Next Article in Journal
Waste to H2 Sustainable Processes: A Review on H2S Valorization Technologies
Previous Article in Journal
Power Generation Mix Optimization under Auction Mechanism for Carbon Emission Rights
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Mitigating Cyber Anomalies in Virtual Power Plants Using Artificial-Neural-Network-Based Secondary Control with a Federated Learning-Trust Adaptation

by
Seyed Iman Taheri
,
Mohammadreza Davoodi
and
Mohd Hasan Ali
*
Department of Electrical and Computer Engineering, The University of Memphis, Memphis, TN 38152, USA
*
Author to whom correspondence should be addressed.
Energies 2024, 17(3), 619; https://doi.org/10.3390/en17030619
Submission received: 9 January 2024 / Revised: 23 January 2024 / Accepted: 25 January 2024 / Published: 27 January 2024
(This article belongs to the Section F: Electrical Engineering)

Abstract

:
Virtual power plants (VPPs) are susceptible to cyber anomalies due to their extensive communication layer. FL-trust, an improved federated learning (FL) approach, has been recently introduced as a mitigation system for cyber-attacks. However, current FL-trust enhancements, relying solely on proportional-integral (PI), exhibit drawbacks like sensitivity to controller gain fluctuations and a slow response to sudden disturbances, and conventional FL-trust is not directly applicable to the non-independent and identically distributed (non-IID) datasets common in VPPs. To address these limitations, we introduce an artificial neural network (ANN)-based technique to adapt FL-trust to non-IID datasets. The ANN is designed as an intelligent anomaly mitigation control method, employing a dynamic recurrent neural network with exogenous inputs. We consider the effects of the most common VPP attacks, poisoning attacks, on the distributed cooperative controller at the secondary control level. The ANN is trained offline and tested online in the simulated VPP. Using MATLAB simulations on a HOMER-modeled VPP, the proposed technique demonstrates its superior ability to sustain normal VPP operation amidst cyber anomalies, outperforming a PI-based mitigation system in accuracy and detection speed.

1. Introduction

Virtual power plants (VPPs) represent complex cyber-physical systems comprising various distributed energy resource (DER) units, microgrids, energy storage systems (ESSs), loads, conventional power plants, and electric vehicles, interconnected through a communication network. To control VPPs, both centralized and distributed mechanisms have been implemented. Centralized control faces a significant challenge related to high data analysis and calculation costs [1]. Among distributed control approaches, federated learning (FL) has shown promise, offering enhanced reliability and scalability compared to centralized control [2]. However, the distributed nature of FL renders VPPs more susceptible to physical and cyber anomalies, including poisoning attacks and information compromise in the network [3,4]. These anomalies pose serious threats, leading to system instability and synchronization issues during operation [5]. Therefore, to ensure the smooth and secure functioning of VPPs under such adverse conditions, an effective anomaly mitigation strategy is imperative.
FL is a decentralized learning approach where various clients, including Internet of Things (IoT) devices, electrical generators, and more, interact with a central service provider like Google or an energy management system (EMS) of a VPP [2]. Operating on separate datasets, these clients collaboratively train a global model while maintaining data privacy. This safeguarding of private data aligns well with evolving privacy regulations like the General Data Protection Regulation (GDPR), leading to its widespread adoption. A recent innovation in this field is FL-trust [6], a Byzantine-robust FL technique that introduces trust at the server level. Here, a curated “root dataset” forms the basis for server-side training, alongside updates from individual clients. Despite its strengths, FL-trust’s effectiveness is limited when dealing with non-independent and identically distributed (non-IID) datasets, as encountered in scenarios such as VPPs [7].
The conventional approach to VPP modeling using FL has showcased significant advancements in decentralizing the modeling process, thereby leading to improved accuracy, computational efficiency, and the facilitation of optimal power generator dispatch. Additionally, both traditional FL and FL-trust are susceptible to cyber-attacks [8,9], primarily stemming from inherent vulnerabilities within their communication networks [10].
Existing mitigation systems employed in VPPs, such as the proportional-integral (PI)-based mitigation system [11], exhibit sluggish response times, necessitate a heightened accuracy, and cause voltage deviation. PI controllers are known for their straightforward structure, incorporating proportional and integral components that facilitate efficient system regulation. In attack mitigation scenarios, a PI controller can be employed to regulate the system response to deviations caused by cyber-attacks or disturbances. The integral component helps eliminate steady-state errors, and the proportional component contributes to a quick response to sudden changes. However, it is important to note that traditional PI controllers might have limitations when dealing with complex and dynamic systems, especially in the presence of rapidly evolving cyber threats. Consequently, an urgent imperative emerges to address these security concerns comprehensively and to formulate robust strategies that preserve the integrity and privacy of the VPP modeling process within the overarching framework of FL and FL-trust methodologies [12].
In VPPs and FL-based systems, prevailing anomaly mitigation often relies on model-based approaches, requiring accurate system models and architectural knowledge [3]. However, large-scale VPPs [13] face challenges in deriving precise mathematical models, making learning-based tools like artificial neural networks (ANNs) a viable alternative for cyber anomaly mitigation. Also, ANNs can make FL-trust compatible with non-IID datasets, as suggested for future study in [8]. The nature of non-IID datasets is characterized by disparities in class representation, data volumes, and distributions across localized client datasets. This unaddressed gap in the existing body of literature underscores the need for dedicated inquiries aimed at devising resilient and efficient mechanisms that harness ANN-based strategies within FL-trust.
Based on the above background, this paper proposes innovative mechanisms that seamlessly integrate FL-trust with ANNs to mitigate cyber anomalies in a VPP system. The aim is to effectively manage non-IID datasets prevalent in VPP scenarios, thereby enhancing the accuracy of global models in the face of data heterogeneity, class imbalances, and distribution variations across localized client datasets.
This paper presents some noteworthy contributions. Firstly, it introduces an innovative ANN-based FL-trust technique that effectively addresses cyber anomalies, enhancing the security and reliability of the system. The proposed control method is demonstrated to maintain the desired system operation despite poisoning attacks in voltage communication links.
Secondly, this research achieves the robustness of the voltage in an ANN-based FL-trust process by generating diverse training data that represent varying load scenarios, enabling accurate performance evaluations under time-varying cyber anomalies.
Thirdly, this paper presents an interpretable framework for ANN models employed in the FL-trust process, allowing for a comprehensive assessment of input impacts on model performance.
This study validates the effectiveness of the proposed ANN-based secondary control for a VPP through real-time simulations on the real-time HOMER simulator, providing valuable insights into its performance. By conducting various case studies and employing essential metrics such as accuracy measurements and voltage regulation, this research determined the proficiency of the trained ANNs in achieving the desired control outcomes. Overall, the contributions of this work advance the understanding and application of ANN-based FL-trust methods for mitigating cyber anomalies and enhancing the operational reliability of VPP systems. The suggested method showcases its exceptional capability to maintain regular VPP functioning in the presence of cyber anomalies, surpassing a PI-based mitigation system in terms of accuracy (i.e., difference of 0.0001 per unit) and speed of detection. Specifically, the detection rate is improved by 64.3%, with the proposed method achieving less than 1 s and the PI-based approach achieving 2.8 s.
The paper is structured with a systematic organization that unfolds the complexities of cyber anomaly mitigation in VPPs. In Section 2, the fundamental aspects of the VPP system are elucidated, laying the groundwork for a comprehensive understanding of the ensuing mitigation strategies. Section 3 delves into the novel approach utilizing ANNs for cyber anomaly mitigation. This section provides a detailed exposition of the proposed methodology, emphasizing the integration of the FL-trust adaptation to enhance the efficacy of the ANN-based approach. In contrast, Section 4 explores the conventional PI controller as a comparative mitigation method. This section discusses the limitations and drawbacks of this traditional approach in contrast to the proposed ANN-based method. Finally, Section 5 presents the outcomes of the simulations conducted to evaluate the performance of both methods.

2. System Modeling and Formulation

The VPP devised for this research is structured as a composite system, comprising both a physical layer and a cyber layer [4]. The physical layer, analogous to conventional VPP configurations, encompasses a variety of components, namely DER units, microgrids, ESSs, loads, conventional power plants, and electric vehicles, all interconnected through a communication network [14,15]. On the other hand, the cyber layer encompasses the communication protocols that facilitate the exchange of voltage and frequency information within a distributed cooperative control architecture [16], as depicted in Figure 1. This figure depicts the comprehensive functional block diagram of a VPP employing FL in the presence of potential poisoning attacks. The diagram not only outlines the standard operational components of the VPP but also incorporates elements specifically designed to detect, mitigate, and adapt to poisoning attacks within the FL framework. This figure provides a holistic view of the VPP’s architecture, showcasing its resilience and adaptability to cybersecurity challenges posed by poisoning attacks.
The FL process is intricately integrated into the energy management system (EMS) of a VPP, overseen by the VPP’s decision-maker. The FL protocol extends its influence across various components within the VPP, utilizing the comprehensive access granted by the energy management system. This expansive reach ensures that the FL framework can effectively tap into and optimize various facets of the VPP, allowing for collaborative and distributed learning across the interconnected energy infrastructure.
The local implementation of the primary controller at each electrical generator is achieved through a conventional droop control technique, establishing the correlations between the frequency ( W i ), reactive power ( Q i ), active power ( P i ), and voltage ( v 0 ). In this paper, we have tackled the potential ambiguity related to the acronym “F”, conventionally denoting both frequency and functions, particularly objective functions. To mitigate any confusion, we have assigned “W” to represent frequency and retained “F” for functions. The voltage and frequency droop characteristics can be described mathematically as:
v 0 = v * n Q i Q i W i = w * m P i P i ,
where w * and v * represent the desired primary frequency and voltages, respectively. The parameters n Q i and m P i signify the reactive and active droop coefficients, respectively. In order to mitigate voltage and frequency deviations from their nominal values induced by the primary control, a distributed cooperative control strategy [4] is employed.
The control protocols pertinent to this study are implemented through a distributed communication network. Secondary control establishes reference values ( v * and w * ) for the primary control, aiming to synchronize the voltage ( v 0 ) and frequency ( W i ) of each power generator unit within the power grid with their respective reference values. Mathematically, this synchronization is expressed as follows:
lim t v 0 v * = 0 , lim t w i w * = 0 .
Depending on the communication protocol [17], it may be necessary for the nth generator in the VPP to share its voltage information over the communication network. In scenarios where only one generator has access to the reference v*, a weight factor known as pinning gain ( b i ) is employed to achieve the cooperative control objective, which is defined in terms of the local neighborhood tracking error ( v e n ). The expression for v e n is given as:
v e n = j S n a i j v i v j + b i ( v i v * ) ,
where S n represents the set of neighboring power generators of the nth generator, a i j denotes the elements of the adjacency matrix, and only one generator has a nonzero b i value. Similarly, for distributed secondary frequency control, the auxiliary control input ( u i ) is defined as:
u i = c g ( j S n a i j w i w j + b i w i w * ) + j S n a i j m P i P i m j P j ,
where c g represents the coupling gain. For a more comprehensive understanding of the distributed cooperative control architecture, further details can be found in [18].
Subsequently, this paper investigates the FL and FL-trust process in the VPP and related necessary modifications, also the cyber anomalies and a description of these anomalies are provided in the subsequent sections.

2.1. Federated Learning Process in a VPP

The FL process can be succinctly described as a sequential execution of three key steps [19,20], as illustrated in Figure 1:
Step I: Synchronization of the global model with clients: In this initial step, the server disseminates the current global model x * (the first global model is generated based on the previous year’s recordings of electrical generators) to the clients (electrical generators of the VPP) (either to all clients or a designated subset of them).
Consider n clients, each with their local dataset D i , i = 1, 2, …, n. Combined as D = i = 1 n D i , these datasets contain training examples drawn from an unknown distribution X . The clients collaborate, aided by a service provider, to develop a shared global model. The optimal global model x * is determined by solving x * = a r g m i n x F ( x ) , where F ( x ) represents the expected empirical loss of f D , x over joint dataset D. Typically, due to the complexity of evaluating expectations, the global model is trained by minimizing empirical loss; i.e., a r g m i n x f ( D , x ) gives the learned global model [21].
Step II: Training of local models: Each client engages in the training of a local model by fine-tuning the received global model using its local training dataset ( D i ). Specifically, the i-th client formulates an optimization problem as M i n x i f ( D i , x i ) , where x i represents the client’s local model [2]. To initialize the process, the client adopts the global model as its local model and utilizes stochastic gradient descent to iteratively update the local model for one or more iterations. Consequently, each client communicates its local model update ( g i = x i x * ) to the server, signifying the disparity between its local model and the current global model [22].
Step III: Updating the global model via aggregation: In the final step, the server aggregates the received local model updates to calculate a global model update (g) according to a predefined aggregation rule. Subsequently, the server updates the global model ( x * ) by incorporating the global model update with a global learning rate (α), i.e., x * = x * + α g , where the α is the global learning rate [23].

2.2. Poisoning Attack in the Federated Learning Process of a VPP

Poisoning attacks represent a distinct category within the realm of adversarial attacks, with a unique focus on the training phase of machine learning systems. These attacks, often referred to as data poisoning attacks, are strategically crafted to contaminate the training data, posing a significant threat to the integrity of the learned model [24]. In essence, these malicious strategies involve the injection of tainted or falsified data points into the training dataset, with the explicit intention of distorting the learning process. By infiltrating the foundational data used for model training, adversaries seek to skew the model’s understanding of patterns and relationships within the dataset. This insidious manipulation can lead to severe consequences, including erroneous predictions and compromised decision-making capabilities.
Data poisoning attacks, while sophisticated, are a tangible manifestation of the vulnerabilities inherent in machine learning systems. As the technology landscape continues to evolve, defending against such attacks is becoming paramount. Comprehensive research and innovative defenses are crucial to fortifying machine learning algorithms against these insidious strategies, ensuring the reliability and trustworthiness of artificial intelligence systems in various applications [24].

2.2.1. Attack Model

In this study, the attack model adheres to the approach followed in previous research [3,25,26]. The attacker assumes control over specific malicious clients, which may comprise either spurious clients introduced by the attacker or authentic clients that the attacker has compromised. Importantly, the server itself remains uncompromised. These malicious clients possess the capability to submit arbitrary local model updates to the server during each iteration of the FL training process. Typically, the attacker possesses partial knowledge about the FL system, including information about local training data and local model updates on the malicious clients, the loss function utilized, and the learning rate.
In the context of this study, the cyber anomalies target the communication layer of the VPP by introducing false data or by compromising the information exchange within the network [27]. The implementation of a poisoning attack involves injecting false data into the voltage and frequency information transmitted between neighboring electrical generators, specifically meant for the distributed secondary controller. Consequently, the feedback signal of the controller can be characterized as follows:
z ( u n ( t ) ) = u n t + φ n ( t ) ,
where z ( u n ( t ) ) represents the feedback signal after the attacker injects false data φ n ( t ) (t) into the controller’s nth normal feedback signal [2]. We consider u n t as the RMS voltage at the slack bus equal to v e n in Equation (3), but it can be the frequency of the system equal to u i in Equation (4).
The attack proposed in this study is characterized by a nonperiodic nature, whereby it is initiated by injecting a constant multiple of the desired signal u n t into z ( u n ( t ) ) at a specific moment during the system’s operation, as depicted below:
z ( u n ( t ) ) = u n t ,                                         w h e r e   t t 0 u n t + γ u i t       w h e r e   t > t 0

2.2.2. Detection System

The FL-trust method functions as a highly efficient means to detect poisoning attacks within the EMS of a VPP, as depicted in Figure 1. This detection mechanism shares a resemblance with residual detection methods, where FL-trust systematically assigns a trust score (TS) to each local model update based on its directional alignment with the corresponding server model update. Formally calculated as the residual error function, representing the similarity between the local and server model updates, the TS plays a pivotal role. We specifically employ the widely used rectified linear unit (ReLU) operation for thresholding. Formally, our trust score ( T S i ) is articulated as follows:
T S i = R e L U ( c i )
where T S i represents the trust score for the i-th local model update g i and c i denotes the cosine similarity between g i and server model update 0 , expressed as c i = g i . g 0 g i . g 0 . The ReLU function is mathematically defined as:
R e L U ( x ) = x               i f   x > 0 , 0       o t h e r w i s e .
The system promptly recognizes discrepancies in the local models of identical generators, signaling a potential poisoning attack. For a comprehensive understanding of this detection system, the algorithm and detailed flowchart can be found in [8].

3. Proposed ANN-Based Attack Mitigation Method

In this study, we employ a single-layer ANN to produce reference voltages for the primary controllers.
1. Input layer: The input layer is the initial stage of the ANN, comprising 13 nodes. These nodes represent crucial information related to voltage and frequency within the network.
2. Hidden layer: A hidden layer, consisting of 10 nodes, follows the input layer. This layer processes the information from the input layer through its nodes.
3. Output layer: The final stage is the output layer, which contains eight nodes. Each node in this layer corresponds to the reference outputs for the individual electrical generator units.
The architecture and configuration of the ANN, as described in these layers, are essential for understanding how the network processes and produces outcomes based on the given inputs as it is illustrated in Figure 2 for this specific system. The configuration of ANN layers is designed based on the specific structural characteristics of the VPP. The initial layer serves as the input layer, representing the generators’ powers. The eight nodes encompass generator agents responsible for formulating the generators’ local model. The 13 nodes are shaped by a number of buses in the power grid. In essence, our study delved into 8 DERs and 13 bus network buses. Nevertheless, more complex VPPs can leverage a similar methodology tailored to their specific structure and objective functions. The mathematical model of the ANN is defined as follows:
y k + 1 = f [ x k n , , x k d x n + 1 , y k n , , y ( k d y n + 1 ) ] ,
where y k represents the model output, x k denotes the model input at a discrete time interval k , d x denotes the input memory order, and d y represents the output memory order. Assuming a delay term of n = 0 , the model takes the following form:
y k + 1 = f [ x k , . x k d x + 1 , y k , , y ( k d y + 1 ) ] ,
which can be expressed in vector form as:
y k + 1 = f Y k ; X k
where boldface letters Y k and X k represent vectors for output and input, respectively. The nonlinear mapping function f ( . ) is approximated using a standard multilayer perceptron network. The EMS uses the aggregated i ( t ) to update the global model:
x t + 1 = x t + i p i i t i p i ,
where i ( t ) represents local model changes considering the local model in the previous iteration. Also, ( t ) represents local changes in generators ( t ) = x ( t + 1 ) x ( t ) . After updating the global model T times, the algorithm will stop. The data on generator i can be denoted as:
G i = { S j , L j } j = 1 τ i
where S j and L j are the j-th input sample and its corresponding label showing the pattern type, respectively. In different datasets, the labels may take various forms. In this paper, the labels show the active power level in generators and on/off states. All generators have five levels. Level zero means the generator is off, and level four indicates the generator’s operation is at full load. Also, τ i is the total number of local training samples in generator i.
The proposed ANN was introduced to overcome the non-IID nature of generators’ datasets. The neural network model n ( S j ) was implemented to create the reference voltage as the generator’s local model x i from j samples S j . Also, E i ( x i ) is the error function of data on generator i, which shows the prediction error of the model for G i . The error function is defined as follows:
E i ( x i ) = 1 τ i j G i ( n ( S j ) L j ) 2 ,
The training phase of the generators’ agents performs the minimization of the error function via the gradient descent (GD) optimization algorithm as follows:
x i r = x i r 1 η E i ( x i r 1 ) ,
where η represents the learning rate as the gradient descent step size and r is the epoch of local training. After some local training, the generator obtains a model for x i .
The proposed ANN-based mitigation method is demonstrated in Algorithm 1. In refining the algorithm, a meticulous tuning and optimization procedure was executed to enhance its efficacy. The initial step involved a thorough analysis of the algorithm’s performance metrics and its response to various inputs. This analysis helped identify key algorithmic parameters that significantly influenced its behavior. Subsequently, a combination of manual adjustment and automated optimization techniques were employed. Manual tuning involves fine-tuning parameters iteratively based on the algorithm’s output and observed behavior. Simultaneously, an automated optimization method, gradient descent, was implemented to systematically explore the parameter space and identify optimal configurations. The objective was to minimize the error function. The tuned parameters were rigorously validated using benchmark datasets and performance metrics to ensure the algorithm’s improved effectiveness in handling non-IID datasets and its generalization across various contexts.
Algorithm 1 The proposed ANN-based mitigation method for VPPs
  • Input: generator datasets G i , learning rate η , total number of iterations T
  • Output: global model x t
  • Initialization:
    -
    Set n = 0 (delay term).
    -
    Define input memory order d x and output memory order d y .
    -
    Initialize ANN with input layer (13 nodes), hidden layer (10 nodes).
  • Procedure:
    • For t = 0 to T − 1:
      • Calculate the aggregated local model changes i ( t ) for each generator using Equation (12).
      • Update the global model x(t) using Equation (12).
    • For each generator i:
      • Extract data set G i consisting of input samples S j and corresponding labels L j (Equation (13)).
      • Implement ANN-based model n ( S j ) to create the reference voltage as the generator’s local model x i .
      • Define the error function E i ( x i ) using Equation (14).
      • Perform local training to minimize the error function using the gradient descent (GD) optimization algorithm (Equation (15)).
      • After some local training epochs, generator i obtains a model for x i .
    • Repeat Steps 1 and 2 for T iterations.
  • End Algorithm 1

4. Conventional PI-Controller-Based Attack Mitigation Method

In this section, we present a mitigation approach utilizing conventional PI controllers within a VPP context. PI controllers, widely employed in control systems, are designed to regulate the output of generators by adjusting their power in response to discrepancies between the desired and actual values [28]. The control parameters, proportional and integral gains, play a crucial role in determining the controller’s performance. To optimize the conventional PI controller for VPP applications, a systematic tuning process was undertaken [3]. This involves a comprehensive analysis of the VPP’s dynamics, considering factors such as load variations, network disturbances, and the renewable energy source intermittency. The tuning process, a combination of manual adjustment and automated optimization algorithms, aimed to strike a balance between the controller’s responsiveness and stability. Performance metrics and simulation results were leveraged to fine-tune the controller parameters, ensuring their effectiveness in mitigating cyber-attacks and maintaining grid stability within the VPP framework. A comprehensive comparison and analysis of these controller types for VPPs can be found in [2].
A conventional PI-controller-based mitigation method for a VPP exhibits inherent limitations when compared to the more advanced ANN-based mitigation methods. Characterized by slow response times, a lower accuracy, and susceptibility to induced voltage deviations, the conventional PI controller lacks the adaptability required to effectively address dynamic cyber anomalies [3]. Its fixed control parameters and traditional control strategies contribute to a reduced robustness and an inability to handle non-IID datasets commonly found in VPPs. In contrast, the ANN-based method integrates FL with trust mechanisms, offering a more sophisticated and adaptive defense against evolving cyber threats. This advanced approach leverages artificial intelligence and machine learning techniques, providing a dynamic and precise mitigation strategy that surpasses the limitations associated with conventional PI controllers in the context of VPP cybersecurity.

5. Simulation Results and Discussion

This paper implicates the proposed FL approach to solve the scheduling dispatch problem of generators located in the VPP. All the generators were used for the training and testing process. The datasets for generators are from the National Aeronautics and Space Administration (NASA) and are available online: https://power.larc.nasa.gov (accessed date: 1 January 2024). This paper used HOMER Pro (available online: https://www.homerenergy.com/products/pro/index.html (accessed date: 1 January 2024)) for simulations, which is compatible with the mentioned datasets.
In this paper, we delve into a comprehensive case study, illustrated in Figure 2, that centers around a VPP. This intricate VPP configuration comprises two diesel generators, a wind turbine, an energy storage system (ESS), a photovoltaic (PV) unit, and a microgrid housing both a diesel generator and a wind turbine. The technical specifications of these generators are meticulously outlined in Table 1, offering a detailed overview of their capabilities and capacities. The production column illustrates the optimal proportion for electricity generation by generators. The remaining approximately 31.9166% represents grid purchases. For a deeper understanding of the VPP setup, including its intricate components and functionalities, readers are encouraged to refer to the comprehensive details provided in reference [3]. This case study not only serves as an essential focal point for our research but also offers valuable insights into the integration and optimization of diverse renewable energy sources within the framework of a VPP.

5.1. Impact of Poisoning Attacks on the FL-Trust Approach in VPPs

In our study, we have conducted a thorough analysis of FL-trust within a VPP context, with the primary objective of minimizing the cost function associated with this system. The outcomes of this analysis are meticulously presented in our research findings. Figure 3, a visual representation of our results, showcases the root mean square (RMS) voltage profile. This profile provides a detailed insight into the RMS voltage levels within the system, offering a comparative perspective between normal operational states and those impacted by external attacks. By studying this visual representation, we gain a comprehensive understanding of how the system’s voltage levels fluctuate under different conditions, shedding light on the effectiveness of FL-trust in maintaining a stable and secure operation within the VPP framework. These findings not only contribute significantly to our understanding of VPP dynamics but also pave the way for enhanced strategies in managing voltage stability during various operational scenarios.
In our simulation, we systematically applied Equation (6) to inject fabricated data into the voltage communication links of generators, specifically focusing on the communication link associated with diesel generator 1. This experiment was designed to simulate a poisoning attack scenario. At t = 3 s, a poisoning attack was initiated with the parameter γ set to 1.5. The attack continues after t = 3 s. Prior to this attack (t < 3 s), the VPP functioned under normal operational conditions. Following the initiation of the attack, the VPP’s performance was monitored and compared with its pre-attack state to gauge the impact of the poisoning attack.
The simulation results, visually represented in Figure 3, provide a clear depiction of the alterations in voltage levels induced by the proposed poisoning attack. This graphical representation highlights the significant changes in the VPP’s voltage characteristics post-attack, illustrating the attack’s disruptive influence on the system. Furthermore, similar observations were made for the three-phase voltage, as evidenced in Figure 4. In this figure, the attack is initiated at t = 3 s, leading to a voltage deviation. The attack persists continuously after the third second. These findings serve as crucial evidence of the attack’s implications on the VPP’s overall performance and underscore the importance of understanding and mitigating such cybersecurity threats in power systems. Through these simulations, we gain valuable insights into the vulnerabilities of the VPP framework and emphasize the need for robust security measures to ensure the resilience and stability of power systems in the face of potential attacks.

5.2. Effectiveness of the Proposed ANN-Based FL-Trust Mitigation Approach

In this work, we conducted a comprehensive evaluation of the novel ANN-based FL-trust mitigation system. This innovative approach was meticulously compared to the conventional FL control method currently in use. The research findings, summarized in Figure 5, provide a compelling visual representation of the comparative performance. The figure exhibits four zones. Initially, iterations 0 to 150 illustrate the system’s startup operation. Subsequently, from iteration 150 to 200, the normal operation of the system is represented. Following that, from iteration 200 to 250, the detection of the continuous poisoning attack occurring after iteration 200 by FL-trust is demonstrated. Lastly, iterations 250 to 270 denote the operations of FL-trust to mitigate the attack.
Under normal operational conditions, the proposed ANN-based FL-trust system exhibited a remarkable accuracy, achieving an impressive 0.98 per unit accuracy level. This showcases the system’s robustness and reliability in maintaining accuracy during regular operations. More notably, during our analysis of a poisoning attack scenario initiated at iteration 200, the proposed system effectively mitigated the attack within a mere 70 iterations. This rapid response time underscores the agility and efficiency of the ANN-based FL-trust approach in counteracting malicious attacks, thereby safeguarding the virtual power plant’s performance and voltage characteristics.
These results illuminate the substantial superiority of our proposed ANN-based FL-trust approach over the existing FL-based control method. By offering a high level of accuracy and swift mitigation capabilities, the ANN-based system is proven to be a significant advancement in fortifying a VPP against cyber threats. This research not only highlights the innovative strides made in power system security but also provides invaluable insights into the future of cybersecurity measures within the realm of energy management.

5.3. Performance Comparison of the Proposed ANN-Based Mitigation Approach with a PI-Based Approach

To comprehensively assess the performance of our proposed FL-trust approach, we conducted a direct comparison with the conventional proportional-integral (PI)-based mitigation system, a widely utilized method in similar contexts. This comparison is crucial in understanding the nuanced differences in mitigation capabilities under attack conditions. The results, as visually presented in Figure 6, illuminate a significant contrast in response dynamics between the two systems. FL-trust detects and mitigates the attack in approximately 70 iterations, while the PI-based method requires about 200 iterations, highlighting the superior calculation speed of FL-trust.
At the critical 4 s mark, an attack was initiated, setting the stage for a real-time evaluation of the mitigation mechanisms. The FL-trust approach swiftly demonstrated its agility, promptly detecting and effectively countering the attack. In stark contrast, the PI-based system exhibited a comparatively delayed and less precise response, indicating its limitations in swiftly mitigating cyber threats in high-stress scenarios.
It is noteworthy that Fl-trust, like other learning processes, relies heavily on the quality and sufficiency of the training data. If the training data are insufficient or lack representativeness of the underlying patterns, the FL-trust process may face challenges in accurately learning and adapting to the system dynamics. However, having some trusted patterns causes it to operate better than conventional FL in these cases.
The FL-trust method is a robust approach to enhancing the security of VPPs by effectively mitigating various types of cyber-attacks. One of its primary advantages lies in its ability to detect and counteract poisoning attacks within the EMS of the VPP. By assigning trust scores to local model updates and normalizing them based on their alignment with the server model update, FL-trust excels in handling non-IID datasets, a common challenge in VPP contexts. However, it is essential to note that FL-trust, like any method, has its limitations. The approach might face challenges in scenarios where training data are insufficient. Moreover, while FL-trust demonstrates efficacy against poisoning attacks, its performance in countering other types of cyber threats needs further exploration.
In comparison to traditional FL and other defense methods, FL-trust stands out for its resilience in the face of non-IID datasets, providing a superior performance. The method showcases an adept mechanism for managing data heterogeneity, leading to an enhanced accuracy in global models. Contrastingly, conventional FL may struggle with the intricacies of non-IID datasets. Additionally, FL outperforms a traditional PI-based mitigation system, offering a better accuracy and detection rate. As the field of cybersecurity in VPPs evolves, ongoing research and exploration are vital to further refine and optimize defense mechanisms against a broader spectrum of cyber threats.
Crucially, post-mitigation, the FL-trust system seamlessly restored the system to its original state, showcasing its accuracy and effectiveness in neutralizing the threat while ensuring the system’s stability. This outcome underscores the robustness and reliability of the FL-trust approach in real-world situations, emphasizing its superiority over traditional methods like PI control.
These results not only validate the efficacy of our FL-trust approach but also pave the way for future advancements in cyber-resilient energy systems. By highlighting its precision, agility, and ability to restore normalcy swiftly, this research contributes significantly to the evolving landscape of power system security, offering a promising path toward enhanced cybersecurity protocols within the realm of energy management.

6. Conclusions

This paper has presented the mitigation of cyber anomalies in virtual power plants using ANN-based secondary control with FL-trust adaptation. Additionally, this paper analyzed a poisoning attack with the proposed FL-trust. By bridging the gap between theoretical modeling and practical defense mechanisms, this paper has not only contributed valuable insights to the field of cybersecurity in power systems but has also laid a foundation for future research endeavors. The main contributions of this paper are:
  • The superior performance of the proposed FL-trust method over traditional FL with a PI controller was demonstrated, particularly in handling non-IID datasets.
  • It was demonstrated that the PI controller had slow response times and a lower accuracy and induced voltage deviations.
  • Poisoning attacks in the context of the proposed FL-trust were analyzed, shedding light on attack patterns and corresponding defense strategies.
Looking ahead, the research community can further enhance this work by studying the inclusion of other potential cyber threats within the proposed FL-trust framework. By expanding our understanding of various attack vectors and their corresponding defense mechanisms, future studies can explore other novel attack mitigation approaches for FL-trust in VPPs and can bolster the resilience of VPPs against a broader spectrum of cyber threats, thereby ensuring the stability and security of our energy systems in the face of evolving cybersecurity challenges. These continued explorations will undoubtedly shape the future landscape of power system security, offering robust and adaptive solutions to safeguard our critical energy infrastructure.

Author Contributions

Conceptualization, S.I.T.; methodology, S.I.T.; software, S.I.T.; validation, S.I.T., M.D. and M.H.A.; formal analysis, M.H.A.; investigation, M.H.A.; resources, S.I.T.; data curation, S.I.T.; writing—original draft preparation, S.I.T.; writing—review and editing, S.I.T., M.D. and M.H.A.; visualization, M.H.A.; supervision, M.H.A.; project administration, M.H.A.; funding acquisition, M.H.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created.

Acknowledgments

The authors are pleased to acknowledge all support from the Dept. of Electrical and Computer Engineering at The University of Memphis, USA, to complete this work.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Cao, J.; Zheng, Y.; Han, X.; Yang, D.; Yu, J.; Tomin, N.; Dehghanian, P. Two-Stage Optimization of a Virtual Power Plant Incorporating with Demand Response and Energy Complementation. Energy Rep. 2022, 8, 7374–7385. [Google Scholar] [CrossRef]
  2. Zhang, Z.; Du, J.; Zhu, K.; Guo, J.; Li, M.; Xu, T. Optimization Scheduling of Virtual Power Plant with Carbon Capture and Waste Incineration Considering P2G Coordination. Energy Rep. 2022, 8, 7200–7218. [Google Scholar] [CrossRef]
  3. Chu, T.; Yan, Z.; Gong, X.; Dong, F. Network Attack Detection Method for Distributed Economic Dispatch of Virtual Power Plants. In Proceedings of the 2022 First International Conference on Cyber-Energy Systems and Intelligent Energy (ICCSIE), Beijing, China, 15–16 October 2022; pp. 1–6. [Google Scholar]
  4. Ozkan-Okay, M.; Samet, R.; Aslan, Ö.; Kosunalp, S.; Iliev, T.; Stoyanov, I. A Novel Feature Selection Approach to Classify Intrusion Attacks in Network Communications. Appl. Sci. 2023, 13, 11067. [Google Scholar] [CrossRef]
  5. Sokolov, S.A.; Iliev, T.B.; Stoyanov, I.S. Analysis of Cybersecurity Threats in Cloud Applications Using Deep Learning Techniques. In Proceedings of the 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 20–24 May 2019; pp. 441–446. [Google Scholar]
  6. Gholami, A.; Torkzaban, N.; Baras, J.S. Trusted Decentralized Federated Learning. In Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2022; pp. 1–6. [Google Scholar]
  7. Wille-Haussmann, B.; Erge, T.; Wittwer, C. Decentralised Optimisation of Cogeneration in Virtual Power Plants. Sol. Energy 2010, 84, 604–611. [Google Scholar] [CrossRef]
  8. Li, J.; Dang, S.; Wen, M.; Li, Q.; Chen, Y.; Huang, Y.; Shang, W. Index Modulation Multiple Access for 6G Communications: Principles, Applications, and Challenges. IEEE Netw. 2023, 37, 52–60. [Google Scholar] [CrossRef]
  9. Wen, M.; Li, Q.; Kim, K.J.; Lopez-Perez, D.; Dobre, O.; Poor, H.V.; Popovski, P.; Tsiftsis, T. Private 5G Networks: Concepts, Architectures, and Research Landscape. IEEE J. Sel. Top. Signal Process 2022, 16, 7–25. [Google Scholar] [CrossRef]
  10. Wahab, O.A.; Rjoub, G.; Bentahar, J.; Cohen, R. Federated against the Cold: A Trust-Based Federated Learning Approach to Counter the Cold Start Problem in Recommendation Systems. Inf. Sci. 2022, 601, 189–206. [Google Scholar] [CrossRef]
  11. Khan, A.A.; Beg, O.A.; Jin, Y.-F.; Ahmed, S. An Explainable Intelligent Framework for Anomaly Mitigation in Cyber-Physical Inverter-Based Systems. IEEE Access 2023, 11, 65382–65394. [Google Scholar] [CrossRef]
  12. Kasaei, M.J.; Gandomkar, M.; Nikoukar, J. Optimal Management of Renewable Energy Sources by Virtual Power Plant. Renew Energy 2017, 114, 1180–1188. [Google Scholar] [CrossRef]
  13. Srivastava, A.K.; Latif, A.; Shaoo, S.C.; Das, D.C.; Hussain, S.M.S.; Ustun, T.S. Analysis of GOA Optimized Two-Stage Controller for Frequency Regulation of Grid Integrated Virtual Power Plant. Energy Rep. 2022, 8, 493–500. [Google Scholar] [CrossRef]
  14. Zhao, B.; Wang, T.; Fang, L. FedCom: Byzantine-Robust Federated Learning Using Data Commitment. In Proceedings of the ICC 2023—IEEE International Conference on Communications, Rome, Italy, 28 May–1 June 2023; pp. 33–38. [Google Scholar]
  15. Zhou, F.; Yu, R.; Li, Z.; Gu, H.; Wang, X. FedAegis: Edge-Based Byzantine-Robust Federated Learning for Heterogeneous Data. In Proceedings of the GLOBECOM 2022—2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 4–8 December 2022; pp. 3005–3010. [Google Scholar]
  16. Feng, B.; Liu, Z.; Huang, G.; Guo, C. Robust Federated Deep Reinforcement Learning for Optimal Control in Multiple Virtual Power Plants with Electric Vehicles. Appl. Energy 2023, 349, 121615. [Google Scholar] [CrossRef]
  17. Norouzi, S.; Ghoreishy, H.; Ahmad, A.A.; Tahami, F. Stability Analysis of Variable Frequency Control Method of Soft Switching for Boost Converter with Wide Bandgap Semiconductors. In Proceedings of the 2023 14th Power Electronics, Drive Systems, and Technologies Conference (PEDSTC), Babol, Iran, 31 January–2 February 2023; pp. 1–7. [Google Scholar]
  18. Distributed Control Systems for Small-Scale Power Networks: Using Multiagent Cooperative Control Theory. IEEE Control Syst. 2014, 34, 56–77. [CrossRef]
  19. Cai, Z.; Jiao, X.; Wei, L.; Wang, Y. An Improved Abnormal Power Consumption Detection System Based on Federated Learning. In Proceedings of the 2023 4th International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), Hangzhou, China, 25–27 August 2023; pp. 378–382. [Google Scholar]
  20. Li, S.; Hu, J.; Chen, X.; Tan, Y.; Zhang, J.; Li, P. An Object Detection Model for Electric Power Operation Sites Based on Federated Self-Supervised Learning. In Proceedings of the 2023 Panda Forum on Power and Energy (PandaFPE), Chengdu, China, 27–30 April 2023; pp. 1706–1710. [Google Scholar]
  21. Fu, W.; Zhang, X.; Wang, J.; Yang, D.; Lv, Y.; Wang, Y.; Zhen, Z.; Wang, F. A Spatiotemporal Federated Learning Based Distributed Photovoltaic Ultra-Short-Term Power Forecasting Method. In Proceedings of the 2023 IEEE/IAS 59th Industrial and Commercial Power Systems Technical Conference (I&CPS), Las Vegas, NV, USA, 21–25 May 2023; pp. 1–7. [Google Scholar]
  22. Duan, J.; Duan, J.; Wan, X.; Li, Y. Efficient Federated Learning Method for Cloud-Edge Network Communication. In Proceedings of the 2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE), Guangzhou, China, 14–16 April 2023; pp. 118–121. [Google Scholar]
  23. Wang, H.; Mao, D.; Chen, Z.; Rao, H.; Li, Z. Blockchain-Based Decentralized Federated Learning Model. In Proceedings of the 2023 4th International Conference on Information Science, Parallel and Distributed Systems (ISPDS), Guangzhou, China, 14–16 July 2023; pp. 622–625. [Google Scholar]
  24. Hu, H.; Yuan, L. Poisoning Attack in Federated Learning Using Normalizing Flows. In Proceedings of the 2023 International Seminar on Computer Science and Engineering Technology (SCSET), New York, NY, USA, 29–30 April 2023; pp. 310–313. [Google Scholar]
  25. Dasgupta, D.; Gupta, K.D. Dual-Filtering (DF) Schemes for Learning Systems to Prevent Adversarial Attacks. Complex Intell. Syst. 2022, 9, 3717–3738. [Google Scholar] [CrossRef]
  26. Tran, H.-Y.; Hu, J.; Yin, X.; Pota, H.R. An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2538–2552. [Google Scholar] [CrossRef]
  27. Hmood, H.S.; Li, Z.; Abdulwahid, H.K.; Zhang, Y. Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack. Comput. J. 2015, 58, 973–985. [Google Scholar] [CrossRef]
  28. Hafezi, H.; Bakhtiari, A.; Khaki-Sedigh, A. Design and Implementation of a Fault-Tolerant Controller Using Control Allocation Techniques in the Presence of Actuators Saturation for a VTOL Octorotor. Robotica 2022, 40, 3057–3076. [Google Scholar] [CrossRef]
Figure 1. The functional block diagram of an FL-based virtual power plant considering an attack.
Figure 1. The functional block diagram of an FL-based virtual power plant considering an attack.
Energies 17 00619 g001
Figure 2. The proposed VPP model for the implication of FL-trust.
Figure 2. The proposed VPP model for the implication of FL-trust.
Energies 17 00619 g002
Figure 3. Normal operation and attack impact on the voltage profile of the proposed VPP.
Figure 3. Normal operation and attack impact on the voltage profile of the proposed VPP.
Energies 17 00619 g003
Figure 4. Three-phase voltage at the slack bus with attack (attack at t = 3 s).
Figure 4. Three-phase voltage at the slack bus with attack (attack at t = 3 s).
Energies 17 00619 g004
Figure 5. Accuracy comparison of FL-based control (red line) and the proposed ANN-based FL-trust (blue line).
Figure 5. Accuracy comparison of FL-based control (red line) and the proposed ANN-based FL-trust (blue line).
Energies 17 00619 g005
Figure 6. Operation comparison of proposed FL-trust and traditional PI-based mitigation systems.
Figure 6. Operation comparison of proposed FL-trust and traditional PI-based mitigation systems.
Energies 17 00619 g006
Table 1. Technical specification of the VPP.
Table 1. Technical specification of the VPP.
ComponentModelCapacityProduction (%)
Wind turbine 1Generic10 kW0.0962
Wind turbine 2Bergey Excel 6-R6 kW0.0934
Energy storageLead Acid1 MWh2.1
PhotovoltaicFlat plate557 kW10.4
Diesel generator 1Diesel fixed capacity Genset1 MW51.5
Diesel generator 2Diesel fixed capacity Genset1 MW
Diesel generator 3Diesel fixed capacity Genset100 kW
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Taheri, S.I.; Davoodi, M.; Ali, M.H. Mitigating Cyber Anomalies in Virtual Power Plants Using Artificial-Neural-Network-Based Secondary Control with a Federated Learning-Trust Adaptation. Energies 2024, 17, 619. https://doi.org/10.3390/en17030619

AMA Style

Taheri SI, Davoodi M, Ali MH. Mitigating Cyber Anomalies in Virtual Power Plants Using Artificial-Neural-Network-Based Secondary Control with a Federated Learning-Trust Adaptation. Energies. 2024; 17(3):619. https://doi.org/10.3390/en17030619

Chicago/Turabian Style

Taheri, Seyed Iman, Mohammadreza Davoodi, and Mohd Hasan Ali. 2024. "Mitigating Cyber Anomalies in Virtual Power Plants Using Artificial-Neural-Network-Based Secondary Control with a Federated Learning-Trust Adaptation" Energies 17, no. 3: 619. https://doi.org/10.3390/en17030619

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop