Resilient Networked AC Microgrids Under Unbounded Cyber Attacks
This paper considers a cooperative and adversarial AC microgrid system consisting of cooperative leaders and inverters, as well as adversarial attackers. The attackers aim to destabilize the synchronization dynamics of the AC microgrid by first intercepting the communication channels, penetrating th...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on smart grid 2020-09, Vol.11 (5), p.3785-3794 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3794 |
---|---|
container_issue | 5 |
container_start_page | 3785 |
container_title | IEEE transactions on smart grid |
container_volume | 11 |
creator | Zuo, Shan Beg, Omar Ali Lewis, Frank L. Davoudi, Ali |
description | This paper considers a cooperative and adversarial AC microgrid system consisting of cooperative leaders and inverters, as well as adversarial attackers. The attackers aim to destabilize the synchronization dynamics of the AC microgrid by first intercepting the communication channels, penetrating the local state feedback, and pretending to be a cooperative neighbor, and then initiating malicious attacks by launching unbounded injections. A fully distributed resilient control framework is offered for the secondary frequency regulation and voltage containment to ensure system stability and preserve bounded synchronization. In particular, a virtual resilient layer with hidden networks is developed to integrate with the original cyber-physical layer. The proposed resilient control framework is fully distributed without requiring any global information. A modified IEEE 34-bus test feeder benchmark system is emulated in a controller/hardware-in-the-loop environment, where the control objectives are met under different attack scenarios. |
doi_str_mv | 10.1109/TSG.2020.2984266 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_9051995</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9051995</ieee_id><sourcerecordid>2436406536</sourcerecordid><originalsourceid>FETCH-LOGICAL-c338t-78078c00f75cf8b1fba3b8c3194adc423469578556cabb4bc39ead8cf11ef43f3</originalsourceid><addsrcrecordid>eNo9UMFKAzEQDaJgqb0LXhY8b00ySTY5SVm0ClVB23NIsolsW7s12SL9e1NaOoeZN_DezOMhdEvwmBCsHuZf0zHFFI-pkowKcYEGRDFVAhbk8ow5XKNRSkucCwAEVQP0-OlTu279pi_eff_XxZVvikldvLUudt-xbVKx2DQ-5m67XUZNUe9t3id9b9wq3aCrYNbJj05ziBbPT_P6pZx9TF_ryax0ALIvK4kr6TAOFXdBWhKsASsdZGemcYwCE4pXknPhjLXMOlDeNNIFQnxgEGCI7o93t7H73fnU62W3i5v8UlMGgmHBQWQWPrKy-ZSiD3ob2x8T95pgfUhK56T0ISl9SipL7o6S1nt_pivMiVIc_gEGfGNv</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2436406536</pqid></control><display><type>article</type><title>Resilient Networked AC Microgrids Under Unbounded Cyber Attacks</title><source>IEEE Electronic Library (IEL)</source><creator>Zuo, Shan ; Beg, Omar Ali ; Lewis, Frank L. ; Davoudi, Ali</creator><creatorcontrib>Zuo, Shan ; Beg, Omar Ali ; Lewis, Frank L. ; Davoudi, Ali</creatorcontrib><description>This paper considers a cooperative and adversarial AC microgrid system consisting of cooperative leaders and inverters, as well as adversarial attackers. The attackers aim to destabilize the synchronization dynamics of the AC microgrid by first intercepting the communication channels, penetrating the local state feedback, and pretending to be a cooperative neighbor, and then initiating malicious attacks by launching unbounded injections. A fully distributed resilient control framework is offered for the secondary frequency regulation and voltage containment to ensure system stability and preserve bounded synchronization. In particular, a virtual resilient layer with hidden networks is developed to integrate with the original cyber-physical layer. The proposed resilient control framework is fully distributed without requiring any global information. A modified IEEE 34-bus test feeder benchmark system is emulated in a controller/hardware-in-the-loop environment, where the control objectives are met under different attack scenarios.</description><identifier>ISSN: 1949-3053</identifier><identifier>EISSN: 1949-3061</identifier><identifier>DOI: 10.1109/TSG.2020.2984266</identifier><identifier>CODEN: ITSGBQ</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>AC microgrids ; Communication channels ; Containment ; Cyberattack ; Cybersecurity ; Distributed generation ; Frequency control ; Hardware-in-the-loop simulation ; Inverters ; Microgrids ; resilient control ; State feedback ; Synchronism ; Synchronization ; Systems stability ; unbounded attacks ; Voltage control</subject><ispartof>IEEE transactions on smart grid, 2020-09, Vol.11 (5), p.3785-3794</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c338t-78078c00f75cf8b1fba3b8c3194adc423469578556cabb4bc39ead8cf11ef43f3</citedby><cites>FETCH-LOGICAL-c338t-78078c00f75cf8b1fba3b8c3194adc423469578556cabb4bc39ead8cf11ef43f3</cites><orcidid>0000-0003-4074-1615 ; 0000-0003-2951-442X ; 0000-0002-5353-7616 ; 0000-0001-9830-9310</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9051995$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27923,27924,54757</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9051995$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zuo, Shan</creatorcontrib><creatorcontrib>Beg, Omar Ali</creatorcontrib><creatorcontrib>Lewis, Frank L.</creatorcontrib><creatorcontrib>Davoudi, Ali</creatorcontrib><title>Resilient Networked AC Microgrids Under Unbounded Cyber Attacks</title><title>IEEE transactions on smart grid</title><addtitle>TSG</addtitle><description>This paper considers a cooperative and adversarial AC microgrid system consisting of cooperative leaders and inverters, as well as adversarial attackers. The attackers aim to destabilize the synchronization dynamics of the AC microgrid by first intercepting the communication channels, penetrating the local state feedback, and pretending to be a cooperative neighbor, and then initiating malicious attacks by launching unbounded injections. A fully distributed resilient control framework is offered for the secondary frequency regulation and voltage containment to ensure system stability and preserve bounded synchronization. In particular, a virtual resilient layer with hidden networks is developed to integrate with the original cyber-physical layer. The proposed resilient control framework is fully distributed without requiring any global information. A modified IEEE 34-bus test feeder benchmark system is emulated in a controller/hardware-in-the-loop environment, where the control objectives are met under different attack scenarios.</description><subject>AC microgrids</subject><subject>Communication channels</subject><subject>Containment</subject><subject>Cyberattack</subject><subject>Cybersecurity</subject><subject>Distributed generation</subject><subject>Frequency control</subject><subject>Hardware-in-the-loop simulation</subject><subject>Inverters</subject><subject>Microgrids</subject><subject>resilient control</subject><subject>State feedback</subject><subject>Synchronism</subject><subject>Synchronization</subject><subject>Systems stability</subject><subject>unbounded attacks</subject><subject>Voltage control</subject><issn>1949-3053</issn><issn>1949-3061</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9UMFKAzEQDaJgqb0LXhY8b00ySTY5SVm0ClVB23NIsolsW7s12SL9e1NaOoeZN_DezOMhdEvwmBCsHuZf0zHFFI-pkowKcYEGRDFVAhbk8ow5XKNRSkucCwAEVQP0-OlTu279pi_eff_XxZVvikldvLUudt-xbVKx2DQ-5m67XUZNUe9t3id9b9wq3aCrYNbJj05ziBbPT_P6pZx9TF_ryax0ALIvK4kr6TAOFXdBWhKsASsdZGemcYwCE4pXknPhjLXMOlDeNNIFQnxgEGCI7o93t7H73fnU62W3i5v8UlMGgmHBQWQWPrKy-ZSiD3ob2x8T95pgfUhK56T0ISl9SipL7o6S1nt_pivMiVIc_gEGfGNv</recordid><startdate>20200901</startdate><enddate>20200901</enddate><creator>Zuo, Shan</creator><creator>Beg, Omar Ali</creator><creator>Lewis, Frank L.</creator><creator>Davoudi, Ali</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>KR7</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0003-4074-1615</orcidid><orcidid>https://orcid.org/0000-0003-2951-442X</orcidid><orcidid>https://orcid.org/0000-0002-5353-7616</orcidid><orcidid>https://orcid.org/0000-0001-9830-9310</orcidid></search><sort><creationdate>20200901</creationdate><title>Resilient Networked AC Microgrids Under Unbounded Cyber Attacks</title><author>Zuo, Shan ; Beg, Omar Ali ; Lewis, Frank L. ; Davoudi, Ali</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c338t-78078c00f75cf8b1fba3b8c3194adc423469578556cabb4bc39ead8cf11ef43f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>AC microgrids</topic><topic>Communication channels</topic><topic>Containment</topic><topic>Cyberattack</topic><topic>Cybersecurity</topic><topic>Distributed generation</topic><topic>Frequency control</topic><topic>Hardware-in-the-loop simulation</topic><topic>Inverters</topic><topic>Microgrids</topic><topic>resilient control</topic><topic>State feedback</topic><topic>Synchronism</topic><topic>Synchronization</topic><topic>Systems stability</topic><topic>unbounded attacks</topic><topic>Voltage control</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zuo, Shan</creatorcontrib><creatorcontrib>Beg, Omar Ali</creatorcontrib><creatorcontrib>Lewis, Frank L.</creatorcontrib><creatorcontrib>Davoudi, Ali</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on smart grid</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zuo, Shan</au><au>Beg, Omar Ali</au><au>Lewis, Frank L.</au><au>Davoudi, Ali</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Resilient Networked AC Microgrids Under Unbounded Cyber Attacks</atitle><jtitle>IEEE transactions on smart grid</jtitle><stitle>TSG</stitle><date>2020-09-01</date><risdate>2020</risdate><volume>11</volume><issue>5</issue><spage>3785</spage><epage>3794</epage><pages>3785-3794</pages><issn>1949-3053</issn><eissn>1949-3061</eissn><coden>ITSGBQ</coden><abstract>This paper considers a cooperative and adversarial AC microgrid system consisting of cooperative leaders and inverters, as well as adversarial attackers. The attackers aim to destabilize the synchronization dynamics of the AC microgrid by first intercepting the communication channels, penetrating the local state feedback, and pretending to be a cooperative neighbor, and then initiating malicious attacks by launching unbounded injections. A fully distributed resilient control framework is offered for the secondary frequency regulation and voltage containment to ensure system stability and preserve bounded synchronization. In particular, a virtual resilient layer with hidden networks is developed to integrate with the original cyber-physical layer. The proposed resilient control framework is fully distributed without requiring any global information. A modified IEEE 34-bus test feeder benchmark system is emulated in a controller/hardware-in-the-loop environment, where the control objectives are met under different attack scenarios.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TSG.2020.2984266</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0003-4074-1615</orcidid><orcidid>https://orcid.org/0000-0003-2951-442X</orcidid><orcidid>https://orcid.org/0000-0002-5353-7616</orcidid><orcidid>https://orcid.org/0000-0001-9830-9310</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1949-3053 |
ispartof | IEEE transactions on smart grid, 2020-09, Vol.11 (5), p.3785-3794 |
issn | 1949-3053 1949-3061 |
language | eng |
recordid | cdi_ieee_primary_9051995 |
source | IEEE Electronic Library (IEL) |
subjects | AC microgrids Communication channels Containment Cyberattack Cybersecurity Distributed generation Frequency control Hardware-in-the-loop simulation Inverters Microgrids resilient control State feedback Synchronism Synchronization Systems stability unbounded attacks Voltage control |
title | Resilient Networked AC Microgrids Under Unbounded Cyber Attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T14%3A41%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Resilient%20Networked%20AC%20Microgrids%20Under%20Unbounded%20Cyber%20Attacks&rft.jtitle=IEEE%20transactions%20on%20smart%20grid&rft.au=Zuo,%20Shan&rft.date=2020-09-01&rft.volume=11&rft.issue=5&rft.spage=3785&rft.epage=3794&rft.pages=3785-3794&rft.issn=1949-3053&rft.eissn=1949-3061&rft.coden=ITSGBQ&rft_id=info:doi/10.1109/TSG.2020.2984266&rft_dat=%3Cproquest_RIE%3E2436406536%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2436406536&rft_id=info:pmid/&rft_ieee_id=9051995&rfr_iscdi=true |