You are required to read and agree to the below before accessing a full-text version of an article in the IDE article repository.

The full-text document you are about to access is subject to national and international copyright laws. In most cases (but not necessarily all) the consequence is that personal use is allowed given that the copyright owner is duly acknowledged and respected. All other use (typically) require an explicit permission (often in writing) by the copyright owner.

For the reports in this repository we specifically note that

  • the use of articles under IEEE copyright is governed by the IEEE copyright policy (available at
  • the use of articles under ACM copyright is governed by the ACM copyright policy (available at
  • technical reports and other articles issued by M‰lardalen University is free for personal use. For other use, the explicit consent of the authors is required
  • in other cases, please contact the copyright owner for detailed information

By accepting I agree to acknowledge and respect the rights of the copyright owner of the document I am about to access.

If you are in doubt, feel free to contact

Resilient and Privacy-Preserving Multi-Agent Optimization and Control of a Network of Battery Energy Storage Systems Under Attack


Mojtaba Kaheni, Elio Usai , Mauro Franceschelli

Publication Type:

Journal article


IEEE Transactions on Automation Science and Engineering




This paper deals with resilient and privacy-preserving control to optimize the daily operation costs of networked Battery Energy Storage Systems (BESS) in a multi-agent network vulnerable to various types of cyber-attacks. First, we formulate the optimization problem by defining the objective function and the local and coupling constraints. Next, we introduce a novel resilient decentralized control and optimization algorithm that can mitigate the effects of cyber-attacks, specifically false data injection attacks and hijacking, to enhance the network’s resilience. The proposed method is based on filtering out outlier Lagrange multipliers in a suitable dual problem. Our proposed algorithm has two main advantages compared to the existing literature. Firstly, it can solve problems where the coupling constraint is not restricted to the average or a function of the average of decision variables. Secondly, our algorithm extends the well-known dual decomposition and Lagrange multiplier method to the decentralized control problem of BESSs. In the proposed algorithm presented in this paper, only the data relevant to the dual problem is exchanged among the agents. Noticing that the data of the dual problem does not contain any private information, mitigating privacy concerns associated with our proposed algorithm. We formally prove the convergence of our algorithm to a feasible and sub-optimal solution. Additionally, simulations demonstrate the effectiveness of our results. Note to Practitioners —Optimal coordinated control of BESSs increases the power system’s reliability and reduces costs. With the expansion of the use of small-scale BESSs in household customers, it is possible to considerably increase the free capacity of power networks by optimally controlling these small BESSs. The methods published so far to solve such problems either share the private information of each BESS or are not resilient to failures or false data injection due to cyber-attacks. Therefore, these approaches are not favored in practical applications. Considering this practical motivation, in this paper, we present a decentralized algorithm to control a large set of BESSs in a platform vulnerable to various types of cyber-attacks without compromising privacy.


author = {Mojtaba Kaheni and Elio Usai and Mauro Franceschelli},
title = {Resilient and Privacy-Preserving Multi-Agent Optimization and Control of a Network of Battery Energy Storage Systems Under Attack},
pages = {1--13},
month = {September},
year = {2023},
journal = {IEEE Transactions on Automation Science and Engineering},
url = {}