4.8 Article

Mitigating Concurrent False Data Injection Attacks in Cooperative DC Microgrids

Journal

IEEE TRANSACTIONS ON POWER ELECTRONICS
Volume 36, Issue 8, Pages 9637-9647

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TPEL.2021.3055215

Keywords

Microgrids; Voltage control; Cyberattack; Observers; Consensus protocol; Voltage measurement; Matrix converters; Cyber attack detection and mitigation; dc microgrid; distributed control

Funding

  1. Singapore Ministry of Education Academic Research Fund Tier-1 [R-263-000-D10-114]

Ask authors/readers for more resources

Limited global information in DC microgrids with distributed cooperative control makes them vulnerable to cyber attacks, and a novel false data injection attack model called the concurrent attack is discussed in this study. An energy-based detection strategy and a differentiation criterion based on voltage correction terms from a voltage observer are proposed to distinguish between the concurrent attack and communication link attack. The effectiveness of the proposed resilient control scheme is demonstrated through simulations and experimental results.
Limited global information in dc microgrids with distributed cooperative control makes them vulnerable to cyber attacks, which can lead to their destabilization and shut down. Here, we discuss a novel false data injection attack (FDIA) model, termed as the concurrent attack, that can compromise local and communicated estimated voltages simultaneously. We formalize that such an attack could be disguised as a conventional FDIA on the estimated voltages transmitted in communication links (termed as the communication link attack), thereby masking the presence of the attack on local estimated voltages and rendering corresponding mitigation attempts ineffective. Second, we present an energy-based detection strategy based on the intrinsic mode functions obtained using the ensemble empirical mode decomposition method. Further, a differentiation criterion using the voltage correction terms generated from the voltage observer is employed to help distinguish between the concurrent attack and the communication link attack. An event-driven mitigation strategy is then used to replace the attacked signal with a reconstructed signal. Finally, the efficacy of the proposed resilient control scheme is demonstrated using both simulations and experimental results.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available