4.6 Article

Attack and Defense Strategy of Distribution Network Cyber-Physical System Considering EV Source-Charge Bidirectionality

期刊

ELECTRONICS
卷 10, 期 23, 页码 -

出版社

MDPI
DOI: 10.3390/electronics10232973

关键词

consensus algorithm; energy management; cyber-physical system (CPS); false data injection attack; distributed control; electric vehicle aggregator

资金

  1. Liaoning Electric Power Co., Ltd.
  2. Electric Power Science Research Institute [SGLBDK00NYJS2100077]

向作者/读者索取更多资源

This paper introduces a new data integrity attack strategy for consistent energy management algorithm in electric vehicles and proposes a disturbance rejection control strategy combining privacy protection protocols and an isolation mechanism. The effectiveness of the proposed encryption mechanism is analyzed and the feasibility of the isolation control algorithm is verified through simulation and comparison.
In the last few years, there has been an exponential increase in the penetration of electric vehicles (EVs) due to their eco-friendly nature and ability to support bidirectional energy exchanges with the power cyber-physical system. However, the existing research only proposes energy management in terms of vehicle-to-grid (V2G) support using fleets of EVs, which lacks research on EV attacks. Motivated by these facts, this paper first introduces a new data integrity attack strategy for a consistent energy management algorithm which considers electric vehicles as energy storage. In particular, we consider EV aggregators as energy storage with source-charge bidirectional characteristics. The attacker carefully constructs false information to manipulate aggregators to participate in scheduling and obtaining additional benefits on the premise of meeting the constraints of microgrid and various devices by attacking the consistent algorithm. Then, we propose a disturbance rejection control strategy combining privacy protection protocols and an isolation mechanism. We analyze the effectiveness of the proposed encryption mechanism and verify the feasibility of the isolation control algorithm by simulation and comparison.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据