Resilient Networked AC Microgrids Under Unbounded Cyber Attacks

This paper considers a cooperative and adversarial AC microgrid system consisting of cooperative leaders and inverters, as well as adversarial attackers. The attackers aim to destabilize the synchronization dynamics of the AC microgrid by first intercepting the communication channels, penetrating th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on smart grid 2020-09, Vol.11 (5), p.3785-3794
Hauptverfasser: Zuo, Shan, Beg, Omar Ali, Lewis, Frank L., Davoudi, Ali
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3794
container_issue 5
container_start_page 3785
container_title IEEE transactions on smart grid
container_volume 11
creator Zuo, Shan
Beg, Omar Ali
Lewis, Frank L.
Davoudi, Ali
description This paper considers a cooperative and adversarial AC microgrid system consisting of cooperative leaders and inverters, as well as adversarial attackers. The attackers aim to destabilize the synchronization dynamics of the AC microgrid by first intercepting the communication channels, penetrating the local state feedback, and pretending to be a cooperative neighbor, and then initiating malicious attacks by launching unbounded injections. A fully distributed resilient control framework is offered for the secondary frequency regulation and voltage containment to ensure system stability and preserve bounded synchronization. In particular, a virtual resilient layer with hidden networks is developed to integrate with the original cyber-physical layer. The proposed resilient control framework is fully distributed without requiring any global information. A modified IEEE 34-bus test feeder benchmark system is emulated in a controller/hardware-in-the-loop environment, where the control objectives are met under different attack scenarios.
doi_str_mv 10.1109/TSG.2020.2984266
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_9051995</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9051995</ieee_id><sourcerecordid>2436406536</sourcerecordid><originalsourceid>FETCH-LOGICAL-c338t-78078c00f75cf8b1fba3b8c3194adc423469578556cabb4bc39ead8cf11ef43f3</originalsourceid><addsrcrecordid>eNo9UMFKAzEQDaJgqb0LXhY8b00ySTY5SVm0ClVB23NIsolsW7s12SL9e1NaOoeZN_DezOMhdEvwmBCsHuZf0zHFFI-pkowKcYEGRDFVAhbk8ow5XKNRSkucCwAEVQP0-OlTu279pi_eff_XxZVvikldvLUudt-xbVKx2DQ-5m67XUZNUe9t3id9b9wq3aCrYNbJj05ziBbPT_P6pZx9TF_ryax0ALIvK4kr6TAOFXdBWhKsASsdZGemcYwCE4pXknPhjLXMOlDeNNIFQnxgEGCI7o93t7H73fnU62W3i5v8UlMGgmHBQWQWPrKy-ZSiD3ob2x8T95pgfUhK56T0ISl9SipL7o6S1nt_pivMiVIc_gEGfGNv</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2436406536</pqid></control><display><type>article</type><title>Resilient Networked AC Microgrids Under Unbounded Cyber Attacks</title><source>IEEE Electronic Library (IEL)</source><creator>Zuo, Shan ; Beg, Omar Ali ; Lewis, Frank L. ; Davoudi, Ali</creator><creatorcontrib>Zuo, Shan ; Beg, Omar Ali ; Lewis, Frank L. ; Davoudi, Ali</creatorcontrib><description>This paper considers a cooperative and adversarial AC microgrid system consisting of cooperative leaders and inverters, as well as adversarial attackers. The attackers aim to destabilize the synchronization dynamics of the AC microgrid by first intercepting the communication channels, penetrating the local state feedback, and pretending to be a cooperative neighbor, and then initiating malicious attacks by launching unbounded injections. A fully distributed resilient control framework is offered for the secondary frequency regulation and voltage containment to ensure system stability and preserve bounded synchronization. In particular, a virtual resilient layer with hidden networks is developed to integrate with the original cyber-physical layer. The proposed resilient control framework is fully distributed without requiring any global information. A modified IEEE 34-bus test feeder benchmark system is emulated in a controller/hardware-in-the-loop environment, where the control objectives are met under different attack scenarios.</description><identifier>ISSN: 1949-3053</identifier><identifier>EISSN: 1949-3061</identifier><identifier>DOI: 10.1109/TSG.2020.2984266</identifier><identifier>CODEN: ITSGBQ</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>AC microgrids ; Communication channels ; Containment ; Cyberattack ; Cybersecurity ; Distributed generation ; Frequency control ; Hardware-in-the-loop simulation ; Inverters ; Microgrids ; resilient control ; State feedback ; Synchronism ; Synchronization ; Systems stability ; unbounded attacks ; Voltage control</subject><ispartof>IEEE transactions on smart grid, 2020-09, Vol.11 (5), p.3785-3794</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c338t-78078c00f75cf8b1fba3b8c3194adc423469578556cabb4bc39ead8cf11ef43f3</citedby><cites>FETCH-LOGICAL-c338t-78078c00f75cf8b1fba3b8c3194adc423469578556cabb4bc39ead8cf11ef43f3</cites><orcidid>0000-0003-4074-1615 ; 0000-0003-2951-442X ; 0000-0002-5353-7616 ; 0000-0001-9830-9310</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9051995$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27923,27924,54757</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9051995$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zuo, Shan</creatorcontrib><creatorcontrib>Beg, Omar Ali</creatorcontrib><creatorcontrib>Lewis, Frank L.</creatorcontrib><creatorcontrib>Davoudi, Ali</creatorcontrib><title>Resilient Networked AC Microgrids Under Unbounded Cyber Attacks</title><title>IEEE transactions on smart grid</title><addtitle>TSG</addtitle><description>This paper considers a cooperative and adversarial AC microgrid system consisting of cooperative leaders and inverters, as well as adversarial attackers. The attackers aim to destabilize the synchronization dynamics of the AC microgrid by first intercepting the communication channels, penetrating the local state feedback, and pretending to be a cooperative neighbor, and then initiating malicious attacks by launching unbounded injections. A fully distributed resilient control framework is offered for the secondary frequency regulation and voltage containment to ensure system stability and preserve bounded synchronization. In particular, a virtual resilient layer with hidden networks is developed to integrate with the original cyber-physical layer. The proposed resilient control framework is fully distributed without requiring any global information. A modified IEEE 34-bus test feeder benchmark system is emulated in a controller/hardware-in-the-loop environment, where the control objectives are met under different attack scenarios.</description><subject>AC microgrids</subject><subject>Communication channels</subject><subject>Containment</subject><subject>Cyberattack</subject><subject>Cybersecurity</subject><subject>Distributed generation</subject><subject>Frequency control</subject><subject>Hardware-in-the-loop simulation</subject><subject>Inverters</subject><subject>Microgrids</subject><subject>resilient control</subject><subject>State feedback</subject><subject>Synchronism</subject><subject>Synchronization</subject><subject>Systems stability</subject><subject>unbounded attacks</subject><subject>Voltage control</subject><issn>1949-3053</issn><issn>1949-3061</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9UMFKAzEQDaJgqb0LXhY8b00ySTY5SVm0ClVB23NIsolsW7s12SL9e1NaOoeZN_DezOMhdEvwmBCsHuZf0zHFFI-pkowKcYEGRDFVAhbk8ow5XKNRSkucCwAEVQP0-OlTu279pi_eff_XxZVvikldvLUudt-xbVKx2DQ-5m67XUZNUe9t3id9b9wq3aCrYNbJj05ziBbPT_P6pZx9TF_ryax0ALIvK4kr6TAOFXdBWhKsASsdZGemcYwCE4pXknPhjLXMOlDeNNIFQnxgEGCI7o93t7H73fnU62W3i5v8UlMGgmHBQWQWPrKy-ZSiD3ob2x8T95pgfUhK56T0ISl9SipL7o6S1nt_pivMiVIc_gEGfGNv</recordid><startdate>20200901</startdate><enddate>20200901</enddate><creator>Zuo, Shan</creator><creator>Beg, Omar Ali</creator><creator>Lewis, Frank L.</creator><creator>Davoudi, Ali</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>KR7</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0003-4074-1615</orcidid><orcidid>https://orcid.org/0000-0003-2951-442X</orcidid><orcidid>https://orcid.org/0000-0002-5353-7616</orcidid><orcidid>https://orcid.org/0000-0001-9830-9310</orcidid></search><sort><creationdate>20200901</creationdate><title>Resilient Networked AC Microgrids Under Unbounded Cyber Attacks</title><author>Zuo, Shan ; Beg, Omar Ali ; Lewis, Frank L. ; Davoudi, Ali</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c338t-78078c00f75cf8b1fba3b8c3194adc423469578556cabb4bc39ead8cf11ef43f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>AC microgrids</topic><topic>Communication channels</topic><topic>Containment</topic><topic>Cyberattack</topic><topic>Cybersecurity</topic><topic>Distributed generation</topic><topic>Frequency control</topic><topic>Hardware-in-the-loop simulation</topic><topic>Inverters</topic><topic>Microgrids</topic><topic>resilient control</topic><topic>State feedback</topic><topic>Synchronism</topic><topic>Synchronization</topic><topic>Systems stability</topic><topic>unbounded attacks</topic><topic>Voltage control</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zuo, Shan</creatorcontrib><creatorcontrib>Beg, Omar Ali</creatorcontrib><creatorcontrib>Lewis, Frank L.</creatorcontrib><creatorcontrib>Davoudi, Ali</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on smart grid</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zuo, Shan</au><au>Beg, Omar Ali</au><au>Lewis, Frank L.</au><au>Davoudi, Ali</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Resilient Networked AC Microgrids Under Unbounded Cyber Attacks</atitle><jtitle>IEEE transactions on smart grid</jtitle><stitle>TSG</stitle><date>2020-09-01</date><risdate>2020</risdate><volume>11</volume><issue>5</issue><spage>3785</spage><epage>3794</epage><pages>3785-3794</pages><issn>1949-3053</issn><eissn>1949-3061</eissn><coden>ITSGBQ</coden><abstract>This paper considers a cooperative and adversarial AC microgrid system consisting of cooperative leaders and inverters, as well as adversarial attackers. The attackers aim to destabilize the synchronization dynamics of the AC microgrid by first intercepting the communication channels, penetrating the local state feedback, and pretending to be a cooperative neighbor, and then initiating malicious attacks by launching unbounded injections. A fully distributed resilient control framework is offered for the secondary frequency regulation and voltage containment to ensure system stability and preserve bounded synchronization. In particular, a virtual resilient layer with hidden networks is developed to integrate with the original cyber-physical layer. The proposed resilient control framework is fully distributed without requiring any global information. A modified IEEE 34-bus test feeder benchmark system is emulated in a controller/hardware-in-the-loop environment, where the control objectives are met under different attack scenarios.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TSG.2020.2984266</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0003-4074-1615</orcidid><orcidid>https://orcid.org/0000-0003-2951-442X</orcidid><orcidid>https://orcid.org/0000-0002-5353-7616</orcidid><orcidid>https://orcid.org/0000-0001-9830-9310</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1949-3053
ispartof IEEE transactions on smart grid, 2020-09, Vol.11 (5), p.3785-3794
issn 1949-3053
1949-3061
language eng
recordid cdi_ieee_primary_9051995
source IEEE Electronic Library (IEL)
subjects AC microgrids
Communication channels
Containment
Cyberattack
Cybersecurity
Distributed generation
Frequency control
Hardware-in-the-loop simulation
Inverters
Microgrids
resilient control
State feedback
Synchronism
Synchronization
Systems stability
unbounded attacks
Voltage control
title Resilient Networked AC Microgrids Under Unbounded Cyber Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T14%3A41%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Resilient%20Networked%20AC%20Microgrids%20Under%20Unbounded%20Cyber%20Attacks&rft.jtitle=IEEE%20transactions%20on%20smart%20grid&rft.au=Zuo,%20Shan&rft.date=2020-09-01&rft.volume=11&rft.issue=5&rft.spage=3785&rft.epage=3794&rft.pages=3785-3794&rft.issn=1949-3053&rft.eissn=1949-3061&rft.coden=ITSGBQ&rft_id=info:doi/10.1109/TSG.2020.2984266&rft_dat=%3Cproquest_RIE%3E2436406536%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2436406536&rft_id=info:pmid/&rft_ieee_id=9051995&rfr_iscdi=true