 to assess the effects of natural disasters on power systems. Notably, as the number of possible contingencies grows, solving the SP problem becomes increasingly challenging. In addition, RO often leads to overly conservative decisions without considering specific probability information. Although references26,27 avoid the disadvantages of RO and SP, they do not consider the sequential nature of typhoon attacks. Given that typhoons often exhibit varying tracks and intensities, overhead lines can be sequentially damaged as the typhoon evolves28,29, simultaneously causing interruptions both in power lines and communication links. To model these time-varying characteristics, considerable research has focused on capturing the spatiotemporal dynamics of outages in power systems, using methods like the Markov property28,29. Reference30 introduces a stochastic model for typhoon paths, where the probability of power lines being affected varies along each path. Furthermore, in references28,29, a multi-state regional weather model is developed to assess the reliability of the power system during hurricanes. Similarly, references31,32 present a multi-zone and multi-stage uncertainty set to capture the dynamic impact of typhoons on power systems. It should be noted that references28,29,30,31,32 only focus on the electrical component failures, but do not include the impact of dynamic typhoons on communication infrastructures and cyber-physical interaction. Therefore, in terms of the time-varying characteristics of typhoon path, it is necessary to construct a spatially and temporally extended N-k uncertainty set for the robust resilient-oriented design of CPDSs.

Contributions

This paper proposes a two-stage RO model to enhance the resilience of the CPDS. The contributions are summarized as follows:

  • To enhance the resilience of the CPDS against typhoons, this paper proposes a robust resilient-oriented design framework, in which comprehensive planning-operational measures are coordinated in terms of cyber-physical coupling. Specifically, line hardening, BSSs and SOPs deployment, and wireless communication configuration are conducted before typhoons. During the typhoons, the emergency response aims at mitigating power outages by regulating BSSs, SOPs, local controllers, and DGs through cyber-physical interaction.

  • The proposed robust optimization model is tailored for the resilient CPDS against typhoons. In view of the time-varying characteristics of typhoon paths, the Monte Carlo method is used to evaluate the vulnerable lines. On this basis, a spatially and temporally extended N-k uncertainty set is built for the status of overhead lines consisting of communication links and power lines. Then, the impact of cyber-physical coupling failures on CPDSs is considered to derive a robust decision-making.

The resilient CPDS formulation

Structure of the resilient CPDS

The framework of the resilient CPDS is presented in Fig. 1. When a typhoon occurs, overhead lines could be brought down due to collapsed poles caused by high winds4. Since the optical fiber of an EPON-based communication network is often placed on the ground wire of the overhead transmission line10, optical fibers and distribution lines are damaged with the same failure probability, which causes cyber-physical coupling failures modeled by a spatially and temporally extended N-k uncertainty set. As a result, communication between feeder terminal units (FTUs) and the control center is interrupted, and thus sequential outages will take place. To tackle this issue, line hardening, SOPs, DGs, BSS, and wireless communication configuration are regarded as a coordinated planning-operation strategy to enhance the resilience of CPDS.

Fig. 1
figure 1

Schematic diagram of the resilient CPDS.

Communication network modeling

In the wired communication network, the optical fiber between two cyber nodes stands for a cyber link. Accordingly, the wired network can be denoted as the connected graphs \({\mathcal {G}}_{C}\left( {\mathcal {N}}_{C}, {\mathcal {L}}_{C}\right)\), where \({\mathcal {N}}_{C}\) and \({\mathcal {L}}_{C}\) are the sets of cyber nodes and links, respectively. From the control center \({\mathcal {N}}_{C,con}\) to the destination node \(k\), the information flow can be modeled as

$$\begin{aligned} & \left\{ \begin{array}{l} v_{i,t}=1, \quad \forall i \in {{\mathcal {N}}}_{C, \text {con}},\forall t \\ v_{j,t}-(1 - u_{ij,t}) \le v_{i,t} \le v_{j,t}+(1 - u_{ij,t}), \quad \forall i \in {{\mathcal {N}}}_{C}, \forall ij \in {\mathcal {L}}_{C} ,\forall t \end{array} \right. \end{aligned}$$
(1)
$$\begin{aligned} & \left\{ \begin{array}{l} \sum _{\left\{ j:(i, j) \in {\mathcal {L}}_{C}\right\} } \phi _{ij,k,t}=v_{k,t}\\ \sum _{\left\{ j:(i, j) \in {\mathcal {L}}_{C}\right\} } \sigma _{i j,k,t}=v_{k,t} \Gamma _{k} \end{array}, \forall i \in {{\mathcal {N}}}_{C, con },\forall t\right. \end{aligned}$$
(2)
$$\begin{aligned} & \left\{ \begin{array}{l} \sum _{\left\{ j:(j, i) \in {\mathcal {L}}_{C}\right\} } \phi _{j i,k,t}-\sum _{\left\{ j:(i, j) \in {\mathcal {L}}_{C}\right\} } \phi _{i j,k,t}=v_{k,t} \\ \sum _{\left\{ j:(j, i) \in {\mathcal {L}}_{C}\right\} } \sigma _{j i,k,t}-\sum _{\left\{ j:(i, j) \in {\mathcal {L}}_{C}\right\} } \sigma _{i j,k,t}=v_{k,t} \Gamma _{k} \end{array}, \forall i \in \left\{ {{\mathcal {N}}}_{C} \cap k\right\} ,\forall t\right. \end{aligned}$$
(3)
$$\begin{aligned} & \left\{ \begin{array}{l} \sum _{\left\{ j:(j, i) \in {\mathcal {L}}_{C}\right\} } \phi _{j i,k,t}-\sum _{\left\{ j:(i, j) \in {\mathcal {L}}_{C}\right\} } \phi _{i j,k,t}=0 \\ \sum _{\left\{ j:(j, i, j) \in {\mathcal {L}}_{C}\right\} } \sigma _{j i,k,t}-\sum _{\left\{ j:(i, j) \in {\mathcal {L}}_{C}\right\} } \sigma _{i j,k,t}=0 \end{array}, \forall i \in \left\{ {{\mathcal {N}}}_{C} /\left( {{\mathcal {N}}}_{C,con} \cup k\right) \right\} ,\forall t\right. \end{aligned}$$
(4)
$$\begin{aligned} & \left\{ \begin{array}{l} \sigma _{ij,k,t} =\phi _{ij,k,t}\Gamma _k,\forall k \in {\mathcal {N}}_{C},\forall ij \in {\mathcal {L}}_{C},\forall t \\ \sum \limits _{k \in {\mathcal {N}}_{C}} \left| \sigma _{ij,k,t} \right| \le \theta _{ij,t}\overline{\Gamma },\forall ij \in {\mathcal {L}}_{C},\forall t \end{array} \right. \end{aligned}$$
(5)
$$\begin{aligned} & \phi _{i j,k,t} \in \{-1,0,1\}, \forall i j \in {\mathcal {L}}_{C},\forall k \in {\mathcal {N}}_{C},\forall t \end{aligned}$$
(6)

where Constraint (1) indicates the connectivity between the control center and other cyber nodes. Constraint (2) represents that the control center, as the sender of the information flow, has only outgoing traffic but no incoming traffic. Equation (3) ensures that the traffic incoming at the destination node is equal to the traffic required by communication services. Equation (4) enforces all relay nodes to satisfy the information flow balance. Constraint (5) restricts the transmission traffic of cyber links. Constraint (6) gives reference values of \(\phi _{ij,k,t}\). \(\left| \sigma _{ij,k,t} \right|\) in (5) can be linearized by \(\kappa \ge \sigma _{ij,k,t}\) and \(\kappa \ge -\sigma _{ij,k,t}\).

To ensure the reliable operation of the CPDS against typhoons, the buses of DG, BSS, and SOP can be configured with 5G wireless communication in case of wired communication interruption.

$$\begin{aligned} \left( v_{k,t}+\omega _{k}\right) / 2 \le \psi _{k,t} \le v_{k,t}+\omega _{k}, k \in \left\{ \Omega ^{\textrm{DG}} \cup \Omega ^{\textrm{BSS}} \cup \Omega ^{\textrm{SOP}}\right\} ,\forall t \end{aligned}$$
(7)

Cyber-physical coupling modeling

1) Control and operation constraints of DG

$$\begin{aligned} \left\{ \begin{array}{l} 0 \le P_{g,t}^{\textrm{DG}} \le \psi _{g,t} \bar{P}_{g,t}^{\textrm{DG}} \\ \psi _{g,t} \underline{Q}_{g,t}^{\textrm{DG}} \le Q_{g,t}^{\textrm{DG}} \le \psi _{g,t} \bar{Q}_{g,t}^{\textrm{DG}} \end{array}, \forall g \in \Omega ^{\textrm{DG}},\forall t\right. \end{aligned}$$
(8)

2) Control and operation constraints of BSS

$$\begin{aligned} \left\{ \begin{array}{l} \beta _{b, t, \text{ ch } }^{\textrm{BSS}}+\beta _{b, t, \text{ dis } }^{\textrm{BSS}} \le \psi _{b,t}, \forall b \in \Omega ^{\textrm{BSS}}, \forall t \\ 0 \le P_{b, t, \textrm{ch}}^{\textrm{BSS}} \lambda _{\textrm{ch}}^{\textrm{BSS}} \le \beta _{b, t, \textrm{ch}}^{\textrm{BSS}} P_{b}^{\textrm{BSS}}, \forall b \in \Omega ^{\textrm{BSS}}, \forall t \\ 0 \le P_{b, t, \text{ dis } }^{\textrm{BSS}} \lambda _{\textrm{dis}}^{\textrm{BSS}} \le \beta _{b, t, \text{ dis } }^{\textrm{BSS}} P_{b}^{\textrm{BSS}}, \forall b \in \Omega ^{\textrm{BSS}}, \forall t \\ E_{b, t+1}^{\textrm{BSS}}=E_{b, t}^{\textrm{BSS}}+P_{b, t, \textrm{ch}}^{\textrm{BSS}} \lambda _{\textrm{ch}}^{\textrm{BSS}}-P_{b, t \text{ dis } }^{\textrm{BSS}} \lambda _{\textrm{dis}}^{\textrm{BSS}}, \forall b \in \Omega ^{\textrm{BSS}}, \forall t \\ \left( 1-\sigma ^{\textrm{BSS}}\right) E_{b}^{\textrm{BSS}} \le E_{b, t}^{\textrm{BSS}} \le E_{b}^{\textrm{BSS}}, \forall b \in \Omega ^{\textrm{BSS}}, \forall t \end{array}\right. \end{aligned}$$
(9)

where the first line of (9) limits the charging and discharging status of BSS. The second and third lines of (9) restrict the charging and discharging power of BSS. The energy level of BSS is expressed in the fourth line of (9). The fifth line of (9) gives the range limits of the energy level.

3) Control and operation constraints of SOP

$$\begin{aligned} \left\{ \begin{array}{l} \sqrt{\left( P_{s, t}^{\textrm{SOP}}\right) ^{2}+\left( Q_{s, t}^{\textrm{SOP}}\right) ^{2}} \le \psi _{s,t} S_{s}^{\textrm{SOP}}, \forall s \in \Omega ^{\textrm{SOP}}, \forall t \\ \sqrt{\left( P_{q, t}^{\textrm{SOP}}\right) ^{2}+\left( Q_{q, t}^{\textrm{SOP}}\right) ^{2}} \le \psi _{q,t} S_{q}^{\textrm{SOP}}, \forall q \in \Omega ^{\textrm{SOP}}, \forall t \\ P_{s, t}^{\textrm{SOP}}+P_{q, t}^{\textrm{SOP}}=0, \forall s, q \in \Omega ^{\textrm{SOP}}, \forall t \end{array}\right. \end{aligned}$$
(10)

where the first and second lines of (10) limit the active and reactive power outputs of SOP. The third line of (10) ensures the active power flow balance of SOP.

4) Control and operation constraints of load power

When communication is interrupted on some buses, local control on these buses can be activated to restore power supply if the load power can be fully met16. The corresponding constraints can be seen in Table 1. Based on the second line of Table 1, we can know that when loads can be fully met, there does not exist load shedding on bus i with the local control, even though bus i disconnects communication with the control center. However, when loads on bus i cannot be fully met and bus i disconnects communication with the control center, all loads on bus i should be shed on the third line of Table 1. In addition, if bus i is communication-connected with the control center, the corresponding load shedding amount can be controlled by the control center on the fourth and fifth lines of Table 1.

$$\begin{aligned} \left\{ \begin{array}{l} \tau _{i,t}^{1} P_{i,t}^{\textrm{L}} \le P_{i,t}^{\textrm{LS}} \le \tau _{i,t}^{2} P_{i,t}^{\textrm{L}} \\ \tau _{i,t}^{1}=\left( 1-\psi _{i,t}\right) \left( 1-\mu _{i,t}\right) \\ \tau _{i,t}^{2}=\psi _{i,t}+\left( 1-\psi _{i,t}\right) \left( 1-\mu _{i,t}\right) \\ \mu _{i,t}+\psi _{i,t} \le 1 \end{array}, \forall i \in \Omega ^{\textrm{DN}},\forall t\right. \end{aligned}$$
(11)
Table 1 Load shedding constraints.

The nonlinear terms \(\psi _{i,t} \mu _{i,t}\) in Eq. (11) can be linearized as follows:

$$\begin{aligned} \left\{ \begin{array}{l} \vartheta _{i,t} \le \psi _{i,t}, \vartheta _{i,t} \le \mu _{i,t} \\ \vartheta _{i,t} \ge \psi _{i,t}+\mu _{i,t}-1 \end{array}, \forall i \in \Omega ^{\textrm{DN}},\forall t\right. \end{aligned}$$
(12)

Two-stage robust optimization model

In this paper, a two-stage RO model is developed for the resilient CPDS. Set different weight coefficients for power loads, the objective function is represented as

$$\begin{aligned} \min _{x_{1}, x_{2}, x_{3}, x_{4} \in {\mathcal {X}}} \max _{{\varvec{u}}} \min _{y_{1}, y_{2} \in {\mathcal {Y}}}\left( \sum _{i \in \Omega ^{\textrm{DN}}} \sum _{t \in T} c_{i} P_{i, t}^{\textrm{LS}}\right) \end{aligned}$$
(13)

Planning decisions in the first stage

Within a constrained budget \(\bar{C}\), line reinforcement, BSS and SOP deployment, and wireless communication configuration are preventive planning decisions in (14), (15), (16), and (17) against upcoming typhoons, respectively.

$$\begin{aligned} {\varvec{x}}_{1}= & \left\{ h_{i j} \mid C_{H}=\sum _{i j \in \Omega ^{\textrm{BR}}} c_{H} h_{i j} \xi _{i j}\right\} \end{aligned}$$
(14)
$$\begin{aligned} {\varvec{x}}_{2}= & \left\{ \begin{array}{l|l} S_{b}^{\textrm{BSS}}, E_{b}^{\textrm{BSS}}, \alpha _{b} & \begin{array}{l} C^{\textrm{BSS}}=\left( a^{\textrm{BSS}} C_{\textrm{inv}}^{\textrm{BSS}}+C_{\textrm{on}}^{\textrm{BSS}}\right) \\ C_{\textrm{inv}}^{\textrm{BSS}}=\sum _{b \in \Omega ^{\textrm{BSS}}}\left( k_{\textrm{S}} P_{b}^{\textrm{BSS}}+k_{\textrm{E}} E_{b}^{\textrm{BSS}}\right) \\ C_{\textrm{on}}^{\textrm{BSS}}=\sum _{b \in \Omega ^{\textrm{BSS}}} k_{\textrm{S}} k_{\textrm{M}} P_{b}^{\textrm{BSS}} \\ 0 \le P_{b}^{\textrm{BSS}} \le \alpha _{b} P_{\max }^{\textrm{BSS}}, \forall b \in \Omega ^{\textrm{BSS}} \\ 0 \le E_{b}^{\textrm{BSS}} \le \alpha _{b} E_{\max }^{\textrm{BSS}}, \forall b \in \Omega ^{\textrm{BSS}} \\ \sum _{b \in \Omega ^{\textrm{BSS}}} \alpha _{b} \le N_{\max }^{\textrm{BSS}} \end{array} \end{array}\right\} \end{aligned}$$
(15)
$$\begin{aligned} {\varvec{x}}_{3}= & \left\{ \begin{array}{l|l} S_{s}^{\textrm{SOP}}, \alpha _{s} & \begin{array}{l} C^{\textrm{SOP}}=\left( a^{\textrm{SOP}} C_{\textrm{inv}}^{\textrm{SOP}}+C_{\textrm{on}}^{\textrm{SOP}}\right) \\ C_{\textrm{inv}}^{\textrm{SOP}}=\sum _{i \in \Omega ^{\textrm{SOP}}} r_{\textrm{S}} S_{s}^{\textrm{SOP}} \\ C_{\textrm{on}}^{\textrm{SOP}}=\sum _{i \in \Omega ^{\textrm{SOP}}} r_{\textrm{S}} r_{\textrm{M}} S_{s}^{\textrm{SOP}} \\ 0 \le S_{s}^{\textrm{SOP}} \le \alpha _{s} S_{\max }^{\textrm{SOP}}, \forall s \in \Omega ^{\textrm{SOP}} \end{array} \end{array}\right\} \end{aligned}$$
(16)
$$\begin{aligned} {\varvec{x}}_{4}= & \left\{ \omega _{i} \left| \, \begin{array}{l} C_{W}=\sum _{\forall i \in \left\{ \Omega ^{\textrm{DG}}, \Omega ^{\textrm{BSS}}, \Omega ^{\textrm{SOP}} \right\} } c_{W} \omega _{i} \\ \omega _{i}=1, \forall i \in \Omega ^{\textrm{DG}} \\ \alpha _{i} \le \omega _{i}, \forall i \in \left\{ \Omega ^{\textrm{BSS}}, \Omega ^{\textrm{SOP}}\right\} \end{array}\right. \right\} \end{aligned}$$
(17)
$$\begin{aligned} {\mathcal {X}}= & \left\{ {\varvec{x}}_{1}, {\varvec{x}}_{2}, {\varvec{x}}_{3}, {\varvec{x}}_{4} \mid C_{H}+C^{\textrm{BSS}}+C^{\textrm{SOP}}+C_{W} \le \bar{C}\right\} \end{aligned}$$
(18)

Uncertainty set of vulnerable lines

When encountering a typhoon, overhead line failures and distribution pole failures can be considered independent of each other. Therefore, mapping fragility curves30, the probability of transmission line failure can be obtained as:

$$\begin{aligned} \operatorname {Pr}(i j, t)=1-\prod _{c}\left[ 1-\operatorname {Pr}_{c}(t)\right] \prod _{p}\left[ 1-\operatorname {Pr}_{p}(t)\right] , \forall i j \in \Omega ^{\textrm{BR}}, \forall t \end{aligned}$$
(19)

As can be seen in Eq. (19), c and p are the number of wire segments and distribution poles, respectively.

Set a failure probability threshold \(\textrm{Pr}_{V.th}\) as the criterion to determine transmission line failure. When the failure probability \(\operatorname {Pr}(i j, t)\) exceeds the threshold, the overhead line ij is prone to failure.

$$\begin{aligned} \left\{ \begin{array}{l} i j \in \Omega _{N, t}, \text{ if } \operatorname {Pr}(i j, t)<\operatorname {Pr}_{V, t h}, \forall i j \in \Omega ^{\textrm{BR}}, \forall t \\ i j \in \Omega _{V, t}, \text{ if } \operatorname {Pr}(i j, t) \ge \operatorname {Pr}_{V, t h}, \forall i j \in \Omega ^{\textrm{RR}}, \forall t \end{array}\right. \end{aligned}$$
(20)

Considering the sequential impact of typhoon attacks on the CPDS, we assume that a typhoon passes through the CPDS area \(\Omega _{1}\), \(\Omega _{2}\), \(\cdots\), \(\Omega _{\xi }\) in time series \(t_{1}\), \(t_{2}\), \(\cdots\), \(t_{\xi }\). To deal with the temporal uncertainty of line status, a multi-stage and multi-zone uncertainty set is constructed as

$$\begin{aligned} \begin{aligned} {\varvec{U}}_{l}=\left\{ \begin{array}{l} u_{i j, t} \mid \sum _{i j \in \Omega _{1}}\left( 1-u_{i j, t}\right) \le N_{1, \max }, \forall t \in t_{1} \\ u_{i j, t_{1}}=u_{i j, t_{0}}, \forall i j \in \left\{ \Omega / \Omega _{1}\right\} , \\ \sum _{i j \in \Omega _{2}}\left( 1-u_{i j, t}\right) \le N_{2, \max }, \forall t \in t_{2} \\ u_{i j, t_{2}}=u_{i j, t_{1}}, \forall i j \in \left\{ \Omega / \Omega _{2}\right\} , \\ \vdots \\ \sum _{i j \in \Omega _{\varsigma }}\left( 1-u_{i j, t}\right) \le N_{\zeta , \max }, \forall t \in t_{\zeta } \\ u_{i j, t_{\zeta }}=u_{i j, t_{\zeta -1}}, \forall i j \in \left\{ \Omega / \Omega _{\zeta }\right\} \end{array}\right\} \end{aligned} \end{aligned}$$
(21)

The line status depends on whether lines are reinforced or attacked30. Usually, the reinforced line can be immune to typhoon attacks. In addition, the N-k criterion is adopted to limit the contingencies of overhead lines. Therefore, a spatially and temporally extended N-k uncertainty set is constructed as

$$\begin{aligned} \varvec{\Theta }=\left\{ \theta _{i j, t} \left| \, \begin{array}{l} \theta _{i j, t}=1-\left( 1-h_{i j}\right) \left( 1-u_{i j, t}\right) , \forall i j \in \Omega ^{\textrm{BR}}, \forall t \\ \sum _{i j \in \Omega _{\gamma }} \theta _{i j, t} \ge N_{\gamma , \max }-k_{\gamma }, \forall \gamma \in \{1,2, \cdots \zeta \}, \forall t \end{array}\right. \right\} \end{aligned}$$
(22)

The bilinear terms \(h_{i j}u_{i j, t}\) of the two binary variables in (22) can be linearized as

$$\begin{aligned} \left\{ \begin{array}{l} \theta _{i j, t} \ge h_{i j}, \theta _{i j, t} \ge u_{i j, t} \\ \theta _{i j, t} \le h_{i j}+u_{i j, t} \end{array}, \forall i j \in \Omega ^{\textrm{BR}}, \forall t\right. \end{aligned}$$
(23)

Emergency response decisions in the second stage

Based on the resilient CPDS model (1)-(11), the power flow can be evaluated in the control center as

$$\begin{aligned} & \begin{aligned} P_{i, t}=&\sum _{e \in \Omega ^{\textrm{TN}}} P_{e, t}^{\textrm{TN}}+\sum _{b \in \Omega ^{\textrm{BSS}}}\left( P_{b, t ,\textrm{ch}}^{\textrm{BSS}}-P_{b, t, \textrm{dis}}^{\textrm{BSS}}\right) + \\&\sum _{s \in \Omega ^{\textrm{SOP}}} P_{s, t}^{\textrm{SOP}}+\sum _{g \in \Omega ^{\textrm{DG}}} P_{g, t}^{\textrm{DG}}-\left( P_{i, t}^{\textrm{L}}-P_{i, t}^{\textrm{LS}}\right) , \forall i \in \Omega ^{\textrm{DN}}, \forall t \end{aligned} \end{aligned}$$
(24)
$$\begin{aligned} & \begin{aligned} Q_{i, t}=&\sum _{e \in \Omega ^{\textrm{TN}}} Q_{e, t}^{\textrm{TN}} +\sum _{s \in \Omega ^{\textrm{SOP}}} Q_{s, t}^{\textrm{SOP}}+ \\&\sum _{g \in \Omega ^{\textrm{DG}}} Q_{g, t}^{\textrm{DG}}-\left( Q_{i, t}^{\textrm{L}}-\left( \frac{P_{i, t}^{\textrm{LS}}}{P_{i, t}^{\textrm{L}}}\right) Q_{i, t}^{\textrm{L}}\right) , \forall i \in \Omega ^{\textrm{DN}}, \forall t \end{aligned} \end{aligned}$$
(25)
$$\begin{aligned} & \sum _{k \in \delta (j)} P_{j k, t}-\sum _{i \in \pi (j)} P_{i j, t}=P_{j, t}, \forall j \in \Omega ^{\textrm{DN}}, \forall t \end{aligned}$$
(26)
$$\begin{aligned} & \sum _{k \in \delta (j)} Q_{j k, t}-\sum _{i \in \pi (j)} Q_{i j, t}=Q_{j, t}, \forall j \in \Omega ^{\textrm{DN}}, \forall t \end{aligned}$$
(27)
$$\begin{aligned} & -P_{i j, \max } \theta _{i j, t} \le P_{i j, t} \le P_{i j, \max } \theta _{i j, t}, \forall i j \in \Omega ^{\textrm{BR}}, \forall t \end{aligned}$$
(28)
$$\begin{aligned} & -Q_{i j, \max } \theta _{i j, t} \le Q_{i j, t} \le Q_{i j, \max } \theta _{i j, t}, \forall i j \in \Omega ^{\textrm{BR}}, \forall t \end{aligned}$$
(29)
$$\begin{aligned} & U_{\min } \le U_{i, t} \le U_{\max }, \forall i \in \Omega ^{\textrm{DN}}, \forall t \end{aligned}$$
(30)
$$\begin{aligned} & \begin{array}{l} U_{i, t}-U_{j, t}-\left( r_{i j} P_{i j, t}+x_{i j} Q_{i j, t}\right) / U_{0} \le M\left( 1-\theta _{i j, t}\right) \\ , \forall i j \in \Omega ^{\textrm{BR}}, \forall i \in \Omega ^{\textrm{DN}}, \forall t \end{array} \end{aligned}$$
(31)
$$\begin{aligned} \begin{array}{l} U_{i, t}-U_{j, t}-\left( r_{i j} P_{i j, t}+x_{i j} Q_{i j, t}\right) / U_{0} \ge -M\left( 1-\theta _{i j, t}\right) \\ , \forall i j \in \Omega ^{\textrm{BR}}, \forall i \in \Omega ^{\textrm{DN}}, \forall t \end{array} \end{aligned}$$
(32)

For the sake of clarity, the emergency operation set is denoted as \({\mathcal {Y}}\), constrained by (35). \(\varvec{y_{1}}\) contains the binary variables. \({\varvec{y}}_{2}\) includes the continuous variables and binary variables.

$$\begin{aligned} \varvec{y}_{1}= & \left\{ \beta _{b,t,\textrm{ch}}^{\textrm{BSS}}, \beta _{b,t,\textrm{dis}}^{\textrm{BSS}}, \mu _{i,t} \mid (9) \textrm{and}(11)\right\} \end{aligned}$$
(33)
$$\begin{aligned} \varvec{y}_2= & \left\{ \begin{array}{l|l} v_{i,t}, \phi _{i j,t}, \sigma _{i j,t},\psi _{k,t},\tau _{i,t}^{1},\tau _{i,t}^{2}, P_{e, t}^{\textrm{TN}}, Q_{e, t}^{\textrm{TN}}, P_{g,t}^{\textrm{DG}}, Q_{g,t}^{\textrm{DG}}, P_{b, t, \textrm{ch}}^{\textrm{BSS}} & {(1)-(11)} \\ P_{b, t, \textrm{dis}}^{\textrm{BSS}} ,E_{b, t}^{\textrm{BSS}}, P_{s, t}^{\textrm{SOP}}, Q_{s, t}^{\textrm{SOP}}, P_{i,t}^{\textrm{LS}}, P_{i, t}, Q_{i, t}, P_{i j, t}, Q_{i j, t}, U_{i, t} & {(24)-(32)} \end{array}\right\} \end{aligned}$$
(34)
$$\begin{aligned} {\mathcal {Y}}= & \left\{ {\varvec{y}}_{1}, {\varvec{y}}_{2} \mid (1)-(11),(24)-(32)\right\} \end{aligned}$$
(35)

Solution method

To facilitate the solution of the proposed model, the first and second lines of (10) can be linearized as

$$\begin{aligned} & \left\{ \begin{array}{l} -S_{s} \le \left[ \begin{array}{ll} P_{s, t}, & Q_{s, t} \end{array}\right] \left[ \begin{array}{l} \cos \varphi \\ \sin \varphi \end{array}\right] \le \psi _{s,t} S_{s} \\ \varphi =n \frac{\pi }{N}, n=1,2, \cdots , N \end{array}, \forall s \in \Omega ^{\textrm{SOP}}, \forall t\right. \end{aligned}$$
(36)
$$\begin{aligned} & \left\{ \begin{array}{l} -S_{q} \le \left[ \begin{array}{ll} P_{q, t}, & Q_{q, t} \end{array}\right] \left[ \begin{array}{c} \cos \varphi \\ \sin \varphi \end{array}\right] \le \psi _{q,t} S_{q} \\ \varphi =n \frac{\pi }{N}, n=1,2, \cdots , N \end{array}, \forall q \in \Omega ^{\textrm{SOP}}, \forall t\right. \end{aligned}$$
(37)

Definition 1

Without loss of generality, the proposed two-stage RO model can be rewritten as compact matrices:

$$\begin{aligned} {\left\{ \begin{array}{ll} \min _{\varvec{x_{1}}, {\varvec{x}}_{2}, {\varvec{x}}_{3}, x_{4} \in {\mathcal {X}}} \max _{u \in U_{l}} \min _{y_{1}, y_{2} \in {\mathcal {Y}}} c^{\textrm{T}} {\varvec{y}}_{2} \\ \text {s.t.} \quad \begin{aligned} {\mathcal {X}} & = \left\{ x_1, x_2, x_3, x_4 \ | \ A_1 (x_1 + x_2 + x_3 + x_4) \le a \right\} , \\ U_l & = \left\{ u \ | \ K_1 u + K_2 x_1 \le b \right\} , \\ {\mathcal {Y}} & = \left\{ y_1, y_2 \ | \ A_2 (x_1 + x_2 + x_3 + x_4) + E y_1 + F y_2 + G u \le d \right\} . \end{aligned} \end{array}\right. } \end{aligned}$$
(38)

Remark

There exist variables \(y_{1}\) and \(y_{2}\) in the inner-level min problem of (38). The binary variables include charging indicator \(\beta _{b,t,\textrm{ch}}^{\textrm{BSS}}\) and discharging indicator \(\beta _{b,t,\textrm{dis}}^{\textrm{BSS}}\) of BSS, local control status \(\mu _{i,t}\), wired communication indicator \(v_{i,t}\), work status \(\phi _{i j,t}\) of cyber link, final communication status \(\psi _{k,t}\), as well as load shedding status \(\tau _{i,t}^{1}\) and \(\tau _{i,t}^{2}\).

Proposition

The two-stage model (38) can be efficiently solved with the enumeration of integer variables \(y_{1}\), which include just three binary variables \(\beta _{b,t,\textrm{ch}}^{\textrm{BSS}}\), \(\beta _{b,t,\textrm{dis}}^{\textrm{BSS}}\), and \(\mu _{i,t}\), ensuring the tractable solutions of the proposed model according to NC&CG33.

Proof

According to reference33, the tri-level model (38) is equivalent to the formulation (39) by separating enumeration variables \(y_{1}\) from other variables \(y_{2}\). Notably, \(y_{2}\) still contain some binary variables \(v_{i,t}, \phi _{i j,t}, \psi _{k,t},\tau _{i,t}^{1},\tau _{i,t}^{2}\), leading to challenges to the NC&CG utilization. In this regard, we further divided \(y_{2}\) into \(y_{21}\) in (39) and \(y_{22}\) in (40) as follows:

$$\begin{aligned} y_{21}= & \left\{ v_{i,t}, \phi _{i j,t}, \psi _{k,t},\tau _{i,t}^{1},\tau _{i,t}^{2}\right\} \end{aligned}$$
(39)
$$\begin{aligned} y_{22}= & \left\{ P_{e, t}^{\textrm{TN}}, Q_{e, t}^{\textrm{TN}}, P_{g,t}^{\textrm{DG}}, Q_{g,t}^{\textrm{DG}}, P_{b, t, \textrm{ch}}^{\textrm{BSS}}, P_{b, t, \textrm{dis}}^{\textrm{BSS}} ,E_{b, t}^{\textrm{BSS}}, P_{s, t}^{\textrm{SOP}}, Q_{s, t}^{\textrm{SOP}}, P_{i,t}^{\textrm{LS}}, P_{i, t}, Q_{i, t}, P_{i j, t}, Q_{i j, t}, U_{i, t}\right\} \end{aligned}$$
(40)

When \(y_{1}\) is fixed as \(y_{1}^{*}\) (charging indicator \(P_{b, t, \textrm{ch}}^{\textrm{BSS}}\) and discharging indicator \(P_{b, t, \textrm{dis}}^{\textrm{BSS}}\) of BSS, as well as local control status \(\mu _{i,t}\) are given), the indicator u of line attack directly determines binary variables \(y_{21}\). For clarity, we explain this mapping relationship one by one based on our communication model (1)-(6) and load control model (11) as below:

1) In the communication model (1)-(6), given the u and the fixed \(h_{i j}\) in the first stage, line status \(\theta _{i j,t}\) can be determined by (22). Then, \(v_{i,t}\) and \(\phi _{i j,t}\) obtained from (1)-(6) are exact, which means that u is the corresponding decision variable for \(v_{i,t}\) and \(\phi _{i j,t}\). Moreover, since \(\omega _{i}\) is the indicator of wireless communication configuration that has been fixed in the first stage, \(\psi _{k,t}\) can be derived from Eq. (7). Therefore, u directly determines binary variables \(v_{i,t}\), \(\phi _{i j,t}\), and \(\psi _{k,t}\).

2) Based on the confirmed \(\psi _{k,t}\) in 1) and the fixed \(\mu _{i,t}\) in (33), we can further derive the load shedding status \(\tau _{i,t}^{1}\), and \(\tau _{i,t}^{2}\) according to (11). Thus \(\tau _{i,t}^{1}\), and \(\tau _{i,t}^{2}\) also depends on u.

According to the analysis in 1) and 2), we know that given the fixed \(y_{1}^{*}\), there exists a mapping \(f:\varvec{u} \rightarrow \varvec{y}_{21}\). Thus, the problem (38) is equivalent to problem (41), and further to problem (42) where the binary variables \(\varvec{y}_{21}\) in the inner fourth-layer “min” can be put in the inner second-layer “max”. Then, the problem (42) can be effectively solved with the enumeration of integer variables \(y_{1}\) by the customized nested column-and-constraint generation (NC&CG) algorithm33 with two nested loop frameworks in Algorithm 1. As a result, the problem (42) is decomposed into a master problem (MP) (44) and a subproblem (SP) (43). Nonlinear terms \({\varvec{u}}^{\textrm{T}} {\varvec{G}}^{\textrm{T}} \varvec{\zeta }^{l_2}\) in (46) can be linearized by the big-M method4.

$$\begin{aligned} & \left\{ \begin{array}{l} \min _{{\varvec{x}}_{1}, {\varvec{x}}_{2}, {\varvec{x}}_{3}, {\varvec{x}}_{4} \in {\mathcal {X}}} \max _{{\varvec{u}} \in {\varvec{U}}_{l}} \min _{{\varvec{y}}_{1} \in {\mathcal {Y}}} \min _{{\varvec{y}}_{2} \in {\mathcal {Y}}} {\varvec{c}}^{\textrm{T}} {\varvec{y}}_{2} \\ \text{ s.t. } {\mathcal {X}}, {\varvec{U}}_{l}, {\mathcal {Y}} \end{array}\right. \end{aligned}$$
(41)
$$\begin{aligned} & \left\{ \begin{array}{l} \min _{{\varvec{x}}_{1}, {\varvec{x}}_{2}, {\varvec{x}}_{3}, {\varvec{x}}_{4} \in {\mathcal {X}}} \max _{{\varvec{u}} \in {\varvec{U}}_{l},{\varvec{y}}_{21} \in {\mathcal {Y}}} \min _{{\varvec{y}}_{1} \in {\mathcal {Y}}} \min _{{\varvec{y}}_{22} \in {\mathcal {Y}}} {\varvec{c}}^{\textrm{T}} {\varvec{y}}_{22} \\ \text{ s.t. } {\mathcal {X}}, {\varvec{U}}_{l}, {\mathcal {Y}} \end{array}\right. \end{aligned}$$
(42)
$$\begin{aligned} & \left\{ \begin{array}{l} \max _{{\varvec{u}} \in {\varvec{U}}_{l},{\varvec{y}}_{21} \in {\mathcal {Y}}} \min _{{\varvec{y}}_{1} \in {\mathcal {Y}}} \min _{{\varvec{y}}_{22} \in {\mathcal {Y}}} {\varvec{c}}^{\textrm{T}} {\varvec{y}}_{22} \\ \text{ s.t. } {\mathcal {X}}, {\varvec{U}}_{l}, {\mathcal {Y}} \end{array}\right. \end{aligned}$$
(43)
Algorithm 1
figure a

Customized nested C&CG algorithm.

Case study

In this section, simulation experiments are carried out on a MATLAB /YALMIP simulation platform using a laptop with an Intel i9-10855H CPU and 16 GB of RAM.

The modified IEEE 33-bus CPDS

The modified IEEE 33-bus CPDS is shown in Fig. 2. The topology of the communication network is the same as the distribution system. Buses of the distribution system and communication nodes correspond one-to-one. The voltage base is 12.66 kV, and the secure voltage range is set as 0.9-1.1 p.u. The active and reactive power capacities of the DGs are 0.4MW and 0.35Mvar. The critical power users are located on buses 10, 19, 24, 26, 29, and 32, respectively. The penalty cost of non-critical load shedding is set to $5000/MW, while the cost of critical load shedding is 100 times as much as that. The cost of line hardening is $240,000/km. The total budget is $300,000. The maximum number of hardened lines is 3. \(a ^{\text {BSS}}\) and \(a ^{\text {SOP}}\) are set as 0.1. In addition, the parameters of BSS and SOP are listed in Table 2. Other parameters can be found in reference34.

Fig. 2
figure 2

Schematic of the modified IEEE 33-bus CPDS.

Table 2 Parameters of BSS and SOP.

Impact of typhoon attacks on the CPDS

To evaluate the impact of typhoons on the CPDS, we use the Monte Carlo method to simulate 400 typhoon attack events based on Batts model30, where the top 5 events are shown in Table 3. Then, we solve the resilience-oriented two-stage RO model with the scenarios of the top 5 typhoon events, respectively. The simulation results are listed in Tables 4 and 5. As illustrated in Table 4, there are some worst-case contingencies in common in the case of the top 5 events, such as the collapse of lines 21-22, 6-7, 7-8, 32-33 and 14-15, which is conducive to evaluating the weak cyber-physical coupling parts of the CPDS during typhoons. The corresponding load shedding cost is given in Table 5. Compared to Zones 1 and 2, Zone 3 is vulnerable to typhoons and thus has the largest load-shedding cost.

Table 3 Top 5 of typhoon attacks.
Table 4 Worst-case scenarios of damaged lines.
Table 5 Optimal results for RO model related to the Top 5 events.

Defense strategies under various attacks

To demonstrate the advantage of the proposed planning-operation strategy against typhoons, the following three cases are utilized to be investigated under \(k_{\gamma }=3\).

Case 1: In the resilience-oriented two-stage RO model, the SOP is not considered to be deployed in the CPDS.

Case 2: In the resilience-oriented two-stage RO model, the BSS is not considered to be deployed in the CPDS.

Case 3: In the resilience-oriented two-stage RO model, the proposed defense strategies are considered therein.

It can be seen from Fig. 3 that four BSSs are deployed on buses 10, 19, 24, and 32, respectively, in Case 1. Meanwhile, Case 2 in Fig. 3 deploys SOPs on buses 8, 14, 22, 24, 27, and 32 to transmit power flow. However, Case 3 deploys the same number of SOPs as Case 2 but less 2 BSSs than Case 1. Notably, the number of wireless configuration buses is 8, 7, and 9 for Cases 1, 2, and 3, respectively, indicating that the backup communication plays a critical role in sustaining the power supply during disasters. Besides, the same reinforcement strategies can be found in Cases 1, 2, and 3 of Fig. 3, where overhead lines 26-27, 27-28, and 28-29 are hardened. Furthermore, compared to Case 1 in Fig. 3, Case 2 cannot ensure the critical load power supply on buses 10 and 19, which means that BSS deployment provides better resilience than SOP allocation. It is validated in Table 6 that Case 2 has the largest load-shedding cost among all cases. Based on Case 1, Case 3 further reduces load-shedding cost with additional SOP deployment. Therefore, the proposed planning-operation strategy has the best resilience to resist typhoon attacks. Moreover, in Table 6, the solution time of Case 3 is just tens of seconds longer than that of the other cases, which further demonstrates the feasibility of the proposed strategy. Furthermore, it can be seen in Fig. 4 that Case 3 enables more communication connections than Cases 1 and 2. As a result, fewer local controllers are activated in Case 3 than in Cases 1 and 2 for the load power supply. Based on the above results, the proposed planning-operation strategy is capable of mitigating cyber-physical coupling failures.

Fig. 3
figure 3

Defense strategies against the worst-case scenarios of typhoon attacks.

Table 6 Optimal results for Cases 1, 2, and 3.
Fig. 4
figure 4

Communication and local control against the worst-case scenarios of typhoon attacks.

Sensitivity analysis

To explore the impacts of investment budgets and typhoon attacks on the resilient CPDS, a sensitivity analysis for the resilience-oriented RO model in Case 3 is further performed. It can be seen in Fig. 5 that load-shedding cost changes with differences in typhoon attacks and investment budgets. To be specific, when budgets are inadequate, load-shedding costs rise significantly with the increasing number of attacks. The reason is that critical loads cannot be supplied during typhoons. Furthermore, as investment costs increase from $200K to $300K, load-shedding costs go through rapid reduction due to the timely supply of critical loads by BSSs and SOPs. Nevertheless, there has not been any change in load-shedding costs, although budgets have increased to $400K. Thus, system planners should allocate investment budgets reasonably according to the degree of typhoon attacks to balance economic benefits. In addition, the solution time of the proposed model under various typhoon attacks is given in Table 7. The increase in typhoon attacks can impose the additional burden of solving the model, however, which is in a reasonably acceptable range. As seen in Table 7, this is because more iterations are needed to obtain worse-case scenarios of typhoon attacks.

Fig. 5
figure 5

Load shedding costs under various budgets and typhoon attacks.

Table 7 Solution time under various typhoon attacks.

The validation of the modified IEEE 123-bus CPDS

The modified IEEE 123-bus CPDS is utilized to further validate the effectiveness of the proposed model and method. For the convenience of representation, we just give the distribution system as shown in Fig. 6. It should be noted that power buses and communication nodes correspond one-to-one, and thus the topology of the communication network is the same as the distribution system. The control center is located on bus 150. The total budget is $600,000. The maximum number of hardened lines is 6. Other parameters can be found in Part A of this section.

Fig. 6
figure 6

Schematic of the modified IEEE 123-bus CPDS.

Taking \(k_{\gamma }\)=4 as an example in Fig. 7, there are 4 BSSs deployed in buses 38, 65, 70, and 103, as well as 3 SOPs deployed on buses 4, 16, 18, 57, 151, and 300. Besides, wireless communication is configured to ensure communication for DGs, BSSs, and SOPs with the control center during typhoons. The overhead lines 18-19, 64-65, 65-66, 102-103, 103-104, and 108-109 are hardened against typhoon attacks. Furthermore, it can be seen in Table 8 that with the increasing number of typhoon attacks, the load shedding cost and solution time first significantly grow and then steadily rise.

Fig. 7
figure 7

Defense strategies against the worst-case scenarios given \(k_{\gamma }=4\) and 6 hardened lines.

Table 8 Optimal results and solution time under various typhoon attacks.

Conclusion

To improve CPDS resilience, this paper proposes a resilience-oriented two-stage RO model for planning-operational restoration measures, which can be effectively solved by the customized NC&CG method. Numerical studies in Section V illustrate the advantage of the proposed model and approach. The conclusions are summarized as

1) According to Monte Carlo simulation of the sequential typhoon attacks, the vulnerable cyber-physical coupling parts of the CPDS can be identified in advance of the typhoon, which is conducive to making an effective resilience-oriented defense strategy for the CPDS against the upcoming typhoon.

2) Three cases are compared to validate the advantage of the proposed planning-operation measures. The proposed measures can not only ensure the load power supply but also reduce the risk of communication interruption, exhibiting better resilience for cyber-physical coupling failures.

3) A sensitivity analysis enables the system planner to readily achieve a tradeoff between strategy robustness and economic benefits. Moreover, the solution time of the proposed model is reasonably acceptable, although the uncertainty of typhoon attacks increases, demonstrating the good practicality of the model.