The hierarchical control strategy based on the concept of cyber physical system for islanded micro-grid with communication data disturbance

Author(s):  
Bo Zhang ◽  
Chunxia Dou ◽  
Zhanqiang Zhang ◽  
Xiaogang An
Energies ◽  
2018 ◽  
Vol 11 (7) ◽  
pp. 1835 ◽  
Author(s):  
Qiuxia Yang ◽  
Dongmei Yuan ◽  
Xiaoqiang Guo ◽  
Bo Zhang ◽  
Cheng Zhi

Based on the concept of cyber physical system (CPS), a novel hierarchical control strategy for islanded microgrids is proposed in this paper. The control structure consists of physical and cyber layers. It’s used to improve the control effect on the output voltages and frequency by droop control of distributed energy resources (DERs), share the reactive power among DERs more reasonably and solve the problem of circumfluence in microgrids. The specific designs are as follows: to improve the control effect on voltages and frequency of DERs, an event-trigger mechanism is designed in the physical layer. When the trigger conditions in the mechanism aren’t met, only the droop control (i.e., primary control) is used in the controlled system. Otherwise, a virtual leader-following consensus control method is used in the cyber layer to accomplish the secondary control on DERs; to share the reactive power reasonably, a method of double virtual impedance is designed in the physical layer to adjust the output reactive power of DERs; to suppress circumfluence, a method combined with consensus control without leader and sliding mode control (SMC) is used in the cyber layer. Finally, the effectiveness of the proposed hierarchical control strategy is confirmed by simulation results.


Author(s):  
Zhiwen Wang ◽  
Bin Zhang ◽  
Xiangnan Xu ◽  
Usman ◽  
Long Li

This paper investigates the security control problem of the cyber-physical system under false data injection attacks. A model predictive switching control strategy based on attack perception is proposed to compensate for the untrusted sequence of data caused by false data injection attacks. First, the binary attack detector is applied whether the system has suffered the attack. If the attack occurs, multistep correction is carried out for the future data according to the previous time data, and the waiting period [Formula: see text] is set. The input and output sequence of the controller is reconstructed, and the system is modeled as a constant time-delay switched system. Subsequently, the Lyapunov methods and average-dwell time are combined to provide sufficient conditions for the asymptotical stability of closed-loop switched system. Finally, the simulation of the networked first-order inverted pendulum model reveals that the control technique can efficiently suppress the influence of the attacks.


2018 ◽  
Vol 12 (9) ◽  
pp. 1012-1024 ◽  
Author(s):  
Chunxia Dou ◽  
Bo Zhang ◽  
Dong Yue ◽  
Zhanqiang Zhang ◽  
Shiyun Xu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document