Skip to main content

ORIGINAL RESEARCH article

Front. Energy Res., 29 December 2023
Sec. Smart Grids

Resilient distributed control of islanded microgrids under hybrid attacks

Yao LiuYao Liu1Zhaobin Du
Zhaobin Du1*Yan ChenYan Chen2Haoqin ZhanHaoqin Zhan1
  • 1School of Electric Power Engineering, South China University of Technology, Guangzhou, China
  • 2CSG Electric Power Research Institute China Southern Power Grid, Guangzhou, China

In this paper, a resilient control strategy is proposed to improve the stability of frequency and voltage recovery for the islanded microgrid (MG) under hybrid cyber attacks. To deal with the common false data injection attacks (FDI) and denial of service attacks (DoS) in MGs, the proposed resilient control strategy utilizes the observers to accurately estimate the potential FDI signals on both the sensors and actuators of each distributed generation unit (DG) and reconstruct the unavailable states in the system to enhance the system’s ability actively. The ultimate uniform boundedness (UUB) of the system under hybrid cyber attacks is proved by the Lyapunov stability theory. Finally, an islanded MG system is established in MATLAB/SIMULINK, and multiple scenarios are simulated to verify the effectiveness of the method.

1 Introduction

With the development of smart grid technologies, MGs are evolving into typical cyber-physical systems (CPS) by integrating more and more renewable energy sources, monitoring devices, communication facilities, and control systems. MGs can operate in both grid-connected mode and islanded mode (Albarakati et al., 2022). In islanding mode, due to the lack of support from the main grid, MGs are sensitive to disturbances such as power fluctuations, load switching, and cyber attacks, which can cause system instability or even large-scale blackouts. To improve system operation performance, MGs widely adopt the hierarchical control structure in islanded mode (Kang et al., 2018). The primary layer is the lowest control layer in MGs, including voltage and current control loops. In the primary control, each DG only uses its own measurements, so the control layer will cause steady-state errors in frequency and voltage. The secondary layer is responsible for voltage/frequency recovery and active/reactive power sharing between DGs (Dörfler et al., 2015). The tertiary layer is responsible for implementing economic dispatching, operation dispatching, and power flow between MGs and the main grid in the grid-connected mode (Liu et al., 2023).

Centralized and distributed control strategies are common approaches to achieving secondary control objectives in AC MGs. In recent years, centralized algorithms have been increasingly replaced by distributed schemes for secondary controllers since distributed techniques offer better robustness (no single point of failure) and scalability (Feng and Ma, 2022; Yang et al., 2022). Distributed consensus algorithms based on multiagent systems (MAS) have been widely studied in the secondary control of MGs (Ma et al., 2017). Since MAS-controlled AC MGs are typical CPS, researchers mainly concentrated on challenges related to unmodeled dynamics (Shotorbani et al., 2017; Hu et al., 2023), physical disturbances (Hu and Bhowmick, 2020), communication failures (Shahab et al., 2019), stability analysis (Majumder et al., 2009; Zhang and Fan, 2022), high integration of DGs (Sharma et al., 2018), economical and reliable operation of MGs (Albarakati et al., 2022; Liu et al., 2023), and synchronization problems in grid-connected mode (Hossain et al., 2019; Elshenawy et al., 2022), etc.

In addition to the objective and common problems mentioned above, MG CPS is very vulnerable to extreme human-made attacks such as cyber attacks. For example, in 2015, the power grid of Ukraine suffered from the coordinated attack of multiple types of cyber-attacks, leading to large-scale power failure (Dibaji et al., 2019). Common cyber-attacks include disruption attacks and deception attacks, etc (Dibaji et al., 2019; Chen et al., 2019). Among them, DoS and FDI attacks are considered to be the most prevalent and destructive forms of attacks (Uddin et al., 2023). Specifically, FDI attacks are typically deception attacks that inject or modify real data from sensors, actuators, and communication links in the secondary layer to degrade performance (Beg et al., 2017; Ding et al., 2018). DoS attacks can prevent data transmission in communication links (Lian et al., 2022). In a closed-loop feedback control system that uses distributed algorithms, such as MGs, FDI and DoS attacks have always been regarded as persistent security threats (Tan et al., 2020). In Zhang et al. (2006), the authors have concluded that the IEC 61850 protocol and its extensions are recommended when modeling the communication infrastructure for the MG. However, IEC 61850 and TCP/IP protocols are still potentially threatened by FDI attacks, which are tested by the remote monitoring based adaptive LTC controller (Wang and Yang, 2018) and a TCP/IP-based networked dc servo system (Yu et al., 2019). Industrial control systems security mechanisms such as industrial firewalls and white lists cannot effectively deal with these threats. If the cyber attacks on the MG’s communication system are not detected and corrective actions are not implemented in time, the DGs in the MG will be unable to supply the required power, which deviate from the system operating point and endanger the security and stability (Wang et al., 2023). Furthermore, note that FDI and DoS attacks may occur concurrently, resulting in a more devastating impact and lower detection probability, seriously jeopardizing the system’s security and stability (Liu et al., 2019; Tadepalli and Pullaguram, 2022). Therefore, it is crucial to investigate the resilient distributed control problems that arise from the simultaneous presence of DoS and FDI attacks.

In previous works, resilient control strategies for islanded MGs under FDI and DoS attacks are generally studied separately. Several detection, identification, and mitigation schemes have been proposed for DGs under FDI attacks in MGs. In Peng et al. (2019), Abhinav et al. (2017), the influence of FDI attacks is alleviated by detecting the attacked DG and correcting the confidence factor of the communication links. Although these methods can resist various attacks on communication links, additional assumptions about the connectivity of the communication topology and the number of compromised DGs are usually required. Recently, several artificial intelligence algorithms, including reinforcement learning and unsupervised learning, have been used to detect and mitigate cyber attacks (Tian et al., 2022; Ramotsoela et al., 2023). However, the effectiveness of these data-driven schemes depends on sufficient historical data sets, which may have challenges such as a high amount of calculation, poor compatibility, and limited resistance to parameter changes. In addition, estimating attack signals or reconfiguring the system states by designing the state observers is also an essential technique to enhance system resilience. In Afshari et al. (2020), deception attack, dynamic interference, and uncertainty are regarded as bounded disturbances and an adaptive control is introduced to compensate for the influence of disturbances. In Jiang et al. (2021), Mohiuddin and Qi (2021), Shi et al. (2021), Barzegari et al. (2022), Muktiadji et al. (2022), Zhou et al. (2023), the distributed observer frameworks are used to estimate the real states of the system, respectively. In Wang et al. (2022a), Wang et al. (2022b), Zhan et al. (2023), the virtual layer-based compensation strategies are proposed to mitigate FDI attacks. For DoS attacks, a resilient controller based on sampling and communication mechanisms is employed to enhance the DC MGs against DoS attacks by rigorously limiting the frequency and duration of attacks (Lian et al., 2021). In Xu and Ma (2020), Li et al. (2022), Liu and Che (2022), distributed control schemes based on security event triggering mechanisms are proposed to ensure the secondary control objectives and secure economic dispatch of MG under DoS attacks, which establish a connection between the triggering mechanism and DoS attacks.

To summarize, the aforementioned methods mainly focus on the effects of MGs under FDI or DoS attacks, and few studies have investigated the resilient control of MGs that are simultaneously subjected to FDI and DoS attacks. Currently, to resist the influence of various cyber attacks, (Wang et al., 2023), proposes an adaptive control strategy to deal with the bounded sensor FDI attacks and tolerate the intermittent DoS attacks on the communication links. In Liu et al. (2021), the authors develop an adaptive gain-based control scheme to cope with intermittent DoS and impulse signal FDI attacks. However, these methods either do not address both sensor and actuator attacks in a unified framework or assume that these FDI signals are regarded as bounded natural disturbances, etc. Furthermore, the control strategies in Wang et al. (2023), Liu et al. (2021) do not consider the impact of DoS attacks on the controller, i.e., the control inputs are forced to zero when the communication links under DoS attacks. Although these studies have some effect, the resilience under attacks is not satisfactory. Therefore, the main goal of this paper is to develop a resilient distributed method to effectively address both FDI and DoS attacks in MGs. The core challenges that need to be addressed to achieve this goal include:

(1) How to develop an effective distributed resilient method to eliminate or mitigate the effects of attacks when FDI signals are unknown and even unbounded, and sensors and actuators of numerous DGs may be attacked simultaneously?

(2) How to cleverly design the resilient method to avoid the divergence or even infinite growth of the system states when MGs subjected to hybrid attacks, while ensuring the realization of secondary control objectives?

As a result, it is essential to consider designing a general and resilient framework to resist the impact of hybris attacks. Compared with the existing research, the main contributions can be summarized as follows:

1) Compared to most recent works that focus solely on the impact of single cyber attacks on islanded MGs, this paper further proposes a distributed control framework incorporating resilience against simultaneous sensor, actuator, and DoS attacks for MG systems. It is more practical for island MGs in complex working environments.

2) The proposed resilient control strategy utilizes the observer to accurately estimate the potential FDI signals on both the sensors and actuators of each DG and is capable of accommodating unbounded FDI attacks on any number of DGs, thus enhancing its robustness against potential attacks. During DoS attacks, the open-loop observer is used to reconstruct the unavailable neighbor DG state to enhance the system’s ability to resist DoS attacks actively.

3) The system’s stability is demonstrated using the Lyapunov function, which shows that the system can achieve UUB when subjected to hybrid cyber attacks.

2 Modeling of AC MGs and cyber attacks

2.1 Notations and graph theory

In this paper, AB denotes the Kronecker product of matrix A and B. INRN×N denotes the Nth order identity matrix. The operator diag creates the diagonal matrix using elements in brackets. The communication network among DGs can be modeled as MAS, usually represented by undirected graphs. An undirected graph is generally denoted by GV,E,A, where V=1,2,...,N denotes the set of nodes, including M follower nodes and N leader nodes. Define F1,2,...,M and Ω=M+1,M+2,...,N. A=aijRN×N denotes the adjacency matrix. If node i and node j can communicate with each other, then aij>0,jF, otherwise, aij=0. Ni=jj,iE denotes the sets of the neighboring nodes of node i. Laplacian matrix is L=DA, where D=diagdiRN×N denotes the in-degree matrix, with di=jNiaij. The Laplace matrix can be chunked according to the number of leader nodes L1 L2;0NM×M 0NM×NM, where L1RM×M and L2RM×NM represent the Laplace matrix between followers and between leader and followers, respectively.

2.2 Dynamic modeling of MGs

In this paper, a typical inverter-based islanded MG is taken as the research object, and the control framework of a grid-forming converter is shown in Figure 1. In the grid-forming converters, the islanded MG includes two parts: 1) physical layer, including inverter-based DGs and their controllers, LC filter, coupling inductor (Pogaku et al., 2007), transmission lines, and loads; 2) the control layer, including the hierarchical control structure; 3) communication layer, which usually contains only communication links composed of directed or undirected graphs.

FIGURE 1
www.frontiersin.org

FIGURE 1. The MG layers schematic, including the physical, control, and communication layers. The control layer gives the schematic diagram of the proposed resilient control framework.

The secondary control is usually achieved by introducing additional regulation terms for voltage/frequency consensus as well as power sharing, as follows (Hennane et al., 2023):

ωi=ωn,imP,iPi(1)
voi=Vn,inQ,iQi(2)

where ωi is the output angular frequency of ith DG. voi is the capacitor voltage magnitude and equal to d-axis capacitor voltage vodi in the dq reference frame. ωn,i and Vn,i are the nominal angular frequency and voltage set points, respectively. Pi and Qi are the active power and reactive power of ith DG. mP,i and nQ,i are droop coefficients.

In MG dynamic modeling and control system design, the model of the MG system can safely ignore the fast switching model in Dehkordi et al. (2016), so the nonlinear dynamics model of the grid-forming DGs in the d-q reference system can be expressed as.

x˙i=fixi+kixiDi+gixiuiyi1=vodi=hi1xi,yi2=ωi=hi2xi(3)

where xi is the state vector of i th DG. The detailed expressions of xi, ui, fixi, gixi, kixi, hi1xi, hi2xi can be found in Yang et al. (2020).

Since the dynamic characteristics of the current and voltage controllers are much faster than the primary controller, the dynamic characteristics of the current and voltage controllers can be ignored in the study of the secondary controller. Therefore, the secondary control problem is transformed into a tracking control problem using the input-output feedback linearization technique. For the secondary voltage control of MGs, let Fixi=fixi+kixiDi, then the voltage dynamics of each DG is modeled as:

y¨i1=LFi2hi1xi+LgiLFihi1xiui1(4)

where LFihi1xi is the Lie derivative of the scalar function hi1xi along Fixi (Xiao and Dong, 2020). Define the auxiliary control signal as vi, the dynamics of Eq. 4 can be considered as a second-order linear system y¨i1=vi. Therefore, the control input is designed as ui1=LgiLFihixi1LFi2hixi+vi, and Eq. 4 can be written in the following compact form:

y˙Vi=AyVi+BuVi,iF(5)

where yVi=yi1,yi1,2T=voi,v˙oiT, A=0 1;0 0, B=0 1T. The dynamic model of the leader is considered as y˙l=Ayl,lΩ, where yl=vref,l v˙ref,lT.

Similar to the voltage dynamic model, according to Eq. 3, the system frequency dynamics can be obtained using feedback linearization as:

y˙i2=LFi2hi2xi+LgiLFihi2xiui2(6)

The above equation can be written in the following form:

y˙ωi=ω˙i=ω˙nimP,iP˙i(7)

2.3 Modeling of FDI attacks

Complex FDI attacks can modify real data in sensors, actuators, and communication links simultaneously. In this paper, we consider the case of unknown cyber attacks that occur in sensors and actuators in a MG system as shown in Figure 1. The sensor FDI corrupts the measured states or output signals, while the actuator attacks modify the control signals generated by the secondary controller. Therefore, the following typical FDI attack model is used for the islanded MG system:

y¯i=yi+δis(8)
u¯i=ui+δia(9)

where δis and δia are FDI signals injected by the sensor and actuator attacker under secondary voltage or frequency control, respectively. This means that the system’s true states and control signals are unknown, and only corrupted signals can be measured and used.

Assumption 1. Sensor attack signals δis and actuator attacks δia can be unknown and unbounded, but their time derivatives δ˙is and δ˙ia satisfy the bounded condition.

Remarks 1:. Malicious signals are often modeled in the papers as random disturbances such as constants, steps, sines, and noise (Afshari et al., 2020; Barzegari et al., 2022). However, unlike random disturbances such as power fluctuations or noise, FDI signals should not be regarded as unintentionally caused bounded signals. Moreover, the attacker carefully designs cyber attacks and does not need information about the system dynamics to perform FDI. Therefore, inspired by Wang et al. (2022b), this paper argues that malicious cyber attacks can be unbounded time-varying signals, i.e., the amplitude of a FDI signal is allowed to be sufficiently large, but as long as its derivatives are constrained, the malicious signals will not grow at an infinitely fast rate. Due to these aspects, the designs available in Afshari et al. (2020), Barzegari et al. (2022) may not be directly applicable. Additionally, the model is universal for the problem of frequency and voltage restoration in MGs with bounded disturbances (attacks, disturbances, uncertainties, etc.).

2.4 Modeling of DoS attacks

The MG system based on the MAS distributed control strategy is shown in Figure 2. The communication network of the MG is usually not sufficiently resistant to DoS attacks. Once the DG fails to receive the states sent by all its neighbors, the control objective of the system will not be accomplished. Consider a class of non-periodic DoS attacks and assume that one DoS attack over a period of time can be denoted as tnon,tnoff. Therefore, the set of times when the system suffers a DoS attack during 0,t is Ξa0,t=nN[tnon,tnoff0,t. Similarly, the set of times when the system communicates normally is Ξs0,t=0,t\Ξa0,t. Due to the energy constraints of the attacker, the following common assumption is introduced in this paper.

FIGURE 2
www.frontiersin.org

FIGURE 2. Framework of the resilient secondary controller.

Assumption 2. There exist constants τa>1 and Ξ0>0 during the period 0,t, such that Ξa0,tΞ0+t/τa is satisfied.

Remark 2. Assumption 2 limits the duration of DoS attacks considering the limited attack resources and the self-healing mechanisms of real systems, which are widely used in Xu and Ma (2020)).

3 Distributed resilient voltage control under hybrid attack

This section proposes a resilient control scheme for hybrid network attacks in secondary control of MGs. The proposed resilient control framework is shown in Figure 2, and the UUB stability of the whole system is guaranteed.

3.1 Design of resilient voltage controller

The real states of MGs is usually not available due to FDI attacks. Therefore, this paper first introduces state observers to reconstruct the real states of the system and estimate the sensor and actuator FDI signals. To compensate for the effect of FDI on MGs, the following state observers are designed:

y^˙Vit=Ay^Vit+BuVit+M1eVit(10)
δ^˙Vist=M1+M2eVit(11)

where eVit=y¯Vity^Vitδ^Vis. y^Vit is the estimated value of the true state yVi, and δ^Vist is the estimated value of the sensor FDI signal δVist. M1 and M2 are the observation gain. The actuator attack signal δ^Via, which is used to estimate and compensate for the actuator attack signal δVia, is designed in the following form:

δ^Viat=BTQ1eVitχit2eViTtQ1Bχit+ρit(12)

where ρit>0 is a uniform continuous function and satisfies limt+t0tρisdsρ¯i<+. Q1 is the control gain. χit is the adaptive parameter satisfying the following adaptive regulation law:

χ˙it=μieViTtQ1B(13)

where μi is a positive constant.

To achieve frequency and voltage restoration and active power and reactive power sharing among DGs, we design the auxiliary control inputs uVit based on consensus protocol.

uVit=citKε^t(14)
c˙it=Projc_i,c¯icit=0,if cit=c¯i,Φi>0or cit=c_i,Φi<0κiΦi,others(15)

where ε^it=j=1Maijy^Vity^Vjt+l=M+1Naily^VityVlt is the local tracking error. citc_i,c¯i is the adaptive control parameter. Φi=βicit+ε^iTtΓε^it, where βi and κi are positive constants. K and Γ are the feedback gain matrix to be designed.

When the communication link (i, j) suffers from DoS attacks, the states sent by the j th DG during DoS cannot be received by the i th DG. Therefore, to mitigate or cope with the impact of DoS attacks on the secondary controller as much as possible, inspired by the literature (Xiao and Dong, 2020), the following open-loop observer is introduced to reconstruct the unavailable state of the MG system during DoS as follows

y˙Vjt=AyVjt,t[tnon,tnoff(16)

where yVjtnon=y^Vjtnon, denotes the last successful data exchange of the i th DG with the j th DG before the DoS attacks. Therefore, the estimated local tracking error during DoS is εit=j=1Maijy^VityVjt+l=M+1Naily^VityVlt, and Φi=βicit+εiTtΓεit.

Remark 3. Proj{·} denotes the projection operator, which has been used to design fully distributed controllers and fault-tolerant controls (Xiao and Dong, 2020). Since it is difficult for the open-loop observer to recover the lost data perfectly, introducing the projection operator and the adaptive controller constrain the tracking error during DoS, preventing the system’s consensus error from diverging or even being unbounded. In addition, the open-loop estimator is activated only during the attack. If a particular DG’s states are unavailable, the neighboring DGs are aware of the attacks. The last estimate is kept until the communication state of the MG returns to normal.

3.2 Stability analysis

Before moving forward, the estimated errors of the FDI signals are defined as δVist=δVistδ^Vist and δViat=δViatδ^Viat, then

e˙Vit=A+M2eVit+BδViatAδVist+δ˙Vist(17)
δ˙Vist=M1+M2eVit+δ˙Vist(18)

Let ϑit=coleVit,δVist, then

ϑ˙it=A¯ϑit+B¯δViat+Δit(19)

where A¯=A+M2,A;M1+M2,0, B¯=B;0, Δit=colδ˙Vist,δ˙Vist.

Let y^Ft=y^V1t,...,y^VMt, y^Lt=yVM+1t,...,yVNt, ε^t=ε^1t,...,ε^Mt, εt=ε1t,...,εMt, eVt=eV1t,...,eVMt, ct=diagc1t,...,cMt. Then the global containment error is θVt=y^FtL11L2yLt, where θVt=L1ε^t. According to (10)–(16), there are the following switching dynamics

θ˙Vt=AθVt+c^tBKε^t+M1eVt,t[tn1off,tnon)θ˙Vt=AθVt+cˇtBKε^t+M1eVt,t[tnon,tnoff)(20)

Next, the stability analysis of MGs under hybrid attack is discussed. The main results are as follows.

Theorem 1. Assuming that the communication topology G is a strongly connected graph, for given positive constants γii=1,2,3,4 and ϖ1,ϖ2, if there exist a positive constant τa and positive definite matrices P and Q, such that (20)–(24) hold, then the controllers (10)–(16) can ensure that the voltage consensus errors of all DGs can achieve UUB under hybrid attacks.

Q=Q100Q2>0(21)

such that

Ω2=ATP+PAηPBBTP+γ3IM<0(22)
Ω1=A¯TQ+QA¯+γ1QTQ+Ψ<0(23)
ATP+PAγ4+γ4P+γ3IM<0(24)
ϖ1+ϖ2ϖ1τa<0(25)

where ϖ1=minλminΩ2/λmaxQ,λminΩ1/λmaxP,βiκi, ϖ2=maxλminΩ2/λmaxQ,γ4,βiκi, Ψ=diag1/γ2M1TP2M1,0.

The block diagram for the proposed resilient control scheme is depicted in Figure 2. Proof of stability for the proposed scheme is also presented in the Supplementary Appendix SA1.

Remarks 4. The main differences between this paper and related work are clarified in the following two aspects: i) Compared with most recent work that only considers a single cyber attack, this paper proposes a resilient control framework that resists both FDI and DoS attacks. ii) In Wang et al. (2023), Liu et al. (2021), although resilient control strategies are designed to resist FDI and DoS attacks, the ability of the system to actively resist DoS attacks has not been investigated, that is, when the communication network is subjected to DoS attacks, the control input is forced to zero. In addition, the type of FDI attacks is limited to bounded actuator attacks. On the contrary, this paper proposes a resilient control strategy that can effectively compensate for the unbounded FDI attacks of sensors and actuators and reconstruct the unavailable neighbor DG state to resist DoS attacks actively.

Remark 5. Similar to the resilient voltage control, the frequency consensus error can be UUB under hybrid attacks by applying similar schemes (10)–(16). The proof is similar to Theorem 1.

4 Simulation analysis

In order to verify the performance of the proposed resilient distributed control strategy, a 380V/50Hz islanded MG with four inverter-based DGs is taken as the test system, as shown in Figure 3. The simulation is analyzed in the MATLAB/Simulink platform. The parameters of load, transmission line, and DG controller can be found in Table 1. The effectiveness of the proposed control strategy is verified through several scenarios such as load fluctuation, plug-and-play (P&P) of DG, and hybrid cyber attacks.

FIGURE 3
www.frontiersin.org

FIGURE 3. Block diagram of an islanded MG.

TABLE 1
www.frontiersin.org

TABLE 1. Parameters of the islanded MG.

4.1 Distributed resilient control strategy without attacks

In this section, the performance of the proposed resilient distributed frequency and voltage controller is analyzed by simulation without considering any cyber attacks. The parameters of the controllers are chosen as c¯i=20,c_i=0, ρit=e0.2t, μi=20, βi=2.0, κi=30,Ξ0=0.2. In order to satisfy the conditions of Theorem 1, let M2=α1M1,Q1=α2Q2 (α1,α2 are the positive constants), and then (20)–(24) are transformed into a linear matrix inequality (LMI) problem to solve. The detailed steps can be found in remark 4 in Deng and Che (2019).

The results are discussed in time sequence as below: i) at t = 1.0 s, the proposed resilient controller starts up, and the communication topology between DGs is shown in Figure 4, given the voltage reference value vref,1 v˙ref,1T=380,0 V, vref,2 v˙ref,2T=390,0 V, and the frequency reference value ωref,1=ωref,2 =100π rad. ii) at t =2.0 s, 50% of load L2 is removed. iii) DG 4 is plugged out of and plugged into the MG at t = 3.0 s and t = 4.0 s, respectively. iv) at t = 5.0 s, load L5 increases by 50%.

FIGURE 4
www.frontiersin.org

FIGURE 4. Communication topologies under normal situation and DoS attacks.

The simulation results are shown in Figure 5. When the proposed resilient control is adopted, the islanded MG frequency is restored to 50Hz and the output voltage of DGs returns to the range of 380∼390 V. The load fluctuation and P&P of DG4 occur in the MG system during 2.0∼6.0 s. Under these system disturbances, the frequency and active power can quickly maintain consistency and respond rapidly. However, due to factors such as MG line impedance mismatch, there is a deviation in the voltage and reactive power consensus. Figure 5D gives the reactive power dynamic characteristics of the system under load fluctuations. The reactive power deviation rises at t = 5 s as the MG’s load distribution becomes more unbalanced. During the P&P of DG4, the frequency, voltage, active power, and reactive power of MG remain stable within a reasonable range. The simulation results show that the proposed method will not influence the normal operation of the MG system.

FIGURE 5
www.frontiersin.org

FIGURE 5. Performance evaluation of the proposed method without cyber attacks: (A) frequency, (B) voltage, (C) active power, (D) reactive power.

4.2 Distributed resilient control strategies under hybrid attacks

In this subsection, the MG system is considered to suffer from both FDI attacks and DoS attacks. Also, the performance of the MG system with distributed controllers using traditional consensus algorithms is tested to show the impact of hybrid attacks. It will also serve as a benchmark for comparison with the proposed approach. The effectiveness of the proposed resilient control strategy in secondary frequency and voltage control is evaluated for the sensor and actuator attacks and intermittent interruptions of the communication network in Figure 4, respectively. The duration of the DoS attacks is designed to Ξa0,t=2.514 s such that (25) satisfies.

Simulation events are set as follows: i) at t = 0 s, the MG operates in an islanded mode, and the DoS attacks persist and lead to two communication topologies as shown in Figure 4. ii) at t = 0.5 s, the proposed resilient controller is activated and an actuator is attacked at DG3 with δVi,1a=10sin10t+5 V. iii) at t = 2.5 s, the actuator attack on DG3 is mitigated, but sensors are attacked at both DG1 and DG4 with signals δVi,1s=2sin15t+4.5 V. iv) at t =4.5 s, the sensor attacks on DG1 and DG4 are mitigated. The sensor of DG2 is attacked by δVi,1s=2t3 V, and the actuator of DG3 is attacked by δVia=5t3 V. The FDI signals persist in subsequent processes. v) at t =5.0 s, the load L3 increases by 50%.

Figures 6A, B depict the dynamic characteristics of the proposed resilient control strategy in secondary voltage control. It can be found that the existence of DoS attacks will affect the control performance, resulting in system voltage and power fluctuations. However, if the duration of the DoS attacks satisfies (25), the system’s stability will not be threatened. Furthermore, the communication topology after DoS attacks is complete, which can guarantee system convergence under the proposed resilient approach. During 0.5∼6 s, the system suffers from sinusoidal form and linear growth FDI attacks, respectively, and the simulation results show that as long as the derivatives of the injected FDI signals are bounded [the growth rate of the malicious signals satisfies (30)], the resilient control strategy ensures that the system achieves UUB. The estimated values of the FDI attack signals are shown in Figure 7. It can be seen that the proposed control strategy can better estimate the FDI attack signals in the system, which will accurately and effectively alleviate the impact of FDI attacks on the MG. Besides, the effectiveness of the proposed method can be clearly demonstrated by comparing the results of Figure 6 and Figure 8.

FIGURE 6
www.frontiersin.org

FIGURE 6. The test results of the proposed resilient voltage control under hybrid attack: (A) voltage, (B) reactive power.

FIGURE 7
www.frontiersin.org

FIGURE 7. Sensor and actuator attack signals (solid lines) and their estimated values (dashed lines): (A) sensor FDI, (B) actuator FDI.

FIGURE 8
www.frontiersin.org

FIGURE 8. The test results of the traditional voltage consensus algorithms under hybrid attack: (A) voltage, (B) reactive power.

Figure 9 shows the performance of the proposed control strategy in secondary frequency control. In the case of load fluctuation and mixed network attack, the proposed method can still ensure the system’s normal operation. In addition, the proposed algorithm can effectively deal with bounded or unbounded sensor and actuator attacks. Compared with the results of the traditional consensus algorithm shown in Figure 10, the proposed strategy effectively suppresses the frequency and active power fluctuations caused by hybrid attacks in frequency control and performs better.

FIGURE 9
www.frontiersin.org

FIGURE 9. The test results of resilient frequency control under hybrid attack: (A) frequency, (B) active power.

FIGURE 10
www.frontiersin.org

FIGURE 10. The test results of the traditional frequency consensus algorithms under hybrid attack: (A) frequency, (B) active power.

4.3 Comparison with other resilient control methods

In this section, the proposed control method is compared with a cyber-resilient control approach in the latest work (Wang et al., 2023). The cyber-resilient control approach is based on an adaptive strategy to compensate for bounded FDI attacks on the secondary controller, and it can also tolerate DoS attacks on the communication link. Considering the characteristics of the cyber-resilient controller, the following modifications and clarifications are made in this paper: 1) the cyber-resilient controller only targets bounded actuator attacks, and it utilizes adaptive techniques to mitigate hybrid network attacks and does not reconstruct or estimate unavailable states and FDI attack signals in the system; 2) the cyber-resilient control approach is designed for secondary frequency control. This section only compares the frequency results of the MG system under hybrid attacks.

Figure 11 shows the performance of the cyber-resilient controller in the secondary frequency control. Compared with the resilient control strategy proposed in this paper, both of them have better performance under bounded actuator FDI signals and DoS attacks. During 0.5–2.5 s, both the cyber-resilient and the proposed controller can effectively resist the influence of the bounded sensor FDI signals, and the frequency and active power of the system only fluctuate or shift slightly. After t = 2.5 s, the system suffers from sensor FDI and linear growth FDI signals, respectively. Compared with the traditional consensus algorithm, the cyber-resilient controller can alleviate the impact of unbounded FDI signals but cannot effectively compensate for attacks. The system with the cyber-resilient controller is awful under unbounded FDI attacks. Therefore, the resilience strategy proposed in this paper can better resist the influence of multiple concurrent attacks and improve the stability of the islanded MG system under hybrid attacks.

FIGURE 11
www.frontiersin.org

FIGURE 11. Performance evaluation of cyber-resilient controller under hybrid attack: (A) frequency, (B) active power.

5 Conclusion

To deal with the frequency and voltage restoration problem of islanded MGs under hybrid FDI and DoS attacks, this paper proposes a resilient distributed control protocol to improve the robustness of frequency and voltage restoration. Using the state observers, the proposed control strategy can effectively estimate the potential FDI attack signals on each DG. The open-loop observer is utilized to reconstruct the neighbor information during DoS attacks, and the adaptive parameters are used to constrain the consensus error. In addition, the proposed control strategy can improve the system’s ability to resist unbounded FDI attacks on sensors and actuators and is more practical in real-world security applications. The stability of the system is proved by the Lyapunov function, which shows that the system can realize UUB under hybrid attacks. The simulation results verify that the proposed control method can effectively mitigate or cope with the impact of concurrent DoS and FDI attacks on MGs. Future work will further explore the coordinated control framework of the AC MG system under other attack scenarios, such as replay attacks, communication delays, and failures.

Data availability statement

The raw data supporting the conclusion of this article will be made available by the authors, without undue reservation.

Author contributions

YL: Writing–original draft, Writing–review and editing. ZD: Writing–original draft, Writing–review and editing. YC: Writing–original draft, Writing–review and editing. HZ: Writing–original draft, Writing–review and editing.

Funding

The author(s) declare financial support was received for the research, authorship, and/or publication of this article. This research was supported by the State Key Laboratory of HVDC (Project No. SKLHVDC-2022-KF-14).

Conflict of interest

Author YC was employed by CSG Electric Power Research Institute China Southern Power Grid.

The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Supplementary material

The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fenrg.2023.1320968/full#supplementary-material

References

Abhinav, S., Modares, H., Lewis, F. L., Ferrese, F., and Davoudi, A. (2017). Synchrony in networked microgrids under attacks. IEEE Trans. Smart Grid 9 (6), 6731–6741. doi:10.1109/tsg.2017.2721382

CrossRef Full Text | Google Scholar

Afshari, A., Karrari, M., Baghaee, H. R., and Gharehpetian, G. B. (2020). Resilient synchronization of voltage/frequency in AC microgrids under deception attacks. IEEE Syst. J. 15 (2), 2125–2136. doi:10.1109/jsyst.2020.2992309

CrossRef Full Text | Google Scholar

Albarakati, A. J., Boujoudar, Y., Azeroual, M., Eliysaouy, L., Kotb, H., Aljarbouh, A., et al. (2022). Microgrid energy management and monitoring systems: a comprehensive review. Front. Energy Res. 10, 1097858. doi:10.3389/fenrg.2022.1097858

CrossRef Full Text | Google Scholar

Barzegari, Y., Zarei, J., Razavi-Far, R., Saif, M., and Palade, V. (2022). Resilient consensus control design for DC microgrids against false data injection attacks using a distributed bank of sliding mode observers. Sensors 22 (7), 2644. doi:10.3390/s22072644

PubMed Abstract | CrossRef Full Text | Google Scholar

Beg, O. A., Johnson, T. T., and Davoudi, A. (2017). Detection of false-data injection attacks in cyber-physical DC microgrids. IEEE Trans. industrial Inf. 13 (5), 2693–2703. doi:10.1109/tii.2017.2656905

CrossRef Full Text | Google Scholar

Cao, G., Jia, R., and Dang, J. (2022). Distributed resilient mitigation strategy for false data injection attack in cyber-physical microgrids. Front. Energy Res. 10, 845341. doi:10.3389/fenrg.2022.845341

CrossRef Full Text | Google Scholar

Chen, L., Wang, Y., Lu, X., Zheng, T., Wang, J., and Mei, S. (2019). Resilient active power sharing in autonomous microgrids using pinning-consensus-based distributed control. IEEE Trans. Smart Grid 10 (6), 6802–6811. doi:10.1109/tsg.2019.2911344

CrossRef Full Text | Google Scholar

Dehkordi, N. M., Sadati, N., and Hamzeh, M. (2016). Fully distributed cooperative secondary frequency and voltage control of islanded microgrids. IEEE Trans. Energy Convers. 32 (2), 675–685. doi:10.1109/tec.2016.2638858

CrossRef Full Text | Google Scholar

Deng, C., and Che, W. W. (2019). Fault-tolerant fuzzy formation control for a class of nonlinear multiagent systems under directed and switching topology. IEEE Trans. Syst. Man, Cybern. Syst. 51 (9), 5456–5465. doi:10.1109/tsmc.2019.2954870

CrossRef Full Text | Google Scholar

Dibaji, S. M., Pirani, M., Flamholz, D. B., Annaswamy, A. M., Johansson, K. H., and Chakrabortty, A. (2019). A systems and control perspective of CPS security. Annu. Rev. control 47, 394–411. doi:10.1016/j.arcontrol.2019.04.011

CrossRef Full Text | Google Scholar

Ding, D., Han, Q. L., Xiang, Y., Ge, X., and Zhang, X. M. (2018). A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275, 1674–1683. doi:10.1016/j.neucom.2017.10.009

CrossRef Full Text | Google Scholar

Dörfler, F., Simpson-Porco, J. W., and Bullo, F. (2015). Breaking the hierarchy: distributed control and economic optimality in microgrids. IEEE Trans. Control Netw. Syst. 3 (3), 241–253. doi:10.1109/tcns.2015.2459391

CrossRef Full Text | Google Scholar

Elshenawy, M., Fahmy, A., Elsamahy, A., El Zoghby, H. M., and Kandil, S. A. (2022). Improving frequency response for AC interconnected microgrids containing renewable energy resources. Front. Energy Res. 10, 1035097. doi:10.3389/fenrg.2022.1035097

CrossRef Full Text | Google Scholar

Feng, Y., and Ma, J. (2022). Controller design for distributed secondary voltage restoration in the islanded microgrid. Front. Energy Res. 10, 826921. doi:10.3389/fenrg.2022.826921

CrossRef Full Text | Google Scholar

Hennane, Y., Berdai, A., Pierfederici, S., and Meibody-Tabar, F. (2023). A consensus-based control for precise reactive power-sharing in AC microgrids. Sustain. Energy Technol. Assessments 60, 103510. doi:10.1016/j.seta.2023.103510

CrossRef Full Text | Google Scholar

Hossain, M. A., Pota, H. R., Hossain, M. J., and Blaabjerg, F. (2019). Evolution of microgrids with converter-interfaced generations: challenges and opportunities. Int. J. Electr. Power & Energy Syst. 109, 160–186. doi:10.1016/j.ijepes.2019.01.038

CrossRef Full Text | Google Scholar

Hu, J., and Bhowmick, P. (2020). A consensus-based robust secondary voltage and frequency control scheme for islanded microgrids. Int. J. Electr. Power & Energy Syst. 116, 105575. doi:10.1016/j.ijepes.2019.105575

CrossRef Full Text | Google Scholar

Hu, S., He, L., Zhao, H., Liu, H., Liu, X., and Qiu, J. (2023). Distributed secondary control of microgrids with unknown disturbances and non-linear dynamics. Front. Energy Res. 10, 1113110. doi:10.3389/fenrg.2022.1113110

CrossRef Full Text | Google Scholar

Huang, H., Liu, F., Ouyang, T., and Zha, X. (2022). Sequential detection of microgrid bad data via a data-driven approach combining online machine learning with statistical analysis. Front. Energy Res. 10, 861563. doi:10.3389/fenrg.2022.861563

CrossRef Full Text | Google Scholar

Jiang, Y., Yang, Y., Tan, S. C., and Hui, S. Y. R. (2021). A high-order differentiator based distributed secondary control for DC microgrids against false data injection attacks. IEEE Trans. Smart Grid 13 (5), 4035–4045. doi:10.1109/tsg.2021.3135904

CrossRef Full Text | Google Scholar

Kang, W., Li, Q., Chen, M., Peng, C., and Chen, F. (2018). A two-layer distributed control method for islanded microgrids by using multi-agent systems. Proc. CSEE 38, 770–781. doi:10.13334/j.0258-8013.pcsee.162194

CrossRef Full Text | Google Scholar

Li, Y., Ren, R., Huang, B., Wang, R., Sun, Q., Gao, D. W., et al. (2022). Distributed hybrid-triggering-based secure dispatch approach for smart grid against DoS attacks. IEEE Trans. Syst. Man, Cybern. Syst. 53, 3574–3587. doi:10.1109/tsmc.2022.3228780

CrossRef Full Text | Google Scholar

Lian, Z., Guo, F., Wen, C., Deng, C., and Lin, P. (2021). Distributed resilient optimal current sharing control for an islanded DC microgrid under DoS attacks. IEEE Trans. Smart Grid 12 (5), 4494–4505. doi:10.1109/tsg.2021.3084348

CrossRef Full Text | Google Scholar

Lian, Z., Wen, C., Guo, F., et al. (2022). Distributed resilient secondary voltage control for AC microgrids under DoS attacks. 2022 IEEE 17th International Conference on Control & Automation (ICCA). Naples, Italy, June, 2022, 80–84.

CrossRef Full Text | Google Scholar

Liu, L. N., Yang, G. H., and Wasly, S. (2023). Distributed predefined-time dual-mode energy management for a microgrid over event-triggered communication. IEEE Trans. Industrial Inf., 1–11. doi:10.1109/tii.2023.3304025

CrossRef Full Text | Google Scholar

Liu, S., Siano, P., and Wang, X. (2019). Intrusion-detector-dependent frequency regulation for microgrids under denial-of-service attacks. IEEE Syst. J. 14 (2), 2593–2596. doi:10.1109/jsyst.2019.2935352

CrossRef Full Text | Google Scholar

Liu, X. K., Wen, C., Xu, Q., and Wang, Y. W. (2021). Resilient control and analysis for DC microgrid system under DoS and impulsive FDI attacks. IEEE Trans. Smart Grid 12 (5), 3742–3754. doi:10.1109/tsg.2021.3072218

CrossRef Full Text | Google Scholar

Liu, X. Y., and Che, W. W. (2022). Event-based distributed secondary voltage tracking control of microgrids under DoS attacks. Inf. Sci. 608, 1572–1590. doi:10.1016/j.ins.2022.07.012

CrossRef Full Text | Google Scholar

Ma, X., Yang, P., Dong, H., et al. (2017). “Secondary control strategy of islanded micro-grid based on multiagent consistency,” in 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, China, November, 2017, 1–6.

CrossRef Full Text | Google Scholar

Majumder, R., Chaudhuri, B., Ghosh, A., Ledwich, G., and Zare, F. (2009). Improvement of stability and load sharing in an autonomous microgrid using supplementary droop control loop. IEEE Trans. power Syst. 25 (2), 796–808. doi:10.1109/tpwrs.2009.2032049

CrossRef Full Text | Google Scholar

Mohiuddin, S. M., and Qi, J. (2021). “Attack resilient distributed control for AC microgrids with distributed robust state estimation,” in 2021 IEEE Texas Power and Energy Conference (TPEC). College Station, TX, USA, 1–6. doi:10.1109/TPEC51183.2021.9384912

CrossRef Full Text | Google Scholar

Muktiadji, R. F., Ramli, M. A. M., Bouchekara, H. R. E. H., Milyani, A. H., Rawa, M., Seedahmed, M. M. A., et al. (2022). Control of boost converter using observer-based backstepping sliding mode control for DC microgrid. Front. Energy Res. 10, 828978. doi:10.3389/fenrg.2022.828978

CrossRef Full Text | Google Scholar

Peng, H. Y., Peng, C., and Sun, H. T. (2019). Incremental detection mechanism of a microgrid under false data injection attack. Information and Control 40 (5), 522–527. doi:10.13976/j.cnki.xk.2019.9156

CrossRef Full Text | Google Scholar

Pogaku, N., Prodanovic, M., and Green, T. C. (2007). Modeling, analysis and testing of autonomous operation of an inverter-based microgrid. IEEE Trans. power Electron. 22 (2), 613–625. doi:10.1109/tpel.2006.890003

CrossRef Full Text | Google Scholar

Ramotsoela, D. T., Hancke, G. P., and Abu-Mahfouz, A. M. (2023). Practical challenges of attack detection in microgrids using machine learning. J. Sens. Actuator Netw. 12 (1), 7. doi:10.3390/jsan12010007

CrossRef Full Text | Google Scholar

Shahab, M. A., Mozafari, B., Soleymani, S., Dehkordi, N. M., Shourkaei, H. M., and Guerrero, J. M. (2019). Distributed consensus-based fault tolerant control of islanded microgrids. IEEE Trans. Smart Grid 11 (1), 37–47. doi:10.1109/tsg.2019.2916727

CrossRef Full Text | Google Scholar

Sharma, A., Kolhe, M., Nils, U. M., et al. (2018). “Comparative analysis of different types of micro-grid architectures and controls,” in 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, October, 2018, 1200–1208.

CrossRef Full Text | Google Scholar

Shi, M., Chen, X., Shahidehpour, M., Zhou, Q., and Wen, J. (2021). Observer-based resilient integrated distributed control against cyberattacks on sensors and actuators in islanded AC microgrids. IEEE Trans. Smart Grid 12 (3), 1953–1963. doi:10.1109/tsg.2021.3050203

CrossRef Full Text | Google Scholar

Shotorbani, A. M., Ghassem-Zadeh, S., Mohammadi-Ivatloo, B., and Hosseini, S. H. (2017). A distributed secondary scheme with terminal sliding mode controller for energy storages in an islanded microgrid. Int. J. Electr. Power & Energy Syst. 93, 352–364. doi:10.1016/j.ijepes.2017.06.013

CrossRef Full Text | Google Scholar

Tadepalli, P. S., and Pullaguram, D. (2022). Distributed control microgrids: cyber-attack models, impacts and remedial strategies. IEEE Trans. Signal Inf. Process. over Netw. 8, 1008–1023. doi:10.1109/tsipn.2022.3230562

CrossRef Full Text | Google Scholar

Tan, S., Guerrero, J. M., Xie, P., Han, R., and Vasquez, J. C. (2020). Brief survey on attack detection methods for cyber-physical systems. IEEE Syst. J. 14 (4), 5329–5339. doi:10.1109/jsyst.2020.2991258

CrossRef Full Text | Google Scholar

Tian, E., Wu, Z., and Xiangpeng, X. (2022). Codesign of FDI attacks detection, isolation, and mitigation for complex microgrid systems: an HBF-NN-based approach. IEEE Trans. Neural Netw. Learn. Syst., 1–10. doi:10.1109/tnnls.2022.3230056

CrossRef Full Text | Google Scholar

Uddin, M., Mo, H., Dong, D., Elsawah, S., Zhu, J., and Guerrero, J. M. (2023). Microgrids: a review, outstanding issues and future trends. Energy Strategy Rev. 49, 101127. doi:10.1016/j.esr.2023.101127

CrossRef Full Text | Google Scholar

Wang, F., Shan, Q., Teng, F., He, Z., Xiao, Y., and Wang, Z. (2022a). Distributed secondary control strategy against bounded FDI attacks for microgrid with layered communication network. Front. Energy Res. 10, 914132. doi:10.3389/fenrg.2022.914132

CrossRef Full Text | Google Scholar

Wang, F., Shan, Q., Zhu, J., and Xiao, G. (2022b). Discrete-time resilient-distributed secondary control strategy against unbounded attacks in polymorphic microgrid. Front. Energy Res. 10, 961488. doi:10.3389/fenrg.2022.961488

CrossRef Full Text | Google Scholar

Wang, J. S., and Yang, G. H. (2018). Data-driven methods for stealthy attacks on TCP/IP-based networked control systems equipped with attack detectors. IEEE Trans. Cybern. 49 (8), 3020–3031. doi:10.1109/tcyb.2018.2837874

PubMed Abstract | CrossRef Full Text | Google Scholar

Wang, Y., Deng, C., Liu, Y., and Wei, Z. (2023). A cyber-resilient control approach for islanded microgrids under hybrid attacks. Int. J. Electr. Power & Energy Syst. 147, 108889. doi:10.1016/j.ijepes.2022.108889

CrossRef Full Text | Google Scholar

Xiao, S., and Dong, J. (2020). Distributed fault-tolerant containment control for linear heterogeneous multiagent systems: a hierarchical design approach. IEEE Trans. Cybern. 52 (2), 971–981. doi:10.1109/tcyb.2020.2988092

CrossRef Full Text | Google Scholar

Xu, G., and Ma, L. (2020). Resilient self-triggered control for voltage restoration and reactive power sharing in Islanded microgrids under Denial-of-Service attacks. Appl. Sci. 10, 3780. doi:10.3390/app10113780

CrossRef Full Text | Google Scholar

Yang, P., Peng, Y., Xia, Y., Wei, W., Yu, M., and Feng, Q. (2022). A unified bus voltage regulation and MPPT control for multiple PV sources based on modified MPC in the DC microgrid. Front. Energy Res. 10, 1010425. doi:10.3389/fenrg.2022.1010425

CrossRef Full Text | Google Scholar

Yang, Y., Li, Y., Yue, D., Tian, Y. C., and Ding, X. (2020). Distributed secure consensus control with event-triggering for multiagent systems under DoS attacks. IEEE Trans. Cybern. 51 (6), 2916–2928. doi:10.1109/tcyb.2020.2979342

PubMed Abstract | CrossRef Full Text | Google Scholar

Yu, W., Wang, Y., and Song, L. (2019). A two stage intrusion detection system for industrial control networks based on ethernet/IP. Electronics 8 (12), 1545. doi:10.3390/electronics8121545

CrossRef Full Text | Google Scholar

Zhan, H., Du, Z., Liu, X., and Li, F. (2023). Resilient distributed control of islanded microgrids under false data injection attacks. Sustain. Energy Technol. Assessments 57, 103145. doi:10.1016/j.seta.2023.103145

CrossRef Full Text | Google Scholar

Zhang, P., Portillo, L., and Kezunovic, M. (2006). “Compatibility and interoperability evaluation for all-digital protection system through automatic application test,” in 2006 IEEE power engineering society general meeting, Montreal, QC, Canada, June, 2006, 7.

Google Scholar

Zhang, S., and Fan, H. (2022). Editorial: stability and primary control, dynamic analysis, and simulation of microgrids with new forms and features. Front. Energy Res. 10, 854473. doi:10.3389/fenrg.2022.854473

CrossRef Full Text | Google Scholar

Zhou, D., Zhang, Q., Guo, F., Lian, Z., Qi, J., and Zhou, W. (2023). Distributed resilient secondary control for islanded DC microgrids considering unbounded FDI attacks. IEEE Trans. Smart Grid, 1. doi:10.1109/tsg.2023.3286991

CrossRef Full Text | Google Scholar

Nomenclature

Keywords: islanded microgrids, resilient control, false data injection attack, denial-of-service attack, secondary control

Citation: Liu Y, Du Z, Chen Y and Zhan H (2023) Resilient distributed control of islanded microgrids under hybrid attacks. Front. Energy Res. 11:1320968. doi: 10.3389/fenrg.2023.1320968

Received: 13 October 2023; Accepted: 01 December 2023;
Published: 29 December 2023.

Edited by:

Fuwen Yang, Griffith University, Australia

Reviewed by:

Yushuai Li, University of Oslo, Norway
Sahaj Saxena, Thapar Institute of Engineering and Technology, India

Copyright © 2023 Liu, Du, Chen and Zhan. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Zhaobin Du, epduzb@scut.edu.cn

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.