Next Article in Journal
A Computer Tool for Modelling CO2 Emissions in Driving Cycles for Spark Ignition Engines Powered by Biofuels
Next Article in Special Issue
Parameter Selection for the Virtual Oscillator Control Applied to Microgrids
Previous Article in Journal
Performance Analysis of Bifacial PV Modules with Transparent Mesh Backsheet
Previous Article in Special Issue
Two-Stage Optimal Microgrid Operation with a Risk-Based Hybrid Demand Response Program Considering Uncertainty
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Intrusion Mitigation Unit for Interconnected Power Systems in Frequency Regulation to Enhance Cybersecurity

1
Department of Mechatronics Engineering, Rajshahi University of Engineering & Technology, Rajshahi 6204, Bangladesh
2
Department of Computer Science and Engineering, Rajshahi University of Engineering & Technology, Rajshahi 6204, Bangladesh
3
Department of Electrical and Electronic Engineering, Varendra University, Rajshahi 6204, Bangladesh
4
Department of Electrical and Electronic Engineering, Rajshahi University of Engineering & Technology, Rajshahi 6204, Bangladesh
5
School of Electrical Engineering, Computing and Mathematical Sciences, Curtin University, Perth 6845, Australia
*
Author to whom correspondence should be addressed.
Energies 2021, 14(5), 1401; https://doi.org/10.3390/en14051401
Submission received: 12 January 2021 / Revised: 19 February 2021 / Accepted: 22 February 2021 / Published: 4 March 2021
(This article belongs to the Special Issue Future Smart Grid Systems)

Abstract

:
Cyberattacks (CAs) on modern interconnected power systems are currently a primary concern. The development of information and communication technology (ICT) has increased the possibility of unauthorized access to power system networks for data manipulation. Unauthorized data manipulation may lead to the partial or complete shutdown of a power network. In this paper, we propose a novel security unit that mitigates intrusion for an interconnected power system and compensates for data manipulation to augment cybersecurity. The studied two-area interconnected power system is first stabilized to alleviate frequency deviation and tie-line power between the areas by designing a fractional-order proportional integral derivative (FPID) controller. Since the parameters of the FPID controller can also be influenced by a CA, the proposed security unit, named the automatic intrusion mitigation unit (AIMU), guarantees control over such changes. The effectiveness of the AIMU is inspected against a CA, load variations, and unknown noises, and the results show that the proposed unit guarantees reliable performance in all circumstances.

1. Introduction

The increasing use of modern devices has increased the energy crisis to meet the energy demands of the world’s growing population [1,2,3,4,5]. Modern power systems integrated with information and communication technology (ICT) add flexibility for consumers but more challenges for stockholders due to their operation and control [6,7,8]. The reliable operation of modern power systems depends on many factors, such as accurate system modeling, control, disturbance-handling capabilities, and so forth [9,10,11,12].
Interconnected power systems (INPSs) consist of several subgeneration units or areas that can operate individually. Each area of an INPS has separate generation units connected by a tie line. The function of this line is to manage the flow of power between the areas [13,14,15].
Maintaining the tie-line power at its nominal value is a challenge and requires a great deal of attention [16,17,18,19]. Frequency deviation due to improper matching between the generation and demand may result in the loss of harmony and a complete blackout. Frequency deviation and tie-line power mismatch may introduce load damage, a reduction in production, overheating, and so on [12,20,21].
Experts have reported several methods to compensate for the frequency deviation of INPSs [17,22,23,24,25,26]. These methods mitigate deviation against the uncertainty, disturbance, and nonlinear behavior of the system but not against a cyberattack (CA). The mitigation of a CA on power systems has brought a new research dimension for researchers. If the CA is realistic, the malefactors can easily provide false data through the communication link to the power system control station. The injection of false data may increase the possibility of unrealistic system performance [27,28,29,30].
The rate of CAs on cyberphysical systems (CPSs) has increased significantly over the last decade. Recent news has attracted the attention of the researchers to develop strong security for CPSs. The CA on the U.S. gas pipeline and smart grid, as well as on the Ukraine power system, indicates the frequent and regular occurrence of attacks on power systems [31,32,33]. Grid reliability and resiliency were largely affected by this CA. Unauthorized access, false data injection, data integrity, sensitive data collection, etc., are some of the objectives of attackers to hamper power systems [34,35,36].
Although several load frequency controllers (LFCs) are designed to minimize frequency deviation, they may also be largely affected by CAs. The function of LFCs is to collect data from the frequency sensor and regulate the speed of the generation units. Any changes in the speed regulator by the governor make the governor’s speed uncontrollable and produce a large frequency as well as a tie-line power deviation of the INPS. Again, any changes in the associated control parameters are also responsible for reducing the stability margin and reliability of the system. Thus, the speed regulator and control variables are critical parameters that attract the attackers’ attention [37,38,39].
Conventional control methods can only control the system performance against system dynamics and different disturbances. The control of a CA is rarely possible with the help of these control methods. The parameters of the system and the controller are sensitive data that can easily be modified by attackers. Thus, alone, the controller cannot assure the stability of the system during a CA, which ensures the requirement of a cybersecurity-based control algorithm [40].
A CA on the parameters and settings of the system can be mitigated by analyzing the behavior of the circuit breaker, protection devices, and logics [41]. The detection of false data injection based on the measurement variation method is proposed in [42]. The control algorithm detects the presence of a CA by measuring the distances between two probability distributions. Reference [43] proposes a transformation-based scheme used to find the modification or injection of false data into the smart grid. The investigation of a CA is carried out by proper estimation of the measurement variation based on the Kullback–Leibler distance algorithm. The power system has a quasistatic nature that reduces the detection capability of this method.
Reference [38] considers a technique to provide false data to the power system and investigates its impact on production costs and demands. Positively and negatively biased CAs and their impacts on the power system are discussed in [40]. This work proposes a switching technique to control a LFC with an integrator controller. Another switching algorithm is investigated in [44]. The authors of [45] analyzed the frequency deviation of a single-area power system with a LFC and an automatic generation control (AGC) against positively and negatively biased CAs. The positively biased CA produced a greater impact on both the LFC and AGC compared to the negatively biased CA.
The aforementioned research articles provide control structures against CAs for a single-area power system, although they are unable to protect the operation of the INPS during a CA. Although the integrator-based AGC confirms the reliable operation for a single-unit LFC, the use of INPSs can be questionable due to their multiple control parameters, and these controllers are also sensitive to change in operating conditions. Therefore, a separate protection unit for INPS must be considered during a CA. Inspired by the above issues, this work proposes a novel security unit, called the automatic intrusion mitigation unit (AIMU), to protect INPSs during a CA. The contributions of this article are:
  • The design of a fractional-order PID (FPID) controller to compensate for frequency deviation and the tie-line power mismatch of an interconnected power system.
  • The investigation of the closed-loop interconnected power system’s behavior due to changes in sensitive parameters such as the speed regulator, biasing factor, and parameters of the controller.
  • The design of a novel security unit for the INPS to mitigate the frequency deviation and tie-line power discrepancy against the parameter changes of both the system and controller due to a CA.
This paper is organized as follows. Section 2 models the INPS, and Section 3 discusses the load frequency controller design. The impacts of a CA, the proposed switching technique, and the performance of the AIMU are investigated in Section 4, Section 5 and Section 6. The conclusions are presented in Section 7.

2. Interconnected Power System Modeling

The control structure of the INPS is constructed by using two control loops; e.g., the primary and secondary loops for controlling frequency. The primary loop acts as a proportional loop that decreases the frequency deviation produced due to load and demand change, but it is unable to regain zero frequency deviation. The frequency deviation returns to a nominal value (i.e., zero deviation) by implementing another control loop, known as the secondary frequency control loop.
Figure 1 presents a model of an INPS that has three main components: a governor, a turbine, and a mass-load system. The mass-load system produces an impact on the INPS, the model of which can be represented by [12,14,16,46,47]
X m l ( s ) = 1 M s + D
where M and D are the inertia and damping constant. The governor can be modeled as
X g ( s ) = 1 1 + Y g s
The performance of the governor largely depends on the parameter known as the speed regulator (R). Any variation of this parameter is responsible for deviating the speed of the generation unit and increasing the frequency and power deviation. Another element known as the turbine can be modeled as
X t ( s ) = 1 1 + Y t s
For an INPS, two or more areas are connected to each other and deliver power through the tie line, the model of which can be represented by
Δ P 12 = | V 1 | | V 2 | X 12 sin ( ϕ 1 ϕ 2 )
where X 12 is the reluctance of the tie line and areas. The load change is usually kept small; e.g., 2%. Thus, the delivered tie-line power due to the small perturbation of load where ϕ = ϕ 0 can be represented by
Δ P 12 = T ( Δ f 1 Δ f 2 )
The reference signal and feedback construct the area control error (ACE) that feeds the error measurement to the controller to minimize the frequency and power deviation. The model of ACE can be given as
A C E = Δ P 12 + B Δ f
where B is a biasing factor that can be represented by
B = 1 R + D
In an INPS, there are nine total state variables. There are three state variables for each area; i.e., Δ f 1 , Δ P g 1 , Δ P m 1 , and Δ f 2 , Δ P g 2 , and Δ P m 2 . There is one state variable for the tie line; i.e., Δ P 12 . Finally, there are two state variables for the inputs Δ P c 1 and Δ P c 2 . Thus, the dynamic model of the INPS can be represented by
Δ f 1 . = D 1 M 1 { 1 D 1 Δ P m 1 1 D 1 Δ P l c 1 Δ f 1 1 D 1 Δ P 12 } Δ P g 1 . = 1 Y g 1 { Δ P c 1 Δ P g 1 1 R 1 Δ f 1 } Δ P m 1 . = 1 Y t 1 { Δ P g 1 Δ P m 1 } Δ P 12 . = T { Δ f 1 Δ f 2 } Δ f 2 . = D 2 M 2 { 1 D 2 Δ P m 2 1 D 2 Δ P l c 2 Δ f 2 + 1 D 2 Δ P 12 } Δ P g 2 . = 1 Y g 2 { Δ P c 2 Δ P g 2 1 R 2 Δ f 2 } Δ P m 2 . = 1 Y t 2 { Δ P g 2 Δ P m 2 } Δ P c 1 . = B 1 f 1 + Δ P 12 Δ P c 2 . = B 2 f 2 Δ P 12
Thus, the INPS in the form of state space can be written as
[ Δ f 1 . Δ P m 1 . Δ P g 1 . Δ f 2 . Δ P m 2 . Δ P g 2 . Δ P 12 . Δ P c 1 . Δ P c 2 . ] = [ D 1 M 1 1 M 1 0 0 0 0 1 M 1 0 0 0 1 Y t 1 1 Y t 1 0 0 0 0 0 0 1 R 1 Y g 1 0 1 Y g 1 0 0 0 0 0 0 0 0 0 D 2 M 2 1 M 2 0 1 M 2 0 0 0 0 0 0 1 Y t 2 1 Y t 2 0 0 0 0 0 0 1 R 2 Y g 2 0 1 Y g 2 0 0 0 T 0 0 T 0 0 0 0 0 B 1 0 0 0 0 0 1 0 0 0 0 0 B 2 0 0 1 0 0 ] [ Δ f 1 Δ P m 1 Δ P g 1 Δ f 2 Δ P m 2 Δ P g 2 Δ P 12 Δ P c 1 Δ P c 2 ] + [ 0 0 0 0 1 Y g 1 0 0 0 0 0 0 1 Y g 2 0 0 0 0 0 0 ] [ Δ P c 1 Δ P c 2 ] + [ 1 M 1 0 0 0 0 0 0 1 M 2 0 0 0 0 0 0 0 0 0 0 ] [ Δ P l c 1 Δ P l c 2 ]
Table 1 lists the values of the parameters of the INPS.

3. Load Frequency Controller Design

In an INPS, the frequency and ACE are two crucial pieces of data that need to be controlled to increase the level of protection of the power system. Any change in the supply-to-demand ratio or the speed regulator of the governor is responsible for deviations from the nominal frequency. A frequency controller is implemented to control these frequency deviations in the power system with an additional control approach. In this work, we designed a FPID controller for load frequency control.
The FPID controller is a modified conventional integer-order PID controller based on the fractional calculus used to design the integral and derivative mode of the FPID controller [48,49,50]. Thus, the construction of the FPID controller provides two more controlling parameters that enhance the tuning performance of the FPID controller.
The dynamic model of an integral part of the FPID controller can be written as
T I t ω f ( t ) = 1 Ξ ( ω ) T t f ( σ ) ( t σ ) 1 ω d σ
Here, Ξ ( ) is the function of the FI controller having fractional order σ .
Similarly, the derivative part of this controller can be defined as
T D t ω f ( t ) = 1 Ξ ( n ω ) d n d n t T t ( t σ ) n ω 1 f ( σ ) d σ
From the above two equations, the output of the FPID controller can be given as
y ( t ) = K p e ( t ) + K i D t a e ( t ) d t + K d D t b e ( t ) d t
Thus, the FPID controller in the frequency domain can be represented by
C F P I D = K p + K i S a + K d S b
where a and b are the power of the I and D of the FPID controller. The FPID controller has five modes of operation:
(i)
The FPID acts as a FPID controller when a is a fractional number and b is a fractional number;
(ii)
The FPID acts as a P controller when a = 0 and b = 0;
(iii)
The FPID acts as a PI controller when a = 1 and b = 0;
(iv)
The FPID acts as a PD controller when a = 0 and b = 1;
(v)
The FPID acts as a PID controller when a = 1 and b = 1.
a and b of the FPID controller enhance the system quality and performance compared to the PID and PI controllers in the case of a smaller processing time and larger bandwidth, as well as being suitable for higher-order systems [51,52,53]. In this work, we selected a1 = 0.995, b1 = 1.5 and a2 = 2, b2 = 1.5 to design the FPID controller and compared the results with those of the integer-order PI and PID controllers, considering a = 1, b = 0 and a = 1, b = 1, respectively.
The high performance of the FPID controller compared to the PI and PID controllers can be investigated from Figure 2. As presented in Figure 2, the studied open-loop system indicates a high level of oscillation against a step input and deviates by a large frequency and tie-line power from the reference, whereas the FPID controller has approximately zero deviation of frequency and tie-line power from the reference, which is the lowest compared to the integer-order PI and PID controllers.

4. Effects of a Cyberattack

The design of the LFCs only for the INPS is not enough to guarantee protection against a CA. This is because the control parameters can also be targeted by attackers. Figure 2 shows that although the system is efficiently controlled by implementing different control approaches, any change in the controller or system parameters may lead to deviation from the nominal operation of the system. This work aimed to address the causes of parameter changes and present a solution to overcome these problems. Misleading information about the frequency measurement, speed regulator, or controller parameters due to a CA are responsible for generating false ACE signals, and the power system may produce or supply an undesirable amount of power. Thus, system frequency, as well as the power of the system, will be greatly affected [28].
The adverse effect on the INPS due to a parameter variation was investigated. The variation of sensitive parameters, such as the speed regulator, the biasing factor of the system, and K p , K i , K d , a, and b of the FPID, PID, and PI controllers is considered. This case study is essential to address the need for INPS security and mitigate the effects of the unwanted changing of the parameters.

4.1. Case Study 1: Variation of the Speed Regulator

The speed regulator (R) is a sensitive parameter. The change of R produces an impact on the speed of the governor responsible for deviating the system frequency and power. Figure 3 shows that any small change of R is responsible for deviating the performance of the INPS and making the system operation unreliable.

4.2. Case Study 2: Variation of the Biasing Factor

The biasing factor (B) is another critical parameter that produces an impact on the construction of the ACE signal. The change of B1 and B2 is responsible for producing the wrong error signal fed to the controller. Thus, a wrong control signal is produced by the associated controller and may increase fluctuations in the INPS performance. The impact due to the change of B is shown in Figure 4. Figure 4 shows a huge change in the performance of the INPS due to the variable value of B that may cause the system to become unstable and damage the load.

4.3. Case Study 3: Variation of the Controller Parameter

The performance of the INPS largely depends on the efficient design of the controller. The stable and reliable operation of the whole system and loads is directly related to the control efficiency and structure. Any change of this control structure will make the controller unable to produce the required control signals. Table 2 was used to test the controller performance without an AIMU. Figure 5 presents the variation of the controller parameters and their impacts on the deviation of area frequency and power. Table 3 presents the impacts of the parameter changes on the power system.
The findings of these case studies present the evidence of the lack of system security in conventional power systems. Any change of the sensitive parameters is responsible for deviating system performance, as shown in Figure 3 and Figure 4. Researchers are always interested in developing different control algorithms to control system performance against any disturbance, uncertainties, or system dynamics. PI, PID, FPID, or other control algorithms are inventions of researchers to control system stability under system parameter variation or disturbance.
Today’s research not only focuses on the design of any controller but also accounts for the security issue because it is rarely possible to control modern devices with a single controller due to the development of ICT. At present, ICT makes it possible to easily access any modern system. Controllers such as PI, PID, or FPID are able to control system performance but are unable to ensure the cybersecurity of the system. Thus, choosing only the controller without considering a CA hampers both the system and controller parameters because attackers can attack both the system and controller, as shown in Figure 3, Figure 4 and Figure 5. To address these issues, it is essential to design a cybersecurity-based controller that not only stabilizes system performance but also diminishes the adverse effects of false data injection into both the system and controller.

5. Design Methodology of the Proposed Automatic Intrusion Mitigation Unit

It is obvious from the aforementioned discussion that the biasing factor and speed regulator of the governor, as well as the variables of the associated control unit of the INPS, are attracting parameters to attackers. By changing these parameters through the CA, they can destroy the power system and interrupt the delivery of power to the customer.
In this paper, an automatic intrusion mitigation unit (AIMU), as shown in Figure 6, is proposed that mitigates the effects of a CA and enhances the security of the INPS, the construction of which is shown in Figure 7 and is the main contribution of this paper. This control technique has both a network and hardware connection. The control structure of the proposed AIMU has four input terminals that account for the speed regulator, control signal from the FPID controller, current, and fixed information of the sensitive data collected from the network and hardware. The fixed data stored in the AIMU are termed hardware data. The data information of the system may change against the system dynamics, uncertainties, and disturbance, as well as the CA. Thus, the present data information of the system and controller at every moment is considered networked data.
The detection of the current information about sensitive data is important to identify the presence of a CA. The collection of information from both the hardware and network is essential to maintain the safe and reliable operation of a power system. To regulate the balance between supply and demand, the service provider manually modifies hardware data such as the parameters and setup of the system and controller. Once the data are modified, the service provider will make the data fixed to overcome illegal data modification or injection.
The data of a nominal system and the parameter values of a controller at which it provides better performance are considered fixed data. The fixed data for both the system and controller are listed in Table 1 and Table 4. The speed regulator and biasing factor of the INPS, as well as K p , K i , K d , a, and b of the FPID, PID, and PI controllers, are sensitive parameters usually affected by a CA. Thus, it is necessary to protect these parameters from attackers. To secure these parameters from attackers, hardware with an offline connection can be used to store the data, which acts as an input to the AIMU. The AIMU can only read data from this hardware for its further comparison process. This control unit cannot write or update these fixed hardware data without the permission of the service providers. This way, the proposed AIMU prevents the unauthorized access of attackers to the fixed data.
The AIMU then continuously monitors the present situation of these sensitive networked data of the INPS, and the controller and compares these networked data with the fixed hardware data at every moment to calculate the difference between the monitored data and fixed data.
The AIMU acts as a control unit that performs a mathematical calculation between the hardware and networked data. The polarity of the four input terminals such as R, Δ P c , the fixed, and the current information of the AIMU is selected in such a way that all the monitored network data such as R, Δ P c , and the current information are subtracted from the fixed hardware data to find any change between them, and their algebraic summation always generates the required constant value of the parameters for the system and controller. If it finds no changes between the measured data and the fixed data, it ensures the absence of a CA on the system. If any changes of these parameters are noticed by the AIMU, it generates a control signal to indicate the presence of a CA on the system or controller, makes the algebraic summation of R, Δ P c , and the current information equal zero, and allows the fixed hardware data to control the system. Thus, any change of the data can be overcome automatically, and the system always exhibits a fixed performance with the aid of the AIMU, which protects the system against the diverse effects of an unauthorized CA.
Thus, the AIMU is designed considering its hardware is protected from a cyberattack due to its fixed offline operation. This means attackers can only attack the network data, which may change the system or controller parameters. The proposed AIMU detects changes in the network data, minimizes the effects on the system performance due to the parameter variations, and reduces the error to zero, based on the fixed hardware data.

6. Performance Evaluation

The performances of the INPS with and without the implementation of the AIMU are inspected here. The open-loop performance of the INPS, as shown in Figure 2, demonstrates the necessity for the controller design to make the system stable and reduce the oscillations in the INPS performance. For the stable operation of the INPS, a FPID controller is designed in this paper, which is further compared with conventional PI and PID controllers. To understand the impact of a CA on the INPS, a mimic environment of a CA is created, and the performance of the INPS is inspected in Figure 3, Figure 4 and Figure 5. For further improvement, the performance of the controller-based AIMU is investigated under load and wind power change.

6.1. Performance Analysis with the AIMU

The parameter variations and their effects were inspected in Case Studies 1–3, which are presented in Figure 3, Figure 4 and Figure 5, and their impacts are listed in Table 3. These ensure the necessity for the implementation of the AIMU to protect the system from CA and confirm the constant behavior of the INPS.
To evaluate the reliable and fixed behavior of the AIMU, Table 4 is used to list some affected and fixed data of the speed regulator and controller parameters. The affected data of Table 4 are used to produce a mimic environment of a CA to evaluate the effectiveness of the proposed AIMU. With these affected data, the performance of the INPS deviates from its fixed operation, which may damage the system and load. Figure 8 and Figure 9 show the performance of the affected and secured systems. The implementation of the AIMU completely eliminates the affected data from the power system and feeds the fixed data from the hardware to exhibit constant frequency and power deviation control similar to the responses before a cyberattack. Thus, Figure 8 and Figure 9 ensure the robust performance of the INPS with any changes of the system and control unit. Table 5 shows the performance of the different control algorithms with the AIMU.

6.2. Performance Evaluation under Load Change

The load change connected to the INPS is also responsible for diverging the performance of the INPS. The effects due to the change of Δ P l c in the power system need to be controlled efficiently to maintain favorable INPS behavior.
The performance of the INPS in the case of load change is presented in Figure 10, exhibiting a huge deviation of INPS performance due to the load variation. The FPID controller efficiently minimizes the frequency and power deviation compared to the PI and PID controllers. Table 6 ensures the better performance of the FPID controller with AIMU with respect to rise time (RT), settling time (ST), and overshoot (OS).

6.3. Performance Evaluation under Wind Power Change

The performance of the INPS in this paper is also investigated under the presence of a renewable energy source. As a renewable energy source, wind energy is considered here. The variation of wind power, as presented in Figure 11, provides an inconsiderable impact on the frequency and power deviation and makes the system unstable [54]. Figure 12 presents the performance of the power system in the case of a wind power variation. The better performance of the FPID controller in the presence of the wind power variation makes it a high-performance control approach for INPS.

7. Conclusions

The cybersecurity of modern power systems is crucial to empower their reliability, stability, and resilience. The dissimilarity of any element out of the reference increases the possibility of partially or completely damaging a power grid. In this paper, we proposed a novel intrusion mitigation unit to diminish the modification of all critical elements during the cyberattack of an interconnected power system. A two-area interconnected power system is modeled and stabilized by designing a FPID controller to compensate for frequency deviation and tie-line power mismatch. The closed-loop performance of the designed FPID controller over the conventional integer-order PI and PID controller remains superior in managing frequency deviation and tie-line power against no cyberattack. On the other hand, the FPID controller has no control over a cyberattack and executes undesirable performance. To limit and compensate for the effect of a cyberattack, the proposed security unit was designed using the status of the FPID controller and others. The effectiveness of the proposed AIMU is tested and compared with that of the PI and PID controller against a cyberattack, load variations, and the incorporation of noises. The proposed AIMU diminishes the diverse effects of a CA and efficiently minimizes the effect of load change and noise, the importance of which are listed in Table 7. The design of the proposed AIMU by AI techniques will be investigated further in the future.

Author Contributions

Conceptualization, F.R.B. and S.K.S.; methodology, F.R.B., S.K.S. and S.R.F.; formal analysis, F.R.B., Z.N. and D.D.; investigation, F.R.B., S.K.S., S.K.D. and S.M.M.; writing—original draft preparation, F.R.B. and S.K.D.; writing—review and editing, F.R.B., S.K.S., S.K.D., S.M.M. and M.R.I.S.; supervision, S.K.D., S.M.M. and M.R.I.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gurrala, G.; Sen, I. Power System Stabilizers Design for Interconnected Power Systems. IEEE Trans. Power Syst. 2010, 25, 1042–1051. [Google Scholar] [CrossRef]
  2. Sarkar, S.K.; Badal, F.R.; Das, S.K. A comparative study of high performance robust PID controller for grid voltage control of islanded microgrid. Int. J. Dyn. Control. 2017, 6, 1207–1217. [Google Scholar] [CrossRef]
  3. Guha, D.; Roy, P.K.; Banerjee, S. Load frequency control of interconnected power system using grey wolf optimization. Swarm Evol. Comput. 2016, 27, 97–115. [Google Scholar] [CrossRef]
  4. Sarker, S.K.; Badal, F.R.; Das, P.; Das, S.K. Multivariable integral linear quadratic Gaussian robust control of islanded microgrid to mitigate voltage oscillation for improving transient response. Asian J. Control. 2019, 21, 2114–2125. [Google Scholar] [CrossRef]
  5. Badal, F.R.; Das, P.; Sarker, S.K.; Das, S.K. A survey on control issues in renewable energy integration and microgrid. Prot. Control. Mod. Power Syst. 2019, 4, 8. [Google Scholar] [CrossRef] [Green Version]
  6. Armin, M.; Rahman, M.; Rahman, M.; Sarker, S.K.; Das, S.K.; Islam, R.; Kouzani, A.Z.; Mahmud, M.A.P. Robust Extended H∞ Control Strategy Using Linear Matrix Inequality Approach for Islanded Microgrid. IEEE Access 2020, 8, 135883–135896. [Google Scholar] [CrossRef]
  7. Sarkar, S.K.; Badal, F.R.; Das, S.K.; Miao, Y. Discrete time model predictive controller design for voltage control of an islanded microgrid. In Proceedings of the 2017 3rd International Conference on Electrical Information and Communication Technology (EICT), Piscataway, NJ, USA, 7–9 December 2017; pp. 1–6. [Google Scholar]
  8. Mohanty, P.K.; Sahu, B.K.; Pati, T.K.; Panda, S.; Kar, S.K. Design and analysis of fuzzy PID controller with derivative filter for AGC in multi-area interconnected power system. IET Gener. Transm. Distrib. 2016, 10, 3764–3776. [Google Scholar] [CrossRef]
  9. Kiran, D.; Amani, G. Load Frequency Control of a Two-Area Power System Using FOPID with Harmony Search Algorithm. Int. J. Adv. Eng. Res. Sci. 2017, 6495, 12–17. [Google Scholar]
  10. Badal, F.R.; Subrata, K.S.; Sajal, K.D. Transient Stabilization Improvement of Induction Generator Based Power System using Robust Integral Linear Quadratic Gaussian Approach. Int. J. Smart Grid-ijSmartGrid 2019, 3, 73–83. [Google Scholar]
  11. Tasneem, Z.; Al Noman, A.; Das, S.K.; Saha, D.K.; Islam, R.; Ali, F.; Badal, F.R.; Ahamed, H.; Moyeen, S.I.; Alam, F. An analytical review on the evaluation of wind resource and wind turbine for urban application: Prospect and challenges. Dev. Built Environ. 2020, 4, 100033. [Google Scholar] [CrossRef]
  12. Ahmed, S.H.A. Load Frequency Control for a Two Area Power System. Ph.D. Thesis, University of Khartoum, Khartoum, Sudan, 2017. [Google Scholar]
  13. Pan, I.; Das, S. Fractional-order load-frequency control of interconnected power systems using chaotic multi-objective opti-mization. Appl. Soft Comput. 2015, 29, 328–344. [Google Scholar] [CrossRef] [Green Version]
  14. Chuang, N. Robust H-infinite load-frequency control in interconnected power systems. IET Control Theory Appl. 2016, 10, 67–75. [Google Scholar] [CrossRef]
  15. Thirukkovulur, A.K.; Nandagopal, H.; Parivallal, V. Decentralized control of multi-area power system restructuring for LFC optimization. In Proceedings of the 2012 IEEE International Conference on Computational Intelligence and Computing Research, Bengaluru, India, 16–19 December 2012; pp. 1–6. [Google Scholar]
  16. Shah, N.N.; Kotwal, C.D. The state space modeling of single two and three ALFC of power system using integral control and optimal LQR control method. IOSR J. Eng. 2012, 2, 501–510. [Google Scholar] [CrossRef]
  17. Farhangi, R.; Boroushaki, M.; Hosseini, S.H. Load–frequency control of interconnected power system using emotional learn-ing-based intelligent controller. Int. J. Electr. Power Energy Syst. 2012, 36, 76–83. [Google Scholar] [CrossRef]
  18. Shabani, H.; Vahidi, B.; Ebrahimpour, M. A robust PID controller based on imperialist competitive algorithm for load-frequency control of power systems. ISA Trans. 2013, 52, 88–95. [Google Scholar] [CrossRef] [PubMed]
  19. Fahim, S.R.; Yeahia, S.; Subrata, K.S.; Rafiqul, I.S.; Sajal, K.D. Self attention convolutional neural network with time series imaging based feature extraction for transmission line fault detection and classification. Electr. Power Syst. Res. 2020, 187, 106437. [Google Scholar] [CrossRef]
  20. Mu, C.; Tang, Y.; He, H. Improved Sliding Mode Design for Load Frequency Control of Power System Integrated an Adaptive Learning Strategy. IEEE Trans. Ind. Electron. 2017, 64, 6742–6751. [Google Scholar] [CrossRef]
  21. Saxena, S.; Hote, Y.V. Load Frequency Control in Power Systems via Internal Model Control Scheme and Model-Order Reduction. IEEE Trans. Power Syst. 2013, 28, 2749–2757. [Google Scholar] [CrossRef]
  22. Shayeghi, H.; Jalili, A.; Shayanfar, H. Multi-stage fuzzy load frequency control using PSO. Energy Convers. Manag. 2008, 49, 2570–2580. [Google Scholar] [CrossRef]
  23. Cam, E.; Gorel, G.; Mamur, H. Use of the Genetic Algorithm-Based Fuzzy Logic Controller for Load-Frequency Control in a Two Area Interconnected Power System. Appl. Sci. 2017, 7, 308. [Google Scholar] [CrossRef] [Green Version]
  24. Prakash, S.; Sinha, S. Simulation based neuro-fuzzy hybrid intelligent PI control approach in four-area load frequency control of interconnected power system. Appl. Soft Comput. 2014, 23, 152–164. [Google Scholar] [CrossRef]
  25. Giri, S.P.; Sinha, S.K. Four-Area Load Frequency Control of an Interconnected Power System Using Neuro-Fuzzy Hybrid Intelligent Proportional and Integral Control Approach. J. Intell. Syst. 2013, 22, 131–153. [Google Scholar] [CrossRef]
  26. Prakash, S.; Sinha, S. Application of artificial intelligence in load frequency control of interconnected power system. Int. J. Eng. Sci. Technol. 2011, 3, 3. [Google Scholar] [CrossRef]
  27. Teixeira, A.; Dan, G.; Sandberg, H.; Berthier, R.; Bobba, R.B.; Valdes, A. Security of smart distribution grids: Data integrity attacks on integrated volt/VAR control and countermeasures. In Proceedings of the 2014 American Control Conference, Portland, OR, USA, 4–6 June 2014; pp. 4372–4378. [Google Scholar]
  28. Tan, R.; Nguyen, H.H.; Foo, E.Y.S.; Yau, D.K.Y.; Kalbarczyk, Z.; Iyer, R.K.; Gooi, H.B. Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1609–1624. [Google Scholar] [CrossRef]
  29. Esfahani, P.M.; Vrakopoulou, M.; Margellos, K.; Lygeros, J.; Andersson, G. Cyber-attack in a two-area power system: Impact identification using reachability. In Proceedings of the 2010 American Control Conference, Baltimore, MD, USA, 30 June–2 July 2010; pp. 962–967. [Google Scholar]
  30. Sridhar, S.; Manimaran, G. Data integrity attack and its impacts on voltage control loop in power grid. In Proceedings of the IEEE PES General Meeting, Detroit, MI, USA, 24–28 July 2011; pp. 1–6. [Google Scholar]
  31. Stuxnet Style Attack on US Smart Grid. 2018. Available online: https://www.scmagazineuk.com/stuxnet-style-attack-on-us-smart-gridcould-cost-government-1-trillion/article/535452/ (accessed on 12 January 2021).
  32. Ukraine’s Power Outage Was a Cyber Attack; Ukrenergo: Kyiv, Ucraina, 2017; Available online: http://www.reuters.com/article/.us-ukraine-cyber-attack-energyidUSKBN1521BA (accessed on 12 January 2021).
  33. US Gas Pipeline Hit by Cyber Attack. 2018. Available online: https://www.infosecurity-magazine.com/news/us-gas-pipelines-hit-by-cyberattack/ (accessed on 12 January 2021).
  34. Wadhawan, Y.; Almajali, A.; Neuman, C. A Comprehensive Analysis of Smart Grid Systems against Cyber-Physical Attacks. Electronics 2018, 7, 249. [Google Scholar] [CrossRef] [Green Version]
  35. Wood, P.; Bagchi, S.; Hussain, A. Defending against strategic adversaries in dynamic pricing markets for smart grids. In Proceedings of the 2016 8th International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, 5–10 January 2016; pp. 1–8. [Google Scholar]
  36. Wadhawan, Y.; Neuman, C.; Almajali, A. Analyzing cyber-physical attacks on smart grid systems. In Proceedings of the 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), Pittsburgh, PA, USA, 21 April 2017; pp. 1–6. [Google Scholar] [CrossRef]
  37. Ten, C.W.; Manimaran, G.; Liu, C.C. Cybersecurity for critical infrastructures: Attack and defense modeling. In IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans; IEEE: Piscataway, NJ, USA, 2010; Volume 40, pp. 853–865. [Google Scholar]
  38. Deng, R.; Xiao, G.; Lu, R.; Liang, H.; Vasilakos, A.V. False data injection on state estimation in power systems—Attacks, im-pacts, and defense: A survey. IEEE Trans. Ind. Inf. 2016, 13, 411–423. [Google Scholar] [CrossRef]
  39. Ten, C.-W.; Liu, C.-C.; Manimaran, G. Vulnerability Assessment of Cybersecurity for SCADA Systems. IEEE Trans. Power Syst. 2008, 23, 1836–1846. [Google Scholar] [CrossRef]
  40. Hassan, M.; Roy, N.K.; Sahabuddin. Mitigation of frequency disturbance in power systems during cyber-attack. In Proceedings of the 2016 2nd International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE), Rajshahi, Bangladesh, 8–10 December 2017; pp. 1–4.
  41. Liu, X.; Shahidehpour, M.; Li, Z.; Liu, X.; Cao, Y.; Li, Z. Power System Risk Assessment in Cyber Attacks Considering the Role of Protection Systems. IEEE Trans. Smart Grid. 2017, 8, 572–580. [Google Scholar] [CrossRef]
  42. Chaojun, G.; Jirutitijaroen, P.; Motani, M. Detecting False Data Injection Attacks in AC State Estimation. IEEE Trans. Smart Grid 2015, 6, 2476–2483. [Google Scholar] [CrossRef]
  43. Singh, S.K.; Khanna, K.; Bose, R.; Panigrahi, B.K.; Joshi, A. Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid. IEEE Trans. Ind. Inform. 2017, 14, 89–97. [Google Scholar] [CrossRef]
  44. Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A Survey on Cyber Security for Smart Grid Communications. IEEE Commun. Surv. Tutorials 2012, 14, 998–1010. [Google Scholar] [CrossRef] [Green Version]
  45. Sahabuddin; Dutta, B.; Hassan, M. Impact of cyber-attack on isolated power system. In Proceedings of the 2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), Dhaka, Bangladesh, 22–24 September 2016; pp. 1–4. [Google Scholar]
  46. Mohamed, T.; Bevrani, H.; Hassan, A.; Hiyama, T. Decentralized model predictive based load frequency control in an inter-connected power system. Energy Convers. Manag. 2011, 52, 1208–1214. [Google Scholar] [CrossRef]
  47. Alhelou, H.H.; Golshan, M.E.H.; Fini, M.H. Wind Driven Optimization Algorithm Application to Load Frequency Control in Interconnected Power Systems Considering GRC and GDB Nonlinearities. Electr. Power Compon. Syst. 2018, 46, 1223–1238. [Google Scholar] [CrossRef]
  48. Shah, P.; Agashe, S. Review of fractional PID controller. Mechatronics 2016, 38, 29–41. [Google Scholar] [CrossRef]
  49. Li, C.; Zhang, N.; Lai, X.; Zhou, J.; Xu, Y. Design of a fractional-order PID controller for a pumped storage unit using a grav-itational search algorithm based on the Cauchy and Gaussian mutation. Inform. Sci. 2017, 396, 162–181. [Google Scholar] [CrossRef]
  50. Senberber, H.; Bagis, A. Fractional PID controller design for fractional order systems using ABC algorithm. In Proceedings of the 2017 Electronics, Palanga, Lithuania, 19–21 June 2017; pp. 1–7. [Google Scholar]
  51. Khezri, R.; Oshnoei, A.; Hagh, M.T.; Muyeen, S. Coordination of Heat Pumps, Electric Vehicles and AGC for Efficient LFC in a Smart Hybrid Power System via SCA-Based Optimized FOPID Controllers. Energies 2018, 11, 420. [Google Scholar] [CrossRef] [Green Version]
  52. Babaei, M.; Abazari, A.; Muyeen, S.M. Coordination between Demand Response Programming and Learning-based FOPID Controller for Alleviation of Frequency Excursion of Hybrid Microgrid. Energies 2020, 13, 442. [Google Scholar] [CrossRef] [Green Version]
  53. Ahmed, S.M.; Khalid, H.M.; Muyeen, S.M.; Al-Durra, A. A Prediction Algorithm to Enhance Grid Resilience Towards Cyber Attacks in WACS Applications. IEEE Syst. J. 2019, 13, 710–719. [Google Scholar]
  54. Li, X.; Hui, D.; Lai, X.; Yan, T. Power Quality Control in Wind/Fuel Cell/Battery/Hydrogen Electrolyzer Hybrid Micro-grid Power System. In Applications and Experiences of Quality Control; IntechOpen: London, UK, 2011. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Model of an interconnected power system.
Figure 1. Model of an interconnected power system.
Energies 14 01401 g001
Figure 2. Comparison of frequency deviations and tie-line power for open- and closed-loop systems. (a) Frequency deviation for Area 1; (b) frequency deviation for Area 2; (c) tie-line power.
Figure 2. Comparison of frequency deviations and tie-line power for open- and closed-loop systems. (a) Frequency deviation for Area 1; (b) frequency deviation for Area 2; (c) tie-line power.
Energies 14 01401 g002
Figure 3. Performance of the interconnected power system against the speed regulator variation without an automatic intrusion mitigation unit (AIMU).
Figure 3. Performance of the interconnected power system against the speed regulator variation without an automatic intrusion mitigation unit (AIMU).
Energies 14 01401 g003
Figure 4. Performance of the interconnected power system against the biasing factor variation without an AIMU.
Figure 4. Performance of the interconnected power system against the biasing factor variation without an AIMU.
Energies 14 01401 g004
Figure 5. Performance of the interconnected power system against the controller parameter variation without an AIMU.
Figure 5. Performance of the interconnected power system against the controller parameter variation without an AIMU.
Energies 14 01401 g005
Figure 6. Construction of an automatic intrusion mitigation unit.
Figure 6. Construction of an automatic intrusion mitigation unit.
Energies 14 01401 g006
Figure 7. Model of an AIMU-based INPS.
Figure 7. Model of an AIMU-based INPS.
Energies 14 01401 g007
Figure 8. Control of the frequency of the AIMU-based INPS with (a) FPID, (b) PID, and (c) PI controllers.
Figure 8. Control of the frequency of the AIMU-based INPS with (a) FPID, (b) PID, and (c) PI controllers.
Energies 14 01401 g008
Figure 9. Control of the tie-line power of the AIMU-based INPS with (a) FPID, (b) PID, and (c) PI controllers.
Figure 9. Control of the tie-line power of the AIMU-based INPS with (a) FPID, (b) PID, and (c) PI controllers.
Energies 14 01401 g009
Figure 10. Performance of the interconnected power system with PI, PID, and FPID controllers against load change with the AIMU.
Figure 10. Performance of the interconnected power system with PI, PID, and FPID controllers against load change with the AIMU.
Energies 14 01401 g010
Figure 11. Wind speed model.
Figure 11. Wind speed model.
Energies 14 01401 g011
Figure 12. Performance of the AIMU-based interconnected power system with (a) FPID, (b) PID, and (c) PI controllers against a wind power variation.
Figure 12. Performance of the AIMU-based interconnected power system with (a) FPID, (b) PID, and (c) PI controllers against a wind power variation.
Energies 14 01401 g012
Table 1. Description of the interconnected power system (INPS) parameters.
Table 1. Description of the interconnected power system (INPS) parameters.
DescriptionNotationUnitArea 1Area 2
Speed regulatorRpu0.050.0625
Biasing factor for frequencyBpu/Hz20.616.9
Generator inertia constantMs108
Load-damping factorD-0.60.9
Governor time constant Y g s0.20.3
Turbine time constant Y t s0.50.6
Synchronizing power coefficientTpu-2
Load change Δ P 12 pu0.20
Table 2. Parameter values for Case Study 3.
Table 2. Parameter values for Case Study 3.
Data Type K p 1 K p 2 K i 1 K i 2 K d 1 K d 2 a 1 a 2 b 1 b 2
FPID1100151500.01550.99521.51.5
FPID280201300.1750.111.51.5
FPID3701508010841.60.0011.51.7
PID13.546222----
PID2511414----
PID31103292----
PI10.0010.00050.20.01------
PI210.30.20.01------
PI30.110.00050.40.1------
Table 3. Impacts of a cyberattack (CA) on the INPS.
Table 3. Impacts of a cyberattack (CA) on the INPS.
ParametersIncreased ValueDecreased Value
R(i) Increased overshoot (OS), (ii) decreased oscillation, (iii) increased steady-state error (SSE)(i) Decreased OS, (ii) increased oscillation, (iii) decreased SSE
B(i) Decreased OS, (ii) increased oscillation, (iii) decreased SSE(i) Increased OS, (ii) decreased oscillation, (iii) increased SSE
K p (i) Decreased OS, (ii) decreased SSE, (iii) increased settling time (ST)(i) Increased OS, (ii) increased SSE, (iii) decreased ST
K i (i) Increased OS, (ii) decreased SSE, (iii) increased ST(i) Decreased OS, (ii) increased SSE, (iii) decreased ST
K d (i) Decreased OS, (ii) decreased ST(i) Increased OS, (ii) increased ST
a(i) Decreased SSE(i) Increased SSE
b(i) Decreased oscillation(i) Increased oscillation
Table 4. Fixed and chosen affected parameters of R and the controller for the interconnected power system.
Table 4. Fixed and chosen affected parameters of R and the controller for the interconnected power system.
Data Type R 1 R 2 K p 1 K p 2 K i 1 K i 2 K d 1 K d 2 a 1 a 2 b 1 b 2
Affected data0.0550.07142005010016100.10.011.42
Fixed FPID0.050.0625100151500.01550.99521.51.5
Fixed PID0.050.06253.546222----
Fixed PI0.050.06250.0010.00050.20.01------
Table 5. Performance of the INPS with PI-, PID-, and fractional order PID (FPID)-controller-based AIMUs. [rise time (RT), settling time (ST), and overshoot (OS)].
Table 5. Performance of the INPS with PI-, PID-, and fractional order PID (FPID)-controller-based AIMUs. [rise time (RT), settling time (ST), and overshoot (OS)].
Controller Δ f 1 Δ f 2 Δ P
RT (s)ST (s)OSRT (s)ST (s)OSRT (s)ST (s)OS
PI7.117.3−0.013327.329.01−0.003330.534.02−0.037
PID1.13.9−0.00383.910.2−0.00037.0212.01−0.0031
FPID0.20.7−0.00090.010.2−0.000010.0110.1−0.0001
Table 6. Performance of the INPS under load change.
Table 6. Performance of the INPS under load change.
LoadController Δ f 1 Δ f 2 Δ P
RT (s)ST (s)OSRT (s)ST (s)OSRT (s)ST (s)OS
Δ P l c 1 = 0.2 , Δ P l c 2 = 0 PI
PID
FPID
7.1
1.1
0.2
17.3
3.9
0.7
−0.0133
−0.0038
−0.0009
27.3
3.9
0.01
29.02
10.2
0.2
−0.0033
−0.0003
−0.0001
30.5
7.01
0.011
34.01
12.02
0.1
−0.037
−0.0031
−0.0001
Δ P l c 1 = 0.3 , Δ P l c 2 = 0 PI
PID
FPID
6.5
1.01
0.1
12.7
3.8
0.5
−0.021
−0.0051
−0.001
28.1
7.01
0.01
31.1
10.01
0.011
−0.005
−0.0003
−0.00002
28.5
10.03
0.01
31.9
12.9
0.11
−0.057
−0.005
−0.0001
Δ P l c 1 = 0.2 , Δ P l c 2 = 0.1 PI
PID
FPID
35.2
1.1
0.2
39.8
4.7
0.9
−0.0148
−0.0039
−0.0008
36.1
1.9
1.7
40.2
5.2
2.3
−0.015
−0.0027
−0.0007
5.2
3.01
2.7
45.7
3.5
3.1
−0.01
−0.0032
−0.0001
Δ P l c 1 = 0.3 , Δ P l c 2 = 0.1 PI
PID
FPID
35.2
1.7
0.23
40.1
4.1
0.95
−0.022
−0.0005
−0.0001
38.3
2.8
1.8
45.1
4.5
3.5
−0.0119
−0.0028
−0.0009
9.02
1.8
1.2
36.9
3.2
3.01
−0.003
−0.0001
−0.00001
Table 7. Comparison of power systems based on an AIMU.
Table 7. Comparison of power systems based on an AIMU.
CaseAdvantagesLimitation
Power system without an AIMU
(i)
Easy to install and operate,
(ii)
Easy to maintain
(i)
Easily affected by a CA;
(ii)
Unauthorized access of the cyber attackers;
(iii)
Collect sensitive data;
(iv)
Injection of false data,
(v)
Change the sensitive parameters of the system and controller;
(vi)
Decreases the resilience, reliability, and stability of the system,
(vii)
Partially or completely damages the load and grid;
(viii)
Increases the utility costs;
(ix)
Largely deviates the frequency and power of the power system.
Power system with an AIMU
(i)
Mitigates the diverse effects of unauthorized access to the power system;
(ii)
Creates a security wall to mitigate the collection and changing of sensitive data;
(iii)
Maintains a fixed level of system frequency and power;
(iv)
Increases system reliability, resilience, stability, and security;
(v)
Prevent sudden load shedding, power shortages, and a system breakdown.
(i)
Requires advanced knowledge and experience to operate and control the system.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Badal, F.R.; Nayem, Z.; Sarker, S.K.; Datta, D.; Rahman Fahim, S.; Muyeen, S.M.; Islam Sheikh, M.R.; Das, S.K. A Novel Intrusion Mitigation Unit for Interconnected Power Systems in Frequency Regulation to Enhance Cybersecurity. Energies 2021, 14, 1401. https://doi.org/10.3390/en14051401

AMA Style

Badal FR, Nayem Z, Sarker SK, Datta D, Rahman Fahim S, Muyeen SM, Islam Sheikh MR, Das SK. A Novel Intrusion Mitigation Unit for Interconnected Power Systems in Frequency Regulation to Enhance Cybersecurity. Energies. 2021; 14(5):1401. https://doi.org/10.3390/en14051401

Chicago/Turabian Style

Badal, Faisal R., Zannatun Nayem, Subrata K. Sarker, Dristi Datta, Shahriar Rahman Fahim, S. M. Muyeen, Md. Rafiqul Islam Sheikh, and Sajal K. Das. 2021. "A Novel Intrusion Mitigation Unit for Interconnected Power Systems in Frequency Regulation to Enhance Cybersecurity" Energies 14, no. 5: 1401. https://doi.org/10.3390/en14051401

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop