Next Article in Journal
Autonomous Textile Sorting Facility and Digital Twin Utilizing an AI-Reinforced Collaborative Robot
Previous Article in Journal
Partial Ambiguity Resolution Strategy for Single-Frequency GNSS RTK/INS Tightly Coupled Integration in Urban Environments
Previous Article in Special Issue
A Multi-Source Embedding-Based Named Entity Recognition Model for Knowledge Graph and Its Application to On-Site Operation Violations in Power Grid Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Resilient Event-Triggered H Control for a Class of LFC Systems Subject to Deception Attacks

1
China Electric Power Research Institute, Nanjing 210003, China
2
State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology, Nanjing 210003, China
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(13), 2713; https://doi.org/10.3390/electronics14132713
Submission received: 4 June 2025 / Revised: 27 June 2025 / Accepted: 1 July 2025 / Published: 4 July 2025
(This article belongs to the Special Issue Knowledge Information Extraction Research)

Abstract

This paper explores an event-triggered load frequency control (LFC) strategy for smart grids incorporating electric vehicles (EVs) under the influence of random deception attacks. The aggressive attack signals are launched over the channels between the sensor and controller, compromising the integrity of transmitted data and disrupting LFC commands. For the purpose of addressing bandwidth constraints, an event-triggered transmission scheme (ETTS) is developed to minimize communication frequency. Additionally, to mitigate the impact of random deception attacks in public environment, an integrated networked power grid model is proposed, where the joint impact of ETTS and deceptive interference is captured within a unified analytical structure. Based on this framework, a sufficient condition for stabilization is established, enabling the concurrent design of the H controller gain and the triggering condition. Finally, two case studies are offered to illustrate the effectiveness of the employed scheme.

1. Introduction

Modern electric power grids are a typical example of networked control architectures, where generation facilities, sensing equipment, and control units are interconnected via large-scale communication infrastructures [1,2,3,4]. Within these systems, load frequency control (LFC) is vital for suppressing frequency deviations induced by variations in power demand [5,6,7,8]. In recent developments, electrical vehicles (EVs) [9,10] have emerged as promising technologies due to their potential to curb emissions of greenhouse gases and lessen the dependence on fossil-based energy. EVs can both draw power from and supply power to the grid, presenting new opportunities for integration with power systems. This bidirectional interaction enables EVs to provide auxiliary services, such as frequency and voltage regulation, thereby enhancing grid stability and efficiency.
LFC is a critical component of smart grids, responsible for maintaining optimal system frequency and managing power exchanges between areas [11]. In modern smart grids, the LFC system heavily relies on advanced communication technologies, which also introduce various security vulnerabilities. Typically, data acquisition systems forego high-level encryption for authentication due to the stringent real-time demands of LFC data, rendering them highly susceptible to cyberthreats such as deception attacks [12,13] and denial-of-service (DoS) attacks [14,15]. DoS attacks interfere with the communication between the phasor measurement unit (PMU) and the LFC system, while deception attacks undermine data integrity, thereby impairing the control center’s ability to make informed decisions. In some extreme cases, such attacks may cause significant frequency deviations, potentially resulting in power system failure [16]. Consequently, it is imperative to explore robust control techniques that can withstand deceptions in power systems, which ensure both system stability and smart grid network security.
The integration of Smart Microgrids (SMGs) into LFC has been extensively studied in the literature [17,18,19,20]. For instance, by designing an appropriate feedback controller and leveraging SMGs participation, LFC can effectively regulate frequency deviations and enhance overall power system stability. However, power systems operating within wired/wireless communication networks face unavoidable issues including communication delays, packet dropouts, and cyberattacks. In recent years, these issues have attracted significant attention from researchers [21,22,23]. For example, in [17], an adaptive multi-objective fuzzy proportional-integral-derivative controller is proposed for the LFC of islanded SMGs. Hu et al. [21] have proposed multi-power systems subject to unknown load disturbances and intermittent denial-of-service (DoS) attacks, and a resilient load frequency controller has been devised. Peng et al. have discussed an adaptive event-triggering H LFC scheme, where the event-triggering threshold can be dynamically adjusted to save more resources, while maintaining the expected control performance. In [24], a robust cooperative LFC strategy for multi-area power systems via a hierarchical control approach has been devised. Despite these advancements, the influence of EVs on frequency domains for power systems warrants a deeper exploration.
Notably, most existing investigations adopt a time-triggered scheme, where sensors sample system outputs at fixed intervals and immediately transmit the data to the controller. In this building, the sampling period is chosen conservatively to ensure the system performance even under worst-case conditions, To maintain system effectiveness under adverse conditions, such as severe disturbances, prolonged delays, or undesired noises, the sampling period is deliberately set with a conservative margin. Nevertheless, since such scenarios occur infrequently, this conservative strategy results in redundant sampling, yielding unnecessary bandwidth consumption and increased computational burden on the controller. As a result, developing an efficient yet resource-conscious scheduling algorithm named event-triggered communication scheme has been recognized as reliable control approach [25,26,27,28,29]. Under this scheme, sampled measurements are transmitted only when specific conditions are met, effectively reducing communication overhead in the network. However, combining event-triggered schemes with LFC to construct a unified model poses significant challenges, which encourages us to study deeply.
It should be highlighted that in a networked power system, both control and communication signals are often delivered via open-access networks, which exposes them to significant cyberattack risks [30,31]. For instance, as reported in [32], cyberattacks can lead to severe consequences, including information leakage, destruction of critical infrastructure, and other devastating impacts. Consequently, ensuring the security of power systems is an issue of paramount importance. A wealth of research has been conducted in this area (see [12,33,34]). Among various cyberthreats, deception attacks stand out as one of the most critical, as they compromise data integrity by altering its content. There has been an increasing focus on investigating deception attacks (see [30,34,35]). For example, the optimal linear deception attacks targeting remote state estimation has been explored in [32], and the metric of K-L divergence has been adopted for measuring the statistical distribution of transmission sequence. As a typical deception attacks, a class of zero trace stealthy attacks has been researched for distributed secondary control in DC microgrids (DCmGs) [36], which can degrade the control objective while keep stealthy to implemented detectors. Furthermore, a recursive filter design problem was considered in [35] for a type of time-varying discrete sequential systems under deception attacks. As typical networked systems, power systems for LFC are particularly vulnerable to malicious adversaries [23]. However, despite the critical nature of this issue, cyberattack resilience in the LFC of power systems remains less examined. Addressing this gap serves as the second key motivation of this research.
In this work, an event-triggered H controller has been developed within the context of power systems. It is evident that the research into LFC controller design is still in its infancy and the challenges underlying this study stem from the following aspects: (1) How can we formulate a comprehensive model that incorporates the LFC dynamics, random deception attacks, and the event-triggered mechanism? (2) How can we design the suitable communication protocol for reducing computational overhead? (3) How can we deploy a resilient H controller to effectively mitigate the adverse impacts of cyberattacks?
Based on the previous analysis, this study investigates H load frequency control in power systems subject to limited bandwidth and exposed communication channels. For optimizing communication resources while enhancing control performance, an event-triggered transmission scheme (ETTS) is put forward, which enables more efficient data transmission and reduces unnecessary communication. In order to capture real-world complexities, the concerned system model also accounts for randomly occurring deception attacks; an event-triggered feedback controller is designed to ensure the asymptotically mean-square stability (AMSS) of power systems, with rigorously derived sufficient conditions. Furthermore, the controller gain and event-triggered parameter are jointly optimized by solving linear matrix inequalities, thereby achieving both security and efficiency. The main contributions of this work are outlined below:
  • An integrated model of a networked power system is established, which simultaneously accounts for communication delays, stochastic deception attacks, and ETTS.
  • An ETTS is proposed to minimize redundant transmission while enhancing control performance. Different from the traditional time-triggered scheme, ETTS effectively utilizes sampled data selectively, reducing the computation burden fairly.
  • An event-triggered H LFC design method is carefully developed to jointly optimize the output-feedback controller gain along with the communication parameters. Unlike conventional time-triggered controllers, the proposed H LFC controller enhances control performance by effectively utilizing available information, even in the presence of deception attacks, achieving superior resilience compared to standard approaches.
Organizations: The remainder of this paper is organized as follows. Section 1 introduces the system description and fundamental concepts, covering the system model and the relevant ETTS used in the following analysis. Section 3 presents the stability criterion for the power systems under investigation. In Section 4, two cases are given to validate the usefulness of the developed method. Lastly, Section 5 summarizes this work.
Notations: The notation used in this paper follows standard conventions unless otherwise specified. The set of natural numbers is denoted by N . The symbols R , R n , and R n × m represent the set of real numbers, the space of n-dimensional real numbers, and the space of n × m real matrices, respectively. The transpose of a matrix A is denoted by A T . The notation [ A i j ] n × n indicates an n × n block matrix, where the block at the ith row and jth column is A i j . The identity matrix of appropriate dimensions is represented by I. The function diag · constructs a diagonal matrix. The notation | | · | | denotes the Euclidean norm for vectors and the induced 2-norm for matrices. Lastly, E · represents the expectation of a given stochastic variable.

2. Problem Setup

This part presents the dynamic modeling of load frequency control (LFC) systems integrated into electric vehicles (EVs), taking into account load disturbances to better reflect the actual behavior of power systems, as discussed in [37]. The proposed system architecture is depicted in Figure 1; based on the information flow and transfer functions illustrated, the entire control loop involves the following modules, including EVs, governors, turbines, and generators. The controller generates output signals that regulate the power frequency deviation of the generator through two control subloops. In the first path, the controller output is distributed to the governor via a regulation gain. The signal then passes through the governor dynamics and the governor droop characteristics to produce a speed control signal, which is further processed by the turbine dynamics to generate the turbine output power. In another subloop, the controller output is allocated to the EVs module, leading to the incremental change in the EVs’ output power. Taking external disturbance into account, the total generation power can be calculated from the turbine and the EVs unit. The relevant physical variables are summarized in Table 1. Moreover, two definitions are added.  
Definition 1
(State-space method). The state-space method is a modeling method describing system dynamics with a set of differential or difference equations, which are especially suitable for analyzing multi-input multi-output (MIMO) systems.
Definition 2
(Asymptotically mean-square stability (AMSS)). Mathematically, a stochastic system is said to be AMSS if
lim k E | | x k | | 2 = 0 ,
where x k denotes the system state at instant k.
On the basis of the flow chart included in Figure 1, one has
f ( s ) = 1 D + s M ( P g ( s ) + P e ( s ) P l ( s ) ) , X g ( s ) = 1 1 + s T g ( α g P c ( s ) 1 R g f ( s ) ) , P g ( s ) = 1 1 + s T t X g ( s ) , P e ( s ) = K e 1 + s T e ( α e P c ( s ) ρ e f ( s ) ) , Δ ( s ) = 1 s A C E ( s ) = 1 s b f ( s ) .
By applying the inverse Laplace Transform for (1), one has
f ˙ ( t ) = 1 M ( P g ( t ) + P e ( t ) P l ( t ) D f ( t ) ) , X ˙ g ( t ) = 1 T g ( α g P c ( t ) 1 R g f ( t ) X g ( t ) ) , P ˙ g ( t ) = 1 T t ( X g ( t ) P g ( t ) ) , P ˙ e ( t ) = K e T e ( α e P c ( t ) ρ e f ( t ) ) 1 T e P e ( t ) , Δ ˙ ( t ) = b f ( t ) .
Define
x ( t ) = [ f ( t ) , X g ( t ) , P g ( t ) , P e ( t ) , Δ ( t ) ] T , y ( t ) = [ f ( t ) , Δ ( t ) ] T , u ( t ) = P c ( t ) , ϖ ( t ) = P l ( t ) .
According to the state-space method in Definition 1, the LFC system has the following expression.
x ˙ ( t ) = A x ( t ) + B u ( t ) + D ϖ ( t ) , y ( t ) = C x ( t ) ,
where A, B, C, and D indicate system matrices, x ( t ) , u ( t ) , and ϖ ( t ) represent the state vector, the control input, and external disturbance, respectively, and
A = D M 0 1 M 1 M 0 1 R g T g 1 T g 0 0 0 0 1 T t 1 T t 0 0 ρ e K e T e 0 0 1 T e 0 b 0 0 0 0 , B = 0 α g T g 0 α e K e T e 0 T , C = 1 0 0 0 0 0 0 0 0 1 , D = 1 M 0 0 0 0 T .

2.1. ETTS

This subsection introduces an event-based communication protocol to optimize the utilization of communication bandwidth while maintaining optimal system performance. Defining h as the sampling period of the concerned LFC systems. The most recent triggering instant and the next triggering instant are indicated by t k h and t k + 1 h , respectively, and the next triggering instant can be determined by:
t k + 1 h t k h + min i N i h | e T ( t ) Ψ e ( t ) > σ x T ( t k h ) Ψ x ( t k h ) , e ( t ) x ( t k h + i h ) x ( t k h ) ,
where Ψ denotes the triggering threshold matrix and 0 < σ 1 represents the threshold value.
Remark 1.
In practical systems, transmitted signals are susceptible to various anomalies, including malicious attacks, network-induced delays, data packet losses, and so forth. Though irregularities may occur with low probability from a statistical standpoint, they can still pose significant threats to the system performance. It is worth noting that the employed ETTS plays a crucial role in mitigating the impact of abnormal signals and relieving computation burden. As expressed in (3), the adopted ETTS reduces to the general time-triggered manner when σ = 0 .
It is well-known that time delay is a common yet unavoidable network-induced phenomenon in LFC systems, which must be carefully considered in network communication. In this article, as shown in Figure 2, the interval between t 1 h and t 2 h can be divided into five subintervals according to the designed principle. Consequently, by means of the virtual partition method proposed in [25], for any given time period between two consecutive triggering instants t k h and t k + 1 h , after considering the respective time delays at the triggering instant from the sensor to the controller, it can be expressed by the following subperiods:
[ t k h + μ t k , t k + 1 h + μ t k + 1 ) = i = 0 f M I i , I 0 = [ t k h + μ t k , ( t k + 1 ) h + μ ¯ ) , I i = [ ( t k + i ) h + μ ¯ , ( t k + i + 1 ) h + μ ¯ ) , i = 1 , , f M 1 , I f M = [ ( t k + f M ) h + μ ¯ , t k + 1 h + μ t k + 1 ) ,
where μ ¯ indicates the upper bound of μ t k .
We now consider the following two cases:
Case 1: If t k + 1 h + μ t k + 1 t k h + h + μ ¯ , define a function μ ( t ) as
μ ( t ) = t t k h , t [ t k h + μ t k , t k + 1 h + μ t k + 1 ) .
Obviously, μ t k μ ( t ) ( t k + 1 t k ) h + μ t k + 1 h + μ ¯ .
Case 2: If t k h + h + μ ¯ < t k + 1 h + μ t k + 1 , one has
μ ( t ) = t t k h , t I 0 , t t k h i h , t I i , i = 1 , , f M 1 , t t k h f M h , t I f M .
Therefore, we have
μ t k μ ( t ) h + μ ¯ , t I 0 , μ t k μ ¯ μ ( t ) h + μ ¯ , t I i , i = 1 , , f M 1 , μ t k μ ¯ μ ( t ) h + μ ¯ , t I f M ,
and 0 μ t k μ ( t ) h + μ ¯ μ M . From (4), one has
e ( t ) = 0 , t I 0 , x ( t k + i h ) x ( t k h ) , t I i , i = 1 , , f M 1 , x ( t k + f M h ) x ( t k h ) , t I f M .
Therefore
e ( t ) = x ( t μ ( t ) ) x ( t k h ) , t I i .

2.2. Random Deception Attacks

In this article, it is assumed that the measurement signals are subject to random deception attacks governed by malicious adversaries. On the basis of the above analysis, an indicator variable λ ( t ) is introduced to formulate this scene, and the actual measurement signal is as follows:
y ¯ ( t ) = ( 1 λ ( t ) ) y ( t ) + λ ( t ) ψ ( y ( t ) ) ,
where ψ ( y ( t ) ) denotes the injected data during the process of deception attack, and satisfies the following:
| | ψ ( y ( t ) ) | | 2 | | G y ( t ) | | 2 ,
with G being a known matrix of appropriate dimensions. Specifically, the random variable λ ( t ) follows a Bernoulli distribution with the following expression:
Pr λ ( t ) = 1 = λ ¯ , Pr λ ( t ) = 0 = 1 λ ¯ ,
where λ ¯ [ 0 , 1 ] .
Remark 2.
According to (7), (8) and (9), it can be observed that the matrix G represents the upper bound of the nonlinearity of ψ ( y ( t ) ) . On the other hand, λ ( t ) regulates the randomness of the deception attacks. Particularly, when λ ( t ) = 1 , this indicates that the system is under attack. Conversely, when λ ( t ) = 0 , the system runs normally. From the stand of defender, the randomness of the attacks stems from the fact that their success heavily depends on the fluctuating detection capabilities of protective equipment or software. Moreover, the modified measurement signal ψ ( y ( t ) ) is supposed to be bounded, as deception attacks with large amplitudes are more likely to be detected by attackers, making subtle attacks preferable.
To mitigate the adverse impacts caused by randomly occurring deception attacks, the output feedback controller can be designed as follows:
u ( t ) = K y ( t k h ) = ( 1 λ ( t ) ) K C ( x ( t μ ( t ) ) e ( t ) ) λ ( t ) K ψ ( y ( t k h ) ) ,
thereby, one has
x ˙ ( t ) = A x ( t ) ( 1 λ ( t ) ) B K C ( x ( t μ ( t ) ) e ( t ) ) λ ( t ) B K ψ ( y ( t k h ) ) + D ϖ ( t ) .
This paper aims to develop the event-based controller (10) to ensure that the system (3), running under the ETTS (4) and subject to randomly occurring deception attacks (7), achieves AMSS while meeting the H performance index. Correspondingly, the following requirements should be satisfied:
  • The LFC system (3), in the absence of external disturbances ϖ ( t ) , should be AMSS;
  • Under zero initial conditions, the system satisfies the performance requirement E | | y ( t ) | | 2 E γ 2 | | ϖ ( t ) | | 2 for any nonnegative noises ϖ ( t ) L 2 [ 0 , ) , where γ > 0 represents a prescribed performance bound.

3. Main Results

For paving the way of subsequent analysis, the following lemma is employed in the proof of the main results.
Lemma 1
([38]). Give the symmetric matrix S with the following expression:
S = S 11 S 12 S 12 T S 22 ,
then the following statements are equivalent:
  • S < 0 ;
  • S 11 < 0 , S 22 S 12 T S 11 1 S 12 < 0 ;
  • S 22 < 0 , S 11 S 12 S 22 1 S 12 T < 0 .
This section formulates two theorems to tackle key challenges concerning the AMSS of the closed-loop LFC system, its disturbance suppression capability, and the gain computation for the event-based H controller.
Theorem 1.
Given fixed values of σ, κ, μ M , and γ and a specified feedback gain K, the LFC system (3) is AMSS with an H performance bound γ, provided that there exist positive definite matrices P > 0 , Q > 0 , Ψ > 0 , and R > 0 , Z meeting
Γ 11 Γ 21 Γ 22 < 0 ,
R Z T Z R > 0 ,
where Γ 11 = [ Θ ]   2 × 2 and κ = λ ( 1 λ ) , and
Θ 11 11 = A T P + P A + Q R , Θ 11 21 = ( 1 λ ¯ ) C T K T B T P + R Z , Θ 11 22 = σ Ψ 2 R + Z + Z T , Θ 21 11 = Z , Θ 21 12 = R Z , Θ 21 21 = ( 1 λ ¯ ) C T K T B T P , Θ 21 22 = σ Ψ , Θ 21 31 = λ ¯ C T K T B T P , Θ 21 41 = D T P , Θ 22 = d i a g Q R , σ Ψ Ψ , λ ¯ P , γ 2 I , Γ 21 = c o l μ M R Λ 1 , μ M R Λ 2 , Υ 1 , Υ 2 , Γ 22 = d i a g R , R , P , I , Λ 1 = [ A , ( 1 λ ¯ ) B K C , 0 , ( 1 λ ¯ ) B K C , λ ¯ B K C , D ] , Λ 2 = [ 0 , κ B K C , 0 , κ B K C , κ B K C , 0 ] , Υ 1 = [ 0 , λ ¯ P G C , 0 , λ ¯ P G C , 0 , 0 ] , Υ 2 = [ C , 0 , 0 , 0 , 0 , 0 ] .
Proof. 
Construct the Lyapunov functional as follows:
V ( t ) = x T ( t ) P x ( t ) + t μ M t x T ( ζ ) Q x ( ζ ) d ζ + μ M t μ M t ζ t x ˙ T ( s ) R x ˙ ( s ) d s d ζ .
For t I i , applying the infinitesimal operator [39] on V ( t ) , one has
E L ( V ( t ) ) = x T ( t ) Q x ( t ) + 2 x ˙ T ( t ) P x ( t ) x T ( t μ M ) Q x ( t μ M ) + μ M 2 x ˙ T ( t ) R x ˙ ( t ) μ M t μ M t x ˙ T ( ζ ) R x ˙ ( ζ ) d ζ e T ( t ) Ψ e ( t ) + e T ( t ) Ψ e ( t ) y T ( t ) y ( t ) + γ 2 ϖ T ( t ) ϖ ( t ) + y T ( t ) y ( t ) λ ¯ ψ T ( y ( t k h ) ) P ψ ( y ( t k h ) ) + λ ¯ ψ T ( y ( t k h ) ) P ψ ( y ( t k h ) ) γ 2 ϖ T ( t ) ϖ ( t ) .
Furthermore, from (4), one has
e T ( t ) Ψ e ( t ) σ ( x T ( t μ ( t ) ) e T ( t ) ) Ψ ( x ( t μ ( t ) ) e ( t ) ) .
In addition, it can be seen from (8) that there exists a symmetric matrix P satisfying
ψ T ( y ( t k h ) ) P ψ ( y ( t k h ) ) ( x T ( t μ ( t ) ) e T ( t ) ) C T G T P G C ( x ( t μ ( t ) ) e ( t ) ) .
On the other hand, the reciprocally convex method in [40] is used to tackle the cross item in (19). Hence, we have
μ M t μ M t x ˙ T ( ζ ) R x ˙ ( ζ ) d ζ ς 1 T ς 2 T R Z T Z R ς 1 ς 2 ,
where ς 1 = x ( t ) x ( t μ ( t ) ) , ς 2 = x ( t μ ( t ) ) x ( t μ M ) .
Therefore, one can attain from (18)–(22) that
E L ( V ( t ) ) ϑ T ( t ) ( Γ 11 Γ 21 T Γ 22 1 Γ 21 ) ϑ ( t ) y T ( t ) y ( t ) + γ 2 ϖ T ( t ) ϖ ( t ) ,
where ϑ ( t ) = [ x T ( t ) , x T ( t μ ( t ) ) , x T ( t μ M ) , e T ( t ) , ψ T ( x ( t ) ) , ω T ( t ) ] T .
By utilizing Schur complement Lemma 1 from (16), one has
Γ 11 Γ 21 T Γ 22 1 Γ 21 0 .
In addition, one has
E L ( V ( t ) ) y T ( t ) y ( t ) + γ 2 ϖ T ( t ) ϖ ( t ) .
Integrating both sides of (24) from 0 to , and under zero initial conditions, it is easy to derive that
0 y T ( ζ ) y ( ζ ) d ζ 0 γ 2 ϖ ζ ϖ ( ζ ) d ζ ,
i.e., E | | y ( t ) | | 2 E γ 2 | | ϖ ( t ) | | 2 . Hence, the disturbance suppression index is ensured. When ϖ ( t ) = 0 , it can be summarized that the system (3) is AMSS. This ends the proof.    □
The addressed event-triggered H controller has successfully considered both AMSS and H performance. Meanwhile, the matrix constraints established in Theorem 1 provide a set of sufficient conditions for the relevant performance indices. However, determining the event-triggered controller gain remains a significant challenge, which serves as the drive for the listed theorem.
Theorem 2.
Given preset parameters σ, κ, μ M , γ, ϱ, and ε, the LFC system (3) is AMSS with an H norm threshold γ, when there exist matrices H > 0 , Q ˇ > 0 , Ψ ˇ > 0 , R ˇ > 0 , Z ˇ , M, and Y meeting
Γ 11 Γ 21 Γ 22 < 0 ,
R ˇ Z ˇ T Z ˇ R ˇ > 0 ,
ε I M C C H I < 0 ,
where Γ ˇ 11 = [ Θ ˇ ] 2 × 2 , κ = λ ( 1 λ ) , and
Θ ˇ 11 11 = A H + H A T + Q ˇ R ˇ , Θ ˇ 11 21 = ( 1 λ ¯ ) C T Y T B T + R ˇ Z ˇ , Θ ˇ 11 22 = σ Ψ ˇ 2 R ˇ + Z ˇ + Z ˇ T , Θ ˇ 21 11 = Z ˇ , Θ ˇ 21 12 = R ˇ Z ˇ , Θ ˇ 21 21 = ( 1 λ ¯ ) C T Y T B T , Θ ˇ 21 22 = σ Ψ ˇ , Θ ˇ 21 31 = λ ¯ C T Y T B T , Θ ˇ 21 41 = D T , Θ ˇ 22 = d i a g Q ˇ R ˇ , σ Ψ ˇ Ψ ˇ , λ ¯ H , γ 2 I , Γ ˇ 21 = c o l μ M Λ ˇ 1 , μ M Λ ˇ 2 , Υ ˇ 1 , Υ ˇ 2 , Γ ˇ 22 = d i a g ϱ 2 R ˇ 2 ϱ H , ϱ 2 R ˇ 2 ϱ H , H , I , Λ ˇ 1 = [ A H , ( 1 λ ¯ ) B Y C , 0 , ( 1 λ ¯ ) B Y C , λ ¯ B Y C , D ] , Λ ˇ 2 = [ 0 , κ B Y C , 0 , κ B Y C , κ B Y C , 0 ] , Υ ˇ 1 = [ 0 , λ ¯ G C H , 0 , λ ¯ G C H , 0 , 0 ] , Υ ˇ 2 = [ C H , 0 , 0 , 0 , 0 , 0 ] .
Then, the event-triggered H controller gain can be derived as K = Y M 1 .
Proof. 
For brevity, define
H = P 1 , Q ˇ = H Q H , R ˇ = H R H , Z ˇ = H Z H , Ψ ˇ = H Ψ H , Ω 1 diag H , H , H , H , H , I , Ω 2 diag R 1 , R 1 , H , I .
With the aid of the following inequality:
H R ˇ 1 H ϱ 2 R ˇ 1 2 ϱ H ,
and pre- and postmultiplying both sides of (16) and (17) by diag Ω 1 , Ω 2 and diag H , H , respectively. Naturally, (26) and (27) can be obtained. Then, K C H and C H are substituted with Y C and M C , respectively. Following a similar control design technique as in [41], we establish that
( M C C H ) T ( M C C H ) = 0 .
According to Lemma 1, the above equation can be reformulated into an optimization problem with the format of (28). This completes the proof.    □
Remark 3.
A key assumption in simulation-based methods, such as those proposed in [21,22], is that the controller gains must be known a priori. If these gains are not prefixed, the aforementioned methods become inapplicable. Nevertheless, as illustrated in this study, the controller gains can be designed using Theorem 2, which highlights a key advantage of the proposed scheme.
According to Theorems 1 and 2, the state stability, H performance, and synthesis of the expected event-triggered controller are designed through the application of matrix techniques, stochastic methods, Lyapunov stability theory, and other advanced approaches. Since this article considers complex factors such as the event-based communication scheme and stochastic deception attacks, the derived sufficient criteria inherently incorporate these elements. Moreover, the matrix constraints included in two theorems have been gained using Matlab R2018b simulation technology.
To illustrate the implementation of Theorem 2 and derive the gain for the designed event-triggered H controller, the following Algorithm 1 is given in this section.
Algorithm 1 Event-based H controller design algorithm.
Step 1.Initialize values of x ( 0 ) , γ , δ , κ , μ M , G, ψ ( y ( t ) ) , ϖ ( t ) ;
Step 2.Formulate kinetic model (3) of the LFC system;
Step 3.Design the employed event-based H controller (10) that satisfies AMSS and the H performance index;
Step 4.Solve the LMIs in Theorem 2 and derive the controller gain K.

4. Case Studies

This section focuses on evaluating the effectiveness of the proposed control strategy by analyzing a power system with LFC subject to stochastic deception attacks. Certain electrical parameters are expressed in Table 2.
Set x ( 0 ) = [ 0.2 ; 0.5 ; 0.5 ; 0.2 ; 0.3 ] , with other parameters given as γ = 10 , δ = 0.5 , λ ¯ = 0.5 , μ M = 0.1 s , G = diag 0.2 , 0.1 and ψ ( y ( t ) ) = [ tanh ( 0.2 y 1 ( t ) ) , tanh ( 0.1 y 2 ( t ) ) ] . ϖ ( t ) follows:
ϖ ( t ) = 0.01 , 0 < t 40 , 0 , t > 40 .
An event-triggered H controller is employed to regulate the nominal frequency of the power system (e.g., near-zero frequency difference). Define the controller without considering network attacks as Controller 1, and the controller with considering network attacks as Controller 2. To verify the effectiveness of the proposed control method against deception attacks, two cases are examined.
  • Case 1: This case demonstrates that, in the absence of deception attacks, both Controller 1 and Controller 2 successfully stabilize the power system;
  • Case 2: In this case, random deception attacks are introduced. Simulation results show that, compared to Controller 1, Controller 2 provides a significantly smoother and improved system response.
Figure 3 illustrates that the system (3) achieves the AMSS by Controller 1 and 2 in the absence of deception attacks; Figure 4 reflects that when deception attacks occur, Controller 2 still preserves good system performance more effectively while Controller 1 fails. The negative impacts brought from deception attacks are counteracted to a great extent. Therefore, it is apparent to see that the designed H controller (Controller 2) in this study can realize stronger control performance under cyberattacks.
On the other side, Figure 5 and Figure 6 show the triggering instants and the triggering intervals in this article, respectively. Compared to the conventional time-triggered scheme, the proposed ETTS demonstrates significantly greater ability to optimize network bandwidth utilization. In Figure 7, the red asterisk and the green dot represent the attack instant and trigger sequences, respectively, where the developed event-triggered mechanism regulates the number of triggered data packets according to the frequency of deception attacks.
Specially, as depicted in Figure 5 and Figure 6, the number of triggering events decreases in the presence of attacks. The reason behind this is that the proposed triggered fashion strategically reduces data packet transmissions when cyberattacks or other anomalies happen, hence minimizing the risk of packet corruption. In other words, under such communication protocols, the system demonstrates strong resilience to deception attacks and effectively mitigates false triggers caused by cyberattacks.

5. Conclusions

This study presents an event-triggered H load frequency control (LFC) strategy for power systems, particularly incorporating electric vehicles (EVs). By employing an event-based communication scheme, the data transmission and the network burden can be reduced and alleviated, while maintaining satisfactory control performance in contrast to conventional time-triggered approaches. Specially, it compensates for the detrimental effects of random deception attacks through the resilient controller. Sufficient conditions for the AMSS of the closed-loop system has been obtained by utilizing the Lyapunov theory in terms of LMIs. The simulation results illustrate the feasibility and availability of the proposed method for power systems under limited bandwidth and cyberthreats. Future work involves exploring distributed and full decentralized event-triggered LFC schemes, as well as data-driven and model-free control methods for resilient controller design in large-scale power networks [42].

Author Contributions

Methodology, Y.W. and B.Z.; Software, Z.X.; Formal analysis, C.H.; Investigation, B.Z.; Resources, Y.W.; Data curation, Z.X.; Writing—original draft, C.H.; Writing—review & editing, Y.W.; Supervision, T.Z.; Project administration, T.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Program of China, grant number 2022YFB3104300.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Yilmaz, M.; Krein, P.T. Review of the impact of vehicle-to-grid technologies on distribution systems and utility interfaces. IEEE Trans. Power Electron. 2013, 28, 5673–5689. [Google Scholar] [CrossRef]
  2. Prabhakar, K.; Jain, S.K.; Padhy, P.K. Inertia estimation in modern power system: A comprehensive review. Electr. Power Syst. Res. 2022, 211, 10822. [Google Scholar] [CrossRef]
  3. Liu, D.; Zhang, X.; Tse, C.K. Effects of high level of penetration of renewable energy sources on cascading failure of modern power systems. IEEE J. Emerg. Sel. Top. Circuits Syst. 2022, 12, 98–106. [Google Scholar] [CrossRef]
  4. Liu, M.; Teng, F.; Zhang, Z.; Ge, P.; Sun, M.; Deng, R. Enhancing cyber-resiliency of DER-based smart grid: A survey. IEEE Trans. Smart Grid 2024, 15, 4998–5030. [Google Scholar] [CrossRef]
  5. Shangguan, X.C.; He, Y.; Zhang, C.K.; Jin, L.; Yao, W.; Jiang, L.; Wu, M. Control performance standards-oriented event-triggered load frequency control for power systems under limited communication bandwidth. IEEE Trans. Control Syst. Technol. 2022, 30, 860–868. [Google Scholar] [CrossRef]
  6. Zhang, Z.; Deng, R.; Yau, D.K.Y. Vulnerability of the load frequency control against the network parameter attack. IEEE Trans. Smart Grid 2024, 15, 921–933. [Google Scholar] [CrossRef]
  7. Bu, X.; Yu, W.; Cui, L.; Hou, Z.; Chen, Z. Event-triggered data-driven load frequency control for multiarea power systems. IEEE Trans. Ind. Inf. 2022, 18, 5982–5991. [Google Scholar] [CrossRef]
  8. Zhong, Q.; Yang, J.; Shi, K.; Zhong, S.; Li, Z.; Sotelo, M.A. Event-triggered H load frequency control for multi-area nonlinear power systems based on non-fragile proportional integral control strategy. IEEE Trans. Intell. Transp. Syst. 2022, 23, 12191–12201. [Google Scholar] [CrossRef]
  9. Wang, H.; Chen, S.; Li, M.; Zhu, C.; Wang, Z. Demand-driven charging strategy-based distributed routing optimization under traffic restrictions in internet of electric vehicles. IEEE Internet Things J. 2024, 11, 35917–35927. [Google Scholar] [CrossRef]
  10. Islam, S.; Iqbal, A.; Marzband, M.; Khan, I.; Al-Wahedi, A.M. State-of-the-art vehicle-to-everything mode of operation of electric vehicles and its future perspectives. Renew. Sustain. Energy Rev. 2022, 166, 112574. [Google Scholar] [CrossRef]
  11. Liu, S.; Luo, W.; Wu, L. Co-design of distributed model-based control and event-triggering scheme for load frequency regulation in smart grids. IEEE Trans. Syst. Man Cybern. B Cybern. 2018, 50, 3311–3319. [Google Scholar] [CrossRef]
  12. Yang, S.; Lao, K.-W.; Hui, H.; Chen, Y. Secure distributed control for demand response in power systems against deception cyber-attacks with arbitrary patterns. IEEE Trans. Power Syst. 2024, 39, 7277–7290. [Google Scholar] [CrossRef]
  13. Liu, X.; Yang, G.-H. Optimal intermittent deception attacks with energy constraints for cyber-physical systems. IEEE Trans. Man Cybern. B Cybern. 2024, 54, 5889–5900. [Google Scholar] [CrossRef]
  14. Lu, K.D.; Wu, Z.-G. Resilient event-triggered load frequency control for cyber-physical power systems under DoS attacks. IEEE Trans. Power Syst. 2023, 38, 5302–5313. [Google Scholar] [CrossRef]
  15. Zhou, S.; Deng, C.; Fan, S.; Wang, B.; Che, W.-W. Resilient distributed Nash equilibrium control for nonlinear MASs under DoS attacks. IEEE Trans. Cybern. 2025, 55, 2316–2326. [Google Scholar] [CrossRef]
  16. Zhang, G.; Li, J.; Bamisile, O.; Xing, W.; Cai, D.; Huang, Q. An H load frequency control scheme for multi-area power system under cyber-attacks and time-varying delays. IEEE Trans. Power Syst. 2023, 38, 1336–1349. [Google Scholar] [CrossRef]
  17. Khooban, M.H.; Niknam, T.; Shasadeghi, M.; Dragicevic, T.; Blaabjerg, F. Load frequency control in microgrids based on a stochastic noninteger controller. IEEE Trans. Sustain. Energy 2018, 9, 853–861. [Google Scholar] [CrossRef]
  18. Hu, S.; Ge, X.; Chen, X.; Yue, D. Resilient load frequency control of islanded AC microgrids under concurrent false data injection and denial-of-service attacks. IEEE Trans. Smart Grid 2023, 14, 690–700. [Google Scholar] [CrossRef]
  19. Zhao, N.; Yue, D.; Dou, C.; Shi, T. Distributed dynamic event-triggered cooperative control of multiple TCLs and HESS for improving frequency regulation. IEEE Trans. Ind. Inf. 2024, 20, 1539–1549. [Google Scholar] [CrossRef]
  20. Hossain, M.M.; Peng, C.; Wang, Y.-L.; Du, X. Handshake logic-based event-triggered load frequency control for smart grids under DoS attacks. IEEE Trans. Ind. Inf. 2022, 18, 3863–3872. [Google Scholar] [CrossRef]
  21. Hu, S.; Ge, X.; Zhang, W.; Yue, D. DoS-resilient load frequency control of multi-area power systems: An attack-parameter-dependent approach. IEEE Trans. Inf. Forensics Secur. 2024, 19, 3423–3434. [Google Scholar] [CrossRef]
  22. Peng, C.; Zhang, J.; Yan, H. Adaptive event-triggering H load frequency control for network-based power systems. IEEE Trans. Ind. Electron. 2018, 65, 1685–1694. [Google Scholar] [CrossRef]
  23. Peng, C.; Li, J.; Fei, M. Resilient event-triggering H load frequency control for multi-area power systems with energy-limited DoS attacks. IEEE Trans. Power Syst. 2016, 32, 4110–4118. [Google Scholar] [CrossRef]
  24. Hu, Z.; Zhang, K.; Su, R.; Wang, R.; Li, Y. Robust cooperative load frequency control for enhancing wind energy integration in multi-area power systems. IEEE Trans. Autom. Sci. Eng. 2024, 22, 1508–1518. [Google Scholar] [CrossRef]
  25. Yue, D.; Tian, E.; Han, Q.-L. A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control 2013, 58, 475–481. [Google Scholar] [CrossRef]
  26. Hossain, M.M.; Peng, C.; Su, H.-T.; Xie, S. Bandwidth allocation-based distributed event-triggered LFC for smart grids under hybrid attacks. IEEE Trans. Smart Grid 2022, 13, 820–830. [Google Scholar] [CrossRef]
  27. Zhai, J. Event-triggered control for p-normal uncertain nonlinear systems. Nonlinear Dyn. 2024, 112, 3661–3677. [Google Scholar] [CrossRef]
  28. Ren, H.; Cheng, Z.; Qin, J.; Lu, R. Deception attacks on event-triggered distributed consensus estimation for nonlinear systems. Automatica 2023, 154, 111100. [Google Scholar] [CrossRef]
  29. Zhang, L.; Zhao, Z.; Ma, Z.; Zhao, N. Prescribed performance adaptive neural event-triggered control for switched nonlinear cyber–physical systems under deception attacks. Neural Netw. 2024, 179, 106586. [Google Scholar] [CrossRef]
  30. Guo, Z.; Shi, D.; Johansson, K.-H.; Shi, L. Optimal linear cyber-attack on remote state estimation. IEEE Trans. Control Netw. Syst. 2017, 4, 4–13. [Google Scholar] [CrossRef]
  31. Li, T.; Wang, Z.; Zou, L.; Chen, B.; Yu, L. A dynamic encryption–decryption scheme for replay attack detection in cyber–physical systems. Automatica 2023, 151, 110926. [Google Scholar] [CrossRef]
  32. Guo, Z.; Shi, D.; Johansson, K.-H.; Shi, L. Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica 2018, 89, 117–124. [Google Scholar] [CrossRef]
  33. Liang, G.; Zhao, J.; Luo, F.; Weller, S.R.; Dong, Z.Y. A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 2017, 8, 1630–1638. [Google Scholar] [CrossRef]
  34. Chen, P.; Zhang, D.; Yu, L.; Yan, H. Dynamic event-triggered output feedback control for load frequency control in power systems with multiple cyber attacks. IEEE Trans. Syst. Man Cybern. B Cybern. 2022, 52, 6246–6258. [Google Scholar] [CrossRef]
  35. Li, X.; Wei, G.; Ding, D.; Liu, S. Recursive filtering for time-varying discrete sequential systems subject to deception attacks: Weighted try-once-discard protocol. IEEE Trans. Syst. Man Cybern. B Cybern. 2021, 52, 3704–3713. [Google Scholar] [CrossRef]
  36. Liu, Q.; Zhao, C.; Liu, M.; Deng, R.; Cheng, P. Submodularity-based false data injection attack strategy in DC microgrids. IEEE Trans. Inf. Forensics Secur. 2025, 20, 2342–2352. [Google Scholar] [CrossRef]
  37. Pham, T.N.; Nahavandi, S.; Trinh, H.; Wong, K.P. Static output feedback frequency stabilization of time-delay power systems with coordinated electric vehicles state of charge control. IEEE Trans. Power Syst. 2017, 32, 3862–3874. [Google Scholar] [CrossRef]
  38. Zhang, X.-M.; Han, Q.-L.; Yu, X. Survey on Recent Advances in Networked Control Systems. IEEE Trans. Ind. Inf. 2016, 12, 1740–1752. [Google Scholar] [CrossRef]
  39. Zhang, X.M.; Han, Q.-L.; Ge, X. A novel approach to H performance analysis of discrete-time networked systems subject to network-induced delays and malicious packet dropouts. Automatica 2022, 136, 110010. [Google Scholar] [CrossRef]
  40. Park, P.; Ko, J.-W.; Jeong, C. Reciprocally convex approach to stability of systems with time-varying delays. Automatica 2011, 47, 235–238. [Google Scholar] [CrossRef]
  41. Crusius, C.A.; Trofino, A. Sufficient LMI conditions for output feedback control problems. IEEE Trans. Autom. Control 1999, 44, 235–238. [Google Scholar] [CrossRef]
  42. Xiao, Z.; Jiang, Y.; Yao, Z.; He, Z.; Jiang, Y.; Li, Y. A hybrid data-driven power loss minimization method of dual-active bridge converters. IEEE Trans. Power Electron. 2024, 39, 5820–5832. [Google Scholar] [CrossRef]
Figure 1. Block of the LFC system model.
Figure 1. Block of the LFC system model.
Electronics 14 02713 g001
Figure 2. The sketch of event-triggered transmission scheme.
Figure 2. The sketch of event-triggered transmission scheme.
Electronics 14 02713 g002
Figure 3. Simulation results in Case 1. Top: State trajectories of x ( t ) with Controller 2; Bottom: State trajectories of x ( t ) with Controller 1.
Figure 3. Simulation results in Case 1. Top: State trajectories of x ( t ) with Controller 2; Bottom: State trajectories of x ( t ) with Controller 1.
Electronics 14 02713 g003
Figure 4. Simulation results in Case 2. Top: State trajectories of x ( t ) with Controller 2; Bottom: State trajectories of x ( t ) with Controller 1.
Figure 4. Simulation results in Case 2. Top: State trajectories of x ( t ) with Controller 2; Bottom: State trajectories of x ( t ) with Controller 1.
Electronics 14 02713 g004
Figure 5. Release intervals without deception attacks.
Figure 5. Release intervals without deception attacks.
Electronics 14 02713 g005
Figure 6. Release intervals with deception attacks.
Figure 6. Release intervals with deception attacks.
Electronics 14 02713 g006
Figure 7. The deception attack and triggering instant sequences.
Figure 7. The deception attack and triggering instant sequences.
Electronics 14 02713 g007
Table 1. Notations.
Table 1. Notations.
ParametersMeaning
ffrequency deviation
X g governor valve position
P g turbine output power
P e incremental changes in EVs
P l load disturbance
P c control input
α g thermal turbine
α e participation factor
Dload damping coefficient
Minertia constant
R g governor
ρ e droop characteristic
T g speed governor
T t turbine time constant
K e gain constant
T e time constant
bfrequency bias constant
Table 2. System parameters of the LFC scheme.
Table 2. System parameters of the LFC scheme.
DM R g T g T t ρ e K e T e b α g α e
0.00830.16672.40.080.30.42110.4250.80.2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Y.; Xi, Z.; Zhang, B.; Zhang, T.; He, C. Resilient Event-Triggered H Control for a Class of LFC Systems Subject to Deception Attacks. Electronics 2025, 14, 2713. https://doi.org/10.3390/electronics14132713

AMA Style

Wang Y, Xi Z, Zhang B, Zhang T, He C. Resilient Event-Triggered H Control for a Class of LFC Systems Subject to Deception Attacks. Electronics. 2025; 14(13):2713. https://doi.org/10.3390/electronics14132713

Chicago/Turabian Style

Wang, Yunfan, Zesheng Xi, Bo Zhang, Tao Zhang, and Chuan He. 2025. "Resilient Event-Triggered H Control for a Class of LFC Systems Subject to Deception Attacks" Electronics 14, no. 13: 2713. https://doi.org/10.3390/electronics14132713

APA Style

Wang, Y., Xi, Z., Zhang, B., Zhang, T., & He, C. (2025). Resilient Event-Triggered H Control for a Class of LFC Systems Subject to Deception Attacks. Electronics, 14(13), 2713. https://doi.org/10.3390/electronics14132713

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop