• Aucun résultat trouvé

Pricing mechanisms for cooperative state estimation

N/A
N/A
Protected

Academic year: 2021

Partager "Pricing mechanisms for cooperative state estimation"

Copied!
5
0
0

Texte intégral

(1)

HAL Id: hal-00771239

https://hal-supelec.archives-ouvertes.fr/hal-00771239

Submitted on 8 Jan 2013

HAL is a multi-disciplinary open access

archive for the deposit and dissemination of sci-

entific research documents, whether they are pub-

lished or not. The documents may come from

teaching and research institutions in France or

abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire HAL, est

destinée au dépôt et à la diffusion de documents

scientifiques de niveau recherche, publiés ou non,

émanant des établissements d’enseignement et de

recherche français ou étrangers, des laboratoires

publics ou privés.

Pricing mechanisms for cooperative state estimation

Elena Veronica Belmega, L. Sankar, Harold Vincent Poor, Mérouane Debbah

To cite this version:

Elena Veronica Belmega, L. Sankar, Harold Vincent Poor, Mérouane Debbah. Pricing mechanisms

for cooperative state estimation. ISCCSP 2012, May 2012, Rome, Italy. pp.1-4, �10.1109/IS-

CCSP.2012.6217856�. �hal-00771239�

(2)

PRICING MECHANISMS FOR COOPERATIVE STATE ESTIMATION

E. V. Belmega

†,‡

, L. Sankar

, H. V. Poor

, and M. Debbah

† Dept. of Electrical Engineering, Princeton University, Princeton, NJ 08544,

‡ Sup´elec, 91192 Gif-sur-Yvette Cedex, France

belmega@ensea.fr, {lalitha, poor}@princeton.edu, merouane.debbah@supelec.fr

ABSTRACT

The conflict between cooperation in distributed state esti- mation and the resulting leakage of private state information (competitive privacy) is studied for an interconnected two re- gional transmission organizations (RTOs) model of the grid.

Using an information theoretic rate-distortion-leakage (RDL) tradeoff model, each RTO communicates at a rate chosen to optimize an objective function that is dependent on two op- posing quantities: a rate-distortion based pricing function that encourages cooperation, and a leakage function that impedes it. It is shown that strictly non-zero pricing incentives are re- quired to achieve non-trivial target distortions.

Index Terms— Competitive privacy, distributed state estimation, rate-distortion-leakage tradeoff, pricing mecha- nisms

1. INTRODUCTION

The electric power industry is undergoing profound changes as greater emphasis is placed on the importance of a smarter grid that supports sustainable energy utilization. Technically, power system estimation and control are likely to involve many more fast information gathering and processing devices (e.g. Phasor Measurement Units) [1]. Economically, the deregulation of the electricity industry has led to the creation of many regional transmission organizations (RTOs) within a large interconnected power system [2]. Both technical and economic drivers suggest the need for more distributed estimation and control in power system operations.

Traditionally, state estimation requires a central coordina- tor that estimates the state using measurements from all the RTOs. More recently, a distributed approach to this problem has been considered; however, distributed state estimation re- search has dominantly focused on two-tier hierarchical mod- els [3] in which each local control center (e.g., an RTO) esti- mates independently, and at a higher level, a central coordi- nator receives the estimation results from the individual areas

E.V. Belmega is now with ETIS / ENSEA - Universit´e de Cergy-Pontoise - CNRS, Cergy-Pontoise, France. The research was supported in part by the Air Force Office of Scientific Research under MURI Grant FA9550-09-1- 0643, in part by the Army Research Office under MURI Grant W911NF-11- 1-0036, and in part by the National Science Foundation under Grants CNS- 09-05398 and CCF-10-16671.

and coordinates them to obtain a system-wide solution. How- ever, this model does not scale with increasing measurement rates due to communication and reliability challenges inher- ent in systems with one coordination center. Furthermore, the physical interconnectedness of the RTOs makes the problem of wide area monitoring and control important and immedi- ate. This requirement of estimating state precisely and often is driving the need for a fully distributed approach (without a central coordinator) to state estimation wherein the local con- trol centers interactively estimate the system state as a whole.

In [4], the authors introduce a competitive privacy no- tion at the level of the RTOs to capture the conflict between sharing data for distributed estimation (utility/benefit to all RTOs) and withholding data for economic and end-user pri- vacy reasons. Assuming that the RTOs are willing to coop- erate, they present an information-theoretic rate-distortion- leakage framework for a two-RTO network and show that each RTO has to tolerate a level of information leakage pro- portional to the fidelity (distortion) required at the other RTO.

A natural question that arises is whether such a cooperation can be achieved via incentives. In this paper, we address this question by introducing a pricing-based objective function at each RTO that depends on two opposing quantities: a rate- distortion based pricing function that encourages cooperation, and a leakage function that impedes it. We show that strictly non-zero pricing incentives are required to achieve non-trivial target distortions.

This paper is organized as follows: in Sec. 2, we describe our model and in Sec. 3 we develop our main results. We illustrate our results in Sec 4 and conclude in Sec. 5.

2. SYSTEM MODEL AND PROBLEM FORMULATION

In [4], the authors present a linearized noisy Gaussian mea- surement model at the RTOs; thus, a vector of measurements at each RTO is a noisy linear function of the system states, i.e. Y1 = X1+ αX2+ Z1, Y2 = βX1+ X2+ Z2 where α > 0, β > 0. The states, X1, X2, are assumed to be in- dependently Gaussian distributed and the additive Gaussian noises,Z1, Z2, are assumed to be independent of the RTO states and of fixed variances σ12, σ22 . RTO j, j ∈ {1, 2},

(3)

encodes (quantizes) its measurement vector at a rate (in bits per measurement)Rj. The encoding is subject to satisfying two constraints: a distortion requirement of the state esti- mate at the other RTO (cooperation) and a leakage require- ment (privacy) on the information leaked about its state to the other RTO. LetDjandLjdenote the fidelity (distortion) and leakage requirements of the estimate at RTOj, j ∈ {1, 2}

whereDj is the mean square error between the original and reconstructed state vectors andLj is the average mutual in- formation between the state vector at each RTO and the re- vealed data and measurement vector at the other RTO. We refer the reader to [4] for additional details. For notational convenience, throughout the sequel, we develop the results for RTOj and denote the other RTO by i ∈ {1, 2} \ {j}.

For this model, the authors show the optimality of an en- coding scheme in which each RTO encodes its measurements to satisfy the distortion constraint at the other RTO and toler- ates a resulting level of privacy leakage. We summarize the resulting the rate-distortion-leakage tradeoff in the following theorem.

Theorem 2.1 [4] The rate-distortion-leakage tradeoff (R1, R2, D1, D2, L1, L2) is given as follows. For RTO j, j ∈ {1, 2}, and i ∈ {1, 2} \ {j}, we have

• Di< Dmax,i:

Rj= 1

2log cjm2j Di− Dmin,i

!

, and (1)

Lj= 1

2log m2j

m2jDmin,j+ n2j(Di− Dmin,i)

!

; (2)

• Di≥ Dmax,i:Rj= 0 and Lj= log (Vi/(Vi− qj)) /2, whereq1= β, q2= α, V1= 1 + α2+ σ21,V2= 1 + β2+ σ22, E = α + β, cj = V1VV2E2

i ,n1= VV2βE

1V2E2,n2= VV1αE

1V2E2, m1=VαV2E

1V2E2,m2=VβV1E

1V2E2 and

Dmin,1= 1 −(β2V1+ V2− 2βE)

(V1V2− E2) , (3a) Dmin,2= 1 −(V1+ α2V2− 2αE)

(V1V2− E2) , (3b) Dmax,j= 1 − 1

Vj

. (3c)

Assuming perfect knowledge of the system parameters at both RTOs, we model the state estimation problem as two independent optimization problems.

We writeRj(Di) to denote the feasible set of rates Rj

at RTOj for which a target distortion Di can be achieved at RTOi. From the achievable rate-distortion-leakage trade- off in [4] we have that, ifDi < Dmax,i, thenRj(Di) =

log cjm2j/(Di− Dmin,i) /2, ∞, else Rj(Di) = [0, ∞).

LetRmin,j Di

, log cjm2j/(Di− Dmin,i) /2 denote the minimal rate at which RTOj encodes its observation to guar- antee a distortionDiat RTOi.

We define an objective functionuj: Rj→ [0, ∞) as:

uj(Rj) = −Lj(Di(Rj)) + hj(Rj) (4) whereDi(Rj) represents the distortion-rate function at RTO i, Lj(Di(Rj)) represents the leakage of information at RTO j when it transmits at rateRjto satisfy a distortion requirement Diat RTOi, and hj(Rj) is the economical reward that RTO j receives for cooperating with RTO i at rate Rj. We write (Rj, Lj(Rj)) to denote the rate-leakage pair that maximizes the objective function.

3. PRICING MECHANISMS

Before presenting the proposed pricing mechanisms, we briefly analyse the particular case where hj(·) = 0. The objective of each RTO is to choose its own communication rate that will minimize its leakage. From Theorem 2.1, we have that:

Lj(Rj) = −1

2log Dmin,j+ cjn2j2−2Rj .

Note thatLj(Rj) strictly increases with Rj. This implies that the optimal strategy is Rj = 0 if Di ≥ Dmax,i, and Rj = Rmin,j(Di), otherwise. Thus, the achievable distor- tion pair is the minimum required distortions(D1, D2) and the achievable leakagesLj Rj , j ∈ {1, 2}, are given in (2) and replacingDiwithDi. Thus, in the absence of any incen- tives to cooperate, minimizing the leakage will either lead to a trivial solution (Rj = 0, j ∈ {1, 2}) or an enforced coop- eration to achieve a desired target distortion pair(D1, D2).

3.1. Linear pricing

We start by analyzing a simple pricing scheme where the in- centive RTOj receives for cooperating increases linearly with the rate Rj. In this case, the objective function of RTOj is given byuj(Rj) = −Lj(Di(Rj)) + pjRj. We observe that lim

Rj→∞

uj(Rj) = ∞, i.e., the rewarding mechanism com- pletely dominates the leakage term and, thus, the RTOs are incentivized to exchange data at infinitely large rates.

Since each RTO is cooperating to achieve a target distor- tion at the other RTO, we now consider a pricing mechanism that explicitly takes this into account. We consider the fol- lowing objective function:

uj(Rj) = −Lj(Di(Rj)) + pj(Dmax,i− Di(Rj)) (5)

= 1

2log Dmin,j+ cjn2j2−2Rj −

pj Dmin,i+ cjm2j22Rj + pjDi,max, (6) where in (5) RTOj is rewarded proportionally to the reduc- tion in the distortion at the other RTO (Dmax,i−Di(Rj)), and

(4)

(6) results from substituting (1) and (2) in (5). We thus have

Rlimj→∞uj(Rj) = 1/2 log(Dmin,j)+ pj(Dmax,i− Dmin,i) <

∞ and therefore it is not necessarily optimal for RTO j to perfectly share its observation.

From the objective function and its first order derivative, we further classify the optimal solution in different categories as described below. To this end, we define

T1,j ,(2 ln 2)mn2j2 jDmin,j, T2,j ,(2 ln 2)[n2 n2j

j(DiDmin,i)+m2jDmin,j], T3,j , log

1 + mn2j2 j

DiDmin,i Dmin,j

.2(Di− Dmin,i) .

I. pj≥ T1,j: for this caseuj(Rj) increases with Rj, and thus,Rj → ∞. This means that, if the price is high enough, then the leakage term is dominated by the eco- nomic incentives.

II. pj < T1,j: hereuj(Rj) decreases for Rj ≤ ˜Rj(pj),

1

2log (2 ln 2)pjcjn2 jm2j n2j(2 ln 2)pjm2jDmin,j



and increases for Rj >

j(pj). We now have two sub-cases depending on the relative order of ˜Rj(pj) and Rmin,j(Di) (recall that Rmin,j(Di) is the inferior bound of the feasible rate set).

1. pj < T2,j < T1,j: here ˜Rj(pj) < Rmin,j(Di) which implies that, in the feasible domain,uj(Rj) increases withRjand the optimal rateRj → ∞.

2. T2,j ≤ pj < T1,j: here ˜Rj(pj) ≥ Rmin,j(Di), i.e., R˜j(pj) lies inside of the feasible domain. Since the function is convex, the optimal rate is on the bound- ary. If T2,j ≤ pj ≤ T3,j, then uj(Rmin,j(Di)) ≥

Rlimj→∞uj(Rj) and the optimal rate is Rj = Rmin,j(Di), else (ifT3,j< pj< T1,j) the optimal rate isRj → ∞.

Thus, depending on the system parameters andp1,p2, the op- timal rates are on the borders of the feasible rate sets: either Rj = Rmin,j(Di) or Rj → ∞, j ∈ {1, 2} which can viewed as a solution involving a hard decision. Next we consider a non-linear pricing model that will allow us a smoother manip- ulation of the optimal rates w.r.t. the prices.

3.2. Non-linear pricing

Since the communication (source coding) rates are propor- tional to the logarithm of distortions, we now consider a loga- rithmic pricing function. The non-linear objective function of RTOj is:

uj(Rj) = −Lj(Rj) − pjlog(Di(Rj)) + pjlog(Dmax,i)(7)

= 1

2log Dmin,j+ cjn2j2−2Rj − pjlog (Dmin,i+ cjm2j22Rj + pjlog(Dmax,i). (8)

Let T0,j = 0.5 , and T1,j ,12DDmin,jmin,imn2j2 j, T2,j ,12m2 Din2j

jDmin,j+n2j(DiDmin,i), T3,j , log

1 + mn2j2 j

DiDmin,i Dmin,j

. h2 log

1 +DiDDmin,i

min,i

i.

Following a similar analysis as the previous subsection, we obtain:

I. pj ≥ max {T0,j, T1,j}: for this case uj(Rj) increases withRj, and thusRj → ∞.

II. pj≤ min {T0,j, T1,j}: here uj(Rj) decreases with Rj, and thusRj = Rmin,j(Di). If the price is lower than a certain threshold, then the leakage term dominates the economic incentives.

III. pj ∈ (T1,j, T0,j): here uj(Rj) is decreasing for Rj ≤ R˜j(pj) and increasing for Rj≥ ˜Rj(pj) where

j(pj),1

2log cjn2jm2j(1 − 2pj) 2pjmjDmin,j− n2jDmin,i

! .

We now have two sub-cases depending on the relative order of ˜Rj(pj) and Rmin,j(Di).

1. T2,j < pj < T0,j: here Rmin,j(Di) ≤ ˜Rj(pj) and R˜j(pj) lies inside of the feasible domain. Since the function is convex, the optimal rate is on the bound- ary. If T3,j < pj < T0,j, then uj(Rmin,j(Di)) <

Rlimj→∞uj(Rj) and the optimal rate is Rj → ∞, else (ifT2,j < pj ≤ T3,j) the optimal rate isRj = Rmin,j(Di).

2. T1,j < pj ≤ T2,j: for this caseRmin,j ≥ ˜Rj(pj) which implies that, in the feasible domain,uj(Rj) is increas- ing withRjandRj → ∞.

IV. pj ∈ (T0,j, T1,j): here uj(Rj) increases for Rj ≤ R˜j(pj) and decreases for Rj ≥ ˜Rj(pj). The optimal rate will depend again on the relative order of ˜Rj(pj) andRmin,j(Di).

1. T2,j < pj < T1,j: hereRmin,j(Di) ≤ ˜Rj(pj), i.e.

j(pj) lies inside of the feasible domain. Since the function is concave, the optimal rate isRj = ˜Rj(pj) which explicitly depends onpj.

2. T0,j < pj ≤ T2,j: hereRmin,j(Di) ≥ ˜Rj(pj) which implies that, in the feasible domain,uj(Rj) is decreas- ing withRjand the optimal rate isRj = Rmin,j(Di).

Notice that cases III and IV are mutually exclusive depending on the relative order ofT0,j andT1,j. Also, we obtain that, depending on the system parameters and for a certain price range the optimal rateRj depends explicitly onpj. This de- pendence will be illustrated via numerical simulations.

(5)

4. NUMERICAL SIMULATIONS

We illustrate our results for the non-linear pricing model for the following parameters: α = 0.5, β = 0.9, σ12 = 0.1, σ22 = 0.1. We choose the target distortions as Dj = Dmin,j + (Dmax,j − Dmin,j)/2, j ∈ {1, 2}. For these pa- rameters we have: Dmin,2 = 0.3088, Dmax,2 = 0.4764, Dmin,1 = 0.2183, Dmax,1 = 0.2593, T1,1 = 1.5093, T2,1 = 1.0548. T1,1 andT2,1 alongside withT0,1 = 0.5 are the vertical asymptotes.

We plot the optimal rate for RTO 1 as function of thep1

in Fig. 1. If the price is low (p1 < T2,1) the optimal rate is R1 = Rmin,1(D2). If the price is high (p1 ≥ T1,1) the op- timal rate isR1 → ∞. If T2,1 ≤ p1 < T1,1, the solution is non-trivial and depends explicitly onp1, i.e.,R1 = ˜R1(p1).

In Fig. 2, we observe that if p1 is below a certain thresh- old, the leakage term dominates the economic incentive and the resulting utility is negative. The optimal utility is increas- ing withp1. Therefore, even though the leakage is increasing withp1, this is compensated by the pricing function. Finally, in Fig. 3, we observe that the distortion of RTO 2 decreases withp1. Most interestingly, in contrast to the linear pric- ing model, an RTO can be incentivized to reveal more than needed to achieve the target distortion thereby further reduc- ing the distortion of the other RTO. Furthermore, any distor- tionD2∈ (Dmin,2, D2] can be achieved by a unique value of the pricep1.

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6

−3

−2

−1 0 1 2 3 4

p1

Optimal rate of RTO 1

α=0.5, β=0.9, σ1222=0.1

Re1(p1) Rmin,1(D2) R1

T0,1=0.5

T2,1=1.0548

T1,1=1.5093

Fig. 1.Optimal rate as functions of the price: R1(p1)

5. CONCLUSIONS

Based on the concept of competitive privacy [4], we have pre- sented a pricing based optimization framework to study the distributed state estimation problem at the RTO level. We have shown that, in the absence of pricing incentives, pri- vacy takes precedence over cooperation. Using linear and non-linear pricing functions, we have shown that it is pos- sible to incentivize the RTOs to cooperate and achieve their desired distortion levels. Future work includes coupling the

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8

−1

−0.5 0 0.5 1 1.5 2 2.5 3 3.5 4

p1

Optimal utility of RTO 1

α=0.5, β=0.9, σ1222=0.1

u1(R 1

*) = − L 1(R

1

*) + h 1(R

1

*)

L1

*(R 1

*)

h1(R 1

*)

T0,1=0.5

T2,1=1.0548

T1,1=1.5093

Fig. 2. Optimal utility, leakage, pricing of RTO 1 as functions of the price:

u1(R1(p1)), L1(R1(p1)), h1(R1)

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8

0.31 0.32 0.33 0.34 0.35 0.36 0.37 0.38 0.39 0.4

p1

Optimal distortion of RTO 2

α=0.5, β=0.9, σ1222=0.1

T0,1=0.5

T2,1=1.0548

T1,1=1.5093

Fig. 3.Optimal distortion of RTO 2 as function of the price: D2(R1(p1))

optimization problems which can lead to game theoretic so- lutions.

6. REFERENCES

[1] A. Bose, “Smart transmission grid applications and their sup- porting infrastructure”, IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 11–19, Jun. 2010.

[2] F. F. Wu, K. Moslehi, and A. Bose, “Power System Control Centers: Past, Present, and Future”, Proc. IEEE, vol. 93, no. 11, pp. 1890–1908, Nov. 2005.

[3] T. Van Cutsem, J. L. Horward, and M. Ribbens-Pavella, “A two- level static state estimator for electric power systems”, IEEE Trans. Power Apparatus and Systems, vol. 100, no. 8, pp. 3722–

3732, Aug. 1981.

[4] L. Sankar, S. K. Kar, R. Tandon, H. V. Poor, “Competitive Pri- vacy in the Smart Grid : An Information-theoretic Approach”, Smart Grid Communications, Brussels, Belgium, Oct. 2011.

Références

Documents relatifs

In this paper, our goal is firstly to design an adaptive observer in order to estimate the unmeasurable state variables of the system and to identify the unknown

In this paper, we investigate whether better distortion levels can be achieved as a result of repeated interactions among selfish agents using a non-cooperative repeated

In this paper, we investigate the empirical coordination with non-causal encoding and decoding and we characterize the optimal solutions for three particular cases: perfect

Index Terms —Shannon theory, state-dependent channel, state leakage, empirical coordination, state masking, state amplifica- tion, causal encoding, two-sided state information,

Index Terms —Shannon theory, state-dependent channel, state leakage, empirical coordination, state masking, state amplifica- tion, causal encoding, two-sided state information,

In this paper, we have considered distributed bounded- error state estimation applied to the problem of source tracking with a network of wireless sensorsT. Estimation is performed in

An interesting question is thus whether a condition of weak ground state intraenvironmental correlation, may be compatible with the existence of particle-oscillator intermediate

Separators extend the operations allowed for contractors to non monotonic