A FDI Attack-Resilient Distributed Secondary Control Strategy For Islanded Microgrids
A FDI Attack-Resilient Distributed Secondary Control Strategy For Islanded Microgrids
Abstract—Distributed cooperative control has been used as a caused by the primary control. The tertiary control maintains
preferred secondary control strategy for maintaining frequency the optimal operation of MGs.
synchronization and voltage restoration in cyber-physical AC Since the secondary control is critical for islanded MGs
microgrids due to its flexibility, scalability and better computa-
tional performance. However, such a control system is susceptible to operate at the nominal condition and supply power with
to potential cyber attacks, i.e., false data injection (FDI) attacks. high quality, the reliability of the secondary control level is
To this end, this article introduces a hidden layer based attack- of particularly importance. Therefore, distributed control of
resilient distributed cooperative control algorithm to solve the large scale multi-agent system becomes a superior alternative
problem of the secondary control of islanded microgrids under to centralized control structures due to its flexibility, scalability
FDI attacks. In comparison to the existing attack-resilient dis-
tributed control methods, the proposed controller with sufficient and better computational performance [5]–[8]. Despite these
large α can mitigate the adverse effects of time dependent FDI advantages, most of existing distributed secondary control
attacks on actuators, sensors and communication links of the con- strategies assume ideal communication environment among
trol system, and is also robust to state dependent FDI attacks. DGs. Nevertheless, the ideal communication assumption is
Furthermore, the algorithm is applicable even when all DGs and unreasonable in the practice because communication failure
communications are compromised. Finally, the efficiency of the
proposed controller is evaluated for a test microgrid with 4 DGs and potential attacks can easily compromise the control system
under different types of attack. with a lot of information interaction and computing processes
being involved. Also, the lack of central authority makes the
Index Terms—AC microgrids, distributed control, attack-
resilient control, secondary control. distributed control have relatively lower security than its cen-
tralized counterpart. Furthermore, the collaborative nature of
states propagating and states update of distributed control can
I. I NTRODUCTION easily make the attack spread throughout the overall system,
ITH advanced computing and communication compo- and result in control failure or even make the overall power
W nents being equipped extensively, active power dis-
tribution systems have evolved into Cyber-Physical Systems
system unstable when only being infected by a simple cyber
attack on a certain DG or a communication link. For exam-
(CPSs) with tight integration and cooperation between cyber ple, for the distributed frequency secondary control system, a
and electrical spaces [1], [2]. AC microgrids (MGs), as simple constant injection can make frequencies of DGs out
the important constituents in active distribution system, can of synchronous, which would cause instability of the overall
facilitate the penetration of renewable-energy generated by dis- power system after a long run, and would lead to a complete
tributed generators (DGs), and can also maintain local power disaster in the worst case [9].
supply by managing the internal power independently when Potential cyber attacks that violate the security of systems
operating at islanded mode. As for the control structure of include data modification or false date injection attacks (FDI),
MGs, the hierarchical control is a standardized framework, denial of sevice, replay attacks, and others. Among them, FDI
which is typically classified into three layers, i.e., the primary, attacks are the most common and typical attack forms for
secondary, and tertiary control levels [3], [4]. The function of distributed control systems [9]–[16], which will maliciously
primary control is to balance the power generation and the destroy the control performance by injecting false information
load demand through droop mechanism. The secondary con- to corrupt the real information. Normally, to enhance the robust-
trol is to compensate the derivation of frequency and voltage ness of control systems, there are two ways to deal with the
FDI attack, one is to encrypt the propagated information [17],
Manuscript received February 21, 2020; revised August 17, 2020 and another is to design special control laws to mitigate or eliminate
November 5, 2020; accepted December 24, 2020. Date of publication
December 29, 2020; date of current version April 21, 2021. This work was the diverse effects of the FDI attack, which is of our concern
supported in part by the National Key Research and Development Program in this article. Actually, some relevant works, including attack
of China (Basic Research Class) under Grant 2017YFB0903000, and in part detection and attack-resilient control, have been investigated
by the National Natural Science Foundation of China under Grant U1909201.
Paper no. TSG-00256-2020. (Corresponding author: Donglian Qi.) in the literature. For example, the authors in [11] developed a
The authors are with the College of Electrical Engineering, Zhejiang false data injection attack detection method for power system
University, Hangzhou 310027, China (e-mail: [email protected]). to detect unrecognizable false data injected by stealthy attack
Color versions of one or more figures in this article are available at
https://doi.org/10.1109/TSG.2020.3047949. (a kind of attack that can bypass the normal monitors as the
Digital Object Identifier 10.1109/TSG.2020.3047949 control objectives being satisfied without any error involved).
1949-3053
c 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:44:51 UTC from IEEE Xplore. Restrictions apply.
1930 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 3, MAY 2021
A vulnerability factor based stealthy attack detection strategy of MGs is provided in Section III. Simulation validation for
for cooperative control was introduced in [12], which can accu- the proposed control strategy is presented in Section IV, and
rately identify FDI attacks or stealthy attacks on sensors or Section V presents the summary of this article.
communication links of secondary voltage control system of DC
MGs. Analogously, the authors in [13] dealt with this problem II. P RELIMINARIES OF M ICROGRIDS AND P ROBLEM
by transforming attack detection problem into identifying the S TATEMENT
variable in inferred candidate invariant MGs properties’ set. In
addition to the attack detection methods, some researchers focus A. Hierarchical Control Structure of Microgrids
on attack-resilient techniques. Specifically, the authors in [14] AC MGs are now still in the cutting edge of the state of
focused on dealing with the constant attacks (the injections are the art. As mentioned above, MGs can operate in both grid-
constants) on the distributed secondary control of frequency connected mode and islanded mode. Thus, appreciate control
synchronization of islanded MGs. In particular, an observer is critical for the stability and economy of MGs in both modes.
based resilient control protocol was presented to mitigate the In the grid-connected mode, the main power grid provides the
adverse effects of constant attacks, in which confidence factors frequency and voltage reference for MGs, and DGs operate
and trust factors were designed to estimate the effects caused in PQ control mode according to the references. Whereas, in
by constant attacks and attenuate their damage. Its similar islanded mode, control systems must maintain the frequency
counterpart for DC MG can be found in [15]. An observa- and voltage synchronization and restore the nominal opera-
tion network based attack-resilient cooperative control strategy tion condition by properly controlling the power supply within
was introduced in [16]. With the strategy in [16], each DG the MGs. The control for islanded MGs can be classified into
can monitor the behaviors of its neighbors and gradually iso- master-slave control mode and peer-to-peer control mode [27].
late the compromised DGs with the aid of a proper designed For the master-slave control mode, a DG controlled by con-
observation network. stant frequency/voltage control strategy, termed as the master
To the best of our knowledge, the research on attack- controller, is chosen to provide the frequency and voltage ref-
resilient distributed secondary control in AC MGs is insuf- erences for the overall MG, while other DGs, as the slave
ficient. Most of the existing algorithms only deal with one controllers, operate in PQ control mode according to the refer-
specific kind of attack, which is not in line with the practice ences provided by the master controller. However, master-slave
applications since the injections can be in various forms [11], control mode needs the master controller have the ability of
[12], [14], [15], [18]–[23]. In addition, few existing works supplying sufficient power quickly since it must maintain the
clarify the vulnerable locations for control systems. In fact, frequency and voltage of the MG by regulating the output
all the computing and data exchange components are vulner- power to meet the load quickly, which is too much for the
able to FDI attacks, especially for the actuators, sensors and chosen DG in MGs. For peer-to-peer control mode, each of
communication links. Furthermore, to ensure attack-resilient the DGs is equally important in supporting the frequency and
operation, some works assume that more than half of the voltage in MGs, and operates in the same control mode based
attacked DG’s neighbors should be healthy [14], [15], [24], on the local information at the access point. Droop control,
which is a rather strict assumption for applications since which can share the load automatically and locally, is often
attackers could corrupt any DG if they can get access to, and used as the preferred control strategy in peer-to-peer control
even corrupt all the DGs or communication links if possible. mode. Droop mechanism prescribes linear relation between
To comprehensively protect the secondary control system the frequency and the active power, and between the voltage
of AC MGs against FDI attacks, inspired by the algorithms amplitude and the reactive power, which is typically denoted
proposed in [25], [26], this article introduces an attack-resilient by [3]
control for frequency synchronization of islanded MGs. The
ωi = ωri − mpi Pi
main contribution of this work are three folds: 1) a hidden (1)
vi = Vri − nqi Qi
layer of virtual system is introduced to maintain the stabil-
ity of the islanded MGs being attacked, the algorithm is fully where vi and ωi are the voltage amplitude and frequency of
distributed and can mitigate the damage of time dependent or DGi respectively. Pi and Qi are the active and reactive power
state dependent FDI attacks; 2) we show that the algorithm of DGi terminal. Vri and ωri are the primary control references.
ensures the frequency of each DG synchronous to the nomi- mpi and nqi are the droop coefficients in relation with the DGi ’s
nal value when the actuators, sensors and communication links rating.
being compromised, and the controller is robust even when all Although the droop mechanism based peer-to-peer control
the DGs and communication links are attacked. 3) the condi- can share power automatically, it would leads to the devi-
tion and possibility that would make the algorithm invalid in ation of frequency and voltage. To this end, the hierarchical
the extreme case are analyzed. To illustrate the superiority control structure is developed. As illustrated in Fig. 1, the hier-
of the proposed controller, a comparison experiment with the archical control includes three control layers, the first layer,
algorithm proposed in [14] is implemented. referred to as the primary control, plays the role of balancing
The remainder of the article is organized as follows. the power generation and the load demand. Typically, droop
Introduction of hierarchical control structure of MGs and the control mechanism is used in this layer, which could result
problem to be solved is presented in Section II. The designing in frequency and voltage deviation. The primary control layer
of FDI attack-resilient strategy for frequency synchronization also includes the inner voltage loop, current loop and power
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:44:51 UTC from IEEE Xplore. Restrictions apply.
CHEN et al.: FDI ATTACK-RESILIENT DISTRIBUTED SECONDARY CONTROL STRATEGY FOR ISLANDED MICROGRIDS 1931
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:44:51 UTC from IEEE Xplore. Restrictions apply.
1932 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 3, MAY 2021
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:44:51 UTC from IEEE Xplore. Restrictions apply.
CHEN et al.: FDI ATTACK-RESILIENT DISTRIBUTED SECONDARY CONTROL STRATEGY FOR ISLANDED MICROGRIDS 1933
the method proposed in [32], so does the obtainment of Q. 3) When the DG i’s sensor is attacked, all of the
Therefore, the overall attack-resilient system can be realized information received by the sensor will be infected,
in a distributed manner. which is
The following lemmas show that in the presence of bounded
time dependent FDI attacks or state-dependent attacks, the ωija = ωij + ηi δa for all j ∈ Ni (17)
designed control strategy (7) can make sure frequencies of
where ωija is the corrupted frequency sensed by the DG
DGs synchronize to ωref with an arbitrarily small error given
i from DG j, δa is the attack injected into the sensor of
a sufficient large values of α > 0 and proper matrices P, H,
DG i. Likewise, ηi = 1 indicates the presence of attack.
Q and vector D.
It should be noted that attack model (17) is a special
Lemma 1 [25]: Consider the secondary control system (7)
case of (16). Thus, we can only analyze attack model (16)
under Assumption 1, with the properly chosen matrices P, H,
to investigate both communication links and sensors being
Q and D according to the aforementioned rules, the frequency
attacked.
vector of DGs ω converges to 1N ωref with a small bounded
Based on the attack models above, the following corollary
error for a sufficient large α > 0 as t → ∞. Specifically
is hold.
lim eω ≤ J (12) Corollary 1: In the presence of bounded FDI attacks
t→∞ on actuators, sensors and communication links, the attack-
where eω = ω − 1N ωref is the tracking error, J = (C + resilient strategy (7) can ensure frequency of each DG ωi , (i =
α 2 PH−1 Q)−1 . 1, . . . , N) synchronize to ωref with a small bounded error given
Lemma 2 [26]: For state-dependent attacks (ω, t) under proper matrices P, H, Q and vector D and a sufficient large
Assumption 1 satisfying α > 0.
Proof: As mentioned previously, we here only consider
˙ = f (, ω)
(13) the cases where the actuators and communication links being
in which (13) would have a finite L2 gain, the secondary con- attacked.
trol system (7) is uniformly bounded for a sufficient large For the case where the actuators of DGs are subjected to
values of α > 0, with the properly chosen matrices P, H, Q FDI attacks, using (15) and (7), we have
and D according to the aforementioned rules. Furthermore, ω̇ = Cω + αPz + Bωref + δu
by increasing α, frequency vector of DGs ω is forced to
converge to an arbitrarily small neighborhood around 1N ωref . ż = Hz − αQω + αDωref (18)
Specifically where = diag([λ1 , . . . , λN ]), and δu = [δu1 , . . . , δuN ]T
lim eω ≤ Je (14) satisfying Assumption 1.
t→∞ Invoking Lemma 1, we have limt→∞ eω (t) ≤ Jδu .
where e is the steady state of the injection . For the case where the communication links suffer from
Lemma 1 and Lemma 2 show that the proposed attack- FDI attacks, from (16) and (7), one can derive
resilient control is highly robust to bounded FDI attacks. The
ω̇ = Cω + αPz + Bωref + δω
tracking error is related to the topology of networks, the
designed P and H as well as the value of α. It can be also ż = Hz − αQω + αDωref (19)
observed from J that larger α implies better attack-resilient N
performance. where δω = [ j=1 aij μij δωij ] ∈ RN . Likewise, invoking
Subsequently, we will show the proposed attack-resilient Lemma 1, we have limt→∞ eω (t) ≤ Jδω . The proof is
control can mitigate adverse effects of FDI attacks on actua- complete.
tors, sensors and communication links of control system. The
models of attacks on these three parts are given as follows: It is worthy of mentioning that Lemma 1, Lemma 2 and
1) The FDI attack on actuator of DG i can be model by Corollary 1 imply that system (7) can maintain frequency
synchronization even when more than half of the neighbors of
uai = ui + λi δui (15) each DG are infected with FDI attacks, which is more practical
than the observer-based strategy in [14].
where ui is the control input, δui is the injected attack, uai
is the corrupted control input, λi is a binary number indi-
cating the availability of attack, i.e., λi = 1 represents C. Analysis of the Extreme Case Where the Algorithm Fails
the presence of attack, otherwise, λi = 0. to Protect Against Attacks
2) The corrupted communication link between DG i and If attackers get access to the parameter α of the designed
DG j can be expressed by system (7), and inject FDI attacks by
where ωija is the corrupted frequency received by DG i where d ∈ RN is the attack vector, whose elements are satisfy-
from DG j, δωij is the injected attack, μij = 1 implies ing Assumption 1, the tracking error of (12) with attack (20)
the presence of attack, otherwise, μij = 0. becomes
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:44:51 UTC from IEEE Xplore. Restrictions apply.
1934 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 3, MAY 2021
−1
J = C + α 2 PH−1 Q αγ d
−1
1 −1
= C+α 2−γ
PH Q d
αγ
−1
≈ α γ −2 PH−1 Q d (21)
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:44:51 UTC from IEEE Xplore. Restrictions apply.
CHEN et al.: FDI ATTACK-RESILIENT DISTRIBUTED SECONDARY CONTROL STRATEGY FOR ISLANDED MICROGRIDS 1935
TABLE I
S PECIFICATIONS OF THE T EST AC MG
TABLE II
ATTACKS ON C OMMUNICATION L INKS
is switched off from the MG at t = 8 sec. The total simulation Fig. 5. Performances of secondary frequency control under actuator
attacks: (a) Conventional distributed secondary control; (b) FDI attack-resilient
time is set to be 10 sec. distributed secondary control with α = 200.
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:44:51 UTC from IEEE Xplore. Restrictions apply.
1936 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 3, MAY 2021
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:44:51 UTC from IEEE Xplore. Restrictions apply.
CHEN et al.: FDI ATTACK-RESILIENT DISTRIBUTED SECONDARY CONTROL STRATEGY FOR ISLANDED MICROGRIDS 1937
V. C ONCLUSION
This article proposed a FDI attack-resilient distributed sec-
ondary control strategy for frequency synchronization and
restoration in AC islanded MGs. Specifically, a hidden layer
based attack-resilient control scheme was introduced to deal
with FDI attacks on actuators, sensors and communication
links of the secondary control system. The design of the
matrices that construct the controller is discussed in detail.
We shown that the proposed controller can greatly mitigate
the adverse impacts made by time dependent attacks and
state dependent attacks with sufficient large α. Moreover, the
extreme case that makes the algorithm failure was analyzed.
Finally, the effectiveness of the proposed attack-resilient con-
Fig. 10. Performances of observer-based control in [14] under attacks: (a)
The actuator of DG 3 is attacked by 0.1 + 0.05 sin(t); (b) Actuators of all the
trol was provided by simulation results in a test MG with
DGs are attacked by the in Case 1. 4 DGs, and the superiority of the controller was verified by
comparing its performances with that of an existing state-of-art
attack-resilient controller.
R EFERENCES
[1] Z. Su, L. Xu, S. Xin, W. Li, Z. Shi, and Q. Guo, “A future outlook
for cyber-physical power system,” in Proc. IEEE Conf. Energy Internet
Energy Syst. Integr. (EI2), 2017, pp. 1–4.
[2] H. Ye, Q. Mou, X. Wang, and Y. Liu, “Eigen-analysis of large delayed
cyber-physical power system by time integration-based solution oper-
ator discretization methods,” IEEE Trans. Power Syst., vol. 33, no. 6,
pp. 5968–5978, Nov. 2018.
[3] J. M. Guerrero, J. C. Vasquez, J. Matas, L. G. De Vicuña, and
Fig. 11. Performance of observer-based control in [14] under attacks: The M. Castilla, “Hierarchical control of droop-controlled AC and DC
communication link between DG 2 and DG 4 is attacked by −0.1+0.2 cos(t). microgrids—A general approach toward standardization,” IEEE Trans.
Ind. Electron., vol. 58, no. 1, pp. 158–172, Jan. 2011.
[4] A. Bidram and A. Davoudi, “Hierarchical structure of microgrids con-
trol system,” IEEE Trans. Smart Grid, vol. 3, no. 4, pp. 1963–1976,
at all DGs, except DG 3 (under attack), remain synchro- Dec. 2012.
nized at 50 Hz. The controller mitigates the attack obviously. [5] H. Xin, Z. Lu, Z. Qu, D. Gan, and D. Qi, “Cooperative control strat-
Nevertheless, some remedial actions need to be taken, e.g., egy for multiple photovoltaic generators in distribution networks,” IET
Control Theory Appl., vol. 5, no. 14, pp. 1617–1629, Sep. 2011.
disconnecting the DG 3, otherwise, the deviation of DG 3’s
[6] H. Xin, Z. Qu, J. Seuss, and A. Maknouninejad, “A self-organizing
frequency would result in other problem after a long time strategy for power flow control of photovoltaic generators in a distribu-
running. While for the case where all the actuators of DGs tion network,” IEEE Trans. Power Syst., vol. 26, no. 3, pp. 1462–1473,
are attacked as shown in Fig. 10(b), clearly the attacks result Aug. 2011.
[7] A. Bidram, A. Davoudi, F. L. Lewis, and Z. Qu, “Secondary control
in a loss of synchrony, which explains superiority of our of microgrids based on distributed cooperative control of multi-agent
attack-resilient control by comparing it with Fig. 5(b). systems,” IET Gener. Transm. Distrib., vol. 7, no. 8, pp. 822–831,
To show the performance of the observer-based control Aug. 2013.
[8] G. Zhang, C. Li, D. Qi, and H. Xin, “Distributed estimation and sec-
under communication attacks, the case where communication ondary control of autonomous microgrid,” IEEE Trans. Power Syst.,
link between DG 2 and DG 4 is considered. As Fig. 11 shown, vol. 32, no. 2, pp. 989–998, Mar. 2017.
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:44:51 UTC from IEEE Xplore. Restrictions apply.
1938 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 3, MAY 2021
[9] H. Zhang, W. Meng, J. Qi, X. Wang, and W. X. Zheng, “Distributed load [21] D. Meng and K. L. Moore, “Studies on resilient control through
sharing under false data injection attack in an inverter-based microgrid,” multiagent consensus networks subject to disturbances,” IEEE Trans.
IEEE Trans. Ind. Electron., vol. 66, no. 2, pp. 1543–1551, Feb. 2019. Cybern., vol. 44, no. 11, pp. 2050–2064, Nov. 2014.
[10] J. Duan, W. Zeng, and M.-Y. Chow, “Resilient distributed DC optimal [22] H.-N. Wu and H.-D. Wang, “Distributed consensus observers-based H∞
power flow against data integrity attack,” IEEE Trans. Smart Grid, vol. 9, control of dissipative pde systems using sensor networks,” IEEE Trans.
no. 4, pp. 3543–3552, Jul. 2018. Control Netw. Syst., vol. 2, no. 2, pp. 112–121, Jun. 2015.
[11] J. Zhao, L. Mili, and M. Wang, “A generalized false data injection attacks [23] Y. Liu and J. Lunze, “Leader–follower synchronisation of autonomous
against power system nonlinear state estimator and countermeasures,” agents with external disturbances,” Int. J. Control, vol. 87, no. 9,
IEEE Trans. Power Syst., vol. 33, no. 5, pp. 4868–4877, Sep. 2018. pp. 1914–1925, 2014.
[12] S. Sahoo, S. Mishra, J. C.-H. Peng, and T. Dragičević, “A stealth [24] H. J. LeBlanc, H. Zhang, X. Koutsoukos, and S. Sundaram, “Resilient
cyber-attack detection strategy for DC microgrids,” IEEE Trans. Power asymptotic consensus in robust networks,” IEEE J. Sel. Areas Commun.,
Electron., vol. 34, no. 8, pp. 8162–8174, Aug. 2019. vol. 31, no. 4, pp. 766–781, Apr. 2013.
[13] O. A. Beg, T. T. Johnson, and A. Davoudi, “Detection of false-data [25] H. Dong, C. Li, and Y. Zhang, “Resilient consensus of multi-agent
injection attacks in cyber-physical DC microgrids,” IEEE Trans. Ind. systems against malicious data injections,” J. Frankl. Inst., vol. 357,
Informat., vol. 13, no. 5, pp. 2693–2703, Oct. 2017. no. 4, pp. 2217–2231, 2020.
[14] S. Abhinav, H. Modares, F. L. Lewis, F. Ferrese, and A. Davoudi, [26] A. Gusrialdi, Z. Qu, and M. A. Simaan, “Competitive interaction design
“Synchrony in networked microgrids under attacks,” IEEE Trans. Smart of cooperative systems against attacks,” IEEE Trans. Autom. Control,
Grid, vol. 9, no. 6, pp. 6731–6741, Nov. 2018. vol. 63, no. 9, pp. 3159–3166, Sep. 2018.
[15] S. Abhinav, H. Modares, F. L. Lewis, and A. Davoudi, “Resilient coop- [27] C. Wang, Analysis and Simulation Theory of Microgrids. Beijing, China:
erative control of DC microgrids,” IEEE Trans. Smart Grid, vol. 10, Sci. Press, 2013.
no. 1, pp. 1083–1085, Jan. 2019. [28] A. Bidram, F. L. Lewis, and A. Davoudi, “Distributed control systems
[16] Y. Liu, H. Xin, Z. Qu, and D. Gan, “An attack-resilient cooperative con- for small-scale power networks: Using multiagent cooperative con-
trol strategy of multiple distributed generators in distribution networks,” trol theory,” IEEE Control Syst. Mag., vol. 34, no. 6, pp. 56–77,
IEEE Trans. Smart Grid, vol. 7, no. 6, pp. 2923–2932, Nov. 2016. Dec. 2014.
[17] Y. Mo et al., “Cyber–physical security of a smart grid infrastructure,” [29] Z. Qu, Cooperative Control of Dynamical Systems: Applications to
Proc. IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012. Autonomous Vehicles. London, U.K.: Springer, 2009.
[18] H. Modares, B. Kiumarsi, F. L. Lewis, F. Ferrese, and A. Davoudi, [30] A. Bidram, V. Nasirian, A. Davoudi, and F. L. Lewis, Cooperative
“Resilient and robust synchronization of multiagent systems under Synchronization in Distributed Microgrid Control. Cham, Switzerland:
attacks on sensors and actuators,” IEEE Trans. Cybern., vol. 50, no. 3, Springer, 2017.
pp. 1240–1250, Mar. 2020. [31] A. Gusrialdi and Z. Qu, “Distributed estimation of all the eigenval-
[19] S. Abhinav, I. D. Schizas, F. L. Lewis, and A. Davoudi, “Distributed ues and eigenvectors of matrices associated with strongly connected
noise-resilient networked synchrony of active distribution systems,” digraphs,” IEEE Control Syst. Lett., vol. 1, no. 2, pp. 328–333,
IEEE Trans. Smart Grid, vol. 9, no. 2, pp. 836–846, Mar. 2018. Oct. 2017.
[20] J. Hu and G. Feng, “Distributed tracking control of leader–follower [32] S. Mou, J. Liu, and A. S. Morse, “A distributed algorithm for solving a
multi-agent systems under noisy measurement,” Automatica, vol. 46, linear algebraic equation,” IEEE Trans. Autom. Control, vol. 60, no. 11,
no. 8, pp. 1382–1387, Aug. 2010. pp. 2863–2878, Nov. 2015.
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:44:51 UTC from IEEE Xplore. Restrictions apply.