Attack-Defense Evolutionary Game Strategy for Uploading Channel in Consensus-Based Secondary Control of Islanded Microgrid Considering DoS Attack

Nowadays, with the development of communication technology and its application in islanded microgrid, the pure power grid has gradually become a kind of cyber-physical system. In this system, the communication data and consensus algorithm are widely used in the secondary control of energy resources....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on circuits and systems. I, Regular papers Regular papers, 2022-02, Vol.69 (2), p.821-834
Hauptverfasser: Zhang, Bo, Dou, Chunxia, Yue, Dong, Park, Ju H., Zhang, Zhanqiang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Nowadays, with the development of communication technology and its application in islanded microgrid, the pure power grid has gradually become a kind of cyber-physical system. In this system, the communication data and consensus algorithm are widely used in the secondary control of energy resources. However, in the communication process, there are also risks of network attacks, such as denial of service attack. To deal with this kind of attack existing in the data uploading channel during secondary control, the evolutionary game-based defense mechanism is designed, and the main works are as follows: firstly, the caused influence by attack on the control effect is analyzed through constructing a small-signal model. Secondly, two defense strategies including "Adjacent prediction" and "Path reconstruction" are designed. Facing different attack situations, the most suitable strategy can be selected via the evolutionary game. Thirdly, a game-based active defense strategy is designed, which can simulate the attack probability in the near future so that the defense can be prepared in advance. Finally, based on Laplace transformation and \text{H}_{\infty } robust theories, the parameter design in defense strategies is completed. The effectiveness of the above strategies is shown in multiple case studies.
ISSN:1549-8328
1558-0806
DOI:10.1109/TCSI.2021.3120080