Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2025 Dec 30;15:45478. doi: 10.1038/s41598-025-29476-3

Powering and mobility through disasters: a dial-a-ride problem for electric taxis with charging and discharging regulations

Hamid R Sayarshad 1,
PMCID: PMC12748746  PMID: 41462526

Abstract

This study proposes an integrated strategy to effectively utilize electric taxis (ETs) for post-event recovery of power distribution networks (DNs) in disaster scenarios. The approach addresses a dial-a-ride problem (DARP) by coordinating charging and discharging regulations to improve grid security. It focuses on optimal taxi routes, considering charging, and limited range. The model highlights proactive strategies such as pre-positioning electric taxis (ETs) with vehicle-to-grid (V2G) capabilities and reconfiguring the power distribution network. A network interdiction strategy is implemented to reduce cyberattacks on the power distribution network. The results demonstrated the importance of a holistic approach considering various factors, including routing costs, cybersecurity implications, and optimal power flow constraints. When tested with New York taxi data, the hybrid planning approach emerged as the most effective model. It resulted in the lowest total tour length, reduced power load shedding, and fewer vulnerable system nodes to cyberattacks compared to other cases examined.

Keywords: Dial-a-ride problem (DARP), Cyberattacks, Vehicle-to-grid (V2G), Power distribution resilience, Charging and discharging regulations

Subject terms: Energy science and technology, Engineering, Mathematics and computing

Introduction

The resilience of transportation systems is crucial during disaster events, as reliable mobility plays a vital role in effective emergency response, safe evacuation of affected populations, and the continuity of essential services. The ability to quickly mobilize and transport people and resources becomes even more critical when disasters occur. These disasters can impact all modes of transportation, including traditional gasoline/diesel vehicles and electric vehicles (EVs), along with their charging infrastructure1. In the case of ET vehicles, power outages affecting charging stations can render them immobile unless they have sufficient battery charge to reach an operational charger. Consequently, transportation systems often face challenges in meeting the heightened demands and disruptions caused by such crises.

Similarly, the resilience of DNs is crucial in power outages caused by disasters such as typhoons2,3, wildfires4,5, extreme heat and cold6, earthquake7, and cyberattacks8,9. These disasters have the potential to cause significant disruptions in electricity distribution, resulting in prolonged power outages and inconvenience for consumers. For instance, the digital era has brought significant advancements to the power sector, enabling efficient monitoring and control of distribution systems (DSs). However, this increased connectivity has also exposed power grids to the risk of cyberattacks. In recent decades, cyberattacks have targeted the DNs, leading to disruptions in electricity supply and potential damage to critical infrastructure. These attacks emphasize the need for robust strategies to protect power grids against cyber threats10. Therefore, there is a growing demand to enhance the resilience of DNs, ensuring a continuous and reliable supply of electricity to end-users.

The increasing vulnerability of modern power grids and charging infrastructure to cyberattacks poses a significant threat. This vulnerability results from the widespread use of digital technologies and interconnected systems11. Malicious actors can exploit weak points in the DN, such as smart meters, substation controllers, and power lines, to infiltrate control systems and disrupt grid operations, including EV charging12. The consequences of these cyberattacks can be severe, leading to equipment damage, voltage fluctuations, and widespread blackouts that impact critical infrastructure, essential services, and EV charging networks13. Real-world incidents, like the 2016 attack on Ukraine’s electric utility, highlight the tangible impact of these threats14. As the frequency and complexity of cyberattacks continue to rise, power utilities, EV charging providers, and policymakers must develop effective strategies to prevent, detect, and respond to these threats.

Deploying backup sources within DNs is a practical approach to enhance their resilience15. These backup sources, including distributed generators and energy storage systems, can provide additional power supply during outages, minimizing the impact of disaster events16,17. The use of mobile power sources (MPSs) has emerged as a promising solution to enhance the resilience of distribution systems (DS) against extreme weather events18. MPSs encompass EV fleets, truck-mounted mobile energy storage systems, and emergency generators. Their flexibility and mobility make them valuable in mitigating the impacts of such events on critical loads.

The development of transportation electrification offers an opportunity to enhance the resilience of DNs through the use of ETs and Vehicle-to-Grid (V2G) technology1921. Projections indicate that by 2030, EVs will account for 7.7% of China’s electricity consumption, and V2G technology will play a key role in optimizing load curves and improving grid efficiency22. Implementing V2G can reduce power system costs by approximately 2% and decrease carbon emissions by 2-3%23. Intelligent charging management can yield over 20% savings in power purchase costs for operators and users24. Moreover, by 2030, EVs could offer flexible regulation capacity equivalent to more than 10% of China’s annual renewable electricity generation24. However, the dispatch of ETs within DSs needs to be adequately investigated.

The growing number of ETs in urban transit, driven by the increasing adoption of EVs and the demand for sustainable transportation, creates an opportunity to utilize these taxis for the recovery of DNs after events25,26. ETs, equipped with bidirectional charging capabilities, not only offer on-demand mobility services but also serve as distributed energy storage resources that can support the stability and resilience of the local power grid during emergencies. By dispatching ETs to charge stations according to a strategic plan, power can be fed back to the grid during disaster events, supplementing existing backup sources and facilitating the restoration of power supply27. For instance, a study on 19,900 ETs in Shenzhen demonstrated their ability to supply a minimum of 50 MW for 1 hour during peak periods without disrupting regular operations26.

Reconfiguring a DN by incorporating backup power sources, particularly through V2G systems using electric taxis, is essential for enhancing resilience. These ETs can serve as mobile backup power sources, feeding energy back into the grid during outages or disruptions, thereby ensuring a continuous electricity supply when primary sources are compromised. To optimize the utilization of ETs for the recovery of DNs after events, this study proposes an innovative approach called the electric DARP. Figure 1 displays an integrated system of taxicab dispatching system and the power grid facing cyber attack threats. This approach incorporates routing, charging, and discharging plans for ETs. It aims to enhance the coordination between taxicab dispatching and power grid security, specifically in cyberattack disasters. This integrated approach encompasses four key features. Firstly, it focuses on efficient DARP for ET fleets, ensuring reliable and on-demand transportation services for customers. Secondly, it integrates the V2G capabilities of ETs, enabling them to contribute to grid resilience by feeding power back to the grid when needed. Thirdly, it formulates a network interdiction problem to strategically disrupt the propagation of cyberattacks across power grids by identifying and removing critical network elements. Lastly, it proactively reconfigures the DNs into a less impacted or stressed state. To establish a robust foundation that can withstand the challenges posed by extreme events, the study applies an optimal power flow problem to manage power dispatch between generators and electric buses effectively. This comprehensive approach aims to enhance the resilience and efficiency of DNs during post-event recovery.

Fig. 1.

Fig. 1

Integrated electric taxi dispatching system and power grid network under cyber attack threats.

This study proposes a novel approach to tackle the challenges associated with the DARP for ETs, with a particular focus on power flow and minimizing the impact of disruptions, such as cyberattacks, on the power network. The proposed strategy is visually represented in Fig. 2. The DARP enables customers to request transportation services from their current locations to their desired destinations28. ETs are dynamically routed to effectively fulfill these requests, considering various factors, including passenger preferences for travel costs and pickup/drop-off locations, as well as driver considerations such as battery levels and charging requirements (red box). We calculate the energy consumption of electric taxis while servicing customer requests, ensuring efficient travel between specified pickup and drop-off points.

Fig. 2.

Fig. 2

The proposed electric DARP for mitigating cyberattacks on power grids.

A key component of the proposed model is its consideration of charging and discharging regulations for electric taxis, which is crucial for balancing power supply and demand (green box). This aspect ensures that the energy utilized by the ETs aligns with the available power grid capacity, leading to a more sustainable and reliable on-demand service. To enhance the stability of the DNs, the model leverages the V2G capabilities of ETs. These taxis can strategically discharge their batteries and feed electricity back into the grid during periods of high demand or grid instability, providing crucial support and stabilization. The DARP manages this bidirectional energy flow, ensuring that the taxis maintain sufficient charge to continue serving customers while contributing to the power grid’s resilience. Therefore, the proposed DARP considers factors such as the locations of charging and discharging stations, ET battery capacities, anticipated electricity demand during disasters, and prioritization of passenger requests based on urgency and vulnerability.

In a radial topology, electricity flows from a single source through a series of branches to various loads. Reconfiguring a DN by establishing alternative transmission lines creates redundant pathways for electricity flow, allowing the network to reroute power when specific areas are under threat or experiencing failures. This study also introduces a strategic solution by utilizing a formulated network interdiction problem (blue box). Network interdiction involves disrupting the spread of cyberattacks across power grid infrastructure by identifying and removing or disabling critical network connections or components. The goal is to prevent the cascading effect of an attack by strategically isolating the power network lines and substations that the attacker relies on for propagation. To achieve this, the optimal power flow problem (OPF) is applied (yellow box). OPF determines the optimal generation dispatch and power flow across the grid to meet demand while minimizing load-shedding costs. Using OPF, compromised grid components can be quickly identified and isolated, power flows can be rerouted, and grid stability and resilience can be maintained in the face of a cyberattack. Furthermore, OPF optimization can be employed to manage the charging and discharging of ET batteries, enabling them to provide grid services such as voltage support and frequency regulation. This can effectively stabilize the grid and counteract the impacts of a cyberattack. In summary, this study’s contributions can be summarized as follows:

  • We propose a DARP for dispatching ETs that considers the limited battery capacity by directing drivers to stations for charging and discharging while serving customers. We integrate ETs and V2G technology into a DARP, offering a promising pathway to strengthen their resilience and crisis response capabilities.

  • We conduct a comprehensive analysis and optimization of power flows in a DN, considering various disaster scenarios and their impact on grid stability and robustness.

  • We implement a proactive network interdiction strategy to mitigate cyberattacks on the DN. This involves strategically pre-positioning ETs and reconfiguring the network by adding backup power sources and alternative transmission lines to prevent the spread of infections.

Results

The study analyzed and optimized power flows in a DN, considering cyberattack scenarios and their impact on grid stability and robustness. This analysis proved valuable for incorporating ET fleets into the power grid. By leveraging this analysis, taxicab dispatching systems were able to identify optimal locations for charging infrastructure to minimize grid impacts and quantify the precise amounts of power the taxis could supply back to the grid during peak demand periods. The analysis also optimized the dispatch and scheduling of the vehicles to support overall grid operations and evaluated any necessary infrastructure upgrades required to enable the integration. The comprehensive power injection details provided in the analysis guided the strategic placement of charging infrastructure and the efficient dispatch of ETs. The model helped quantify the valuable grid services that ETs could provide, strengthening the business case for their large-scale adoption and seamless V2G participation.

Furthermore, we implemented a proactive network interdiction strategy to mitigate cyberattacks on the DN, instilling confidence in the effectiveness of their cybersecurity measures. This multifaceted approach sought to develop reliable and resilient electric mobility systems that balanced the needs of transportation users and power grid operators. As the threat of cyber threats continues to grow, power utilities must take a proactive approach to strengthening their cybersecurity measures. Implementing this strategy can instill confidence in the effectiveness of the utility’s cybersecurity efforts, assuring customers and stakeholders that the power grid is well-protected against malicious actors.

The proposed model was tested using NYC taxicab data as a case study. This comprehensive benchmarking analysis examined the optimization of ET routing and power distribution system operations. The results demonstrated the importance of a holistic approach considering various factors, including routing costs, cybersecurity implications, and power system constraints. The proposed hybrid planning approach represented in Case 5 was the most effective solution, achieving the lowest total tour length, minimizing power load shedding, and reducing the number of system nodes vulnerable to cyberattacks compared to the other cases examined. Additionally, the results illustrated the total costs associated with varying numbers of ETs, combining both user and system costs. As the number of taxis grew from 2 to 8, total costs consistently dropped, indicating economies of scale and improved operational efficiencies with a more extensive fleet. The analysis also explored cyberattack scenarios across various fleet sizes, showing that as the fleet size increased, the number of removed lines and susceptible nodes decreased, indicating improved network resilience and enhanced cybersecurity measures.

Literature review

This section emphasizes the importance of integrating charging and discharging plans into taxicab routing and dispatching systems to enhance the resilience of DSs. In recent years, the taxicab dispatching and routing field has gained significant attention due to the growing demands of urban transportation. Managing a fleet of taxis to meet customer demands efficiently is a vital focus of this research. ETs require frequent charging to maintain an adequate range, significantly affecting their availability and routing. Several approaches, including mathematical models and dynamic routing algorithms, have been proposed to address this challenge29,30. These approaches aim to optimize taxi assignment while considering the ETs’ charging constraints.

Routing and dispatching strategies play a crucial role in the efficient operation of EVs. Previous studies have focused on optimizing these strategies to improve various aspects such as fuel efficiency, travel time, and customer satisfaction. For example,31 presented a dynamic inventory routing and pricing problem involving a mixed fleet of electric and conventional vehicles to maximize social welfare.32 introduced an approach to optimize the battery swapping infrastructure and scheduling for an urban taxi system, addressing peak demand, service quality, and energy efficiency. 33proposed a dispatching strategy considering taxi demand, remaining power, and charging station availability to reduce charging wait times and increase client opportunities. In this study, we emphasize the potential of optimized routing and dispatch to improve ET efficiency, profitability, and sustainability. Furthermore, by adjusting to the energy needs and real-time availability of charging stations, taxis can effectively meet customer demands. 34emphasized the importance of routing for electric drones in vaccine delivery, addressing logistical challenges such as flight range, payload capacity, and recharging plans to ensure efficient and equitable distribution of vaccines in underserved regions.

V2G technology allows EVs to consume power from the grid and return excess power back to the grid. This bidirectional flow of electricity enables EVs to act as distributed energy resources, contributing to the stability and resilience of DNs20. Several studies have explored the potential benefits of V2G technology in mitigating the impact of disasters. For instance,35 demonstrated that V2G enhances the reliability of DSs by utilizing EV energy during emergencies.36 investigated the use of EVs to improve resilience in active DNs, particularly during power outages caused by natural disasters. 37discussed the advantages and challenges of V2G implementation, including its potential for ancillary services and the associated battery degradation issues. In this study, we highlight the considerable potential of V2G technology to improve grid stability, reliability, and resilience. Additionally, we explore how optimizing routing and dispatch systems can facilitate smooth trips without anxiety.

Various models explore innovative strategies for enhancing the resilience of DSs using mobile power sources and EVs. For example, a study by38 investigated the dispatch of mobile power sources in coordination with dynamic network reconfiguration, focusing on seismic disasters. 39considered a framework for strategically placing electric vehicle charging stations (EVCSs) in distribution systems, optimizing their locations and scheduling to enhance efficiency and reduce operational costs. Another study by40 proposed a two-stage framework for routing and scheduling mobile power sources to improve system survivability and recovery. In a comprehensive review by41, resilience strategies were examined, highlighting the importance of preparation and resource allocation. Additionally42, presented a two-stage EV coordination framework that enhances network resilience and includes proactive pre-positioning and spatial-temporal dispatching. Our study demonstrates the potential of mobile power sources, especially ETs, to enhance the resilience of power systems in the face of extreme events.

The growing dependence on technology in power distribution systems has heightened their vulnerability to cyberattacks, threatening their stability and resilience. To counter these risks, innovative frameworks are being developed to reduce the impact of such attacks. For example, the framework proposed in43 focused on the optimal deployment of static volt-ampere reactive (VAR) compensators to mitigate voltage violations resulting from false data injection (FDI) cyberattacks in smart distribution grids, covering both planning and operational phases. Another study by44 considered a voltage-based relay scheme to enhance protection systems against cyberattacks on adaptive overcurrent relays. 45investigated the integration of cyber technologies into traditional energy systems, showing potential for improved energy performance and cost-efficiency in smart grids. Additionally,46 explored a graph-based model for interdependent cyber-physical risk analysis to assess device criticality and the resilience of networks to cyber threats. Addressing vulnerabilities stemming from the integration of physical and cyber systems47, proposed a distributed compressive sensing (CS) state estimation method for unobservable grids. 48developed models aimed at minimizing the spread of infections in general networks. 49provided a comprehensive review of cyberattacks on power systems, emphasizing impact analysis, detection techniques, and security measures.

Recent studies have increasingly focused on the vulnerabilities of power grids in the context of cyberattacks, particularly as they relate to emerging technologies and distributed energy resources. For instance50, examined the impact of cyberattacks on power grids with distributed energy storage, suggesting that widespread storage could increase vulnerabilities if not managed properly. 51focused on enhancing the security and efficiency of interconnected power grids and EV charging stations specifically for private vehicles, not for shared vehicles like taxis. 52explored resilient operation that incorporates renewable energy sources and battery storage systems in the face of physical and cyberattacks. 53proposed advanced distributed control algorithms to manage distributed energy resources efficiently, along with anomaly detection and mitigation techniques to minimize the impact of cyberattacks. Moreover, mobile energy resources have the potential to enhance power grid stability and resilience. 9examined the capacity of V2G to maintain the stability of the grid and facilitate the mobility of electric vehicles during disasters. A review by54 focused on mobile energy storage systems, including truck-mounted and towable batteries, for supporting critical loads during outages. In this study, we introduce regulations for charging and discharging, along with considerations for routing, passenger load, and energy consumption estimation.

Discussion

The study introduced a DARP for dispatching ETs, considering the limited battery capacity during customer service and taxi drivers’ detours to stations for charging and discharging purposes. The model can help taxi companies better manage their fleets, ensuring efficient utilization of the vehicles and minimizing downtime due to battery depletion. This can lead to cost savings, improved service reliability, and a more sustainable transportation solution. Furthermore, we integrated ETs and V2G technology into a DARP, offering a promising pathway to strengthen their resilience and crisis response capabilities. Power utilities can prioritize investments, implement targeted reinforcement measures, and develop more effective emergency response plans by identifying the potential impacts of different events on grid stability and robustness. Furthermore, the proposed model can be utilized between the power grid and electric vehicle aggregators to determine the optimal EV fleet size and balance power supply with demand using charging and discharging regulations. EV aggregators act as a link between the grid and EVs, facilitating a more flexible and efficient energy system. This can ultimately lead to a more reliable and secure power supply, benefiting residential and commercial consumers.

Integrating taxicabs with V2G systems presents an opportunity to create a more efficient and resilient DN. This dynamic interaction between taxicabs and the DN significantly contributes to its stability and resilience. Recent research has explored the potential of ETs to enhance mobility and power resilience during disasters55. V2G technology has been introduced to allow ETs to function as mobile energy storage, participating in load restoration alongside traditional emergency power vehicles27. For instance,56 studied the integration of energy services from shared plug-in electric vehicles into a mobility-on-demand platform. Our study aims to integrate the power grid and transportation systems by aligning the incentives of electric taxi drivers, power system operators, and taxi dispatching systems. This approach seeks to balance the competing objectives of meeting essential transportation needs while facilitating energy transfer across the network.

Future research could explore the interplay between various disaster scenarios that simultaneously impact the DN and the transportation network. This could involve combining natural disasters (e.g., hurricanes, earthquakes, wildfires) with cyber-physical attacks to understand the cascading effects and develop more robust mitigation strategies51. Digital twins combined with blockchain technology and machine learning would allow power utilities to develop real-time virtual replicas of their grid infrastructure. This innovation would enable precise simulations of cyberattacks and power outages. By continuously monitoring for anomalies, these simulations would improve the ability to quickly detect and respond to potential threats5760. Additionally, the potential role of shared autonomous vehicles (AVs) in enhancing post-disaster resilience could be investigated, particularly in terms of coordinating charging/discharging plans and optimizing routing to support power grid restoration61.

The integration of multimodal transit systems, including ETs, buses, bikes62 and other modes, and their collective response to disasters also merits further study. The disaster recovery framework could be enhanced by incorporating renewable energy sources such as wind turbines (WT) and photovoltaic (PV) systems, improving overall sustainability and self-sufficiency6368. Advanced solution algorithms could be developed to tackle the complex optimization problems inherent in these integrated transportation-power network recovery strategies, particularly when dealing with medium and large-scale problems6972. Moreover, incorporating an electricity pricing policy and battery degradation costs into the proposed model for bidirectional energy flow between electric vehicles and the grid could provide valuable insights for future research73. Finally, Future studies should investigate V2G strategies in parking lots to optimize energy management and support sustainable urban mobility67,74.

Methods

The proposed framework

When passengers submit their pickup and drop-off locations to the dispatch center, the center must determine the most optimal routes for the taxis to follow to pick up and drop off these passengers. This routing problem considers not only the passengers’ locations but also the locations of charging stations and discharging nodes. Taxi drivers need to visit charging stations periodically to recharge their batteries. Additionally, they may need to visit discharging nodes to stabilize the power network during disasters by supplying power back to the grid (V2G). The dispatch center must consider all these requirements when planning the taxi routes.

The transportation network is formally defined using a subgraph that includes several key elements. These elements consist of the locations of idle ETs (Inline graphic), a dummy node representing the end of a taxi’s path (Inline graphic), the set of passenger pickup points (Inline graphic), and the set of passenger drop-off points (Inline graphic). The taxis must serve n passengers, each with specific pickup and drop-off locations. The dispatch center’s challenge is determining the most optimal routes for the taxis that meet the passengers’ needs while also considering the operational constraints of the ET system. These constraints include managing battery levels through strategic charging and discharging stops to support the power grid during disasters. It is assumed that all nodes are capable of both charging and discharging ETs. These locations, called charging and discharging nodes, serve as physical sites where EVs can be charged and discharged.

The problem considers the interdependencies between the transportation and power networks. The power network includes electric buses (Inline graphic), power lines (Inline graphic), and generators (Inline graphic) that supply electricity to the ETs and other EVs. Furthermore, the growing automation of power grid control systems has raised security concerns, especially regarding vulnerabilities susceptible to cyberattacks. Numerous studies suggest algorithms designed to detect and analyze cyberattacks on network parameter data within electric power systems, with an emphasis on optimal power flow issues57,7578. The proposed model introduces the concept of infection nodes (Inline graphic) and susceptible nodes (Inline graphic) within the power network. These nodes can be vulnerable to cyberattacks, potentially disrupting the power supply. In this study, we assume that the attacker targets specific nodes to disrupt electricity flow and cause power outages, and we are informed about which nodes have been infected. For a comprehensive list of notations used in the model, readers refer to Table 1.

Table 1.

Nomenclature.

Notations Description
N Set of nodes (pickup, drop-off, start node, and end node)
ij Nodes Inline graphic
Inline graphic Pickup nodes, Inline graphic
Inline graphic Drop-off nodes, Inline graphic
v Set of ETs, Inline graphic
L Power transmission lines Inline graphic
B Set of power buses, Inline graphic
G Buses with thermal generators, Inline graphic
I Infected nodes
S Susceptible nodes
Parameter Description
s Starting node of the path
e Dummy node for path termination
Inline graphic Energy consumption between nodes i and j
M Large positive constant
Inline graphic Lower and upper bounds of the time window at node i
Inline graphic Service time at node i
Inline graphic Travel times
Inline graphic Distances
Inline graphic Battery capacity
K Passenger capacity of the taxi
Inline graphic Initial number of passengers in the taxi
Inline graphic Initial charge
Inline graphic Minimum charge at the end of the path
Inline graphic Load shedding cost at bus station j
Inline graphic Cost parameter for susceptible nodes
Inline graphic Resistance between buses i and j
Inline graphic Reactance between buses i and j
Inline graphic Maximum allowed number of power line removals
Inline graphic Set of distinct node pairs with an edge
Inline graphic Set of neighbors of node i
Inline graphic Total reactive power consumed at bus j
Inline graphic Power demand of other consumers
Inline graphic Power factor angle
Inline graphic Voltage limits at bus j
Inline graphic Active power limits at generator bus j
Inline graphic Minimum and maximum reactive power limits at generator bus j
Inline graphic Maximum power demand at bus j
Inline graphic Minimum active power flow between buses i and j
Inline graphic Maximum active power flow between buses i and j
Inline graphic Minimum reactive power flow between buses i and j
Inline graphic Maximum reactive power flow between buses i and j
Decision Variables Description
Inline graphic Binary variable indicating whether the power line between nodes i and j is connected (1) or not (0)
Inline graphic Binary variable indicating whether the power line between nodes i and j is removed (1) or not (0)
Inline graphic Binary variable indicating whether susceptible node i is at risk of infection (1) or not (0)
Inline graphic If the taxi v is charged or discharged at node i, the value is 1; otherwise, it is 0
Inline graphic Binary variable indicating whether taxi v travels from node i to node j (1) or not (0)
Inline graphic Battery level of taxi v at node i
Inline graphic Number of passengers in the taxi v when it leaves node i
Inline graphic Time at which taxi v starts servicing node i
Inline graphic Amount of electricity discharged at node i for taxi v
Inline graphic Amount of charged at node i for taxi v
Inline graphic Charge adjustment at node i for taxi v
Inline graphic Voltage magnitudes at buses i and j
Inline graphic Total active power output of the generator at bus j
Inline graphic Total reactive power output of the generator at bus j
Inline graphic Total active power demand at bus j
Inline graphic Total power demand for charging ET at bus station j
Inline graphic Active power load shedding at bus j
Inline graphic Reactive power load shedding at bus j
Inline graphic Active power flow between buses i and j
Inline graphic Reactive power flow between buses i and j

Energy consumption

This section introduces a function that calculates the expected energy consumption (Inline graphic) based on79. The function incorporates different parameters associated with a vehicle’s power system to determine the energy consumption. It considers three prominent cases based on the signs of the traction power (Inline graphic) and battery power (Inline graphic). When both Inline graphic and Inline graphic are negative, indicating energy generation or recuperation, the function calculates the energy consumption using the traction power, gear ratio (Inline graphic), generator efficiency (Inline graphic), output power (Inline graphic), motor power (Inline graphic), a normalization factor (Inline graphic), auxiliary power consumption (Inline graphic), time step (Inline graphic is 1/60 (minute)), and round-trip efficiency (RTE). This case represents situations where the vehicle generates or recovers energy, such as during braking. When Inline graphic is negative but Inline graphic is positive, the function adjusts the calculation to account for the battery’s energy consumption. In this case, the energy consumption is calculated using the same parameters as the first case, but the term involving the square root of RTE is replaced with Inline graphic. This reflects that the energy is consumed from the battery rather than being generated or recovered. For more comprehensive details about this function, readers are encouraged to refer to79.

graphic file with name d33e1371.gif 1

The optimal tours are determined using the proposed DARP described in Section 3.2. This approach employs the energy consumption values between each pair of nodes to calculate the most efficient routes.

The proposed DARP for ETs with charging and discharging

This section explores an electric DARP where vehicles can charge and discharge their batteries at charging stations. The model establishes a connection between the dispatch center and the power utilities, enabling taxis to generate power and contribute it back to the network (V2G) during emergencies, such as cyberattacks, while ensuring that taxis can complete their trips. The optimization process considers various factors, including pickup and delivery locations and the number of passengers. The ETs have limited battery capacity and can charge or discharge at stations.

The first term of objective function (2) represents the costs associated with reducing electrical load at different locations. The variable Inline graphic represents the cost coefficient, and Inline graphic indicates the amount of load shed at each location j. The second term considers the expenses related to the connections between infected and susceptible nodes. Parameters Inline graphic and Inline graphic likely influence the connectivity-based costs. The last component of the objective function represents the costs associated with ET routing and dispatching. In this term, Inline graphic likely represents the distance or travel cost between locations i and j, and Inline graphic is a decision variable that determines the assignment of taxi v to the route between locations i and j.

graphic file with name d33e1429.gif 2

Constraints (3) through (7) maintain flow equivalence in the network flow problem under investigation. These constraints establish that the flow through the network is evenly distributed, ensuring that all vehicles visit each node precisely once. Additionally, they guarantee that each vehicle commences and concludes its tour at the designated source and sink nodes while maintaining flow conservation at intermediate nodes. Constraint (3) requires that all vehicles visit each node exactly once. Constraint (4) ensures that each node is departed from exactly once by all vehicles. Constraint (5) maintains flow conservation at each node, excluding the source and sink nodes.

graphic file with name d33e1450.gif 3
graphic file with name d33e1454.gif 4
graphic file with name d33e1458.gif 5

Constraint (6) guarantees that each vehicle starts its tour from the source node. Constraint (7) considers that each vehicle ends its tour at the sink node. Constraint (8) ensures that each edge in the network is visited exactly once by all the vehicles combined.

graphic file with name d33e1473.gif 6
graphic file with name d33e1477.gif 7
graphic file with name d33e1481.gif 8

The model includes constraints (9) and (10) to manage the vehicle’s battery charge level as it travels through the network. Constraint (9) calculates the charge level at node j, denoted as Inline graphic, is determined by summing the charge levels at the previous nodes i (Inline graphic), adding the amount of recharge of the vehicle at node i (Inline graphic), subtracting the charge depleted (Inline graphic) the energy consumed along the edge from i to j (Inline graphic), over all the incoming edges Inline graphic.

graphic file with name d33e1533.gif 9

Constraint (10) imposes an upper bound on the amount of recharge allowed for each vehicle v at each node i. The recharge amount Inline graphic is limited by the difference between the maximum battery capacity Inline graphic and the current charge level Inline graphic of the vehicle, plus the charge depleted Inline graphic due to traveling along the edges. This ensures that the vehicle’s battery charge level after recharging does not exceed the maximum capacity, helping to manage the battery charge of the vehicles as they travel through the network.

graphic file with name d33e1561.gif 10

Constraint (11) aims to determine the charging level achieved at each node by calculating the difference between the maximum possible charge and any charge adjustments or discharge that may occur. To prevent overcharging beyond the battery’s available capacity, a parameter Inline graphic is introduced to regulate the replenishment amount at each location. This is implemented through the equation Inline graphic, where Inline graphic in Constraint (11) is replaced by Inline graphic in Constraint (10). The optimal model would use the inequality Inline graphic, with Inline graphic representing a recharging efficiency between 0-1 dependent on each stop’s available battery space. The Inline graphic coefficient governs the replenishment at each site, as described in51. However, this approach results in a non-linear equation. Therefore, an adjustable factor Inline graphic is introduced to linearize the model while approximating the desired behavior.

graphic file with name d33e1614.gif 11

The constraint (12) guarantees that the vehicle can only recharge at a node if it is visiting that node as part of its route.

graphic file with name d33e1622.gif 12

Constraint (13) ensures that the charge level at node i, denoted as Inline graphic, must be greater than or equal to the total energy consumption, as represented by the sum of Inline graphic over all the outgoing edges j to nodes i.

graphic file with name d33e1645.gif 13

The problem also involves restricting the initial and final charge levels of the vehicle’s battery to predefined values. Constraint (14) specifies that the initial charge level at the source node s, denoted as Inline graphic, must be set to a fixed value Inline graphic for all vehicles v. This ensures the vehicles start their journeys with a known, consistent battery charge level. Constraint (15) stipulates that the final charge level at the destination node e, denoted as Inline graphic, must be greater than or equal to a minimum value Inline graphic for all vehicles v. This constraint ensures that the vehicles arrive at their destinations with at least a certain level of battery charge, preventing them from being depleted to an unacceptable level.

graphic file with name d33e1686.gif 14
graphic file with name d33e1690.gif 15

In addition to the constraints related to the vehicle’s battery management, the problem also includes a set of constraints (16)–(19) that calculate and limit the number of passengers in the vehicle at each node along the route. Constraint (16) specifies that the number of passengers in the vehicle at the starting node s, denoted as Inline graphic, must be set to a predetermined initial value Inline graphic for all vehicles v. This ensures that the vehicles depart with a known, consistent number of passengers.

graphic file with name d33e1716.gif 16

Constraint (17) calculates the number of passengers in the vehicle at each intermediate node j that is a drop-off node (Inline graphic), denoted as Inline graphic.

graphic file with name d33e1736.gif 17

Constraint (18) calculates the number of passengers in the vehicle at each intermediate node j that is a pickup node (Inline graphic). In this case, the number of passengers is incremented by one to account for the passenger being picked up, again multiplied by the binary decision variable Inline graphic.

graphic file with name d33e1756.gif 18

Finally, Constraint (19) limits the maximum number of passengers K that can be transported in the vehicle at any node i and for any vehicle v. This ensures that the vehicle’s capacity is not exceeded during the dispatching service.

graphic file with name d33e1774.gif 19

Constraint (20) specifies the beginning of service time at each node j, denoted as Inline graphic, for each vehicle v. This constraint ensures that the service time at node j is greater than or equal to the sum of the service time at the previous node i (Inline graphic), the service time required at the previous node (Inline graphic), and the travel time from node i to node j (Inline graphic), multiplied by the binary decision variable Inline graphic that indicates whether the vehicle travels from node i to node j. Constraint (21) then imposes time windows for the service at each node i.

graphic file with name d33e1834.gif 20
graphic file with name d33e1839.gif 21

Constraints (22), (23), and (24), are applied to incorporate the origin-destination precedence of the nodes into the model. This is necessary because the original model, which includes a dummy node to remove the necessity of returning to the initial node, does not consider the order in which the nodes are visited. Constraint (22) sets the order variable Inline graphic for the dummy node s to 0. This is because the dummy node is the last node that must be visited, and we want to establish it as the reference point for the order of visits. Constraint (23) defines the order variable Inline graphic for each non-dummy node j and each vehicle v. This ensures that the order of the nodes increases sequentially as the vehicles visit them. Constraint (24) ensures that the order of the nodes is maintained across the origin-destination pairs (ij) of trips in the set PD.

graphic file with name d33e1890.gif 22
graphic file with name d33e1894.gif 23
graphic file with name d33e1898.gif 24

The constraints (25), (26), and (27) is used to linearize the nonlinear model by introducing a new variable Inline graphic, which represents the product of the binary decision variable Inline graphic and a continuous variable Inline graphic. Constraint (25) ensures that if Inline graphic is 0, then Inline graphic must also be 0. This is achieved by setting an upper bound on Inline graphic as Inline graphic, where M is a large positive constant. Constraint (26) sets the upper bound of Inline graphic to be Inline graphic, the continuous variable. For example, Constraint (27) is the most crucial for the linearization. It ensures that when Inline graphic is 1, Inline graphic is equal to Inline graphic. This is achieved by setting a lower bound for Inline graphic as Inline graphic. By introducing these three constraints, the nonlinear product term Inline graphic is effectively linearized, as the new variable Inline graphic is forced to take the appropriate value based on the values of Inline graphic and Inline graphic.

graphic file with name d33e2001.gif 25
graphic file with name d33e2005.gif 26
graphic file with name d33e2009.gif 27

The variable Inline graphic represents a continuous value, and its trivial upper bound can be denoted as Inline graphic. This means that the value of Inline graphic is always less than or equal to Inline graphic. Similarly, the variable Inline graphic is when vehicle v starts servicing node i, and its trivial upper bound can be depicted as maximum Inline graphic. The variable Inline graphic is an integer variable, and its trivial upper bound can be represented as K. This implies that the value of Inline graphic is always less than or equal to K. Lastly, the variable Inline graphic represents the order of the visited nodes, and its trivial upper bound is the total number of nodes, |N|. This means that the value of Inline graphic is always less than or equal to |N|.

Cyber-attacks and power flow balance

Integrating the power and transportation networks is essential to accurately estimate the charging demands at the charging stations, reflecting the total power load in the overall network. This study utilizes a commonly used linearized distribution flow model to analyze power flows in electrical grids80. The amount of electricity recharged for each vehicle v at each charging station i that is connected to the bus station j, representing the total power load at the bus station j as shown in Equation (28):

graphic file with name d33e2098.gif 28

where Inline graphic is the total power load at bus station j and Inline graphic is the amount of electricity recharged for vehicle v at the charging node i.

The constraint represented by Equation (29) specifies that the total power demand at a bus node j is the sum of two components: the power demand for EV charging Inline graphic and the power demand from other consumers Inline graphic. The power demand from other consumers encompasses a variety of loads, including residential, commercial, and industrial demands. This can be expressed mathematically as:

graphic file with name d33e2137.gif 29

Constraint (30) calculates the total power generated by discharging vehicles within a specific bus node j. The equation can be expressed as:

graphic file with name d33e2149.gif 30

where Inline graphic represents the total power output at bus node j due to the discharging of vehicles and Inline graphic is the amount of power discharged by vehicle v at node i.

Constraint 31 represents the active power balance at each bus j in the power system. It ensures that the total active power injected into bus j (generated power, minus demand, plus load shedding and discharged power by ETs) is equal to the net active power flow out of the bus (the summation of active power flows on the lines connected to bus j).

graphic file with name d33e2186.gif 31

Constraint (32) ensures that the reactive power supplied by generators (Inline graphic) minus the reactive power demand (Inline graphic) plus the reactive power from load-shedding (Inline graphic) is equal to the net reactive power flowing into and out of bus j.

graphic file with name d33e2210.gif 32

Constraint (33) calculates the reactive power demand (Inline graphic) at bus j based on the active power demand (Inline graphic) and the power factor (Inline graphic) at that bus.

graphic file with name d33e2234.gif 33

Constraint (34) determines the voltage difference between buses i and j based on the resistance (Inline graphic), reactance (Inline graphic), active power flow (Inline graphic), and reactive power flow (Inline graphic) between the two buses.

graphic file with name d33e2266.gif 34

Maintaining voltages within acceptable ranges is crucial for adequately operating electrical equipment and preventing damage to the grid infrastructure. Constraint (35) ensures that the voltage magnitude at each bus j is within the specified minimum (Inline graphic) and maximum (Inline graphic) limits.

graphic file with name d33e2286.gif 35

Constraint (36) and (37) helps to maintain the grid’s active and reactive power balance, respectively.

graphic file with name d33e2297.gif 36
graphic file with name d33e2301.gif 37

Constraint (38) examines that the active power load shedding cannot exceed the maximum active power demand, as it would be physically impossible to shed more load than what is demanded. Similarly, Constraint (39) confirms that reactive power load shedding cannot exceed the maximum reactive power demand, as it would be physically impossible to shed more reactive power than what the loads require.

graphic file with name d33e2313.gif 38
graphic file with name d33e2317.gif 39

Constraint (40) determines the consistency between the binary variables Inline graphic and Inline graphic for each branch (i.e., edge) in the set L48. The variable Inline graphic is a binary indicator that denotes whether node i is connected to node j (with a value of 1 if connected and 0 otherwise). The variable Inline graphic represents the removal of the power line (ij) (with a value of 1 if the line is removed and 0 otherwise). This constraint guarantees that for each branch in the system, at least one of the two binary variables, Inline graphic or Inline graphic, must be greater than or equal to 1. This means that if a branch is present in the system (i.e., Inline graphic), the corresponding line cannot be removed (Inline graphic). Conversely, if the line is removed (i.e., Inline graphic), then the branch cannot be present (Inline graphic). This constraint verifies the logical consistency between the connection and removal of lines in the power system network, preventing contradictory or infeasible scenarios.

graphic file with name d33e2386.gif 40

Constraint (41) presents the logical consistency between the binary connection and line removal variables in the power grid network. It states that for each pair of connected nodes (ki) and their common neighbor j, where j is not a critical infrastructure node, either both nodes k and j must be connected to i (Inline graphic and Inline graphic), or the power line between j and i must be removed (Inline graphic). This constraint prevents the creation of infeasible closed loops in the network when a node is disconnected from one of its neighbors, maintaining the overall connectivity and topology of the power grid while considering the potential removal of lines to enhance the system’s resilience against cyber attacks.

graphic file with name d33e2435.gif 41

Constraint (42) limits the number of lines removals that can be made in the power grid network to enhance its resilience against cyber attacks. The parameter Inline graphic represents the maximum budget or number of power lines that can be removed from the system. This constraint guarantees that the sum of the binary variables Inline graphic, which indicate the removal of the power line between nodes i and j for all branches in the set L, does not exceed the specified limit Inline graphic.

graphic file with name d33e2466.gif 42

Constraint (43) establishes a relationship between the binary variables Inline graphic and Inline graphic to ensure that susceptible nodes are correctly connected to infected nodes in the power grid network. The parameter Inline graphic is a binary variable that indicates whether a susceptible node i (i.e., Inline graphic) is at risk of infection. At the same time, Inline graphic represents the binary connection variable between nodes i and j, where j is an infected node (i.e., Inline graphic). This constraint stipulates that for any susceptible node i, if Inline graphic is equal to 1, indicating that the node is at risk of infection, then there must exist at least one pairwise connection between node i and an infected node j, where Inline graphic. This secures that the model correctly identifies the susceptible nodes that are at risk of infection based on their connectivity to the infected nodes in the power grid.

graphic file with name d33e2529.gif 43

Constraints (44) and (45) regulate the active power and reactive power flow on the transmission lines of the power grid, respectively, considering the potential removal of lines due to cybersecurity measures. These constraints validates that the power flow on the remaining transmission lines in the interdicted network respects the system’s physical limits while accounting for the impact of line removals on the power flow. These limits are modulated by the binary variable Inline graphic, indicating whether the line between nodes i and j has been removed. If the line is not removed (Inline graphic), the active power flow is constrained within the normal operational limits. However, if the line is removed (Inline graphic), the active power flow is automatically set to zero, effectively disconnecting the line.

graphic file with name d33e2560.gif 44
graphic file with name d33e2564.gif 45

Constraints (46), (47), and (48) define the domains of the binary decision variables used in the optimization model for the power grid cybersecurity problem.

graphic file with name d33e2579.gif 46
graphic file with name d33e2583.gif 47
graphic file with name d33e2587.gif 48

Stage-by-stage framework for the proposed DARP model

The model optimizes the DARP for ETs by integrating charging and discharging regulations to enhance power resilience (see Algorithm 1). It initializes key parameters such as battery characteristics, taxi dispatching strategies, and cyberattack risks. The algorithm defines variables for routing, charging, V2G regulations, and power flow, while establishing constraints for power balance and service times. After solving the optimization problem with CPLEX in Julia 1.7.1, it identifies decision variables such as optimal taxi routes and energy delivered to the grid, ultimately improving the efficiency of the transportation and power system. The calculations utilized a laptop with a 2.50 GHz processor and 12 GB of RAM.

Algorithm 1.

Algorithm 1

Proposed DARP with Charging and Discharging Regulations for Power Resilience.

Findings and analysis

This section illustrates examples to demonstrate the performance of our model. The central aspect under examination is how taxis can effectively manage the charging and discharging of passengers within a single tour or route during a cyberattack scenario that disrupts normal operations. We utilize the parameters listed in Table 2 to solve our model. Furthermore, the analysis explores a DN scenario using the widely recognized IEEE 39-bus system. This model represents a realistic and comprehensive power grid, with 10 generators and 39 interconnected busbars designed to study power flow, stability, and optimization strategies. The lower bound for the voltage magnitude is Inline graphic and the upper bound is Inline graphic.

Table 2.

Input parameters.

Parameter Description Value
g Acceleration of gravity (Inline graphic) 9.8066
Inline graphic Air density (Inline graphic) 1.25
A Frontal area (Inline graphic) 2.19
Inline graphic Drag coefficient 0.29
Inline graphic Mass correction factor 0.05
Inline graphic Rolling coefficient 0.008
u Vehicle speed (km/h) 40
a Acceleration (Inline graphic) 0
Inline graphic Road slope angle from node i to node j [2%]
Inline graphic Vehicle mass + driver mass (kg) 1633
Inline graphic Gear efficiency 0.97
Inline graphic Power consumption of accessories (W) 300
Inline graphic The rated power of motor (KW) 75
norm Normalization factor of motor efficiency 0.987
RTE Battery round trip efficiency 0.95
Inline graphic The average mass of user (kg) 80
Inline graphic Load shedding cost Inline graphic $100081
Inline graphic Cost for susceptible nodes Inline graphic $100081
Inline graphic power angle 0.99
Inline graphic Maximum active power(kW) 1000
Inline graphic Minimum active power(kW) Inline graphic1000
Inline graphic Maximum reactive power(kVAr) 1000
Inline graphic Minimum reactive power(kVAr) Inline graphic1000

Figure 3 visually represents the intricate interconnections between the generators and busbars in the IEEE-39 bus distribution system. Given the limited dataset of the power system, this study assumes that the power grid is integrated into the transportation network. The data of the IEEE 39-bus system is publicly available at the GitHub repository https://github.com/homase2003/HamidSayarshad.git. We also assume a cyberattack on the IEEE39 network for our numerical study. The set of infected nodes is represented by variable Inline graphic, and the set of susceptible nodes is represented by variable S. In this case, the set of infected nodes, Inline graphic, is defined as I = [10, 12, 15, 18, 25]. This means the nodes with indices 10, 12, 15, 18, and 25 are initially infected in the network. Conversely, the remaining power nodes are defined as susceptible nodes, denoted as Inline graphic. In this study, our primary objective is to develop a novel model that considers optimal power flow, routing, charging and discharging plans for ETs, along with cybersecurity conditions, and we present its performance. Future research may benefit from focusing on solution algorithms for medium and large-scale problems.

Fig. 3.

Fig. 3

The single-line diagram of the IEEE-39 bus system.

Illustration example

This example includes a set of locations that need to be visited, with some locations designated as pickup points and others as drop-off points. The set consists of 12 nodes, represented by Inline graphic, each corresponding to a different location. Specifically, there are 5 pickup nodes [2, 3, 4, 5, 10] and 5 drop-off nodes [6, 7, 8, 11, 12]. The route commences at node 1 and concludes at node 9. This problem also includes information about the EVs used for serving customers. The charging capacity of the vehicle battery is Inline graphic (kW), and the initial charge on the battery is Inline graphic (kW). The lower bound on the charge at the end of the path is set to Inline graphic. The number of passengers at the start node is Inline graphic, and the maximum capacity of the taxi is Inline graphic. Finally, the number of ETs available is Inline graphic. The taxicab pickup/drop-off locations numbered 1 through 12 are directly connected to the corresponding electric buses in the power grid. The electric buses with the indices [2, 3, 5, 8, 9, 12, 15, 20, 24, 26, 27, 29] are explicitly associated with and positioned at taxicab locations 1 through 12, respectively. The proposed model’s runtime for the test case is approximately 5 s.

Table 3 displays the battery levels of two ETs, Taxi 1 and Taxi 2, alongside the number of passengers at each node. Figure 4 illustrates the regulations for charging and discharging taxis. For taxi 1, the route taken is 1 Inline graphic 3 Inline graphic 4 Inline graphic 7 Inline graphic 8 Inline graphic 10 Inline graphic 12, with charging stations at nodes 4, 8, and 10, where 19.69 (kW), 19.69 (kW), and 0.17 (kW) of electricity was recharged, respectively, and discharging station at nodes 3, 7, and 10, where 19.37 (kW), 19.36 (kW), and 19.83 (kW) of electricity were discharged, respectively. For taxi 2, the route is 1 Inline graphic 2 Inline graphic 5 Inline graphic 6 Inline graphic 11, with discharging station at node 2, where 19.70 (kW) of electricity were discharged, and charging stations at nodes 5, and 6, where 0.13 (kW), and 19.87 (kW) of electricity were charged, respectively.

Table 3.

Results of the vehicles’ movements and energy usage.

Nodes Inline graphic (kW) Inline graphic
Taxi 1 Taxi 2 Taxi 1 Taxi 2
1 20 20 0 0
2 0 19.91 0 1
3 19.72 0 1 0
4 0.31 0 2 0
5 0 0.15 0 2
6 0 0.13 0 1
7 19.69 0 1 0
8 0.04 0 0 0
9 0 0 0 0
10 19.96 0 1 0
11 0 19.87 0 0
12 0.25 0 0 0

Fig. 4.

Fig. 4

Charging and discharging strategies for taxis across nodes.

Optimal power flow analysis allows the ET fleet to be incorporated into the detailed power system model. Table 4 displays the voltage and power values for a 39-bus system. This 39-bus system is closely associated with an optimal power flow analysis for an electric taxi V2G system. This enables analysis to identify the optimal locations for charging infrastructure to minimize grid impacts. It can also quantify the precise amounts of power the taxis can supply back to the grid during peak demand periods. In addition, the analysis can optimize vehicle dispatch and scheduling to support overall grid operations. The model can even evaluate any necessary infrastructure upgrades to enable integration. Finally, analysis can help monetize the grid services provided by ETs.

Table 4.

Voltage and power values for 39 bus system.

Bus Number Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
1 0 0 0 0 0 0.88 0 0
2 0 0 0 0 0 1.12 0 0
3 19.70 0 64.40 0 0 0.89 9.18 0
4 0 0 100.00 0 0 0.89 14.25 0
5 19.37 0 0 0 0 1.03 0 0
6 0 0 0 0 0 1.03 0 0
7 0 0 46.76 0 0 1.01 6.66 0
8 0 19.69 124.09 0 0 0.89 17.68 0
9 0 0.13 0.13 0 0 1.00 0.02 0
10 0 0 0 0 0 1.02 0 0
11 0 0 0 0 0 0.88 0 0
12 0 19.87 21.37 0 0 0.97 3.05 0
13 0 0 0 0 0 1.12 0 0
14 0 0 0 0 0 0.90 0 0
15 19.36 0 64.00 0 0 0.90 9.12 0
16 0 0 65.80 0 0 0.98 9.38 0
17 0 0 0 0 0 0.93 0 0
18 0 0 31.60 0 0 0.88 4.50 0
19 0 0 0 0 0 1.02 0 0
20 0 19.96 155.96 0 0 0.94 22.22 0
21 0 0 54.80 0 0 1.03 7.81 0
22 0 0 0 0 0 1.12 0 0
23 0 0 49.50 0 0 1.12 0 0
24 0 0 61.72 0 0 1.02 8.79 0
25 0 0 44.80 0 0 1.12 6.38 0
26 19.83 0.17 27.97 0 0 0.93 3.99 0
27 0 0 56.20 0 0 0.91 8.01 0
28 0 0 41.20 0 0 0.88 5.87 0
29 0 0 56.70 0 0 0.92 8.08 0
30 0 0 0 211.49 0 1.12 0 0
31 0 0 1.84 172.30 2.19 1.12 0 0
32 0 0 0 0 2.71 1.12 0 0
33 0 0 0 155.23 Inline graphic3.99 1.12 0 0
34 0 0 0 0 5.07 1.12 0 0
35 0 0 0 270.76 Inline graphic8.39 0.88 0 0
36 0 0 0 367.35 Inline graphic11.16 0.88 0 0
37 0 0 0 0 0 1.12 0 0
38 0 0 0 34.25 4.69 1.12 0 0
39 0 0 220.80 0 47.66 1.12 0 0

The result of the details of the power injection is crucial to understanding the overall operation and behavior of the power system. Table 5 provides a comprehensive overview of the power flows within the system, with active and reactive power injections listed for 39 different pairs of buses. The sign of values shows the power flow direction: positive for injection, negative for extraction. The optimal power flow analysis can effectively guide the integration of ET fleets into the grid. For instance, the analysis can identify the optimal bus locations where the taxi fleet can provide the most beneficial active and reactive power support, enabling the strategic placement of charging infrastructure and the efficient dispatch of the vehicles. Furthermore, the power injection results can help quantify the valuable grid services that ETs can provide, bolstering the business case for their large-scale adoption and seamless V2G participation.

Table 5.

Power Injection between buses.

Bus Pair Power Injection
From Bus To Bus Reactive Power (Inline graphic) Active Power (Inline graphic)
1 2 11.64 Inline graphic170.95
1 39 Inline graphic11.64 170.95
2 3 3.25 50.85
2 30 0 Inline graphic211.49
2 25 8.39 Inline graphic10.31
3 4 Inline graphic9.20 152.37
3 18 12.45 Inline graphic146.22
4 5 Inline graphic33.31 447.59
4 14 24.11 Inline graphic395.21
5 6 Inline graphic77.22 1000.00
5 8 43.92 Inline graphic533.04
6 7 Inline graphic48.47 753.88
6 11 Inline graphic26.82 416.58
6 31 Inline graphic1.93 Inline graphic170.46
7 8 Inline graphic48.47 707.12
8 9 Inline graphic4.56 49.98
9 39 Inline graphic4.56 49.85
10 11 7.37 85.32
10 13 Inline graphic4.66 Inline graphic85.32
10 32 Inline graphic2.71 0
12 11 19.45 Inline graphic501.90
12 13 Inline graphic19.45 480.54
13 14 Inline graphic24.11 395.21
15 16 0 Inline graphic44.64
16 17 Inline graphic25.53 Inline graphic44.64
16 19 Inline graphic1.08 0.72
16 21 53.97 Inline graphic945.20
16 24 Inline graphic27.36 473.12
17 18 Inline graphic12.45 177.82
17 27 Inline graphic13.08 183.10
19 20 Inline graphic5.07 155.96
19 33 3.99 Inline graphic155.23
20 34 Inline graphic5.07 0
21 22 53.97 Inline graphic1000.00
22 23 45.58 Inline graphic729.24
22 35 8.39 Inline graphic270.76
23 24 27.36 Inline graphic411.40
23 36 11.16 Inline graphic367.35
25 26 8.39 Inline graphic55.11
26 27 13.08 Inline graphic126.90
26 28 Inline graphic90.18 1000.00
26 29 85.49 Inline graphic936.35
28 29 Inline graphic90.18 958.80
29 38 Inline graphic4.69 Inline graphic34.25

The model also assists power utilities in identifying and eliminating infected or susceptible lines within the DN. By analyzing the susceptibility and connection status of various elements in the power grid, as shown in Table 6, the model helps utilities pinpoint the vulnerable points that could potentially lead to the spread of infections or disruptions. The result shows susceptible nodes, with nodes 2, 3, and 17 at risk of infection (Inline graphic). Additionally, the model indicates that the power line between nodes 14 and 15 is the only one that can be removed (Inline graphic). Integrating the taxicab dispatching system with the V2G capabilities further enhances the model’s ability to maintain a reliable and secure power supply for the broader energy ecosystem. Therefore, the result allows the power utilities to take targeted action to remove or isolate these problematic lines, effectively strengthening the overall resilience and reliability of the power infrastructure.

Table 6.

Susceptibility and connection status in the power distribution system.

Susceptible Nodes Inline graphic Inline graphic Inline graphic Inline graphic
1 0 (1, 2) 0 1
2 1 (1, 39) 0 1
3 1 (2, 3) 0 1
4 0 (2, 25) 0 1
5 0 (2, 30) 0 1
6 0 (3, 4) 0 1
7 0 (3, 18) 0 1
8 0 (4, 5) 0 1
9 0 (4, 14) 0 1
11 0 (5, 6) 0 1
13 0 (5, 8) 0 1
14 0 (6, 7) 0 1
16 0 (6, 11) 0 1
17 1 (6, 31) 0 1
19 0 (7, 8) 0 1
20 0 (8, 9) 0 1
21 0 (9, 39) 0 1
22 0 (10, 11) 0 1
23 0 (10, 13) 0 1
24 0 (10, 32) 0 1
26 0 (12, 13) 0 1
27 0 (13, 14) 0 1
28 0 (14, 15) 1 0
29 0 (15, 16) 0 1
30 0 (16, 17) 0 1
31 0 (16, 19) 0 1
32 0 (16, 21) 0 1
33 0 (16, 24) 0 1
34 0 (17, 18) 0 1
35 0 (17, 27) 0 1
36 0 (19, 20) 0 1
37 0 (19, 33) 0 1
38 0 (20, 34) 0 1
39 0 (21, 22) 0 1
(22, 23) 0 1
(22, 35) 0 1
(23, 24) 0 1
(23, 36) 0 1
(25, 26) 0 1
(25, 37) 0 1
(26, 27) 0 1
(26, 28) 0 1
(26, 29) 0 1
(28, 29) 0 1
(29, 38) 0 1

The model identifies and eliminates vulnerable lines in the DN while using V2G technology to stabilize the grid. Table 7 displays cybersecurity results for various scenarios based on the fuel capacity of the vehicle’s battery, represented by Inline graphic. It indicates that the power line between nodes (14, 15) can be removed at Inline graphic kW. With an increased charging range, more power lines can be removed without requiring power shutdowns. Additionally, nodes 2, 3, and 17 are susceptible to infection at Inline graphic kW, with only node 3 remaining vulnerable at Inline graphic kW or higher.

Table 7.

Cybersecurity results across different energy levels.

Inline graphic
Lines Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
(2, 25) 0 1 1 1 1
(14, 15) 1 0 1 1 1
(17, 18) 0 1 1 1 1
Inline graphic
Susceptible Nodes Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
2 1 0 0 0 0
3 1 1 1 1 1
14 0 1 0 0 0
17 1 0 0 0 0

New York Taxicab

We evaluate the proposed model using taxicab data from New York City. Our analysis determines the optimal charging, discharging, and routing plans for 4 taxis. These plans were generated by considering a maximum budget of Inline graphic for removing power branches. The pickup and drop-off locations for passengers are depicted in Figs. 5 and 6. We assumed that all taxis would begin their routes with an initial battery charge of 100 kW. The energy consumption for each vehicle on every route is calculated using the energy consumption function.

Fig. 5.

Fig. 5

Start node and passenger pickups locations.

Fig. 6.

Fig. 6

Passenger drop-offs locations.

We solve the case study using four taxis. We also utilized distances and travel times derived from the pickup and drop-off data in the NYC taxicab dataset. The taxicab pickup/drop-off spots are numbered from 1 to 30, each directly connected to an electric bus in the grid. The electric buses at indices 1 through 30 are linked to locations 1 through 30, respectively. For more information and specific parameters about our model, readers can refer to the publicly accessible data at the following URL: https://github.com/homase2003/HamidSayarshad.git. The proposed model’s runtime for the test case is approximately 300 s.

Model evaluation

This section investigates the effectiveness of our approach, which we have accomplished through five distinct case studies.

  1. Case 1: This analysis focused on routing factors and the costs incurred by ET users. It specifically examined the third component of the objective function, as detailed in Equation (2).

  2. Case 2: We delved into the cybersecurity aspects and implications in this case. Our evaluation centered around the second component of the objective function, as described in Equation (2).

  3. Case 3: We explored factors related to the power distribution system, such as load-shedding costs. Our analysis primarily considered the first term of the objective function, as specified in Equation (2).

  4. Case 4: This case combined the factors from the power distribution system (Case 3) and the cybersecurity considerations (Case 2).

  5. Case 5: We conducted a comprehensive analysis by incorporating a combination of Cases 1 through 4 factors. This approach allowed us to account for the power distribution system conditions, routing, and cybersecurity considerations.

We consider two levels of charging and discharging strategies: coordinated and uncoordinated. In the coordinated strategy, such as Cases 3 and 4, the charging and discharging of the ETs are planned and scheduled to enhance the synchronization between the ET dispatching and the power grid security, aiming to improve the overall resilience of the system. In contrast, the uncoordinated approach, such as Case 1, does not explicitly consider the impact on the power grid, with ETs charging or discharging their batteries based on their energy requirements, which may lead to suboptimal utilization of the ETs and potential conflicts between the taxicab dispatching needs and the power grid’s requirements.

Evaluating these two charging and discharging regulations helps identify the most effective method for utilizing ETs in the post-event recovery of DNs. Table 8 illustrates the impact of power load shedding across five distinct cases. The total power shutdown for Case 1 and Case 2 is 648.981 kW and 877.274 kW, respectively, significantly higher than the zero load shedding observed in Cases 3, 4, and 5. Conversely, Cases 1 and 2 necessitate power load-shedding interventions. Furthermore, Table 9 is a benchmark for evaluating the performance of different cases involving vehicle tour lengths and routing strategies. Each case represents a unique scenario, and the total tour length is used to assess their effectiveness. The results show that Cases 1 and 5 have the lowest tour length of 349.801 min, suggesting that Case 5 present a more efficient strategy compared to the other cases.

Table 8.

Shutdown of power in different case studies.

Bus number Case 1 Case 2 Case 3 Case 4 Case 5
1 0 0 0 0 0
2 0 0 0 0 0
3 0 0 0 0 0
4 100 100 0 0 0
5 0 0 0 0 0
6 1.36 0 0 0 0
7 46.98 46.76 0 0 0
8 104.40 104.40 0 0 0
9 0 0 0 0 0
10 0 0 0 0 0
11 0.48 0 0 0 0
12 1.5 0 0 0 0
13 0 0 0 0 0
14 0 0 0 0 0
15 64 64 0 0 0
16 66.21 65.80 0 0 0
17 0 0 0 0 0
18 31.6 31.6 0 0 0
19 0 0 0 0 0
20 0 136 0 0 0
21 4.64 54.8 0 0 0
22 0 0 0 0 0
23 0 0 0 0 0
24 61.78 0 0 0 0
25 44.88 0 0 0 0
26 27.8 27.8 0 0 0
27 50.32 56.2 0 0 0
28 41.2 0 0 0 0
29 0 0 0 0 0
30 0 0 0 0 0
31 1.84 0 0 0 0
32 0 0 0 0 0
33 0 0 0 0 0
34 0 0 0 0 0
35 0 0 0 0 0
36 0 0 0 0 0
37 0 0 0 0 0
38 0 0 0 0 0
39 0 189.91 0 0 0
Table 9.

Vehicle tour length and routing under different cases.

Taxi 1 Taxi 2 Taxi 3 Taxi 4 Total tour length
Case 1
1, 29, 30 1, 21, 20, 23, 24, 25, 26 1, 3, 2, 7, 6, 10, 12, 13, 16, 27, 28 1, 5, 4, 8, 11, 15, 14, 17, 19, 18, 22 349.801
Case 2
1, 4, 8, 13, 16 1, 5, 11, 20, 21, 23, 24, 27, 28 1, 3, 7, 10, 12, 14, 15, 18, 17, 25, 26, 29, 30 1, 2, 6, 19, 22 513.795
Case 3
1, 25, 26 1, 3, 7, 10, 12, 19, 21, 20, 22, 24, 23 1, 2, 5, 4, 6, 8, 11, 13, 16, 27, 28, 29, 30 1, 14, 15, 18, 17 429.413
Case 4
1, 3, 2, 5, 7, 6, 11, 27, 29, 28, 30 1, 10, 12, 13, 16 1, 4, 8, 14, 15, 18, 17, 21, 25, 24, 26 1, 20, 19, 23, 22 483.782
Case 5
1, 29, 30 1, 3, 2, 7, 6, 10, 12, 13, 16, 27, 28 1, 21, 20, 23, 24, 25, 26 1, 4, 5, 8, 11, 15, 14, 17, 19, 18, 22 349.801

The DN Configuration involves different approaches to setting up the power distribution network (DN) for post-event recovery, categorized into Baseline and Proactive levels. The baseline configuration (such as Case 1) represents the default setup without any pre-positioning of ETs or network reconfiguration. In contrast, the proactive configuration (such as Case 5) involves strategically pre-positioning the ETs and reconfiguring the network by adding backup power sources and alternative transmission lines. Table 10 shows the cybersecurity results under five different cases. In Cases 1 and 3, where cybersecurity was ignored, the analysis identified a larger number of nodes (4 nodes) as being susceptible to potential cyberattacks. This represents a concerning vulnerability, as a successful attack on any of these nodes could have cascading impacts on the overall power system. In contrast, Cases 2, 4, and 5, which included the cybersecurity component, were able to identify and mitigate these vulnerabilities, reducing the number of susceptible nodes to just one. These insights highlight the varied outcomes of each case and underscore the reliability and efficiency of Case 5 over other cases.

Table 10.

Cybersecurity results in different cases.

Inline graphic
LinesInline graphic Case 1 Case 2 Case 3 Case 4 Case 5
(2, 25) 0 1 0 1 1
(3, 18) 0 0 0 1 1
(14, 15) 0 1 0 0 1
(17, 18) 0 1 0 1 0
Inline graphic
Susceptible Nodes Case 1 Case 2 Case 3 Case 4 Case 5
2 1 0 1 0 0
3 1 1 1 0 0
14 1 0 1 1 0
17 1 0 1 0 1

Furthermore, we investigate the voltage behavior of a power grid under various operational scenarios. Table 11 depicts the voltages under five cases. The total voltages for Cases 1 to 5 across all buses are 39.971, 38.038, 41.079, 38.369, and 38.741, respectively. These results illustrate the overall voltage levels for each case, highlighting variations in voltage distribution across the buses. When examining the averages for each case, we find results of 1.025(p.u), 0.975(p.u), 1.053(p.u), 0.984(p.u), and 0.993(p.u). Case 3 exhibits the highest average voltage, while Case 2 has the lowest. This fluctuation in average voltages suggests differing operational conditions or configurations that impact voltage levels. Notably, Cases 1, 3, and 5 demonstrate higher average voltages, indicating enhanced performance or stability in those scenarios. In contrast, while voltage levels in the power shutdown cases (Cases 1 and 2) remained relatively elevated, this stability was achieved at the cost of power outages affecting specific nodes within the grid. Conversely, scenarios without power shutdowns (Cases 3 and 5) exhibited a more stable and resilient voltage profile across the entire system.

Table 11.

Voltage (p.u) profiles in various case studies.

Bus number Case 1 Case 2 Case 3 Case 4 Case 5
1 1.12 0.88 1.12 0.90 0.92
2 0.88 0.92 1.11 0.90 0.92
3 1.01 0.92 1.12 0.93 0.90
4 0.99 0.97 1.02 0.92 0.88
5 0.93 1.05 1.05 0.89 1.04
6 0.96 1.09 1.12 0.98 1.12
7 1.11 0.96 1.12 0.88 0.89
8 0.99 1.10 0.98 0.88 1.00
9 0.90 1.12 1.12 1.12 1.12
10 1.02 1.01 1.11 1.05 1.06
11 0.92 1.12 1.09 1.04 0.96
12 1.01 1.00 1.11 1.04 1.01
13 1.09 0.88 1.12 1.04 1.07
14 1.06 0.92 1.12 1.12 0.88
15 0.88 0.92 0.88 0.91 0.88
16 1.02 0.92 0.96 0.95 0.97
17 0.94 0.92 0.93 0.93 0.95
18 0.96 0.92 0.99 0.93 0.90
19 0.98 0.98 0.99 0.96 1.01
20 0.93 0.94 0.94 0.92 0.95
21 1.09 0.93 1.02 1.02 1.11
22 1.02 0.88 1.12 1.12 1.12
23 1.01 0.89 1.12 0.93 1.07
24 1.05 1.00 1.05 0.99 1.04
25 1.12 0.92 1.12 0.90 0.92
26 1.05 0.92 0.90 0.89 0.91
27 0.99 0.92 0.88 0.88 1.00
28 1.12 0.91 0.88 0.88 0.88
29 1.09 0.97 0.93 1.06 0.93
30 1.10 0.94 1.12 0.88 0.93
31 1.12 1.12 0.97 1.12 0.88
32 1.12 1.03 1.12 1.12 1.12
33 1.12 1.06 1.12 1.12 1.12
34 1.12 0.88 1.12 1.12 1.12
35 1.12 0.98 1.12 0.88 0.88
36 1.12 1.12 1.12 0.90 1.12
37 0.88 0.97 1.12 1.12 1.12
38 0.98 1.12 1.12 1.12 0.91
39 1.01 0.93 1.05 0.98 1.09

Figure 7 compares the total power requirements for charging and discharging in different study cases. Cases 1, 2, and 3 show low charging and discharging needs. Cases 1 and 2 involve non-zero load shedding, while Case 3 has a high number of susceptible nodes. In Case 3, with four susceptible nodes and no removed lines, the system doesn’t address power requirements to reduce cyberattack risks, resulting in low total power needed for charging and discharging. Conversely, Case 3 has the highest power generation at 1131.37 kW, as shown in Table 12. Cases 1 and 2 yield 184.85 kW and 253.92 kW for power generation, respectively. The results suggest that power dispatching is inefficient in Cases 1, 2, and 3. Additionally, Cases 4 and 5 generate 933.043 kW and 835.782 kW, respectively. While charging amounts are similar in Cases 4 and 5, Case 5 has higher discharging at 513.53 kW compared to 414.348 kW for Case 4. However, Case 4 experiences a longer tour length than Case 5, highlighting the reliability and efficiency of Case 5.

Fig. 7.

Fig. 7

Power consumption for electric vehicles and vehicle-to-grid systems in different case studies.

Table 12.

Generation of power by generators in various case studies.

Bus number Case 1 Case 2 Case 3 Case 4 Case 5
30 0 0 80.993 0 0
31 184.856 0 452.205 277.168 395.039
32 0 0 0 0 0
33 0 0 71.169 0 0
34 0 0 0 0 105.775
35 0 0 142.525 441.032 270.142
36 0 111.220 100.911 0 0
37 0 44.800 0 0 0
38 0 97.900 61.873 214.844 0
39 0 0 221.699 0 64.827

Elasticity evaluation

This section evaluates the total cost of the fleet size by solving the proposed model (Case 5) while keeping all other factors remaining unchanged. The results are graphically summarized in Fig. 8. These results show the total costs in minutes associated with varying numbers of ETs, considering both sojourn time (user delay) and system cost (vehicle tour length). Total costs consistently decrease from 2 to 7, then increase when the number of electric taxis reaches 8, coinciding with an increase in dispatched passengers at that fleet size. This suggests economies of scale and improved operational efficiencies with a fleet of 7 ETs for the case study.

Fig. 8.

Fig. 8

Tour length and user delay across various fleet sizes.

Furthermore, we explore cyberattack scenarios across various fleet sizes. Table 13 illustrates the intricate relationship among fleet size, network security vulnerabilities (shown by power line removals), and node susceptibility to cyber threats. As the fleet size increases up to Inline graphic, there is a notable increase in the number of removed lines. This result suggests enhancements in network resilience and security measures within the power network. The optimal fleet size with ETs and V2G capabilities seems to enhance network resilience and address power needs for line removals due to cyber threats, highlighting their potential in strengthening network security.

Table 13.

Cybersecurity results under various fleet sizes.

Inline graphic
Lines Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
(2, 25) 1 1 1 1 1 1 1
(3, 18) 1 1 1 0 1 1 1
(14, 15) 1 0 1 1 1 1 1
(17, 18) 0 1 0 1 0 0 0
Inline graphic
Susceptible Nodes Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
2 0 0 0 0 0 0 0
3 0 0 0 1 0 0 0
14 0 1 0 0 0 0 0
17 1 0 1 0 1 1 1

Energy efficiency and fleet size

This section describes a test scenario assessing the performance of an ET service in serving customers over longer distances and during peak periods of power demand. Taxis begin their routes from John F. Kennedy (JFK) airport, picking up and dropping off passengers at different locations, illustrated in Fig. 9. Furthermore, we analyze the model under heightened power demand. The power demand for other consumers is raised by 30%, as shown in Equation (29), while all other parameters remain constant.The purpose is to assess the ETs’ ability to handle longer routes and distances, providing insights into their range, efficiency, and logistical capabilities under more challenging conditions. For more information and specific parameters about our model, readers can refer to the publicly accessible data at the following URL: https://github.com/homase2003/HamidSayarshad.git.

Fig. 9.

Fig. 9

Pickup and drop-off locations for passengers.

The study aims to determine the optimal fleet size and total power required to address a cyberattack while ensuring electric taxis complete their trips with minimal travel costs. investigate the performance of the proposed taxicab dispatching system during load-shedding scenarios. Load-shedding refers to temporarily reducing the electrical load on a power grid, often implemented to prevent the grid from becoming overloaded and experiencing a blackout. This analysis aims to understand how the percentage of power shed is affected as the size of the taxicab fleet, which is part of the DN, increases from 2 to 6 taxis. Figure 10 presents the power shutdown concerning the fleet size. The percentage of power shed is measured while the taxicab fleet size increases from 2 to 6 taxis. The results show that the load-shedding values decreased from 220.20 (kW) for 2 taxis to 126.94 (kW) for 6 taxis. This load shedding occurs at electric bus nodes 15, 26, and 28.

Fig. 10.

Fig. 10

Power outage based on different fleet sizes.

Furthermore, we measure both the power charge and power discharge of the taxis across different fleet sizes, which helps to assess their impact on load-shedding. Figure 11 illustrates the relationship between fleet size and the charging and discharging of the taxicab fleet. The amount of active power generation by generators is also investigated as the fleet size of ETs increases from 2 to 6. Table 14 illustrates the relationship between fleet size and power generation, showing decreased active power output. With 2 taxis, the active power generation is 2772.62 kW, which diminishes to 2471.87 kW as the fleet expands to 6 taxis. Notably, the power shutdown decreases by 42% as the fleet size expands from 2 to 6. Hence, expanding the ET fleet increases mobile storage capacity, aiding power utilities in reducing the impact of cyberattacks and power outages.

Fig. 11.

Fig. 11

The power charge and discharge levels differ with various fleet sizes.

Table 14.

Generation of active power by generators for various fleet sizes.

Bus number V=2 V=3 V=4 V=5 V=6
30 482.632 489.207 494.493 489.313 489.976
31 646 646 646 646 646
32 253.058 273.456 274.413 176.267 63.045
33 436.079 422.252 409.150 172.114 173.003
34 0 0 0 0 0
35 341.289 304.939 247.617 396.266 296.361
36 417.063 244.769 235.756 244.216 356.021
37 0 0 0 0 0
38 168.109 350.435 352.646 444.812 447.465
39 28.393 0 0 0 0

Supplemental materials

The supplemental materials are available at the GitHub repository https://github.com/homase2003/HamidSayarshad.git.

Author contributions

The single author (HS) provided all contributions.

Funding

The author received no funding for this work. This research did not receive any grant from funding agencies in the public, commercial, or not-for-profit sectors.

Data availability

All dataset sources are cited in the article. Additional data is available upon request to the corresponding author.

Declarations

Competing interests

The authors declare no competing interests.

Footnotes

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Freckleton, D., Heaslip, K., Louisell, W. & Collura, J. Evaluation of resiliency of transportation networks after disasters. Transp. Res. Rec.2284, 109–116 (2012). [Google Scholar]
  • 2.Li, M. et al. Prediction of power outage quantity of distribution network users under typhoon disaster based on random forest and important variables. Math. Probl. Eng.2021, 6682242 (2021). [Google Scholar]
  • 3.Chen, D., Cai, Z., Wu, H. & Guo, C. Review of distribution network’s resilience based on typhoon disaster. Energy Rep.8, 876–888 (2022) (Selected papers from 2022 7th International Conference on Advances on Clean Energy Research.). [Google Scholar]
  • 4.Sayarshad, H. R. Preignition risk mitigation model for analysis of wildfires caused by electrical power conductors. Int. J. Electr. Power Energy Syst.153, 109353 (2023). [Google Scholar]
  • 5.Sayarshad, H. R. Wildfire growth modelling on heterogeneous landscapes for fire prevention: a case study of sonoma county. Oper. Res.25, 60 (2025). [Google Scholar]
  • 6.Novacheck, J., Sharp, J., Schwarz, M., Donohoo-Vallett, P., Tzavelis, Z., Buster, G. & Rossol, M. The evolving role of extreme weather events in the u.s. power system with high levels of variable renewable energy, U.S. Department of Energy (2021).
  • 7.Sayarshad, H. R., Sabarshad, O. & Amjady, N. Evaluating resiliency of electric power generators against earthquake to maintain synchronism. Electr. Power Syst. Res.210, 108127 (2022). [Google Scholar]
  • 8.Li, B. et al. Graphical evolutionary game model of virus-based intrusion to power system for long-term cyber-security risk evaluation. IEEE Access7, 178605–178617 (2019). [Google Scholar]
  • 9.Sayarshad, H. R. Designing vehicle-to-grid (v2g) aggregator fleet capacity for power grid reliability against cyberattacks. Electr. Power Syst. Res.244, 111554 (2025). [Google Scholar]
  • 10.Nguyen, T. et al. Electric power grid resilience to cyber adversaries: State of the art. IEEE Access8, 87592–87608 (2020). [Google Scholar]
  • 11.Pratt, R. M. & Carroll, T. E. Vehicle charging infrastructure security, in: 2019 IEEE International Conference on Consumer Electronics (ICCE), pp. 1–5.
  • 12.Sanghvi, A. & Markel, T. Cybersecurity for electric vehicle fast-charging infrastructure, in: 2021 IEEE Transportation Electrification Conference & Expo (ITEC), pp. 573–576.
  • 13.Ronanki, D. & Karneddi, H. Electric vehicle charging infrastructure: Review, cyber security considerations, potential impacts, countermeasures, and future trends. IEEE J. Emerg. Sel. Top. Power Electron.12, 242–256 (2024). [Google Scholar]
  • 14.Bindra, A. Securing the power grid: Protecting smart grids and connected power systems from cyberattacks. IEEE Power Electron. Mag.4, 20–27 (2017). [Google Scholar]
  • 15.Sayarshad, H. R. Integrating renewable energy and electric vehicle participation in regulation markets for empowering grid stability. Energy Convers. Manag.342, 120041 (2025). [Google Scholar]
  • 16.Galvan, E., Mandal, P. & Sang, Y. Networked microgrids with roof-top solar pv and battery energy storage to improve distribution grids resilience to natural disasters. Int. J. Electr. Power Energy Syst.123, 106239 (2020). [Google Scholar]
  • 17.Picioroagă, I. I., Eremia, M., Sănduleac, M. & Sidea, D. O. Optimal allocation of energy storage systems for resilient distribution networks focusing on critical loads, in: 2019 11th International Symposium on Advanced Topics in Electrical Engineering (ATEE), pp. 1–6.
  • 18.Li, J. et al. Coordinated optimization of emergency response resources in transportation-power distribution networks under extreme events. IEEE Trans. Smart Grid14, 4607–4620 (2023). [Google Scholar]
  • 19.Yiyun, T., Can, L., Lin, C. & Lin, L. Research on vehicle-to-grid technology, In: 2011 International Conference on Computer Distributed Control and Intelligent Environmental Monitoring, pp. 1013–1016.
  • 20.Pepiciello, A. & Vaccaro, A. The role of vehicle to grid technology for enhancing power distribution system flexibility, In: 2022 IEEE International Workshop on Metrology for Automotive (MetroAutomotive), pp. 24–29.
  • 21.Liu, S., Wang, L., Hu, J. & Zhou, Z. A stochastic charging station deployment model for electrified taxi fleets in coupled urban transportation and power distribution networks. IEEE Trans. Sustain. Energy15, 1138–1150 (2024). [Google Scholar]
  • 22.Ji, Z., Huang, X., Zhang, Z., Jiang, M., & Xu, Q. Evaluating the vehicle-to-grid potentials by electric vehicles: A quantitative study in china by 2030, In: 2020 IEEE Power & Energy Society General Meeting (PESGM), pp. 1–5.
  • 23.Wei, Y. et al. Economic and environmental benefits of vehicle-to-grid in the power system: A national study of china’s 2030 and 2060 dual-carbon goal, In: 2022 IEEE 6th Conference on Energy Internet and Energy System Integration (EI2), pp. 3176–3182.
  • 24.Zhang, Z., Chen, Z., Xing, Q., Ji, Z. & Zhang, T. Evaluation of the multi-dimensional growth potential of china’s public charging facilities for electric vehicles through 2030. Util. Policy75, 101344 (2022). [Google Scholar]
  • 25.Wu, Y. et al. A rapid recovery strategy for post-earthquake power grids with the auxiliary support of v2g, In: 2022 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia), pp. 1680–1685.
  • 26.Yu, Q., Wang, Z., Song, Y., Shen, X. & Zhang, H. Potential and flexibility analysis of electric taxi fleets v2g system based on trajectory data and agent-based modeling. Appl. Energy355, 122323 (2024). [Google Scholar]
  • 27.Zhang, L. et al. Coordinated optimization of emergency power vehicles and distribution network reconfiguration considering the uncertain restoration capability of e-taxis. IEEE Trans. Ind. Appl.58, 2707–2717 (2022). [Google Scholar]
  • 28.Sayarshad, H. R. Smart transit dynamic optimization and informatics, Toronto Metropolitan University (2015). Thesis. 10.32920/ryerson.14647785.v1.
  • 29.Goeke, D. & Schneider, M. Routing a mixed fleet of electric and conventional vehicles. Eur. J. Oper. Res.245, 81–99 (2015). [Google Scholar]
  • 30.Masmoudi, M. A., Hosny, M., Demir, E., Genikomsakis, K. N. & Cheikhrouhou, N. The dial-a-ride problem with electric vehicles and battery swapping stations. Transportation Research Part E: Logistics and Transportation Review118, 392–420 (2018). [Google Scholar]
  • 31.Sayarshad, H. R., Mahmoodian, V. & Bojović, N. Dynamic inventory routing and pricing problem with a mixed fleet of electric and conventional urban freight vehicles. Sustainability13 (2021).
  • 32.Wang, Y. et al. Toward urban electric taxi systems in smart cities: The battery swapping challenge. IEEE Trans. Veh. Technol.67, 1946–1960 (2018). [Google Scholar]
  • 33.Lu, J.-L. et al. Operating electric taxi fleets: A new dispatching strategy with charging plans, In: 2012 IEEE International Electric Vehicle Conference, pp. 1–8 (2012).
  • 34.Sayarshad, H. R. Equity-based vaccine delivery by drones: Optimizing distribution in disease-prone regions. Transportation Research Part E: Logistics and Transportation Review195, 103979 (2025). [Google Scholar]
  • 35.Ammous, M., Khater, M. & AlMuhaini, M. Impact of vehicle-to-grid technology on the reliability of distribution systems, In: 2017 9th IEEE-GCC Conference and Exhibition (GCCCE), pp. 1–6 (2017).
  • 36.Abdubannaev, J. et al. Investigate the use of electric vehicles to improve resilience for active distribution network system, in: 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2), pp. 1041–1046 (2021).
  • 37.Kumar, M., Vyas, S. & Datta, A. A review on integration of electric vehicles into a smart power grid and vehicle-to-grid impacts, in: 2019 8th International Conference on Power Systems (ICPS), pp. 1–5 (2019).
  • 38.Yang, Z., Dehghanian, P. & Nazemi, M. Enhancing seismic resilience of electric power distribution systems with mobile power sources, In: 2019 IEEE Industry Applications Society Annual Meeting, pp. 1–7 (2019).
  • 39.Sahoo, J. P., Sivasubramani, S. & Srikar, P. S. S. Optimized framework for strategic electric vehicle charging station placement and scheduling in distribution systems with renewable energy integration. Swarm Evol. Comput.95, 101943 (2025). [Google Scholar]
  • 40.Lei, S., Chen, C., Zhou, H. & Hou, Y. Routing and scheduling of mobile power sources for distribution system resilience enhancement. IEEE Trans. Smart Grid10, 5650–5662 (2019). [Google Scholar]
  • 41.Lin, Y., Bie, Z. & Qiu, A. A review of key strategies in realizing power system resilience. Glob. Energy Interconnect.1, 70–78 (2018). [Google Scholar]
  • 42.Alghamdi, A. A. M. & Jayaweera, D. Resilience of modern power distribution networks with active coordination of evs and smart restoration. IET Gener. Transm. Distrib.17, 4836–4857 (2023). [Google Scholar]
  • 43.Naderi, E. & Asrari, A. Cyber-physical distribution systems resilience against cyberattacks via a remediation framework based on static var compensators (svcs). IEEE Access12, 119633–119646 (2024). [Google Scholar]
  • 44.Alasali, F. et al. Enhancing resilience of advanced power protection systems in smart grids against cyber-physical threats. IET Renew. Power Gener.18, 837–862 (2024). [Google Scholar]
  • 45.Nikoobakht, A. & Aghaei, J. Robust inter-reliant resilience of cyber-physical smart grids. Sustain. Energy Technol. Assess.60, 103449 (2023). [Google Scholar]
  • 46.Palomino, A., Giraldo, J. & Parvania, M. Graph-based interdependent cyber-physical risk analysis of power distribution networks. IEEE Trans. Power Deliv.38, 1510–1520 (2023). [Google Scholar]
  • 47.Rout, B. & Natarajan, B. Impact of cyber attacks on distributed compressive sensing based state estimation in power distribution grids. Int. J. Electr. Power Energy Syst.142, 108295 (2022). [Google Scholar]
  • 48.Nandi, A. K. & Medal, H. R. Methods for removing links in a network to minimize the spread of infections. Comput. Oper. Res.69, 10–24 (2016). [Google Scholar]
  • 49.Tatipatri, N. & Arun, S. L. A comprehensive review on cyber-attacks in power systems: Impact analysis, detection, and cyber security. IEEE Access12, 18147–18167 (2024). [Google Scholar]
  • 50.Tuttle, M., Poshtan, M., Taufik, T. & Callenes, J. Impact of cyber-attacks on power grids with distributed energy storage systems, In: 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1–6 (2019).
  • 51.Sayarshad, H. R. Securing power grids and charging infrastructure: Cyberattack resilience and vehicle-to-grid integration. J. Transp. Geogr.126, 104231 (2025). [Google Scholar]
  • 52.Ghanbari-Ghalehjoughi, M., Taghizad-Tavana, K. & Nojavan, S. Resilient operation of the renewable energy and battery energy storages based smart distribution grid considering physical-cyber-attacks. J. Energy Storage62, 106950 (2023). [Google Scholar]
  • 53.Sarker, P. S., Rafy, M. F., Srivastava, A. K. & Singh, R. K. Cyber anomaly-aware distributed voltage control with active power curtailment and ders. IEEE Trans. Ind. Appl.60, 1622–1633 (2024). [Google Scholar]
  • 54.Dugan, J., Mohagheghi, S. & Kroposki, B. Application of mobile energy storage for enhancing power grid resilience: A review. Energies14, (2021).
  • 55.Sheppard, C., Dunn, L. N., Bae, S. & Gardner, M. Optimal dispatch of electrified autonomous mobility on demand vehicles during power outages, In: 2017 IEEE Power & Energy Society General Meeting, pp. 1–5 (2017).
  • 56.Zeng, T., Moura, S. & Zhou, Z. Joint mobility and vehicle-to-grid coordination in rebalancing shared mobility-on-demand systems. IFAC-PapersOnLine56, 6642–6647 (2023) (22nd IFAC World Congress.). [Google Scholar]
  • 57.Faheem, M. & Al-Khasawneh, M. A. Multilayer cyberattacks identification and classification using machine learning in internet of blockchain (iobc)-based energy networks. Data in Brief54, 110461 (2024). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 58.Kumar, P. et al. Digital twin-driven sdn for smart grid: A deep learning integrated blockchain for cybersecurity. Solar Energy263, 111921 (2023). [Google Scholar]
  • 59.Siraj Khan, M. M., Giraldo, J. & Parvania, M. Real-time cyber-physical analysis of distribution systems using digital twins, In: 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 34–39 (2022).
  • 60.Akbarian, F., Fitzgerald, E., & Kihl, M. Intrusion detection in digital twins for industrial control systems, in: 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1–6 (2020).
  • 61.Robbennolt, J., Mohammadi, J. & Boyles, S. D. Shared autonomous electric vehicle dispatch with mobility and distribution system resilience benefits, In: 2024 IEEE Texas Power and Energy Conference (TPEC), pp. 1–6 (2024).
  • 62.Sayarshad, H., Tavassoli, S. & Zhao, F. A multi-periodic optimization formulation for bike planning and bike utilization. Appl. Math. Model.36, 4944–4951 (2012). [Google Scholar]
  • 63.Su, C.-W., Khan, K., Umar, M. & Zhang, W. Does renewable energy redefine geopolitical risks?. Energy Policy158, 112566 (2021). [Google Scholar]
  • 64.Sahoo, J. P., Ray, R., Prakash, R. & Sivasubramani, S. Impacts of plug-in evs and decentralized power generation on distribution system operation, e-Prime - Advances in Electrical Engineering. Electron. Energy9, 100658 (2024). [Google Scholar]
  • 65.Sayarshad, H. R. Coordinated routing, charging, and power grid for electric and hydrogen vehicles with renewable energy integration. Nat. Energy243, 122572 (2025). [Google Scholar]
  • 66.Szinai, J. K., Sheppard, C. J., Abhyankar, N. & Gopal, A. R. Reduced grid operating costs and renewable energy curtailment with electric vehicle charge management. Energy Policy136, 111051 (2020). [Google Scholar]
  • 67.Sahoo, J. P. & Sivasubramani, S. A charging coordination strategy for seamless integration of plug-in electric vehicles into a distribution network, In: 2023 IEEE IAS Global Conference on Renewable Energy and Hydrogen Technologies (GlobConHT), pp. 1–6 (2023).
  • 68.Sayarshad, H. R. Optimization of electric charging infrastructure: integrated model for routing and charging coordination with power-aware operations. npj Sustainable Mobility and Transport1, 4. 10.1038/s44333-024-00004-6 (2024). [Google Scholar]
  • 69.Hendel, G., Miltenberger, M. & Witzig, J. Adaptive algorithmic behavior for solving mixed integer programs using bandit algorithms. In Operations Research Proceedings 2018 (eds Fortz, B. & Labbé, M.) 513–519 (Springer International Publishing, Cham, 2019). [Google Scholar]
  • 70.Sayarshad, H. R. Using bees algorithm for material handling equipment planning in manufacturing systems. Int. J. Adv. Manuf. Technol.48, 1009–1018 (2010). [Google Scholar]
  • 71.Fisher, M. L. The lagrangian relaxation method for solving integer programming problems. Management Science50, 1861–1871 (2004). [Google Scholar]
  • 72.Sayarshad, H. R. & Ghoseiri, K. A simulated annealing approach for the multi-periodic rail-car fleet sizing problem. Comput. Oper. Res.36, 1789–1799 (2009). [Google Scholar]
  • 73.Huang, B., Meijssen, A. G., Annema, J. A. & Lukszo, Z. Are electric vehicle drivers willing to participate in vehicle-to-grid contracts? a context-dependent stated choice experiment. Energy Policy156, 112410 (2021). [Google Scholar]
  • 74.Sayarshad, H. Designing intelligent public parking locations for autonomous vehicles. Expert Syst. Appl.222, 119810 (2023). [Google Scholar]
  • 75.Pasqualetti, F., Dörfler, F. & Bullo, F. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design, In: 2011 50th IEEE Conference on Decision and Control and European Control Conference, pp. 2195–2201 (2011).
  • 76.Molzahn, D. K. & Wang, J. Detection and characterization of intrusions to network parameter data in electric power systems. IEEE Trans. Smart Grid10, 3919–3928 (2019). [Google Scholar]
  • 77.Wang, H. et al. Generalized attack separation scheme in cyber physical smart grid based on robust interval state estimation. Int. J. Electr. Power Energy Syst.129, 106741 (2021). [Google Scholar]
  • 78.Choi, I.-S., Hong, J. & Kim, T.-W. Multi-agent based cyber attack detection and mitigation for distribution automation system. IEEE Access8, 183495–183504 (2020). [Google Scholar]
  • 79.Genikomsakis, K. N. & Mitrentsis, G. A computationally efficient simulation model for estimating energy consumption of electric vehicles in the context of route planning applications. Transportation Research Part D: Transport and Environment50, 98–118 (2017). [Google Scholar]
  • 80.Baran, M. & Wu, F. Optimal sizing of capacitors placed on a radial distribution system. IEEE Trans. Power Deliv.4, 735–743 (1989). [Google Scholar]
  • 81.Trakas, D. N. & Hatziargyriou, N. D. Optimal distribution system operation for enhancing resilience against wildfires. IEEE Trans. Power Syst.33, 2260–2271 (2018). [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

All dataset sources are cited in the article. Additional data is available upon request to the corresponding author.


Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES