Distributed Observer-Based Finite-Time Control of AC Microgrid Under Attack
Distributed Observer-Based Finite-Time Control of AC Microgrid Under Attack
Abstract—In this article, a novel distributed observer-based the advantages of the first two controls and overcome their
finite-time control scheme is proposed to improve the resilience shortcomings. Consequently, network-based distributed control
of islanded AC microgrids under attack. Existing research on is widely implemented in islanded microgrids [6]–[8]. Recently,
microgrids under attack mainly focuses on detection technology
and attenuation technology, but rarely considers the key indicator multi-agent systems (MAS) based distributed consensus control
of convergence speed. The proposed control strategy can accel- methods have become increasingly popular and many related
erate the convergence process of microgrids under attacks. The methods have been proposed [9]–[12]. Through the information
designed controller can converge the frequencies and voltages of exchange among neighbor agents which depends on the com-
the attacked microgrid to the reference values within a finite time, munication topology, the parameters of all agents will converge
while achieving accurate power sharing. The proposed strategy
has an improved performance compared with the conventional to their reference values by consensus control. Some issues,
control methods against attack by applying finite-time theory. such as switching topology [12], communication delay [13],
The effectiveness of the control in case of different types of noise-resilient [14], and battery energy storage system [15],
attack is verified by the simulation of an islanded AC microgrid which affect the stability of microgrid, are well addressed in
in MATLAB/Simulink. corresponding distributed control strategy. Moreover, finite-
Index Terms—Distributed observer-based finite-time control, time theory has been implemented in consensus control to
secondary control, frequency stability, AC microgrid, attack. accelerate synchronization process.
Recently, many distributed finite-time control methods
have been proposed to improve the control performance of
I. I NTRODUCTION microgrid [16]–[24]. In [16], a finite-time consensus proto-
col under switching topology is proposed to guarantee the
ECAUSE the power system vigorously promotes energy
B transition, the proportion of renewable energy has
increased rapidly in recent years. Microgrid gains much atten-
convergence of frequency and voltage in a finite time. A dis-
tributed finite-time convergence algorithm based on feedback
linearization theory for restoration of frequency and voltage
tion as it expedites the integration of renewable energy sources is proposed in [17]. The average voltage regulation and cur-
with high -efficiency, reliability, and scalability [1]. In the rent sharing are studied in [18] and developed a finite-time
microgrid, multiple distributed generations (DGs) operate in control scheme with reduced transient overshoot and chat-
parallel to supply power for loads to enhance the reliabil- tering. However, the coupling effect of current sharing and
ity and capacity of power supply. Therefore, ensuring proper voltage regulation is not discussed in the theoretical analysis.
power sharing among all DGs and maintaining frequency and In order to eliminate the coupling effect, a finite-time sec-
voltage stability are prerequisites for stable operation of the ondary control scheme which consists of four separate control
microgrid [2]. To achieve proper coordination and improve loops is proposed in [19]. A robust finite-time controller is
efficiency of microgrid, many control strategies are proposed designed in [20] which irrespective of parameters uncertain-
to optimize microgrid performance [3]. ties, unmodeled dynamics, and disturbances. Moreover, a con-
Traditional centralized control utilizes the Microgrid Central sensus control architecture for heterogeneous battery energy
Controller (MGCC) to collect information and solve the storage systems is presented in [21], where frequency/voltage
optimal value, then send the reference command to the local convergence and active/reactive power sharing in a finite
controller [4]. Decentralized control relies on local information time period. The distributed energy storage system (DESS)
to make decisions and obtain control instructions [5]. is utilized in [22] to enhance the resilience of microgrid and
Distributed control realizes global observation and control by ensuring finite-time convergence. Furthermore, for additional
exchanging information among neighboring units, combining application scenarios including low voltage microgrid [23] and
Manuscript received December 26, 2019; revised May 1, 2020 and July autonomous microgrid [24], corresponding finite-time control
20, 2020; accepted August 11, 2020. Date of publication August 19, 2020; methods have been proposed respectively.
date of current version December 21, 2020. Paper no. TSG-01925-2019. Although distributed finite-time control has been widely
(Corresponding author: Jie Wang.)
The authors are with the School of Electronic, Information and Electrical used in microgrids, there is no relevant finite-time control
Engineering, Shanghai Jiao Tong University, Shanghai 200240, China (e-mail: method for the vulnerability of microgrid to attack caused
[email protected]). by distributed control. Existing research on microgrid attacks
Color versions of one or more of the figures in this article are available
online at https://ieeexplore.ieee.org. can be divided into two classes. The first class focuses on
Digital Object Identifier 10.1109/TSG.2020.3017793 attack detection technologies. For example, a signal temporal
1949-3053
c 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:28:33 UTC from IEEE Xplore. Restrictions apply.
158 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 1, JANUARY 2021
logic (STL) detection algorithm is presented in [25], which V = {v1 , v2 , . . . , vN } represents the set of nodes in graph G,
can identify two major types of cyber-attacks. In [26], the that is the collection of all agents; E ⊆ V × V represents
attacked agent(s) can be accurately identified by a novel the collection of edges in graph G, that is the collection of
cooperative vulnerability factor (CVF) framework. False- communication paths between agents, and A = {aij }n×n is the
data injection attacks (FDIAs) can be detected by com- non-negative weighted adjacency matrix of graph which repre-
paring the candidate invariants and the actual invariants sent the weight of communication lines between agents. Define
in [27]. The second class is to strengthen the resilience of the edges of node vj to node vi as: (vj , vi ), which represent
microgrid to attacks and it can be achieved by secure con- node vj can receive information from node vi , aij is the weight
trol design or enhanced communication architecture. In [28], of edge (vj , vi ), aij > 0 if (vj , vi ) ∈ E, otherwise aij = 0. For all
a software-defined networking (SDN)-based network archi- nodes vi in this article, we have aii = 0. Node vi is called the
tecture is proposed to improve the resilience and security of neighbor of node vj if (vj , vi ) ∈ E. The set of neighbors of the
microgrid operations against cyber-attacks. It is shown in [29] node vi is given by Ni = {j|(vj , vi ) ∈ E}. The Laplace matrix of
that designing a recursive systematic convolutional (RSC) code the oriented graph G can be represented as L = D − A, where
and Kalman Filter (KF) based method is effective to eliminate matrix is defined as D = diag{d1 , d2 , . . . , dN } with
the degree
the effect of attacks. An observer-based controller with confi- di = j∈Ni aij . Moreover, because some nodes can be con-
dence factors and trust factors is proposed for synchronization nected to a virtual leader node by unidirectional edges, define
of microgrid in [30]. Due to the lack of distributed finite-time the pinning gain matrix as A = diag{ai0 }, where ai0 > 0 if
control considering attacks, this article proposes an observer- follower node vi is connected to the leader node across the
based finite-time controller based on the observer proposed communication link (vj0 , vi ), otherwise ai0 = 0.
in [30]. The designed controller can converge the frequencies
and voltages of DGs in finite time and achieve accurate power B. Corresponding Mathematical Lemmas
sharing after the microgrid is attacked. Moreover, the effect of Lemma 1 [31]: Consider a double integrator system
attacks can be limited in the attacked agent(s) without spread-
ing in the communication network by the designed controller. ẋi (t) = yi (t) (1)
The stability and resilience of islanded AC microgrids can ẏi (t) = Aui (t) (2)
been greatly enhanced by the proposed controller.
The main contributions in this article can be summarized as where A is a positive-definite matrix. To make the system glob-
follows. ally asymptotically stable in a finite time, the control input is
1) A distributed observer-based finite-time control strategy designed as
against attack is proposed to provide a reliable control frame- ui (t) = −k1 sig(xi )α − k2 sig(yi )β (3)
work for islanded AC microgrid, where the frequency and
voltage of islanded AC microgrid under attack can converge where k1 , k2 > 1, sig(·)α = sign(·)| · |α , 0 < α < 1, β = 1+α 2α
,
within settling finite time. the state variable xi (t) will achieve converge to the initial state
2) An improved attack detection and localization method in a finite settling time under the designed control input.
is proposed based on the confidence factor and trust factor Lemma 2 [32]: For continuous control system ẋ = f (x, t),
in [30], which can eliminate the defect of indistinguishability where f (0, t) = 0, if there is a function V(t) satisfy:
between attacks and real disturbances. 1) V(t) is positive definite and differentiable in the neigh-
3) Unlike existing finite-time control methods, this article borhood of the origin;
considers the vulnerability of distributed control to malicious 2) Existing real numbers c > 0 and 0 < d < 1 such that
attacks and developed an observer-based finite-time control
V̇(t) + cV d (t) ≤ 0 (4)
based on the observer introduced from [30].
V 1−d (t
0)
4) In comparison with conventional attack attenuation meth- Let T ≤ c(1−d) . One has
ods and detection methods, the proposed method has fast
convergence speed and shows a superior performance for limt→T V(t) = 0
(5)
a stealthy attack. V(t) = 0, ∀t ≥ T
The rest of this article is organized as follows: Section II (t0 )
1−d
provides preliminaries of graph theory and corresponding i.e., V(t) reaches zero within finite time T ≤ Vc(1−d) .
mathematical lemmas. In Section III, a cooperation control Assumption 1 [30]: The communication link of each DG is
of AC microgrids are discussed. The distributed observer- at least (2z + 1), where z is the number of attacked neighbors,
based finite-time control scheme under attack is described in which means at least half of the information received by any
Section IV. Digital simulation verification of the proposed con- DG is intact.
trol strategy performance is shown in Section V. Conclusions Assumption 2: The attacker is assumed not to generate
are presented in Section VI. a switch command to the executor, which is used to ensure
exist device to execute control command.
II. P ROBLEM F ORMULATION
A. Preliminaries on Graph Theory C. Cooperative Control of AC Microgrids
For a multi-agent system with N agents, the communication Consider an islanded AC microgrid with multiple distributed
network can be represented by graph G = (V, E, A), where generation resources, the block diagram is depicted in Fig. 1.
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:28:33 UTC from IEEE Xplore. Restrictions apply.
LU et al.: DISTRIBUTED OBSERVER-BASED FINITE-TIME CONTROL OF AC MICROGRID UNDER ATTACK 159
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:28:33 UTC from IEEE Xplore. Restrictions apply.
160 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 1, JANUARY 2021
networks and lead to a network-wide instability. In order to information with false data injection. The agent needs to make
reduce adverse effects and prevent the propagate of attacks, an decisions based on the local information and neighbor agents
improved attack detection and localization method is proposed information to determine the destroyed data. The location of
based on the confidence factor and trust factor in [30]. The attack cannot be detected only depending on the value of
observer with confidence factors and trust factors is given by confidence factor. Therefore, it is necessary to design a cor-
responding attack detection and localization method for the
x̂˙ i (t) = aij Cj (t)Tij (t) x̂i (t) − x̂j (t) + ai0 x̂i (t) − xref (11) information transmitted by the communication link.
j∈Ni To achieve this goal, define
where x̂i is the observation of DG i; xref is the reference value ρij (t) = nxj (t) − xk (t) (16)
of virtual leader node, Cj is the confidence factor, Tij is the k∈Ni
trust factor.
where n is the number of neighbors of DG i.
Remark 1: The distributed observer is designed to track the
During normal operation, ρij = 0 for all communication
reference information of the leader node, and the secondary
links; in the presence of attack, DG i may receive false data by
control can then be realized by using the local information
the communication link from DG j which lead to ρij = 0. The
and the local estimation of the reference set point. The confi-
propagate of the attack in communication link may lead to
dence factor and trust factor are used to evaluate the fidelity
abnormal information of multiple agents. The proximity of
of the interactive information to achieve attack detection and
DG i to the attacked DG determine the magnitude of ρij , the
localization. The attack can be prevented from spreading
greater the magnitude of ρij , the more likely DG i is the attack
in the communication network by discarding the information
source or close to the attack.
of the attacked node. The communication data is replaced from
εi
the system information to the observations, the attack directly sij (t) = (17)
acting on the system frequency or voltage is limited to the εi + ρij (t)
attacked DG. where εi is a threshold which is settled by considering
An attack detection and localization method is designed microgrid system.
based on the introduced observer and attack model. According
to the local neighborhood error define ḟij (t) = χ sij (t) − χ fij (t) (18)
where X > 0 is a weighing factor of fij .
x̂i (t) = xref (t) − x̂i (t) (12)
The trust factor of DG j for DG i is given by
bi (t) = hi aij x̂j (t) − x̂i (t)
j∈Ni Tij = max Ci (t), fij (t) (19)
+ aij x̂j (t) + x̂i (t) (13) The trust factor of DG j for DG i is determined by ρij if
j∈Ni DG i is attacked. The greater the ρij , the more likely DG j is
the attacked node. Moreover, the information transmitted by
where hi is a positive constant.
communication link from DG j to DG i would be discarded
In the presence of attack, bi (t) will change from zero to
once the trust value drops below the threshold i .
a positive value which can be used to detect the existence of
attacks. Therefore, we can check the value of bi (t) which pro-
vide essential information of attacks. Because of the presence IV. D ESIGNING OF O BSERVER -BASED
of attack, we have bi (t) = 0 for the attacked node and the F INITE -T IME C ONTROL
affected nodes. Based on the introduced observer, the design of secondary
Although attack detection is possible based on checking controller can effectively prevent attack from spreading in the
the value of bi (t), locating the attack sources is crucial for network. However, the convergence speed of microgrid under
restoring microgrid to normal operations. attack is important for the performance of controller, it is nec-
To achieve this goal, define essary to speed up the stabilization process. In this section,
the observer-based finite-time control strategy is proposed to
Ċi (t) = μdi (t) − μCi (t) (14) quickly converge the frequency and voltage of the microgrid
where μ > 0 is a weighing factor of Ci ; 0 ≤ Ci ≤ 1 with under attack, while achieving accurate power sharing.
σi
di (t) = (15) A. Finite-Time Frequency and Active Power Control Design
σi + bi (t)
To make the frequency converge to the reference value
where σi is a set threshold for the confidence factor. in settling time after microgrid being attacked, a finite-time
After attack occurs, bi σi for DG i which can be affected observation control algorithm is developed as follow.
by an attack. For a node attack, the value of Ci can be used Based on the observer introduced above, the local tracking
to locate the attack which can indicate the attacked node by error of frequency observation is given by
finding the minimum value of Ci , and the value of Ci depends
on the proximity of agent i to the attacked node. eω̂i (t) = aij Cj (t)Tij (t) ω̂i (t) − ω̂j (t) + ai0 ω̂i (t) − ωref
For a link attack, the agent that receives information in j∈Ni
the communication link will obtain the damaged neighbor (20)
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:28:33 UTC from IEEE Xplore. Restrictions apply.
LU et al.: DISTRIBUTED OBSERVER-BASED FINITE-TIME CONTROL OF AC MICROGRID UNDER ATTACK 161
A double integrator system for synchronization error is e2ω̂i = aio ω̂i − ωref (30)
represented as j∈Ni
ėω̂i = kω̂i Hence it follows that
(21)
k̇ω̂i = uω̂i 1+α 1+α
V̇1 ≤ −(2λ) 2 V1 2 (31)
ωi = ė
where k ωi , the local error for k
ωi is given by
For 0 < α < 1 , by Lemma 2 [32], we have
ėω̂i (t) = aij Ċj (t)Ṫij (t) ω̂˙ i (t) − ω̂˙ j (t) + ai0 ω̂˙ i (t) (22)
2 1+α
j∈Ni
T1 ≤ 1+α
V1 (0) 2 (32)
From the Lemma 1 [31], considering the double integrator (2λ) (1 − α)
2
system (22) to achieve observation finite-time global stability, limt→T1 V1 (t) = 0
(33)
the control input is given by V1 (t) = 0, ∀t ≥ T1
α β
uω̂i = −cω1 sig eω̂i − cω2 sig ėω̂i (23) Then we obtain that V1 (t) converges to zero within finite
time T1 and e ωi = k ωi = 0, ∀t ≥ T1 , which means that the
where cω1 , cω2 > 1 is the controller gain, 0 < α < 1, β = 1+α
2α
. local neighbor tracking error would reduce to zero in settling
Theorem 1: The distributed finite-time controller (23) can time. Then the observations of all DGs can synchronize to
pin the observation of all DGs to the reference frequency ωref their reference ωref in finite time. This completes the proof.
asymptotically, the settling time T1 is shown in (32). The observations of all DGs have been regulated to converge
Proof: Rewrite the double integrator system (21) as to their reference frequency by the finite-time frequency obser-
ėω̂ = kω̂ vation controller (23). Then, a finite-time frequency control
(24)
k̇ω̂ = uω̂ = −cω1 sig(eω̂ )α − cω2 sig(kω̂ )β algorithm which based on the observation after stabilization is
developed as follow.
Take the Lyapunov function as
The frequency finite-time controller can be designed as:
1 λ
V1 = (eω̂ )T eω̂ (25) uωi (t) = −cω3 sig ωi (t) − ω̂i (t) (34)
2
It can be realized that where ωi = ωref is a constant when t ≥ T1 ; c3 > 1 is the
α α
cω1 sig eω̂i = cω1 aij Cj (t)Tij (t)sig ω̂i (t) − ω̂j (t) controller gain; λ < 1 is the controller coefficient.
j∈Ni The frequency deviation generated by the primary control
β can be eliminated by the designed finite-time frequency con-
+ cω2 ai0 sig ω̂i (t) − ωref (26) troller (34). However, secondary frequency control may result
in the inability to accurately share active power. Therefore, it
Differentiating (25) yields
is necessary to ensure the accurate active power sharing while
V̇1 = (eω̂ )T ėω̂ achieving frequency stability:
⎛
N
α mi Pi = mj Pj , ∀i, j (35)
= eω̂i ⎝cω1 aij Cj (t)Tij (t)sig ω̂i (t) − ω̂j (t)
i=1 j∈Ni where mi is the droop coefficient of active power.
⎞
β To realize accurate active power sharing and fast stable
+ cω2 ai0 sig ω̂i (t) ⎠ (27) performance, the active power controller is designed as
p
uPi (t) = −cPi aij sig mi Pi (t) − mj Pj (t) (36)
Following Lemma 2 [24] for an undirected network, (27) can
j∈Ni
be further written as
N
1+α 1+β where cPi > 1 is the controller gain, 0 < p < 1.
1
V̇1 = − cω1 aij ω̂i − ω̂j + 2cω2 ai0 ω̂i Denotethe tracking error eωi = ωi − ωi and ePi =
2 mi Pi − N1 N m P . For simplicity, the convergence of angular
i=1 i=1 i i
N N
2 2 N
2 2 frequency tracking error eωi is discussed, and similar results
1
≤− cω1 aij 1+α ω̂i − ω̂j − (cω2 ai0 ) 1+β ω̂i can be obtained for the tracking error ePi .
2 Theorem 2: The distributed finite-time frequency con-
i=1 j=1 i=1
= −(e1ω̂ ) (L)e1ω̂ − 2(e2ω̂ ) (G)e2ω̂
T T troller (34) can pin the frequencies of all DGs to their
observation ωi which is actually the reference frequency ωref
≤ −λ1 (L)(e1ω̂ )T e1ω̂ − 2λ2 (G)(e2ω̂ )T e2ω̂
1+α 1+β
when t ≥ T1 . The settling time Tω is shown in (40).
≤ − 2λ1 (L)V11
2
− 4λ2 (G)V12
2
(28) Proof: Differentiating eωi yields
λ
where V1 is divided into two terms, V11 = (e1 ėωi = ω̇i − ω̂˙ i = ω̇i = uωi = −c3 sig ωi (t) − ω̂i (t) (37)
ωi ) e1
ωi , V1 =
T 2
(e2
ωi ) e2
T
ωi with Take the Lyapunov function as
e1ω̂i = aij ω̂i − ω̂j (29) 1 T
V2 (eω ) = e eω (38)
j∈Ni 2 ω
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:28:33 UTC from IEEE Xplore. Restrictions apply.
162 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 1, JANUARY 2021
Differentiating (41) yields where v̂i = vref is a constant when t ≥ T1 ; cv3 > 1 is the
N controller gain; γ < 1 is the controller coefficient.
λ The voltage-reactive power droop control law is not suffi-
V̇2 = eTω ėω = eωi −c3 sig ωi (t) − ω̂i (t)
i=1 cient to achieve the goal of realize accurate reactive power
sharing, which can be given by
N
λ N
1+λ
= eωi −c3 sig eωi = −c3 eω
i
ni Qi = nj Qj , ∀i, j (49)
i=1 i=1
1+λ
where ni is the droop coefficient of reactive power.
N
2 2
1+λ
≤ −c3 eω = −c3 2
1+λ
2 V2 2 (39) To realize accurate reactive power sharing and fast stable
i
i=1 performance, the reactive power controller is designed as
1+λ q
Due to c3 2 2 > 0 and 0 < 1+λ
2 < 1, one has uQi (t) = −cQi aij sig ni Qi (t) − nj Qj (t) (50)
j∈Ni
2 1−λ
Tω ≤ V2 (0) 2 (40)
1+λ
c3 (2) 2 (1 − λ) where cQi > 1 is the controller gain, 0 < q < 1.
According to (48) and (50), we can write vni as follows:
limt→Tω V2 (t) = 0
(41)
V2 (t) = 0, ∀t ≥ Tω
vni = uvi + uQi dt (51)
Then we obtain that V2 (t) converges to zero within finite time
Tω and eωi = ωi − ωi = 0, ∀t ≥ Tω , which means that the local Therefore, the control inputs vni can realize voltage finite-
neighbor tracking error would reduce to zero in settling time. time stabilization and achieve active power sharing:
Therefore, the actual frequency of all DGs can synchronize to
their reference ωref in finite time. This completes the proof. lim vi (t) − vref = 0, vi (t) = vref , ∀t ≥ Tv (52)
t→Tv
According to (34) and (36), we can write ωni as follows:
N N
1 1
ωni = (uωi + uPi )dt (42) lim ni Qi − ni Qi = 0, ni Qi = ni Qi , ∀t ≥ TQ .
t→TQ N N
i=1 i=1
Therefore, the control inputs ωni can realize frequency (53)
finite-time stabilization and achieve active power sharing:
V. S IMULATION R ESULTS
lim ωi (t) − ωref = 0, ωi (t) = ωref , ∀t ≥ Tω (43)
t→Tω The proposed observer-based finite-time control scheme will
N N be applied to an islanded AC microgrid with five DGs to verify
1 1
lim mi Pi − mi Pi = 0, mi Pi = mi Pi , ∀t ≥ TP . its effectiveness. Fig. 2 depicts the control flow of observer-
t→TP N N
i=1 i=1 based finite-time control scheme. The basic block diagram of
(44) the test system is shown in Fig. 3. Two different communica-
tion network topologies are presented in Fig. 4. The parameters
B. Finite-Time Voltage and Reactive Power Control Design of DGs, loads, and lines are shown in Table I. The controller
Similarly, the observer-based finite-time voltage controller gains are c1 = c2 = 2, c3 = 2, the coefficients for the sec-
and reactive power controller are given in this section. ondary controller are α = 0.8, β = 89 , λ = 0.8, the low
The finite-time voltage controller based on attack detection threshold of trust factor is set as Tij > 0.5.
is developed as follows:
Based on the observer introduced above and the defined A. Case I: Load Variations
tracking error system, the voltage controller is given by:
1) Case I-A (Stability Analysis): The performance of
α β
uv̂i = −cv1 sig ev̂i − cv2 sig ėv̂i (45) the designed controller under load variations is given in
Fig. 5(a)-(d). As shown in Fig. 5(a) - (b), the frequency of all
where cv1 , cv2 > 1 is the controller gain, 0 < α < 1, β = 1+α 2α
, DGs kept relatively synchronous and produced a small drop.
It can be seen that the global synchronization of the frequency
ev̂i (t) = aij Cjv (t)Tijv (t) v̂i (t) − v̂j (t) + ai0 v̂i (t) − vref
has not been destroyed, and the voltage drop range at the load
j∈Ni
increasing node is larger than the voltage of other DGs. The
(46) frequency and voltage of each DG can be quickly restored to
ėv̂i (t) = aij Ċjv (t)Ṫijv (t) v̂˙ i (t) − v̂˙ j (t) + ai0 v̂˙ i (t) (47) the reference value. Fig. 5(c) - (d) show the changes of active
j∈Ni power and reactive power of each DG in the microgrid under
load changes. The power vacancy caused by the increased load
where v̂i is the observation of DG i; vref is the reference volt-
can be allocated to each DG according to the power sharing
age of virtual leader node, Cjv is the confidence factor, Tijv is the
protocol. Under the severe disturbance of load changes, the
trust factor.
proposed distributed controller is still capable of achieving
The finite-time voltage controller can be designed as:
γ zero frequency deviation and voltage deviation while realizing
v̇i = uvi (t) = −cv3 sig vi (t) − v̂i (t) (48) accurate power sharing within a few seconds.
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:28:33 UTC from IEEE Xplore. Restrictions apply.
LU et al.: DISTRIBUTED OBSERVER-BASED FINITE-TIME CONTROL OF AC MICROGRID UNDER ATTACK 163
Fig. 2. The control flow of the observer-based finite-time control for ith DG.
Fig. 5. Case I-A: (a) Frequencies of DGs, (b) Voltages of DGs, (c) Active
power of DGs, (d) Reactive power of DGs.
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:28:33 UTC from IEEE Xplore. Restrictions apply.
164 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 1, JANUARY 2021
Fig. 6. Case I-B with the distributed attack-resilient cooperative control: Fig. 8. Case II-B: (a) Frequencies of DGs, (b) Voltages of DGs, (c) Active
(a) Confidence levels, (b) Trust levels; Case I-B with the distributed observer- power of DGs, (d) Reactive power of DGs.
based finite-time cooperative control: (c) Confidence levels, (d) Trust levels.
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:28:33 UTC from IEEE Xplore. Restrictions apply.
LU et al.: DISTRIBUTED OBSERVER-BASED FINITE-TIME CONTROL OF AC MICROGRID UNDER ATTACK 165
Fig. 9. Case III-A: (a) Frequencies of DGs, (b) Voltages of DGs, (c) Active
power of DGs, (d) Reactive power of DGs.
Fig. 11. Case IV-A with the distributed attack-resilient cooperative control:
(a) Frequencies of DGs, (b) Voltages of DGs, (c) Confidence levels, (d) Trust
levels; Case IV-A with the distributed observer-based finite-time cooperative
control: (e) Confidence levels, (f) Trust levels.
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:28:33 UTC from IEEE Xplore. Restrictions apply.
166 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 1, JANUARY 2021
Fig. 13. Experimental AC Microgrid Setup. (a) The AC microgrid with four
DGs; (b) Communication topology for four DGs.
Fig. 12. Case IV-B with the distributed attack-resilient cooperative control:
(a) Frequencies of DGs, (b) Voltages of DGs, (c) Confidence levels, (d) Trust
levels; Case IV-B with the distributed observer-based finite-time cooperative
control: (e) Confidence levels, (f) Trust levels.
E. Experimental Evalution
The proposed strategy is also verified experimentally by
using an AC microgrid comprising four DGs with the commu-
nication topology are shown in Fig. 13. The primary system
was built using lithium iron phosphate battery, inverter and Fig. 14. Experimental evalution of frequency link attack: (a) Frequencies of
load. The control algorithm was written based on MATLAB- DGs, (b) Voltages of DGs, (c) mP of DGs, (d) nQ of DGs.
Simulink software and ran in the real-time digital control
system rtunit. The signal acquisition was realized through
the connection of I/O port on the junction box. The on-line stability of the system and the distributed observer-based
debugging of the program and the real-time observation of finite-time control can realize the rapid recovery of the system.
the running results can be carried out on the upper com- The frequencies and voltages of all DGs can be restored within
puter, and the output analog signals can also be observed the setting time, while realizing accurate power sharing.
through the oscilloscope. The setting of controller parameters A frequency node attack with f2 = 50.1Hz attacks the AC
and reference values are the same as used in previous stud- microgrid system between t = 5s and t = 15s. Fig. 15 show
ies. Converter parameters are L=0.6mH, C=1.5mF. The local the performance of the attack-resilient distributed control in
loads are R1 = R2 = 10, C1 = 340μF. the experimental evalution, where the frequencies and volt-
A frequency link attack with amplitude of 0.1Hz as false ages of all DGs can converge to their reference values within
data is initiated at about 5 s. The effect of frequency link 15s. Fig. 15(c)-(d) show that the active and reactive sharing of
FDIA on prototype AC microgrid system are shown in Fig. 14. the system can be quickly achieved even when the frequency
It can be seen that the emergence of attack destroys the of DG2 is abnormal under the power controller. After the
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:28:33 UTC from IEEE Xplore. Restrictions apply.
LU et al.: DISTRIBUTED OBSERVER-BASED FINITE-TIME CONTROL OF AC MICROGRID UNDER ATTACK 167
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:28:33 UTC from IEEE Xplore. Restrictions apply.
168 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 1, JANUARY 2021
[31] X. Lu, R. Lu, S. Chen, and J. Lu, “Finite-time distributed tracking con- Jie Wang received the Ph.D. degree in indus-
trol for multi-agent systems with a virtual leader,” IEEE Trans. Circuits trial automation from Northeast University, China,
Syst. I, Reg. Papers, vol. 60, no. 2, pp. 352–362, Feb. 2013. in 1998. He is a Professor of power system and
[32] X. Lin and Y. Zheng, “Finite-time consensus of switched multiagent its automation with the Department of Electrical
systems,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 47, no. 7, Engineering, Shanghai Jiao Tong University, where
pp. 1535–1545, Jul. 2017. he is also with a lab for the development of Flexible
[33] M. Basseville and I. V. Nikiforov, Detection of Abrupt Changes: Theory ac/dc transmission system technology and intelligent
and Application, vol. 104. Englewood Cliffs, NJ, USA: Prentice-Hall, control. His research interests include stability anal-
1993. ysis and control of complex power system and smart
grids. His recent research interest is to establish
a series of theoretical analysis results of nonlinear
differential algebraic control systems and apply these results to the nonlinear
control of structure preserving power systems. Based on the differential alge-
braic Hamiltonian system and its periodic solution theory, the low frequency
oscillation analysis and control method of interconnected power grid are
presented. The symmetry and conserved quantity in Noether’s theory are
applied to restrict the existence of periodic solutions of power system.
Rentao Lu received the B.S. degree in electri- Ziqiang Wang received the M.S. degree from
cal engineering from Nanchang University, China, the School of Electrical Information and Electronic
in 2018. He is currently pursuing the master’s Engineering, Shanghai Jiao Tong University, in
degree with the School of Electrical Information 2020, where he is currently pursuing the Doctoral
and Electronic Engineering, Shanghai Jiao Tong degree. His research interests include power system
University, China. His research interests include nonlinear control, wide-area control, and finite-time
control and stability analysis of microgrid and finite- control.
time control.
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:28:33 UTC from IEEE Xplore. Restrictions apply.