4.6 Article

Attack and Defense Strategy of Distribution Network Cyber-Physical System Considering EV Source-Charge Bidirectionality

Journal

ELECTRONICS
Volume 10, Issue 23, Pages -

Publisher

MDPI
DOI: 10.3390/electronics10232973

Keywords

consensus algorithm; energy management; cyber-physical system (CPS); false data injection attack; distributed control; electric vehicle aggregator

Funding

  1. Liaoning Electric Power Co., Ltd.
  2. Electric Power Science Research Institute [SGLBDK00NYJS2100077]

Ask authors/readers for more resources

This paper introduces a new data integrity attack strategy for consistent energy management algorithm in electric vehicles and proposes a disturbance rejection control strategy combining privacy protection protocols and an isolation mechanism. The effectiveness of the proposed encryption mechanism is analyzed and the feasibility of the isolation control algorithm is verified through simulation and comparison.
In the last few years, there has been an exponential increase in the penetration of electric vehicles (EVs) due to their eco-friendly nature and ability to support bidirectional energy exchanges with the power cyber-physical system. However, the existing research only proposes energy management in terms of vehicle-to-grid (V2G) support using fleets of EVs, which lacks research on EV attacks. Motivated by these facts, this paper first introduces a new data integrity attack strategy for a consistent energy management algorithm which considers electric vehicles as energy storage. In particular, we consider EV aggregators as energy storage with source-charge bidirectional characteristics. The attacker carefully constructs false information to manipulate aggregators to participate in scheduling and obtaining additional benefits on the premise of meeting the constraints of microgrid and various devices by attacking the consistent algorithm. Then, we propose a disturbance rejection control strategy combining privacy protection protocols and an isolation mechanism. We analyze the effectiveness of the proposed encryption mechanism and verify the feasibility of the isolation control algorithm by simulation and comparison.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available