1. Introduction
A networked control system (NCS) is a type of control system in which the control and feedback data packets are exchanged through communication channels between agents and the controller. NCS systems are used to enhance the efficiency and reliability of the control systems [1,2,3,4]. The simplicity and efficiency of NCSs for constructing networks among multi-agent systems have received significant attention over the past years. Although leveraging communication channels in an NCS can control and supervise the system more efficiently and reliably, NCSs are prone to cyber disruptions—either inherent or intentional ones, such as cyberattacks. The most known cyberattacks are denial of service (DoS), which disables access to the system information or a service [5], false data injection (FDI), which intentionally manipulates the exchange of data [6], replay attack, which maliciously repeats valid data transmissions [7], and a newly found attack, the time-delay switch (TDS) [3]. The number and intensity of these cyber manipulations have grown in recent years. One of these cyber attacks was the 2015 Ukraine Blackout event, in which about 225,000 customers lost their electricity for several hours. This cyber incident was a successful FDI on an actual power grid [8]. The 2019 Venezuela blackout resulted from a cyberattack on energy supplies in eighteen states that affected two-thirds of the country [9,10]. These cyber disruptions determine the criticality of studying cyber attacks on NCSs, like power grids.
A TDS attack is made by inserting time delays into communication channels of NCSs [11]. Since NCSs are time-sensitive and require updated measurement signals, a TDS can be highly destructive [11,12]. Time delays can occur purposefully or inherently in a wide range of engineering systems [12,13,14]. In general, time delays are common in control systems and can influence the stability of control systems. Even worse delays can occur when an adversary injects random TDS attacks into NCSs, making the systems inefficient or even unstable. This circumstance stems from the fact that the controller needs to receive the measurement values in real time to be able to generate the control signals. NCSs transmit the sensor measurements from agents to a centralized control unit through communication channels, and injecting TDS attacks will result in instability in NCSs. Therefore, it is crucial to design a secure NCS that is robust to both natural delays and TDS attacks [3,15].
Even though it has been shown in the literature that TDS attacks can cause instability in NCSs [11], only a few studies have focused on detecting TDS attacks in real time, and none have investigated the compensation of TDS attacks by designing a secure controller. A neural network (NN) approach was developed in [16] as a tool for estimating a time delay in industrial communication systems with nonlinear dynamics, but the stability of this controller has not been investigated. Another NN-based approach was introduced in [17] to estimate the state of the system in real time. The aforementioned proposed algorithms require offline training and cannot detect TDS attacks in real time. Although machine learning techniques have been utilized for cyber attack detection in NCSs [18], various susceptible and erroneous detection results have been reported in the literature [19,20]. These machine learning methods are prone to maliciously altering the training or test data and cause disastrous operation issues and system instability [20]. A robust controller was introduced in [21] for systems with nonlinear dynamics. The proposed approach can compensate for the effects of TDS attacks in real time without detecting them. However, the proposed controller can only mitigate small amounts of TDS attacks. The approach proposed in [22] uses a neural-network-based detection algorithm to detect and estimate the TDS attack in real time. However, the proposed approach can estimate the TDS attacks accurately, but it cannot mitigate the effects of TDS attacks in real time. To mitigate the effect of a TDS attack, Ref. [12] proposed an adaptive control algorithm that estimates TDS attacks introduced into measurement signals. This work was able to detect and mitigate TDS attacks in real time. However, the stability of the proposed method was not investigated due to the nature of the controller design. Furthermore, the convergence of attack detection and estimation requires further investigation. Table 1 summarizes the advantages and disadvantages of approaches in the literature.
The contributions of this papers are as follows:
- It develops a novel secure control strategy to estimate and compensate TDS attacks in real time for NCSs with linear dynamics to address the current barriers in the detection and compensation of TDS attacks in the literature.
- It designs a secure controller that is able to mitigate the effects of TDS attacks using the proposed model-based algorithm.
-
The controller and estimator in this paper are designed based on the Lyapunov theory to guarantee the stability of an NCS under a TDS attack. The proposed method is compared with an NN-based method [22] to show the efficacy of the proposed technique in the presence of the TDS attack.
To summarize, the contribution of the paper is its proposal of a novel TDS attack detection technique along with its design of a secure Lyapunov-based controller for NCSs with linear dynamics under TDS attacks. The proposed algorithm is a model-based method that is able to detect and compensate for TDS attacks in real time with low computational complexity compared with learning-based methods.
The rest of the paper is organized as follows. Section 2 presents a general model for an NCS under a TDS attack. The proposed controller with a Luenberger observer is described in Section 3. Section 4 verifies the controller’s stability. The case study is described in Section 5. Simulations and results are demonstrated in Section 6, and the conclusion is presented in Section 7.
2. Networked Control Systems
Despite all of the benefits of NCSs, including that they are fast, reliable, and have remote capability, NCSs are vulnerable to cyber disruptions and threats, since NCSs are highly dependent on information, communication, and cyber interfaces [1,2,3]. NCSs are used in critical infrastructures, and their security is categorized as one of the important concerns in the nation. Therefore, the vulnerability to external interruptions and attacks must be prevented. Since these systems heavily rely on networked communications, this dependency introduces delays, data packet drops, bandwidth allocations, and other cybersecurity issues in the data transfer process [11,23,24].
Specifically, delays can cause catastrophic failures in the systems that are under control. Measured data and control commands must be transferred within a limited period; otherwise, introducing delays to these signals makes the system unable to trace its operating conditions and causes an undesired response [3,25].
2.1. Dynamic Model of an NCS
A general diagram of an NCS system is presented in Figure 1. The communication between the plant and the controller takes place through a networked communication channel. Commands from the controller to the actuators and sensing signals from measurement sensors, which are vulnerable points of NCSs, must flow through the network. The NCS is mathematically represented by the following state-space model, assuming that the NCS has J agents:
x˙(t)=Ax(t)+Bu(t)y(t)=Cx(t),
wherex(t)indicates the states of NCS and can be described as
x(t)=x1 (t)Tx2 (t)T⋯xJ (t)TT
andxiis the state-space vector of theithagent of the NCS.
In a similar manner,u(t)is the vector of inputs andy(t)is the output, the aggregated state measurements of the system, which are described as
u(t)=u1 (t)Tu2 (t)T⋯uJ (t)TT
y(t)=y1 (t)Ty2 (t)T⋯yJ (t)TT.
Each agent in the NCS can have a different number of inputsui(t), outputsyi(t), and statesxi(t). This means that each vector inx(t),u(t),andy(t)has its own dimension.
xi(t)=xi,1(t)xi,2(t)⋯xi,nxi(t)T
ui(t)=ui,1(t)ui,2(t)⋯ui,nui(t)T
yi(t)=yi,1(t)yi,2(t)⋯yi,nyi(t)T,
wherenxi,nui, andnyiare the dimensions of each vector of the state-space, inputs, and outputs, respectively, for theithagent.
The matrix A is described as:
A=A11A12⋯A1JA21A22⋯A2J⋮⋮⋱⋮AJ1AJ2⋯AJJ.
Here, each sub-conjunctAiihas the dimensionnxi×nxiof theithagent in the system.Aabrepresents the mutual dependency between agents.
If all the agents are independent of each other, the matrix changes to the following:
A=A110⋯00A22⋯0⋮⋮⋱⋮00⋯AJJ.
In the same way, the matrix B is defined as
B=B10⋯00B2⋯0⋮⋮⋱⋮00⋯BJ.
Therefore, any singleBihas the dimensionnxi×nuibased on the number of terms in the state vector (nxi) and the number of terms in the input vector (nui) of theithagent in the NCS.
Matrix C is composed ofCifor each agent in the system. The dimension of eachCiisnyi×nxi. Matrix C is defined as:
C=C10⋯00C2⋯0⋮⋮⋱⋮00⋯CJ.
2.2. NCS under a TDS Attack
The controller of an NCS is considered to be an optimal controller, which is described as
u(t)=−Kz(t),
where z is the signal measured by the centralized controller.
Since delays are introduced to the communication channel, the signals received by the controller from each agent in the NCS are not theyi(t)originally observed from the system output. This paper assumes that an adversary cannot access control signals and only injects the TDS attacks into the measurement signals. The measured signal under a TDS attack can be described as
zi(t)=yi(t−τi),i∈{1,2,...,J},
whereτiis the delay of theithelement of the NCS.
3. Controller Design: Lyapunov Compensation with a Luenberger Observer 3.1. Observer Design
A Luenberger observer is designed such that the error between the system measurement and estimated output converges to zero:
x^˙=Ax+Bu+L(y−y^)+ψ2y^=Cx^,
where the vectorsx^,u^, andy^are the state-space, the inputs, and the outputs of the observer, respectively. The compensator signalψ2will be designed based on the subsequent stability analysis. The Luenberger gain L is a constant scalar number that multiplies the error between the output of the systemy=Cxand the estimated value from the observery^=Cx^.
Substituting the y andy^ elements in (14) yields
x^˙=Ax^+Bu^+LC(x−x^)+ψ2y^=Cx^.
Grouping the elements withx^, the system representation can be written as
x^˙(t)=(A−LC)x^+Bu^+LCx+ψ2y^=Cx^.
The last term in Equation (16) is the response received by the observer from the plant through the delayed channel, which is actuallyx(t−τ). Given this variable, the state-space representation is changed to the following:
x^˙(t)=(A−LC)x^+Bu^+LCx(t−τ)+ψ2y^=Cx^.
3.2. Controller Design
The proposed control diagram is presented in Figure 2.
The delay presented in the superior feedback loop is the attack delay inserted into the system. The feedback controller is the same for both the plant and observer environment (K matrix). The terms of K must be defined to implement an optimal response to the system. It was used as a linear quadratic regulator (LQR) method to create the proper K matrix with the individual gains for each state in the system [26].
The delay in the system data is estimated at the feedback loop of the observer. This estimated delay signal is applied in the controller to adjust the control commands based on the inserted delay. The system model is set with an initial condition vector and the reference signal, which is a zero vector. It is replicated on the observer, and because of that, the inputs areu=−Kxandu^=−Kx^.
As seen in (18) and (19), the input signal of the system is affected by the delay in the communication channel. In the same way, the estimate delay is injected into the observer feedback response to also emulate the delay at the observer.
u=−Kx(t−τ)+ψ1
u^=−Kx^(t−τ^)
As Figure 2 shows,ψ1compensates for the delay attack in the control input, andψ2compensates for the delay attack in the observer process. These two terms will be further elaborated upon in the next section.
4. Proposed Delay Detection Method
In this section,ψ1andψ2are designed using the Lyapunov approach. Furthermore, this section illustrates how TDS attacks are estimated in real time.
Consider the Lyapunov function described as
Vc=12x˜x˜T+α2τ˜τ˜T,
whereαis a positive gain,x˜≜x−x^is the state estimation error, andτ˜≜τ−τ^is the delay estimation error.
In (21), the derivative of the Lyapunov function is taken to obtain the required parameters and design a controller that is resilient against TDS attacks. It should be noted that time-delay attacks here target the input signalsurealanduobs. The output data y from the plant also have the delay attack shift in this model.
V˙c=x˜x˜˙T+ατ˜τ˜˙T
Substitutingx˜˙=(x˙−x^˙)andτ˜˙=(τ˙−τ^˙) into (21), we obtain:
V˙c=x˜{x˙−x^˙}T+ατ˜{τ˙−τ^˙}T.
Then,x˙andx^˙ are substituted according to (1) and (14), respectively. The equation changes into:
V˙c=x˜{Ax+Bu−((A−LC)x^+Bu^+LCx(t−τ)+ψ2 )}T+ατ˜(τ˙−τ^˙)T.
Substituting the signals u andu^ from (18) and (19), the equation becomes the following:
V˙c=x˜{Ax+B(−Kx(t−τ)+ψ1)−(Ax^+B(−Kx^(t−τ^)+LCx(t−τ)+ψ2 )}T+ατ˜(τ˙−τ^˙)T.
Considering a constant delay in the channel, even if it happens over short periods of time, the derivative of the delay is going to be null (τ˙=0). Using a Taylor series, the delayed signal is modeled approximately up to the first derivative term asx(t−τ)=x−x˙τ.
V˙c=x˜{(A−LC)x˜−BK(x(t−τ)−x^(t−τ^))+Bψ1+LCx˙τ−ψ2 }T−ατ˜(τ^˙)T
Assuming that the second and third terms in (25) can cancel out each other,ψ1can be obtained as follows:
ψ1=K(x(t−τ)−x^(t−τ^)).
After this, the derivative of the Lyapunov function is simplified as in (27).
V˙c=x˜{(A−LC)x˜+LC(x^˙+x˜˙)(τ^+τ˜)−ψ2 }T−ατ˜(τ^˙)T
Applying the distributive property, Equation (27) is extended to (E:dem4):
V˙c=x˜{(A−LC)x˜+LC(x^˙τ^+x^˙τ˜+x˜˙τ^+x˜˙τ˜)−ψ2 }T−ατ˜(τ^˙)T.
Simplifying (27), we obtain the following equations, which will be used to find the estimated delayτ^:
x˜LC(x^˙+x˜˙)τ˜T=ατ˜(τ^˙)T
τ^˙=LCα(x^˙+x˜˙)x˜.
The elementαis a parameter for characterizing the system to make it possible to run the computation of the estimated delay value. Unfortunately, there is not a previous relation between the physical parameters of the system and the value ofα. The moment when the attack is deployed and the amount of delay injected have different effects on the system. The method used to getαis based on the peak value observed when tracking the error signal—the difference between the plant response and the observer response—and defining theαvalue. Then, some series of tests must be performed under known TDS attack conditions to validate the definition ofα. An offset may be applied according to the essay results to guarantee more precise estimates.
ψ2is obtained below:
ψ2=LC(x^˙+x˜˙)τ^.
The Lyapunov theory is applied to guarantee that the system remains stable at different operating points. The Luenberger gain L must satisfy the following equation:
x˜{(A−LC)x˜}T<0.
The derivativex^˙can be taken from the observer. However, the error signal and its derivativex˜˙must be deduced—because it is not possible to measure data at the plant output before the delayed channel—by checking the errorx(t−τ)−x^(t−τ^).
The Taylor series approximation must be considered; neglecting the higher-order terms, the delayed signal is represented by the following:
x(t−τ)=x−x˙τ.
Similarly, the estimated states are obtained below:
x^(t−τ^)=x^−x^˙τ^.
Subtracting Equations (33) from (34) will result in (36):
x(t−τ)−x^(t−τ^)=x˜−x˙τ+x^˙τ^
x(t−τ)−x^(t−τ^)=x˜−x˙(τ^+τ˜)+x^˙τ^.
The termτ˜ can be neglected because it is expected to go to zero due to the proper function of the proposed estimator. In this case, the Equation (36) becomes:
x(t−τ)−x^(t−τ^)=x˜−x˜˙τ^.
Considering that the system must be stable because the chosen value of L must guarantee the Lyapunov stability criteria, the Luenberger observer must bring estimation error signals in the form ofx˜=a.e−kt. Then,x˜˙=−kx˜. Takingk=1(the effects of this k can be absorbed byα ) to simplify the calculations, Equation (37) becomes
x(t−τ)−x^(t−τ^)=x˜(t)(1+τ^)
x˜(t)=x(t−τ)−x^(t−τ^))1+τ^.
This way, it is possible to deducex˜(t)and its derivativex˜˙(t) used in Equations (30) and (31). They are obtained with the difference between consecutive samples in the digital readings.
5. NCS Case Study: Load Frequency Control Design for Power Grids
Load variation may create frequency oscillations and ultimately cause power grid instability. When the the grid load increases, the frequency decreases, and vice versa. Once a rapid load change is sensed, the electrical torque output is changed, which leads to a mismatch between the electrical and mechanical torques. This torque mismatch results in turbine speed changes that, in turn, cause frequency oscillations in the grid [27].
The load frequency control (LFC) of power systems is crucial in sustaining the grid frequency within a predefined range. LFC guarantees that the grid generators can properly maintain a balance between load and energy supply using the regulation of generators’ set-points [27].
The mathematical model for an NCS applied to the power grid with several agents was developed in [12]. The mathematical model presented in Equation (1) with thexivector is defined as the following:
xi(t)=[Δfi(t)ΔPgi (t)ΔPtui(t)ΔPpfi(t)ei(t)]T,
whereΔfi(t)is the frequency deviation,ΔPgi (t)is the generated power deviation,ΔPtui(t)is the turbine position,ΔPpfi(t)is the tie-line power flow, andei (t)]Tis the control error given byei(t)=∫0t(βiΔfi+ΔPpfi)dt.
Therefore, the equations are going to havexi(t),ui(t), andyi(t)∈R5, whereui(t)is the control input vector,xi(t)is the state vector, andyi(t)is the output of theithagent in the system.
In this study, multiple grids are connected to the same tie-line within the same NCS. This means that agents can communicate with each other and exchange power among themselves through the grid. The matrix A will be similar to that presented in (8) with the following elements: EachAiiwill be
Aii=−μiJi1Ji0−1Ji00−1Ttu,i1Ttu,i00−1ωi Tg,i0−1Tg,i00∑i=j,j=122πTi,j0000βi0010
andAijwill be
Ai,j=000000000000000−2πTi,j000000000.
The parameters presented in (41) and (42) are described as follows:
Ji—generatormomentofinertiaβi—frequencybiasfactorωi—speed-dropcoefficientμi—dampingcoefficientTg,i—governortimeconstantTtu,i—turbinetimeconstantTi,j—stiffnessconstantbetweenithandjthagents
Similarly to (10), the matrix B is defined below:
Bi=001Tg,i00T.
Since vectorsy(t)andx(t) are the same as those shown in Equation (1), the matrix C presented in Equation (1) is an identity matrix, and finally, the matrix D is considered null in this study.
6. Simulation Results
This section illustrates the performance of the proposed secure control design along with the TDS attack detection technique through the case study that was introduced in Section 5. On top of the simulation, the method was implemented in a hardware-in-the-loop (HIL) environment to show that the proposed method is practical. For the HIL testing, we used a DS1104 Controller Board in connection with the MATLAB Simulink software. The LFC model was implemented via MATLAB Simulink 2019a, and it was converted into a C program to be loaded into the Dspace board. The results were observed using the Dspace console in real time. To show that the proposed method can perform well under measurement noise, we added zero-mean Gaussian noise during the HIL performance testing. As shown in Figure 3, the NCS, including two agents, was subjected to TDS attacks. Table 2 illustrates the parameter values that were used in the simulation.
The delay attacks were simulated based on the following assumptions:
Assumption 1.1.The TDS attack takes place at a certain moment and remains constant.
Assumption 1.2.The TDS attack affects all the states. The starting moment and the delay period are the same for all the states.
Assumption 1.3.From the moment the attack is launched, it persists until the end of the simulation.
6.1. Vulnerability Analysis
When running the NCS in an optimal control situation, with no compensation algorithm to correct the delays, it can be observed that the system becomes unstable for attacks ofτ=190 ms or higher. Figure 4 and Figure 5 show the response of the system under a TDS attack. Both attacks were started att0=1s, but the intensity of the attack is different. In the first case,τ=0.19s, and in the other one,τ=0.2s. It can be observed that the delay of0.2 s had an aggressive effect on the system, leading the response to a divergent behavior with a highly increasing rate. Figure 4 represents a threshold condition, where the system started facing unstable responses due to the delay. It is possible to observe that the instability started around the instant at 30 s and the oscillations grew at a low rate. However, it was an unstable condition, and the system could not work under this attack. To detect and mitigate the effects of an attack, a resilient controller must be applied.
6.2. TDS Attack Detection and State Estimation
The observer compensation technique discussed in Section 4 made the system operate correctly, even with TDS attacks of aroundτ=260 ms. The same TDS attack as that shown in Figure 5 was simulated, but the system was equipped with the proposed secure controller. As Figure 6 shows, the adverse effect of the TDS attack was improved by the proposed state estimation mechanism.
The simulation was repeated with different time delays inserted by the TDS attack into the NCS at different starting instants (t0=1,2,...,5 seconds). Table 3 shows the results for three different time delaysτ. The results show an Mean Square Error (MSE) around 5%.
The estimation of the delay depends on the parameterα mentioned in (30). The definition ofαis a result of a complex set of essays running under known conditions to evaluate how the system responds to an injected delay depending on the amount of delay and the time instant at which was deployed. When an attack takes place, the error between the actual and the estimated states from the observer increases, and this is also reflected in the variations inx^. Using the second derivative ofx^ , the time instant of the TDS attack is detected (as shown in Figure 7). Thus, it is deployed, and the error is used to define the value to be chosen forα. The solution for computingαwas created by using a constant value for alpha and then comparing the results with the offset that should be needed to get the correct values ofτ^. A polynomial approximation was created by taking the instant values ofx˜˙; then, it was incorporated in theαcomputation.
6.3. Performance Evaluation
The performance of the method proposed in this paper is compared with the performance of the control method presented in [22], which works based on an adaptive NN technique to estimate the time delay to which the NCS is exposed. The simulations were performed based on the following assumptions:
Assumption 2.1.The delay attack takes place in a certain moment and remains constant.
Assumption 2.2.
The delay attack targets only the state ofx3(t).
Assumption 2.3.The attack persists from the moment it is launched until the end of the simulation.
A delayτ=1s was inserted fromt0=2 s. The state estimation errors are shown in Figure 8. The results show that the observer was able to accurately estimate measurement signals, even when the NCS was under TDS attacks. The results associated with the proposed method are presented in Figure 9. As shown in the figure, it is clear that the proposed TDS attack detection technique is more accurate than the NN-based (traditional) detection technique.
The NN approach allows consecutive computations in order to correct the estimation error and compensate frequency discrepancies in the LFC. The proposed method based on the Lyapunov theory presented in (20) depends on the parameterα, which is a characteristic quantity of the system, but it also depends on the instant the attack takes place. A study using the values ofx^˙˙,x^˙, andx˜was used to calculate this parameter. So, the final value ofτ^was reached more quickly, but a steady-state error can happen. The better the adjustment of theαparameter, the lower the steady-state error.
Another experiment to validate the Lyapunov method for avoiding TDS attack effects was made in a hardware-in-the-loop environment using external hardware equipment, the dSPACE CP1104 platform. A feedback loop was made for thex3state through the connection on the board. A time delay ofτ=1.0s affected the LFC, and the resilient performance of the proposed controller was seen in the results. The signal response onx3 is shown in Figure 10. This test is important because it shows the effectiveness of the solution in a real-life system, demonstrating how the correction takes place to keep the system working properly, even when it is subjected to a TDS attack.
7. Conclusions This paper presented an approach to providing adjustments to the input signal in an NCS structure in order to keep a plant working properly, even under a TDS attack. The compensation signal is defined based on the Lyapunov theory and a Luenberger observer. The proposed approach was evaluated through a case study in which a two-agent LFC system was monitored and controlled. The performance of the controller was validated in a hardware-in-the-loop simulation using the dSPACE platform to emulate the feedback loop of the NCS under TDS attacks. It should be noted that the proposed method can be applied to any NCSs, such as cooperative driving systems.
During the transient response of the system, the proposed delay estimation is more precise compared with other techniques in the literature. Furthermore, the controller and estimator were designed based on Lyapunov stability analysis, unlike other traditional techniques. When the most significant variations take place, it is possible to detect the peaks caused by the attack. The final portion of the transient response already has lower variation, and it brings uncertainties to the estimation ofτ^. If the attack is deployed at an instant close to the starting point, the estimation is also affected because the observer will get the actual values from the plant. The variation in a delay over time is also a strong challenge for estimations, but this paper considered only constant delay attacks. Future work will enhance the proposed method to investigate time-variable TDS attacks. Although this paper focused on an NCS with dependent agents, the proposed method is general and can be used for a multi-agent system with independent dynamics.
Approach | Advantage | Disadvantage |
---|---|---|
Machine-learning-based approaches [16,17,18,19,20] | These approaches do not require the dynamic model of the system | Stability analysis of neural network (NN)-based approaches is complex; offline learning time is required |
Robust controller-based approach [21] | There is no need to detect attacks in real time | The system is not efficient due to its robustness to potential faults, failures, and attacks |
NN-based detection approach [22] | Ability of detection and estimation of time-delay switch (TDS) attacks | Stability analysis requires further investigation; it cannot mitigate the effects of TDS attacks |
Least-mean-square-based approach [12] | Accurate estimation of TDS attacks with a linear model of the system | Stability analysis is complex |
Description | Symbol | Power Area 1 | Power Area 2 |
---|---|---|---|
Generator Moment of Inertia | J1 | 10 | 12 |
Frequency Bias Factor | β1 | 21.5 | 21 |
Speed-Drop Coefficient | ω1 | 0.05 | 0.05 |
Damping Coefficient | μ1 | 1.5 | 1 |
Governor Time Constant | Tg,1 | 0.12 s | 0.18 s |
Turbine Time Constant | Ttu,1 | 0.2 s | 0.45 s |
Stiffness Constant i-j | T1,2 | 0.198 pu/rad | 0.198 pu/rad |
τ | τ^ | MSE |
---|---|---|
(s) | (s) | (s) |
0.15 | 0.1538 | 5.26% |
0.22 | 0.2202 | 4.61% |
0.26 | 0.2540 | 5.70% |
Author Contributions
Methodology, M.V. and A.S.; Writing - original draft, M.V., A.S. and M.R.K.; Writing - review and editing, M.V., A.S. and M.R.K. All authors have read and agreed to the published version of the manuscript.
Funding
Partial support of this research was provided by the Woodrow W. Everett, Jr. SCEEE Development Fund in cooperation with the Southeastern Association of Electrical Engineering Department Heads and the National Science Foundation under Grant No. CNS-1919855. Any opinions, findings, and conclusions, or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the sponsoring agency.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
NCS | Networked Control System |
TDS | Time-Delay Switch |
DoS | Denial-of-Service |
FDI | False Data Injection |
NN | Neural Network |
LQR | Linear Quadratic Regulator |
LFC | Load Frequency Control |
HIL | Hardware-in-the-Loop |
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2021. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Networked control systems (NCSs) are designed to control and monitor large-scale and complex systems remotely. The communication connectivity in an NCS allows agents to quickly communicate with each other to respond to abrupt changes in the system quickly, thus reducing complexity and increasing efficiency. Despite all these advantages, NCSs are vulnerable to cyberattacks. Injecting cyberattacks, such as a time-delay switch (TDS) attack, into communication channels has the potential to make NCSs inefficient or even unstable. This paper presents a Lyapunov-based approach to detecting and estimating TDS attacks in real time. A secure control strategy is designed to mitigate the effects of TDS attacks in real time. The stability of the secure control system is investigated using the Lyapunov theory. The proposed TDS attack estimator’s performance and secure control strategy are evaluated in simulations and a hardware-in-the-loop environment.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer