1. Introduction
With the penetration of many renewable energy resources, uncertainty and low inertia of converter based renewable energy sources (RESs) bring new challenges for frequency stabilization problem of multi-area power system [1,2]. Since the traditional load frequency control method loses its efficiency, virtual synchronous generation (VSG) concept has been proposed to imitate the behavior of synchronous generators to compensate inertia and enhance frequency stability of power system [3,4]. On the other hand, to increase the efficiency of monitoring and control, network communication techniques have been widely employed to evolve large scale power system to be networked control system. However, the increasing network attacks on power system have brought serious blackout events [5,6]. Researchers have paid much attention to the security problem of networked power system [7,8,9]. As studied, the availability and integrity of information are very essential for the system state estimation and feedback control. However, malicious cyber attacks obstructing information availability and integrity have been launched through DoS attacks and false data injection attacks [10,11]. DoS attacks interrupt communication links among system various components, leading to the missing of transmission packets in times [12], even driving system operation out of stable region. False data injection attacks inject illegal error data into communication network to pollute measurements and demands [13]. In other words, the damage on availability and integrity of information caused by network attack leads to the performance degradation of networked power system [14,15,16,17]. Thus, it is urgent to study secure control scheme to keep frequency performance resilience against DoS attacks or false data injection attacks.
1.1. Related Work
Recently, many interesting works have researched secure control problem of networked system under DoS attacks. On the one hand, for continuous-time system, a communication regulation strategy has been presented to obtain input-to-state stability (ISS) under DoS attacks modeled by average dwell time concept [18]. However, this study, based on the Lyapunov function method, cannot provide the design method of resilient control gain. By using LKF method, a resilient event-triggered mechanism and PI based control scheme were jointly designed for LFC system under DoS attacks modeled by maximum number of successive packet loss [19]. Compared with average dwell time (ADT) model [18], the attack characteristics studied in [19] have not been fully explored. For periodic DoS jamming attacks, a resilient synthesis method of event-based feedback control has been presented; a joint design method to solve parameters of event trigger and controller has been proposed by employing piecewise Lyapunov–Krasovskii functional method and switched system method [20,21]. Further, motivated by the above method, delay bound based attack detection and resilient LFC scheme have been proposed for multi-area power system under ADT model based DoS attacks [22]. On the other hand, for discrete-time stochastic system, the event-based security control problem has been studied by using stochastic analysis method to achieve mean-square security under random DoS attacks [23]. To defend against the DoS attack, a compensation mechanism cooperating with attack detection has been proposed to preserve system stochastically stable [24]. Besides, stability analysis and resilient control design under DoS attacks modeled by Markov process has been investigated using Lyapunov theory [25]. For discrete-time deterministic system, the maximum tolerable number of DoS attacks has been obtained by using Lyapunov functional method [26]. However, this paper is only concerned with the duration of DoS attack but neglects the attack frequency. It is well known that high attack frequency would also cause system instability.
1.2. Our Contributions
To the best of our knowledge, secure control design for discrete-time deterministic power system under DoS attacks has never been considered. Thus, to fill this research gap, our published work studies resilient event triggered control of uncertain discrete-time system under DoS attacks [27]. In this paper, we apply the earlier work [27] to the design of resilient LFC-VSG scheme of multi-area power system under DoS attacks. First, a discrete-time power system model is established with nonlinear dynamic governor dead band (GDB), low inertia, and parameter uncertainty under RESs disturbances. The combined control scheme consisting of load frequency control and virtual synchronous generation (LFC-VSG) is adopted and formulated as static feedback control law. Second, a DoS attack model is represented by an average dwell time (ADT) model to constrain the attack frequency and duration. Considered the mixed communication influence of DoS attacks, time delay, and event-triggered mechanism, a discrete-time switched delay system is established to describe the dynamic of power system and a weightedH∞control problem is formulated for the frequency control of the considered power system. Piecewise Lyapunov–Krasovskii functional method and switched system method are employed to analyze the weightedH∞performance. A criterion about the tolerable delay bound and attack frequency and duration is obtained. Then, a co-design method for event triggered mechanism and resilient control gain is presented based on linear matrix inequalities techniques. In this paper, the main contributions can be summarized as followings:
(1) Compared with our early work [27] considering resilient LFC design of discrete-time power system as a simulation example, this paper proposes a design method for resilient LFC-VSG scheme of discrete-time power system with more situations including GDB, low inertia, and uncertainty.
(2) A discrete-time switched delay system model is established to describe the frequency dynamic of multi-area power system with LFC-VSG scheme under DoS attacks. (3) A new criterion of tolerable delay and DoS attacks in discrete-time form is derived, which is different from the one in continuous-time form.
(4) A co-design method for event-based LFC-VSG scheme is presented by employing piecewise Lyapunov–Krasovskii functional method and average dwell time approach to achieve weightedH∞performance.
2. Problem Statement 2.1. Discrete-Time Model of Multi-Area Power System with GDB and Uncertainty under LFC-VSG Scheme
To illustrate interconnected multi-area power system with the uniform structure, Figure 1 shows the diagram of the ith area power system with RESs disturbances under LFC-VSG scheme [28] as shown in Figure 2. With Table 1, the system dynamic of the ith area power system is represented by
Δf˙i=1Mi−DiΔfi+ΔPmi+ΔPWi+ΔPSi+ΔPinertia,i−ΔPtie,i−ΔPdi,ΔP˙mi=1Tchi−ΔPmi+ΔPvi,ΔP˙vi=1Tgi−1RiΔfi−ΔPvi−KIi∫ACEi,ΔP˙Wi=1TWTi−ΔPWi+ΔPwind,i,ΔP˙Si=1TPVi−ΔPSi+ΔPsolar,i,ΔP˙ref,i=−1TrΔPref,i+Mvi K2iACEi+Mvi K1iΔf˙i+Dvi K2i∫ACEi+Dvi K1iΔfi,ΔP˙inertia,i=1TINi−ΔPinertia,i+ΔPref,i,ΔP˙tie,i=∑j=1,j≠in2πTijΔfi−Δfj,ACEi=βiΔfi+ΔPtie,i,
Governor dead band (GDB) [29]: The governor dead-band nonlinearity leads to sustained sinusoidal oscillation of natural period of aboutT0=2s, namelyasin(2πf0t). By Fourier transformation with neglecting higher order term, the transfer function of governor with nonlinearity is represented by
0.8−0.2/πs1+sTgi.
Speed Droop Coefficient Uncertainty [30]: The parameter uncertainty of power system referring to the speed droop coefficientRiis considered here. The uncertainty of speed droop coefficient is represented by(1+ϵ(t))Ri, where0≤ϵ(t)≤1.
Then, the ith area power system can be formed by a continuous-time system model
x˙i(t)=(Aiic+ΔAiic)xi(t)+∑j=1,j≠inAijc xj(t)+Bic ui(t)+Fic wi,yi(t)=Ci xi(t)+Li wi,zi(t)=Ei xi(t),
where
xi(t)=colΔfiΔPmiΔPviΔPWiΔPSiΔPref,iΔPinertia,iΔPtie,i∫ACEi,yi(t)=col−0.2πACEi+0.8∫ACEiMviΔf˙i+DviΔfiMviACEi+Dvi∫ACEi,zi(t)=colACEi∫ACEi,wi(t)=colΔPdiΔPwind,iΔPsolar,i,
Aiic=−DiMi1Mi01Mi1Mi01Mi−1Mi00−1Tchi1Tchi000000Δ1Δ2−1TgiΔ2Δ20Δ2−Δ20000−1TWTi000000000−1TPVi000000000−1Tr000000001TINi−1TINi00Δ300000000βi00000010,Δ1=−0.8−0.2DiπMiRi Tgi,Δ2=0.2πTgi Ri Mi,Δ3=∑j=1,j≠in2πTij,Aijc=09×9,Aijc(8,1)=−2πTij,ΔAiic=09×9,ΔAiic(3,:)=−ϵ(t)1+ϵ(t)Δ1Δ20Δ2Δ20Δ2−Δ20,Bic=00−1Tgi00000000000−1Tr000T,Fic=−1Mi0−0.2πTgi Ri Mi0000000001TWTi0000000001TPVi0000T,Ci=−0.2βiπ000000−0.2π0.8Δ4Mvi Mi0Mvi MiMvi Mi0Mvi Mi−MviMi0βi Mvi000000MviDvi,Δ4=−Mvi DiMi+Dvi,Li=000−MviMi00000,Ei=βi00000010000000001.
Combining load frequency control (LFC) scheme and virtual synchronous generation (VSG) scheme (Figure 2), a static output feedback control law is adopted for the ith area power system
ui(t)=Ki yi(t),
whereKi=KIi000K1iK2i.
The ith area power system can be represented by a discrete-time system model
xi(k+1)=(Aii+ΔAii)xi(k)+∑j=1,j≠inAij xj(k)+Bi ui(k)+Fi wi,yi(k)=Ci xi(k)+Li wi,zi(k)=Ei xi(k),
whereAii=eAiich,ΔAii=hΔAiic,Bi=∫0h eAiic(h−s) Bicds,Aij=∫0h eAiic(h−s) Aijcds,Fi=∫0h eAiic(h−s) Ficds.
Based on the ith area power system model in Equation (4), a linear discrete-time model is established for a n-area power system with parameter uncertainty.
x(k+1)=(A+ΔA)x(k)+Bu(k)+Fw,y(k)=Cx(k)+Lw,z(k)=Ex(k),
where
x(k)=colx1(k)x2(k)…xn(k),y(k)=coly1(k)y2(k)…yn(k),z(k)=colz1(k)z2(k)…zn(k),u(k)=colu1(k)u2(k)…un(k),w=colw1w2…wn,A=A11A12…A1nA21A22…A2n⋮⋮⋱⋮An1An2…Ann,ΔA=diagΔA11ΔA22⋯ΔAnn,B=diagB1B2⋯Bn,F=diagF1F2⋯Fn,C=diagC1C2⋯Cn,L=diagL1L2⋯Ln,E=diagE1E2⋯En.
The argument form of control law can be rewritten as
u(k)=Ky(k),
whereK=diagK1K2…Kn.
2.2. Discrete-Time Power System under DoS Attacks and Event-Triggered Mechanism
DoS attacks launch in feedback channel to prevent measurementsy(k)arriving at control center. Here, a class of aperiodic DoS attacks is considered. Define sleep intervalsI1,n=[gn,gn+bn]and attack intervalsI2,n=[gn+bn,gn+1]. Then, DoS attacks can be represented by a switched signal.
s(k)=0,k∈[gn,gn+bn],1,k∈[gn+bn,gn+1],
where the on/off instantgn,n∈Nrepresents the(n−1)th ending time of DoS attacks withg0=0, while the off/on instantgn+bn∈Nrepresents the nth beginning time of DoS attacks.
Denote the sum number of off/on instants as attack frequencyN(k,k0)during[k0,k]and attack durationΞ(k,k0)during[k0,k]. Then, the upper bound of attack frequency and duration is constrained by
N(k,k0)≤κ+k−k0τD,Ξ(k,k0)≤η+k−k0Tα.
whereκ∈R≥0,τD∈R>0andη∈R≥0,Tα∈R>1.
During sleep intervalsI1,n, the feedback channel recovers normal communication. Besides of network induced delay, the processing of the composite feedback signaly(k)consisting ofΔf,Δ˙f,ACE, and∫ACEwould increase the computation load and waste much time to influence the real time control. To reduce the computation and communication load, event triggered mechanism is embedded in PMU nodes, which decides whether to send the measurementsy(k).
kn,m+1={kn,m+min{l|f(l)>0}}⋃{gn},k∈[gn,gn+bn],⌀,k∈[gn+bn,gn+1],
wheref(l)=[y(kn,m)−y(kn,m+l)]T Ωc[y(kn,m)−y(kn,m+l)]−σyT(kn,m+l)Ωcy(kn,m+l)withl∈N,σ>0andΩc=diag[Ωc1,Ωc2,⋯,Ωcn]>0. Note that, for discrete-time system, the minimum triggered interval is sample periodic h so that it avoids Zeno behavior.
Introduce the transmission delayd(kn,m)for the triggered signaly(kn,m), where0≤d(kn,m)≤dM,d(gn)≡0. Further, the sleep interval can be divided by
I1,n=⋃m=0m(n)−1Φn,m
where the triggered intervalΦn,mis specified by
Φn,m=[kn,m+d(kn,m),kn,m+1+d(kn,m+1)],m=0,1,2,…m(n)−1,
withkn,0+d(kn,0)=gnandkn,m(n)+d(kn,m(n))=gn+bn.
Further, the triggered interval can be divided by
Φn,m=⋃l=0l(m)−1Ξm,l.
Case I: ifkn,m+dM+1≥kn,m+1+d(kn,m+1),l(m)=1. letd(k)=k−kn,mwhich satisfiesd(kn,m)≤d(k)≤dM. Case II: ifkn,m+dM+1<kn,m+1+d(kn,m+1), there existsl(m)≥2satisfyingkn,m+dM+l(m)−1=kn,m+1+d(kn,m+1)−1. Hence, the inner intervalΞm,lis specified by
Ξm,l=[kn,m+d(kn,m),kn,m+dM+1],l=0,[kn,m+dM+l,kn,m+dM+l+1],l=1…,l(m)−2[kn,m+dM+l(m)−1,kn,m+1+dn,m+1],l=l(m)−1.
Then, introduce a virtual delayd(k)
d(k)=k−kn,m,k∈Ξm,0k−kn,m−l,k∈Ξm,l,l=1,2,…,l(m)−1.
which satisfiesd(kn,m)≤d(k)≤dM.
Further, we introduce trigger error
e(k)=0,k∈Ξm,0x(kn,m)−x(kn,m+l),k∈Ξm,l,l=1,2,…,l(m)−1.
Thus, the resilient triggering control inputs are generated by
u(k)=Ky(kn,m),k∈Ξm,l⋂Φn,m⋂I1,n,0,t∈I2,n.
On the basis of above analysis, a discrete-time switched delay system∑s(t)is established as
∑1:x(k+1)=(A+ΔA)x(k)+BKCx(k−d(k))+BKCe(k)+Fw,y(k)=Cx(k)+Lw,z(k)=Ex(k),k∈Ξm,l⋂Φn,m⋂I1,n,∑0:x(k+1)=(A+ΔA)x(k)+Fw,z(k)=Ex(k),k∈I2,n.
and, according to Equation (9), by denotingΩ=CT ΩcC, the trigger condition is rewritten as
eT(k)Ωe(k)≤σxT(k−d(k))Ωx(k−d(k)).
For the established power system in Equation (11), the research objective of this study is to analyze the resilience performance and provide the design method for the resilient static feedback control in Equation (10) to preserve weightedH∞performance:
(1) The power system in Equation (11) is exponentially stable whenw=0.
(2) With zero initial condition, the power system in Equation (11) has weightedL2-gainγsuch that
∑s=0∞μ−sν∥z(s)∥≤γ2∑s=0∞∥w∥
where the scalarss∈N,μ>0,ν>0andγ>0.
3. Analysis of WeightedH∞Performance
In this section, the weightedH∞ performance of the power system in Equation (11) is analyzed by combining delay system method and switched system method.
Theorem 1.
Given positive scalarsdM,λi,μi(i=0,1) , γ, σ, the switched time delay system in Equation (11) is exponentially stable with weightedL2-gainγ¯under DoS attacks (τD,Tα), if there exist positive definite matricesPi,Qi,Ri,Mi(i=0,1) , Ω and appropriate dimension matricesXi,Yi(i=0,1),K satisfying
ln(μ0 μ1)+(dM−1)ln(λ0/λ1)τD+(Tα−1)lnλ1+lnλ0Tα<0,
Σ1+Γ1T P1 Γ1+dM Γ2T R1 Γ2+Γ3T+Γ3+dM M1<0,
M1X1X1Tλ1dM R1≥0,M1Y1Y1Tλ1dM R1≥0,
Σ0+Ψ1T P0 Ψ1+dM Ψ2T R0 Ψ2+Ψ3T+Ψ3+dM M0<0,
M0X0X0Tλ0 R0≥0,M0Y0Y0Tλ0 R0≥0,
P0≤μ1 P1,Q0≤μ1 Q1,R0≤μ1 R1,P1≤μ0 P0,Q1≤μ0 Q0,R1≤μ0 R0,
where
Σ1=−λ1 P1+Q1+ETE0000∗σΩ000∗∗−λ1dM Q100∗∗∗−Ω0∗∗∗∗−γ2I,Σ0=−λ0 P0+Q0+ETE000∗000∗∗−λ0dM Q00∗∗∗−γ2I,Γ1=ABKC0BKCF,Γ2=A−IBKC0BKCF,Γ3=X1Y1−X1−Y100,Ψ1=A00F,Ψ2=A−I00F,Ψ3=X0Y0−X0−Y00.
Proof.
Please see Appendix A.1 in the Appendix A. □
Remark 1.
The resulting criterion in Equation (14) is the main contribution of this paper. The comprehensive influence of DoS attacks and time delay is bounded by the indicesdM,τD, andTα. The satisfaction of this criterion can guarantee the frequency stability of the considered multi-area power system. Considering the positive termln(μ0 μ1),ln(λ0/λ1)and the negative termln(λ1), it requires a smalldMand largeτDandTa. It is reasonable that the frequency stability of power system can be preserved with small delay margin, low attack frequency1/τD, and small attack duration ratio1/Tα.
4. Design of Resilient Triggering Control According to the resulting sufficient conditions in Theorem 1, this section provides a design method of resilient event-based LFC-VSG scheme on the basis of linear matrix inequalities techniques (LMIs).
Lemma 1
([31]).For real matricesΣ,Σ0,andΣ1, it holds that
Σ+Σ0Λ(k)Σ1+Σ1T ΛT(k)Σ0T<0,
for anyΛ(t)satisfyingΛT(t)Λ(t)≤I, if and only if there exists a positive scalarε>0, such that
Σ+ε−1 Σ0 Σ0T+εΣ1T Σ1<0.
Theorem 2.
Given positive scalars ε,dM, δ, γ, ζ,λ1∈(0,1),λ0∈[1,+∞),μ1∈[1,+∞),andμ0∈[1,+∞),σ∈(0,1) , the switched time delay system in Equation (11) is exponentially stable with weightedL2-gainγ¯ , if Equation (14) holds and there exist positive definite matricesP˜i,Q˜i,R˜i,M˜i(i=0,1) , Ω and appropriate dimension matricesX˜i,Y˜i(i=0,1),K˜ satisfying
Σ˜11+sym(Γ˜3)+dM M˜1∗∗∗∗Γ˜1−P˜1+εGGT∗∗∗dMΓ˜2εdMGGT−R˜1+εdMGGT∗∗Γ˜400−I∗Γ˜5000−εI<0
Σ˜01+sym(Ψ˜3)+dM M˜0∗∗∗∗Ψ˜1−P˜0+εGGT∗∗∗dMΨ˜2εdMGGT−R˜0+εdMGGT∗∗Ψ˜400−I∗Ψ˜5000−εI<0
M˜1X˜1∗λ1dM (2P˜1−R˜1)>0,M˜1Y˜1∗λ1dM (2P˜1−R˜1)>0
M˜0X˜0∗λ0(2P˜0−R˜0)>0,M˜0Y˜0∗λ0(2P˜0−R˜0)>0
−μi P˜iP˜i∗−P˜j<0,−μi Q˜iP˜i∗δ2 Q˜j−2δP˜j<0,μi(R˜i−2P˜i)P˜i∗−R˜j<0,(i,j=0,1;i≠j)
−ζI∗CP˜1−NC−I<0,ζ→0.
where
Σ˜11=diag[−λ1 P˜1+Q˜1,σΩ˜,−λ1dM Q˜1,−Ω˜,−γ2I],Γ˜1=[AP˜1,BK˜C,0,BK˜C,F],Γ˜2=[AP˜1−P˜1,BK˜C,0,BK˜C,F],Γ˜3=[X˜1,Y˜1−X˜1,−Y˜1,0,0],Γ˜4=[EP˜1,0,0,0,0],Γ˜5=[JP˜1,0,0,0,0],Σ˜01=diag[−λ0 P˜0+Q˜0,0,−λ0dM Q˜0,−γ2I],Ψ˜1=[AP˜0,0,0,F],Ψ˜2=[AP˜0−P˜0,0,0,F],Ψ˜3=[X˜0,Y˜0−X˜0,−Y˜0,0],Ψ˜4=[EP˜0,0,0,0],Ψ˜5=[JP˜0,0,0,0].
Then, both the control gainK=K˜N−1and the trigger parameterΩ=P˜1−1Ω˜P˜1−1can be obtained from the solutions of the above LMIs.
Proof.
Please see Appendix A.2 in the Appendix A. □
Remark 2.
Theorem 2 relies nonlinearly on the parameters ε,dM,λi,μi,(i=0,1) γ, ζ, σ, and δ. Once these parameters are given, the matrix inequalities in Equations (20)–(25) would become LMIs, by solving which LFC-VSG gain K and trigger parameter Ω can be further obtained by using MATLAB Toolbox YALMIP with solver MOSEK. Furthermore, the proposed design method allows for a trade-off: performance indexγ,λiversus delay margindMand DoS attacksτD,Tα .
5. Simulation
To study the performance of the proposed event-based LFC-VSG scheme, a two-area power system with physical constraints (uncertainty, low inertia and GDB) and cyber disturbance (time delay and DoS attacks) was simulated using MATLAB. The nominal available parameters of the considered two-area power system were borrowed from [4,28], as listed in Table 2. The thermal power plants with various capacities in each area are equivalent to a single synchronous generator. The time constants of the disturbances terms of solar plant and farm plant for two-area power system are simply assumed to be same due to the used uniform inverters in engineering. From another aspect, the disturbance of RESs is not the key factor affecting the stability of power system in this study. The parameters of virtual synchronous generations selected by PSO algorithm [28] are larger than the inertia and damping coefficients of the equivalent SG to enhance system inertia.
Seth=0.01s,γ=120,dM=10,λ0=1.2,λ1=0.4,μ0=1.01,μ1=1.01,σ=0.1,δ=0.01,ε=10−12,andζ=10−6. The inertia of power system reduces5%. According to Theorem 2, the control gain K and the trigger parametersΩc=(C+)TΩC+were obtained using MATLAB Toolbox YALMIP with solver MOSEK.
K1=−3.488300024.2314196.0050,K2=−0.53700008.559324.4976,Ωc1=10302.11890.0216−0.16180.02160.0005−0.0017−0.1618−0.00170.0126,Ωc2=10301.57810.0187−0.11990.01870.0008−0.0014−0.1199−0.00140.0093.
With the solved triggered control parameters, the frequency derivationΔfand the tie-line power exchangeΔPtie of the two-area power system in Equation (5) are depicted in Figure 3 and Figure 4, where the time intervals with grey background represent DoS attacks. Multi-disturbances such as load change, wind farm disturbance and solar farm disturbance are depicted in Figure 5 and Figure 6. It can be observed that the trajectories of frequency derivation and tie-line power exchange approach to zeros after oscillation. By calculation, the decay rate isλ=0.6819, which verifies the achievement of exponential stability under our method. The oscillation in the time interval[0,10s]is more serious than that in the time interval[40s,50s]even though the former disturbances is less than the latter because DoS attacks frequently occur in the beginning time interval[0,10s]to prevent the implementation of LFC-VSG control signals while the sleep interval[40s,45s]guarantees power system restoring much resilient performance against DoS attack in the time interval[45s,50s]. Thus, it is necessary to constrain attack frequency, which verifies the reasonableness of our research motivation. On the other hand, the theory value ofH∞performance level isγ¯=159.8680. By calculation, the actualH∞performance level‖y‖/‖w‖isγ∗=2.0966, which is less thanγ¯=159.8680. Thus, the power system is exponentially stable with the desiredH∞performance level, which verifies the efficiency of our design method.
The triggered instants and triggered intervals are depicted in Figure 7. The event-triggered mechanism is operated during sleep intervals while it stops working to save much energy during attack intervals. It can be observed that the average of release time intervals during[0,30s]is larger than that during[70s,100s]because the power system with the worse system performance requires many real-time control updates while power system operation in steady state needs low frequency of control update. Thus, the designed ETM can provide an automatic regulation of communication according to the operation state of power system. Compared with the sample timeh=0.01s, the transmission rateTrateduring sleep intervals was calculated as7.11%, which is efficient to reduce the communication load while preserving system performance.
In the next simulation, the influence of communication factors including delay and DoS attacks on power system resilient performance was studied. According to the resilient condition in Equation (14) in Theorem 1, the quantified results show the relationships among exponential decay rateλ, weightH∞levelγ¯, DoS attacks parametersTαandτD, and delay bounddM. Note that1Tαrepresents the total duty cycle of attack duration while1τDrepresents attack frequency. For fixedτD, other parameters being same as before, theH∞performance indicesλandγ¯are decreased with the increasing ofTα , as shown in Table 3. It indicates that theH∞performance of power system would be seriously deteriorated with the large attack duration1Tα . In Table 4, for fixedTα, theH∞performance levelλandγ¯are increased with the decrease ofτD. It indicates that the high attack frequency1τDwould brings damage on the frequency performance of power system. The resulting conclusions are reasonable to meet common sense. On the other hand, although both attack frequency and duration could lead to the performance deterioration of power system, the influence of attack duration is more serious than attack frequency.
Transmission delay and DoS attacks would bring comprehensive influence on frequency stability of power system. Hence, it is interesting to study the relationship of delay bound and DoS attacks duration. For a given average dwell timeτD=333, the attack duration ratio1Tαis decreased with the increase ofdM in Table 5. It indicates that the influence of delay and DoS attacks are additive because, when there is a large communication delay, the power system would only tolerate weak DoS attacks to preserve the desired performance.
Remark 3.Indeed, the numerical evaluation can verify the usefulness of our proposed theory in a limited level. The practicality should be verified by using real time laboratory experiment, such as Analog Power System Simulation (APSS) implemented by operational amplifiers and electronic circuits, which is closer to the real-world power system. However, our study platform at present lacks this kind of experiment environment. Hence, we only performed numerical simulation experiment to verify the validity of our method using MATLAB ToolBox. In the study of LFC system, many researchers also use numerical simulation to verify their theories. In our future work, we will build a physical power system platform or real time semi-physical simulation platform to support our theory study.
6. Conclusions
The resilient control problem of event-based load frequency control and virtual synchronous generation (LFC-VSG) scheme of discrete-time multi-area power system with uncertainty, low inertia, and GDB under time delay and DoS attacks is studied. Considering the average dwell time (ADT) model-based DoS attacks influencing on the remote communication network of LFC-VSG scheme, a discrete-time switched delay system is established to describe multi-area power system dynamic. Even-triggered mechanism (ETM) is introduced to reduce the communication load of LFC-VSG control loop. By using piecewise Lyapunov–Krasovskii functional method and switched system method, a criterion quantifying the tolerant DoS attack (ADT and duty cycle) and delay bound is proposed. Meanwhile, some sufficient conditions are derived to preserve weightedH∞performance. Accordingly, a co-design method for ETM and LFC-VSG scheme is given in terms of LMIs. Aa simulation of two-area power system with the designed resilient event-based LFC-VSG scheme was carried out to illustrate the validity of our theory. In the future, renewable energy resources participating in remote frequency regulation will be considered and another network attack, namely false data injection attack, will be studied. The proposed method combining piecewise LFK and switched system method provides a flexible way for the system synthesis when countering complex cyber-physical factors. For improvement, advanced Lyapunov functional and integral inequality technique can be employed to reduce the conservatism of this conclusion.
Figure 1. The ith area power system with event-triggered mechanism based LFC-VSG scheme.
| Δfi | frequency deviation | Mi | generator inertia constant |
| ΔPmi | generator mechanical output | Di | generator damping coefficient |
| ΔPvi | governor valve position | Tchi | turbine time constant |
| ΔPWi | wind farm power | Tgi | governor time constant |
| ΔPSi | solar farm power | Ri | drop constant |
| ΔPref,i | reference power from VSG | TWTi | wind turbine time constant |
| ΔPinertai,i | virtual inertia power | TPVi | solar system time constant |
| ΔPtie,i | tie-line power | Tr | virtual rotor time constant |
| ΔPdi | load change | TINi | inverter time constant |
| ΔPwind,i | wind farm disturbance | Tij | synchronizing coefficient |
| ΔPsolar,i | solar farm disturbance | βi | frequency bias |
| ACEi | area control error | KIi | LFC gain |
| K1i | virtual primary control gain | K2i | virtual secondary control gain |
| Mvi | virtual generator inertia constant | Dvi | virtual generator damping coefficient |
| PARM | D | M | Tij | Tch | R | Tg | β | TPV | TWT | TIN | Mv | Dv | Tr |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Area 1 | 0.015 | 0.166 | 0.08 | 0.4 | 3 | 0.08 | 0.3493 | 1.3 | 1.5 | 0.04 | 0.9 | 10.4 | 103 |
| Area 2 | 0.016 | 0.202 | 0.08 | 0.44 | 2.73 | 0.06 | 0.3827 | 1.3 | 1.5 | 0.04 | 0.9 | 10.4 | 103 |
| Tα | λ | γ¯ | |||
|---|---|---|---|---|---|
| 1.5623 | 0.8325 | 212.1875 | |||
| 1.9073 | 0.7330 | 173.0745 | |||
| 2.2012 | 0.6788 | 159.1523 | |||
| 2.5284 | 0.6363 | 150.3286 | |||
| 2.9481 | 0.5981 | 143.5351 |
| τD | λ | γ¯ | |||
|---|---|---|---|---|---|
| 1000 | 0.6923 | 165.7411 | |||
| 500 | 0.7068 | 167.7314 | |||
| 333 | 0.7166 | 168.4863 | |||
| 250 | 0.7242 | 168.6135 | |||
| 200 | 0.7328 | 168.9756 |
| dM | Tα | ||
|---|---|---|---|
| 5 | 1.2166 | ||
| 10 | 1.2392 | ||
| 15 | 1.2626 | ||
| 20 | 1.2870 |
Author Contributions
Z.C. designed the control strategy and wrote the manuscript; S.H. checked the whole manuscript; J.M. provided study resources of power system. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported in part by the National Natural Science Foundation of China under Grant (No. 61673223, No. 61533010, No. 61633016); the Six Talent Peaks Project of Jiang-su Province of China (Grant No. RLD201810); the QingLan Project of Jiangsu Province of China (Grant No. QL 04317006); Postgraduate Research & Practice Innovation Program of Jiangsu Province under Grant (No. KYCX19_0904, KYCX19_0923).
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A
Appendix A.1. Proof of Theorem 1
Construct a piecewise Lyapunov-Krasovskii functional (LKF) (i=0,1)
Vi(k)=xT(k)Pix(k)+∑s=k-dMk-1xT(s)Qix(s)λik-s-1,+∑θ=-dM-1∑s=k+θk-1δT(s)Riδ(s)λik-s-1
whereδ(s)=x(s+1)-x(s),0<λ1<1andλ0>1.
Case 1.
Whenk∈Ξm,l⋂Φn,m⋂I1,n, with the LKF in Equation (A1) (i = 1), it can be obtained that
V1(k+1)-λ1 V1(k)≤xT(k+1)P1x(k+1)-λ1 xT(k)P1x(k)+xT(k)Q1x(k)-λ1dM xT(k-dM)Q1x(k-dM)+dM δT(k)R1δ(k)-∑s=k-dMk-1λ1dM δT(s)R1δ(s)+2ξ1T(k)X1[x(k)-x(t-d(k))-∑s=k-d(k)k-1δ(s)]+2ξ1T(k)Y1[x(k-d(k))-x(k-dM)-∑s=k-dMk-d(k)-1δ(s)]
+dM ξ1T(k)M1 ξ1(k)-∑s=k-dMk-1ξ1T(k)M1 ξ1(k)-zT(k)z(k)+γ2 wTw+zT(k)z(k)-γ2 wTw
whereξ1(k)=col[x(k),x(k-d(k)),x(k-dM),e(k),w].
Substituting Equation (12) into Equation (A2), one has
V1(t+1)-λ1 V1(k)≤ξ1T(k)[Σ1+Γ1T P1 Γ1+dM Γ2T R1 Γ2+Γ3T+Γ3+dM M1]ξ1(k)-∑s=t-d(k)t-1ξ1T(k)δT(s)M1X1X1Tλ1dM R1ξ1(k)δ(s)-∑s=t-dMt-d(k)-1ξ1T(k)δT(s)M1Y1Y1Tλ1dM R1ξ1(k)δ(s)-zT(k)z(k)+γ2 wTw
According to Equations (15) and (16), we have
V1(t+1)≤λ1 V1(k)-zT(k)z(k)+γ2 wTw.
Case 2.
Similarly, whenk∈I2,n,by denotingξ0(k)=col[x(k),x(t-d(k)),x(t-dM),w] , with the LKF in Equation (A1) (i = 0), one has
V0(k+1)-λ0 V0(k)≤xT(k+1)P0x(k+1)-λ0 xT(k)P0x(k)+xT(k)Q0x(k)-λ0dM xT(k-dM)Q0x(k-dM)+dM δT(k)R0δ(k)-∑s=k-dMk-1λ0 δT(s)R0δ(s)+2ξ0T(k)X0[x(k)-x(k-d(k))-∑s=k-d(k)k-1δ(s)]+2ξ0T(k)Y0[x(k-d(k))-x(k-dM)-∑s=t-dMt-d(k)-1δ(s)]+dM ξ0T(k)M0 ξ0(k)-∑s=t-dMt-1ξ0T(k)M0 ξ0(k)-zT(k)z(k)+γ2 wTw+zT(k)z(k)-γ2 wTw
Further, one has
V0(t+1)-λ0 V0(k)≤ξ0T(k)[Σ0+Ψ1T P0 Ψ1+dM Ψ2T R0 Ψ2+Ψ3T+Ψ3+dM M0]ξ0(k)-∑s=t-d(k)t-1ξ0T(k)δT(s)M0X0X0Tλ0 R0ξ0(k)δ(s)-∑s=t-dMt-d(k)-1ξ0T(k)δT(s)M0Y0Y0Tλ0 R0ξ0(k)δ(s)-zT(k)z(k)+γ2 wTw
According to Equations (17) and (18), we have
V0(t+1)≤λ0 V0(k)-zT(k)z(k)+γ2 wTw
Stability analysis:
According to Equation (19), one has
V0 (gn+bn)+≤μ1 (λ0 λ1)dM-1 V1 (gn+bn)-,V1 (gn)+≤μ0 V0 (gn)-.
Withw=0 , by recursing Equations (A3) and (A4), it can be obtained that
Vi(k)≤[μ0 μ1 (λ0 λ1)dM-1]N(k,0) λ0Ξ(k,0) λ1k-Ξ(k,0) V1(0)μ∗≤[μ0 μ1 (λ0 λ1)dM-1]κ (λ0 λ1)η {[μ0 μ1 (λ0 λ1)dM-1]1τD λ01Tα λ11-1Tα}k V1(0)μ∗≤ϱλk V1(0)
whereϱ=[μ0 μ1 (λ0 λ1)dM-1]κ (λ0 λ1)η μ∗andμ∗=max{1,1μ0,[μ1 (λ0 λ1)dM-1]-1} . According to Equation (14), it can be guaranteed that0<λ<1 . Thus, the switched system in Equation (11) is exponentially stable.
H∞ performance analysis:
For the convenience ofH∞performance analysis, note that
N(k,k0)=N(k+,k0-),Ξ(k,k0)=Ξ(k-,k0+),N(k,0)=N(k,ks)+N(ks,0),Ξ(k,0)=Ξ(k,ks)+Ξ(ks,0),
According to Equations (A3) and (A4), one has
Vi(k)≤μ∗ [μ0 μ1 (λ0 λ1)dM-1]N(k,0) λ0Ξ(k,0) λ1k-Ξ(k,0) V1(0)+∑s=0k-1μ∗ [μ0 μ1 (λ0 λ1)dM-1]N(k,s) λ0Ξ(k,s+1) λ1k-s-Ξ(k,s+1)-1Δ(s)
whereΔ(s)=-zT(s)z(s)+γ2 wTw.
Forx(0)=0, the following inequality is satisfied
∑s=0k-1[μ0 μ1 (λ0 λ1)dM-1]N(k,s) λ0Ξ(k,s+1) λ1k-s-Ξ(k,s+1)-1Δ(s)≥0
LetF(k,s)=[μ0 μ1 (λ0 λ1)dM-1]N(k,s) λ0Ξ(k,s+1) λ1k-s-Ξ(k,s+1)-1. Adding both sides of the above inequality fromk=1tok=∞, it can be derived that
∑k=1∞∑s=0k-1F(k,s)∥z(s)∥≤γ2∑k=1∞∑s=0k-1F(k,s)∥w∥.
Further, it has
∑s=0∞∑k=s+1∞F(k,s)∥z(k)∥≤γ2∑s=0∞∑k=s+1∞F(k,s)∥w∥.
For simplification, denoteμ¯=μ0 μ1 (λ0 λ1)dM-1. Multiplying both sides of the above inequality withμ¯-N(k,0), it develops that
∑s=0∞∑k=s+1∞μ¯-κ-sdD λ1k-s-1∥z(s)∥≤γ2∑s=0∞∑k=s+1∞λ1k-s-η-1-k-s-1Tα λ0η+k-s-1Tα∥w∥.
Denoteλs=λ01Tα λ11-1Tα . According to Equation (14), one has(Tα-1)lnλ1+lnλ0<0, which indicates0<λs<1. Further, one has
∑s=0∞μ¯-κ-sdD∥z(s)∥11-λ1≤γ2∑s=0∞(λ0 λ1)η∥w∥11-λs.
Finally, it can be obtained that
∑s=0∞μ¯-sτD∥z(s)∥≤γ¯2∑s=0∞∥w∥,
whereγ¯=γμ¯κ1-λ11-λs(λ0 λ1)η . According to Equation (13), the closed-loop system in Equation (11) hasH∞performance level, namely weightedL2-gainγ¯. This proof is completed.
Appendix A.2. Proof of Theorem 2
First, the uncertainty matricesΔAiican be decomposed byΔAii=Gi Hi(k)Ji, where
Gi=00Δ100000000Δ2000000T,Hi(k)=ϵ(k)1+ϵ(k)00ϵ(k)1+ϵ(k),Ji=-h000000000-h0-h-h0-hh0.
Further, the argument uncertainty matrixΔAis constructed byΔA=GH(k)J,whereG=diag{G1,G2,...,Gn},H(k)=diag{H1(k),H2(k),...,Hn(k)},andJ=diag{J1,J2,...,Jn}.H(k)is an unknown matrix, which is Lebesque measurable and satisfiesHT(k)H(k)≤I.
According to the construction on the uncertaintiesΔA, replacing A byA+ΔA , Equations (15) and (17) can be rewritten by
Σ1+Γ3T+Γ3+dM M1∗∗Γ1-P1-1∗dMΓ20-R1-1+0∗∗Γ' 0∗dMΓ' 00+0∗∗Γ' 0∗dMΓ' 00T<0
Σ0+Ψ3T+Ψ3+dM M0∗∗Ψ1-P0-1∗dMΨ20-R0-1+0∗∗Ψ' 0∗dMΨ' 00+0∗∗Ψ' 0∗dMΨ' 00T<0
whereΓ' =ΔA0000andΨ' =ΔA000.
Denote that
Π1=Σ1+Γ3T+Γ3+dM M1∗∗Γ1-P1-1∗dMΓ20-R1-1,Π2=col00000GdMG,
Π3=J000000,Θ1=Σ0+Ψ3T+Ψ3+dM M0∗∗Ψ1-P0-1∗dMΨ20-R0-1,Θ2=col0000GdMG,Θ3=J00000.
Then, Equations (A6) and (A7) can be converted to
Π1+Π2H(k)Π3+Π3TH(k)Π2T<0
Θ1+Θ2H(k)Θ3+Θ3TH(k)Θ2T<0
Based on Lemma 1, Equation (A8) can be converted to
Π1+εΠ2 Π2T+ε-1 Π3T Π3<0,
by using Schur complement lemma, which is expanded to
Σ^1(1)∗∗∗∗Γ1-P1-1+εGGT∗∗∗dMΓ2εdMGGT-R1-1+εdMGGT∗∗Γ400-I∗Γ5000-εI<0
whereΣ^1(1)=diag[-λ1 P1+Q1,σΩ,-λ1dM Q1,-Ω,-γ2I]+Γ3T+Γ3+dM M1,Γ4=E0000,andΓ5=J0000.
Similarly, Equation (A9) is converted to
Θ1+εΘ2 Θ2T+ε-1 Θ3T Θ3<0
which is expanded to
Σ^0(1)∗∗∗∗Ψ1-P0-1+εGGT∗∗∗dMΨ2εdMGGT-R0-1+εdMGGT∗∗Ψ400-I∗Ψ5000-εI<0
whereΣ^0(1)=diag[-λ0 P0+Q0,0,-λ0dM Q0,-γ2I]+Ψ3T+Ψ3+dM M0,Ψ4=E000,Ψ5=J000.
Further, define thatP˜i=Pi-1,Q˜i=P˜i Qi P˜i,R˜i=Ri-1,P^1={P1˜,P1˜,P1˜,P1˜,I},P^0={P0˜,P0˜,P0˜,I},X˜i=P^iXP˜i,Y˜i=P^iYP˜i,M˜i=P^i Mi P^iandΩ˜=P˜1ΩP˜1. Based on the inequality techniqueSXS≥2S-X-1and-X-1≤δ2SXS-2δS , using Schur complementary Lemma l, pro-and pre-multiplying Equation (A10) withdiag{P1^,I,I,I,I}, respectively, and pro- and pre-multiplying Equation (A11) withdiag{P0^,I,I,I,I}, respectively, Equations (20) and (21) can be obtained. Accordingly, Equations (16), (18), and (19) can be converted to the LMIs in Equations (22)-(24). Equation (25) is introduced to deal with nonlinear termKCP˜1=KNC=K˜C.
1. Bevrani, H.; Ghosh, A.; Ledwich, G. Renewable energy sources and frequency regulation: Survey and new perspectives. IET Renew. Power Gener. 2010, 4, 438-457.
2. Dreidy, M.; Mokhlis, H.; Mekhilef, S. Inertia response and frequency control techniques for renewable energy sources: A review. Renew. Sustain. Energy Rev. 2017, 69, 144-155.
3. Bevrani, H.; Ise, T.; Miura, Y. Virtual synchronous generators: A survey and new perspectives. Int. J. Electr. Power Energy Syst. 2014, 54, 244-254.
4. Kerdphol, T.; Rahman, F.S.; Mitani, Y. Virtual inertia control application to enhance frequency stability of interconnected power systems with high renewable energy penetration. Energies 2018, 11, 981.
5. Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. The 2015 ukraine blackout: Implications for false data injection attacks. IEEE Trans. Power Syst. 2016, 32, 3317-3318.
6. Sgouras, K.I.; Birda, A.D.; Labridis, D.P. Cyber attack impact on critical smart grid infrastructures. In Proceedings of the ISGT 2014, Washington, DC, USA, 19-22 February 2014; pp. 1-5.
7. Wang, W.; Lu, Z. Cyber security in the smart grid: Survey and challenges. Comput. Netw. 2013, 57, 1344-1371.
8. Teixeira, A.; Shames, I.; Sandberg, H.; Johansson, K.H. A secure control framework for resource-limited adversaries. Automatica 2015, 51, 135-148.
9. Ding, D.; Han, Q.L.; Xiang, Y.; Ge, X.; Zhang, X.M. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 2018, 275, 1674-1683.
10. Guan, Y.; Ge, X. Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Trans. Signal Inf. Process. Over Netw. 2018, 4, 48-59.
11. Liu, J.; Tian, E.; Xie, X.; Lin, H. Distributed event-triggered control for networked control systems with stochastic cyber-attacks. J. Frankl. Inst. 2019, 356, 10260-10276.
12. Amin, S.; Cárdenas, A.A.; Sastry, S.S. Safe and secure networked control systems under denial-of-service attacks. In Proceedings of the International Workshop on Hybrid Systems: Computation and Control, San Francisco, CA, USA, 13-15 April 2009; Springer: Berlin/Heidelberg, Germany, 2009; pp. 31-45.
13. Pang, Z.H.; Liu, G.P.; Zhou, D.; Hou, F.; Sun, D. Two-channel false data injection attacks against output tracking control of networked systems. IEEE Trans. Ind. Electron. 2016, 63, 3242-3251.
14. Liu, S.; Liu, X.P.; El Saddik, A. Denial-of-service (DoS) attacks on load frequency control in smart grids. In Proceedings of the 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 24-27 February 2013; pp. 1-6.
15. Manandhar, K.; Cao, X.; Hu, F.; Liu, Y. Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control. Netw. Syst. 2014, 1, 370-379.
16. Zhang, H.; Qi, Y.; Wu, J.; Fu, L.; He, L. DoS attack energy management against remote state estimation. IEEE Trans. Control. Netw. Syst. 2018, 5, 383-394.
17. Xiao, S.; Han, Q.L.; Ge, X.; Zhang, Y. Secure Distributed Finite-Time Filtering for Positive Systems Over Sensor Networks Under Deception Attacks. IEEE Trans. Cybern. 2019.
18. De Persis, C.; Tesi, P. Input-to-state stabilizing control under denial-of-service. IEEE Trans. Autom. Control 2015, 60, 2930-2944.
19. Peng, C.; Li, J.; Fei, M. Resilient Event-Triggering H∞ Load Frequency Control for Multi-Area Power Systems With Energy-Limited DoS Attacks. IEEE Trans. Power Syst. 2017, 32, 4110-4118.
20. Hu, S.; Yue, D.; Xie, X.; Chen, X.; Yin, X. Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks. IEEE Trans. Cybern. 2018, 49, 4271-4281.
21. Chen, X.; Wang, Y.; Hu, S. Event-based robust stabilization of uncertain networked control systems under quantization and denial-of-service attacks. Inf. Sci. 2018, 459, 369-386.
22. Cheng, Z.; Yue, D.; Hu, S.; Xie, X.; Huang, C. Detection-based weighted H∞ LFC for multi-area power systems under DoS attacks. IET Control Theory Appl. 2019, 13, 1909-1919.
23. Ding, D.; Wang, Z.; Wei, G.; Alsaadi, F.E. Event-based security control for discrete-time stochastic systems. IET Control. Theory Appl. 2016, 10, 1808-1815.
24. Su, L.; Ye, D. A cooperative detection and compensation mechanism against Denial-of-Service attack for cyber-physical systems. Inf. Sci. 2018, 444, 122-134.
25. Sun, H.; Peng, C.; Yang, T.; Zhang, H.; He, W. Resilient control of networked control systems with stochastic denial of service attacks. Neurocomputing 2017, 270, 170-177.
26. Zhang, J.; Peng, C.; Masroor, S.; Sun, H.; Chai, L. Stability analysis of networked control systems with denial-of-service attacks. In Proceedings of the 2016 UKACC 11th International Conference on Control (CONTROL), Belfast, UK, 31 August-2 September 2016; pp. 1-6.
27. Cheng, Z.; Yue, D.; Hu, S.; Chen, L. Resilient H∞ triggering control for uncertain discrete-time system against DoS attacks. In Proceedings of the IECON 2019-45th Annual Conference of the IEEE Industrial Electronics Society, Lisbon, Portugal, 14-17 October 2019; Volume 1, pp. 6285-6290.
28. Magdy, G.; Shabib, G.; Elbaset, A.A.; Mitani, Y. Renewable power systems dynamic security using a new coordination of frequency control strategy based on virtual synchronous generator and digital frequency protection. Int. J. Electr. Power Energy Syst. 2019, 109, 351-368.
29. Gozde, H.; Taplamacioglu, M.C. Automatic generation control application with craziness based particle swarm optimization in a thermal power system. Int. J. Electr. Power Energy Syst. 2011, 33, 8-16.
30. Liu, S.; Luo, W.; Wu, L. Co-Design of Distributed Model-Based Control and Event-Triggering Scheme for Load Frequency Regulation in Smart Grids. IEEE Trans. Syst. Man, Cybern. Syst. 2018.
31. Wang, Y.; Xie, L.; De Souza, C.E. Robust control of a class of uncertain nonlinear systems. Syst. Control. Lett. 1992, 19, 139-149.
Zihao Cheng1, Songlin Hu2,* and Jieting Ma3
1School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
2College of Automation & College of Artificial Intelligence, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
3State Grid Xinxiang Power Supply Company, Xinxiang 453000, China
*Author to whom correspondence should be addressed.
†This paper is an extended version of our paper published in IECON 2019-45th Annual Conference of the IEEE Industrial Electronics Society, Lisbon, Portugal, 14–17 October 2019; pp. 6285–6290.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2020. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
This paper is concerned with resilient triggered control problem for load frequency control and virtual synchronous generation (LFC-VSG) scheme of discrete-time multi-area power system with parameter uncertainty, governor dead band (GDB), and low inertia under time delay and aperiodic Denial-of-Service (DoS) attacks. To reduce communication load of sleep intervals, event triggered mechanism (ETM) is introduced. A discrete-time switched delay system model is established to describe the dynamic of multi-area power system under resilient static output feedback control law. Combining piecewise Lyapunov–Krasovskii functional (LKF) method with switched system theory, a criterion is derived that the tolerant bound of attack duration and attack frequency can be estimated explicitly. Meanwhile, some sufficient conditions are obtained which can preserve weightedH∞performance. By using linear matrix inequalities (LMIs) techniques, a co-design method is proposed to solve the control gains and trigger parameters. A simulation example of a two-area power system was carried out to verify the efficiency of our proposed resilient event based LFC-VSG scheme.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer




