Next Article in Journal
Photometric Calibration for Stereo Camera with Gamma-like Response Function in Direct Visual Odometry
Next Article in Special Issue
Optimal Performance and Modeling of Wireless Technology Enabling Smart Electric Metering Systems Including Microgrids
Previous Article in Journal
Clairvoyant Melon Maturity Detection Enabled by Doctor-Blade-Coated Photonic Crystals
Previous Article in Special Issue
Experimental Validation and Deployment of Observability Applications for Monitoring of Low-Voltage Distribution Grids
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Resilient Adaptive Event-Triggered Load Frequency Control of Network-Based Power Systems against Deception Attacks

College of Mechanical & Electronic Engineering, Nanjing Forestry University, Nanjing 210037, China
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(21), 7047; https://doi.org/10.3390/s21217047
Submission received: 28 August 2021 / Revised: 12 October 2021 / Accepted: 20 October 2021 / Published: 24 October 2021
(This article belongs to the Special Issue Communication and Data Management for Smart Grids)

Abstract

:
This paper investigates the problem of networked load frequency control (LFC) of power systems (PSs) against deception attacks. To lighten the load of the communication network, a new adaptive event-triggered scheme (ETS) is developed on the premise of maintaining a certain control performance of LFC systems. Compared with the existing ETSs, the proposed adaptive ETS can adjust the number of triggering packets, along with the state changes in the presence of deception attacks, which can reduce the average data-releasing rate. In addition, sufficient conditions can be derived, providing a trade-off between the limited network communication resources and the desired control performance of PSs. Finally, an application case is presented for the PSs to demonstrate the advantages of the proposed approach.

1. Introduction

It is known that load frequency control (LFC) is a core component of PSs, which governs the system frequency and power exchange between regions in an optimally scheduled way [1,2,3]. Proportional-integral (PI) control has been widely utilized as a common control strategy in LFC [4,5,6]. For example, the authors in [6] studied the area LFC problem using fuzzy gain scheduling with a PI controller. With the development of the PSs, control signals are transmitted via a special power channel and an networked communication infrastructure, which brings new challenges to the PI controller design of LFC. Recently, a lot of the published literature [7,8,9,10,11] has concerned networked LFC. For instance, in [8], an active interference suppression control method was proposed for interconnected LFC systems.
Since the control signals of PSs are transmitted through the communication network, the potential risks of LFC systems increases, such as cyber attacks [12,13,14,15,16,17]. Cyber-attacks have receieved great attention in recent years [1,2]. Usually, cyber-attacks discussed in the literature include denial of service (DoS) attacks and deception attacks. The deception attackers launch a attack by destroying data integrity, such as tampering or replacing transmitted data. In [18], a new control method was proposed in distributed networks subject to deception attacks. The DoS attacks prevent data transmission by occupying the shared network channel, thereby degrading the system performance. A resilient ETS was well-designed in [19] for LFC systems under DoS attacks. In [14], the event-triggered control was studied for multi-agent systems under DoS attacks.
In NCS, the time-triggered scheme (TTS) is widely used to obtain the system information through the sampler, under which a fixed sampling interval can guarantee the desired performance even if there are uncertainties, time-delays, external disturbances, etc. [20,21]. However, too many “unnecessary” sampling signals are transmitted via the network, which leads to a waste of resources [22,23]. To deal with these shortcomings, an event-triggered scheme (ETS) has been widely applied to ease the network burden in recent decades. Compared to the TTS, the sampling data packets are released only when an event generated by some elaborate condition occurs, which can effectively improve resource utilization while ensuring a satisfied system performance [24,25,26,27]. However, due to the complexity of the system and the contradiction between better system performance and a lower data transmission rate, it is usually difficult to design the threshold of event-triggered conditions in the practical application system. Therefore, some state-of-the-art ETSs have been proposed, such as memory-based ETS and adaptive ETS. The authors in [28] proposed a memory-based ETS for T-S fuzzy systems, wherein some historical triggered data were utilized in the ETS so that the control performance can be ensured. The authors in [29,30] proposed an adaptive ETS for nonlinear systems, wherein the threshold can be adjusted with the system states. However, the problem of H -based LFC for network-based PSs under deception attacks by adopting adaptive ETS has not yet been reported, which prompted this study.
In sum, the goal of this work is to design an adaptive event-triggered controller for LFC systems subject to deception attacks. Differing from the existing ETS with a preset threshold, the improved adaptive ETS can adjust the number of triggering packets along with the state changes, under which the transmission rate can be cut down while maintaining the desired frequency performance of LFC systems under deception attacks.

2. Problem Formulation

Figure 1 displays a block diagram of a single-area LFC power system, where the area control error is presumed to be transmitted to the PI controller via a shared communication network.

2.1. Description of the LFC Systems

As shown in Figure 1, the model of the LFC systems can be indicated as follows [31]
Δ a ( s ) = 1 s M + E Δ H m ( s ) Δ H d ( s ) , Δ H m ( s ) = 1 1 + s T c h Δ H v ( s ) , Δ H v ( s ) = 1 1 + s T g u ( s ) 1 J Δ a ( s ) , ACE ( s ) = μ Δ a ( s ) ,
where the symbols of the LFC system are listed in Table 1 [2].
By applying the inverse Laplace transform to (1), it can be obtained that
Δ a ˙ ( t ) = 1 M ( Δ H m ( t ) Δ H d ( t ) E Δ a ( t ) ) , Δ H ˙ m ( t ) = 1 T c h ( Δ H v ( t ) Δ H m ( t ) ) , Δ H ˙ v ( t ) = 1 T g u ( t ) 1 J Δ a ( t ) Δ H v ( t ) .
Similar to [10], we can obtain the state-space representation for LFC systems, as follows
x ^ ˙ ( t ) = A x ^ ( t ) + B u ( t ) + F ω ( t ) , y ^ ( t ) = C x ^ ( t ) ,
where x ^ ( t ) = [ Δ a ( t ) Δ H m ( t ) Δ H v ( t ) ] T , ω ( t ) = Δ H d ( t ) , y ^ ( t ) = ACE ( t ) , and
A = E M 1 M 0 0 1 T c h 1 T c h 1 J T g 0 1 T g , B = [ 0 0 1 T g ] T , C = μ 0 0 , F = [ 1 M 0 0 ] T .

2.2. Adaptive ETS Controller Design

Simular to [10], the PI control strategy of the LFC systems is designed as
u ( t ) = K P ACE ( t ) K I 0 t ACE ( s ) d s ,
where K P denotes proportional gain and K I stands for integral gain.
For convenience of obtaining the controller gains, we transform the above PI control form into the output feedback problem. Then, we redefine the output variables
y ( t ) = [ ACE ( t ) 0 t ACE ( s ) d s ] T .
Define K = [ K P K I ] , and we can rewrite (4) as
u ( t ) = K y ( t ) .
However, the sampled signal of ACE ( t ) of networked LFC systems will only be released to the PI controller via the network when the preset condition is satisfied [20]. To adjust the number of triggering packets in the LFC system, along with the state changes under deception attacks, an improved adaptive ETS is put forward, as follows:
t k + 1 h = t k h + min l N { l h | ϰ T ( i l h ) ϕ ϰ ( i l h ) > σ ( t ) x T ( t k h ) ϕ x ( t k h ) } ,
where h is the sampling period, ϕ is a positive symmetric matrix to be designed, t k h is the data-releasing instant, ϰ ( i l h ) = y ( i l h ) y ( t k h ) , i l h = l h + t k h , l N , i l h ( t k h , t k + 1 h ] , { t 0 , t 1 , t 2 , } { 0 , 1 , 2 , } , and
σ ( t ) = α 1 2 π arctan ι y ( i l h ) ,
wherein α ( 0 , 1 ) is the upper bound of σ ( t ) , ι and α are given positive constants.
Remark 1.
It can be seen from (7) that σ ( t ) can adaptively adjusted to the system states by a arctangent function, which is different from the existing ETS with a constant threshold. When the system states fluctuate, σ ( t ) will be adaptively adjusted to a lower value, by which more packets with the system information can be released to the controller. When the system is stable, σ ( t ) will be automatically adjusted to a larger value to decrease the release rate of sampled packets.
Based on the condition (6), one can obtain that
y ( t k h ) = y ( i l h ) ϰ ( i l h ) .
Since the communication network is vulnerable to cyber attacks, the transmission signal can be written as
y ^ ( t ) = φ ( t ) ð ( t ) + ( 1 φ ( t ) ) y ( t k h ) ,
where the Bernoulli variable φ ( t ) { 0 , 1 } is introduced to characterize the behavior of random deception attacks, E { φ ( t ) } = φ ¯ , E { ( φ ( t ) φ ¯ ) 2 } = ρ 2 and the nonlinear attack signal ð ( t ) satisfies
ð ( t ) 2 G y ( t ) 2 ,
where G is a known matrix with appropriate dimension.
Remark 2.
Cyber-attack has receieved great attention in recent years since it is one of the major threats to system stability [1,2,19]. Usually, cyber-attacks discussed in the literature include DoS attacks and deception attacks. The DoS attacks prevent data transmission by occupying the shared network channel, thereby degrading system performance. The deception attackers launch an attack by destroying data integrity, such as tampering with or replacing transmitted data. In this paper, we consider a kind of deception attack when investigating the LFC problem of PSs.
Remark 3.
When φ ( t ) = 1 , the true measurement data are replaced with the data of deception attacks. Otherwise, the true measurement data can be transmitted to the controller.
Considering the deception attacks, the output of the controller in (5) can be rewritten as
u ( t ) = K y ^ ( t ) .

2.3. Closed-Loop Control of LFC Systems

According to the adaptive ETS in (6), the current signal is maintained by the zero-order holder (ZOH) until the next packet is transmitted. Therefore, we need to divide the interval Π = [ m ¯ , n ¯ ) into + 1 pieces, where m ¯ = t k h + λ t k , n ¯ = t k + 1 h + λ t k + 1 . The network-induced delay at instant t k h is denoted by λ t k and the holding interval Π can be divided into
Π = l = 0 Π l ,
where
Π l = [ t k h + l h + ϑ , t k + 1 h + ( l + 1 ) h + ϑ ) , ϑ = λ t k , l = 0 , 1 , , 1 , λ t k + 1 , l = , + 1 = t k + 1 t k .
Define
λ ( t ) = t i l h ,
where i l h = t k h + l h , 0 λ t k λ ( t ) λ M = λ ¯ , λ M = h + max { λ t k } . Then, y ^ ( t ) can be represented by
y ^ ( t ) = φ ( t ) ð ( t ) + ( 1 φ ( t ) ( y ( t λ ( t ) ) ϰ ( t λ ( t ) ) ) ,
for t Π l .
Redefining new variables x ( t ) = [ Δ a ( t ) Δ H m ( t ) Δ H v ( t ) 0 t ACE ( s ) d s ] T . Combine (4)–(13), the LFC systems (3) with an adaptive event-triggered PI controller against deception attacks can be formulated as
x ˙ ( t ) = A x ( t ) ( 1 φ ( t ) ) B K C x ( t λ ( t ) ) + ( 1 φ ( t ) ) B K ϰ ( t λ ( t ) ) + F ω ( t ) B K φ ( t ) ð ( t ) , y ( t ) = C x ( t ) , t Π l .
where
A = E M 1 M 0 0 0 1 T c h 1 T c h 0 1 R T g 0 1 T g 0 μ 0 0 0 , B = 0 0 1 T g 0 , C = μ 0 0 0 0 0 0 1 , F = 1 M 0 0 0 .
The purpose of this article is to design the adaptive event-triggered PI controller subject to deception attacks, while ensuring that E { y ( t ) } E { γ ω ( t ) } holds with zero initial state conditions when ω ( t ) 0 , and the LFC system (14) could achieve stability with ω ( t ) = 0 .

3. Main Results

In this section, we use the Lyapunov–Krasovskii function method to derive the stability criteria of the LFC system. Then, the weight matrix of adaptive ETS and the controller gain will be calculated by LMIs. The statement of sufficient conditions for the LFC system are shown in the following.
Theorem 1.
For given scalars λ ¯ > 0 , α ( 0 , 1 ) , φ ¯ ( 0 , 1 ) , ρ , H norm bound γ, and matrix K , the system (14) is asymptotically stable, if there exist matrices P > 0 , P 2 > 0 , R > 0 , Q > 0 W > 0 and a matrix U such that
R * U R > 0 ,
Ξ = Ξ 11 * * * Ξ 21 φ ¯ P 2 * * Ξ 31 Ξ 32 ( R + W ) * Ξ 41 Ξ 42 0 ( R + W ) < 0 ,
where
Ξ 11 = Ψ 11 * * * * Ψ 21 Ψ 22 * * * U R U Q R * * ( 1 φ ¯ ) K T B T P α ϕ C 0 ϕ + α ϕ * F T P 0 0 0 γ 2 I , Ψ 11 = A T P + P A + Q R π 2 4 W + C T C + φ ¯ C T G T P 2 G C , Ψ 21 = ( φ ¯ 1 ) C T K T B T P + R U + π 2 4 W , Ψ 22 = U + U T 2 R π 2 4 W + α C T ϕ C , Ξ 21 = [ φ ¯ K T B T P 0 0 0 0 ] , Ξ 31 = λ ¯ ( R + W ) Υ 1 , Ξ 32 = λ ¯ φ ¯ ( R + W ) B K , Ξ 41 = λ ¯ ρ ( R + W ) Υ 2 , Ξ 42 = λ ¯ ρ ( R + W ) B K , Υ 1 = A ( φ ¯ 1 ) B K C 0 ( 1 φ ¯ ) B K F , Υ 2 = 0 B K C 0 B K 0 .
Proof. 
Construct a Lyapunov–Krasovskii function in [31] for the system (14) as
V ( t ) = x T ( t ) P x ( t ) + t λ ¯ t x T ( s ) Q x ( s ) d s + λ ¯ t λ ¯ t s t x ˙ T ( v ) R x ˙ ( v ) d v d s + λ ¯ 2 i l h t x ˙ T ( s ) W x ˙ ( s ) d s π 2 4 i l h t x ( s ) x ( i l h ) T W x ( s ) x ( i l h ) d s .
Define ϝ ( t ) = λ ¯ 2 x ˙ T ( t ) R x ˙ ( t ) + λ ¯ 2 x ˙ T ( t ) W x ˙ ( t ) ; then, the following results can be derived from (17),
E { V ˙ ( t ) } = 2 x T ( t ) P Λ 1 ( t ) + x T ( t ) Q x ( t ) x T ( t λ ¯ ) Q x ( t λ ¯ ) λ ¯ t λ ¯ t x ˙ T ( s ) R x ˙ ( s ) d s π 2 4 x ( t ) x ( i l h ) T W x ( t ) x ( i l h ) + E { ϝ ( t ) } ,
where
E { ϝ ( t ) } = λ ¯ 2 Λ 1 T ( t ) ( R + W ) Λ 1 ( t ) + λ ¯ 2 ρ 2 Λ 2 T ( t ) ( R + W ) Λ 2 ( t ) , Λ 1 ( t ) = A x ( t ) ( 1 φ ¯ ) B K C x t λ ( t ) + ( 1 φ ¯ ) B K ϰ ( t λ ( t ) ) + F ω ( t ) φ ¯ B K ð ( t ) , Λ 2 ( t ) = B K ϰ ( t λ ( t ) ) B K C x ( t λ ( t ) ) + B K ð ( t ) .
From the adaptive ETS (6), one can obtain
σ ( t ) [ y ( i l h ) ϰ ( i l h ) ] T ϕ [ y ( i l h ) ϰ ( i l h ) ] ϰ ( i l h ) T ϕ ϰ ( i l h ) 0 .
According to inequality (10), it has
φ ¯ y T ( t ) G T P 2 G y ( t ) φ ¯ ð T ( t ) P 2 ð ( t ) 0 ,
where P 2 is a positive symmetric matrix.
Define Ω ( t ) = γ 2 ω T ( t ) ω ( t ) y T ( t ) y ( t ) ; then, combining (15)–(20), and using Schur complement lemma and the method in [31] follows:
E { V ˙ ( t ) } E { Ψ T ( t ) Ξ Ψ ( t ) } + E { Ω ( t ) } ,
where
Ψ T ( t ) = [ x T ( t ) x T ( t λ ( t ) ) x T ( t λ ¯ ) ϰ T ( t λ ( t ) ) ω T ( t ) ð T ( t ) ] .
According to (15) and (16), we can conclude that E { Ψ T ( t ) Ξ Ψ ( t ) } 0 , which means that
E { V ˙ ( t ) } < E { Ω ( t ) } .
Taking the integration on both sides for (22) from 0 to + , we have
E { V ( + ) V ( 0 ) } < E { 0 + Ω ( t ) d t } .
The LFC systems (14) are asymptotically stable with zero initial conditions when ω ( t ) = 0 , and E { y ( t ) } E { γ ω ( t ) } when ω ( t ) 0 . The proof is complete. □
Theorem 2.
For given scalars λ ¯ > 0 , α ( 0 , 1 ) , φ ¯ ( 0 , 1 ) , ρ , H norm bound γ, the system (14) is asymptotically stable, if there are symmetric and positive definite matrices L , X , Q ˜ , W ˜ , R ˜ , matrices U ˜ and N with appropriate dimensions, such that the following linear matrix inequalities hold:
C X = L C ,
R ˜ * U ˜ R ˜ > 0 ,
Ξ ˜ = Θ ˜ 11 * * Θ ˜ 21 Θ ˜ 22 * Θ ˜ 31 0 Θ ˜ 33 < 0 ,
where
Θ ˜ 11 = Ξ ˜ 11 * * * * * Ξ ˜ 21 Ξ ˜ 22 * * * * U ˜ R ˜ U ˜ Q ˜ R ˜ * * * ( 1 φ ¯ ) N T B T α ϕ ˜ C 0 ϕ ˜ + α ϕ ˜ * * Ξ ˜ 51 0 0 0 γ 2 I * φ ¯ N T B T 0 0 0 0 φ ¯ L , Ξ ˜ 11 = X A T + A X + Q ˜ R ˜ π 2 4 W ˜ , Ξ ˜ 21 = ( φ ¯ 1 ) C T N T B T + R ˜ U ˜ + π 2 4 W ˜ , Ξ ˜ 22 = 2 R ˜ + U ˜ + U ˜ T π 2 4 W ˜ + α C T ϕ ˜ C , Ξ ˜ 51 = F T , Θ ˜ 21 = λ ¯ AX λ ¯ ( 1 φ ¯ ) B N C 0 λ ¯ ( 1 φ ¯ ) B N λ ¯ F λ ¯ φ ¯ B N 0 λ ¯ ρ B N C 0 λ ¯ ρ B N 0 λ ¯ ρ B N , Θ ˜ 22 = diag 2 ζ 0 X + ζ 0 2 ( R + W ) , 2 ζ 1 X + ζ 1 2 ( R + W ) , Θ ˜ 31 = LC 0 0 0 0 0 φ ¯ GLC 0 0 0 0 0 , Θ ˜ 33 = diag { I , L } .
Then, the controller gain is derived by K = N L 1 .
Proof. 
Define Q ˜ = XQX , K L = N , X = P 1 , W ˜ = XWX > 0 , R ˜ = XRX , U ˜ = XUX , appropriate dimension matrix L = P 2 1 , ϕ ˜ = L ϕ L .
Using pre- and post-multiplying (15) with H 1 and pre- and post-multiplying (16) with H 2 , one can see that (25) and (27) hold, where H 1 = diag { X , X } , H 2 = diag { X , X , X , L , I , L , ( R + W ) 1 , ( R + W ) 1 } .
Ξ = Θ 11 * * Θ 21 Θ 22 * Θ 31 0 Θ 33 < 0 ,
where
Θ 11 = Ξ 11 * * * * * Ξ 21 Ξ 22 * * * * U ˜ R ˜ U ˜ Q ˜ R ˜ * * * ( 1 φ ¯ ) L K T B T α L ϕ C X 0 ϕ ˜ + α ϕ ˜ * * Ξ 51 0 0 0 γ 2 I * φ ¯ L K T B T 0 0 0 0 φ ¯ L , Ξ 11 = X A T + A X + Q ˜ R ˜ π 2 4 W ˜ , Ξ 21 = ( φ ¯ 1 ) X C T K T B T + R ˜ U ˜ + π 2 4 W ˜ , Ξ 22 = 2 R ˜ + U ˜ + U ˜ T π 2 4 W ˜ + α X C T ϕ C X , Ξ 51 = F T , Θ 21 = λ ¯ AX λ ¯ ( 1 φ ¯ ) B K CX 0 λ ¯ ( 1 φ ¯ ) B K L λ ¯ F λ ¯ φ ¯ B K L 0 λ ¯ ρ B K CX 0 λ ¯ ρ B K L 0 λ ¯ ρ B K L , Θ 22 = diag ( R + W ) 1 ( R + W ) 1 , Θ 31 = CX 0 0 0 0 0 φ ¯ GCX 0 0 0 0 0 , Θ 33 = diag { I , L } .
Noting that ( ζ R P ) R 1 ( ζ R P ) 0 , ζ > 0 , it is easy to see that PR 1 P ζ 2 R 2 ζ P . Define H 3 = diag { I , I , I , I , I , I , P , P , I , I } and H 4 = diag { I , I , I , I , I , I , X , X , I , I } . By using CX and N instead of LC and K L , and pre- and post-multiplying (27) with H 3 and H 4 , respectively, one can obtain that the inequality (26) holds. This ends the proof. □
To solve the problem of equality (24) in Theorem 2, we use the optimization algorithm in [32], which can be expressed as
κ I ( LC CX ) T ( LC CX ) I < 0 , κ 0 ,
where κ > 0 is a small enough constant. Furthermore, the controller gain could be calculated by (25), (26) and (28).

4. Simulation Examples

An application example of LFC systems in [33,34] is given to verify the efficacy of the method, whose nominal values are listed in Table 2.
Select the attack function ð ( t ) = −tanh G y ( t ) [2] and G = diag { 0.8 , 0.1 } . The mathematic expectation of the deception attack is given as φ ¯ = 0.5 . The disturbance is chosen as
ω ( t ) = 0.5 cos ( 0.1 t ) , 15 t 20 0 , otherwise .
Next, two cases are utilized to manifest the proposed method for LFC systems.
Case 1: The impact of deception attacks is not considered in the controller design in this case. Give the parameters ζ 0 = ζ 1 = 0.01 , κ = 0.1 . Choose the adaptive law parameters α = 0.8 , ι = 80 , sampling period h = 0.05 , the upper bound of network-induced delay λ ¯ = 0.001 , and H performance index γ = 15 . Then, the controller gain and weighting matrix can be figured out by Theorem 2 as follows
K = 0.0627 0.2561 , ϕ = 0.3654 0.4298 0.4298 2.1692 .
It is assumed that the initial condition of system is x ( 0 ) = [ 1.5 1 0.2 0 ] T . The results are obtained in Figure 2, Figure 3, Figure 4 and Figure 5. The state responses of the LFC system in Case 1 are shown in Figure 2, which indicates that the LFC system is stable after 60 s. Figure 3 illustrates the responses of control input. The adaptive law σ ( t ) is shown in Figure 4, where the curve finally converges to the upper bound α = 0.8 , which indicates that the amount of transmitted signals is greatly reduced when the system is stable. Figure 5 illustrates the deception attack signals of simulation.
Case 2: The impact of deception attacks in the design process of the controller is considered, and the mathematic expectation of the deception attack is given as φ ¯ = 0.5 . The other parameters are the same as those in Case 1. Then, we can obtain the controller gain and weighting matrix by Theorem 2 as follows
K = 0.0374 0.5270 , ϕ = 0.2762 0.3004 0.3004 4.3447 .
The simulated results of Case 2 are shown in Figure 6, Figure 7 and Figure 8. Figure 6 depicts the system state trajectories, from which one can see that the state response curves of the turbine output power Δ H m and frequency deviation Δ a of the closed-loop system subjected to changes in load demand. Compared to Figure 2 in Case 1, the turbine output power Δ H m and the system frequency deviation Δ a approach zero in a shorter time, which indicates the use of controller in Case 2 can better mitigate the impact of deception attacks and suppress the fluctuations in system frequency and restore the stability of the system. The control input of the LFC system based on adaptive ETS are displayed in Figure 7.
Figure 8 exhibits the threshold σ ( t ) of the system with adaptive ETS, where the triggering threshold is automatically adjusted even if the system suffers from the disturbance. When the system is stable, the adaptive threshold converges to a constant.
To reflect the merits of the proposed method in saving the network bandwidth, we compare the adaptive ETS with the conventional ETS as follows:
(i)
Consider σ ( t ) in adaptive ETS (6) with the parameters α = 0.8 , ι = 1 .
(ii)
The ETS in (6) with a fixed threshold σ ¯ is considered, which is reduced to a conventional ETS. Without loss of generality, the threshold is selected to be an average value that can be calculated by
σ ¯ = ν = 0 N D S σ ν N D S ,
where ν N , σ ν denotes the ν -th the triggering threshold in adaptive ETS (6) at the ν -th sampling instant, and NDS is the number of data samplings.
Using LMIs, one can obtain the controller gains of two ETSs, which are listed in Table 3. The event-triggered constant σ ¯ = 0.7 is calculated by (29) within 60 s.
Figure 9 and Figure 10 plot the triggering and releasing intervals of the discussed system under two schemes, in which fewer sampling packets are released over the network under the adaptive ETS. For better analysis, the statistical results of the NDS, and the packet-releasing (NPR) and data-releasing rate (DRR) for two ETSs are written in Table 4, wherein D R R = N P R N D S .
As shown in Table 4, the number of sampling data is 1200 within 60 s. Under the adaptive ETS (6) proposed in this paper, the number of released packets is 31, and the DRR is 2.58%. Compared to the DRR = 3.58% of the conventional ETS, the proposed adaptive ETS can significantly reduce the transmission of unnecessary packets. This indicates that more communication resources can be saved by utilizing our developed adaptive ETS.

5. Conclusions

The problem of H LFC has been addressed for LFC systems under deception attacks by applying the developed adaptive ETS in this paper. To solve the issues of limited communication resources and deception attacks, a new adaptive ETS has been proposed, by which the thresholds for event-triggered conditions could be adapted to the changes in the system state under deception attacks. Based on the adaptive ETS, the average data released are lower than under the conventional ETS, and the perfomance of LFC systems subject to deception attacks can be guaranteed. Finally, the simulation results demonstrate the reliability of our proposed scheme. In future research, actuator saturation for LFC systems under cyber attacks will be worth consideration under the proposed adaptive ETS.

Author Contributions

All of the authors contributed substantially to this work: Conceptualization, X.Z. and X.S.; Methodology, F.Y. and X.Z.; Software, X.Z. and X.S.; Formal Analysis, X.Z.; Investigation, F.Y. and X.S.; Resources, F.Y.; Data Curation, X.Z.; Writing-Original Draft Preparation, Review and Editing, X.Z., F.Y. and X.S.; Project Administration, F.Y.; Funding Acquisition, F.Y. and X.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by National Natural Science Foundation of China Grant No. 52005266, No. 62103193 and Postgraduate Research & Practice Innovation Program of Jiangsu Province Grant No. KYCX20_0855.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hossain, M.M.; Chen, P. Observer-based event triggering H LFC for multi-area power systems under DoS attacks. Inf. Sci. 2021, 543, 437–453. [Google Scholar] [CrossRef]
  2. Liu, J.; Gu, Y.; Zha, L.; Liu, Y.; Cao, J. Event-triggered H load frequency control for multiarea power systems under hybrid cyber attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1665–1678. [Google Scholar] [CrossRef]
  3. Zhang, C.K.; Jiang, L.; Wu, Q.; He, Y.; Wu, M. Delay-dependent robust load frequency control for time delay power systems. IEEE Trans. Power Syst. 2013, 28, 2192–2201. [Google Scholar] [CrossRef]
  4. Pappachen, A.; Fathima, A.P. Critical research areas on load frequency control issues in a deregulated power system: A state-of-the-art-of-review. Renew. Sustain. Energy Rev. 2017, 72, 163–177. [Google Scholar] [CrossRef]
  5. Tang, Y.; He, H.; Wen, J.; Liu, J. Power system stability control for a wind farm based on adaptive dynamic programming. IEEE Trans. Smart Grid. 2017, 6, 166–177. [Google Scholar] [CrossRef]
  6. Chang, C.; Fu, W. Area load frequency control using fuzzy gain scheduling of PI controllers. Electr. Power Syst. Res. 1997, 42, 145–152. [Google Scholar] [CrossRef]
  7. Liao, K.; Xu, Y. A robust load frequency control scheme for power systems based on second-order sliding mode and extended disturbance observer. IEEE Trans. Ind. Inf. 2017, 14, 3076–3086. [Google Scholar] [CrossRef]
  8. Liu, F.; Li, Y.; Cao, Y.; She, J.; Wu, M. A two-layer active disturbance rejection controller design for load frequency control of interconnected power system. IEEE Trans. Power Syst. 2015, 31, 3320–3321. [Google Scholar] [CrossRef]
  9. Liu, X.; Su, X.; Yang, R. Event-triggered sliding-mode control for multi-area power systems. IEEE Trans. Ind. Electron. 2017, 64, 6732–6741. [Google Scholar]
  10. Wen, S.; Yu, X.; Zeng, Z.; Wang, J. Event-triggering load frequency control for multiarea power systems with communication delays. IEEE Trans. Ind. Electron. 2016, 63, 1308–1317. [Google Scholar] [CrossRef]
  11. Liu, S.; Liu, P.X. Distributed model-based control and scheduling for load frequency regulation of smart grids over limited bandwidth networks. IEEE Trans. Ind. Inf. 2017, 14, 1814–1823. [Google Scholar] [CrossRef]
  12. Basomingera, R.; Choi, Y.J. Learning from routing information for detecting routing misbehavior in ad hoc networks. Sensors 2020, 20, 6275. [Google Scholar] [CrossRef]
  13. Gu, Z.; Park, J.H.; Yue, D.; Wu, Z.G.; Xie, X.P. Event-triggered security output feedback control for networked interconnected systems subject to cyber-attacks. IEEE Trans. Syst. Man Cybern. Syst. 2020. [Google Scholar] [CrossRef]
  14. Peng, C.; Yue, D.; Tian, E.; Gu, Z. Observer-based fault detection for networked control systems with network quality of services. Appl. Math. Modell. 2010, 34, 1653–1661. [Google Scholar] [CrossRef]
  15. Junior, L.; Cristino, W.; Moraes, D.; Coreixas, C. A triggering mechanism for cyber-attacks in naval sensors and systems. Sensors 2021, 21, 3195. [Google Scholar] [CrossRef]
  16. Fantacci, R.; Nizzi, F.; Pecorella, T.; Pierucci, L.; Roveri, M. False data detection for fog and internet of things networks. Sensors 2019, 19, 4235. [Google Scholar] [CrossRef] [Green Version]
  17. Yan, S.; Gu, Z.; Park, J.H. Memory-event-triggered H load frequency control of multi-area power systems with cyber-attacks and communication delays. IEEE Trans. Netw. Sci. Eng. 2021, 8, 1571–1583. [Google Scholar] [CrossRef]
  18. Gu, Z.; Sun, X.; Lam, H.K.; Yue, D.; Xie, X. Event-based secure control of T–S fuzzy based 5-DOF active semi-vehicle suspension systems subject to DoS attacks. IEEE Trans. Fuzzy Syst. 2021. [Google Scholar] [CrossRef]
  19. Peng, C.; Li, J.; Fei, M. Resilient event-triggering H load frequency control for multi-area power systems with energy-limited DoS attacks. IEEE Trans. Power Syst. 2017, 32, 4110–4118. [Google Scholar] [CrossRef]
  20. Yue, D.; Tian, E.; Han, Q.L. A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control. 2013, 58, 475–481. [Google Scholar] [CrossRef]
  21. Gu, Z.; Yue, D.; Tian, E. On designing of an adaptive event-triggered communication scheme for nonlinear networked interconnected control systems. Inf. Sci. 2018, 422, 257–270. [Google Scholar] [CrossRef]
  22. Yan, S.; Gu, Z.; Nguang, S.K. Memory-event-triggered H output control of neural networks with mixed delays. IEEE Trans. Neural Netw. Learn. Syst. 2021. [Google Scholar] [CrossRef]
  23. Zhang, C.; Feng, G.; Qiu, J.; Shen, Y. Control synthesis for a class of linear network-based systems with communication constraints. IEEE Trans. Ind. Electron. 2013, 60, 3339–3348. [Google Scholar] [CrossRef]
  24. Bemani, A.; Björsell, N. Distributed event triggering algorithm for multi-agent system over a packet dropping network. Sensors 2021, 21, 4835. [Google Scholar] [CrossRef]
  25. Hu, S.; Yue, D.; Yin, X.; Xie, X.; Ma, Y. Adaptive event-triggered control for nonlinear discrete-time systems. Int. J. Robust Nonlinear Control. 2016, 26, 4104–4125. [Google Scholar] [CrossRef]
  26. Yan, S.; Shen, M.; Nguang, S.K.; Zhang, G. Event-triggered H control of networked control systems with distributed transmission delay. IEEE Trans. Autom. Control. 2019, 65, 4295–4301. [Google Scholar] [CrossRef]
  27. Liu, Y.; Chen, Y.; Li, M. Dynamic event-based model predictive load frequency control for power systems under cyber attacks. IEEE Trans. Smart Grid. 2020, 12, 715–725. [Google Scholar] [CrossRef]
  28. Gu, Z.; Shi, P.; Yue, D.; Yan, S.; Xie, X. Memory-based continuous event-triggered control for networked T–S fuzzy systems against cyber-attacks. IEEE Trans. Fuzzy Syst. 2020, 29, 3118–3129. [Google Scholar] [CrossRef]
  29. Gu, Z.; Shi, P.; Yue, D.; Ding, Z. Decentralized adaptive event-triggered H filtering for a class of networked nonlinear interconnected system. IEEE Trans. Cybern. 2018, 49, 1570–1579. [Google Scholar] [CrossRef] [Green Version]
  30. Gu, Z.; Shi, P.; Yue, D. An adaptive event-triggering scheme for networked interconnected control system with stochastic uncertainty. Int. J. Robust Nonlinear Control. 2017, 27, 236–251. [Google Scholar] [CrossRef]
  31. Peng, C.; Zhang, J.; Yan, H. Adaptive event-triggering H load frequency control for network-based power systems. IEEE Trans. Ind. Electron. 2017, 65, 1685–1694. [Google Scholar] [CrossRef]
  32. Gu, Z.; Fei, S.M.; Zhao, Y.Q.; Tian, E.G. Robust control of automotive active seat-suspension system subject to actuator saturation. J. Dyn. Syst. Meas. Control. 2014, 136, 041022. [Google Scholar] [CrossRef]
  33. Pham, T.N.; Nahavandi, S.; Trinh, H. Static output feedback frequency stabilization of time-delay power systems with coordinated electric vehicles state of charge control. IEEE Trans. Power Syst. 2016, 32, 3862–3874. [Google Scholar] [CrossRef]
  34. Tian, E.; Peng, C. Memory-based event-triggering H load frequency control for power systems under deception attacks. IEEE Trans. Cybern. 2020, 50, 4610–4618. [Google Scholar] [CrossRef]
Figure 1. Structure of the LFC system with adaptive ETS.
Figure 1. Structure of the LFC system with adaptive ETS.
Sensors 21 07047 g001
Figure 2. State responses of the LFC system in Case 1.
Figure 2. State responses of the LFC system in Case 1.
Sensors 21 07047 g002
Figure 3. Control input of LFC systems in Case 1.
Figure 3. Control input of LFC systems in Case 1.
Sensors 21 07047 g003
Figure 4. The threshold σ ( t ) of the LFC system with the adaptive ETS in Case 1.
Figure 4. The threshold σ ( t ) of the LFC system with the adaptive ETS in Case 1.
Sensors 21 07047 g004
Figure 5. Deception attacks with φ ¯ = 0.5 .
Figure 5. Deception attacks with φ ¯ = 0.5 .
Sensors 21 07047 g005
Figure 6. State responses of the LFC system based on the adaptive ETS in Case 2.
Figure 6. State responses of the LFC system based on the adaptive ETS in Case 2.
Sensors 21 07047 g006
Figure 7. Control input of the LFC system based on the adaptive ETS in Case 2.
Figure 7. Control input of the LFC system based on the adaptive ETS in Case 2.
Sensors 21 07047 g007
Figure 8. The threshold σ ( t ) of the system with the adaptive ETS in Case 2.
Figure 8. The threshold σ ( t ) of the system with the adaptive ETS in Case 2.
Sensors 21 07047 g008
Figure 9. Release instants and release intervals with σ ¯ = 0.7.
Figure 9. Release instants and release intervals with σ ¯ = 0.7.
Sensors 21 07047 g009
Figure 10. Release instants and release intervals with the adaptive ETS.
Figure 10. Release instants and release intervals with the adaptive ETS.
Sensors 21 07047 g010
Table 1. Meanings of the symbols for the LFC system.
Table 1. Meanings of the symbols for the LFC system.
SymbolMeaning
T g Time constant of governor
Δ H m ( s ) Mechanical output of the generator
Δ H d ( s ) External interference
u ( s ) Control output
ACE ( s ) Area control error
E Generator damping coefficient
M Moment of inertia of the generator
Δ a ( s ) Frequency deviation
μ Frequency bias factor
J Speed drop
T c h Time constant of turbine
Δ H v ( s ) Position deviation of the valve
Table 2. System parameters utilized in simulintion section.
Table 2. System parameters utilized in simulintion section.
Physical Quantity M (kg · m 2 ) J (Hz p.u. MW 1 ) T g (s) T ch (s) μ E
Values0.16672.40.080.30.4250.0083
Table 3. Controller gains of two ETSs.
Table 3. Controller gains of two ETSs.
SchemesController Gains K
General ETS with fixed threshold ( σ ¯ = 0.7)[0.0393 0.5584]
This work[0.0374 0.5270]
Table 4. The number of packets transmitted in 60 s with sampling period h = 0.05 .
Table 4. The number of packets transmitted in 60 s with sampling period h = 0.05 .
SchemesNDSNPRDRR
General ETS with fixed threshold ( σ ¯ = 0.7)1200433.58%
This work1200312.58%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, X.; Yang, F.; Sun, X. Resilient Adaptive Event-Triggered Load Frequency Control of Network-Based Power Systems against Deception Attacks. Sensors 2021, 21, 7047. https://doi.org/10.3390/s21217047

AMA Style

Zhang X, Yang F, Sun X. Resilient Adaptive Event-Triggered Load Frequency Control of Network-Based Power Systems against Deception Attacks. Sensors. 2021; 21(21):7047. https://doi.org/10.3390/s21217047

Chicago/Turabian Style

Zhang, Xiao, Fan Yang, and Xiang Sun. 2021. "Resilient Adaptive Event-Triggered Load Frequency Control of Network-Based Power Systems against Deception Attacks" Sensors 21, no. 21: 7047. https://doi.org/10.3390/s21217047

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop