Abstract

Hierarchical control of AC microgrids, despite providing stable voltage, frequency, and optimal power distribution, is susceptible to false data injection (FDI) attacks on its secondary control. Electric power systems in countries such as the United States and Venezuela have suffered cyberattacks. This paper proposes a redundant secondary control method to resist FDI attacks. This method uses distributed generators (DGs) online as redundant units on standby, generating dynamic corrections to the attacked DGs, thus eliminating the attack impact. It effectively addresses the numerical tampering and addition brought by FDI to the frequency and voltage setting values of the secondary control, ensuring the microgrid can still output stable frequency and voltage. The principle of this control method is direct and practical; it doesn't require complex controllers and can respond quickly to FDI attacks. Then, focusing on a microgrid system containing six DGs, the setting values of the microgrid system are tampered by multiple values in different time periods, the simulation results confirm that the proposed method can effectively resist FDI attacks under various scenarios. Finally, FPGA-in-the-loop experiments further verify the effectiveness of the proposed method.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.