首页    期刊浏览 2024年07月08日 星期一
登录注册

文章基本信息

  • 标题:Distributed Resilient Mitigation Strategy for False Data Injection Attack in Cyber-Physical Microgrids
  • 本地全文:下载
  • 作者:Ge Cao ; Rong Jia ; Jian Dang
  • 期刊名称:Frontiers in Energy Research
  • 电子版ISSN:2296-598X
  • 出版年度:2022
  • 卷号:10
  • DOI:10.3389/fenrg.2022.845341
  • 语种:English
  • 出版社:Frontiers Media S.A.
  • 摘要:The stable and reliable operation of microgrids requires the immediate communication and accurate measuring data of cyber systems. The cyber security of smart grids consists of detection and mitigation, where the latter mainly refers to resisting the attack and recovering the physical operation state through various means after cyber attacks. With the flexible electrical topology and the distributed control strategy based on the public communication network and end-to-end neighbor communication, the application and effect of cyber security technologies (firewall and encryption) in traditional cyber systems are limited. However, due to the fact that the cyber system and power system are coupled in microgrid cooperative control, countermeasures are added to the control to enhance the cyber security of microgrids, which has drawn more attention. Therefore, considering the control failure and even system results from the false data inject attack (FDIA) on the cooperative control of microgrids, this study investigates the synchronous mitigation framework based on local detection where the reactive power cooperative control targets of microgrids with and without FDIA are compatible by the resilient control method. The credibility is utilized to measure the reliability of local and neighbor data in the proposed method. The consensus communication coupling gain is weighted corrected by an adaptive update strategy of credibility to delete the attack signal. Moreover, the proposed method directly improves the conventional distributed secondary controller that reduces the complexity of controller design. Simulations investigate the effectiveness of the proposed distributed resilient mitigation strategy under conditions of deception and disruption attacks.
国家哲学社会科学文献中心版权所有