Agent-Based Distributed Control Schemes for Distributed Energy Storage Systems Under Cyber Attacks

被引:31
作者
Sharma, Desh Deepak [1 ]
Singh, S. N. [2 ]
Lin, Jeremy [3 ]
Foruzan, Elham [4 ]
机构
[1] MJP Rohilkhand Univ, Dept Elect Engn, Bareilly 243006, Uttar Pradesh, India
[2] IIT Kanpur, Dept Elect Engn, Kanpur 208016, Uttar Pradesh, India
[3] PJM Interconnect, Audubon, PA 19403 USA
[4] Univ Nebraska, Dept Elect & Comp Engn, Lincoln, NE 68588 USA
关键词
Agent-based system; cyber-attack; distributed energy storage system; distributed optimal control; peak shaving; SECURITY; NETWORKS;
D O I
10.1109/JETCAS.2017.2700947
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, the ratios of the required power exchange by the distributed energy storage systems (DESSs) to their power capacity/maximum allowed power for charging or discharging operations are used as information to be exchanged among different battery agents associated with respective to DESSs. First, a fuzzy logic-based information deviation detection scheme is proposed for detection of the effects of cyber-attacks on the information. Two distributed control schemes, based on leader-follower distributed control schemes, are proposed to decide the power exchange by DESS under cyber-attack scenarios. A consensus-based leader-follower distributed control scheme under cyber-attacks, with an arbitrary topology, is proposed while incorporating information deviation detection scheme. Furthermore, a novel agent-based secure distributed optimal control scheme is proposed for charging and discharging of distributed energy storage systems. Linear quadratic regulator-based distributed optimal control scheme is incorporated in this scheme. In both proposed control schemes, the information deviation of agents is monitored and, based on their information deviations, the control actions are taken to ensure agents' information convergence. The electricity consumption data of a practical medium-voltage distribution system is used to validate the effectiveness of the proposed control schemes. Both control schemes are demonstrated to ensure peak shaving operations in the power distribution system, which may consist of an unreliable communication network, by DESSs.
引用
收藏
页码:307 / 318
页数:12
相关论文
共 27 条
[1]  
[Anonymous], 2009, REPORT NIST SMART GR
[2]  
[Anonymous], 2009, 7628 NIST IR
[3]   Optimal Linear-Consensus Algorithms: An LQR Perspective [J].
Cao, Yongcan ;
Ren, Wei .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2010, 40 (03) :819-830
[4]   Cyber security assessment of a power plant [J].
Fovino, Igor Nai ;
Guidi, Luca ;
Masera, Marcelo ;
Stefanini, Alberto .
ELECTRIC POWER SYSTEMS RESEARCH, 2011, 81 (02) :518-526
[5]  
Gambuzza L. V., IEEE J EMER IN PRESS
[6]   Cyber-physical attacks and defences in the smart grid: a surveyInspec keywordsOther keywords [J].
He, Haibo ;
Yan, Jun .
IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2016, 1 (01) :13-27
[7]   Integrated Anomaly Detection for Cyber Security of the Substations [J].
Hong, Junho ;
Liu, Chen-Ching ;
Govindarasu, Manimaran .
IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (04) :1643-1653
[8]   Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems [J].
Li, Zhiyi ;
Shahidehpour, Mohammad ;
Alabdulwahab, Ahmed ;
Abusorrah, Abdullah .
IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (05) :2260-2272
[9]  
Liu S., 2013, INT J PHOTOENERGY, V2013, P1
[10]   A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid [J].
Liu, Shan ;
Mashayekh, Salman ;
Kundur, Deepa ;
Zourntos, Takis ;
Butler-Purry, Karen .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2013, 1 (02) :273-285