This paper discusses the challenges faced by cyber-physical microgrids (MGs) due to the inclusion of information and communication technologies in their already complex, multi-layered systems. The work identifies a research gap in modeling and analyzing stealthy intermittent integrity attacks in MGs, which are designed to maximize damage and cancel secondary control objectives. To address this, the paper proposes a nonlinear residual-based observer approach to detect and mitigate such attacks. In order to ensure a stable operation of the MG, the formulation then incorporates stability constraints along with the detection observer. The proposed design is validated through case studies on a MG benchmark with four distributed generators, demonstrating its effectiveness in detecting attacks while satisfying network and stability constraints.
Residual-Based Detection of Attacks in Cyber-Physical Inverter-Based Microgrids / Intriago, Andres; Liberati, Francesco; Hatziargyriou, Nikos D.; Konstantinou, Charalambos. - In: IEEE TRANSACTIONS ON POWER SYSTEMS. - ISSN 0885-8950. - 39:2(2024), pp. 4020-4038. [10.1109/TPWRS.2023.3286019]
Residual-Based Detection of Attacks in Cyber-Physical Inverter-Based Microgrids
Francesco LiberatiSecondo
;
2024
Abstract
This paper discusses the challenges faced by cyber-physical microgrids (MGs) due to the inclusion of information and communication technologies in their already complex, multi-layered systems. The work identifies a research gap in modeling and analyzing stealthy intermittent integrity attacks in MGs, which are designed to maximize damage and cancel secondary control objectives. To address this, the paper proposes a nonlinear residual-based observer approach to detect and mitigate such attacks. In order to ensure a stable operation of the MG, the formulation then incorporates stability constraints along with the detection observer. The proposed design is validated through case studies on a MG benchmark with four distributed generators, demonstrating its effectiveness in detecting attacks while satisfying network and stability constraints.File | Dimensione | Formato | |
---|---|---|---|
Intriago_postprint_Residual_2023.pdf
accesso aperto
Note: DOI: 10.1109/TPWRS.2023.3286019
Tipologia:
Documento in Post-print (versione successiva alla peer review e accettata per la pubblicazione)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
3.1 MB
Formato
Adobe PDF
|
3.1 MB | Adobe PDF | |
Intriago_Residual_2024.pdf
solo gestori archivio
Tipologia:
Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
2.93 MB
Formato
Adobe PDF
|
2.93 MB | Adobe PDF | Contatta l'autore |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.