Multilayer Resilience Paradigm Against Cyber Attacks in DC Microgrids

نویسندگان

چکیده

Recent advancements in dc microgrids are largely based on distributed control strategies to enhance their reliability. However, due numerous vulnerabilities the communication layer, they susceptible cyber attacks. Hijacked link(s) could affect microgrid system reliability and operation many ways. Therefore, accuracy detection of compromised becomes very critical dynamic relationship between cyber-physical entities microgrids. One most prominent attacks layer is referred as man-in-the-middle (MITM) attack. This type attack involves infiltrating information two nodes by a third party. article proposes multilayer resilient controller detect mitigate MITM immediately for ensuring security First, modeling cooperative response, degree coordination element(s) discussed detail. Furthermore, diverging factor law proposed locate identify malicious signals voltage current counterparts. A multilayer-based event-driven strategy then used remove these introducing multiple mitigation layers. Based authentication signal each neighboring agent True or False , data flow network takes place guarantee resilience against Finally, mechanism presence theoretically verified validated using simulations experiments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Software-Defined Microgrid Control for Resilience Against Cyber Attacks

Microgrids (MGs) rely on networked control supported by off-the-shelf wireless communications. This makes them vulnerable to cyber-attacks, such as denial-of-service (DoS). In this paper, we mitigate those attacks by applying the concepts of (i) separation of data plane from network control plane, inspired by the software defined networking (SDN) paradigm, and (ii) agile reconfiguration of the ...

متن کامل

Optimal Backup Strategies Against Cyber Attacks

In this paper we introduce the new problem of finding the best way to protect a computer system against cyber and ransomware attacks by choosing an optimal backup scheme using k storage devices. While in standard backup schemes it is beneficial to backup as frequently as possible, in the case of sophisticated cyber attacks any attempt to connect a backup device to an already infected computer i...

متن کامل

Resilience of Process Control Systems to Cyber-Physical Attacks

In this work we investigate the matter of “secure control” – a novel research direction capturing security objectives specific to Industrial Control Systems (ICS). We provide an empirical analysis of the well known Tennessee Eastman process control challenge problem to gain insights into the behavior of a physical process when confronted with cyber-physical attacks. In particular, we investigat...

متن کامل

Leakage Resilience against Concurrent Cache Attacks

In this paper we show how to engineer proofs of security for software implementations of leakage-resilient cryptosystems on execution platforms with concurrency and caches. The proofs we derive are based on binary executables of the cryptosystem and on simple but realistic models of microprocessors.

متن کامل

Resilience of public transport networks against attacks

The behavior of complex networks under failure or attack depends strongly on the specific scenario. Of special interest are scale-free networks, which are usually seen as robust under random failure but appear to be especially vulnerable to targeted attacks. In recent studies of public transport networks of fourteen major cities of the world it was shown that these systems when represented by a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Power Electronics

سال: 2021

ISSN: ['1941-0107', '0885-8993']

DOI: https://doi.org/10.1109/tpel.2020.3014258