scholarly journals Distributed Control for AC Microgrids with False Data Injection Attacks and Time Delays

2020 ◽  
Vol 194 ◽  
pp. 03023
Author(s):  
Rentao Lu ◽  
Jie Wang

Distributed control is widely used in AC microgrids to maintain frequency and voltage stability and internal power balance. However, distributed control need realizes information interaction through communication network, which makes microgrid vulnerable to network attack. A distributed control strategy based on consensus theory is proposed in this paper to enhance the resilience of microgrid to attack. An attack detection and localization method is designed for the false data injection attack. The Artstein’s transformation is introduced to process the delay data and the performance of controller under delay can be enhanced. An isolated island AC microgrid model was built in Simulink platform for simulation to verify the performance of the controller. The simulation results verified the effectiveness of the control strategy against false data injection attack and time delay.

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Moslem Dehghani ◽  
Mohammad Ghiasi ◽  
Taher Niknam ◽  
Abdollah Kavousi-Fard ◽  
Elham Tajik ◽  
...  

Author(s):  
Zhiwen Wang ◽  
Bin Zhang ◽  
Xiangnan Xu ◽  
Usman ◽  
Long Li

This paper investigates the security control problem of the cyber-physical system under false data injection attacks. A model predictive switching control strategy based on attack perception is proposed to compensate for the untrusted sequence of data caused by false data injection attacks. First, the binary attack detector is applied whether the system has suffered the attack. If the attack occurs, multistep correction is carried out for the future data according to the previous time data, and the waiting period [Formula: see text] is set. The input and output sequence of the controller is reconstructed, and the system is modeled as a constant time-delay switched system. Subsequently, the Lyapunov methods and average-dwell time are combined to provide sufficient conditions for the asymptotical stability of closed-loop switched system. Finally, the simulation of the networked first-order inverted pendulum model reveals that the control technique can efficiently suppress the influence of the attacks.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 95109-95125 ◽  
Author(s):  
Jie Cao ◽  
Da Wang ◽  
Zhaoyang Qu ◽  
Mingshi Cui ◽  
Pengcheng Xu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document