Attack-resilient control for converter-based DC microgrids

2023-12-28 03:31SenTanJuanVasquezJosepGuerrero
Global Energy Interconnection 2023年6期

Sen Tan ,Juan C.Vasquez ,Josep M.Guerrero

1.Aalborg University,Fredrik Bajers Vej 7K,Aalborg,9220,Denmark

Abstract: In light of the growing integration of renewable energy sources in power systems,the adoption of DC microgrids has become increasingly popular,due to its simple structure,having no frequency,power factor concerns.However,the dependence of DC microgrids on cyber-networks also makes them susceptible to cyber-attacks.Potential cyberattacks can disrupt power system facilities and result in significant economic and loss of life.To address this concern,this paper presents an attack-resilient control strategy for microgrids to ensure voltage regulation and power sharing with stable operation under cyber-attack on the actuators.This paper first formulates the cyber-security problem considering a distributed generation based microgrid using the converter model,after which an attack-resilient control is proposed to eliminate the actuator attack impact on the system.Steady state analysis and root locus validation illustrate the feasibility of the proposed method.The effectiveness of the proposed control scheme is demonstrated through simulation results.

Keywords: Cyber-attacks;DC microgrids;Resilient control

0 Introduction

It becomes increasingly prominent to use DC microgrids (MGs)in the power system landscape,driven by the widespread adoption of renewable energy sources (RESs),energy storage systems (ESSs),and DC loads [1].Their significance is further amplified by advancements in information technology and control methods.DC microgrids offer inherent advantages such as scalability,reliability,and resiliency,making them a crucial component of modern power systems [2].

As microgrid systems become more prevalent,the increased connectivity and communication among distributed generation units,controllers,and sensors present a challenge in terms of cyber-security.The interconnections within the microgrid system make it susceptible to malicious cyber-attacks on communication links.This vulnerability to cyber-threats highlights the need for robust cybersecurity measures to ensure the integrity,confidentiality,and availability of the microgrid system and its components [3].

The control strategies implemented in microgrids heavily rely on accurate measurements obtained from sensors to effectively regulate voltage,control frequency,optimize power sharing,and manage economic dispatch [4].However,the integrity and reliability of these measurements can be compromised by malicious cyber-attacks.The controller’s capacity to guarantee the performance of the DC microgrid is compromised when the integrity of the sampled data is tampered with [5].As a result,the overall operational efficiency and reliability of the system are significantly impacted [6].Furthermore,a cyber-attack could potentially compromise the integrity of the microgrid system,enabling unauthorized access to manipulate controller commands.This can lead to system malfunctions,physical damage,and result in significant economic and social losses [7].Therefore,it is imperative to establish robust cybersecurity measures to protect microgrid systems from such cyber threats and ensure their reliable and secure operation [8].

1 State of the art

To address the cyber-security challenges in DC microgrids,the development of attack detection and resilience enhancement techniques has emerged as a key solution.These techniques aim to detect and mitigate cyber-attacks to ensure the reliable and secure operation of microgrids.Attack detection strategies can be categorized as cyber-layer detection and physical layer detection [9].

A common approach in the cyber layer is the use of data authentication or key-management techniques that rely on external information to characterize secure signals and identify potential malicious attacks [10].Various protocols or low-cost hardware can be employed to analyze the data and determine whether they exhibit the expected characteristics of secure signals.Any data that do not satisfy the relevant characteristics are considered suspicious and indicative of a possible attack.However,this approach has some limitations.The use of third-party detection methods introduces additional computational processing that can increase the complexity and overhead of the system.Furthermore,it may introduce latency during data communication,potentially affecting the real-time responsiveness of the MG system.These factors need to be carefully considered and balanced when implementing attack detection strategies in the cyber-layer of DC microgrids [11].

Cyber-attack detection in the physical layer of DC microgrids can be categorized into three primary methods:data-based detection,feature-based detection and modelbased detection [12-14].Despite notable advancements in cyber-attack detection within DC microgrids,it remains true that existing methods do not offer comprehensive countermeasures capable of effectively suppressing or eliminating the impact of such attacks.Detection alone is not sufficient to ensure the security and resilience of microgrid systems in the face of sophisticated cyber threats.Therefore,the development of effective countermeasures is crucial to mitigate the potential consequences of cyberattacks.

Three commonly employed methods are widely utilized to mitigate the impact of cyber-attacks on microgrid systems.First,a simple way to prevent the spread of cyberattacks into the system is to remove the connections to the corrupted units once an attack is detected [15-17].However,by disconnecting the affected units,the consensus control mechanism may be disrupted,which can result in a degradation of power sharing among the remaining units.To address the disruption caused by isolating compromised units,various attack mitigation methods have been developed,focusing on secure state estimation and attack estimation approaches using Kalman filter [18] or observer [19].These methods aim to reconstruct reliable signals to replace the untrustworthy ones transmitted through compromised communication links.

1.1 Objectives and contributions

Based on the above discussions,it can be summarized that the current prevalent methods to cope with cyberattacks are either by removing the attacked units or by state reconstruction to correct the tampered data.Moreover,it is also a significant approach to address cyber-attacks from a controller design perspective,which allows the development of a self-healing elimination strategy to maximize the resilience of the system without losing the physical connection among DC microgrids.

To ensure the continuous operation of microgrids in the presence of cyberattacks,the adoption of resilient control strategies has become increasingly important.Resilient control involves the use of adaptive controllers that are specifically designed to achieve various control objectives,such as consensus among distributed components and system stability [20,21].These adaptive controllers have the unique ability to dynamically adjust their parameters and behaviors in response to evolving cyber threats.For example,in [22],a novel approach is introduced,utilizing an adaptive controller and a distributed observer to maintain the tracking error within a boundary.Furthermore,ref [23] presents a strategy for distributed resilient control that involves the integration of a virtual microgrid model,enhancing the robust frequency synchronization within the microgrid.

Therefore,this paper introduces a new resilient control approach aimed at ensuring dependable control of DC microgrids in the face of actuator attacks.

1.2 Paper organization

The outline of the paper is as follows.In Section 2,the electrical model of a DC microgrid are described.In section 3,the proposed resilient control is constructed for DC microgrids,followed by the illustration of steady-state analysis.The simulation results are provided in Section 4,and the conclusions are presented in the final section.

2 DC Microgrid

2.1 Microgrid modelling

The microgrid considered in this paper is composed of multiple distributed generation units (DGU).Fig.1 illustrates the connection of each generation unit at the point of common coupling (PCC).A constant impedance load and constant current load is considered at each PCC bus.

Fig.1 Electrical scheme of an MG

The model of converterican be represented in Eq.(1):whereViis thei-th PCC bus voltage.For the grid forming converter,are the filter current and control input;represent the resistance and inductance of the converter.Cidenotes PCC bus capacitor.Moreover,Iijis the line current flowing between converteriandj;are the line resistance and inductance.βis the incidence matrix of DC MG graph,whose elementsβijshows the direction of the line currentIij.βij=1 orβij=-1 when the line current flows from or into MGi;otherwise,βij=0.

2.2 Resilient control problem

The attack on the microgrid will have a pronounced impact on the voltage and current tracking dynamics.According to [24],the consensus tracking errors with attacks on microgrid can be described as:

wheree(t)is the state errors,Lis Laplacian matrix;Gdenotes the secondary controller parameters;F(t)is the impact of attacks.It can be seen that the consensus can no longer be achieved in the existence of attacks.

3 Attack Resilient Control for DC Microgrid

To eliminate the impact of cyber-attacks on the performances of system,the attack resilient control is formulated in this section.

3.1 Resilient control

The resilient control protocols are proposed to enable voltage regulation and power sharing in the presence of actuator attacks shown as:

where,…,m4,idenote the controller coefficients;is the controller output that represents the voltage reference command;are the voltage and current reference.Fig.2 depicts the structure of the proposed control scheme.

Fig.2 Structure of proposed resilient controller

The dynamics of a cyber-physical DC microgrid under actuator attack can be described by combining the model (1)and the proposed controller (2)as:

3.2 Steady-state analysis

Given the MG (1),the equilibrium pointin (4)without actuator attacks can be described as by making state variables equal to zero:

whereIis unit matrix.

From (8)and (9),it is evident that the steady-state errors of the voltage and current state variables of the system are maintained at zero.This implies that the system can achieve voltage and current tracking performance at steady state regardless of the presence of actuator attacks.

3.3 Robustness against modeling errors

To assess the controller’s robustness in the face of parameter uncertainty,the pole locations of the system are analyzed with variations in the capacitance,resistance,and inductance parameters of the converters.The controller parameters remain unchanged throughout the analysis.The results,depicted in Fig.3,provide insights into the stability and performance of the system under parameter variations.

Fig.3 Pole locus of the system

Table 1 DC MG parameters

The stability analysis of the system with varying system parameters while keeping the controller coefficients constant reveals that the system remains stable.This observation highlights the robustness of the controller in the face of modeling uncertainties.

4 Performance Validation

Simulation tests were conducted to demonstrate the theoretical analysis and evaluate the performance of the proposed controller.The test model consists of four grid forming converters and four grid feeding converters with a meshed electrical topology,as depicted in Fig.4.The power ratio for the four grid feeding converters rated capacity isTable 1 provides the parameters for the microgrid (MG)and converters used in the simulation.The control parameters for the converters are determined as follows:

Fig.4 DC MG circuit scheme

4.1 Voltage/current tracking test under ramptype attacks

The study conducted in this case showcases the voltage and current tracking performance of the proposed controller and its resilience against ramp-type cyber-attacks.To demonstrate the advantages of the proposed controller,a comparison of results is performed across different control strategies.Fig.5 displays the voltage and current dynamics in the presence of ramp-type attacks.

Initially,the four DGUs are interconnected and functioning as a microgrid.At timeT1,the voltage reference values increase to 49 V,and at timeT2,the current reference values for DGU 1 and DGU 4 change from 4 A to 6 A,while for DGU 2 and DGU 3,the current reference values change from 6 A to 9 A.The figures demonstrate that the voltages and currents of the microgrid quickly converge to the new reference values after the changes were made.

Furthermore,ramp-type cyber-attacks were initiated atT3on grid forming converter 1 of DGU 1 and at timeT4on the grid feeding converter of DGU 3.Fig.5(a)demonstrates that the system achieved accurate voltage and current tracking at a steady state.In contrast,Fig.5(b)shows the dynamic responses of grid voltages and currents using conventional control methods,revealing oscillations and significant tracking errors at steady state.These results indicate the resilience of the proposed controller against attack signals,confirming its effectiveness in maintaining stable and accurate operation of the system.

4.2 Voltage/current tracking test under sine-type attacks

The study conducted in this case showcases the voltage and current tracking performance of the proposed controller and its resilience against sine-type cyber-attacks.Similarly,the simulation results are compared under different control strategies.Fig.6 shows the voltage and current dynamics in the presence of sine-type cyber-attacks.

Fig.5 Voltage and current dynamics under ramp-type attacks

As the same as the cases in previous study,the converters are interconnected in the beginning.AtT1,the voltage reference values are raised to 49 V,and atT2,the current reference values for DGU 1 and DGU 4 are adjusted from 4 A to 6 A,while for DGU 2 and DGU 3,the current reference values are changed from 6 A to 9 A.The obtained results show the rapid convergence of voltages and currents to the reference values.

AtT3,a sine-type cyber-attack was launched on the grid forming converter 1 of DGU 1,while at timeT4,a similar attack is carried out on the grid feeding converter of DGU 3.These attacks introduce gradually changing disturbances to the system,characterized by varying values.

The results presented in Fig.6(a)highlight the precise voltage and current tracking performance by the system at steady states.In contrast,Fig.6(b)depicts the dynamic responses of grid voltages and currents when conventional control methods were employed,revealing oscillations and tracking errors at steady state.Therefore,it is evidence to validate the robustness and effectiveness of the proposed controller in mitigating the impact of attack signals and ensuring stable and accurate operation of the system.

Fig.6 Voltage and current dynamics under sine-type attacks

5 Conclusion

In this research,the vulnerability of DC microgrid systems to cyber-attacks is addressed.To mitigate the impact of cyber-attacks and ensure reliable operation of the system,a resilient control scheme is proposed.A steadystate analysis confirms the effectiveness of the control method in achieving voltage control and power sharing in the presence of cyber-attacks.Moreover,the robustness against modeling uncertainties is also demonstrated.Simulation results validate the performance of the proposed resilient control scheme under various cyber-attack scenarios,highlighting its ability to ensure secure operation of DC microgrid systems.

Acknowledgements

This work was supported by VILLUM FONDEN,Denmark under the VILLUM Investigator Grant (No.25920):Center for Research on Microgrids (CROM).

Declaration of Competing Interest

The authors have no conflicts of interest to declare.

Appendix

MatricesAandBare expressed as