CN116094769B - Port micro-grid control method for resisting false data injection attack - Google Patents

Port micro-grid control method for resisting false data injection attack Download PDF

Info

Publication number
CN116094769B
CN116094769B CN202211658152.1A CN202211658152A CN116094769B CN 116094769 B CN116094769 B CN 116094769B CN 202211658152 A CN202211658152 A CN 202211658152A CN 116094769 B CN116094769 B CN 116094769B
Authority
CN
China
Prior art keywords
control
voltage
frequency
attack
der
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211658152.1A
Other languages
Chinese (zh)
Other versions
CN116094769A (en
Inventor
马锴
董玉飞
杨婕
郭士亮
王彩璐
袁亚洲
赵朋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yanshan University
Original Assignee
Yanshan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yanshan University filed Critical Yanshan University
Priority to CN202211658152.1A priority Critical patent/CN116094769B/en
Publication of CN116094769A publication Critical patent/CN116094769A/en
Application granted granted Critical
Publication of CN116094769B publication Critical patent/CN116094769B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Feedback Control In General (AREA)

Abstract

The invention provides a port micro-grid control method for resisting false data injection attack, which belongs to the technical field of micro-grid safety and comprises the steps of constructing a port micro-grid model based on distributed secondary control under FDI attack, constructing a secondary controller based on an extended state observer, expanding an attack signal into a system state to obtain an augmentation system, estimating the attack signal in real time by using the proposed extended state observer, and compensating the attack by using the proposed secondary controller when the FDI attack occurs, so as to realize the frequency, voltage recovery and power distribution of the port micro-grid. The method can estimate the FDI attack of the system in real time, can resist the negative influence of the attack, and ensures the stable operation of the port micro-grid system.

Description

Port micro-grid control method for resisting false data injection attack
Technical Field
The invention belongs to the technical field of micro-grid security, and particularly relates to a port micro-grid control method for resisting false data injection attack.
Background
As the share of maritime in global maritime trade increases, port hubs become more complex and port micro-grids (seaport microgrid, SMG) are a promising technology aimed at shaping future green maritime traffic. SMG is a self-controlling power system that uses micro-grid control technology to interconnect devices such as distributed power generation units, energy storage units, electric vehicles, service loads, all-electric ships, and communications, and the like, and the existence of SMG enables the integration of more and more distributed energy sources (distributed energy resources, debs) that can improve the energy utilization and economic benefits of the port power system, and improve the port operation efficiency.
SMGs have the same components and framework as land-based micro-grids, and they can all operate in grid-connected and island modes. In this regard, their basic control and operating frameworks may be similar. SMGs typically implement energy management in island mode of operation using a hierarchical control architecture consisting of discrete primary and distributed secondary control stages. The primary control is typically power distribution and primary settling control based on droop principles, and since the primary droop control is a differential control, the secondary control is typically required to adjust the primary set point to achieve frequency and voltage recovery.
Distributed secondary control often requires a combination of communication networks, making the SMG a informative physical system where network systems and physical processes are tightly coupled, and the operation of the SMG depends on efficient and reliable data flows in the network system. While the distributed control architecture provides a superior control concept for SMGs, the measurement and control units (communication links, sensors and actuators) are exposed to potential cyber attack threats due to the lack of a central controller capable of acquiring global information. False data injection (false data injection, FDI) attacks, which are a type of fraudulent network attacks, can lead to instability of the power system and even serious accidents by accessing and tampering with the real data of sensors and actuators. Therefore, designing a distributed control strategy capable of resisting the influence of FDI attack has important significance for SMG stable and safe operation.
Disclosure of Invention
The invention aims to provide a port micro-grid (seaport microgrid, SMG) control method for resisting false data injection (false data injection, FDI) attacks, which is based on an elastic control strategy of an extended state observer (extended state observers, ESO) and realizes frequency and voltage recovery and power distribution of island SMG under the two conditions of FDI attacks and no attacks.
In order to achieve the above purpose, the technical scheme adopted by the invention is as follows:
a port micro-grid control method for resisting false data injection attack comprises a hierarchical control model of a port micro-grid, a false data injection attack model based on the hierarchical control model and a distributed elastic control strategy based on an extended state observer, so that the port micro-grid bus frequency, voltage recovery and output power proportional distribution under the false data injection attack are realized.
The invention further improves a layered control model of the port micro-grid, a false data injection attack model based on the layered control model and a distributed elastic control strategy based on an extended state observer, so as to realize the frequency, voltage recovery and output power proportional distribution of the port micro-grid bus under the false data injection attack, wherein the method comprises the following steps:
1) Calculating the output power of each distributed power supply according to the voltage and current components obtained through dq conversion;
2) Controlling output power through a droop controller of a secondary control stage to obtain a given input value of an inner loop voltage current controller;
3) The inner loop voltage current controller generates PWM modulation signals through the PI controller to control the inverter output frequency and the voltage amplitude to track a given input value;
4) The output power, the frequency and the voltage value of the distributed power inverter are obtained through sensor measurement, the secondary controller based on a communication network generates frequency and voltage auxiliary control input, the auxiliary control input issues an executor to generate frequency and voltage control compensation items, and the given input value output by the droop controller is changed to be a rated value;
5) Considering that false data injection attacks respectively occur on the sensor and the actuator, respectively destroying frequency, voltage and power measurement results and auxiliary control input, and finally destroying the output value of the inverter;
6) Designing an extended state observer to estimate the output frequency, voltage and power of the distributed power inverter and an attack signal;
7) Introducing a virtual variable to estimate reference information of each distributed power supply, and designing a distributed elastic control protocol based on estimated attack signals, state signals and virtual variables so as to realize port micro-grid bus frequency, voltage recovery and output power proportional distribution under false data injection attack.
The invention further improves the hierarchical control model of the port micro-grid, which comprises the following steps:
based on the droop control strategy, the frequency and voltage expression of DERs are obtained as shown in a formula (1):
wherein,and->As frequency and voltage references for inner loop control, respectively, real-time frequency and voltage may be tracked by dual loop control and Pulse Width Modulation (PWM) tracking references, ω ref And v ref Rated frequency and rated voltage, m, respectively, of micro-grid system operation i And n i Droop control coefficients p-f and q-v, respectively, for the ith DER, delta 1i And delta 2i Correction values for frequency and voltage control of the ith DER, respectively, are generated by the secondary controller in accordance with the control target. To achieve frequency, voltage recovery, and power allocation, the frequency and voltage control correction values for the ith DER may be morphed to:
wherein u is ωi The rate of change of the DER frequency is represented as a frequency recovery control rate; u (u) pi The control rate for the active power allocation represents the rate of change of the active power allocation. Delta ωi Represented by u ωi The generated correction value component; delta pi Is composed of u pi The generated correction value component. Similarly, the variables in the expression (3) mean control rate and correction value components corresponding to the voltage control.
The control rate is distributed secondary control rate based on a sparse communication network, and is respectively as follows:
wherein a is ij Indicating the connection between the ith DER and the jth DER, a when the former can acquire the information of the latter ij > 0, otherwise a ij =0;b i0 Representing the case where the ith DER obtains the reference value information, b if and only if the ith DER is selected as a fixed DER to access the reference information i0 > 0, otherwise, b i0 =0;ω ref ,v ref ,/>The reference values are allocated for the frequency, active power allocation, voltage and reactive power of the SMG system, respectively.
Since the inverter response is fast, it is assumed that the frequency and voltage of the SMG can track its reference value in real time. To simplify the analysis, the dynamics of the inner ring are ignored, i.eAnd->
The invention is further improved in that the false data is injected into an attack model, and two positions are considered to be attacked by FDI, and the process is as follows:
when the i-th DER sensor is attacked, the attacker's goal is to destroy the measurements of frequency, voltage and power information obtained by the sensor, propagate the measurements injected with false data through the communication network, and model the destroyed information as:
wherein,and->The frequency recovery control and active power distribution control attacker inject false data of the sensor, which is a derivative bounded signal; />And->The voltage recovery control and active power distribution control attackers inject false data of the sensor, which is a derivative bounded signal.
When the i-th DER's actuator is attacked, the attacker's goal is to destroy the feedback control signal, which is modeled as:
wherein,and->The frequency recovery control and active power distribution control attacker inject false data of the actuator, which is a derivative bounded signal; />And->The voltage recovery control and active power distribution control attacks inject false data into the actuator, which is a derivative bounded signal.
The invention further improves the distributed elastic control strategy based on the extended state observer, which comprises the following steps:
definition of intermediate variablesThe distributed extended state observer is:
wherein,and->Respectively the frequency omega i And active power standard value->Is>And->Correction value component +.>And->Is>And->Attack signals respectively injected into the sensor +.>And->Is>Andattack signals respectively injected into the actuator>And->The correction value equation form of the frequency recovery control and the active power distribution control is still the form in (2). F (F) ωi ,G ωi ,G pi ,H ωi ,H pi Is the gain of ESO. Zeta type toy ωi And xi pi Is an introduced virtual variable, is controlThe internal variables of the controller, which are estimates of the reference information from a per DER perspective, are modeled as:
by estimating the attack signal, the elasticity control rate designed by using the estimated value is as follows:
wherein K is ωi ,K pi Is the controller gain.
Similarly defined intermediate variables The voltage controlled distributed elastic control strategy is:
by adopting the technical scheme, the invention has the following technical progress:
compared with a control strategy based on detection, the elastic control method does not need a detection mechanism, false detection and missing detection caused by detection errors are avoided, and the method is suitable for SMG control under a non-attack scene and can offset adverse effects of attacks on a system under an FDI attack scene. The adopted ESO introduces a correction value component, the attack signal of the actuator is estimated in real time, the observer does not need any information of the attack signal, and the required parameters can be measured by the sensor. The control method introduces virtual variables to realize the estimation of each DER on the reference information, changes the information such as the attacked unreliable frequency and the like into local variables, and does not overflow the attack influence through a communication channel.
Drawings
FIG. 1 is a topological structure diagram of an SMG;
FIG. 2 is a hierarchical control structure of SMG and FDI attack location graph;
FIG. 3 is a block diagram of a proposed distributed elastic control strategy;
FIG. 4 is a graph of the frequency of each DER in the primary and secondary control strategy after addition of an attack signal in the experiment of the present invention;
FIG. 5 is a frequency chart of DERs in the distributed elastic control strategy proposed by the present invention after adding an attack signal in the experiment of the present invention;
FIG. 6 is a graph of the active power of each DER in the primary and secondary control strategy after addition of an attack signal in the experiment of the present invention;
FIG. 7 is a graph of the active power of each DER in the distributed elastic control strategy proposed by the present invention after addition of an attack signal in the experiment of the present invention;
FIG. 8 is a graph of voltage across DERs in the primary and secondary control strategy after addition of an attack signal in the experiment of the present invention;
FIG. 9 is a voltage plot of each DER under the distributed elastic control strategy proposed by the present invention after addition of an attack signal in the present invention experiment;
FIG. 10 is a graph of reactive power of each DER under the primary and secondary control strategy after addition of an attack signal in the experiment of the present invention;
fig. 11 is a reactive power diagram of each DER in the distributed elastic control strategy proposed by the present invention after adding an attack signal in the present invention experiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more clear, the technical solutions of the present invention are further described below with reference to the accompanying drawings and experiments.
Referring to fig. 1 to 11, the present invention proposes a port micro-grid control method for resisting a false data injection attack:
for an inverter-type island SMG consisting of a plurality of distributed power supplies (distributed energy resources, deres), a hierarchical control structure is adopted, and the ESO-based elastic control strategy for resisting FDI attacks comprises the following steps:
(1) The SMG model under FDI attack is established as follows:
(1.1) consider a typical SMG with n DER's as shown in fig. 1, each DER accessing the bus through an inverter and LC filter, with the control objective of maintaining the frequency, voltage stability, and power sharing of the SMG. To achieve this control goal, as the distributed hierarchical control architecture in fig. 2 is employed, one-time control of each DER includes droop control that generates a given input to the internal control loop and an internal voltage-current control loop that generates pulse width modulation (pulse width modulation, PWM) that controls the output frequency, voltage, and power of the inverter. In order to coordinate control of multiple DERs, droop control is applied with the following characteristics:
wherein,and->Omega as frequency and voltage reference for inner loop control ref And v ref Rated frequency and rated voltage, m, respectively, of SMG system operation i And n i Droop control coefficients p-f and q-v, respectively, for the ith DER, delta 1i And delta 2i Correction values for frequency and voltage control, respectively, for the ith DER are generated by the secondary controller according to the following control objectives:
1) Synchronizing the output frequency and voltage of DER at nominal values, namely:
2) DER power scaling to maintain power limits of individual DER in balance with microgrid power, namely:
wherein the sagging coefficient m i ,n i Is arranged asThe output power limit of the DER is shown.
To achieve frequency, voltage recovery, and power allocation, the frequency and voltage control correction values for the ith DER may be morphed to:
wherein u is ωi The rate of change of the DER frequency is represented as a frequency recovery control rate; u (u) pi The control rate for the active power allocation represents the rate of change of the active power allocation. Delta ωi Represented by u ωi The generated correction value component; delta pi Is composed of u pi The generated correction value component. Similarly, the variables in the expression (6) mean control rate and correction value components corresponding to the voltage control.
Since the inverter response is fast, to simplify the analysis, the dynamics of the internal control loop are ignored, assuming that the frequency and voltage of the SMG can track its reference value in real time, i.eAnd->
(1.2) secondary control objective of SMG is to restore the frequency and voltage of debs to rated values while achieving power distribution, and distributed secondary control rates based on sparse communication network are respectively:
wherein a is ij Indicating the connection between the ith DER and the jth DER, a when the former can acquire the information of the latter ij > 0, otherwise a ij =0;b i0 Representing the case where the ith DER obtains the reference value information, b if and only if the ith DER is selected as a fixed DER to access the reference information i0 > 0, otherwise, b i0 =0;Respectively standardized active power output and reactive power output; omega ref ,/>v ref ,/>Frequency, normalized active power, voltage and standard of SMG system respectivelyAnd (3) normalizing the reference value of the reactive power, wherein the two normalized power reference values are as follows:
wherein P is L ,Q L As a function of the total power demand of the load,is the maximum output power of the ith DER.
(1.3) as shown in fig. 2 where the SMG is attacked by the FDI, consider two possible locations of attack by the FDI, namely, a sensor and an actuator, assuming that the information measured by the sensor is attacked by the FDI as follows:
wherein,and->Frequency recovery control and respectivelyActive power distribution controls an attacker to inject false data of a sensor, and the false data is a derivative bounded signal; />And->The voltage recovery control and active power distribution control attackers inject false data of the sensor, which is a derivative bounded signal.
When the i-th DER's actuator is attacked, the attacker's goal is to destroy the feedback control signal, which is modeled as:
wherein,and->The frequency recovery control and active power distribution control attacker inject false data of the actuator, which is a derivative bounded signal; />And->The voltage recovery control and active power distribution control attacks inject false data into the actuator, which is a derivative bounded signal.
The secondary control process of the i-th DER after being attacked becomes:
(2) Establishing an ESO-based distributed elastic control strategy, wherein the control structure is shown in fig. 3, and the process is as follows:
(2.1) taking frequency control as an example, define intermediate variables The dispersed ESO is:
wherein,and->Respectively the frequency omega i And active power standard value->Is>And->Respectively the correction value component delta ωi And->Is>And->Attack signals respectively injected into the sensor +.>And->Is>Andattack signals respectively injected into the actuator>And->The correction value equation form of the frequency recovery control and the active power distribution control is still equation (4). F (F) ωi ,G ωi ,G pi ,H ωi ,H pi Is the gain of ESO. Zeta type toy ωi And xi pi Is an introduced virtual variable, is an internal variable of the controller, is an estimate of the reference information at the perspective of each DER, isModeling is as follows:
s3.2, by estimating attack signals, the elasticity control rate designed by using the estimated value is as follows:
wherein K is ωi ,K pi Is the controller gain.
(2.2) definition of intermediate variables by the same theory The voltage controlled distributed elastic control strategy is:
wherein,and->Respectively the voltage v i And reactive power standard value->Is>And->Respectively the correction value component delta vi And->Is>And->Attack signals respectively injected into the sensor +.>And->Is>And->Attack signals respectively injected into the actuator>And->The correction value equation form of the voltage recovery control and the reactive power distribution control is still equation (5). F (F) vi ,G vi ,G qi ,H vi ,H qi Is the gain of ESO. Zeta type toy vi And xi qi Is an introduced virtual variable, is an internal variable of the controller, and is an estimate of the reference information from the perspective of each DER. K (K) vi ,K qi Is the controller gain.
(3) In order to intuitively verify the effect of the control strategy provided by the present invention, the following description is given by way of specific examples:
1) Parameter setting: the experiment uses matlab/simulink software to build an SMG simulation model consisting of 4 DERs. The main parameters and controller parameters are shown in table 1:
table 1 system parameters and observer and controller parameters
2) The experimental scenario and results are as follows:
1. before t=1 s, all DER uses one droop control;
2. at t=1s, the secondary control strategy is activated;
3. at t=2s, the sensor of der3 isAttack signal attack by (a); at t=2.5s, the sensor of der4 is +.>Attack signal attack by (a);
4. at t=3 s, the sensor attacks on DER3 and DER4 are reduced, at t=3.5 s, at In the case of DER1 and DER4, attacks on the actuators;
5. at t=4s, actuator attacks on DER1 and DER4 are mitigated, but DER2Is signaled by a new attackAttack;
6. at t=5 s, FDI attacks by all DER are mitigated.
Fig. 4 and fig. 5 are frequency diagrams of the above scenario using the primary secondary control strategy and the proposed elastic control strategy, respectively, and comparing the two diagrams can show that the frequency under the primary secondary control strategy oscillates and is unstable when the FDI attack exists, and the frequency of the DER that is not attacked also oscillates, which is the result of the propagation of the FDI attack signal through the communication network. Figure 5 shows that only the frequency of the attacked DER fluctuates before and after the onset of the FDI attack and then quickly stabilizes at 50Hz, with no fluctuations in the frequency of the non-attacked DER.
Fig. 6 and fig. 7 are respectively normalized active power diagrams using the primary and secondary control strategies and the proposed elastic control strategy in the above scenario, and comparing the two diagrams can show that the active power under the primary and secondary control strategies oscillates and is unstable even exceeds the DER output power limit value in the presence of an FDI attack. Fig. 7 shows that only the active power of the attacked DER fluctuates before and after the FDI attack is initiated and then stabilizes rapidly, and the active power of the non-attacked DER does not fluctuate. In the period of no attack, the power standard value under the original secondary control strategy and the proposed elastic control strategy both meet the control target shown in the formula (3). The proposed elastic control strategy is shown to be capable of achieving similar control effects as conventional control strategies when no attack is present.
Fig. 8 and fig. 9 are voltage diagrams of the above scenario using the primary secondary control strategy and the proposed elastic control strategy, respectively, and comparing the two diagrams can show that the voltage under the primary secondary control strategy oscillates and is unstable when the FDI attack exists. Fig. 9 shows that only the voltage of the attacked DER fluctuates before and after the FDI attack is initiated and then stabilizes rapidly, and the voltage of the non-attacked DER does not fluctuate.
Fig. 10 and 11 are respectively standardized reactive power diagrams using the primary and secondary control strategies and the proposed elastic control strategy under the above-mentioned scenario, and it can be seen by comparing the two diagrams that the reactive power under the primary and secondary control strategies oscillates and is unstable even exceeds the DER output power limit value when the FDI attack exists. Fig. 11 shows that only the reactive power of the attacked DER fluctuates before and after the onset of the FDI attack and then stabilizes rapidly, and the reactive power of the non-attacked DER does not fluctuate. In the period of no attack, the power standard value under the original secondary control strategy and the proposed elastic control strategy both meet the control target shown in the formula (3).
The working principle of the invention is as follows: firstly modeling FDI attack in an SMG system, then regarding an attack signal as disturbance expansion to be in an augmentation system state, constructing ESO real-time estimation attack signals according to the output of the SMG system, and finally designing a distributed secondary elasticity controller by utilizing the attack signal estimation value to realize frequency and voltage recovery and power distribution.
In summary, the present invention proposes a distributed elastic control strategy based on ESO, where the control strategy can achieve the same control effect as the primary and secondary control strategies when no attack occurs, that is, the objectives shown in formulas (2) and (3) are satisfied. In the FDI attack period, the proposed control strategy can resist the adverse effect brought by the attack and still meet the control target.
The above examples are only illustrative of the preferred embodiments of the present invention and are not intended to limit the scope of the present invention, and various modifications and improvements made by those skilled in the art to the technical solution of the present invention should fall within the scope of protection defined by the claims of the present invention without departing from the spirit of the present invention.

Claims (1)

1. A port micro-grid control method for resisting false data injection attack is characterized by comprising a hierarchical control model of a port micro-grid, a false data injection attack model based on the hierarchical control model and a distributed elastic control strategy based on an extended state observer, so that the port micro-grid bus frequency, voltage recovery and output power proportional distribution under the false data injection attack are realized;
the port micro-grid hierarchical control model is based on a false data injection attack model of the hierarchical control model and a distributed elastic control strategy based on an extended state observer, so that the port micro-grid bus frequency, voltage recovery and output power under the false data injection attack are proportionally distributed:
1) Calculating the output power of each distributed power supply according to the voltage and current components obtained through dq conversion;
2) Controlling output power through a droop controller of a secondary control stage to obtain a given input value of an inner loop voltage current controller;
3) The inner loop voltage current controller generates PWM modulation signals through the PI controller to control the inverter output frequency and the voltage amplitude to track a given input value;
4) The output power, the frequency and the voltage value of the distributed power inverter are obtained through sensor measurement, the secondary controller based on a communication network generates frequency and voltage auxiliary control input, the auxiliary control input issues an executor to generate frequency and voltage control compensation items, and the given input value output by the droop controller is changed to be a rated value;
5) Considering that false data injection attacks respectively occur on the sensor and the actuator, respectively destroying frequency, voltage and power measurement results and auxiliary control input, and finally destroying the output value of the inverter;
6) Designing an extended state observer to estimate the output frequency, voltage and power of the distributed power inverter and an attack signal;
7) Introducing a virtual variable to estimate reference information of each distributed power supply, and designing a distributed elastic control protocol based on estimated attack signals, state signals and virtual variables so as to realize port micro-grid bus frequency, voltage recovery and output power proportional distribution under false data injection attack;
the hierarchical control model of the port micro-grid comprises the following steps:
the frequency and voltage expression for obtaining the debs based on droop control and consistency algorithms is shown in formula (1):
wherein,and->As frequency and voltage references for inner loop control, respectively, real-time frequency and voltage tracking references, ω, by dual loop control and Pulse Width Modulation (PWM) ref And v ref Rated frequency and rated voltage, m, respectively, of port micro-grid system operation i And n i Droop control coefficients p-f and q-v, respectively, for the ith DER, delta 1i And delta 2i Correction values for frequency and voltage control for the ith DER, respectively, are the outputs of the secondary controller:
wherein u is ωi The rate of change of the DER frequency is represented as a frequency recovery control rate; u (u) pi The control rate for the active power allocation represents the rate of change of the active power allocation; delta ωi Represented by u ωi The generated correction value component; delta pi Is composed of u pi The generated correction value component; similarly, each variable in the formula (3) means a control rate and a correction value component corresponding to voltage control; the control rate is distributed secondary control rate based on a sparse communication network, and is respectively as follows:
wherein a is ij Indicating the connection between the ith DER and the jth DER, a when the former obtains the information of the latter ij > 0, otherwise a ij =0;b i0 Representing the case where the ith DER obtains the reference value information, b if and only if the ith DER is selected as a fixed DER to access the reference information i0 > 0, otherwise, b i0 =0;ω ref ,v ref ,/>Respectively distributing reference values for frequency, active power distribution, voltage and reactive power of the micro-grid system;
the dummy data injection attack model includes:
when the i-th DER's sensor is attacked, the attacker's goal is to destroy the measurements of frequency, voltage, and power information obtained by the sensor, propagate the measurements injected with false data through the communication network, and the sensor attack is modeled as:
wherein,and->The frequency recovery control and active power distribution control attacker inject false data of the sensor, which is a derivative bounded signal; />And->The false data of the sensor is injected by an attacker of voltage recovery control and active power distribution control respectively, and the false data is a derivative bounded signal;
when the i-th DER's actuator is attacked, the attacker's goal is to destroy the feedback control signal, the actuator attack is modeled as:
wherein,and->The frequency recovery control and active power distribution control attacker inject false data of the actuator, which is a derivative bounded signal; />And->The voltage recovery control and active power distribution control attacks inject false data of the actuator, which are derivative bounded signals;
the distributed elastic control strategy based on the extended state observer comprises the following steps:
first, virtual variable xi is introduced ωi And xi pi As an internal variable of the controller, the estimation of the reference information from the per DER point of view, a virtual variable ζ as part of the frequency distributed elastic control strategy ωi And xi pi The dynamics of (2) are:
definition of intermediate variables The distributed extended state observer is:
wherein,and->Respectively the frequency omega i And active power standard value->Is>And->Respectively the correction value component delta ωi And->Is>And->Attack signals respectively injected into the sensor +.>And->Is>And->Attack signals respectively injected into the actuator>And->The form of the correction value equation of the frequency recovery control and the active power allocation control is still the form in (2); f (F) ωi ,G ωi ,G pi ,H ωi ,H pi Is the gain of ESO;
by estimating the attack signal, the elasticity control rate designed by using the estimated value is as follows:
wherein K is ωi ,K pi Is the controller gain;
similarly defined intermediate variables The voltage controlled distributed elastic control strategy is:
wherein,and->Respectively the voltage v i And reactive power standard value->Is>And->Respectively the correction value component delta vi And->Is>And->Attack signals respectively injected into the sensor +.>And->Is>And->Attack signals respectively injected into the actuator>And->The form of the correction value equation of the voltage recovery control and the reactive power distribution control is still the form in (3); f (F) vi ,G vi ,G qi ,H vi ,H qi Is the gain of ESO; zeta type toy vi And xi qi Is an introduced virtual variable, is an internal variable of the controller, is an estimate of the reference information from the perspective of each DER, is a virtual variable ζ that is part of the voltage distributed elastic control strategy vi And xi qi The dynamics of (2) are:
by estimating the attack signal, the elasticity control rate designed by using the estimated value is as follows:
wherein K is vi ,K qi Is the controller gain.
CN202211658152.1A 2022-12-22 2022-12-22 Port micro-grid control method for resisting false data injection attack Active CN116094769B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211658152.1A CN116094769B (en) 2022-12-22 2022-12-22 Port micro-grid control method for resisting false data injection attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211658152.1A CN116094769B (en) 2022-12-22 2022-12-22 Port micro-grid control method for resisting false data injection attack

Publications (2)

Publication Number Publication Date
CN116094769A CN116094769A (en) 2023-05-09
CN116094769B true CN116094769B (en) 2024-03-01

Family

ID=86186035

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211658152.1A Active CN116094769B (en) 2022-12-22 2022-12-22 Port micro-grid control method for resisting false data injection attack

Country Status (1)

Country Link
CN (1) CN116094769B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109194623A (en) * 2018-08-02 2019-01-11 谢聪敏 Security server based on cloud computing
AU2019100008A4 (en) * 2019-01-05 2019-02-14 Feng Chen Secure Distributed Estimation against False Data Injection Attack
CN110830514A (en) * 2019-12-12 2020-02-21 四川大学 Detection method for collusion-based false data injection attack of smart power grid
CN111384717A (en) * 2020-01-15 2020-07-07 华中科技大学 Adaptive damping control method and system for resisting false data injection attack
CN111817286A (en) * 2020-07-20 2020-10-23 安徽工业大学 Detection method for false data injection attack of direct current micro-grid cluster
CN114157460A (en) * 2021-11-15 2022-03-08 道和邦(广州)电子信息科技有限公司 SMG-VME-aDDoS attack defense system based on VME-TCP-IP anti-DDoS
CN114492083A (en) * 2022-03-18 2022-05-13 浙江工业大学 Direct-current microgrid attack detection and recovery method for FDI attack

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IT201900002249A1 (en) * 2019-02-15 2020-08-15 Agrorobotica S R L System and method of predicting the risk of insect attack

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109194623A (en) * 2018-08-02 2019-01-11 谢聪敏 Security server based on cloud computing
AU2019100008A4 (en) * 2019-01-05 2019-02-14 Feng Chen Secure Distributed Estimation against False Data Injection Attack
CN110830514A (en) * 2019-12-12 2020-02-21 四川大学 Detection method for collusion-based false data injection attack of smart power grid
CN111384717A (en) * 2020-01-15 2020-07-07 华中科技大学 Adaptive damping control method and system for resisting false data injection attack
CN111817286A (en) * 2020-07-20 2020-10-23 安徽工业大学 Detection method for false data injection attack of direct current micro-grid cluster
CN114157460A (en) * 2021-11-15 2022-03-08 道和邦(广州)电子信息科技有限公司 SMG-VME-aDDoS attack defense system based on VME-TCP-IP anti-DDoS
CN114492083A (en) * 2022-03-18 2022-05-13 浙江工业大学 Direct-current microgrid attack detection and recovery method for FDI attack

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
Habibi M 等."Detection of False Data Injection Cyber Attacks in DC Microgrids Based on Recurrent Neural Networks".《IEEE Journal of Emerging and Selected Topics in Power Electronics》.2021,全文. *
Hua C 等."Evaluation and Governance of Green Development Practice of Port".《A Sea Port Case of China》.2020,全文. *
田继伟 ; 王布宏 ; 李腾耀 ; 尚福特 ; 曹堃锐 ; .智能电网虚假数据注入攻击研究进展与展望.网络空间安全.2019,(第09期),全文. *
舒隽 ; 郭志锋 ; 韩冰 ; .电网虚假数据注入攻击的双层优化模型.电力系统自动化.2019,(第10期),全文. *
陈郁林.《抵御虚假数据注入攻击的微电网分布式二次控制策略研究》.2021,正文第20-40页. *
陈雅琳 ; 刘薇 ; 徐安 ; 李巧平 ; 何进 ; 陈雷霆 ; .面向健康云的定制化网络安全服务.计算机系统应用.2018,(第08期),全文. *
马良.《信息物理融合环境下网络攻击的微电网弹性控制策略》.2021,正文第15-25页. *

Also Published As

Publication number Publication date
CN116094769A (en) 2023-05-09

Similar Documents

Publication Publication Date Title
NL2024333B1 (en) Microgrid distributed controller parameter determination method based on linear quadratic optimization
Duan et al. Q-learning-based damping control of wide-area power systems under cyber uncertainties
CN107294085B (en) Micro-grid delay margin calculation method based on critical feature root tracking
Park et al. When adversary encounters uncertain cyber-physical systems: Robust zero-dynamics attack with disclosure resources
CN111817286A (en) Detection method for false data injection attack of direct current micro-grid cluster
CN108075488B (en) Island microgrid layered control method considering communication data disturbance under CPS concept
CN114336674A (en) Distributed toughness frequency control method for alternating-current micro-grid
CN113471955B (en) Island direct current micro-grid distributed dynamic event trigger control method
Hu et al. Privacy Preserving Consensus Strategy for Secondary Control in Microgrids Against Multi-link False Data Injection Attacks
Liu et al. Active disturbance rejection control based distributed secondary control for a low-voltage DC microgrid
CN116094769B (en) Port micro-grid control method for resisting false data injection attack
Zhang et al. Adaptive event-triggered fuzzy tracking control of uncertain stochastic nonlinear systems with unmeasurable states
CN110768301B (en) Micro-grid frequency synchronization anti-attack cooperative control method
Aluko et al. Observer-based detection and mitigation scheme for isolated microgrid under false data injection attack
CN113110344A (en) Multi-wheeled robot cooperative control method for DoS attack
Su et al. Distributed adaptive secondary control of AC microgrid under false data injection attack
Zhan et al. Resilient distributed control of islanded microgrids under false data injection attacks
Wang et al. Fuzzy predictive functional control of a class of non‐linear systems
Wooding et al. Formal Control of New England 39-Bus Test System: An Assume-Guarantee Approach
Rana et al. Distributed dynamic state estimation over a lossy communication network with an application to smart grids
CN115036935A (en) Micro-grid frequency distributed cooperative control method
Ghanbari et al. Design of switched controllers using an enhanced passivation method
Zhang et al. Distributed event‐triggered secondary control for microgrids applicable to directed communication graph
Lin et al. Distributed Optimal Consensus-Based Secondary Frequency and Voltage Control of Isolated AC Microgrids
Girard et al. Approximate hierarchies of linear control systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant