Microgrid systems have evolved based on renewable energies including wind, solar, and hydrogen to make the satisfaction of loads far from the main grid more flexible and controllable using both island- and grid-connected modes. Albeit microgrids can gain beneficial results in cost and energy schedules once operating in grid-connected mode, such systems are vulnerable to malicious attacks from the viewpoint of cybersecurity. With this in mind, this paper explores a novel advanced attack model named the false transferred data injection (FTDI) attack aiming to manipulatively alter the power flowing from the microgrid to the upstream grid to raise voltage usability probability. One crucial piece of information that the model uses to change the system and cause the greatest amount of damage while concealing the attacker’s view is the voltage stability index. Saying that the power transaction between the microgrid and the upstream grid is within the broad scope of bilateral exchange at any given moment is noteworthy. Put otherwise, with respect to the FTDI assault, the microgrid’s power direction is just as significant to the detection system as the transferred power value. Therefore, once the microgrid is running in the grid-connected mode, the false data detector needs to concurrently detect changes in the value and direction of power. To overcome this problem, the paper presents a learning generative network model, based on the generative adversarial network (GAN) paradigm, to recognize the change in probability values that is maliciously aimed. To this end, a studied microgrid system including the wind turbine, photovoltaic, storage, tidal turbine, and fuel cell units is performed on the tested 24-bus IEEE grid to satisfy the local load demands. Comparative analysis indicates notable gains, such as scores of 0.95%, 0.92%, 0.7%, and 10% for the Hit rate, C.R. rate, F.A. rate, and Miss rate in order to evaluate the GAN-based detection model within the microgrid.
Read full abstract