Detection of Malicious Attacks in Autonomous Cyber-Physical Inverter-Based Microgrids

نویسندگان

چکیده

The distributed generation capabilities of microgrids (MGs) arise as essential assets in enhancing grid resilience. integration energy sources, controllable loads, and prosumers necessitates the deployment potent control communication synergies. While those synergies transform MGs into cyber-physical systems through information technologies able to sense, control, actuate local resources they inadvertently expose cyber-attack threats. Increasing security critical against “black swan” events, i.e., high-impact low-probability incidents, is a major priority for MG operations. Such if left unabated, can intensify elicit system dynamics instability, eventually causing outages failures. In this article, we develop an integrated approach multiagent perform detection malicious attacks based on subspace methods. We employ small-signal model autonomous/islanded consider different attack models targeting MG’s secondary frequency control. detector constructed via identifying stable kernel representation autonomous attack-free case. illustrate impact well feasibility developed method simulation Canadian urban benchmark distribution system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unorganized Malicious Attacks Detection

Recommender system has attracted much attention during the past decade, and many attack detection algorithms have been developed for better recommendation. Most previous approaches focus on the shilling attacks, where the attack organizer fakes a large number of user profiles by the same strategy to promote or demote an item. In this paper, we study a different attack style: unorganized malicio...

متن کامل

Eigenvalue calculator for Islanded Inverter-Based Microgrids

The stability analysis of islanded inverter-based microgrids (IBMGs) is increasingly an important and challenging topic due to the nonlinearity of IBMGs. In this paper, a new linear model for such microgrids as well as an iterative method to correct the linear model is proposed. Using the linear model makes it easy to analyze the eigenvalues and stability of IBMGs due to the fact that it derive...

متن کامل

Networked Constrained Cyber-Physical Systems subject to malicious attacks: a resilient set-theoretic control approach

In this paper a novel set-theoretic control framework for Networked Constrained Cyber-Physical Systems is presented. By resorting to set-theoretic ideas and the physical watermarking concept, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast severe cyber attacks affecting the communication channels. The resulting scheme ensures Uniformly...

متن کامل

Scalable Detection of Cyber Attacks

Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely laborintensive and error-prone. To address this important problem, we build on previous work on topological vulnerability analysis, and pro...

متن کامل

Secure Power Systems Against Malicious Cyber-Physical Data Attacks: Protection and Identification

The security of power systems against malicious cyberphysical data attacks becomes an important issue. The adversary always attempts to manipulate the information structure of the power system and inject malicious data to deviate state variables while evading the existing detection techniques based on residual test. The solutions proposed in the literature are capable of immunizing the power sy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Industrial Informatics

سال: 2022

ISSN: ['1551-3203', '1941-0050']

DOI: https://doi.org/10.1109/tii.2021.3132131