192
Views
4
CrossRef citations to date
0
Altmetric
Research Articles

Resonance attacks detection and mitigation control scheme on frequency regulation in multi-area smart grid

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon
Pages 2212-2229 | Received 15 Jul 2021, Accepted 05 Jun 2022, Published online: 16 Jun 2022

References

  • Ali, S. M., Jawad, M., Khan, B., Mehmood, C. M., Zeb, Z., Tanoli, A., Farid, U., Glower, J., & Khan, S. U. (2016). Wide area smart grid architectural model and control: A survey. Renewable and Sustainable Energy Reviews, 64, 311–328. https://doi.org/10.1016/j.rser.2016.06.006
  • Ameli, A., Hooshyar, A., Yazdavar, A. H., El-Saadany, E. F., & Youssef, A. (2018). Attack detection for load frequency control systems using stochastic unknown input estimators. IEEE Transactions on Information Forensics and Security, 13(10), 2575–2590. https://doi.org/10.1109/TIFS.2018.2824253
  • Amini, S., Pasqualetti, F., & Mohsenian-Rad, H. (2018). Dynamic load altering attacks against power system stability: Attack models and protection schemes. IEEE Transactions on Smart Grid, 9(4), 2862–2872. https://doi.org/10.1109/TSG.2016.2622686.
  • Aoufiab, S., Derhabc, A., & Guerroumib, M. (2020). Survey of false data injection in smart power grid: Attacks, countermeasures and challenges. Journal of Information Security and Applications, 54, 102518. https://doi.org/10.1016/j.jisa.2020.102518
  • Butt, O. M., Zulqarnain, M., & Butt, T. M. (2021). Recent advancement in smart grid technology: Future prospects in the electrical power network. Ain Shams Engineering Journal, 12(1), 687–695. https://doi.org/10.1016/j.asej.2020.05.004.
  • Chenine, M., Ullberg, J., Nordström, L., Wu, Y., & Ericsson, G. N. (2014). A framework for wide-area monitoring and control systems interoperability and cybersecurity analysis. IEEE Transactions on Power Delivery, 29(2), 633–641. https://doi.org/10.1109/TPWRD.2013.2279182
  • Cui, Q., Wang, X., Wang, X., & Zhang, Y. (2016). Residential appliances direct load control in real-time using cooperative game. IEEE Transactions on Power System, 31(1), 226–233. https://doi.org/10.1109/TPWRS.2015.2391774
  • Davida, J., & Thomasb, C. (2020). Detection of distributed denial of service attacks based on information theoretic approach in time series models. Journal of Information Security and Applications, 55, 102621. https://doi.org/10.1016/j.jisa.2020.102621
  • Dileep, G. (2020). A survey on smart grid technologies and applications. Renewable Energy, 146, 2589–2625. https://doi.org/10.1016/j.renene.2019.08.092.
  • Dritsas, L., Kontouras, E., Vlahakis, E., Kitsios, I., Halikias, G., & Tzes, A. (2021). Modelling issues and aggressive robust load frequency control of interconnected electric power systems. International Journal of Control, https://doi.org/10.1080/00207179.2020.1821248.
  • Ekanayake, J. B., Jenkins, N., Liyanage, K., Wu, J., & Yokoyama, A. (2012). Smart grid: Technology and applications. John Wiley & Sons Ltd.
  • Elsisi, M. (2019). New design of adaptive model predictive control for energy conversion system with wind torque effect. Journal of Cleaner Production, 2014, https://doi.org/10.1016/j.jclepro.2019.118265.
  • Elsisi, M. (2020). New variable structure control based on different meta-heuristics algorithms for frequency regulation considering nonlinearities effects. International Transactions on Electrical Energy Systems, 30(7), https://doi.org/10.1002/2050-7038.12428.
  • Elsisi, M., Aboelela, M., Soliman, M., & Mansour, W. (2019). Design of optimal model predictive controller for LFC of nonlinear multi-area power system with Energy storage devices. Electric Power Components and Systems, 46(12), 1300–1311. https://doi.org/10.1080/15325008.2018.1469056.
  • Ferraga, M. A., Babaghayoub, M., & Yazicic, M. A. (2020). Cyber security for fog-based smart grid SCADA systems: Solutions and challenges. Journal of Information Security and Applications, 52, 102500. https://doi.org/10.1016/j.jisa.2020.102500
  • Giglou, P. A., & Ravadanegh, S. N. (2021). Defending against false data injection attack on demand response program: A bi-level strategy. Sustainable Energy, Grids and Networks, 27, 100506, https://doi.org/10.1016/j.segan.2021.100506.
  • Han, H. G., Guo, Y. N., & Qiao, J. F. (2017). Self-organization of a recurrent RBF neural network using an information-oriented algorithm. Neurocomputing, 225, 80–91. https://doi.org/10.1016/j.neucom.2016.11.010
  • Jain, S., & Hote, Y. V. (2021). Design of generalised active disturbance rejection control for delayed systems: An application to load frequency control. International Journal of Control, 94(11), 3146–3160, https://doi.org/10.1080/00207179.2020.1752940.
  • Law, Y. W., Alpcan, T., & Palaniswami, M. (2015). Security games for risk minimization in automatic generation control. IEEE Transactions on Power System, 30(1), 223–232. https://doi.org/10.1109/TPWRS.2014.2326403
  • Li, Y., Zhang, P., & Ma, L. (2019). Denial of service attack and defense method on load frequency control system. Journal of the Franklin Institute, 356(15), 8625–8645. https://doi.org/10.1016/j.jfranklin.2019.08.036.
  • Liu, S., Li, S., & Xu, B. (2020). Event-triggered resilient control for cyber-physical system under denial-of-service attacks. International Journal of Control, 93(8), 1907–1919. https://doi.org/10.1080/00207179.2018.1537518.
  • Liu, X., & Li, Z. (2014). Local load redistribution attacks in power systems with incomplete network information. IEEE Transactions on Smart Grid, 5(4), 1665–1676. https://doi.org/10.1109/TSG.2013.2291661
  • Lou, X., Yau, Y. D. K., Nguyen, H. H., & Chen, B. (2013). Profit-optimal and stability-aware load curtailment in smart grids. IEEE Transactions on Smart Grid, 4(3), 1411–1420. https://doi.org/10.1109/TSG.2013.2249672
  • Maa, R., & Shi, P. (2020). Secure state estimation for cyber-physical systems under sparse data injection attacks: A switched counteraction approach. International Journal of Control, 94. https://doi.org/10.1080/00207179.2020.1833249.
  • Mahmood, A., Javaid, N., Khan, M. A., & Razzaq, S. (2015). An overview of load management techniques in smart grid. International Journal of Energy Research, 39(11), 1437–1450. https://doi.org/10.1002/er.3350
  • Mahmoud, M. S., & Hamdan, M. M. (2020). Stabilization of distributed cyber physical systems subject to denial-of-service attack. International Journal of Control, 94. https://doi.org/10.1080/00207179.2020.1813908.
  • Prasad, S. (2020). Counteractive control against cyber-attack uncertainties on frequency regulation in power system. IET Cyber-Physical Systems: Theory & Applications, 5(4), 394–408. https://doi.org/10.1049/iet-cps.2019.0097.
  • Prasad, S., & Ansari, M. R. (2020). Frequency regulation using neural network observer based controller in power system. Control Engineering Practice, 102, 104571. https://doi.org/10.1016/j.conengprac.2020.104571
  • Prasad, S., Purwar, S., & Kishor, N. (2017). Non-linear sliding mode load frequency control in multi-area power system. Control Engineering Practice, 61, 81–92. https://doi.org/10.1016/j.conengprac.2017.02.001
  • Sargolzaei, A., Yen, K. K., & Abdelghani, M. N. (2015). Preventing time-delay switch attack on load frequency control in distributed power systems. IEEE Transactions on Smart Grid, 7(2), 1176–1185. https://doi.org/10.1109/TSG.2015.2503429
  • Shtessel, Y., Fridman, L., & Plestan, F. (2016). Adaptive sliding mode control and observation. International Journal of Control, 89(9), 1743–1746. https://doi.org/10.1080/00207179.2016.1194531.
  • Suna, C. C., Hahna, A., & Liu, C. C. (2018). Cyber security of a power grid: State-of-the-art. International Journal of Electrical Power & Energy Systems, 99, 45–56. https://doi.org/10.1016/j.ijepes.2017.12.020
  • The Commission for Energy Regulation. (2014). Rate of Change of Frequency (Rocof) Modification to the Grid Code, Reference, CER/14/081. [Online]. http://www.cer.ie/docs/000260/CER14081%20ROCOF%20Decision%20Paper%20%20FINAL%20FOR%20PUBLICATION.pdf.
  • Trip, S., Cucuzzella, M., Persis, C. D., Ferrara, A., & Jacquelien, M. A. S. (2020). Robust load frequency control of nonlinear power networks. International Journal of Control, 93(2), 346–359, https://doi.org/10.1080/00207179.2018.1557338.
  • Vrakopoulou, M., Esfahani, P. M., Margellos, K., Lygeros, L., & Andersson, G. (2015). Cyber-attacks in the automatic generation control. Cyber Physical Systems Approach to Smart Electric Power Grid, 303–328. https://doi.org/10.1007/978-3-662-45928-7_11
  • Wang, D., Wang, X., Zhang, Y., & Jin, L. (2019). Detection of power grid disturbances and cyber-attacks based on machine learning. Journal of Information Security and Applications, 46, 42–52. https://doi.org/10.1016/j.jisa.2019.02.008
  • Wu, Y., Wei, Z., Weng, J., Li, X., & Deng, R. H. (2018). Resonance attacks on load frequency control of smart grids. IEEE Transactions on Smart Grid, 9(5), 4490–4502. https://doi.org/10.1109/TSG.2017.2661307.
  • Yan, J., He, H., & Sun, Y. (2014). Integrated security analysis on cascading failure in complex networks. IEEE Transactions on Information Forensics and Security, 9(3), 451–463. https://doi.org/10.1109/TIFS.2014.2299404
  • Yan, J., He, H., Zhong, X., & Tang, Y. (2017). Q-learning-based vulnerability analysis of smart grid against sequential topology attacks. IEEE Transactions on Information Forensics and Security, 12(1), 200–210. https://doi.org/10.1109/TIFS.2016.2607701
  • Yan, J., Zhu, Y., He, H., & Sun, Y. (2013). Multi-contingency cascading analysis of smart grid based on self-organizing map. IEEE Transactions on Information Forensics and Security, 8(4), 646–656. https://doi.org/10.1109/TIFS.2013.2249065
  • Zhu, Y., Yan, J., Tang, Y., Sun, Y. L., & He, H. (2014). Resilience analysis of power grids under the sequential attack. IEEE Transactions on Information Forensics and Security, 9(12), 2340–2354. https://doi.org/10.1109/TIFS.2014.2363786

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.