期刊
IEEE TRANSACTIONS ON POWER ELECTRONICS
卷 36, 期 8, 页码 9637-9647出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TPEL.2021.3055215
关键词
Microgrids; Voltage control; Cyberattack; Observers; Consensus protocol; Voltage measurement; Matrix converters; Cyber attack detection and mitigation; dc microgrid; distributed control
资金
- Singapore Ministry of Education Academic Research Fund Tier-1 [R-263-000-D10-114]
Limited global information in DC microgrids with distributed cooperative control makes them vulnerable to cyber attacks, and a novel false data injection attack model called the concurrent attack is discussed in this study. An energy-based detection strategy and a differentiation criterion based on voltage correction terms from a voltage observer are proposed to distinguish between the concurrent attack and communication link attack. The effectiveness of the proposed resilient control scheme is demonstrated through simulations and experimental results.
Limited global information in dc microgrids with distributed cooperative control makes them vulnerable to cyber attacks, which can lead to their destabilization and shut down. Here, we discuss a novel false data injection attack (FDIA) model, termed as the concurrent attack, that can compromise local and communicated estimated voltages simultaneously. We formalize that such an attack could be disguised as a conventional FDIA on the estimated voltages transmitted in communication links (termed as the communication link attack), thereby masking the presence of the attack on local estimated voltages and rendering corresponding mitigation attempts ineffective. Second, we present an energy-based detection strategy based on the intrinsic mode functions obtained using the ensemble empirical mode decomposition method. Further, a differentiation criterion using the voltage correction terms generated from the voltage observer is employed to help distinguish between the concurrent attack and the communication link attack. An event-driven mitigation strategy is then used to replace the attacked signal with a reconstructed signal. Finally, the efficacy of the proposed resilient control scheme is demonstrated using both simulations and experimental results.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据