1. Introduction
In power systems, the distribution network voltage control (DN-VC) system is widely used in power transmission and distribution systems, industrial production systems, and transportation systems due to its ability to monitor and regulate voltage in real time and accurately [1,2,3]. The stable operation of these systems highly depends on the stability and security of the DN-VC system, which is crucial to ensuring the quality of the power supply. However, with the rapid development of smart grid technology, the distribution network voltage control system is facing increasingly severe challenges, especially network-security issues and network resource constraints, which have become key factors restricting the improvement of system performance and safe and stable operation [4,5,6].
To begin with, with the deep integration of power networks and information technology, the voltage control system of the distribution network has become a key target of network attacks [7,8]. Attackers use system vulnerabilities, security vulnerabilities, or improper communication protocols to launch malicious attacks against the control system and disrupt its normal operation. Common network attacks include the false data injection (FDI) attack and denial of service (DoS) attack [9]. Such network attacks may not only lead to serious consequences such as voltage fluctuations and power supply interruptions but also pose a threat to the stability and security of the entire power grid [10,11]. Therefore, how to ensure the network security of the system has become a key research focus. For example, ref. [12] proposed a deep learning-based locational detection architecture to detect the exact locations of FDI attacks in real time; ref. [13] proposed a stealthy sparse cyberattack model in an ac smart grid by considering both a residual test-based detector and an interval state estimation-based detector; and ref. [14] presented a distributed data-driven intrusion detection approach to reveal the existence of a sparse stealthy FDI attack in a multi-area interconnected power system. Through the above related studies, it is found that research on network attacks mainly focuses on attack detection and state estimation, and there are few studies on network attacks from the perspective of control.
To mitigate the impact of cyberattacks on DN-VC systems, we introduce the sliding mode control (SMC) strategy. By designing a sliding surface and guiding the system state to move along a predetermined sliding mode once it reaches this surface, SMC effectively suppresses the influence of external disturbances and parameter variations on the system. This has led to its widespread application in various fields, including power systems, robot control, and more [15,16].
At the same time, due to the continuous increase in the number of intelligent devices in the power system and the increasingly frequent data exchange, the amount of data in the power grid is growing explosively, which puts forward higher requirements for the data transmission capacity of the system. However, the limited network bandwidth and tight communication resources limit the data transmission speed, which will lead to the loss or delay of key data, thus affecting the accuracy and real-time performance of voltage control [17,18,19]. In order to solve the problem of limited communication resources, an even-triggered communication (ETC) scheme which only transmits measurement data according to control requirements is proposed, which has been widely held as a concern by the control field. ETC differs from traditional time-triggered communication by transmitting measurement data only when needed, effectively reducing communication frequency and saving resources [20,21]. Actuator attacks negatively impact system stability and performance, but the event-triggered scheme, as an effective communication strategy, maintains control performance while minimizing communication load. Thus, both are crucial for ensuring safe and stable system operation. ETC guarantees system efficiency, stability, and performance without compromising the integrity of critical data [22,23,24].
Inspired by the above work, this paper studies the communication and security collaborative design of a distribution network voltage control system. Firstly, we design an adaptive event-triggered scheme (AETS) to save communication resources, consider the network-induced delay, and establish an event-based voltage time-delay model. Then we use neural network (NN) technology to approach the attack signal and design a neural network sliding mode controller (NN-SMC) to restrain the impact of an actuator attack on the system, and we effectively eliminate the chattering phenomenon. The main contributions of this paper are summarized as follows:
An AETS is devised with the primary objective of optimizing communication resource utilization. By strategically setting and adjusting trigger thresholds, AETS effectively curtails redundant data transmissions. Distinguishing itself from the conventional static event-triggered schemes (ETS) outlined in [25,26], AETS exhibits a dynamic capability to adapt its triggering conditions in response to state variations, thereby minimizing unnecessary communication. During periods of system stability, AETS further reduces communication frequency, leading to enhanced savings in communication resources. This adaptability renders AETS a more versatile and practical solution.
The SMC method is introduced into a DN-VC system to suppress the effect of an actuator attack. Diverging from conventional SMC strategies [27] that rely on intricate control techniques to address chattering issues, this work presents an SMC law grounded in neural network (NN) technology. This approach not only ensures the attainability of the sliding mode but also effectively mitigates the chattering phenomenon, offering a more streamlined solution.
The remainder of this paper is organized as follows. In Section 2, a distribution network voltage deviation model under actuator attack is established, and an adaptive event-triggered transmission scheme is considered to describe the voltage amplitude deviation. Then the neural network technology is used to estimate the attack signal, and the sliding surface is designed. In Section 3, the main results of the stability analysis, control law design, and controller synthesis of the proposed security event-triggered sliding mode control scheme are given. In what follows, simulation examples are shown to verify the validity of the proposed secure method in Section 4. Finally, Section 5 draws the conclusions of this paper.
2. Problem Formulations
2.1. Voltage Control System under Actuator Attack
Figure 1 illustrates that actuator attacks on the DN-VC system induce voltage fluctuations. Leveraging the robustness of SMC, we devise an optimal sliding mode surface to promptly realign the system’s state and preserve voltage stability. Traditional time-triggered control mechanisms necessitate frequent sampling of voltage deviations across all nodes via the communication network, resulting in resource exhaustion and heightened communication loads. To mitigate this, we employ an AETS to curtail unnecessary communication. Consequently, this paper introduces an event-triggered secure neural network-based sliding mode approach tailored for DN-VC systems.
When the actuator (voltage regulator) of a DN-VC system is attacked by FDI, its control signal will be tampered with, resulting in voltage fluctuation. Suppose the distribution network consists of N nodes, each of which has a voltage deviation , and each node is equipped with a voltage regulator to regulate the voltage. Consider a dynamic system of voltage deviation under actuator attack
(1)
where is the state vector containing the voltage deviation of all nodes, that is, ; A is the system matrix, which describes the coupling relationship between voltages; B is the input matrix that describes the effect of the actuator on the voltage; is the actual input signal under FDI attacks; is the control input vector of the actuator; and is an arbitrary FDI by attackers. It is assumed that is controllable.For convenience, we abbreviate to , then the DN-VC system under malicious FDI attacks (1) is transformed into the form of
(2)
where A, B, , and are given in (1).
-
It is worth noting that because the neural network technology is used to design the sliding mode control law, we do not make any special assumptions about the attack signal .
-
In fact, currently known cyberattacks do not follow certain rules. However, most studies assume that the attack signal obeys a certain probability distribution or has an upper bound, so the research on network attack in this paper is more practical.
2.2. AETS Scheme and Time-Delays Model
In this subsection, the AETS and its design method are given, and considering network-induced delays, the established closed-loop system is transformed into a time-delay system. For analytical convenience, we assume the following conditions:
The sensor samples the data with a time-driven scheme, and the sampling data set is .
Whether the sampled data are sent depends on whether the event-triggered condition (see Formula (3)). The set of transmissions that are successfully sent out is .
The controllers and actuators generate their actions in zero-order-hold (ZOH) fashion.
Based on the above assumptions, we construct the following AETS [28]:
(3)
where and denote the current measured output and the last released one, respectively. is the last event triggering time, and is the next triggering time. is the event-triggered parameter, and is the corresponding weight matrix to be designed later.By introducing system state into the threshold of the event-triggered condition, the AETS can be dynamically adjusted according to the state of the voltage system. The AETS also has the following characteristics:
-
The expression of AETS avoids the denominator of the event-triggered threshold function being zero, thereby ensuring that the designed event-triggered function has mathematical significance.
-
By designing an appropriate σ, a better trade-off between control performance and communication efficiency can be achieved.
-
When the system state is unstable, will increase, resulting in a smaller event-triggered threshold and faster transmission frequency, enhancing the ability to control and regulate the system. Conversely, it can save network resources.
Considering the effect of the network-induced delay, suppose stands for the transmission delay, which is bounded, , where is a positive integer. Considering the transmission delay, trigger state will reach the controller at instants , where .
Similar to [29], we consider the following two cases.
Case A: If , define a function as
(4)
Obviously, .
Case B: If , consider and , where and . Since , there exists the integer d satisfying
Define
(5)
One can obtain that .
Define a function
(6)
Then, we can obtain
(7)
In Case A, define the vector . In Case B, define
(8)
Based on (7), it is easy to obtain
From AETS (3) and the definition of (8), when , the following condition holds:
(9)
Based on (6) and (9), (2) can be rewritten as follows:
(10)
for , here, K is the feedback controller’s gain, and is the network-induced delay with .2.3. Neural Network-Based Estimation of Attack Signal
In this subsection, in order to design a good sliding mode control law, we apply an NN technique to approach the attack signal as
(11)
where expresses a compact set, is an ideal constant weight matrix, r is the number of NN nodes, and denotes the NN approximation error in which . The basis function is(12)
which satisfies in which is a positive constant. can be represented as(13)
where and are the center and width of function , respectively, and .Therefore, the estimation of the deception attack signal is constructed as
(14)
where is the estimation of . Then, the adaptive law is designed as follows:(15)
where and are two constants, is an adjustment parameter, and .Generally, sliding mode controllers need to be designed based on the upper bound of the attack signal, which can cause chattering. In this paper, we use NN technology to estimate the attack signal and design a sliding mode controller based on the estimated value, which can effectively reduce the occurrence of chattering.
2.4. Design of Sliding Mode Surface
The key idea of the security control scheme in this paper is divided into two parts. First, an equivalent controller is designed to ensure that the nominal system is stable without attacks. Then, a switching controller is designed to suppress actuator attacks. So the secure sliding mode control structure is given by
(16)
where is the equivalent controller and is the switching controller.To design the controller, we firstly design a sliding mode surface as follows:
(17)
where is the sliding mode surface and is nonsingular.It is obvious that is the sliding gain that can be computed using the LQR method based on the proper selection of Q and R matrices [23]. In this paper, we choose , , and to be the solution of the Riccati equation: and .
When entering the ideal sliding mode, satisfies , that is,
(18)
From the above equation, the secure sliding mode controller is derived as
(19)
Under the AETS, the secure sliding mode controller can be rewritten as
(20)
Obviously, when , the voltage control system under the actuator attack (10) is rewritten as the nominal system as follows:
(21)
In order to obtain the main results of this paper, the following lemma is given.
(Discrete Jensen inequality) Given positive integers and meeting the requirements of , then for any constant matrix , the following inequality holds [22]:
(22)
3. Main Results
In this section, we provide the stability analysis, equivalent controller design, and sliding mode switching controller design for event-triggered sliding mode control systems.
3.1. Asymptotical Stability Analysis
Theorem 1 proves the stability of closed-loop DN-VC control system based on the event-triggered sliding mode control strategy under an actuator attack.
If there are some given positive scalars σ, , a matrix K and symmetric positive definite matrices , , , and Π with appropriate dimensions satisfying
(23)
where-
,
-
-
-
-
-
with
-
We choose the Lyapunov–Krasovskii functional as follows:
(24)
whereThen, calculating the differences of along the solution of sliding mode dynamics, one obtains
(25)
where , .(26)
(27)
Using the discrete Jensen inequality (22), there exists
(28)
By combining (25)–(28) and applying , the following relation is achieved:
(29)
where , is given in (23).Based on the above analysis, it can be concluded that if the LMI (23) holds, then system (21) is asymptotically stable, which means that the DN-VC system is stable under the actuator attack under the sliding mode control strategy. The proof is completed. □
It is worth noting that in Theorem 1, we can easily obtain the conditions that make the closed-loop system (21) asymptotically stable. However, the state feedback controller gain K is not obtained. Therefore, Theorem 2 synthesizes the state feedback controller gain through some matrix inequality operations.
Given positive scalars σ, , if there are symmetric positive definite matrices X, , , , , and Y with appropriate dimensions satisfying
(30)
where-
-
-
-
-
with
-
with
-
(31)
Define , , , , , and . Pre- and postmultiplying both sides of matrix inequality (23) with and using the fact that , we can arrive at the desired results. □
3.2. Design of Sliding Mode Switching Controller
Theorem 1 proved the stability of the closed-loop control system under actuator attacks triggered by events under the sliding mode control strategy. Theorem 2 gave the traditional feedback controller gain K. Therefore, Theorem 3 designs the switch controller to complete the design of the adaptive event-triggered sliding mode controller .
In order to ensure the stability of DN-VC system (2) subject to actuator attacks under AETS (3), the corresponding switching control law can be chosen as
(32)
where is a constant, is the estimated value of the attack signal , which is designed in (14), and κ is a given positive scalar.
Selecting the Lyapunov function as
(33)
(34)
This completes the proof. □
It is worth noting that when the state of the DN-VC system deviates from the sliding mode surface due to actuator attacks, the switch controller dynamically adjusts the control input according to the change in system state to maintain the stability and accuracy of the sliding mode motion. Even in the face of continuous impact from actuator attacks, the switch controller can maintain effective control of the system through its variable structure characteristics.
For a better understanding of the design of the switching controller and the derivation of (34), we give the following explanation:
-
The positive scalar κ in the switching controller is used to achieve the scaling in (34).
-
Since the constant ϕ in the switching controller is , therefore, , so in (34).
In fact, Theorem 1 proves the stability of the closed-loop DN-VC control system based on the event-triggered sliding mode control strategy under actuator attacks. Consequently, Theorem 2 subsequently presents the event-triggered feedback controller gain K, and Theorem 3 designs the sliding mode switching controller , completing the design of the comprehensive security controller . In summary, Theorems 1–3 first demonstrate the stability of the system under the proposed security control strategy and then proceed to design the security control strategy.
Consider the secure DN-VC system (2) subject to actuator attacks . The sliding mode secure event-triggered control scheme can be designed as
(35)
Theorem 2 obtains the event-triggered controller . Theorem 3 obtains the sliding mode switching controller . So the comprehensive security sliding mode controller (35) can be obtained by Theorems 1–3. □
At last, the following Algorithm 1 is presented to achieve a better understand of the technical line of the proposed security solution.
Algorithm 1 Technical line of the proposed security solution. |
|
4. Illustrative Examples
In this section, we give three examples to prove the availability of event-triggered sliding mode controllers in discrete-time systems. The simulation platform is constructed with Matlab (2023b), and all software programs are run on a PC with 2.40 GHz Intel(R) Core(TM) i5-9300H CPU , 8 GRAM and Windows 11 64-bit Ultimate.
Parameter and state matrix setups: As shown in Figure 2, we adopt a four-node voltage topological system model.
According to our defined state variable , where each represents the voltage deviation of a node and the input variable is the input of the voltage regulator. We set specific parameters for A and B matrices.
Let , . According to (30) and using the Matlab LMI toolbox, we can obtain
In addition, we set and R is a four-dimensional subdiagonal matrix, so we can calculate that .
Secure control design: Assume that the malicious FDI attack signal is selected as
(36)
Suppose that the NN consists of five nodes. Assuming the compact set is , in which the centers are uniformly distributed in and the widths are with . The initial value of . Set , . Then, we can obtain the update law of as
(37)
by defining .By defining and , we then obtain that
(38)
Based on the above calculations, the secure control
(39)
Finally, the sampling period is given by , and the total simulation time is set as .
Based on the above setups, we can obtain the following simulation results.
Results comparisons and analysis
In this subsection, the following three simulation results are compared in order to highlight the effectiveness of the proposed sliding mode control scheme. Part A shows the traditional control case with in an attack-free scenario. For comparison, Part B shows the malicious effects caused by actuator attacks without the sliding mode secure scheme. In order to show the effectiveness of the proposed secure control approach, Part C corrects the actuator attack signal with the designed SMC law .
Part A: Attack-free case under
In this case, we assume that no actuator attacks occurred and no additional auxiliary secure design is performed on the controller, which means the controller is only given by . The state response of the DN-VC system is shown in Figure 3, and the released intervals are shown in Figure 4.
It can be clearly seen from Figure 3 that when the actuator is not attacked, the voltage deviation value of the voltage control system will soon reach 0, which shows the effectiveness of the original controller . In addition, it can be seen from Figure 4 that the total number of packets transmitted is 51. This implies that the event-triggered transmission scheme is effective.
Part B: Actuator attacks under
When the actuator of the voltage system is injected with a malicious attack signal , the controller, without additional auxiliary design, still uses the traditional event-triggered controller to implement it, and the actuator will produce erroneous actions. This is evident from Figure 5, where system stability is compromised. Furthermore, Figure 6 reveals an increase in data transmission frequency compared to Figure 3. Notably, Figure 7 demonstrates the adaptive adjustment of the event-triggered threshold in response to system state changes. However, the control signal output by the controller, as depicted in Figure 8, indicates that the traditional event-triggered controller fails to maintain the desired stability performance of the control system.
Part C: Actuator attacks under
Finally, when there are actuator attacks on the DN-VC system, we use the proposed secure event-triggered sliding mode controller to verify the effectiveness of the method. Figure 9 shows that the voltage error of the system gradually approaches 0 under the action of the designed secure controller, indicating that the AETC sliding mode control strategy can achieve good stability. Figure 10 demonstrates the effectiveness of the event-triggered mechanism and, compared with Figure 6, it can be seen that the AETC can schedule communication resources in a more efficient manner. Figure 11 shows the change in the event trigger threshold. Figure 12 shows the approximation effect of NN technology on the attack signal.
Evidently, Part A underscores the capability of the feedback controller as formulated in Theorem 2 to ensure system stability when no attacks are present. The juxtaposition of Part B and Part C highlights the efficacy of the comprehensive security sliding mode control law derived from Theorem 3 in attenuating the detrimental effects of actuator attacks on the DN-VC system. Additionally, these three illustrative cases collectively emphasize the notable benefits of event-triggered approaches in conserving communication resources.
In order to validate the superiority of the adaptive event-triggered sliding mode control strategy proposed in this paper, we selected two attack signals, namely, Signal A and Signal B, for testing. and . The obtained results are presented in Figure 13 as follows: Figure 13a depicts the state of the voltage system under the attack of Signal A, with the yellow curve representing the attack signal; Figure 13b illustrates the state of the voltage system under the attack of Signal B, with the yellow curve indicating the corresponding attack signal. We can observe that under the influence of different attack signals, the security control strategy we proposed is able to promptly stabilize the voltage control system.
5. Conclusions
The secure control of distribution network voltage control systems under actuator attacks was studied. Firstly, a voltage deviation model under actuator attacks was established. Secondly, an adaptive event-triggered transmission scheme was proposed to conserve network communication resources more efficiently under limited bandwidth. Then, a sliding mode control strategy was devised to mitigate actuator attacks, and neural network technology was utilized to approximate the attack signals in order to reduce chattering phenomena. By leveraging the Lyapunov–Krasovskii method and solving a set of linear matrix inequalities, stability criteria and stabilization methods for the voltage control system were obtained. Finally, the effectiveness of the secure control method was validated through simulation examples.
However, the voltage control model presented in this paper does not take into account many complex factors in distribution networks, such as nonlinearity and unbalanced loads. As a result, our future research objective is to develop a comprehensive control strategy that considers a wider range of factors, including load forecasting, distributed energy resource scheduling, and so on.
The data presented in this study are available in this article.
The authors declare no conflicts of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
References
1. Murray, W.; Adonis, M.; Raji, A. Voltage control in future electrical distribution networks. Renew. Sustain. Energy Rev.; 2021; 146, 111100. [DOI: https://dx.doi.org/10.1016/j.rser.2021.111100]
2. Nandhini, E.; Sivaprakasam, A. A review of various control strategies based on space vector pulse width modulation for the voltage source inverter. IETE J. Res.; 2022; 68, pp. 3187-3201. [DOI: https://dx.doi.org/10.1080/03772063.2020.1754935]
3. Baleboina, G.M.; Mageshvaran, R. A survey on voltage stability indices for power system transmission and distribution systems. Front. Energy Res.; 2023; 11, 1159410. [DOI: https://dx.doi.org/10.3389/fenrg.2023.1159410]
4. Heidary, J.; Gheisarnejad, M.; Rastegar, H.; Khooban, M.H. Survey on microgrids frequency regulation: Modeling and control systems. Electr. Power Syst. Res.; 2022; 213, 108719. [DOI: https://dx.doi.org/10.1016/j.epsr.2022.108719]
5. Kim, S.J.; Park, K.J.; Lu, C. A survey on network security for cyber–physical systems: From threats to resilient design. IEEE Commun. Surv. Tutor.; 2022; 24, pp. 1534-1573. [DOI: https://dx.doi.org/10.1109/COMST.2022.3187531]
6. Aoufi, S.; Derhab, A.; Guerroumi, M. Survey of false data injection in smart power grid: Attacks, countermeasures and challenges. J. Inf. Secur. Appl.; 2020; 54, 102518. [DOI: https://dx.doi.org/10.1016/j.jisa.2020.102518]
7. Reda, H.T.; Anwar, A.; Mahmood, A. Comprehensive survey and taxonomies of false data injection attacks in smart grids: Attack models, targets, and impacts. Renew. Sustain. Energy Rev.; 2022; 163, 112423. [DOI: https://dx.doi.org/10.1016/j.rser.2022.112423]
8. Tufail, S.; Parvez, I.; Batool, S.; Sarwat, A. A survey on cybersecurity challenges, detection, and mitigation techniques for the smart grid. Energies; 2021; 14, 5894. [DOI: https://dx.doi.org/10.3390/en14185894]
9. Duo, W.; Zhou, M.; Abusorrah, A. A survey of cyber attacks on cyber physical systems: Recent advances and challenges. IEEE/CAA J. Autom. Sin.; 2022; 9, pp. 784-800. [DOI: https://dx.doi.org/10.1109/JAS.2022.105548]
10. Gunduz, M.Z.; Das, R. Cyber-security on smart grid: Threats and potential solutions. Comput. Netw.; 2020; 169, 107094. [DOI: https://dx.doi.org/10.1016/j.comnet.2019.107094]
11. Wu, Y.; Wei, D.; Feng, J. Network attacks detection methods based on deep learning techniques:A survey. Secur. Commun. Netw.; 2020; 2020, 8872923. [DOI: https://dx.doi.org/10.1155/2020/8872923]
12. Wang, S.; Bi, S.; Zhang, Y. Locational detection of the false data injection attack in a smart grid: A multilabel classification approach. IEEE Internet Things J.; 2020; 7, pp. 8218-8227. [DOI: https://dx.doi.org/10.1109/JIOT.2020.2983911]
13. Lu, K.; Wu, Z. Constrained-differential-evolution-based stealthy sparse cyber-attack and countermeasure in an AC smart grid. IEEE Trans. Ind. Inform.; 2021; 18, pp. 5275-5285. [DOI: https://dx.doi.org/10.1109/TII.2021.3129487]
14. Shi, J.; Liu, S.; Chen, B.; Yu, L. Distributed data-driven intrusion detection for sparse stealthy FDI attacks in smart grids. IEEE Trans. Circuits Syst. II Express Briefs; 2020; 68, pp. 993-997. [DOI: https://dx.doi.org/10.1109/TCSII.2020.3020139]
15. Ijaz, S.; Galea, M.; Hamayun, M.T.; Ijaz, H.; Javaid, U. A new output integral sliding mode fault-tolerant control and fault estimation scheme for uncertain systems. IEEE Trans. Autom. Sci. Eng.; 2023; early access [DOI: https://dx.doi.org/10.1109/TASE.2023.3293318]
16. Huang, S.; Xiong, L.; Zhou, Y.; Gao, F.; Jia, Q.; Li, X.; Li, X.; Wang, Z.; Khan, M.W. Distributed Predefined-Time Control for Power System with Time Delay and Input Saturation. IEEE Trans. Power Syst.; 2024; early access [DOI: https://dx.doi.org/10.1109/TPWRS.2024.3402233]
17. Reda, H.T.; Anwar, A.; Mahmood, A.; Chilamkurti, N. Data-driven approach for state prediction and detection of false data injection attacks in smart grid. J. Mod. Power Syst. Clean Energy; 2022; 11, pp. 455-467. [DOI: https://dx.doi.org/10.35833/MPCE.2020.000827]
18. Kang, W.; Chen, M.; Guan, Y.; Tang, L.; Guerrero, J.M. Distributed event-triggered optimal control method for heterogeneous energy storage systems in smart grid. IEEE Trans. Sustain. Energy; 2022; 13, pp. 1944-1956. [DOI: https://dx.doi.org/10.1109/TSTE.2022.3176741]
19. Ge, P.; Chen, B.; Teng, F. Event-triggered distributed model predictive control for resilient voltage control of an islanded microgrid. Int. J. Robust Nonlinear Control; 2021; 31, pp. 1979-2000. [DOI: https://dx.doi.org/10.1002/rnc.5238]
20. Ding, S.; Xie, X.; Liu, Y. Event-triggered static/dynamic feedback control for discrete-time linear systems. Inf. Sci.; 2020; 524, pp. 33-45. [DOI: https://dx.doi.org/10.1016/j.ins.2020.03.044]
21. Behera, A.K.; Bandyopadhyay, B.; Cucuzzella, M.; Ferrara, A. A survey on event-triggered sliding mode control. IEEE J. Emerg. Sel. Top. Ind. Electron.; 2021; 2, pp. 206-217. [DOI: https://dx.doi.org/10.1109/JESTIE.2021.3087938]
22. Ge, X.; Han, Q.; Ding, L.; Wang, Y. Dynamic event-triggered distributed coordination control and its applications: A survey of trends and techniques. IEEE Trans. Syst. Man Cybern. Syst.; 2020; 50, pp. 3112-3125. [DOI: https://dx.doi.org/10.1109/TSMC.2020.3010825]
23. Wang, X.; Sun, J.; Wang, G.; Allgöwer, F.; Chen, J. Data-driven control of distributed event-triggered network systems. IEEE/CAA J. Autom. Sin.; 2023; 10, pp. 351-364. [DOI: https://dx.doi.org/10.1109/JAS.2023.123225]
24. Wu, J.; Peng, C.; Yang, H.; Wang, Y. Recent advances in event-triggered security control of networked systems: A survey. Int. J. Syst. Sci.; 2022; 53, pp. 2624-2643. [DOI: https://dx.doi.org/10.1080/00207721.2022.2053893]
25. Li, M.; Long, Y.; Li, T.; Chen, C. Consensus of linear multi-agent systems by distributed event-triggered strategy with designable minimum inter-event time. Inf. Sci.; 2022; 609, pp. 644-659. [DOI: https://dx.doi.org/10.1016/j.ins.2022.07.107]
26. Inomoto, R.S.; de Almeida Monteiro, J.B.; Sguarezi Filho, A. Boost converter control of PV system using sliding mode control with integrative sliding surface. IEEE J. Emerg. Sel. Top. Power Electron.; 2022; 10, pp. 5522-5530. [DOI: https://dx.doi.org/10.1109/JESTPE.2022.3158247]
27. Zhang, Y.; Zhan, M.; Shi, Y.; Liu, C. Event-based finite-time boundedness of discrete-time network systems. Int. J. Control. Autom. Syst.; 2020; 18, pp. 2562-2571. [DOI: https://dx.doi.org/10.1007/s12555-019-0934-3]
28. Sun, H.; Huang, J.; Chen, Z.; Wang, Z. State-sensitive event-triggered path following control of autonomous ground vehicles. Intell. Robot.; 2023; 3, pp. 257-273. [DOI: https://dx.doi.org/10.20517/ir.2023.17]
29. Sun, N.; Niu, Y.; Chen, B. Optimal integral sliding mode control for a class of uncertain discrete-time systems. Optim. Control Appl. Methods; 2014; 35, pp. 468-478. [DOI: https://dx.doi.org/10.1002/oca.2082]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2024 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
This paper studies an adaptive event-triggered sliding mode control (AET-SMC) strategy for a distribution network voltage control (DN-VC) system subject to actuator attacks. In the network environment, a distribution network voltage deviation model under actuator attack is established. In order to save network resources in the DN-VC system, an adaptive event-triggered scheme (AETS) is designed. Considering the network-induced delay, the closed-loop system is transformed into an event-based delay system. Considering the network attack, the sliding mode control (SMC) method is used to offset the influence of the actuator attack. In order to eliminate the buffeting phenomenon, neural network (NN) technology is used to estimate the attack signal and obtain the sliding mode controller with better performance. The stability and stabilization criteria of the DN-VC system are obtained by using the Lyapunov–Krasovskii method and a linear inequality operation. Finally, numerical examples are used to verify the effectiveness of the method.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer