Next Article in Journal
Series-Series/Series Compensated Inductive Power Transmission System with Symmetrical Half-Bridge Resonant Converter: Design, Analysis, and Experimental Assessment
Next Article in Special Issue
Optimal Sizing of Battery Energy Storage for a Grid-Connected Microgrid Subjected to Wind Uncertainties
Previous Article in Journal
A Comparative Analysis of House Owners in Need of Energy Efficiency Measures but with Different Intentions
Previous Article in Special Issue
An Intelligent Battery Energy Storage-Based Controller for Power Quality Improvement in Microgrids
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Load Frequency Control of Smart Grids under Deception Attack: A Piecewise Delay Approach

1
School of Electrical and Electronic Engineering, North China Electric Power University, Baoding 071003, China
2
State Grid Hebei Economic Research Institute, Shijiazhuang 050021, China
3
State Grid Handan Fengfeng Kuangqu Power Supply Company, Handan 056200, China
*
Author to whom correspondence should be addressed.
Energies 2019, 12(12), 2266; https://doi.org/10.3390/en12122266
Submission received: 14 May 2019 / Revised: 5 June 2019 / Accepted: 11 June 2019 / Published: 13 June 2019
(This article belongs to the Special Issue Advanced Control in Microgrid Systems)

Abstract

:
The problem of secure load frequency control of smart grids is investigated in this paper. The networked data transmission within the smart grid is corrupted by stochastic deception attacks. First, a unified Load frequency control model is constructed to account for both network-induced effects and deception attacks. Second, with the Lyapunov functional method, a piecewise delay analysis is conducted to study the stability of the established model, which is of less conservativeness. Third, based on the stability analysis, a controller design method is provided in terms of linear matrix inequalities. Finally, a case study is carried out to demonstrate the derived results.

1. Introduction

In recent years, the smart grid has become a significant generation of power system network to provide high quality power service for 21st century needs. For the purpose of energy scheduling, overall regulation and the quality of power service, interconnected multi-area power systems are pivotal in the operation of a smart grid [1]. An important objective of a power system is to study the equilibrium problem or stability analysis of frequency, of which the variation mainly depends on the active power. In the 1970s, Elgerd and Fosha firstly applied Control Theory to the load frequency control (LFC) problem of interconnected power systems [2]. Since then, many researchers have been working on the LFC analysis with variety of control methods [3,4,5,6,7,8,9]. To mention a few, reference [3] designed an adaptive load frequency controller for a two-area power system and proposed an optimal control scheme. An optimization approach for LFC controller design with genetic algorithms was presented in [4], where the criteria were given in terms of linear matrix inequalities (LMIs). Reference [5] investigated the LFC problem of isolated grid and proposed a multivariable generalized predictive controller.
On the other hand, networked control systems have been a hot topic in past decades. With wireless communication between devices, the superiority on more flexibility, less cost and convenient maintenance enable this type of system to play a significant role in many fields such as wireless communication, industrial manufacturing and intelligent control. However, in a networked control system, transmission delays and packet dropouts are inevitable in data communication, which would affect or even deteriorate the stability and control performance. Many results on network-based system analyses were carried out in [10,11,12,13,14,15] taking into account the network-induced delays and packet losses. Note that most of the obtained results are delay-dependent. To reduce the conservativeness of these results, a few novel analysis methods were presented, such as free weighting matrix [16], the input–output approach [17], and piecewise analysis method [18]. Specifically, the idea of the piecewise analysis method was firstly proposed in [19], where the time delay’s variation interval was divided into two subintervals with equal length according to a central point. Reference [18] then extended this method and investigated the stability of both discrete and continuous time systems with more than two subintervals divided. In addition, the conservativeness of the method was also discussed compared with other existing works.
With the popularity of interconnected multi-area power systems, the power system network is becoming more and more complex. Thus, control and regulation of power systems through wireless communication is of significance. In a network communication environment, other than the network-induced phenomena mentioned above, open channels also encounter serious security issues. Some malicious adversaries may launch invasive attacks into data transmission networks in a smart grid, resulting in significant impacts on the national economy and social stability. Thus, the the security issues concerned with power systems should be valued. In existing works, some results on secure performance of power systems have been presented [20,21,22,23,24,25]. Specifically, references [20,21] were concerned with the load redistribution attacks in power systems and investigated the modeling method and secure estimation problem, respectively. Reference [22] designed a defending method against time delay attacks into LFC mechanism of distributed power systems. An event-triggered scheme was proposed in [23] to compensate the effects of denial-of-service attacks in smart grid. Reference [24] investigated a type of resonance attacks on LFC problem in multiple area power systems. However, there has been little attention paid to secure LFC of smart grids under stochastic deception attacks. Deception attacks [26] can stochastically deteriorate the integrity of a transmitted data packet and severely affect the performance of power systems, which should not be neglected in the secure control of power systems, especial in an interconnected power system network in a smart grid.
In this paper, the secure LFC problem of smart grids is addressed. The data packets received and sent by the remote PI controller encounter, not only network-induced phenomena. but also deception attacks launched by adversaries. The rest of the paper is arranged as follows. In Section 2, a unified model for network-based LFC of multi-area power systems is established taking into account networked phenomena and deception attacks. In Section 3, a piecewise delay method is used to constructed Lyapunv–Krasovskii function, through which the stability of established system model is analyzed. Based on the criteria on stability, the design method for desired PI controller is proposed. In Section 4, a case study of three area power systems is given to show the effectiveness of the obtained results. Finally, a conclusion is stated in Section 5.
Notations: R n denotes the n dimensional Euclidean space. R + n denotes the positive orthant of R n . Augmented matrix diag N { U } ( diag N { U i } ) represents the diagonal matrix diag { U , , U } ( diag { U 1 , , U N } ) of N blocks. E { · } represents the mathematical expectation. The matrices in the current research are all assumed to have compatible dimensions.

2. Preliminaries

In this section, a unified system model for LFC of a multiple area power system with corrupted network communication will be constructed. In the specific modeling, the adversarial attacks as well as network-induced phenomena including transmission delay, packet loss and packet disorder are all taken into account.

2.1. Multi-Area Power Systems in Smart Grid

The diagram of ith area power system in a smart grid is given in Figure 1, which is similar to that of [23,27]. Based on this diagram of ith area power system, we will elaborate the operation of multiple area power systems with network-based load frequency controller in the following.
The deviation of frequency of i-th power system area is given by
Δ f ˙ i = D i M i Δ f i 1 M i Δ P t i e i + 1 M i Δ P m i 1 M i Δ P d i
where Δ f i is the frequency deviation in area i; Δ P t i e i denotes the deviation of tie-line power exchange between areas; Δ P m i denotes the mechanical output deviation of generator; Δ P d i is the i-th load deviation; D i is the damping coefficient of area i; M i denotes the inertia of the generator in area i.
The deviation of tie-line power exchange between two areas is described by
Δ P ˙ t i e i = 2 π j = 1 , j i n T i j ( Δ f i Δ f j )
where T i j is the synchronization coefficient between area i and j.
The valve position equation is governed by
Δ P ˙ v i = 1 R i T g i Δ f i 1 T g i Δ P v i + 1 T g i u i ( t )
where Δ P denotes the deviation of ith valve position; u i ( t ) is the control input of area i; R i is the droop coefficient of area i; T g i denotes the time constant of the governor in ith area.
The mechanical power equation of generator is given as
Δ P ˙ m i = 1 T c h i Δ P m i + 1 T c h i Δ P v i
where T c h i is the time constant of the turbine. Furthermore, in area i, the ACE signal is defined as
A C E i = β i Δ f i + Δ P t i e i
Consisting of frequency deviation and net power exchange, ACE is the input signal of PI controller, of which the control scheme is designed as
u i ( t ) = K P i A C E i ( t ) K I i A C E i ( t )
where K P i and K I i are the proportional gain and integral gain of the PI controller.
Combining the above analyses, and defining
x ( t ) = [ x 1 T ( t ) , x 2 T ( t ) , , x n T ( t ) ] T , u ( t ) = [ u 1 T ( t ) , u 2 T ( t ) , , u n T ( t ) ] T y ( t ) = [ y 1 ( t ) T , y 2 ( t ) T , , y n ( t ) T ] T , w ( t ) = [ Δ P d 1 ( t ) , Δ P d 2 ( t ) , , Δ P d n ( t ) ] T x i ( t ) = [ Δ f i , Δ P t i e i , Δ P m i , Δ P v i , A C E i ] T , y i ( t ) = [ A C E i ( t ) , A C E i ( t ) ] T A = [ A i j ] n × n , B = diag n { B i } , C = diag n { C i } , F = diag n { F i }
we can derive an augmented model of multiple area smart grid system as
x ˙ ( t ) = A x ( t ) + B u ( t ) + F w ( t ) y ( t ) = C x ( t )
with
A i i = D i M i 1 M i 1 M i 0 0 2 π j = 1 , j i n T i j 0 0 0 0 0 0 1 T c h i 1 T c h i 0 1 R i T g i 0 0 1 T g i 0 β i 1 0 0 0 , A i j = 0 0 0 0 0 2 π T i j 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 B i = 0 0 0 1 T g i 0 , F i = 1 M i 0 0 0 0 , C i = β i 1 0 0 0 0 0 0 0 1
and we also have the augmented load frequency control signal is
u ( t ) = K y ( t ) = K C x ( t )
where K = diag n { K i } and K i = [ K P i , K I i ] .

2.2. LFC under Corrupted Network Communication

In the current research, the ACE signal will be transmitted to a PI controller through wireless network channels, which leads to inevitable network-induced phenomena including transmission delays, packet dropouts, packet disorders and so on. Denoted by h the sampling period. i k , k = 1 , 2 , are integers satisfying { i 1 , i 2 , } { s | s = 1 , 2 , } . Then s h , s = 1 , 2 , denote all the sampling instants. i k h denotes the sampling instant of the data packet which successfully arrives at the controller side. All the data packets have been stamped with time stamp before transmitted. With the employed ZOH, the data information will not be updated until the ZOH receive a new packet. Another important function of ZOH is to avoid packet disorder. Specifically, if the packet x ( ( s h ) , s ) with stamp s reaches ZOH earlier than packet ( x ( ( s 1 ) h ) , s 1 ) due to the network-induced delay or packet loss, the packet with stamp s 1 will be ignored and packet x ( ( s h ) , s ) will be updated to the controller side. Thus, with the effects of networked communication, we have
u ( t ) = K C x ( i k h ) , t [ i k h + τ k , i k + 1 h + τ k + 1 )
where τ k is the network-induced delay denoting the time from the sampling instant i k h to the instant when the governor receive the control signal. It is noted that if i k + 1 = i k + 1 , then there is no packet dropout between packets ( x ( i k h ) , i k ) and ( x ( i k + ) h , i k + 1 ) ; if i k + 1 = i k + p + 1 , p N + , p packets have been dropped during network transmission.
Due to the open broadcasting nature of network communication, the wireless transmission is vulnerable to adversarial attacks. Considering the effects of deception attacks which can deteriorate the integrity of the transmitted signal, we can derive the corrupted control signal u ˜ as
u ˜ ( t ) = u ( t ) + α ( t ) v ( t )
where v ( t ) = u ( t ) + ξ ( t ) is the deception attack signal launched by adversaries and ξ ( t ) is an energy-bounded signal belonging to L 2 [ 0 , + ) . α ( t ) is a stochastic variable subject to Bernoulli distribution with probabilities Prob { α ( t ) = 1 } = α 0 and Prob { α ( t ) = 0 } = 1 α 0 , α 0 [ 0 , 1 ) .
Furthermore, we let τ ( t ) = t i k h , t [ i k h + τ k , i k + 1 h + τ k + 1 ) . It is easy to have
τ m τ k τ ( t ) i k + 1 h i k h + τ k + 1 τ M
where τ m and τ M are two known constants.
Thus, the networked control signal can be written as
u ( t ) = ( 1 α ( t ) ) K C x ( t τ ( t ) ) + α ( t ) ξ ( t ) , t [ i k h + τ k , i k + 1 h + τ k + 1 )
based on which, (7) should be expressed as
x ˙ ( t ) = A x ( t ) + ( 1 α ( t ) ) B K C x ( t τ ( t ) ) + α ( t ) B ξ ( t ) + F w ( t ) y ( t ) = C x ( t ) , t [ i k h + τ k , i k + 1 h + τ k + 1 )
Remark 1.
Combining the above analyses, construction of system (12) synthesizing the network-induced time delay, packet dropout, packet disorder and deception attack. Specifically, time interval [ i k h + τ k , i k + 1 h + τ k + 1 ) describes the varying transmission delays and packet dropouts. ZOHs prevent the negative effects of packet disorders. Through defining the stochastic variable α ( t ) , the deception attacks can be easily processed into parameters of system model.
To facilitate the LFC analysis of multiple area power systems, the following two Lemmas need to be introduced.
Lemma 1.
[28] Under the condition τ ¯ m τ ( t ) τ ¯ M and x ˙ ( t + · ) : [ τ ¯ M , τ ¯ m ] R n , t R + , then the following inequality holds for R > 0 :
( τ ¯ M τ ¯ m ) t τ ¯ M t τ ¯ m x ˙ T ( s ) R x ˙ ( s ) d s x ( t τ ¯ m ) x ( t τ ¯ M ) T R R R R x ( t τ ¯ m ) x ( t τ ¯ M )
Lemma 2.
[29] For x , y R n , and a positive scalar ϵ, one have
x T y + y T x ϵ x T x + ϵ 1 y T y
Lemma 3.
[18] Under the condition τ ¯ m τ ( t ) τ ¯ M where τ ( · ) : R + R + , for any constant matrices Ξ 1 , Ξ 2 and Ω, inequality
( τ ( t ) τ ¯ m ) Ξ 1 + ( τ ¯ M τ ( t ) ) Ξ 2 + Ω < 0
holds if and only if
( τ ¯ M τ ¯ m ) Ξ 1 + Ω < 0 ( τ ¯ M τ ¯ m ) Ξ 2 + Ω < 0
The objective of this paper is to design a PI controller for multiple area power systems such that
(1)
System (12) with both w ( t ) = 0 and ξ ( t ) = 0 is asymptotically stable;
(2)
For nonzero load signal w ( t ) and attack signal ξ ( t ) , system (12) under zero initial condition is said to satisfy H performance if the following inequality holds:
E { y ( t ) 2 } γ E { w ( t ) 2 + ξ ( t ) 2 }

3. Main Results

In this section, through a piecewise delay method, the sufficient conditions for H stability of system (12) are proposed. Then, with some reasonable matrix processing, a design approach to controller gain is provided with the presence of deception attacks.
To facilitate the following development, (12) can be further written as
x ˙ ( t ) = ϕ ( t ) + ( α 0 α ( t ) ) ψ ( t )
where
ϕ ( t ) = A x ( t ) + ( 1 α 0 ) B K C x ( t τ ( t ) ) + α 0 B ξ ( t ) + F w ( t ) ψ ( t ) = B K C x ( t τ ( t ) ) B ξ ( t )
To reduce the conservativeness of the analysis, the variation range of delay τ ( t ) is divided into two intervals with equal length. Let δ = τ M τ m 2 and τ 0 = τ m + δ , then two sets can be defined as
Θ 1 = { t | τ ( t ) [ τ m , τ 0 ] } Θ 2 = { t | τ ( t ) [ τ 0 , τ M ] }
from which one can have Θ 1 Θ 2 = R + and Θ 1 Θ 2 = . In the sequent research, we mainly investigate the performance of system (15) over these two sets.

3.1. H Stability Analysis

Theorem 1.
For given scalars α 0 0 , γ > 0 , τ M τ m 0 and matrices K, system (12) is asymptotically stable satisfying H performance if there exist positive definite matrices R 1 , R 2 , R 3 , M, N, S and T such that the following inequalities hold:
Φ i + Σ 11 i + ( Σ 11 i ) T * * Σ 21 i j Σ 22 i * Σ 31 0 Σ 33 < 0 , i = 1 , 2 j = 1 , 2
where
Φ 1 = Φ 11 * * * * * * ( 1 α 0 ) C T K T B T P 0 * * * * * R 1 0 Q 1 R 1 * * * * 0 0 0 Q 2 R 3 δ * * * 0 0 0 R 3 δ Q 3 R 3 δ * * F T P 0 0 0 0 γ 2 I * α 0 B T P 0 0 0 0 0 γ 2 I Φ 11 = P A + A T P + Q 1 + Q 2 + Q 3 R 1 + C T C Φ 2 = Φ 11 * * * * * * ( 1 α 0 ) C T K T B T P 0 * * * * * R 1 0 Q 1 R 1 R 2 δ * * * * 0 0 R 2 δ Q 2 R 2 δ * * * 0 0 0 0 Q 3 * * F T P 0 0 0 0 γ 2 I * α 0 C T B T P 0 0 0 0 0 γ 2 I Σ 11 1 = 0 N + M N M 0 0 0 Σ 11 2 = 0 T S 0 S T 0 0 Σ 21 11 = δ N T , Σ 21 12 = δ M T , Σ 21 21 = δ S T , Σ 21 22 = δ T T Σ 22 1 = R 2 , Σ 22 2 = R 3 Σ 31 = τ m R 1 A ϕ δ R 2 A ϕ δ R 3 A ϕ τ m α 0 ( 1 α 0 ) δ R 1 A ψ α 0 ( 1 α 0 ) δ R 2 A ψ α 0 ( 1 α 0 ) δ R 3 A ψ , Σ 33 = diag { R 1 , R 2 , R 3 , R 1 , R 2 , R 3 } A ϕ = A B K C 0 0 0 F α 0 B A ψ = 0 B K C 0 0 0 0 B
Proof of Theorem 1.
A Lyapunov-Krasovskii functional V ( x ( t ) ) is built as
V ( x ( t ) ) = V 1 ( x ( t ) ) + V 2 ( x ( t ) ) + V 3 ( x ( t ) )
where
V 1 ( x ( t ) ) = x T ( t ) P x ( t ) V 2 ( x ( t ) ) = t τ m t x T ( s ) Q 1 x ( s ) d s + t τ 0 t x T ( s ) Q 2 x ( s ) d s + t τ M t x T ( s ) Q 3 x ( s ) d s V 3 ( x ( t ) ) = τ m t τ m t s t x ˙ T ( v ) R 1 x ˙ ( v ) d v d s + t τ 0 t τ m s t x ˙ T ( v ) R 2 x ˙ ( v ) d v d s + t τ M t τ 0 s t x ˙ T ( v ) R 3 x ˙ ( v ) d v d s
Calculating the expectation of derivative L V ( x ( t ) ) , we have
E { L V 1 ( x ( t ) ) } = 2 x T ( t ) P ϕ ( t ) E { L V 2 ( x ( t ) ) } = x T ( t ) ( Q 1 + Q 2 + Q 3 ) x ( t ) x T ( t τ m ) Q 1 x ( t τ m ) x T ( t τ 0 ) Q 2 x ( t τ 0 ) x T ( t τ M ) Q 3 x ( t τ M ) E { L V 3 ( x ( t ) ) } = x ˙ T ( t ) ( τ m 2 + δ R 2 + δ R 3 ) x ˙ ( t ) τ m t τ m t x ˙ T ( s ) R 1 x ˙ ( s ) d s t τ 0 t τ m x ˙ T ( s ) R 2 x ˙ ( s ) d s t τ M t τ 0 x ˙ T ( s ) R 3 x ˙ ( s ) d s
Using Lemma 1, we have
τ m t τ m t x ˙ T ( s ) R x ˙ ( s ) d s x ( t ) x ( t τ m ) T R 1 R 1 R 1 R 1 x ( t ) x ( t τ m )
Now we will discuss the derivation of E { V ( x ( t ) ) } on sets Θ 1 and Θ 2 , respectively.
Case 1: t Θ 1 , i.e., τ m τ ( t ) τ 0 .
Similar to (19), we have
t τ M t τ 0 x ˙ T ( s ) R 3 x ˙ ( s ) d s x ( t τ 0 ) x ( t τ M ) T R 3 δ R 3 δ R 3 δ R 3 δ x ( t τ 0 ) x ( t τ M )
Combining (19) and (20) and with free weighting matrix technology, we have
E { L V 3 ( x ( t ) ) } = ϕ T ( t ) ( τ m 2 R 1 + δ R 2 + δ R 3 ) ϕ ( t ) + α 0 ( 1 α 0 ) ψ T ( t ) ( τ m 2 R 1 + δ R 2 + δ R 3 ) ψ ( t ) + x ( t ) x ( t τ m ) T R 1 R 1 R 1 R 1 x ( t ) x ( t τ m ) + x ( t τ 0 ) x ( t τ M ) T R 3 δ R 3 δ R 3 δ R 3 δ x ( t τ 0 ) x ( t τ M ) + t τ 0 t τ m x ˙ T ( s ) R 2 x ˙ ( s ) d s + 2 ζ T ( t ) N x ( t τ m ) x ( t τ ( t ) ) t τ ( t ) t τ m x ˙ ( s ) d s + 2 ζ T ( t ) N x ( t τ ( t ) ) x ( t τ 0 ) t τ 0 t τ ( t ) x ˙ ( s ) d s
where ζ = [ x T ( t ) , x T ( t τ ( t ) ) , x T ( t τ m ) , x T ( t τ 0 ) , x T ( t τ M ) , w T ( t ) , ξ T ( t ) ] T .
Then by Lemma 2, we can derive
2 ζ T ( t ) N t τ ( t ) t τ m x ˙ ( s ) d s ( τ ( t ) τ m ) ζ T ( t ) N R 2 1 N T ζ ( t ) + t τ ( t ) t τ m x ˙ T ( s ) R 2 x ˙ ( s ) d s 2 ζ T ( t ) M t τ 0 t τ ( t ) x ˙ ( s ) d s ( τ 0 τ ( t ) ) ζ T ( t ) N R 2 1 N T ζ ( t ) + t τ 0 t τ ( t ) x ˙ T ( s ) R 2 x ˙ ( s ) d s
With above analyses, we have
E { L V ( x ( t ) ) } + E { y T ( t ) y ( t ) } γ E { w T ( t ) w ( t ) + ξ T ( t ) ξ ( t ) } = ζ T ( t ) Φ 1 ζ ( t ) + ζ T ( t ) A ϕ T ( τ m 2 R 1 + δ R 2 + δ R 3 ) A ϕ ζ ( t ) + ζ T ( t ) A ψ T [ α 0 ( 1 α 0 ) ( τ m 2 R 1 + δ R 2 + δ R 3 ) ] A ψ ζ ( t ) + ζ T ( t ) ( Σ 11 1 + Σ 11 1 T ) ζ ( t ) + ( τ ( t ) τ m ) ζ T ( t ) N R 2 1 N T ζ ( t ) + ( τ 0 τ ( t ) ) ζ T ( t ) M R 2 1 M T ζ ( t )
From (16) with i = 1 , j = 1 , 2 , and according to Lemma 3 as well as Schur complement, one can derive
E { L V ( x ( t ) ) } + E { y T ( t ) y ( t ) } γ E { w T ( t ) w ( t ) + ξ T ( t ) ξ ( t ) } 0
Case 2: t Θ 2 , i.e., τ 0 τ ( t ) τ M .
By Lemma 1, we have
t τ 0 t τ m x ˙ T ( s ) R 3 x ˙ ( s ) d s x ( t τ m ) x ( t τ 0 ) T R 2 δ R 2 δ R 2 δ R 2 δ x ( t τ m ) x ( t τ 0 )
Then with
ζ T ( t ) S x ( t τ 0 ) x ( t τ ( t ) ) t τ ( t ) t τ 0 x ˙ ( s ) d s = 0 ζ T ( t ) T x ( t τ ( t ) ) x ( t τ M ) t τ M t τ ( t ) x ˙ ( s ) d s = 0
and using similar methods in Case 1, we have
E { L V ( x ( t ) ) } + E { y T ( t ) y ( t ) } γ E { w T ( t ) w ( t ) + ξ T ( t ) ξ ( t ) } = ζ T ( t ) Φ 2 ζ ( t ) + ζ T ( t ) A ϕ T ( τ m 2 R 1 + δ R 2 + δ R 3 ) A ϕ ζ ( t ) + ζ T ( t ) A ψ T [ α 0 ( 1 α 0 ) ( τ m 2 R 1 + δ R 2 + δ R 3 ) ] A ψ ζ ( t ) + ζ T ( t ) ( Σ 11 2 + Σ 11 2 T ) ζ ( t ) + ( τ ( t ) τ m ) ζ T ( t ) S R 2 1 S T ζ ( t ) + ( τ 0 τ ( t ) ) ζ T ( t ) T R 2 1 T T ζ ( t )
which also leads to (23) according to (16) with i = 1 and j = 1 , 2 . Thus combining the results of two cases above, we have
E { L V ( x ( t ) ) } E { y T ( t ) y ( t ) } + γ E { w T ( t ) w ( t ) + ξ T ( t ) ξ ( t ) }
If w ( t ) = 0 and ξ ( t ) = 0 , one can easily have E { L V ( x ( t ) ) } 0 , which implies system (15) with w ( t ) = 0 and ξ ( t ) = 0 is asymptotically stable. With the presence of disturbance input and deception attack, integrating both sides of (27) from t 0 to t with t + , we can have E { y T ( t ) y ( t ) } γ E { w T ( t ) w ( t ) + ξ T ( t ) ξ ( t ) , which completes the proof. □
Remark 2.
A piecewise delay analysis method is adopted in constructing Lyapunov–Krasovskii functional candidate. Specifically, the time delay variation interval is divided into two subintervals with equal length, which can effectively reduce the conservativeness of the results. Furthermore, the delay interval can also be divided into more than two subsets, which can lead to less conservativeness [18].

3.2. Networked Load Frequency Controller Design

As we can see, when controller gain K is unknown, the inequality in Theorem 1 is nonlinear, which cannot be solved directly. In this subsection, we are going to present the design approach to gain K based on Theorem 1.
Theorem 2.
For given scalars α 0 0 , γ > 0 , τ M τ m 0 , system (12) is asymptotically stable satisfying H performance if there exist positive definite matrices X, Y, R ˜ 1 , R ˜ 2 , R ˜ 3 , M ˜ , N ˜ , S ˜ and T ˜ such that the following inequalities hold:
Φ ˜ i + Σ ˜ 11 i + ( Σ ˜ 11 i ) T * * Σ ˜ 21 i j Σ ˜ 22 i * Σ ˜ 31 0 Σ ˜ 33 Σ ˜ 41 0 0 I < 0 , i = 1 , 2 j = 1 , 2
where
Φ ˜ 1 = Φ ˜ 11 * * * * * * ( 1 α 0 ) Y T B T 0 * * * * * R ˜ 1 0 Q ˜ 1 R ˜ 1 * * * * 0 0 0 Q ˜ 2 R ˜ 3 δ * * * 0 0 0 R ˜ 3 δ Q ˜ 3 R ˜ 3 δ * * F T 0 0 0 0 γ 2 I * α 0 B T X 0 0 0 0 0 γ 2 I Φ ˜ 1 11 = A X + X A T + Q ˜ 1 + Q ˜ 2 + Q ˜ 3 R ˜ 1 Φ ˜ 2 = Φ ˜ 11 * * * * * * ( 1 α 0 ) Y T B T 0 * * * * * R ˜ 1 0 Q ˜ 1 R ˜ 1 R ˜ 2 δ * * * * 0 0 R ˜ 2 δ Q ˜ 2 R ˜ 2 δ * * * 0 0 0 0 Q ˜ 3 * * F T 0 0 0 0 γ 2 I * α 0 B T X 0 0 0 0 0 γ 2 I Σ ˜ 11 1 = 0 N ˜ + M ˜ N ˜ M ˜ 0 0 0 Σ ˜ 11 2 = 0 T ˜ S ˜ 0 S ˜ T ˜ 0 0 Σ ˜ 21 11 = δ N ˜ T , Σ ˜ 21 12 = δ M ˜ T , Σ ˜ 21 21 = δ S ˜ T , Σ ˜ 21 22 = δ T ˜ T Σ ˜ 22 1 = R ˜ 2 , Σ 22 2 = R ˜ 3 Σ ˜ 31 = τ m R ˜ 1 A ˜ ϕ δ R ˜ 2 A ˜ ϕ δ R ˜ 3 A ˜ ϕ τ m α 0 ( 1 α 0 ) δ R ˜ 1 A ˜ ψ α 0 ( 1 α 0 ) δ R ˜ 2 A ˜ ψ α 0 ( 1 α 0 ) δ R ˜ 3 A ˜ ψ , Σ ˜ 33 = diag { R ˜ 1 , R ˜ 2 , R ˜ 3 , R ˜ 1 , R ˜ 2 , R ˜ 3 } A ˜ ϕ = A X B Y 0 0 0 F X α 0 B X A ˜ ψ = 0 B Y 0 0 0 0 B X
Proof of Theorem 2.
Let X = P 1 , R ˜ i = X R i X , Y = K C X , Q ˜ i = X Q i X , i = 1 , 2 , 3 , M ˜ = X M X , N ˜ = X N X , S ˜ = X S X , T ˜ = X T X . Then pre- and post-multiplying inequality (16) with diag { X , X , X , X , X , I , I , X , R 1 1 , R 2 1 , R 3 1 , R 1 1 , R 2 1 , R 3 1 } , and together with Schur complement, one can easily arrive at inequality (28). □
In the case where K is unknown, linear matrix inequality (28) provided in Theorem 2 is solvable. However, the controller gain is still unsolvable due to the nonlinearity form K C X . Now we are in the position to design controller gain. In the following, we use a similar method in [23] for linearization.
Theorem 3.
For given scalars α 0 0 , γ > 0 , τ M τ m 0 , system (12) is asymptotically stable satisfying H performance if there exist positive definite matrices X, Y, R ˜ 1 , R ˜ 2 , R ˜ 3 , M ˜ , N ˜ , S ˜ and T ˜ such that the following inequalities hold:
Φ ˜ i + Σ ˜ 11 i + ( Σ ˜ 11 i ) T * * Σ ˜ 21 i j Σ ˜ 22 i * Σ ˜ 31 0 Σ ˜ 33 Σ ˜ 41 0 0 I < 0 , i = 1 , 2 j = 1 , 2
ϵ I * V C C X I < 0 , ϵ 0
where Φ ˜ i , Σ ˜ 11 i , Σ ˜ 21 i j , Σ ˜ 22 i , and Σ ˜ 41 can be obtained from Φ ˜ i , Σ ˜ 11 i , Σ ˜ 21 i j , Σ ˜ 22 i , and Σ ˜ 41 by replacing K C X with U C , respectively. Sequently, the load frequency controller gain can be computed with K = U V 1 .
Proof of Theorem 3.
To solve the infeasible term K C X , we let V C = C X . The coupling terms K C X in inequality (28) would be transformed into a W-problem proposed in [30]. Then using an alternative method in [27], we have ( V C C X ) T ( V C C X ) = 0 , which leads to optimization problem (30) according to schur complement. Since C is full row rank matrix, one can deduce that M is full rank and invertible. Thus together with K C X = U C , the output feedback gain can be calculated by K = U V 1 . □
With the design approach proposed in Theorem 3, PI controller gains for multiple power systems can be computed through solving the linear matrix inequalities (29) and (30) using YALMIP toolbox with SeDuMi optimization in MATLAB (R2016a).

4. A Case Study

In this section, we are going to present a practical network-based load frequency control for multi-area power systems in smart grid. In the numerical simulation, an interconnected three-area smart grid is considered. The parameters of three areas are chosen as follows [31].
Area 1:
D 1 = 1 , M 1 = 10 , R 1 = 0.05 , T c h 1 = 0.3 s , T g 1 = 0.1 s , β 1 = 2 R 1 + D 1 .
Area 2:
D 2 = 1.5 , M 2 = 12 , R 2 = 0.05 , T c h 2 = 0.17 s , T g 2 = 0.4 s , β 2 = 4 R 2 + D 2 .
Area 3:
D 3 = 1.8 , M 3 = 12 , R 3 = 0.05 , T c h 3 = 0.02 s , T g 3 = 0.35 s , β 3 = 3 R 3 + D 3 .
In addition, we set T 12 = 0.2 p . u . / r a d , T 23 = 0.12 p . u . / r a d , T 31 = 0.25 p . u . / r a d , α 0 = 0.3 , and the sampling period h = 0.01 s . The deception attack signal is chosen as ξ ( t ) = [ 0.1 exp 0.01 t sin ( 0.1 t ) , 0.05 exp 0.01 t sin ( 0.12 t ) , 0.15 exp 0.01 t sin ( 0.1 t ) ] T . In the following we are going to present an algorithm to implement the output feedback PI controller design.
By using Algorithm 1, we can design the network-based load frequency control scheme for multiple area power systems with communication under deception attacks. Specifically, matrices U, V and K can be calculated as follows.
U = 0.1315 0.1392 0.0580 0.1356 0.0310 0.0160 0.0873 0.1089 0.0445 0.0047 0.0589 0.2566 0.1119 0.1158 0.0116 0.2923 0.0806 0.2823 , V = 0.9213 0.1039 0.3873 0.5374 0.0218 1.0320 0.0284 1.0932 0.0312 0.4359 0.1994 0.9024 0.1435 0.2947 0.2498 0.0002 0.0982 0.9175 1.2934 0.4358 0.1434 0.0494 0.8763 0.4711 0.1044 0.0014 0.0003 0.8624 0.9724 0.8163 1.0693 0.9324 0.0927 0.9427 0.9375 0.9375 K = 0.1384 0.1405 0.0000 0.0000 0.0000 0.0000 0.0000 0.0000 0.2318 0.0932 0.0000 0.0000 0.0000 0.0000 0.0000 0.0000 0.2029 0.1245 ,
which implies the controller gains of corresponding three areas are K 1 = [ 0.1384 , 0.1405 ] , K 2 = [ 0.2318 , 0.0932 ] , K 3 = [ 0.2029 , 0.1245 ] . As is seen, without a secure control mechanism, the deviation of frequency of three-area power systems encountered in deception attacks is shown in Figure 2, which cannot reach stable performance. In the sequent, the evolution of frequency deviation of the attacked three-area power systems with secure control scheme is given in Figure 3, which shows the effectiveness of the designed control strategy. Furthermore, we can see that deception attacks were launched 593 times into the communication network. The evolution of stochastic variable α ( t ) in the first five seconds is given in Figure 4, where α ( t ) = 1 implies the deception attack is launched into network at time t. Besides, the deceptive signal α ( t ) v ( t ) launched into the communication network is shown in Figure 5, from which one can clearly see the attack instants and the corresponding values of a deceptive signal.
Algorithm 1 Output feedback PI load frequency controller design for three-area power systems.
Require: 
D i , M i , R i , T c h i , T g i , β i , T i j , i = 1 , 2 , 3 , j = 1 , 2 , 3 , α 0 .
Ensure: 
The given parameters are reasonable in describing multi-area power systems with Equations (1)–(6);
 1:
Using the input parameters to calculate the corresponding matrices in the augmented system (7) including A i i , A i j , B i , F i , C i , i = 1 , 2 , 3 , j = 1 , 2 , 3 ;  
 2:
Solving linear matrix inequalities (29) and (30) using YALMIP toolbox with SeDuMi optimization;  
 3:
Gaining matrices U, V;  
 4:
Calculating K = U V 1 ; return K;

5. Conclusions

The network-based Load frequency control problem of multiple area power systems against deception attacks has been investigated in this paper. With data transmitted through a wireless network, packets may be delayed or dropped in communication channels, and may also be corrupted by stochastic deception attacks. A dedicated system model has been provided to account for these negative effects on system performance. Based on the established model, the LFC problem has been investigated with a piecewise delay analysis method which is of less conservativeness. A controller design approach has been proposed in terms of linear matrix inequalities. A numerical example of three area power systems has been given to demonstrate the obtained results.

Author Contributions

Conceptualization, J.Y. and F.Z.; methodology, F.Z.; software, N.W.; validation, J.Y. and F.Z.; formal analysis, F.Z.; investigation, F.Z. and H.W.; resources, J.Y. and Z.Z.; data curation, N.W. and Z.Z.; writing—original draft preparation, F.Z.; writing—review and editing, J.Y. and F.Z.; supervision, N.W. and H.W.; project administration, N.W. and F.Z.; funding acquisition, F.Z. and Z.Z.

Funding

This research was funded by the Fundamental Research Funds for the Central Universities (2015MS83).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Singh, V.P.; Kishor, N.; Samuel, P. Distributed multi-agent system-based load frequency control for multi-area power system in smart grid. IEEE Trans. Ind. Electron. 2017, 64, 5151–5160. [Google Scholar] [CrossRef]
  2. Elgerd, O.; Fosha, C. The research for multi-area frequency control problem. IEEE Trans. PAS Power Appar Syst. 1970, 89, 551–556. [Google Scholar]
  3. Talaq, J.; Al-Basri, F. Adaptive fuzzy gain scheduling for load frequency control. IEEE Trans. Power Syst. 1999, 14, 145–150. [Google Scholar] [CrossRef]
  4. Rerkpreedapong, D.; Hasanovic, A.; Feliachi, A. Robust load frequency control using genetic algorithms and linear matrix inequalities. IEEE Trans. Power Syst. 2003, 18, 855–861. [Google Scholar] [CrossRef]
  5. Yang, J.; Zeng, Z.; Tang, Y.; Yan, J.; He, H.; Wu, Y. Load frequency control in isolated micro-grids with electrical vehicles based on multivariable generalized predictive theory. Energies 2015, 8, 2145–2164. [Google Scholar] [CrossRef]
  6. Liao, K.; Xu, Y. A robust load frequency control scheme for power systems based on second-order sliding mode and extended disturbance observer. IEEE Trans. Ind. Inform. 2018, 14, 3076–3086. [Google Scholar] [CrossRef]
  7. Topno, P.N.; Chanana, S. Load frequency control of a two-area multi-source power system using a tilt integral derivative controller. J. Vib. Control 2018, 24, 110–125. [Google Scholar] [CrossRef]
  8. Khooban, M.H.; Niknam, T.; Shasadeghi, M.; Dragicevic, T.; Blaabjerg, F. Load frequency control in microgrids based on a stochastic noninteger controller. IEEE Trans. Sustain. Energy 2018, 9, 853–861. [Google Scholar] [CrossRef]
  9. Charles, K.; Urasaki, N.; Senjyu, T.; Elsayed Lotfy, M.; Liu, L. Robust load frequency control schemes in power system using optimized PID and model predictive controllers. Energies 2018, 11, 3070. [Google Scholar] [CrossRef]
  10. Walsh, G.C.; Ye, H.; Bushnell, L.G. Stability analysis of networked control systems. IEEE Trans. Control Syst. Technol. 2002, 10, 438–446. [Google Scholar] [CrossRef]
  11. Yue, D.; Han, Q.L.; Peng, C. State feedback controller design of networked control systems. In Proceedings of the 2004 IEEE International Conference on Control Applications; IEEE: Piscataway Township, NJ, USA, 2004; Volume 1, pp. 242–247. [Google Scholar]
  12. Zhang, X.M.; Han, Q.L.; Yu, X. Survey on recent advances in networked control systems. IEEE Trans. Ind. Inform. 2016, 12, 1740–1752. [Google Scholar] [CrossRef]
  13. Ge, X.; Yang, F.; Han, Q.L. Distributed networked control systems: A brief overview. Inf. Sci. 2017, 380, 117–131. [Google Scholar] [CrossRef]
  14. Xiao, S.; Zhang, Y.; Zhang, B. Event-triggered network-based state observer design of positive systems. Inf. Sci. 2018, 469, 30–43. [Google Scholar] [CrossRef]
  15. Zhang, H.; Shi, Y.; Wang, J.; Chen, H. A new delay-compensation scheme for networked control systems in controller area networks. IEEE Trans. Ind. Electron. 2018, 65, 7239–7247. [Google Scholar] [CrossRef]
  16. He, Y.; Wu, M.; She, J.H.; Liu, G.P. Parameter-dependent Lyapunov functional for stability of time-delay systems with polytopic-type uncertainties. IEEE Trans. Autom. Control 2004, 49, 828–832. [Google Scholar] [CrossRef]
  17. Shustin, E.; Fridman, E. On delay-derivative-dependent stability of systems with fast-varying delays. Automatica 2007, 43, 1649–1655. [Google Scholar] [CrossRef]
  18. Yue, D.; Tian, E.; Zhang, Y. A piecewise analysis method to stability analysis of linear continuous/discrete systems with time-varying delay. Int. J. Robust Nonlinear Control 2009, 19, 1493–1518. [Google Scholar] [CrossRef]
  19. Yue, D. Robust stabilization of uncertain systems with unknown input delay. Automatica 2004, 40, 331–336. [Google Scholar] [CrossRef]
  20. Yuan, Y.; Li, Z.; Ren, K. Modeling load redistribution attacks in power systems. IEEE Trans. Smart Grid 2011, 2, 382–390. [Google Scholar] [CrossRef]
  21. Liu, X.; Li, Z. Local load redistribution attacks in power systems with incomplete network information. IEEE Trans. Smart Grid 2014, 5, 1665–1676. [Google Scholar] [CrossRef]
  22. Sargolzaei, A.; Yen, K.K.; Abdelghani, M.N. Preventing time-delay switch attack on load frequency control in distributed power systems. IEEE Trans. Smart Grid 2016, 7, 1176–1185. [Google Scholar] [CrossRef]
  23. Peng, C.; Li, J.; Fei, M. Resilient Event-Triggering H Load Frequency Control for Multi-Area Power Systems With Energy-Limited DoS Attacks. IEEE Trans. Power Syst. 2017, 32, 4110–4118. [Google Scholar] [CrossRef]
  24. Wu, Y.; Wei, Z.; Weng, J.; Li, X.; Deng, R.H. Resonance attacks on load frequency control of smart grids. IEEE Trans. Smart Grid 2018, 9, 4490–4502. [Google Scholar] [CrossRef]
  25. Dagoumas, A. Assessing the Impact of Cybersecurity Attacks on Power Systems. Energies 2019, 12, 725. [Google Scholar] [CrossRef]
  26. Xiao, S.; Han, Q.L.; Ge, X.; Zhang, Y. Secure distributed finite-time filtering for positive systems over sensor networks under deception attacks. IEEE Trans. Cybern. 2019, 1–10. [Google Scholar] [CrossRef]
  27. Peng, C.; Zhang, J. Delay-distribution-dependent load frequency control of power systems with probabilistic interval delays. IEEE Trans. Power Syst. 2015, 31, 3309–3317. [Google Scholar] [CrossRef]
  28. Han, Q.L. Absolute stability of time-delay systems with sector-bounded nonlinearity. Automatica 2005, 41, 2171–2176. [Google Scholar] [CrossRef]
  29. Sanchez, E.N.; Perez, J.P. Input-to-state stability (ISS) analysis for dynamic neural networks. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 1999, 46, 1395–1398. [Google Scholar] [CrossRef]
  30. Crusius, C.A.; Trofino, A. Sufficient LMI conditions for output feedback control problems. IEEE Trans. Autom. Control 1999, 44, 1053–1057. [Google Scholar] [CrossRef]
  31. Wen, S.; Yu, X.; Zeng, Z.; Wang, J. Event-triggering load frequency control for multiarea power systems with communication delays. IEEE Trans. Ind. Electron. 2016, 63, 1308–1317. [Google Scholar] [CrossRef]
Figure 1. The framework of network-based LFC of ith area power system.
Figure 1. The framework of network-based LFC of ith area power system.
Energies 12 02266 g001
Figure 2. Frequency deviation of three areas without secure control scheme.
Figure 2. Frequency deviation of three areas without secure control scheme.
Energies 12 02266 g002
Figure 3. Frequency deviation of three areas with secure control scheme.
Figure 3. Frequency deviation of three areas with secure control scheme.
Energies 12 02266 g003
Figure 4. The evolution of α ( t ) .
Figure 4. The evolution of α ( t ) .
Energies 12 02266 g004
Figure 5. Deception attack α ( t ) v ( t ) .
Figure 5. Deception attack α ( t ) v ( t ) .
Energies 12 02266 g005

Share and Cite

MDPI and ACS Style

Zhao, F.; Yuan, J.; Wang, N.; Zhang, Z.; Wen, H. Secure Load Frequency Control of Smart Grids under Deception Attack: A Piecewise Delay Approach. Energies 2019, 12, 2266. https://doi.org/10.3390/en12122266

AMA Style

Zhao F, Yuan J, Wang N, Zhang Z, Wen H. Secure Load Frequency Control of Smart Grids under Deception Attack: A Piecewise Delay Approach. Energies. 2019; 12(12):2266. https://doi.org/10.3390/en12122266

Chicago/Turabian Style

Zhao, Fei, Jinsha Yuan, Ning Wang, Zhang Zhang, and Helong Wen. 2019. "Secure Load Frequency Control of Smart Grids under Deception Attack: A Piecewise Delay Approach" Energies 12, no. 12: 2266. https://doi.org/10.3390/en12122266

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop