4.8 Article

Mitigating Concurrent False Data Injection Attacks in Cooperative DC Microgrids

期刊

IEEE TRANSACTIONS ON POWER ELECTRONICS
卷 36, 期 8, 页码 9637-9647

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TPEL.2021.3055215

关键词

Microgrids; Voltage control; Cyberattack; Observers; Consensus protocol; Voltage measurement; Matrix converters; Cyber attack detection and mitigation; dc microgrid; distributed control

资金

  1. Singapore Ministry of Education Academic Research Fund Tier-1 [R-263-000-D10-114]

向作者/读者索取更多资源

Limited global information in DC microgrids with distributed cooperative control makes them vulnerable to cyber attacks, and a novel false data injection attack model called the concurrent attack is discussed in this study. An energy-based detection strategy and a differentiation criterion based on voltage correction terms from a voltage observer are proposed to distinguish between the concurrent attack and communication link attack. The effectiveness of the proposed resilient control scheme is demonstrated through simulations and experimental results.
Limited global information in dc microgrids with distributed cooperative control makes them vulnerable to cyber attacks, which can lead to their destabilization and shut down. Here, we discuss a novel false data injection attack (FDIA) model, termed as the concurrent attack, that can compromise local and communicated estimated voltages simultaneously. We formalize that such an attack could be disguised as a conventional FDIA on the estimated voltages transmitted in communication links (termed as the communication link attack), thereby masking the presence of the attack on local estimated voltages and rendering corresponding mitigation attempts ineffective. Second, we present an energy-based detection strategy based on the intrinsic mode functions obtained using the ensemble empirical mode decomposition method. Further, a differentiation criterion using the voltage correction terms generated from the voltage observer is employed to help distinguish between the concurrent attack and the communication link attack. An event-driven mitigation strategy is then used to replace the attacked signal with a reconstructed signal. Finally, the efficacy of the proposed resilient control scheme is demonstrated using both simulations and experimental results.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据