Next Article in Journal
Calculation of External Vehicle Aerodynamic Noise Based on LES Subgrid Model
Previous Article in Journal
Electromagnetic–Mechanical Coupling Optimization of an IPM Synchronous Machine with Multi Flux Barriers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Resilient Event-Triggered Control for LFC-VSG Scheme of Uncertain Discrete-Time Power System under DoS Attacks †

1
School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
2
College of Automation & College of Artificial Intelligence, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
3
State Grid Xinxiang Power Supply Company, Xinxiang 453000, China
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in IECON 2019-45th Annual Conference of the IEEE Industrial Electronics Society, Lisbon, Portugal, 14–17 October 2019; pp. 6285–6290.
Energies 2020, 13(7), 1820; https://doi.org/10.3390/en13071820
Submission received: 23 February 2020 / Revised: 2 April 2020 / Accepted: 2 April 2020 / Published: 9 April 2020

Abstract

:
This paper is concerned with resilient triggered control problem for load frequency control and virtual synchronous generation (LFC-VSG) scheme of discrete-time multi-area power system with parameter uncertainty, governor dead band (GDB), and low inertia under time delay and aperiodic Denial-of-Service (DoS) attacks. To reduce communication load of sleep intervals, event triggered mechanism (ETM) is introduced. A discrete-time switched delay system model is established to describe the dynamic of multi-area power system under resilient static output feedback control law. Combining piecewise Lyapunov–Krasovskii functional (LKF) method with switched system theory, a criterion is derived that the tolerant bound of attack duration and attack frequency can be estimated explicitly. Meanwhile, some sufficient conditions are obtained which can preserve weighted H performance. By using linear matrix inequalities (LMIs) techniques, a co-design method is proposed to solve the control gains and trigger parameters. A simulation example of a two-area power system was carried out to verify the efficiency of our proposed resilient event based LFC-VSG scheme.

Graphical Abstract

1. Introduction

With the penetration of many renewable energy resources, uncertainty and low inertia of converter based renewable energy sources (RESs) bring new challenges for frequency stabilization problem of multi-area power system [1,2]. Since the traditional load frequency control method loses its efficiency, virtual synchronous generation (VSG) concept has been proposed to imitate the behavior of synchronous generators to compensate inertia and enhance frequency stability of power system [3,4]. On the other hand, to increase the efficiency of monitoring and control, network communication techniques have been widely employed to evolve large scale power system to be networked control system. However, the increasing network attacks on power system have brought serious blackout events [5,6]. Researchers have paid much attention to the security problem of networked power system [7,8,9]. As studied, the availability and integrity of information are very essential for the system state estimation and feedback control. However, malicious cyber attacks obstructing information availability and integrity have been launched through DoS attacks and false data injection attacks [10,11]. DoS attacks interrupt communication links among system various components, leading to the missing of transmission packets in times [12], even driving system operation out of stable region. False data injection attacks inject illegal error data into communication network to pollute measurements and demands [13]. In other words, the damage on availability and integrity of information caused by network attack leads to the performance degradation of networked power system [14,15,16,17]. Thus, it is urgent to study secure control scheme to keep frequency performance resilience against DoS attacks or false data injection attacks.

1.1. Related Work

Recently, many interesting works have researched secure control problem of networked system under DoS attacks. On the one hand, for continuous-time system, a communication regulation strategy has been presented to obtain input-to-state stability (ISS) under DoS attacks modeled by average dwell time concept [18]. However, this study, based on the Lyapunov function method, cannot provide the design method of resilient control gain. By using LKF method, a resilient event-triggered mechanism and PI based control scheme were jointly designed for LFC system under DoS attacks modeled by maximum number of successive packet loss [19]. Compared with average dwell time (ADT) model [18], the attack characteristics studied in [19] have not been fully explored. For periodic DoS jamming attacks, a resilient synthesis method of event-based feedback control has been presented; a joint design method to solve parameters of event trigger and controller has been proposed by employing piecewise Lyapunov–Krasovskii functional method and switched system method [20,21]. Further, motivated by the above method, delay bound based attack detection and resilient LFC scheme have been proposed for multi-area power system under ADT model based DoS attacks [22]. On the other hand, for discrete-time stochastic system, the event-based security control problem has been studied by using stochastic analysis method to achieve mean-square security under random DoS attacks [23]. To defend against the DoS attack, a compensation mechanism cooperating with attack detection has been proposed to preserve system stochastically stable [24]. Besides, stability analysis and resilient control design under DoS attacks modeled by Markov process has been investigated using Lyapunov theory [25]. For discrete-time deterministic system, the maximum tolerable number of DoS attacks has been obtained by using Lyapunov functional method [26]. However, this paper is only concerned with the duration of DoS attack but neglects the attack frequency. It is well known that high attack frequency would also cause system instability.

1.2. Our Contributions

To the best of our knowledge, secure control design for discrete-time deterministic power system under DoS attacks has never been considered. Thus, to fill this research gap, our published work studies resilient event triggered control of uncertain discrete-time system under DoS attacks [27]. In this paper, we apply the earlier work [27] to the design of resilient LFC-VSG scheme of multi-area power system under DoS attacks. First, a discrete-time power system model is established with nonlinear dynamic governor dead band (GDB), low inertia, and parameter uncertainty under RESs disturbances. The combined control scheme consisting of load frequency control and virtual synchronous generation (LFC-VSG) is adopted and formulated as static feedback control law. Second, a DoS attack model is represented by an average dwell time (ADT) model to constrain the attack frequency and duration. Considered the mixed communication influence of DoS attacks, time delay, and event-triggered mechanism, a discrete-time switched delay system is established to describe the dynamic of power system and a weighted H control problem is formulated for the frequency control of the considered power system. Piecewise Lyapunov–Krasovskii functional method and switched system method are employed to analyze the weighted H performance. A criterion about the tolerable delay bound and attack frequency and duration is obtained. Then, a co-design method for event triggered mechanism and resilient control gain is presented based on linear matrix inequalities techniques. In this paper, the main contributions can be summarized as followings:
(1) Compared with our early work [27] considering resilient LFC design of discrete-time power system as a simulation example, this paper proposes a design method for resilient LFC-VSG scheme of discrete-time power system with more situations including GDB, low inertia, and uncertainty.
(2) A discrete-time switched delay system model is established to describe the frequency dynamic of multi-area power system with LFC-VSG scheme under DoS attacks.
(3) A new criterion of tolerable delay and DoS attacks in discrete-time form is derived, which is different from the one in continuous-time form.
(4) A co-design method for event-based LFC-VSG scheme is presented by employing piecewise Lyapunov–Krasovskii functional method and average dwell time approach to achieve weighted H performance.

2. Problem Statement

2.1. Discrete-Time Model of Multi-Area Power System with GDB and Uncertainty under LFC-VSG Scheme

To illustrate interconnected multi-area power system with the uniform structure, Figure 1 shows the diagram of the ith area power system with RESs disturbances under LFC-VSG scheme [28] as shown in Figure 2. With Table 1, the system dynamic of the ith area power system is represented by
Δ f ˙ i = 1 M i D i Δ f i + Δ P m i + Δ P W i + Δ P S i + Δ P i n e r t i a , i Δ P t i e , i Δ P d i , Δ P ˙ m i = 1 T c h i Δ P m i + Δ P v i , Δ P ˙ v i = 1 T g i 1 R i Δ f i Δ P v i K I i A C E i , Δ P ˙ W i = 1 T W T i Δ P W i + Δ P w i n d , i , Δ P ˙ S i = 1 T P V i Δ P S i + Δ P s o l a r , i , Δ P ˙ r e f , i = 1 T r Δ P r e f , i + M v i K 2 i A C E i + M v i K 1 i Δ f ˙ i + D v i K 2 i A C E i + D v i K 1 i Δ f i , Δ P ˙ i n e r t i a , i = 1 T I N i Δ P i n e r t i a , i + Δ P r e f , i , Δ P ˙ t i e , i = j = 1 , j i n 2 π T i j Δ f i Δ f j , A C E i = β i Δ f i + Δ P t i e , i ,
Governor dead band (GDB) [29]: The governor dead-band nonlinearity leads to sustained sinusoidal oscillation of natural period of about T 0 = 2 s , namely a s i n ( 2 π f 0 t ) . By Fourier transformation with neglecting higher order term, the transfer function of governor with nonlinearity is represented by
0.8 0.2 / π s 1 + s T g i .
Speed Droop Coefficient Uncertainty [30]: The parameter uncertainty of power system referring to the speed droop coefficient R i is considered here. The uncertainty of speed droop coefficient is represented by ( 1 + ϵ ( t ) ) R i , where 0 ϵ ( t ) 1 .
Then, the ith area power system can be formed by a continuous-time system model
x ˙ i ( t ) = ( A i i c + Δ A i i c ) x i ( t ) + j = 1 , j i n A i j c x j ( t ) + B i c u i ( t ) + F i c w i , y i ( t ) = C i x i ( t ) + L i w i , z i ( t ) = E i x i ( t ) ,
where
x i ( t ) = c o l Δ f i Δ P m i Δ P v i Δ P W i Δ P S i Δ P r e f , i Δ P i n e r t i a , i Δ P t i e , i A C E i , y i ( t ) = c o l 0.2 π A C E i + 0.8 A C E i M v i Δ f ˙ i + D v i Δ f i M v i A C E i + D v i A C E i , z i ( t ) = c o l A C E i A C E i , w i ( t ) = c o l Δ P d i Δ P w i n d , i Δ P s o l a r , i ,
A i i c = D i M i 1 M i 0 1 M i 1 M i 0 1 M i 1 M i 0 0 1 T c h i 1 T c h i 0 0 0 0 0 0 Δ 1 Δ 2 1 T g i Δ 2 Δ 2 0 Δ 2 Δ 2 0 0 0 0 1 T W T i 0 0 0 0 0 0 0 0 0 1 T P V i 0 0 0 0 0 0 0 0 0 1 T r 0 0 0 0 0 0 0 0 1 T I N i 1 T I N i 0 0 Δ 3 0 0 0 0 0 0 0 0 β i 0 0 0 0 0 0 1 0 , Δ 1 = 0.8 0.2 D i π M i R i T g i , Δ 2 = 0.2 π T g i R i M i , Δ 3 = j = 1 , j i n 2 π T i j , A i j c = 0 9 × 9 , A i j c ( 8 , 1 ) = 2 π T i j , Δ A i i c = 0 9 × 9 , Δ A i i c ( 3 , : ) = ϵ ( t ) 1 + ϵ ( t ) Δ 1 Δ 2 0 Δ 2 Δ 2 0 Δ 2 Δ 2 0 , B i c = 0 0 1 T g i 0 0 0 0 0 0 0 0 0 0 0 1 T r 0 0 0 T , F i c = 1 M i 0 0.2 π T g i R i M i 0 0 0 0 0 0 0 0 0 1 T W T i 0 0 0 0 0 0 0 0 0 1 T P V i 0 0 0 0 T , C i = 0.2 β i π 0 0 0 0 0 0 0.2 π 0.8 Δ 4 M v i M i 0 M v i M i M v i M i 0 M v i M i M v i M i 0 β i M v i 0 0 0 0 0 0 M v i D v i , Δ 4 = M v i D i M i + D v i , L i = 0 0 0 M v i M i 0 0 0 0 0 , E i = β i 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 .
Combining load frequency control (LFC) scheme and virtual synchronous generation (VSG) scheme (Figure 2), a static output feedback control law is adopted for the ith area power system
u i ( t ) = K i y i ( t ) ,
where K i = K I i 0 0 0 K 1 i K 2 i .
The ith area power system can be represented by a discrete-time system model
x i ( k + 1 ) = ( A i i + Δ A i i ) x i ( k ) + j = 1 , j i n A i j x j ( k ) + B i u i ( k ) + F i w i , y i ( k ) = C i x i ( k ) + L i w i , z i ( k ) = E i x i ( k ) ,
where A i i = e A i i c h , Δ A i i = h Δ A i i c , B i = 0 h e A i i c ( h s ) B i c d s , A i j = 0 h e A i i c ( h s ) A i j c d s , F i = 0 h e A i i c ( h s ) F i c d s .
Based on the ith area power system model in Equation (4), a linear discrete-time model is established for a n-area power system with parameter uncertainty.
x ( k + 1 ) = ( A + Δ A ) x ( k ) + B u ( k ) + F w , y ( k ) = C x ( k ) + L w , z ( k ) = E x ( k ) ,
where
x ( k ) = c o l x 1 ( k ) x 2 ( k ) x n ( k ) , y ( k ) = c o l y 1 ( k ) y 2 ( k ) y n ( k ) , z ( k ) = c o l z 1 ( k ) z 2 ( k ) z n ( k ) , u ( k ) = c o l u 1 ( k ) u 2 ( k ) u n ( k ) , w = c o l w 1 w 2 w n , A = A 11 A 12 A 1 n A 21 A 22 A 2 n A n 1 A n 2 A n n , Δ A = d i a g Δ A 11 Δ A 22 Δ A n n , B = d i a g B 1 B 2 B n , F = d i a g F 1 F 2 F n , C = d i a g C 1 C 2 C n , L = d i a g L 1 L 2 L n , E = d i a g E 1 E 2 E n .
The argument form of control law can be rewritten as
u ( k ) = K y ( k ) ,
where K = d i a g K 1 K 2 K n .

2.2. Discrete-Time Power System under DoS Attacks and Event-Triggered Mechanism

DoS attacks launch in feedback channel to prevent measurements y ( k ) arriving at control center. Here, a class of aperiodic DoS attacks is considered. Define sleep intervals I 1 , n = [ g n , g n + b n ] and attack intervals I 2 , n = [ g n + b n , g n + 1 ] . Then, DoS attacks can be represented by a switched signal.
s ( k ) = 0 , k [ g n , g n + b n ] , 1 , k [ g n + b n , g n + 1 ] ,
where the on/off instant g n , n N represents the ( n 1 ) th ending time of DoS attacks with g 0 = 0 , while the off/on instant g n + b n N represents the nth beginning time of DoS attacks.
Denote the sum number of off/on instants as attack frequency N ( k , k 0 ) during [ k 0 , k ] and attack duration Ξ ( k , k 0 ) during [ k 0 , k ] . Then, the upper bound of attack frequency and duration is constrained by
N ( k , k 0 ) κ + k k 0 τ D , Ξ ( k , k 0 ) η + k k 0 T α .
where κ R 0 , τ D R > 0 and η R 0 , T α R > 1 .
During sleep intervals I 1 , n , the feedback channel recovers normal communication. Besides of network induced delay, the processing of the composite feedback signal y ( k ) consisting of Δ f , Δ ˙ f , A C E , and A C E would increase the computation load and waste much time to influence the real time control. To reduce the computation and communication load, event triggered mechanism is embedded in PMU nodes, which decides whether to send the measurements y ( k ) .
k n , m + 1 = { k n , m + m i n { l | f ( l ) > 0 } } { g n } , k [ g n , g n + b n ] , , k [ g n + b n , g n + 1 ] ,
where f ( l ) = [ y ( k n , m ) y ( k n , m + l ) ] T Ω c [ y ( k n , m ) y ( k n , m + l ) ] σ y T ( k n , m + l ) Ω c y ( k n , m + l ) with l N , σ > 0 and Ω c = d i a g [ Ω c 1 , Ω c 2 , , Ω c n ] > 0 . Note that, for discrete-time system, the minimum triggered interval is sample periodic h so that it avoids Zeno behavior.
Introduce the transmission delay d ( k n , m ) for the triggered signal y ( k n , m ) , where 0 d ( k n , m ) d M , d ( g n ) 0 . Further, the sleep interval can be divided by
I 1 , n = m = 0 m ( n ) 1 Φ n , m
where the triggered interval Φ n , m is specified by
Φ n , m = [ k n , m + d ( k n , m ) , k n , m + 1 + d ( k n , m + 1 ) ] , m = 0 , 1 , 2 , m ( n ) 1 ,
with k n , 0 + d ( k n , 0 ) = g n and k n , m ( n ) + d ( k n , m ( n ) ) = g n + b n .
Further, the triggered interval can be divided by
Φ n , m = l = 0 l ( m ) 1 Ξ m , l .
Case I: if k n , m + d M + 1 k n , m + 1 + d ( k n , m + 1 ) , l ( m ) = 1 . let d ( k ) = k k n , m which satisfies d ( k n , m ) d ( k ) d M . Case II: if k n , m + d M + 1 < k n , m + 1 + d ( k n , m + 1 ) , there exists l ( m ) 2 satisfying k n , m + d M + l ( m ) 1 = k n , m + 1 + d ( k n , m + 1 ) 1 . Hence, the inner interval Ξ m , l is specified by
Ξ m , l = [ k n , m + d ( k n , m ) , k n , m + d M + 1 ] , l = 0 , [ k n , m + d M + l , k n , m + d M + l + 1 ] , l = 1 , l ( m ) 2 [ k n , m + d M + l ( m ) 1 , k n , m + 1 + d n , m + 1 ] , l = l ( m ) 1 .
Then, introduce a virtual delay d ( k )
d ( k ) = k k n , m , k Ξ m , 0 k k n , m l , k Ξ m , l , l = 1 , 2 , , l ( m ) 1 .
which satisfies d ( k n , m ) d ( k ) d M .
Further, we introduce trigger error
e ( k ) = 0 , k Ξ m , 0 x ( k n , m ) x ( k n , m + l ) , k Ξ m , l , l = 1 , 2 , , l ( m ) 1 .
Thus, the resilient triggering control inputs are generated by
u ( k ) = K y ( k n , m ) , k Ξ m , l Φ n , m I 1 , n , 0 , t I 2 , n .
On the basis of above analysis, a discrete-time switched delay system s ( t ) is established as
1 : x ( k + 1 ) = ( A + Δ A ) x ( k ) + B K C x ( k d ( k ) ) + B K C e ( k ) + F w , y ( k ) = C x ( k ) + L w , z ( k ) = E x ( k ) , k Ξ m , l Φ n , m I 1 , n , 0 : x ( k + 1 ) = ( A + Δ A ) x ( k ) + F w , z ( k ) = E x ( k ) , k I 2 , n .
and, according to Equation (9), by denoting Ω = C T Ω c C , the trigger condition is rewritten as
e T ( k ) Ω e ( k ) σ x T ( k d ( k ) ) Ω x ( k d ( k ) ) .
For the established power system in Equation (11), the research objective of this study is to analyze the resilience performance and provide the design method for the resilient static feedback control in Equation (10) to preserve weighted H performance:
(1) The power system in Equation (11) is exponentially stable when w = 0 .
(2) With zero initial condition, the power system in Equation (11) has weighted L 2 -gain γ such that
s = 0 μ s ν z ( s ) γ 2 s = 0 w
where the scalars s N , μ > 0 , ν > 0 and γ > 0 .

3. Analysis of Weighted H Performance

In this section, the weighted H performance of the power system in Equation (11) is analyzed by combining delay system method and switched system method.
Theorem 1.
Given positive scalars d M , λ i , μ i ( i = 0 , 1 ) , γ, σ, the switched time delay system in Equation (11) is exponentially stable with weighted L 2 -gain γ ¯ under DoS attacks ( τ D , T α ), if there exist positive definite matrices P i , Q i , R i , M i ( i = 0 , 1 ) , Ω and appropriate dimension matrices X i , Y i ( i = 0 , 1 ) , K satisfying
l n ( μ 0 μ 1 ) + ( d M 1 ) l n ( λ 0 / λ 1 ) τ D + ( T α 1 ) l n λ 1 + l n λ 0 T α < 0 ,
Σ 1 + Γ 1 T P 1 Γ 1 + d M Γ 2 T R 1 Γ 2 + Γ 3 T + Γ 3 + d M M 1 < 0 ,
M 1 X 1 X 1 T λ 1 d M R 1 0 , M 1 Y 1 Y 1 T λ 1 d M R 1 0 ,
Σ 0 + Ψ 1 T P 0 Ψ 1 + d M Ψ 2 T R 0 Ψ 2 + Ψ 3 T + Ψ 3 + d M M 0 < 0 ,
M 0 X 0 X 0 T λ 0 R 0 0 , M 0 Y 0 Y 0 T λ 0 R 0 0 ,
P 0 μ 1 P 1 , Q 0 μ 1 Q 1 , R 0 μ 1 R 1 , P 1 μ 0 P 0 , Q 1 μ 0 Q 0 , R 1 μ 0 R 0 ,
where
Σ 1 = λ 1 P 1 + Q 1 + E T E 0 0 0 0 σ Ω 0 0 0 λ 1 d M Q 1 0 0 Ω 0 γ 2 I , Σ 0 = λ 0 P 0 + Q 0 + E T E 0 0 0 0 0 0 λ 0 d M Q 0 0 γ 2 I , Γ 1 = A B K C 0 B K C F , Γ 2 = A I B K C 0 B K C F , Γ 3 = X 1 Y 1 X 1 Y 1 0 0 , Ψ 1 = A 0 0 F , Ψ 2 = A I 0 0 F , Ψ 3 = X 0 Y 0 X 0 Y 0 0 .
Proof. 
Please see Appendix A.1 in the Appendix A. □
Remark 1.
The resulting criterion in Equation (14) is the main contribution of this paper. The comprehensive influence of DoS attacks and time delay is bounded by the indices d M , τ D , and T α . The satisfaction of this criterion can guarantee the frequency stability of the considered multi-area power system. Considering the positive term l n ( μ 0 μ 1 ) , l n ( λ 0 / λ 1 ) and the negative term l n ( λ 1 ) , it requires a small d M and large τ D and T a . It is reasonable that the frequency stability of power system can be preserved with small delay margin, low attack frequency 1 / τ D , and small attack duration ratio 1 / T α .

4. Design of Resilient Triggering Control

According to the resulting sufficient conditions in Theorem 1, this section provides a design method of resilient event-based LFC-VSG scheme on the basis of linear matrix inequalities techniques (LMIs).
Lemma 1
([31]).For real matrices Σ , Σ 0 , and Σ 1 , it holds that
Σ + Σ 0 Λ ( k ) Σ 1 + Σ 1 T Λ T ( k ) Σ 0 T < 0 ,
for any Λ ( t ) satisfying Λ T ( t ) Λ ( t ) I , if and only if there exists a positive scalar ε > 0 , such that
Σ + ε 1 Σ 0 Σ 0 T + ε Σ 1 T Σ 1 < 0 .
Theorem 2.
Given positive scalars ε, d M , δ, γ, ζ, λ 1 ( 0 , 1 ) , λ 0 [ 1 , + ) , μ 1 [ 1 , + ) , and μ 0 [ 1 , + ) , σ ( 0 , 1 ) , the switched time delay system in Equation (11) is exponentially stable with weighted L 2 -gain γ ¯ , if Equation (14) holds and there exist positive definite matrices P ˜ i , Q ˜ i , R ˜ i , M ˜ i ( i = 0 , 1 ) , Ω and appropriate dimension matrices X ˜ i , Y ˜ i ( i = 0 , 1 ) , K ˜ satisfying
Σ ˜ 11 + s y m ( Γ ˜ 3 ) + d M M ˜ 1 Γ ˜ 1 P ˜ 1 + ε G G T d M Γ ˜ 2 ε d M G G T R ˜ 1 + ε d M G G T Γ ˜ 4 0 0 I Γ ˜ 5 0 0 0 ε I < 0
Σ ˜ 01 + s y m ( Ψ ˜ 3 ) + d M M ˜ 0 Ψ ˜ 1 P ˜ 0 + ε G G T d M Ψ ˜ 2 ε d M G G T R ˜ 0 + ε d M G G T Ψ ˜ 4 0 0 I Ψ ˜ 5 0 0 0 ε I < 0
M ˜ 1 X ˜ 1 λ 1 d M ( 2 P ˜ 1 R ˜ 1 ) > 0 , M ˜ 1 Y ˜ 1 λ 1 d M ( 2 P ˜ 1 R ˜ 1 ) > 0
M ˜ 0 X ˜ 0 λ 0 ( 2 P ˜ 0 R ˜ 0 ) > 0 , M ˜ 0 Y ˜ 0 λ 0 ( 2 P ˜ 0 R ˜ 0 ) > 0
μ i P ˜ i P ˜ i P ˜ j < 0 , μ i Q ˜ i P ˜ i δ 2 Q ˜ j 2 δ P ˜ j < 0 , μ i ( R ˜ i 2 P ˜ i ) P ˜ i R ˜ j < 0 , ( i , j = 0 , 1 ; i j )
ζ I C P ˜ 1 N C I < 0 , ζ 0 .
where
Σ ˜ 11 = d i a g [ λ 1 P ˜ 1 + Q ˜ 1 , σ Ω ˜ , λ 1 d M Q ˜ 1 , Ω ˜ , γ 2 I ] , Γ ˜ 1 = [ A P ˜ 1 , B K ˜ C , 0 , B K ˜ C , F ] , Γ ˜ 2 = [ A P ˜ 1 P ˜ 1 , B K ˜ C , 0 , B K ˜ C , F ] , Γ ˜ 3 = [ X ˜ 1 , Y ˜ 1 X ˜ 1 , Y ˜ 1 , 0 , 0 ] , Γ ˜ 4 = [ E P ˜ 1 , 0 , 0 , 0 , 0 ] , Γ ˜ 5 = [ J P ˜ 1 , 0 , 0 , 0 , 0 ] , Σ ˜ 01 = d i a g [ λ 0 P ˜ 0 + Q ˜ 0 , 0 , λ 0 d M Q ˜ 0 , γ 2 I ] , Ψ ˜ 1 = [ A P ˜ 0 , 0 , 0 , F ] , Ψ ˜ 2 = [ A P ˜ 0 P ˜ 0 , 0 , 0 , F ] , Ψ ˜ 3 = [ X ˜ 0 , Y ˜ 0 X ˜ 0 , Y ˜ 0 , 0 ] , Ψ ˜ 4 = [ E P ˜ 0 , 0 , 0 , 0 ] , Ψ ˜ 5 = [ J P ˜ 0 , 0 , 0 , 0 ] .
Then, both the control gain K = K ˜ N 1 and the trigger parameter Ω = P ˜ 1 1 Ω ˜ P ˜ 1 1 can be obtained from the solutions of the above LMIs.
Proof. 
Please see Appendix A.2 in the Appendix A. □
Remark 2.
Theorem 2 relies nonlinearly on the parameters ε, d M , λ i , μ i , ( i = 0 , 1 ) γ, ζ, σ, and δ. Once these parameters are given, the matrix inequalities in Equations (20)–(25) would become LMIs, by solving which LFC-VSG gain K and trigger parameter Ω can be further obtained by using MATLAB Toolbox YALMIP with solver MOSEK. Furthermore, the proposed design method allows for a trade-off: performance index γ , λ i versus delay margin d M and DoS attacks τ D , T α .

5. Simulation

To study the performance of the proposed event-based LFC-VSG scheme, a two-area power system with physical constraints (uncertainty, low inertia and GDB) and cyber disturbance (time delay and DoS attacks) was simulated using MATLAB. The nominal available parameters of the considered two-area power system were borrowed from [4,28], as listed in Table 2. The thermal power plants with various capacities in each area are equivalent to a single synchronous generator. The time constants of the disturbances terms of solar plant and farm plant for two-area power system are simply assumed to be same due to the used uniform inverters in engineering. From another aspect, the disturbance of RESs is not the key factor affecting the stability of power system in this study. The parameters of virtual synchronous generations selected by PSO algorithm [28] are larger than the inertia and damping coefficients of the equivalent SG to enhance system inertia.
Set h = 0.01 s , γ = 120 , d M = 10 , λ 0 = 1.2 , λ 1 = 0.4 , μ 0 = 1.01 , μ 1 = 1.01 , σ = 0.1 , δ = 0.01 , ε = 10 12 , and ζ = 10 6 . The inertia of power system reduces 5 % . According to Theorem 2, the control gain K and the trigger parameters Ω c = ( C + ) T Ω C + were obtained using MATLAB Toolbox YALMIP with solver MOSEK.
K 1 = 3.4883 0 0 0 24.2314 196.0050 , K 2 = 0.5370 0 0 0 8.5593 24.4976 , Ω c 1 = 10 30 2.1189 0.0216 0.1618 0.0216 0.0005 0.0017 0.1618 0.0017 0.0126 , Ω c 2 = 10 30 1.5781 0.0187 0.1199 0.0187 0.0008 0.0014 0.1199 0.0014 0.0093 .
With the solved triggered control parameters, the frequency derivation Δ f and the tie-line power exchange Δ P t i e of the two-area power system in Equation (5) are depicted in Figure 3 and Figure 4, where the time intervals with grey background represent DoS attacks. Multi-disturbances such as load change, wind farm disturbance and solar farm disturbance are depicted in Figure 5 and Figure 6. It can be observed that the trajectories of frequency derivation and tie-line power exchange approach to zeros after oscillation. By calculation, the decay rate is λ = 0.6819 , which verifies the achievement of exponential stability under our method. The oscillation in the time interval [ 0 , 10 s ] is more serious than that in the time interval [ 40 s , 50 s ] even though the former disturbances is less than the latter because DoS attacks frequently occur in the beginning time interval [ 0 , 10 s ] to prevent the implementation of LFC-VSG control signals while the sleep interval [ 40 s , 45 s ] guarantees power system restoring much resilient performance against DoS attack in the time interval [ 45 s , 50 s ] . Thus, it is necessary to constrain attack frequency, which verifies the reasonableness of our research motivation. On the other hand, the theory value of H performance level is γ ¯ = 159.8680 . By calculation, the actual H performance level y / w is γ = 2.0966 , which is less than γ ¯ = 159.8680 . Thus, the power system is exponentially stable with the desired H performance level, which verifies the efficiency of our design method.
The triggered instants and triggered intervals are depicted in Figure 7. The event-triggered mechanism is operated during sleep intervals while it stops working to save much energy during attack intervals. It can be observed that the average of release time intervals during [ 0 , 30 s ] is larger than that during [ 70 s , 100 s ] because the power system with the worse system performance requires many real-time control updates while power system operation in steady state needs low frequency of control update. Thus, the designed ETM can provide an automatic regulation of communication according to the operation state of power system. Compared with the sample time h = 0.01 s , the transmission rate T r a t e during sleep intervals was calculated as 7.11 % , which is efficient to reduce the communication load while preserving system performance.
In the next simulation, the influence of communication factors including delay and DoS attacks on power system resilient performance was studied. According to the resilient condition in Equation (14) in Theorem 1, the quantified results show the relationships among exponential decay rate λ , weight H level γ ¯ , DoS attacks parameters T α and τ D , and delay bound d M . Note that 1 T α represents the total duty cycle of attack duration while 1 τ D represents attack frequency. For fixed τ D , other parameters being same as before, the H performance indices λ and γ ¯ are decreased with the increasing of T α , as shown in Table 3. It indicates that the H performance of power system would be seriously deteriorated with the large attack duration 1 T α . In Table 4, for fixed T α , the H performance level λ and γ ¯ are increased with the decrease of τ D . It indicates that the high attack frequency 1 τ D would brings damage on the frequency performance of power system. The resulting conclusions are reasonable to meet common sense. On the other hand, although both attack frequency and duration could lead to the performance deterioration of power system, the influence of attack duration is more serious than attack frequency.
Transmission delay and DoS attacks would bring comprehensive influence on frequency stability of power system. Hence, it is interesting to study the relationship of delay bound and DoS attacks duration. For a given average dwell time τ D = 333 , the attack duration ratio 1 T α is decreased with the increase of d M in Table 5. It indicates that the influence of delay and DoS attacks are additive because, when there is a large communication delay, the power system would only tolerate weak DoS attacks to preserve the desired performance.
Remark 3.
Indeed, the numerical evaluation can verify the usefulness of our proposed theory in a limited level. The practicality should be verified by using real time laboratory experiment, such as Analog Power System Simulation (APSS) implemented by operational amplifiers and electronic circuits, which is closer to the real-world power system. However, our study platform at present lacks this kind of experiment environment. Hence, we only performed numerical simulation experiment to verify the validity of our method using MATLAB ToolBox. In the study of LFC system, many researchers also use numerical simulation to verify their theories. In our future work, we will build a physical power system platform or real time semi-physical simulation platform to support our theory study.

6. Conclusions

The resilient control problem of event-based load frequency control and virtual synchronous generation (LFC-VSG) scheme of discrete-time multi-area power system with uncertainty, low inertia, and GDB under time delay and DoS attacks is studied. Considering the average dwell time (ADT) model-based DoS attacks influencing on the remote communication network of LFC-VSG scheme, a discrete-time switched delay system is established to describe multi-area power system dynamic. Even-triggered mechanism (ETM) is introduced to reduce the communication load of LFC-VSG control loop. By using piecewise Lyapunov–Krasovskii functional method and switched system method, a criterion quantifying the tolerant DoS attack (ADT and duty cycle) and delay bound is proposed. Meanwhile, some sufficient conditions are derived to preserve weighted H performance. Accordingly, a co-design method for ETM and LFC-VSG scheme is given in terms of LMIs. Aa simulation of two-area power system with the designed resilient event-based LFC-VSG scheme was carried out to illustrate the validity of our theory. In the future, renewable energy resources participating in remote frequency regulation will be considered and another network attack, namely false data injection attack, will be studied. The proposed method combining piecewise LFK and switched system method provides a flexible way for the system synthesis when countering complex cyber-physical factors. For improvement, advanced Lyapunov functional and integral inequality technique can be employed to reduce the conservatism of this conclusion.

Author Contributions

Z.C. designed the control strategy and wrote the manuscript; S.H. checked the whole manuscript; J.M. provided study resources of power system. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant (No. 61673223, No. 61533010, No. 61633016); the Six Talent Peaks Project of Jiang-su Province of China (Grant No. RLD201810); the QingLan Project of Jiangsu Province of China (Grant No. QL 04317006); Postgraduate Research & Practice Innovation Program of Jiangsu Province under Grant (No. KYCX19_0904, KYCX19_0923).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Appendix A.1. Proof of Theorem 1

Construct a piecewise Lyapunov–Krasovskii functional (LKF) ( i = 0 , 1 )
V i ( k ) = x T ( k ) P i x ( k ) + s = k d M k 1 x T ( s ) Q i x ( s ) λ i k s 1 , + θ = d M 1 s = k + θ k 1 δ T ( s ) R i δ ( s ) λ i k s 1
where δ ( s ) = x ( s + 1 ) x ( s ) , 0 < λ 1 < 1 and λ 0 > 1 .
Case 1.
When k Ξ m , l Φ n , m I 1 , n , with the LKF in Equation (A1) (i = 1), it can be obtained that
V 1 ( k + 1 ) λ 1 V 1 ( k ) x T ( k + 1 ) P 1 x ( k + 1 ) λ 1 x T ( k ) P 1 x ( k ) + x T ( k ) Q 1 x ( k ) λ 1 d M x T ( k d M ) Q 1 x ( k d M ) + d M δ T ( k ) R 1 δ ( k ) s = k d M k 1 λ 1 d M δ T ( s ) R 1 δ ( s ) + 2 ξ 1 T ( k ) X 1 [ x ( k ) x ( t d ( k ) ) s = k d ( k ) k 1 δ ( s ) ] + 2 ξ 1 T ( k ) Y 1 [ x ( k d ( k ) ) x ( k d M ) s = k d M k d ( k ) 1 δ ( s ) ]
+ d M ξ 1 T ( k ) M 1 ξ 1 ( k ) s = k d M k 1 ξ 1 T ( k ) M 1 ξ 1 ( k ) z T ( k ) z ( k ) + γ 2 w T w + z T ( k ) z ( k ) γ 2 w T w
where ξ 1 ( k ) = c o l [ x ( k ) , x ( k d ( k ) ) , x ( k d M ) , e ( k ) , w ] .
Substituting Equation (12) into Equation (A2), one has
V 1 ( t + 1 ) λ 1 V 1 ( k ) ξ 1 T ( k ) [ Σ 1 + Γ 1 T P 1 Γ 1 + d M Γ 2 T R 1 Γ 2 + Γ 3 T + Γ 3 + d M M 1 ] ξ 1 ( k ) s = t d ( k ) t 1 ξ 1 T ( k ) δ T ( s ) M 1 X 1 X 1 T λ 1 d M R 1 ξ 1 ( k ) δ ( s ) s = t d M t d ( k ) 1 ξ 1 T ( k ) δ T ( s ) M 1 Y 1 Y 1 T λ 1 d M R 1 ξ 1 ( k ) δ ( s ) z T ( k ) z ( k ) + γ 2 w T w
According to Equations (15) and (16), we have
V 1 ( t + 1 ) λ 1 V 1 ( k ) z T ( k ) z ( k ) + γ 2 w T w .
Case 2.
Similarly, when k I 2 , n , by denoting ξ 0 ( k ) = c o l [ x ( k ) , x ( t d ( k ) ) , x ( t d M ) , w ] , with the LKF in Equation (A1) (i = 0), one has
V 0 ( k + 1 ) λ 0 V 0 ( k ) x T ( k + 1 ) P 0 x ( k + 1 ) λ 0 x T ( k ) P 0 x ( k ) + x T ( k ) Q 0 x ( k ) λ 0 d M x T ( k d M ) Q 0 x ( k d M ) + d M δ T ( k ) R 0 δ ( k ) s = k d M k 1 λ 0 δ T ( s ) R 0 δ ( s ) + 2 ξ 0 T ( k ) X 0 [ x ( k ) x ( k d ( k ) ) s = k d ( k ) k 1 δ ( s ) ] + 2 ξ 0 T ( k ) Y 0 [ x ( k d ( k ) ) x ( k d M ) s = t d M t d ( k ) 1 δ ( s ) ] + d M ξ 0 T ( k ) M 0 ξ 0 ( k ) s = t d M t 1 ξ 0 T ( k ) M 0 ξ 0 ( k ) z T ( k ) z ( k ) + γ 2 w T w + z T ( k ) z ( k ) γ 2 w T w
Further, one has
V 0 ( t + 1 ) λ 0 V 0 ( k ) ξ 0 T ( k ) [ Σ 0 + Ψ 1 T P 0 Ψ 1 + d M Ψ 2 T R 0 Ψ 2 + Ψ 3 T + Ψ 3 + d M M 0 ] ξ 0 ( k ) s = t d ( k ) t 1 ξ 0 T ( k ) δ T ( s ) M 0 X 0 X 0 T λ 0 R 0 ξ 0 ( k ) δ ( s ) s = t d M t d ( k ) 1 ξ 0 T ( k ) δ T ( s ) M 0 Y 0 Y 0 T λ 0 R 0 ξ 0 ( k ) δ ( s ) z T ( k ) z ( k ) + γ 2 w T w
According to Equations (17) and (18), we have
V 0 ( t + 1 ) λ 0 V 0 ( k ) z T ( k ) z ( k ) + γ 2 w T w
Stability analysis:
According to Equation (19), one has
V 0 ( g n + b n ) + μ 1 ( λ 0 λ 1 ) d M 1 V 1 ( g n + b n ) , V 1 ( g n ) + μ 0 V 0 ( g n ) .
With w = 0 , by recursing Equations (A3) and (A4), it can be obtained that
V i ( k ) [ μ 0 μ 1 ( λ 0 λ 1 ) d M 1 ] N ( k , 0 ) λ 0 Ξ ( k , 0 ) λ 1 k Ξ ( k , 0 ) V 1 ( 0 ) μ [ μ 0 μ 1 ( λ 0 λ 1 ) d M 1 ] κ ( λ 0 λ 1 ) η { [ μ 0 μ 1 ( λ 0 λ 1 ) d M 1 ] 1 τ D λ 0 1 T α λ 1 1 1 T α } k V 1 ( 0 ) μ ϱ λ k V 1 ( 0 )
where ϱ = [ μ 0 μ 1 ( λ 0 λ 1 ) d M 1 ] κ ( λ 0 λ 1 ) η μ and μ = m a x { 1 , 1 μ 0 , [ μ 1 ( λ 0 λ 1 ) d M 1 ] 1 } . According to Equation (14), it can be guaranteed that 0 < λ < 1 . Thus, the switched system in Equation (11) is exponentially stable.
H performance analysis:
For the convenience of H performance analysis, note that
N ( k , k 0 ) = N ( k + , k 0 ) , Ξ ( k , k 0 ) = Ξ ( k , k 0 + ) , N ( k , 0 ) = N ( k , k s ) + N ( k s , 0 ) , Ξ ( k , 0 ) = Ξ ( k , k s ) + Ξ ( k s , 0 ) ,
According to Equations (A3) and (A4), one has
V i ( k ) μ [ μ 0 μ 1 ( λ 0 λ 1 ) d M 1 ] N ( k , 0 ) λ 0 Ξ ( k , 0 ) λ 1 k Ξ ( k , 0 ) V 1 ( 0 ) + s = 0 k 1 μ [ μ 0 μ 1 ( λ 0 λ 1 ) d M 1 ] N ( k , s ) λ 0 Ξ ( k , s + 1 ) λ 1 k s Ξ ( k , s + 1 ) 1 Δ ( s )
where Δ ( s ) = z T ( s ) z ( s ) + γ 2 w T w .
For x ( 0 ) = 0 , the following inequality is satisfied
s = 0 k 1 [ μ 0 μ 1 ( λ 0 λ 1 ) d M 1 ] N ( k , s ) λ 0 Ξ ( k , s + 1 ) λ 1 k s Ξ ( k , s + 1 ) 1 Δ ( s ) 0
Let F ( k , s ) = [ μ 0 μ 1 ( λ 0 λ 1 ) d M 1 ] N ( k , s ) λ 0 Ξ ( k , s + 1 ) λ 1 k s Ξ ( k , s + 1 ) 1 . Adding both sides of the above inequality from k = 1 to k = , it can be derived that
k = 1 s = 0 k 1 F ( k , s ) z ( s ) γ 2 k = 1 s = 0 k 1 F ( k , s ) w .
Further, it has
s = 0 k = s + 1 F ( k , s ) z ( k ) γ 2 s = 0 k = s + 1 F ( k , s ) w .
For simplification, denote μ ¯ = μ 0 μ 1 ( λ 0 λ 1 ) d M 1 . Multiplying both sides of the above inequality with μ ¯ N ( k , 0 ) , it develops that
s = 0 k = s + 1 μ ¯ κ s d D λ 1 k s 1 z ( s ) γ 2 s = 0 k = s + 1 λ 1 k s η 1 k s 1 T α λ 0 η + k s 1 T α w .
Denote λ s = λ 0 1 T α λ 1 1 1 T α . According to Equation (14), one has ( T α 1 ) l n λ 1 + l n λ 0 < 0 , which indicates 0 < λ s < 1 . Further, one has
s = 0 μ ¯ κ s d D z ( s ) 1 1 λ 1 γ 2 s = 0 ( λ 0 λ 1 ) η w 1 1 λ s .
Finally, it can be obtained that
s = 0 μ ¯ s τ D z ( s ) γ ¯ 2 s = 0 w ,
where γ ¯ = γ μ ¯ κ 1 λ 1 1 λ s ( λ 0 λ 1 ) η . According to Equation (13), the closed-loop system in Equation (11) has H performance level, namely weighted L 2 -gain γ ¯ . This proof is completed.

Appendix A.2. Proof of Theorem 2

First, the uncertainty matrices Δ A i i can be decomposed by Δ A i i = G i H i ( k ) J i , where
G i = 0 0 Δ 1 0 0 0 0 0 0 0 0 Δ 2 0 0 0 0 0 0 T , H i ( k ) = ϵ ( k ) 1 + ϵ ( k ) 0 0 ϵ ( k ) 1 + ϵ ( k ) , J i = h 0 0 0 0 0 0 0 0 0 h 0 h h 0 h h 0 .
Further, the argument uncertainty matrix Δ A is constructed by Δ A = G H ( k ) J , where G = d i a g { G 1 , G 2 , , G n } , H ( k ) = d i a g { H 1 ( k ) , H 2 ( k ) , , H n ( k ) } , and J = d i a g { J 1 , J 2 , , J n } . H ( k ) is an unknown matrix, which is Lebesque measurable and satisfies H T ( k ) H ( k ) I .
According to the construction on the uncertainties Δ A , replacing A by A + Δ A , Equations (15) and (17) can be rewritten by
Σ 1 + Γ 3 T + Γ 3 + d M M 1 Γ 1 P 1 1 d M Γ 2 0 R 1 1 + 0 Γ 0 d M Γ 0 0 + 0 Γ 0 d M Γ 0 0 T < 0
Σ 0 + Ψ 3 T + Ψ 3 + d M M 0 Ψ 1 P 0 1 d M Ψ 2 0 R 0 1 + 0 Ψ 0 d M Ψ 0 0 + 0 Ψ 0 d M Ψ 0 0 T < 0
where Γ = Δ A 0 0 0 0 a n d Ψ = Δ A 0 0 0 .
Denote that
Π 1 = Σ 1 + Γ 3 T + Γ 3 + d M M 1 Γ 1 P 1 1 d M Γ 2 0 R 1 1 , Π 2 = c o l 0 0 0 0 0 G d M G ,
Π 3 = J 0 0 0 0 0 0 , Θ 1 = Σ 0 + Ψ 3 T + Ψ 3 + d M M 0 Ψ 1 P 0 1 d M Ψ 2 0 R 0 1 , Θ 2 = c o l 0 0 0 0 G d M G , Θ 3 = J 0 0 0 0 0 .
Then, Equations (A6) and (A7) can be converted to
Π 1 + Π 2 H ( k ) Π 3 + Π 3 T H ( k ) Π 2 T < 0
Θ 1 + Θ 2 H ( k ) Θ 3 + Θ 3 T H ( k ) Θ 2 T < 0
Based on Lemma 1, Equation (A8) can be converted to
Π 1 + ε Π 2 Π 2 T + ε 1 Π 3 T Π 3 < 0 ,
by using Schur complement lemma, which is expanded to
Σ ^ 1 ( 1 ) Γ 1 P 1 1 + ε G G T d M Γ 2 ε d M G G T R 1 1 + ε d M G G T Γ 4 0 0 I Γ 5 0 0 0 ε I < 0
where Σ ^ 1 ( 1 ) = d i a g [ λ 1 P 1 + Q 1 , σ Ω , λ 1 d M Q 1 , Ω , γ 2 I ] + Γ 3 T + Γ 3 + d M M 1 , Γ 4 = E 0 0 0 0 , and Γ 5 = J 0 0 0 0 .
Similarly, Equation (A9) is converted to
Θ 1 + ε Θ 2 Θ 2 T + ε 1 Θ 3 T Θ 3 < 0
which is expanded to
Σ ^ 0 ( 1 ) Ψ 1 P 0 1 + ε G G T d M Ψ 2 ε d M G G T R 0 1 + ε d M G G T Ψ 4 0 0 I Ψ 5 0 0 0 ε I < 0
where Σ ^ 0 ( 1 ) = d i a g [ λ 0 P 0 + Q 0 , 0 , λ 0 d M Q 0 , γ 2 I ] + Ψ 3 T + Ψ 3 + d M M 0 , Ψ 4 = E 0 0 0 , Ψ 5 = J 0 0 0 .
Further, define that P ˜ i = P i 1 , Q ˜ i = P ˜ i Q i P ˜ i , R ˜ i = R i 1 , P ^ 1 = { P 1 ˜ , P 1 ˜ , P 1 ˜ , P 1 ˜ , I } , P ^ 0 = { P 0 ˜ , P 0 ˜ , P 0 ˜ , I } , X ˜ i = P ^ i X P ˜ i , Y ˜ i = P ^ i Y P ˜ i , M ˜ i = P ^ i M i P ^ i and Ω ˜ = P ˜ 1 Ω P ˜ 1 . Based on the inequality technique S X S 2 S X 1 and X 1 δ 2 S X S 2 δ S , using Schur complementary Lemma l, pro-and pre-multiplying Equation (A10) with d i a g { P 1 ^ , I , I , I , I } , respectively, and pro- and pre-multiplying Equation (A11) with d i a g { P 0 ^ , I , I , I , I } , respectively, Equations (20) and (21) can be obtained. Accordingly, Equations (16), (18), and (19) can be converted to the LMIs in Equations (22)–(24). Equation (25) is introduced to deal with nonlinear term K C P ˜ 1 = K N C = K ˜ C .

References

  1. Bevrani, H.; Ghosh, A.; Ledwich, G. Renewable energy sources and frequency regulation: Survey and new perspectives. IET Renew. Power Gener. 2010, 4, 438–457. [Google Scholar] [CrossRef] [Green Version]
  2. Dreidy, M.; Mokhlis, H.; Mekhilef, S. Inertia response and frequency control techniques for renewable energy sources: A review. Renew. Sustain. Energy Rev. 2017, 69, 144–155. [Google Scholar] [CrossRef]
  3. Bevrani, H.; Ise, T.; Miura, Y. Virtual synchronous generators: A survey and new perspectives. Int. J. Electr. Power Energy Syst. 2014, 54, 244–254. [Google Scholar] [CrossRef]
  4. Kerdphol, T.; Rahman, F.S.; Mitani, Y. Virtual inertia control application to enhance frequency stability of interconnected power systems with high renewable energy penetration. Energies 2018, 11, 981. [Google Scholar] [CrossRef] [Green Version]
  5. Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. The 2015 ukraine blackout: Implications for false data injection attacks. IEEE Trans. Power Syst. 2016, 32, 3317–3318. [Google Scholar] [CrossRef]
  6. Sgouras, K.I.; Birda, A.D.; Labridis, D.P. Cyber attack impact on critical smart grid infrastructures. In Proceedings of the ISGT 2014, Washington, DC, USA, 19–22 February 2014; pp. 1–5. [Google Scholar]
  7. Wang, W.; Lu, Z. Cyber security in the smart grid: Survey and challenges. Comput. Netw. 2013, 57, 1344–1371. [Google Scholar] [CrossRef]
  8. Teixeira, A.; Shames, I.; Sandberg, H.; Johansson, K.H. A secure control framework for resource-limited adversaries. Automatica 2015, 51, 135–148. [Google Scholar] [CrossRef] [Green Version]
  9. Ding, D.; Han, Q.L.; Xiang, Y.; Ge, X.; Zhang, X.M. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 2018, 275, 1674–1683. [Google Scholar] [CrossRef]
  10. Guan, Y.; Ge, X. Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Trans. Signal Inf. Process. Over Netw. 2018, 4, 48–59. [Google Scholar] [CrossRef] [Green Version]
  11. Liu, J.; Tian, E.; Xie, X.; Lin, H. Distributed event-triggered control for networked control systems with stochastic cyber-attacks. J. Frankl. Inst. 2019, 356, 10260–10276. [Google Scholar] [CrossRef]
  12. Amin, S.; Cárdenas, A.A.; Sastry, S.S. Safe and secure networked control systems under denial-of-service attacks. In Proceedings of the International Workshop on Hybrid Systems: Computation and Control, San Francisco, CA, USA, 13–15 April 2009; Springer: Berlin/Heidelberg, Germany, 2009; pp. 31–45. [Google Scholar]
  13. Pang, Z.H.; Liu, G.P.; Zhou, D.; Hou, F.; Sun, D. Two-channel false data injection attacks against output tracking control of networked systems. IEEE Trans. Ind. Electron. 2016, 63, 3242–3251. [Google Scholar] [CrossRef]
  14. Liu, S.; Liu, X.P.; El Saddik, A. Denial-of-service (DoS) attacks on load frequency control in smart grids. In Proceedings of the 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 24–27 February 2013; pp. 1–6. [Google Scholar]
  15. Manandhar, K.; Cao, X.; Hu, F.; Liu, Y. Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control. Netw. Syst. 2014, 1, 370–379. [Google Scholar] [CrossRef]
  16. Zhang, H.; Qi, Y.; Wu, J.; Fu, L.; He, L. DoS attack energy management against remote state estimation. IEEE Trans. Control. Netw. Syst. 2018, 5, 383–394. [Google Scholar] [CrossRef]
  17. Xiao, S.; Han, Q.L.; Ge, X.; Zhang, Y. Secure Distributed Finite-Time Filtering for Positive Systems Over Sensor Networks Under Deception Attacks. IEEE Trans. Cybern. 2019. [Google Scholar] [CrossRef] [PubMed]
  18. De Persis, C.; Tesi, P. Input-to-state stabilizing control under denial-of-service. IEEE Trans. Autom. Control 2015, 60, 2930–2944. [Google Scholar] [CrossRef]
  19. Peng, C.; Li, J.; Fei, M. Resilient Event-Triggering H Load Frequency Control for Multi-Area Power Systems With Energy-Limited DoS Attacks. IEEE Trans. Power Syst. 2017, 32, 4110–4118. [Google Scholar] [CrossRef]
  20. Hu, S.; Yue, D.; Xie, X.; Chen, X.; Yin, X. Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks. IEEE Trans. Cybern. 2018, 49, 4271–4281. [Google Scholar] [CrossRef]
  21. Chen, X.; Wang, Y.; Hu, S. Event-based robust stabilization of uncertain networked control systems under quantization and denial-of-service attacks. Inf. Sci. 2018, 459, 369–386. [Google Scholar] [CrossRef]
  22. Cheng, Z.; Yue, D.; Hu, S.; Xie, X.; Huang, C. Detection-based weighted H LFC for multi-area power systems under DoS attacks. IET Control Theory Appl. 2019, 13, 1909–1919. [Google Scholar] [CrossRef]
  23. Ding, D.; Wang, Z.; Wei, G.; Alsaadi, F.E. Event-based security control for discrete-time stochastic systems. IET Control. Theory Appl. 2016, 10, 1808–1815. [Google Scholar] [CrossRef] [Green Version]
  24. Su, L.; Ye, D. A cooperative detection and compensation mechanism against Denial-of-Service attack for cyber-physical systems. Inf. Sci. 2018, 444, 122–134. [Google Scholar] [CrossRef]
  25. Sun, H.; Peng, C.; Yang, T.; Zhang, H.; He, W. Resilient control of networked control systems with stochastic denial of service attacks. Neurocomputing 2017, 270, 170–177. [Google Scholar] [CrossRef]
  26. Zhang, J.; Peng, C.; Masroor, S.; Sun, H.; Chai, L. Stability analysis of networked control systems with denial-of-service attacks. In Proceedings of the 2016 UKACC 11th International Conference on Control (CONTROL), Belfast, UK, 31 August–2 September 2016; pp. 1–6. [Google Scholar]
  27. Cheng, Z.; Yue, D.; Hu, S.; Chen, L. Resilient H triggering control for uncertain discrete-time system against DoS attacks. In Proceedings of the IECON 2019-45th Annual Conference of the IEEE Industrial Electronics Society, Lisbon, Portugal, 14–17 October 2019; Volume 1, pp. 6285–6290. [Google Scholar]
  28. Magdy, G.; Shabib, G.; Elbaset, A.A.; Mitani, Y. Renewable power systems dynamic security using a new coordination of frequency control strategy based on virtual synchronous generator and digital frequency protection. Int. J. Electr. Power Energy Syst. 2019, 109, 351–368. [Google Scholar] [CrossRef]
  29. Gozde, H.; Taplamacioglu, M.C. Automatic generation control application with craziness based particle swarm optimization in a thermal power system. Int. J. Electr. Power Energy Syst. 2011, 33, 8–16. [Google Scholar] [CrossRef]
  30. Liu, S.; Luo, W.; Wu, L. Co-Design of Distributed Model-Based Control and Event-Triggering Scheme for Load Frequency Regulation in Smart Grids. IEEE Trans. Syst. Man, Cybern. Syst. 2018. [Google Scholar] [CrossRef]
  31. Wang, Y.; Xie, L.; De Souza, C.E. Robust control of a class of uncertain nonlinear systems. Syst. Control. Lett. 1992, 19, 139–149. [Google Scholar] [CrossRef]
Figure 1. The ith area power system with event-triggered mechanism based LFC-VSG scheme.
Figure 1. The ith area power system with event-triggered mechanism based LFC-VSG scheme.
Energies 13 01820 g001
Figure 2. LFC-VSG scheme of the ith area power system.
Figure 2. LFC-VSG scheme of the ith area power system.
Energies 13 01820 g002
Figure 3. Frequency derivations of two area power system.
Figure 3. Frequency derivations of two area power system.
Energies 13 01820 g003
Figure 4. Tie-line power exchanges of two area power system.
Figure 4. Tie-line power exchanges of two area power system.
Energies 13 01820 g004
Figure 5. Multi-disturbances in first area power system.
Figure 5. Multi-disturbances in first area power system.
Energies 13 01820 g005
Figure 6. Multi-disturbances in the second area power system.
Figure 6. Multi-disturbances in the second area power system.
Energies 13 01820 g006
Figure 7. Release instants and release intervals of ETM.
Figure 7. Release instants and release intervals of ETM.
Energies 13 01820 g007
Table 1. Definition of the ith area power system parameters.
Table 1. Definition of the ith area power system parameters.
Δ f i frequency deviation M i generator inertia constant
Δ P m i generator mechanical output D i generator damping coefficient
Δ P v i governor valve position T c h i turbine time constant
Δ P W i wind farm power T g i governor time constant
Δ P S i solar farm power R i drop constant
Δ P r e f , i reference power from VSG T W T i wind turbine time constant
Δ P i n e r t a i , i virtual inertia power T P V i solar system time constant
Δ P t i e , i tie-line power T r virtual rotor time constant
Δ P d i load change T I N i inverter time constant
Δ P w i n d , i wind farm disturbance T i j synchronizing coefficient
Δ P s o l a r , i solar farm disturbance β i frequency bias
A C E i area control error K I i LFC gain
K 1 i virtual primary control gain K 2 i virtual secondary control gain
M v i virtual generator inertia constant D v i virtual generator damping coefficient
Table 2. The parameters of two-area power system.
Table 2. The parameters of two-area power system.
PARMDM T i j T c h R T g β T P V T W T T I N M v D v T r
Area 10.0150.1660.080.430.080.34931.31.50.040.910.4 10 3
Area 20.0160.2020.080.442.730.060.38271.31.50.040.910.4 10 3
Table 3. λ and γ ¯ for various T α with given τ D = 333 .
Table 3. λ and γ ¯ for various T α with given τ D = 333 .
T α λ γ ¯
1.5623 0.8325 212.1875
1.9073 0.7330 173.0745
2.2012 0.6788 159.1523
2.5284 0.6363 150.3286
2.9481 0.5981 143.5351
Table 4. λ and γ ¯ for various τ D with given T α = 2 ± 0.1 .
Table 4. λ and γ ¯ for various τ D with given T α = 2 ± 0.1 .
τ D λ γ ¯
1000 0.6923 165.7411
500 0.7068 167.7314
333 0.7166 168.4863
250 0.7242 168.6135
200 0.7328 168.9756
Table 5. T α for various d M with given τ D = 333 .
Table 5. T α for various d M with given τ D = 333 .
d M T α
5 1.2166
10 1.2392
15 1.2626
20 1.2870

Share and Cite

MDPI and ACS Style

Cheng, Z.; Hu, S.; Ma, J. Resilient Event-Triggered Control for LFC-VSG Scheme of Uncertain Discrete-Time Power System under DoS Attacks. Energies 2020, 13, 1820. https://doi.org/10.3390/en13071820

AMA Style

Cheng Z, Hu S, Ma J. Resilient Event-Triggered Control for LFC-VSG Scheme of Uncertain Discrete-Time Power System under DoS Attacks. Energies. 2020; 13(7):1820. https://doi.org/10.3390/en13071820

Chicago/Turabian Style

Cheng, Zihao, Songlin Hu, and Jieting Ma. 2020. "Resilient Event-Triggered Control for LFC-VSG Scheme of Uncertain Discrete-Time Power System under DoS Attacks" Energies 13, no. 7: 1820. https://doi.org/10.3390/en13071820

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop