Secure Distributed Control for Demand Response in Power Systems Against Deception Cyber-Attacks With Arbitrary Patterns

被引:19
|
作者
Yang, Shaohua [1 ,2 ]
Lao, Keng-Weng [1 ,2 ]
Hui, Hongxun [1 ,2 ]
Chen, Yulin [3 ]
机构
[1] Univ Macau, State Key Lab Internet Things Smart City, Macau 999078, Peoples R China
[2] Univ Macau, Dept Elect & Comp Engn, Macau 999078, Peoples R China
[3] Zhejiang Univ, Hainan Inst, Sanya 572025, Peoples R China
关键词
HVAC; Decentralized control; Power systems; Cyberattack; Heating systems; Power system stability; Regulation; Demand response; deception cyber-attack; arbitrary attack pattern; secure distributed control; Lyapunov theorem; CONTROL STRATEGY;
D O I
10.1109/TPWRS.2024.3381231
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Demand response (DR) is a crucial component of power systems that can offer operating reserves by utilizing flexible loads on the demand side. With the development of communication, information, and control technologies, DR has formed a cyber-physical system. While deep cyber-physical coupling improves the performance of DR, it also introduces cyber-security threats, i.e., deception cyber-attacks (DCAs), which can lead to DR out-of-control and thus threaten the power system's safe operation. To this end, this paper proposes a secure distributed control to safeguard DR against DCAs. First, a cyber-physical DR community is developed based on a distributed control framework for offering operating reserve to power systems. In addition, considering different patterns, the impacts of DCAs on DR are quantified, revealing that different attack patterns can lead to various adverse consequences on DR, such as power deviation, delayed response, power fluctuation, etc. Furthermore, an anti-attack secure distributed control is developed for DR to counteract against arbitrary DCAs. In addition, rigorous proof based on Lyapunov theorem demonstrates that the proposed control can ensure the stability and convergence for the DR power regulation required by power systems, despite arbitrary DCAs. Finally, case studies validate the efficacy of the proposed control method.
引用
收藏
页码:7277 / 7290
页数:14
相关论文
共 50 条
  • [41] Prescribed Fixed-Time Control for Constrained Uncertain Nonlinear Cyber-Physical Systems Against Deception Attacks
    Cuan, Zhaoyang
    Ding, Da-Wei
    Ren, Yingying
    Xie, Xiang-Peng
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (11) : 7048 - 7057
  • [42] Secure Adaptive Event-Triggered Control for Cyber-Physical Power Systems Under Denial-of-Service Attacks
    Wang, Aimin
    Fei, Minrui
    Song, Yang
    Peng, Chen
    Du, Dajun
    Sun, Qing
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (03) : 1722 - 1733
  • [43] Lyapunov-Based Resilient Cooperative Control for DC Microgrid Clusters Against False Data Injection Cyber-Attacks
    Tan, Sen
    Xie, Peilin
    Guerrero, Josep M.
    Vasquez, Juan C.
    Alcala, Jose Matas
    Carreno, Jorge El Mariachet
    Guerrero-Zapata, Manel
    IEEE TRANSACTIONS ON SMART GRID, 2024, 15 (03) : 3208 - 3222
  • [44] Design of a Co-Simulation Platform with Hardware-in-the-Loop for Cyber-attacks on Cyber-Physical Power Systems
    Wang, Qi
    Liu, Zengji
    Tang, Yi
    2019 9TH IEEE ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (IEEE-CYBER 2019), 2019, : 430 - 434
  • [45] Secure Tracking Control and Attack Detection for Power Cyber-Physical Systems Based on Integrated Control Decision
    Sun, Chaowei
    Su, Qingyu
    Li, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 968 - 979
  • [46] Environomic-Based Social Demand Response in Cyber-Physical-Social Power Systems
    Valinejad, Jaber
    Mili, Lamine
    van der Wal, C. Natalie
    Xu, Yijun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (03) : 1302 - 1306
  • [47] Two-Layer Deception Model Based on Signaling Games Against Cyber Attacks on Cyber-Physical Systems
    Kamdem, Priva Chassem
    Zemkoho, Alain B.
    Njilla, Laurent
    Nkenlifack, Marcellin
    Kamhoua, Charles A.
    IEEE ACCESS, 2024, 12 : 171559 - 171570
  • [48] Stochastic Cyber-Attacks Estimation for Nonlinear Control Systems Based on Robust H∞ Filtering Technique
    Li, Yumei
    Voos, Holger
    Pan, Lin
    Darouach, Mohamed
    Hua, Changchun
    2015 27TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2015, : 5590 - 5595
  • [49] Cyber Attacks Against the Economic Operation of Power Systems: A Fast Solution
    Liu, Xuan
    Li, Zuyi
    Shuai, Zhikang
    Wen, Yunfeng
    IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (02) : 1023 - 1025
  • [50] Unsupervised concrete feature selection based on mutual information for diagnosing faults and cyber-attacks in power systems
    Hassani, Hossein
    Hallaji, Ehsan
    Razavi-Far, Roozbeh
    Saif, Mehrdad
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2021, 100