Content area
Abstract
In islanded microgrid configurations, synchronization of distributed generators (DGs) becomes imperative. Achieving synchronization and control necessitates the establishment of communication links. However, communication channels are susceptible to various challenges, with cyber-attacks emerging as a primary concern. This paper examines the vulnerability of cooperative hierarchical controllers in the face of diverse cyber-attacks, including DoS, sensor and actuator attacks, and hijacking attacks. DGs are considered a multiagent system for stabilization and global synchronization of the network. Cyber-attacks on the secondary controller have been formalized, and an appropriate controller is designed for system synchronization and stability. The appropriate Lyapunov function is introduced to prove the stability. Then, the simultaneous stabilization and global synchronization conditions have been investigated by proving suitable theorems. A comprehensive case study is executed via simulation in MATLAB/Simulink, incorporating cyber-attack scenarios. The effects of cyber-attacks on this controller are eliminated, and the DGs are synchronized. For comparison, the resilience indicator has been used. In this controller, the cyber-attacks of the sensor and hijacking attack are well controlled. A DoS cyber-attack is more effective than other attacks and causes some DGs to go off the network. Also, comparing this controller to other controllers shows its greater resilience.
Full text
This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.
1. Introduction
The depletion of fossil fuel resources, adverse environmental impacts, and the inefficiency of traditional power grids have precipitated numerous challenges in the domain of power distribution. The adoption of microgrids and distributed generators (DGs) has emerged as a viable solution to address these issues.
The principal parameters governing microgrid control encompass frequency, voltage, and active and reactive power of DGs. Microgrids can operate in two modes: grid-connected and islanded modes. In the MG island mode, the controller must equalize the frequency and voltage of all DGs. In general, they should be equal to the slack output. Consequently, the production of all DGs must be adjusted and synchronized [1].
The control of DGs is typically accomplished through three methods [2]:
I. Centralized control.
II. Decentralized control.
III. Distributed control.
Centralized control entails the utilization of a centralized controller, where the output of all DGs is conveyed to a central controller. The centralized controller is integrated. This controller requires a communication channel; however, since it does not compare with neighboring outputs, it is not suitable for synchronization.
In decentralized control, each DG is equipped with an independent controller that operates autonomously without relying on neighboring DG information or requiring communication links. In this controller, synchronization remains an issue.
Distributed controllers, on the other hand, control each DG individually but utilize information from adjacent DGs. Consequently, communication links are imperative for synchronization and stabilization. Thus, communication networks play a crucial role in facilitating the exchange of information among neighboring DGs. The distributed method uses the information of neighboring agents. Hence, it is more suitable for synchronization and stabilization than other controllers, thus finding widespread application in microgrid control [2–4].
In the centralized and distributed controller, communication links are required for control. However, the utilization of communication links poses various challenges, including disruption, loss, uncertainty, noise, time delay, and susceptibility to cyber-attacks.
In this study, we employ a cooperative hierarchical distributed controller. This controller performs control in three primary, secondary, and tertiary layers. The tertiary layer determines the reference of the secondary layer. Also, the secondary layer refers to the primary layer [5, 6]. Reference [4] has provided complete explanations about the types of microgrid stability methods.
In recent studies [7], researchers have investigated the challenges posed by communication links in secondary controller communication and explored the effects of delay in hierarchical distributed controllers. Additionally, event-triggered methods in hierarchical controllers have been proposed to minimize data transmission [8, 9].
These disturbances disrupt the regulation and equalization of the output voltage and frequency. Consequently, numerous studies have been conducted in recent years to examine the effects of cyber-attacks on microgrids. Cyber-attacks exploit sensor output transmission and actuator output, with various attack methodologies targeting sensor output transmission channels for sabotage [10]. The literature extensively discusses communication channel issues and cyber-attacks on microgrids [11–14]. In [15], FDI attacks are considered from the perspective of multiagent systems. In [16, 17], cyber-attacks on sensors and actuators in multiagent systems are discussed. In [18], the secure control for T-S fuzzy systems under stealthy attacks is investigated, and a novel adaptive attack controller is studied. In [19], the stability effects of DoS, stealth, and deception attacks on the system are analyzed.
In [20, 21], the effect of Denial of Service (DoS) attacks on a hierarchical controller is investigated using the consensus method for the microgrid. In [22, 23], researchers study the cyber-attack stability problems of secondary controlled microgrids under DoS attacks. In [24], the attack effect of the sensor and actuator is involved in the microgrid equations, and the error effect is controlled using a
Furthermore [14] investigates the effects of data loss and delay in microgrids, while [20] considers DoS cyber-attacks in the context of time delays. Reference [30] employs a decentralized controller from a multiagent systems perspective to counter the impact of DoS attacks in microgrids, while [31] discusses sensor attacks, hijacking attacks, and DoS attacks on secondary controllers, albeit with limited analysis of their stability and coordination. Reference [32] examines the effect of DoS cyber-attacks on microgrids, focusing on frequency using the secondary controller, with voltage remaining unexplored. In [3], microgrids are characterized as cyber-physical systems (CPS), with the effects of two types of cyber-attacks on the secondary controller investigated. Resilient control against cyber-attacks on communication links is proposed in [11, 33], albeit without studying sensor attacks. Reference [34] proposes quantum communication to enhance cybersecurity in distributed microgrid control, while [35] suggests adaptive controllers to mitigate the effects of errors and FDI attacks. Reference [36] analyzes the cyber-attack of false data injection on secondary frequency controllers. Finally, [37] introduces a robust controller for frequency synchronization of islanded microgrids against FDI attacks, though voltage and active power control are not explored. References [38, 39] discuss the hijacking attack, but stabilization and synchronization have not been studied.
Various disturbances in the communication channel can disrupt microgrid operations, potentially leading to instability and desynchronization. Fading, electromagnetic interference, noise, delay, uncertainty, and cyber-attacks are among the phenomena that can impact communication channels. This article delves into the ramifications of cyber-attacks on these channels.
In recent research, extensive investigations have been conducted into system stability, robustness, flexibility, and coordination. However, synchronous investigation of communication links and sensor attacks remains unexplored. Cyber-attacks on microgrids have primarily focused on attack detection and outcomes, with stability and synchronization considerations often overlooked. Communication channel disturbances have the potential to induce microgrid instability and disrupt synchronization. Thus, system resilience against cyber-attacks warrants investigation, evaluation, and comparison, with a view to enhancing system stability and synchronization.
This paper comprehensively analyzes various cyber-attacks on hierarchical controllers in microgrids from a multiagent systems perspective, treating DGs as agents interconnected via communication links delineated by an adjacency matrix. The study also examines cyber-attacks on sensors and communication links, followed by an analysis of system stabilization and synchronization. The microgrid equations are scrutinized during attacks, with stability assessments conducted. Synchronization and stabilization conditions in the presence of attacks are derived, with the overarching goal of designing a controller resilient to diverse cyber-attacks. Additionally, the study investigates the impact of different cyber-attacks on cooperative distributed hierarchical controllers, with resilience indices (RI) computed to compare the resilience of different cyber-attacks on the distributed cooperative hierarchical controller.
The innovations of this study can be summarized as follows:
1. Presentation of a novel robust controller for reference-based cooperative hierarchical control, showcasing the adverse effects of cyber-attacks on communication links between DGs in island mode. Modeling and formulation of cyber-attacks (DoS attacks, sensor attacks, and data hijacking) within the DG model are proposed. To our knowledge, cyber-attack modeling for cooperative hierarchical secondary controllers is presented for the first time.
2. According to the authors’ knowledge, it is the first time to analyze microgrid stability in the presence of various types of cyber-attacks in the communication channel. A new Lyapunov function is defined for stability analysis.
3. Investigate and analyze the synchronization conditions, reduce the matching error, and determine the resilience and robustness of all DGs.
4. We demonstrate the resilience of the cooperative distributed hierarchical controller against various cyber-attacks. Additionally, we compare its performance with other controllers.
The most important advantage of the designed controller is to provide convenient coordination and low calculations. Despite time delays, cyber-attacks, and errors, coordination and stability are maintained.
The remainder of this paper is organized as follows: Sections 2 delve into the DG system model and designing a distributed hierarchical cooperative controller, respectively. Section 3 explores the Lemmas, Assumptions, and Definitions, while Section 4 examines cyber-attacks on such controllers. Section 5 discusses system stability and synchronization, followed by simulations in Section 6. Finally, Section 7 concludes the paper.
2. Large-Signal Dynamical and Control
We have used a fully nonlinear model including various parts such as distributed sources, the main power grid, internal controllers (power controller, voltage controller, and current controller), communication channels, filters, and loads [5].
Remark 1.
The parameters of the microgrid model are fixed and known. Therefore, DGs can be considered model-based. In this model, various parts such as distributed sources, measuring devices, general power grid, control devices and telecommunication networks, power parts, voltage and current controllers, disparate filters, and loads are modeled [41–43].
2.1. Designing a Distributed Hierarchical Cooperative Controller
A cooperative distributed hierarchical controller consists of two main controllers: the primary controller and the secondary controller [2]. The secondary controller is for yaw reduction, and the primary controller is for stability. The general depiction of the DG and controller is illustrated in Figure 1. According to Figure 1,
[figure(s) omitted; refer to PDF]
The control objectives are twofold: stabilization and synchronization. In the stable mode, equations (2)–(5) must be satisfied. In equations (2)–(5), frequency and voltage conditions hold paramount significance. In the equations below,
2.2. Primary Controller
The primary controller offers a key advantage by implementing droop control, which inherently mitigates the risk of external interference. However, a notable drawback of droop control is the deviation of output values from the reference point. To address this issue, the secondary controller comes into play. The primary controller encompasses current, voltage, and power controllers, as illustrated in Figures 2 and 3. In specific references, the primary controller is conceptualized as the internal controller of the DG.
[figure(s) omitted; refer to PDF]
2.2.1. Calculation of Instantaneous and Average Power
In the power controller shown in Figure 2, first, the instantaneous power is obtained from (6) by using the outputs of DGs and bypassing this power through a LPF with Equation (7), and the average power is calculated as
2.2.2. Droop Controller
The main formula of the primary controller is as follows [5, 6]:
Upon transitioning the voltage frame to the d-q axis, Equation (8) is reformulated as follows.
Then, based on Equation (8), the power controller output is computed. The
The primary voltage and current controllers, depicted in Figure 3, are implemented as proportional–integral (PI) controllers. The output of the voltage controller serves as the input to the current controller.
2.3. Secondary Controller
The secondary controller within the microgrid is illustrated in Figure 4. The output of the secondary controller
[figure(s) omitted; refer to PDF]
The main goal in designing this controller is to apply the appropriate control input
2.3.1. Using Feedback Linearization to Calculate the Appropriate Control Input
By employing feedback linearization, Equation (10) is derived from equations (8) and (9), [6].
Feedback linearization facilitates the calculation of auxiliary control input [23], as expressed in Equation (11).
In Equation (11),
The tracking error in multiagent systems is defined by the following equation [6].
In Equation (12)
In Equation (13), the
[figure(s) omitted; refer to PDF]
3. The Lemmas, Assumptions, and Definitions
3.1. Graph Theory
Communication channels serve as conduits for transferring data among DGs. This study delves into graph theory within the framework of multiagent systems to scrutinize DG communication channels, treating DGs as discrete entities analogous to agents. The assessment of communication channels is conducted utilizing an adjacency matrix.
Reynolds’ laws are instrumental in the analysis of multiagent systems, presenting the following tenets:
I. Absence of incidence with neighbors
II. The members of the multiagent systems are coordinated with the rest of the group.
III. The cohesion of all members around a central focal point [45].
These principles are applicable to the analysis of DGs within the paradigm of multiagent systems. Reynold’s laws underscore the significance of cooperative dynamics among agents in accomplishing predefined objectives. Multiagent systems exhibit augmented performance, bolstering system compatibility and stability. Moreover, they showcase heightened resilience and efficacy in mitigating errors and combatting cyber-attacks [46, 47].
Errors in multiagent systems manifest across three primary categories:
1. Actuator errors stemming from diminished actuator efficiency.
2. Sensor errors arise when sensors fail to measure outputs accurately.
3. Communication link errors occur due to data transmission discrepancies.
The communication graph in graph theory is represented as
The entries
Remark 2.
In multiagent systems, stability and synchronization are pivotal. Synchronization in multiagent systems signifies that all agents attain a state of equilibrium, as delineated by Reynold’s second law. This principle is encapsulated by the formula:
According to Reynold’s third law, synchronization is achieved by two methodologies or determining the central focal point. The first method entails computing a consensus, considering the center as the average of all outputs and denoted by
In Equation (17),
3.2. RI
Resilience is a critical parameter that emphasizes a system’s ability to withstand disruptions, showcasing its resistance to disturbances. In contrast, reliability gauges the performance of a power system in the face of various events, highlighting its robustness against extreme circumstances and susceptibility to vulnerabilities [50].
The degree of resilience spans from zero to infinity, where complete resilience signifies imperviousness to severe disruptions, rendering them inconsequential. Conversely, a resilience value of zero indicates system instability following any disturbance. Resilience ensures the continuity of electricity supply during significant disturbances while maintaining stability. A higher resilience coefficient signifies a diminished impact of disturbances on the system [51].
Defining resilience within the context of a power system lacks a universal definition. However, it generally encompasses the system’s capacity to recover from disruptions stemming from extreme events swiftly. System resilience is quantified based on its performance loss, with various methodologies available for performance assessment. Previous studies have delineated the loss of performance and its typologies [51].
In this study, resilience indicators are employed to probe the ramifications of cyber-attacks on the secondary controller. The assessment and comparison of cyber-attack impacts are evaluated utilizing this coefficient.
Definition of RI: The RI is defined as follows [51]:
In the proposed controller, the RI for output voltage and frequency is delineated as follows:
3.3. Assumptions and Lemma
The subsequent definitions and lemmas are imperative for the thorough investigation of this study.
Assumption 1.
1. Cyber-Attacks on Physical Systems: It is assumed that cyber-attacks do not damage the physical systems of the microgrid but only make changes to the output information. The system reaches a steady state before the attack. The attacker has accurate information about the outputs and the system model and has access to the outputs. The attacker aims to remain undetectable; therefore, in sensor attacks and hijacking, the energy and attack scope is assumed to be limited.
2. Denial of Service (DoS) Attacks: It is assumed that DoS attacks are typically executed in a short period and suddenly to quickly incapacitate the target system. DoS attacks are considered intermittent and occur at regular intervals.
3. Data Injection and Sensor Network Disruption: It is assumed that the attacker injects false or misleading data into the sensor to deceive the system. Additionally, the attacker targets a network of sensors to disrupt communication between the sensors and the central system, but the configurations of the sensors remain unchanged.
4. Hijacking Attack: In hijacking attacks, it is assumed that the attacker manipulates network routes to redirect data traffic to themselves. By stealing data, the attacker gains access to the microgrid’s outputs and replaces them with incorrect outputs.
Lemma 1.
Assuming the microgrid tree is continuous and
Lemma 2.
Considering the microgrid tree’s continuity and
4. Cyber-Attacks on the Cooperative Distributed Hierarchical Controller
Given that the microgrid operates as a CPS, it is susceptible to cyber-attacks. Security concerns are discussed within three fundamental domains: confidentiality, integrity, and availability. Depending on the nature of the attack, one or more of these domains may be compromised.
The general categories of cyber-attacks encompass:
1. Deception attack
2. DoS attack
3. Reply attack [23].
Assuming
In a DoS attack, the communication channel is obstructed, impeding information flow to the output. It can be modeled as (21).
A reply attack involves the substitution of current output with previous outputs, denoted as (22).
Deception attacks entail the injection of false information into the transmitted output, represented mathematically as
The figure illustrating the DGs and controllers with cyber-attacks is presented in Figure 4.
4.1. Sensor and Actuator Attacks in the Secondary Controller
In this attack, the wrong data amount is injected from the output of the sensors to the communication link. The difference between noise and sensor cyber-attacks is that the magnitude of cyber-attacks is much greater than the noise. In many cases, there are many similarities between a cyber-attack and a sensor fault. The main difference is that the cyber-attack enters the communication link, but the error is added to the sensor output [55].
In the hierarchical controller, a sensor attack occurs between the sensors of the secondary controllers, and an actuator attack occurs between the primary and secondary controllers. The sensor and actuator cyber-attacks cause the voltage and frequency information of a DG to reach the wrong neighboring DG and may cause system instability.
4.1.1. Mathematical Model of Sensory and Actuator Attack
Cyber-attack on actuators and sensors is modeled as follows:
The effect of this attack on the secondary controller using formulas (12)–(14) is as follows.
4.1.2. Voltage Controller With the Presence Sensor and Actuator Attacks
Equation (12) in multiagent systems can be rewritten as (19) in the voltage controller considering the sensor and actuator cyber-attack.
Therefore, the input signal of the primary controller is equal:
4.1.3. Frequency Controller With the Presence Sensor and Actuator Attacks
The same equation can be obtained for the frequency controller of Equation (13) in the presence of the sensor attack.
If the attack on the actuator and sensor occurs at the frequency and active power, it is written as
In the event of an attack, the variable
Finally, the frequency control signal is as follows:
4.2. Hijacking Attacks in the Secondary Controller
In hijacking attacks, the system output is first removed. Then, it is replaced by the attacker with a value that is the same as the original output value.
4.2.1. Mathematical Model of Hijacking Attacks
Equation (31) shows the mathematical model of hijacking attacks.
If
According to (31), the output voltage, power, and angular frequency with the hijacking attack are equal to the following equations.
4.2.2. Voltage Controller With the Presence of Hijacking Attacks
The voltage and frequency disturbance control signals, as per Equation (32), are generated. Subsequently, equations (32) and (11) are utilized to calculate the error, control input of the DG control, represented as follows.
4.2.3. Frequency Controller With the Presence of Hijacking Attacks
For formulating the frequency controller, Equation (35) is obtained using equations (11), (12), and (32).
Additionally, the power control signal input can be computed as depicted in the following equation.
Subsequent to the aforementioned calculations, the angular frequency control input signal is determined according to the following equation.
4.3. DoS Attacks in the Secondary Controller
In the DoS method, the attacker endeavors to sever the communication channel by obstructing data transmission, leading to information loss [56]. These attacks result in communication system disruptions, where hijacking and sensor attacks compromise measured values, communication links, or actuator values. The DoS attack, specifically, interrupts agent communication [57, 58].
4.3.1. Mathematical Model of DoS Attacks
During a DoS attack, the duration and period of the attack are denoted by
At the onset of the attack, the adjacency matrix undergoes changes as illustrated in the following equation, which are time-dependent.
The DoS attack in this study disrupts communication links, infiltrating links between agents. This interference may sever communication links, isolating several nodes or rendering a node unavailable. The node values during a DoS cyber-attack are presented in the following equation.
Diagonal matrices
4.3.2. Voltage and Frequency Controllers With the Presence of DoS Attacks
By substituting Equation (41) into equations (11) and (12), the control input is obtained as depicted as follows.
Subsequently, the voltage control signal is determined by substituting it into Equation (13) as illustrated in the following equation.
Likewise, the frequency controller is adjusted during the cyber-attack, represented below in the following equation.
By incorporating the values from Equation (42) into Equation (44), the control input is determined as shown in the following equation.
This study accounts for DoS attacks on sensors (
5. Stability Analysis
The proof of stability concerning the communication link and the agent is conducted separately. This article operates under the assumption of limited and unknown errors, considering a continuous tree. Furthermore, the interconnection among different DGs remains constant in accordance with the adjacency matrix. Here,
The control input signal, influenced by cyber-attacks and taking into account the error signal, is derived as shown in the following equation.
In Equation (47),
The theories and lemmas presented herein are employed to validate the stability and coordination of the microgrid. Further elucidation of Lemmas 1 and 2, pertaining to synchronization and stabilization, is provided in [52, 53].
Theorem 1.
Suppose the microgrid tree is continuous and
Despite cyber-attacks, the error is as follows.
In Equation (49),
Proof 1.
The general vector is defined as
The candidate Lyapunov function is considered as follows.
The following relations are used to prove stability.
Therefore, the derivative of the Lyapunov functions is obtained.
In this formula, we have
According to Lemma 2,
To prove synchronization, we need to demonstrate that the steady-state error tends to 0 despite this controller (i.e.,
With the above proof, if the tree is connected, stability is maintained despite cyber-attacks. Additionally, as a multifunctional system, the voltage and frequency of all DGs should converge to the same value.
6. Case Studies
The presented content is validated through case studies. A case study model incorporating communication links is outlined in [44]. Furthermore, the model parameters are described, with the reference voltage set at 380 volts and the frequency at 50 Hz (
6.1. Scenario 1: Effect of Secondary Controller on Synchronization
The performance of the secondary and primary controllers of the system is examined in the absence of disturbances. Controllers are designed to enhance the flexibility, reliability, and performance of the microgrid in both grid-connected and islanded modes. In islanded microgrids, different controllers are commonly employed for power sharing. It is imperative to maintain constant frequency and voltage in island mode. Using only the primary controller results in a sharp voltage drop, disrupting synchronization, and causing frequency and voltage deviations. Consequently, minimizing deviations becomes necessary. Moreover, the system is sensitive to noise, disturbances, and unmodeled dynamics. While the primary controller ensures stability to a large extent, it may not adequately achieve synchronization. Thus, the secondary controller is introduced.
In steady-state operation, the frequency and voltage cannot vary significantly. Voltage may fluctuate by several volts, and the frequency by 1 Hz. While the system may withstand attacks momentarily, long-term effects are severe. Therefore, the designed controller must be robust and resilient against attacks.
Figure 6 illustrates the efficiency of the secondary and primary controllers for synchronization without cyber-attacks. As depicted, this controller effectively synchronizes the frequency and voltage output, aligning it with the reference values. Moreover, the voltage and frequency ranges with this controller remain within permissible limits. The synchronization time is also deemed appropriate in this scenario.
[figure(s) omitted; refer to PDF]
6.2. Scenario 2: Sensor Attack on DG2 and DG3
Different DG positions were assessed to investigate the effects of the attack. In this scenario, the voltage sensor of DG2 and DG3 is attacked at t = 0.5 s, followed by the frequency sensor of DG2 and DG3 at t = 1 s. and finally, the active power sensor of DG2 and DG3 at t = 1.5 s. Voltage and power sensor attacks induce 10% changes in the output, while frequency sensor attacks result in 0.08% changes in the output. The impact on other DGs is analyzed. Figure 7 shows the effects of this attack. The simulation results demonstrate that when a cyber-attack occurs on the first DG, DG2 is most affected, followed by DG3 and DG4. Additionally, sensor cyber-attacks on neighboring DGs have a greater impact. Despite the cyber-attacks, the controller effectively mitigates their effects.
[figure(s) omitted; refer to PDF]
Moreover, a cyber-attack on the voltage sensor influences the frequency value, indicating an interaction between voltage and frequency controllers. For instance, at t = 0.5 s, the voltage sensor attack causes changes in frequency, with DG2 experiencing the maximum frequency effect. Changes in the power sensor output minimally affect system performance. The resilience coefficient in the presence of this attack is detailed in Table 1.
Table 1
Examining the effect of sensor attack using resilience indices.
| DG1 | DG2 | DG3 | DG4 | |
| RI of voltage | 146 | 82 | 74 | 78 |
| RI of frequency | 2729 | 56 | 84 | 64 |
Despite the sensor attacks, all DGs achieve stability and synchronization. Notably, frequency variations are less than voltage variations, with maximum frequency changes of 6% while maintaining stability. The transient mode transition time is less than 0.2 s, indicating efficient performance. The system overload is tolerable, and synchronization is achieved promptly.
The value of the resilience coefficient in the presence of this attack is as follows:
6.3. Scenario 3: Hijacking Attack
This section evaluates the impact of a hijacking attack on DGs. The hijacking attack occurs in the system from t = 0.5 s to t = .6 s with replacement voltage of
The simulation results depicted in Figure 8 demonstrate that disturbances in DG frequency induce changes in output voltage and vice versa. The impact of the attack on DGs depends on its location, with frequency attacks causing voltage changes and vice versa. Despite the cyber-attack, the distributed hierarchical controller effectively manages the outputs, achieving voltage and frequency synchronization in less than 0.5 s. Moreover, the secondary layer initiates synchronization after the attack concludes. Table 2 presents the RI in the presence of hijacking attacks. Following the end of the hijacking attack, the system swiftly returns to its normal state within 0.2 s. The extent of overshoot depends on the magnitude of the attack.
[figure(s) omitted; refer to PDF]
Table 2
Examining the effect of hijacking attack using resilience indices.
| DG1 | DG2 | DG3 | DG4 | |
| RI of voltage | 45 | 29 | 23 | 19 |
| RI of frequency | 1708 | 37 | 33 | 20 |
6.4. Scenario 4: Periodic DoS Cyber-Attack on the Communication Link Between DG1 and DG2
In this scenario, a periodic DoS attack occurs between DG1 and DG2, resulting in the loss of information reaching DG3 and DG4 during each attack. The attack parameters are defined as
This scenario assesses the control method’s capability to withstand continuous connection and disconnection against a severe cyber-attack. The simulation results depicted in Figure 9 illustrate the effect of DoS cyber-attacks on the voltage (a) and frequency (b) of DGs between the DG1 and DG2 communication channels. During each attack, DG3 and DG4 are disconnected from the slack bus, resulting in outputs deviating from the reference. However, after the attacks conclude, it takes 0.4 s for all sources to recover their output values.
[figure(s) omitted; refer to PDF]
Despite the interruptions, the system performs well in dealing with this attack, with outputs restored and synchronized upon attack cessation.
When a DoS attack occurs, data loss during the attack may disrupt the stability and synchronization of a portion of the network. Disconnecting affected DGs from the network helps mitigate the problem. However, DGs closer to the attack source are more vulnerable. If a DG is disconnected from the root agent due to a DoS attack, it will be disconnected from the network. Nevertheless, if the tree remains connected, synchronization and stabilization can be maintained. Table 3 shows the RI in the presence of DoS attacks.
Table 3
Examining the effect of DoS attack using resilience indices.
| DG1 | DG2 | DG3 | DG4 | |
| RI of voltage | 15 | 0.38 | 0.08 | 0.26 |
| RI of frequency | 612 | 0.19 | 0.19 | 0.21 |
Table 4 shows the peak voltage (PV) and frequency values (PF) due to various cyber-attacks. According to the cyber-attack table, DoS has a significant impact on the maximum voltage. Additionally, during the attack, the effect of kidnapping is high. If the connection to the root is disconnected, the maximum voltage value increases.
Table 4
Comparing the effect of different cyber-attacks on microgrid output.
| DG1 | DG2 | DG3 | DG4 | ||
| No cyber attack | P.V. | 394 | 399 | 401 | 409 |
| P.F. | 315 | 321 | 333 | 329 | |
| Sensor attack | P.V. | 386 | 385 | 412 | 387 |
| P.F. | 314 | 324 | 332 | 328 | |
| Hijacking attack | P.V. | 419 | 465 | 466 | 525 |
| P.F. | 314 | 337 | 338 | 340 | |
| DoS attack | P.V. | 430 | 490 | 466 | 503 |
| P.F. | 314 | 332 | 331 | 333 | |
6.5. Scenario 5: Comparing the Proposed Method With the Methods in [48, 58]
In [48, 58], the distributed secondary control of a microgrid employs active and reactive power in controllers. The control signals in these references are defined as follows:
To compare the effects of different cyber-attacks on the controllers, similar attacks are considered. The simulation results have been conducted for the previous four scenarios with identical conditions for controllers [48, 58]. The results are depicted in Figures 10 and 11, and RI with the presence of cyber-attacks are examined in Table 4.
[figure(s) omitted; refer to PDF]
According to the simulation outcomes, both controllers achieve synchronization and stability for all DGs in a steady state, effectively mitigating the effects of cyber-attacks. However, the proposed method in this article demonstrates greater resilience to cyber-attacks compared to [48, 58]. Both controllers manage to synchronize all DGs after the attack, but the proposed method exhibits better resilience and faster synchronization. In conclusion, the proposed method outperforms [48, 58] in addressing cyber-attacks, achieving faster synchronization and demonstrating superior resilience, as evident from the simulation results and Table 5.
Table 5
Resilience indices with the presence of cyber-attack [48, 58].
| DG1 | DG2 | DG3 | DG4 | ||
| Sensor attack | RI of voltage | 70 | 28 | 34 | 33 |
| RI of frequency | 1455 | 22 | 27 | 31 | |
| Hijacking attack | RI of voltage | 69 | 27 | 26 | 21 |
| RI of frequency | 1457 | 28 | 20 | 18 | |
| DoS cyber-attack | RI of voltage | 11 | 6 | 0.02 | 0.02 |
| RI of frequency | 844 | 0.04 | 0.02 | 0.04 | |
7. Conclusion
In conclusion, this paper addressed the critical issue of cyber-attacks on microgrids, emphasizing the significance of synchronization in islanded microgrids where communication channels play a crucial role. By modeling the microgrid as a multiagent system and utilizing graph theory, the impact of various cyber-attacks on microgrid communication channels was investigated. The cooperative distributed hierarchical controller was designed to manage and synchronize the system, considering three types of cyber-attacks: sensor and actuator attacks, hijacking attacks, and DoS attacks.
A novel Lyapunov function was proposed to analyze the effects of cyber-attacks on microgrid stability, and theorems were presented to prove synchronization even in the presence of cyber-attacks. Through simulation using Matlab/Simulink software, the effectiveness of the controller in mitigating the effects of cyber-attacks was demonstrated, with RI used to assess resilience against different attack scenarios.
The results showed that while all types of cyber-attacks pose challenges, the impact of DoS attacks was particularly severe, causing instability in DGs disconnected from the slack node. However, the controller was able to stabilize and synchronize the system after the DoS attacks ceased. Additionally, the controller effectively mitigated the effects of hijacking and sensor attacks, restoring synchronization and bringing frequency and voltage back to reference values.
The effects of cyber-attacks varied depending on the network adjacency matrix, with DGs disconnected from the reference node experiencing greater instability. The proposed controller implemented Reynold’s laws, emphasizing the cooperation and influence of neighboring DGs for stability and synchronization.
At the end of this study, the impact of cyber-attacks on different controllers and the proposed controller is shown. The RI are utilized to assess the flexibility of a controller in the face of cyber-attacks. Based on this metric, the controller we designed demonstrates superior resilience compared to other controllers. Specifically, our designed controller achieves a higher resilience index, indicating its enhanced capability to withstand and recover from cyber-attacks.
During the assessment of all controllers, it was observed that the resilience was notably low during DoS attacks, which led to system instability. Despite this, the designed controller effectively restored the system to a stable state postattack, highlighting its robustness and recovery capability.
The results show the better performance of the proposed controller.
For future research, the paper suggests several avenues:
1. Further examination of communication channel issues such as interference, delay, noise, and fading.
2. Investigation and comparison of cyber-attacks on various secondary controller architectures.
3. Exploration of robust control methods to handle uncertain cyber-attacks and ensure system stability.
4. Analysis of DoS attacks using switching control methods in microgrids.
Addressing these areas could enhance the understanding of cyber-attack resilience in microgrids and contribute to the development of more robust control strategies.
Funding
This investigation is in the form of academic research and is not funded by any organization.
Glossary
Nomenclature
RIResilience indices
[1] S. Derakhshan, M. Shafiee-Rad, Q. Shafiee, M. R. Jahed-Motlagh, "Decentralized Robust Voltage Control of Islanded AC Microgrids: An LMI-Based $ H_ {\infty} $ Approach," .
[2] F. Nawaz, E. Pashajavid, Y. Fan, M. Batool, "A Comprehensive Review of the State-of-the-Art of Secondary Control Strategies for Microgrids," IEEE Access, vol. 11, pp. 102444-102459, DOI: 10.1109/access.2023.3316016, 2023.
[3] Y. Wang, C. Deng, Y. Liu, Z. Wei, "A Cyber-Resilient Control Approach for Islanded Microgrids Under Hybrid Attacks," International Journal of Electrical Power & Energy Systems, vol. 147,DOI: 10.1016/j.ijepes.2022.108889, 2023.
[4] S. Mehta, P. Basak, "A Comprehensive Review on Control Techniques for Stability Improvement in Microgrids," International Transactions on Electrical Energy Systems, vol. 31 no. 4,DOI: 10.1002/2050-7038.12822, 2021.
[5] A. Bidram, A. Davoudi, "Hierarchical Structure of Microgrids Control System," IEEE Transactions on Smart Grid, vol. 3 no. 4, pp. 1963-1976, DOI: 10.1109/tsg.2012.2197425, 2012.
[6] A. Bidram, F. L. Lewis, A. Davoudi, "Distributed Control Systems for Small-Scale Power Networks: Using Multiagent Cooperative Control Theory," IEEE Control Systems Magazine, vol. 34 no. 6, pp. 56-77, 2014.
[7] N. Sheykhi, A. Salami, J. M. Guerrero, G. D. Agundis-Tinajero, T. Faghihi, "A Comprehensive Review on Telecommunication Challenges of Microgrids Secondary Control," International Journal of Electrical Power & Energy Systems, vol. 140,DOI: 10.1016/j.ijepes.2022.108081, 2022.
[8] Z. Zhang, C. Dou, D. Yue, "An Event-Triggered Secondary Control Strategy With Network Delay in Islanded Microgrids," IEEE Systems Journal, vol. 13 no. 2, pp. 1851-1860, DOI: 10.1109/jsyst.2018.2832065, 2019.
[9] Y. Xie, Z. Lin, "Distributed Event-Triggered Secondary Voltage Control for Microgrids With Time Delay," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49 no. 8, pp. 1582-1591, DOI: 10.1109/tsmc.2019.2912914, 2019.
[10] Z. Shahbazi, A. Ahmadi, A. Karimi, Q. Shafiee, "Performance and Vulnerability of Distributed Secondary Control of AC Microgrids Under Cyber-Attack," .
[11] S. Zuo, T. Altun, F. L. Lewis, A. Davoudi, "Distributed Resilient Secondary Control of DC Microgrids against Unbounded Attacks," IEEE Transactions on Smart Grid, vol. 11 no. 5, pp. 3850-3859, DOI: 10.1109/tsg.2020.2992118, 2020.
[12] B. Wang, Q. Sun, D. Ma, "A Periodic Event-Triggering Reactive Power Sharing Control in an Islanded Microgrid Considering DoS Attacks," pp. 170-175, .
[13] R. Lu, J. Wang, "Distributed Control for AC Microgrids With False Data Injection Attacks and Time Delays," vol. 194,DOI: 10.1051/e3sconf/202019403023, .
[14] S. Tan, P. Xie, J. M. Guerrero, J. C. Vasquez, "False Data Injection Cyber-Attacks Detection for Multiple DC Microgrid Clusters," Applied Energy, vol. 310,DOI: 10.1016/j.apenergy.2021.118425, 2022.
[15] X. Huang, J. Dong, "Reliable Leader-To-Follower Formation Control of Multiagent Systems under Communication Quantization and Attacks," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 50 no. 1, pp. 89-99, DOI: 10.1109/tsmc.2019.2894946, 2020.
[16] H. Modares, B. Kiumarsi, F. L. Lewis, F. Ferrese, A. Davoudi, "Resilient and Robust Synchronization of Multiagent Systems Under Attacks on Sensors and Actuators," IEEE Transactions on Cybernetics, vol. 50 no. 3, pp. 1240-1250, DOI: 10.1109/tcyb.2019.2903411, 2020.
[17] A. Mirzabeigi, A. Kazemy, S. M. Azimi, M. Ramezani, "Stabilizing and Synchronizing the Islanded Microgrid With the Presence of Sensor and Actuator Fault and Cyber-Attack With Secondary Controller Design," 2023.
[18] X. Huang, J. Dong, "An Adaptive Secure Control Scheme for T–S Fuzzy Systems against Simultaneous Stealthy Sensor and Actuator Attacks," IEEE Transactions on Fuzzy Systems, vol. 29 no. 7, pp. 1978-1991, DOI: 10.1109/tfuzz.2020.2990772, 2021.
[19] A. S. S. Abadi, P. A. Hosseinabadi, A. Ordys, M. Grimble, Design a Robust Quantitative Feedback Theory Controller for Cyber-Physical Systems: Ship Course Control Problem, 2022.
[20] B. Wang, Q. Sun, R. Han, D. Ma, "Consensus-Based Secondary Frequency Control Under Denial-of-Service Attacks of Distributed Generations for Microgrids," Journal of the Franklin Institute, vol. 358 no. 1, pp. 114-130, DOI: 10.1016/j.jfranklin.2019.01.007, 2021.
[21] X. Chen, J. Zhou, M. Shi, Y. Chen, J. Wen, "Distributed Resilient Control Against Denial of Service Attacks in DC Microgrids With Constant Power Load," Renewable and Sustainable Energy Reviews, vol. 153,DOI: 10.1016/j.rser.2021.111792, 2022.
[22] J. Liu, X. Lu, J. Wang, "Resilience Analysis of DC Microgrids Under Denial of Service Threats," IEEE Transactions on Power Systems, vol. 34 no. 4, pp. 3199-3208, DOI: 10.1109/tpwrs.2019.2897499, 2019.
[23] A. Mirzabeigi, A. Kazemy, M. Ramezani, S. M. Azimi, "Design of a Secondary Controller Based on Distributed Cooperative Control of Distributed Generators (DGs) With Multi-Agent Systems Approach Considering DoS Cyber Attacks," Nashriyyah-i Muhandisi-i Barq va Muhandisi-i Kampyutar-i Iran, vol. 99 no. 4, 2023.
[24] M. Shi, X. Chen, M. Shahidehpour, Q. Zhou, J. Wen, "Observer-Based Resilient Integrated Distributed Control Against Cyberattacks on Sensors and Actuators in Islanded AC Microgrids," IEEE Transactions on Smart Grid, vol. 12 no. 3, pp. 1953-1963, DOI: 10.1109/tsg.2021.3050203, 2021.
[25] H. Yan, J. Han, H. Zhang, X. Zhan, Y. Wang, "Adaptive Event-Triggered Predictive Control for Finite Time Microgrid," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 67 no. 3, pp. 1035-1044, DOI: 10.1109/tcsi.2019.2953958, 2020.
[26] F. Zhang, L. Mu, "A Fault Detection Method of Microgrids With Grid-Connected Inverter Interfaced Distributed Generators Based on the PQ Control Strategy," IEEE Transactions on Smart Grid, vol. 10 no. 5, pp. 4816-4826, DOI: 10.1109/tsg.2018.2868967, 2019.
[27] S. Sahoo, J. C.-H. Peng, A. Devakumar, S. Mishra, T. Dragicevic, "On Detection of False Data in Cooperative Dc Microgrids—A Discordant Element Approach," IEEE Transactions on Industrial Electronics, vol. 67 no. 8, pp. 6562-6571, DOI: 10.1109/tie.2019.2938497, 2020.
[28] X.-K. Liu, C. Wen, Q. Xu, Y.-W. Wang, "Resilient Control and Analysis for DC Microgrid System under DoS and Impulsive FDI Attacks," IEEE Transactions on Smart Grid, vol. 12 no. 5, pp. 3742-3754, DOI: 10.1109/tsg.2021.3072218, 2021.
[29] X.-K. Liu, S.-Q. Wang, M. Chi, Z.-W. Liu, Y.-W. Wang, "Resilient Secondary Control and Stability Analysis for DC Microgrids under Mixed Cyber Attacks," IEEE Transactions on Industrial Electronics, vol. 71 no. 2, pp. 1938-1947, DOI: 10.1109/tie.2023.3262893, 2024.
[30] P. Chen, S. Liu, B. Chen, L. Yu, "Multi-Agent Reinforcement Learning for Decentralized Resilient Secondary Control of Energy Storage Systems against DoS Attacks," IEEE Transactions on Smart Grid, vol. 13 no. 3, pp. 1739-1750, DOI: 10.1109/tsg.2022.3142087, 2022.
[31] A. Karimi, A. Ahmadi, Z. Shahbazi, H. Bevrani, Q. Shafiee, "On the Impact of Cyber-Attacks on Distributed Secondary Control of DC Microgrids," .
[32] S. Liu, Z. Hu, X. Wang, L. Wu, "Stochastic Stability Analysis and Control of Secondary Frequency Regulation for Islanded Microgrids under Random Denial of Service Attacks," IEEE Transactions on Industrial Informatics, vol. 15 no. 7, pp. 4066-4075, DOI: 10.1109/tii.2018.2885170, 2019.
[33] S. Sahoo, T. Dragičević, F. Blaabjerg, "Multilayer Resilience Paradigm against Cyber Attacks in DC Microgrids," IEEE Transactions on Power Electronics, vol. 36 no. 3, pp. 2522-2532, 2020.
[34] J. Yang, J. Dai, H. B. Gooi, H. D. Nguyen, A. Paudel, "A Proof-Of-Authority Blockchain-Based Distributed Control System for Islanded Microgrids," IEEE Transactions on Industrial Informatics, vol. 18 no. 11, pp. 8287-8297, DOI: 10.1109/tii.2022.3142755, 2022.
[35] R. Yan, Y. Wang, J. Dai, Y. Xu, A. Q. Liu, "Quantum-Key-Distribution-Based Microgrid Control for Cybersecurity Enhancement," IEEE Transactions on Industry Applications, vol. 58 no. 3, pp. 3076-3086, DOI: 10.1109/tia.2022.3159314, 2022.
[36] C. Deng, Y. Wang, C. Wen, Y. Xu, P. Lin, "Distributed Resilient Control for Energy Storage Systems in Cyber–Physical Microgrids," IEEE Transactions on Industrial Informatics, vol. 17 no. 2, pp. 1331-1341, DOI: 10.1109/tii.2020.2981549, 2021.
[37] Y. Chen, D. Qi, H. Dong, C. Li, Z. Li, J. Zhang, "A FDI Attack-Resilient Distributed Secondary Control Strategy for Islanded Microgrids," IEEE Transactions on Smart Grid, vol. 12 no. 3, pp. 1929-1938, DOI: 10.1109/tsg.2020.3047949, 2021.
[38] H. Dong, C. Li, Y. Zhang, "Resilient Consensus of Multi-Agent Systems against Malicious Data Injections," Journal of the Franklin Institute, vol. 357 no. 4, pp. 2217-2231, DOI: 10.1016/j.jfranklin.2019.11.035, 2020.
[39] S. Sahoo, J. C.-H. Peng, S. Mishra, T. Dragicevic, "Distributed Screening of Hijacking Attacks in DC Microgrids," IEEE Transactions on Power Electronics, vol. 35 no. 7, pp. 7574-7582, DOI: 10.1109/tpel.2019.2957071, 2020.
[40] N. Pogaku, M. Prodanovic, T. C. Green, "Modeling, Analysis and Testing of Autonomous Operation of an Inverter-Based Microgrid," IEEE Transactions on Power Electronics, vol. 22 no. 2, pp. 613-625, DOI: 10.1109/tpel.2006.890003, 2007.
[41] A. Bidram, A. Davoudi, F. L. Lewis, Z. Qu, "Secondary Control of Microgrids Based on Distributed Cooperative Control of Multi-Agent Systems," IET Generation, Transmission & Distribution, vol. 7 no. 8, pp. 822-831, DOI: 10.1049/iet-gtd.2012.0576, 2013.
[42] Q. Shafiee, J. M. Guerrero, J. C. Vasquez, "Distributed Secondary Control for Islanded Microgrids—A Novel Approach," IEEE Transactions on Power Electronics, vol. 29 no. 2, pp. 1018-1031, DOI: 10.1109/tpel.2013.2259506, 2014.
[43] A. Bidram, A. Davoudi, F. L. Lewis, J. M. Guerrero, "Distributed Cooperative Secondary Control of Microgrids Using Feedback Linearization," IEEE Transactions on Power Systems, vol. 28 no. 3, pp. 3462-3470, DOI: 10.1109/tpwrs.2013.2247071, 2013.
[44] A. Mirzabeigi, A. Kazemy, M. Ramezani, S. M. Azimi, "Distributed Robust Cooperative Hierarchical Control for Island Microgrids under Hijacking Attacks Based on Multiagent Systems," International Transactions on Electrical Energy Systems, vol. 2023,DOI: 10.1155/2023/6622346, 2023.
[45] O. A. Beg, L. V. Nguyen, T. T. Johnson, A. Davoudi, "Signal Temporal Logic-Based Attack Detection in DC Microgrids," IEEE Transactions on Smart Grid, vol. 10 no. 4, pp. 3585-3595, DOI: 10.1109/tsg.2018.2832544, 2019.
[46] H. Z. F. L. Lewis, K. Hengster-Movric, A. Das, "Cooperative Control of Multi-Agent Systems Optimal and Adaptive Design Approaches," Spring, 2014.
[47] F. Guo, C. Wen, J. Mao, J. Chen, Y.-D. Song, "Distributed Cooperative Secondary Control for Voltage Unbalance Compensation in an Islanded Microgrid," IEEE Transactions on Industrial Informatics, vol. 11 no. 5, pp. 1078-1088, DOI: 10.1109/tii.2015.2462773, 2015.
[48] A. Bidram, A. Davoudi, F. L. Lewis, "A Multiobjective Distributed Control Framework for Islanded AC Microgrids," IEEE Transactions on Industrial Informatics, vol. 10 no. 3, pp. 1785-1798, DOI: 10.1109/tii.2014.2326917, 2014.
[49] H. Cai, F. L. Lewis, G. Hu, J. Huang, "The Adaptive Distributed Observer Approach to the Cooperative Output Regulation of Linear Multi-Agent Systems," Automatica, vol. 75, pp. 299-305, DOI: 10.1016/j.automatica.2016.09.038, 2017.
[50] J. M. Carlson, J. Doyle, "Highly Optimized Tolerance: A Mechanism for Power Laws in Designed Systems," Physical Review E, vol. 60 no. 2, pp. 1412-1427, DOI: 10.1103/physreve.60.1412, 1999.
[51] Z. Li, M. Shahidehpour, F. Aminifar, A. Alabdulwahab, Y. Al-Turki, "Networked Microgrids for Enhancing the Power System Resilience," Proceedings of the IEEE, vol. 105 no. 7, pp. 1289-1310, DOI: 10.1109/jproc.2017.2685558, 2017.
[52] H. Zhang, F. L. Lewis, A. Das, "Optimal Design for Synchronization of Cooperative Systems: State Feedback, Observer and Output Feedback," IEEE Transactions on Automatic Control, vol. 56 no. 8, pp. 1948-1952, DOI: 10.1109/tac.2011.2139510, 2011.
[53] Z. Qu, Cooperative Control of Dynamical Systems: Applications to Autonomous Vehicles, 2009.
[54] A. Kazemy, J. Lam, Z. Chang, "Adaptive Event-Triggered Mechanism for Networked Control Systems under Deception Attacks with Uncertain Occurring Probability," International Journal of Systems Science, vol. 52 no. 7, pp. 1426-1439, DOI: 10.1080/00207721.2020.1858205, 2020.
[55] N. M. Dehkordi, S. Z. Moussavi, "Distributed Resilient Adaptive Control of Islanded Microgrids under Sensor/actuator Faults," IEEE Transactions on Smart Grid, vol. 11 no. 3, pp. 2699-2708, DOI: 10.1109/tsg.2019.2960205, 2020.
[56] W. Yao, Y. Wang, Y. Xu, C. Deng, "Cyber-Resilient Control of an Islanded Microgrid under Latency Attacks and Random DoS Attacks," IEEE Transactions on Industrial Informatics, vol. 19 no. 4, pp. 5858-5869, DOI: 10.1109/tii.2022.3191315, 2023.
[57] A. Karimi, A. Ahmadi, Z. Shahbazi, Q. Shafiee, H. Bevrani, "A Resilient Control Method against False Data Injection Attack in DC Microgrids," .
[58] A. Bidram, B. Poudel, L. Damodaran, R. Fierro, J. M. Guerrero, "Resilient and Cybersecure Distributed Control of Inverter-Based Islanded Microgrids," IEEE Transactions on Industrial Informatics, vol. 16 no. 6, pp. 3881-3894, DOI: 10.1109/tii.2019.2941748, 2020.
Copyright © 2025 Abdollah Mirzabeigi et al. International Transactions on Electrical Energy Systems published by John Wiley & Sons Ltd. This is an open access article under the terms of the Creative Commons Attribution License (the “License”), which permits use, distribution and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/