Resilient Model Predictive Adaptive Control of Networked Z-Source Inverters Using GMDH

被引:9
作者
Ahmadi, Amirhossein [1 ]
Asadi, Yasin [2 ]
Amani, Ali Moradi [3 ]
Jalili, Mahdi [3 ]
Yu, Xinghuo [3 ]
机构
[1] Univ Calgary, Dept Elect & Software Engn, Calgary, AB T2N 1N4, Canada
[2] Shahid Bahonar Univ Kerman, Dept Elect Engn, Kerman 7618855517, Iran
[3] RMIT Univ, Sch Engn, Melbourne, Vic 3001, Australia
基金
澳大利亚研究理事会;
关键词
Z-source inverter; attack resilient; model predictive adaptive control; group method of data handling; unknown input Kalman filter; INPUT RECONSTRUCTION; CONTROL-SYSTEMS; ATTACKS; DESIGN;
D O I
10.1109/TSG.2022.3174250
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Power grids are increasingly evolving into more efficient smart grids thanks to advancements in information technology. However, these intelligent communication-dependant power systems are becoming more susceptible to cyberattacks than their traditional peers. Power inverters are one of the main network connected devices supporting grid stability, which can potentially be targets for cyber-threats. This article presents an attack-resilient model predictive adaptive controller for a class of inverters, called Z-source inverters, to protect them against deception attacks. The proposed control structure includes a model predictive controller equipped with an unknown input Kalman filter and an estimator for system perturbations. The group method of data handling technique is used to estimate system uncertainties and make the system robust against perturbations. The unknown input Kalman filter is also adopted to estimate the states and unknown inputs in the presence of noisy measurements and cyberattacks on the control signal. We mathematically prove that in the presence of noise and perturbations, the proposed controller guarantees the stability of the system under a deception attack, which causes a delay, less than a sampling time, in control signals. Simulation results reveal the effectiveness of the presented controller in protecting the system against pulse, scaling and random attacks in the presence of system uncertainties, source and load fluctuations and output noises.
引用
收藏
页码:3723 / 3734
页数:12
相关论文
共 48 条
[11]   ADMM-Based Distributed State Estimation of Smart Grid Under Data Deception and Denial of Service Attacks [J].
Du, Dajun ;
Li, Xue ;
Li, Wenting ;
Chen, Rui ;
Fei, Minrui ;
Wu, Lei .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2019, 49 (08) :1698-1711
[12]   Cyber attack models for smart grid environments [J].
Eder-Neuhauser, Peter ;
Zseby, Tanja ;
Fabini, Joachim ;
Vormayr, Gernot .
SUSTAINABLE ENERGY GRIDS & NETWORKS, 2017, 12 :10-29
[13]   A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems [J].
Farraj, Abdallah ;
Hammad, Eman ;
Al Daoud, Ashraf ;
Kundur, Deepa .
IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (04) :1846-1855
[14]  
Farzanegan B., INT J CONTROL
[15]   Understanding the operation of a Z-source inverter for photovoltaic application with a design example [J].
Hanif, M. ;
Basu, M. ;
Gaughan, K. .
IET POWER ELECTRONICS, 2011, 4 (03) :278-287
[16]   Cyber-physical attacks and defences in the smart grid: a surveyInspec keywordsOther keywords [J].
He, Haibo ;
Yan, Jun .
IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2016, 1 (01) :13-27
[17]   Optimal control of LTI systems over unreliable communication links [J].
Imer, Orhan C. ;
Yueksel, Serdar ;
Basar, Tamer .
AUTOMATICA, 2006, 42 (09) :1429-1439
[18]  
Ivakhnenko A. G., 1995, Pattern Recognition and Image Analysis, V5, P527
[19]   HEURISTIC SELF-ORGANIZATION IN PROBLEMS OF ENGINEERING CYBERNETICS [J].
IVAKHNENKO, AG .
AUTOMATICA, 1970, 6 (02) :207-+
[20]   Input reconstruction for networked control systems subject to deception attacks and data losses on control signals [J].
Keller, J. Y. ;
Chabir, K. ;
Sauter, D. .
INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2016, 47 (04) :814-820