Resilient Load Frequency Control of Islanded AC Microgrids Under Concurrent False Data Injection and Denial-of-Service Attacks
Due to malicious cyber attacks, the frequency regulation of an islanded microgrid (MG) with load changes and wind/solar power fluctuations may not be guaranteed and the overall system may even be destabilized. The MG frequency control thus faces new challenges. In response to these challenges, this...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on smart grid 2023-01, Vol.14 (1), p.690-700 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Due to malicious cyber attacks, the frequency regulation of an islanded microgrid (MG) with load changes and wind/solar power fluctuations may not be guaranteed and the overall system may even be destabilized. The MG frequency control thus faces new challenges. In response to these challenges, this paper addresses a resilient load frequency control (LFC) problem for islanded AC-MGs under simultaneous false data injection (FDI) attacks and denial-of-service (DoS) attacks. Toward this aim, a new piecewise observer is constructed to provide the real-time estimates of the unavailable system state and the unknown FDI attack signal. Furthermore, a resilient \mathcal {H}_{\infty } LFC scheme is developed to suppress the attack impacts. The novelty of this study lies in the development of an attack-parameter-dependent time-varying Lyapunov function approach to achieve stability analysis and resilient observer/controller design against concurrent FDI attacks and intermittent DoS attacks. Specifically, a tractable observer design criterion is first derived such that the estimation error is exponentially stable under a specified \mathcal {H}_{\infty } performance level. Then a design criterion on the existence of the resilient controller is presented to guarantee the exponential stability of the resulting closed-loop system in the presence of the attacks, while preserving the anticipated \mathcal {H}_{\infty } performance level. Finally, comparative simulation studies in various attack scenarios and different parameter settings are presented to verify the efficiency of the obtained theoretical results. |
---|---|
ISSN: | 1949-3053 1949-3061 |
DOI: | 10.1109/TSG.2022.3190680 |