Next Article in Journal
A Method for Fault Localization in Distribution Networks with High Proportions of Distributed Generation Based on Graph Convolutional Networks
Previous Article in Journal
A Microscopic Experimental Study on the Dominant Flow Channels of Water Flooding in Ultra-High Water Cut Reservoirs
Previous Article in Special Issue
Designing a Dispatch Engine for Hybrid Renewable Power Stations Using a Mixed-Integer Linear Programming Technique
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Control Conditions for Equal Power Sharing in Multi-Area Power Systems for Resilience Against False Data Injection Attacks

by
Zahoor Ahmed
1,*,
Muhammad Nasir
2,
Deema Mohammed Alsekait
3,*,
Muhammad Zohaib Hassan Shah
4,
Diaa Salama AbdElminaam
5,6 and
Furqan Ahmad
7
1
Department of Automation, Shanghai Jiao Tong University, Shanghai 200240, China
2
School of Information and Communication Technology, University of Tasmania, Hobart 7248, Australia
3
Department of Computer Science, Applied College, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
4
International Center for Primate Brain Research, Shanghai 201602, China
5
MEU Research Unit, Middle East University, Amman 11831, Jordan
6
Jadara Research Center, Jadara University, Irbid 21110, Jordan
7
Western Caspian University, Baku 1001, Azerbaijan
*
Authors to whom correspondence should be addressed.
Energies 2024, 17(22), 5757; https://doi.org/10.3390/en17225757
Submission received: 19 July 2024 / Revised: 10 September 2024 / Accepted: 28 October 2024 / Published: 18 November 2024

Abstract

:
Power cyber–physical systems such as multi-area power systems (MAPSs) have gained considerable attention due to their integration of power electronics with wireless communications technologies. Incorporating a communication setup enhances the sustainability, reliability, and efficiency of these systems. Amidst these exceptional benefits, such systems’ distributed nature invites various cyber-attacks. This work focuses on the equal power sharing of MAPSs in the event of false data injection (FDI) attacks. The proposed work uses a sliding mode control (SMC) mechanism to ensure timely detection of challenges such as FDI attacks and load change, making MAPSs reliable and secure. First, a SMC-based strategy is deployed to enable the detection and isolation of compromised participants in MAPS operations to achieve equal power sharing. Second, time-varying FDI attacks on MAPSs are formulated and demonstrate their impact on equal power sharing. Third, a robust adaptive sliding mode observer is used to accurately assess the state of the MAPS to handle state errors robustly and automatically adjust parameters for identifying FDI attacks and load changes. Lastly, simulation results are presented to explain the useful ability of the suggested method.

1. Introduction

Recently, the integration of power electronics and wireless communication technology has generated significant interest in power cyber–physical systems (CPSs) such as multi-area power systems (MAPSs) among experts and scholars [1]. With the increase in power demand, traditional power distribution systems are under immense strain, and renewable energy has emerged as a leading solution to alleviate this pressure on traditional power supplies [2]. Advanced power systems, functioning as CPSs, integrate physical power plants with network communication capabilities, enhancing the overall system efficiency by improving response times to fluctuations in energy supply and demand while reducing operational costs [3]. This integration enables flexible state estimation, wide-area control, and cost-effective economic dispatching [4]. However, distributed energy systems are exposed to cyber-attacks because they rely on communication networks [4]. The increasing number of cyber-threats highlights the critical need for robust detection mechanisms, especially following notable incidents such as the 2015 Ukraine blackout [5] and the 2019 Utah grid disruption [6]. These incidents underscore the urgent need for effective detection mechanisms to promptly identify malicious attacks and mitigate potential loss to power systems.
The cyber-attack detection problem of CPSs has been extensively studied [7,8], but a significant focus is false data injection (FDI) attacks [9]. FDI attacks have emerged as a considerable threat to CPSs due to their ability to manipulate data exchanged between components, disrupting critical operations such as state estimation and frequency control [7]. These attacks compromise power system operations by impacting essential functions such as frequency and voltage restoration, load sharing, power sharing, and state estimation [10]. For instance, research indicates that FDI attacks can lead to a 20% to 30% decrease in system efficiency and result in up to 50% longer recovery times [11]. Intelligent attacks can further undermine MAPS operations discreetly, making them challenging to detect [12]. Traditional data security measures, including data integrity checks, access control, and cryptography, are often inadequate for protecting MAPSs against such cyber-threats. Their inadequacy stems from limited integration with the unique data collection and processing methods inherent to power system operations [13]. This highlights the urgent need for advanced detection and mitigation strategies that can effectively address the impacts of FDI attacks on grid resilience and efficiency.
Several techniques have been proposed to address these attacks, typically categorized into knowledge-based and data-driven approaches [14]. Data-driven techniques, including machine learning, can infer system models from real-time data but are often computationally demanding and require extensive training datasets [15]. Knowledge-based detection methods, such as residual-based detection, compare system models with observed data, though they face scalability challenges in large, distributed systems [13]. In recent years, detection strategies such as Kalman-filter-based methods [16] have been proposed for smart grids, but these techniques may fail when FDI attacks mimic historical data patterns. Euclidean-distance-based metrics [17] and observer-based techniques [18] have improved detection in simulations, but these methods still face limitations in large-scale, decentralized MAPSs, where communication delays and scalability concerns arise. Similarly, the reliability of SMC has been utilized to address external disturbances [19], along with an adaptive SMC-based technique for detecting attacks and reconstructing subsequent impacts in the power system [18]. It is important to note that these detection strategies have primarily been implemented in centralized architectures, necessitating comprehensive knowledge of the entire power system. However, this centralized approach may not be feasible or practical for extensive distributed power systems.
Given the complex and large-range nature of MAPSs, there has been a shift towards decentralized and distributed approaches for control design, state estimation, and economic dispatching. In contrast to centralized control methods, distributed control strategies involve using distributed energy resources (DERs) to share data among neighboring units via a limited communication network. These strategies find broad application in power systems such as microgrid operations, managing tasks such as restoring voltage and frequency, sharing both active power and reactive power in proportion, optimizing economic operations, and more [20]. The operational parameters of DERs involved, such as frequencies, voltages, incremental costs, and active power distribution, are treated as variables of consensus. Networked control schemes are designed to guide variables towards targeted values based on specialized objectives [21], such as equal power sharing. These strategies enable simultaneous data processing, accelerating the system’s responsiveness to fluctuating DERs and loads. This efficiency helps reduce infrastructure costs and enhance system scalability by leveraging sparse communication networks, yet these are susceptible to external attacks such as denial of service attacks, deception attacks, and FDI attacks.
Various schemes have been proposed for identifying and mitigating attacks such as FDI in MAPSs, including invariant-based detection [22], software-defined networking [23], active synchronous detection [24], Kalman-filter-based feedback control [17], and trust/reputation-based control [25]. An efficient density-based method for global sensitivity assessment has also been introduced [26], effectively identifying critical inputs and allocating defense assets to combat FDI threats. While these approaches provide valuable insights and strategies, they often fall short in delivering robust and efficient mechanisms for power sharing in MAPSs during FDI attacks. For instance, some methods treat cyber-threat signals as constant manipulations of MAPS operating points, and trust-based protocols have been designed to detect attacks [27]. However, these techniques can impose substantial communication and computational demands, potentially delaying response times [28]. Alternative approaches, such as those treating time-variant attacks as noise [29], may be ineffective if attackers possess detailed knowledge of the power system’s communication structure. In contrast, the proposed technique utilizing SMC stabilizes the system within 0.15 s to 0.2 s post-attack and effectively removes attack effects thereafter, achieving a high detection accuracy. This method demonstrates superior performance, efficiency, and resilience compared to existing approaches, addressing the limitations of traditional techniques.
Hence, a resilient control strategy against cyber-attacks for equal power sharing of a MAPS has been proposed using an SMC-based consensus control mechanism in the event of FDI attacks. The contributions of this study are outlined as follows:
  • A resilient control strategy is proposed that detects potential cyber-attacks in a timely manner and isolates compromised areas (nodes) in a decentralized approach without disrupting normal MAPS operations. The resilience of this approach has been verified across numerous operational scenarios, such as load fluctuations and power sharing in the presence of FDI attacks.
  • Time-varying FDI attacks on communication between different areas of MAPS are formulated and demonstrate their impact on MAPS operations. In the event of FDI attacks, the proposed control strategy effectively detects and isolates threats and swiftly restores optimal operational conditions, such as equal power sharing.
  • A robust adaptive sliding mode observer is deployed to accurately assess the state of power in a CPS, such as a MAPS. Unlike traditional sliding mode observers, the proposed observer handles state errors robustly and automatically adjusts parameters to identify FDI attacks and load changes.
The rest of the paper is organized as follows: Section 2 describes mathematical preliminaries and system modeling; Section 3 describes controller design; Section 4 discusses the simulation results; and Section 5 concludes the paper.

2. Preliminaries of Graphs

Suppose g is a graph of a MAPS, which consists of n cooperating areas such that g   = ( V , E , Å ) , with vertices V = { 1 , 2 , , n } and edges E V × V of the graph. Let an undirected path from area i to area j be represented as a sequence of edges such as ( V i , V j ) , ( V k , V l ) , , ( V m , V n ) . Consider Å to be an n × n adjacency matrix, also known as the diagonal matrix, expressed as Å = 1 , if ( V i , V j ) E 0 , otherwise and Å = [ a i j ] n × n . Let D = { d i j } be a diagonal matrix where the diagonal elements d i i represent the degree of the ith area. Specifically, D is a matrix in which all off-diagonal elements are zero, and the diagonal element d i i corresponds to the degree of the ith area. Thus, D can be expressed as:
D = d 11 0 0 0 d 22 0 0 0 d n n
where d i i denotes the degree of the ith area.
Suppose the L Laplacian matrix is a semi-positive definite and symmetric matrix, expressed as L = D   Å and L = [ l i j ] n × n . If j i , then l i j = a i j ; otherwise, l i j = j = 1 n a i j .

3. System Modeling

This section presents the mathematical framework of the networked MAPS. Consider a MAPS consisting of n number of areas, which coordinate with each other to perform consensus types of tasks such as equal power sharing and load frequency control. Also, suppose that sensor data of each area are sent to the centralized power control in the MAPS to facilitate the generation of required control signals. A dynamical model of MAPS can be written as
x ˙ ( t ) = Å x ( t ) + B u ( t ) + F a t ( T ) , y ˙ ( t ) = C x ( t ) .
Here, x ( t ) , [ x 1 T ( t ) , x 2 T ( t ) , , x n T ( t ) ] T R m + n , u ( t ) R m + n , and a t denote the states, input vectors, and attack signal of nonlinear mode, respectively. C and n denote the identity matrix and number of nodes, respectively. In the same way, x i = [ x i , 1 T ( t ) , x i , 2 T ( t ) , x i , 3 T ( t ) , x i , 4 T ( t ) ,   x i , 5 T ( t ) ] T define the ith states of the area, where x i , 1 , x i , 2 , x i , 3 , x i , 4 , and x i , 5 correspond to power deviation f i . The control errors e i ( t ) of the area can be defined as
e i ( t ) = 0 t α i f i d t .
Here, α i represents the power bias factor. It is already defined that C n × n is an identity matrix and the remaining Å , B , and F are the constant matrices, written as
Å = a 11 a 12 a 1 n a 21 a 22 a 2 n a n 1 a n 2 a n n ,
B = diag b 1 T , b 2 T , , b n T T ,
F = diag f 1 T , f 2 T , , f n T T .
Also, the matrices Å i j , B i , and F i for i , j = 1 , 2 , , n can be written as:
B i = 0 0 1 t g , i 0 0 T .
F i = 1 j i 0 0 0 T
Å i i = i j i 1 j i 0 1 j i 0 0 1 t u , i 1 t u , i 0 0 1 t g , i w i 0 1 t g , i 0 0 i = j , j = 1 2 2 π t i j 0 0 0 0 α i 0 0 1 0
Å i j = 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 π t i j 0 0 0 0 0 0 0 0 0 .
Here, t i j represents the stiffness constant of ith and jth areas. Also, w i , j i , t g , i , i , , and t u , i denote unique attributes of the ith power areas such as the speed-droop coefficient, generator’s inertia, governor time constant, coefficient of damping, and time constant of the turbine, respectively.
Suppose any ith area of the MAPS is under FDI attack. Then, the actuator and sensor attacks can be expressed as
u d t = u t + Υ u a .
Here, u a ( t ) , u d t , and u ( t ) denote the injected attack signal, corrupted control input, and control input to the actuator. Υ is a binary value used to determine whether there is an attack, i.e., Υ = 1 , or no attack, Υ = 0 . Further sensor attacks on the MAPS can be expressed as
x d t = x t + χ x a t .
Here, x a t , x d t , and x t represent the attack signal, corrupted state, and normal state, respectively. The presence of an attack signal depends on the binary constant χ . If χ = 1 , an attack exist; otherwise, χ = 0 .
By using (10) and (11), the overall attack signal to any area of the MAPS can be modeled as
a t = Υ u a t + c k n a i j ( χ x j χ x i ) .
Here, the feedback gain, scalar gain, and adjacency of matrix A are represented through k , c , and a i j , respectively. Figure 1 shows the controller design for the MAPS to ensure equal power sharing.

4. Attack Detection

In this section, attack detection mechanisms for the real-time detection of FDI attacks are discussed. This section describes a Luenberger observer (LO) and an Artificial Neural Network (ANN) observer. ANNs are renowned for their ability to handle data-driven dynamics. They are extensively used for pattern recognition and event prediction based on evolving dynamics [30]. For instance, ANNs are employed in the production processes of renewable energy within microgrids to ensure stability and effectively balance power sharing amidst uncertainties [31]. ANNs can be deployed to detect faults and cyber-attacks, such as FDI attacks, on microgrids [32,33]. The details of both these components are presented in the subsequent sections.

4.1. ANN Observer

An ANN can be accurately used to estimate the behavior of a MAPS due to the nonlinear and unpredictable nature of FDI attacks. Therefore, the proposed attack observer can be written as follows
x ^ ˙ = Å x ^ t + B u t + L ( y y ^ ) y ^ = C x ^ t + o s ( t ) .
Here, the vector state of the LO, Luenberger gain, and ANN observer are represented by x ^ , L , and o ( t ) , respectively. Further, o ( t ) is described by
o i ( t ) = w i ( t ) ς ( v i ( t ) γ i ( t ) ) .
Here, the ith vector of observer o ( t ) is represented by o i ( t ) , ∀ i = 1 , 2 , , n . At time t, associated weights of ith output of the ANN are represented by ω i ( t ) and v i ( t ) . Also, γ i t = [ o i ( t Γ ) , , o i ( t a Γ ) , e i ( t Γ , , e i ( t b Γ ) ] T , in which the sampling time or step is represented by Γ , e i t = Y i t Y ^ ( t ) . The t a n h activation function is denoted by ς ( . ) and defined as
ς x = ( 1 e x ) ( 1 + e x ) .
For ith element of observer o i ( t ) , the ANN observer be expressed as
o i ( t ) = ω i ( t ) ς ( z i ( t ) ) ,
where
z i t = j = 1 a v i , j ( t ) o i t j Γ + j = 1 b v i , a + j ( t ) o i t j Γ .
o ( t ) updates its input iterative using past a sample input of observer j = 1 , 2 , 3 , , a and past b sample error of the MAPS at the output e i t j Γ . Provided that j = 1 , 2 , 3 , , a for sample inputs and j = 1 , 2 , , b for sample output, the selection of a and b depends upon the required training time and accuracy of the system. Larger ranges of a and b ensure better accuracy and convergence of ANN training, but they can also increase calculation cost (time) and introduce unwanted delays as a result of the extended training period. Moreover, excessive values of a and b are not beneficial in scenarios involving non-periodic FDI attacks. Therefore, to achieve immediate and precise attack diagnosis, both a and b must be selected according to the required accuracy of the system dynamics as well as the characteristics of frequency response.

4.2. ANN Updated Law

For a resilient MAPS to ensure immediate attack detection, the ANN’s weights must be updated rapidly. In this article, a resilient tuning scheme using an extended Kalman filter (EKF) is presented. This scheme facilitates the online updating of ANN learning weights by leveraging the EKF, ensuring swift convergence of the ANN. Updating factors of the EKF for the ith element can be expressed as follows
ϑ i k = [ ω i ( k s ) , v i , 1 ( k s ) , , v i , a + b ( k s ) ] T .
Here, the sampling time is represented by k s such that t = k s Γ .
Parameters of the ANN are updated by employing EKF algorithm at every sampling time by
ϑ i k s = ϑ i k s 1 + ζ i K i k s [ Y i k s Y ^ i ( k s ) ] K i k s = p i ( k s ) h i ( k s ) [ H i k s T p i k s h i k s + r i ( k s ) ] 1 p i k s + 1 = p i k s K i ( k s ) H i k s T p i k s .
Here, ζ i denotes the coefficient of learning, p i ( k s ) represents the matrix of covariance for state error estimation, K i ( k s ) indicates the Kalman gain, and r i ( k s ) refers to the matrix of covariance for the estimation of noise, which is computed recursively as follows
r i k s = r i k s 1 + e i T k s e i k s r i k s 1 k s .
Here, the derivation of e i k s with respect to ϑ i is represented by h i k s , which can be calculated using observer input based on (13) given as
h i k s = d e i k s d ϑ i = ς z i k s ϑ i = ω i ω i k s o i k s j ς z i k s ϑ i = v i , j ω i k s e i k s j ς z i k s ϑ i = v i , a + j .

4.3. Luenberger Observer (LO)

An LO is configured to estimate x ^ and transmits its observed data to the ANN unit to alleviate the computational burden on the ANN. The ANN utilizes the disparity between the LO and the system output as input for detecting attacks within the MAPS. The error rate for the suggested attack detection can be expressed as x ˙ ˜ t = x ˙ t x ˙ ^ ( t ) , via the subtraction of (21) from (1), which gives
x ˙ ˜ t = Å x ˜ t + F a t ( t ) LC x ˜ t L o t .
Luenberger design can be streamlined through ANN observer o t , resulting in the simplification given below
x ˙ ˜ t = Å LC x ˜ t , x ˜ 0 = x 0 .
Here, the gain of LO is denoted by L . Suitable values of the gain are determined such that the matrix Å LC will have all negative, real eigenvalues. This ensures that the estimation error converges to 0 at t . The gain L could be determined by the pole-placement technique.

5. Equal Power-Sharing Condition Based on Consensus

5.1. Consensus Conditions with Communication Delay Caused by FDI Attack

This section presents the consensus conditions in the event of communication delay ρ due to FDI attack. Suppose the control conditions given below
u i t = a 1 j = 1 n a i j x j t ρ x i t ρ + a 2 j = 1 n a i j p L j t ρ p L i t ρ .
Here, a 1 and a 2 represents the gain constants. Let the composite state z t = [ x T ( t ) , p L T ( t ) ] T such that x t = [ x 1 ( t ) , x 2 ( t ) , , x n ( t ) ] T and p L T t = [ p L 1 ( t ) , p L 2 ( t ) , , p L n ( t ) ] T . Therefore, composite dynamics can be expressed as
z ˙ ( t ) = φ z ( t ) .
Here, φ = 0 I n a I n a 1 L b I n a 2 L .
Lemma 1. 
In the control protocol described above, area i is ensured to experience the same delay ρ due to uncertainties such as FDI attacks. This ensures that accurate error signals are utilized in feedback mechanisms to maintain consensus. In scenarios where area i has instantaneous knowledge of x i t , this information must be delayed before application in u i t . In cases where only relative information is available such as x i t x j t rather than x i t directly, and if there is a time delay in measurement, it is natural to apply the same delay to both area i and area j of the MAPS.
Likewise, composite dynamics with communication delay due to FDI attack can be written as
z ˙ t = 0 I n a I n b I n z t 0 0 a 1 L a 2 L z t ρ .
Therefore, error dynamics can be rewritten as
z ^ ˙ t = 0 I n 1 a I n 1 b I n 1 a 2 L z ^ t 0 0 a 1 L ^ a 2 L ^ z ^ t ρ .
The control protocol (24) ensures that the MAPS defined by (1) achieves consensus if and only if the error system (27) exhibits asymptotic stability.
The Laplace transform of (27) can be calculated to analyze the characteristic equation of the MAPS, given as
d e t s I n 1 I n 1 a I n 1 + e ρ s a 1 L ^ s b I n 1 + e ρ s a 2 L ^ = i = 2 n F i ( s , ρ ) = 0 ,
Here, F i ( s , ρ ) represents quasi-polynomials given below
F i s , ρ = s 2 b s a + e ρ s ( a 2 s + a 1 ) λ i for i = 1 , 2 , , n .

5.2. Continuous Consensus Based on Sliding Mode Control

This section presents a control strategy for a MAPS in the presence of FDI attack. By using Equation (1), a control law for the MAPS using SMC is adapted. The adjusted SMC surface can be expressed as:
s i t = x ¯ i 0 0 t u ¯ i Γ d Γ + x ¯ i t ,
Here, x ¯ i 0 is the starting condition of the x ¯ i t . The SMC-based integrator state for the MAPS is maintained by s i t = s ˙ i t = 0 . So, one obtains
x ¯ ˙ i t = x ¯ i ( t ) n r .
Following this, an enhanced SMC-based consensus framework can be formulated as
u ¯ i t = u ¯ i ( t ) n + u ¯ i ( t ) u r , u ¯ i ( t ) u r = g 1 s i g 1 2 s i + w t , w ˙ i t = g 2 s g n s i .
The vector form of (32) can be expressed as
u ¯ ( t ) = u ¯ ( t ) n + u ¯ ( t ) u r , u ¯ ( t ) u r = g 1 σ 1 2 ( s ) + w ( t ) , w ˙ ( t ) = g 2 sgn ( s ) .
Here, parameters u ¯ ( t ) n , g ( t ) , u ¯ t , and u ¯ ( t ) u r stand for control inputs where g 1 > 0 , g 2 > δ , holds such that δ is a positive scalar quantity.

6. Design of Proposed Resilient Controller

This section first describes the SMC-based strategy to evaluate the MAPS under FDI attack. Subsequently, we ensure resilient consensus performance for the MAPS under FDI attack. The sufficient criteria for modeling the controller are given below
Theorem 1. 
The control strategy to ensure equal power sharing for the MAPS is outlined in the previous Section 2. It is clear from that section that the MAPS must adhere to the SMC surface within a bounded time.
Proof. 
To obtain the proof of this theorem, let us recall (1); substituting the differentiation of s i ( t ) into (1) yields
s ˙ i t = u ¯ i ( t ) u + F i t .
From (32), the above is expressed by
s ˙ i t = g 1 t s i g 1 2 s + a i + w i , w ˙ i = g 2 s g n s i .
If e i = a i + w i , (35) is illustrated by
s ˙ i t = g 1 s i g 1 2 s i + e i , e ˙ i = g 2 s g n s i + a ˙ i .
Now, apply the Lyapunov function as given
V t = i = 1 n V i t = i = 1 n P i ( t ) R i ( s ) P i ( t ) ,
Here, P i ( t ) = [ sig 1 / 2 ( s i ) e i ] , R i R 2 × 2 > 0 .
The differentiation of the P i ( t ) is described by
P ˙ i ( t ) = 1 2 | s i | 1 2 s i e ˙ i = 1 2 | s i | 1 2 g 1 ( t ) sig 1 2 ( s i ) + e i g 2 sgn ( s i ) + F ˙ i = 1 2 s i 1 2 g 1 ( t ) sig 1 2 ( s i ) + e i 2 g 2 F ˙ i sgn ( s i ) sig 1 2 ( s i ) = s i 1 2 ω i P i ( t ) ,
Here, ω i = 1 2 g 1 ( t ) 1 2 [ g 2 F ˙ i sgn ( s i ) ] 0 . Differentiating the Lyapunov function as defined in (37), considering the dynamics of the system (36), yields
Z ˙ t = i = 1 n Z ˙ i = i = 1 n s i 1 2 P i ( t ) T H i P i ( t ) < 0 .
Here, P i and H i are related through the Lyapunov equation, which can be expressed as:
P i T R i + R i P i = H i .
Expression (40) describes that i if H i > 0 . P i > 0 will be the unique solution. Thus, Z i justifies the Lyapunov function.
The inequality shown by (39) is adjusted accordingly to satisfy s i 1 2 = s i g 1 2 ( s i ) P i 2 δ m i n 1 2 ( R i )
Z i 1 2 , given below
Z ˙ t i = 1 n δ m i n 1 2 Z i 1 2 t δ m i n H i δ m a x R i Z i ( t ) μ i = 1 n Z i t 1 2 ,
In this context, let μ = min i = 1 , 2 , , n δ min 1 2 ( P i ) δ min ( H i ) δ max ( R i ) > 0 . The relation i = 1 n Z i 1 2 ( t ) i = 1 n Z i ( t ) 1 2 . Consequently, we can express Z ˙ ( t ) μ Z 1 2 ( t ) . □
Next, Theorem 2 is provided to illustrate the performance tracking of the MAPS in the presence of FDI attacks on the sliding surface.
Theorem 2. 
A MAPS (1) with composite FDI attack may attain equal power sharing through consensus tracking (24) if the MAPS remains on the surface of a sliding mode within a bounded time.
Proof. 
To prove Theorem 2, it is first necessary to select an appropriate Lyapunov function as follows:
Z t = 1 2 x ¯ ( t ) ( Δ I n ) T ( Δ I n ) x ¯ ( t ) = 1 2 N T N .
Here, Δ = ( L + B ) , N = [ N 1 T , N 2 T , , N n T ] T and N i T = i = 1 n a i j x ¯ i t x ¯ j ( t ) + b i x ¯ i t . The derivative of the Z can be written as
Z ˙ ( t ) = N T ( Δ I n ) x ¯ ˙ ( t ) = N T ( Δ I n ) X i ξ ( t ) δ m i n ( τ ( t ) I n ) δ m i n ( Δ I n ) N 1 + a δ m i n ( τ ( t ) I n ) δ m i n ( Δ I n ) | N T N | 1 + a 2 δ m i n ( τ ( t ) I n ) δ m i n ( Δ I n ) ( 2 Z ( t ) ) 1 + a 2 H V ( t ) 1 + a 2 .
Here, ξ represents s i g n . = s i g n . ζ , i.e., the positive ratio of odd numbers.
Similarly, v = d i a g ζ 1 r 1 + 1 a , ζ 2 r 2 + 1 a , , ζ n r n + 1 a and H = δ m i n τ t I n δ m i n   Δ I n 2 Z t ( 1 + a ) / 2 . It is evident that Z t approaches 0 within a finite time. Thus, the time taken for stabilization can be expressed as
T 2 Z ( x ¯ ( 0 ) ) ( 1 + a ) / 2 H ( 1 a ) .
Therefore, Z ( t ) = 0 holds ( t T ) , and x i ( t ) = x 0 ( t ) r i . The equal power-sharing performance of the MAPS in the event of FDI threats can be ensured at a designated interval. □
Remark 1. 
Given that e i = F i + w i and u ¯ i ( t ) u represents the equal power sharing of the MAPS under attack with g 2 > μ and g 1 > 0 , it is important to note that if e i = F i + w i , then the power-sharing factor u ¯ i ( t ) u works as an observer for attacks, meaning that 0 t g 2 sgn ( s ) d Γ = F , t > T .

Equal Power Sharing of Multi-Area Power System with Attack Observer

This section outlines a relationship between malicious information and topological data, which can be particularly challenging in the presence of FDI attacks. To achieve equal power sharing, a high-level switching gain Δ is chosen, potentially leading to significant actuator chattering and elevated energy use in real-time scenarios. For instance, friction can worsen actuator chattering. Thus, such a situation is investigated by Δ i = ϵ ( | s i | Δ i )   Δ i ( 0 ) 0 , and positive values for and ε are utilized. The increase in switching gain is restricted by the term Δ i .
Initially, for the estimation of attacks on the MAPS, an attack observer is introduced. The attack observer is illustrated by the following dynamics
Ξ ˙ t = P ( q ( t ) + [ P x ¯ i ( t ) + u ¯ i ( t ) ] ) , F ¯ i t = q t + P x ¯ i ( t ) .
In this context, q ( t ) F ¯ i ( t ) and P represent the internal state of the observer, the attack, and the observer gain. By employing this attack observer, it is possible to derive
F ^ ˙ i t = F ˙ i t + P q ( t ) + P [ P x ¯ i ( t ) + u ¯ i ( t ) ] P ( u ¯ i ( t ) + F i ( t ) ) = P F ^ ˙ i ( t ) + F ˙ i ( t ) .
Here, i = 1 , 2 , , n , F ^ ˙ i ( t ) = F i ( t ) F ¯ i ( t ) . With the help of input state stability argument, one may conclude that F ^ ˙ i t δ i P is valid after an appropriate period of time.
Secondly, the controller comprises discontinuous dynamics, which may reduce the longevity of the actuator. Consequently, it induces chattering and affects the performance of MAPSs. Hence, it is essential to integrate continuous dynamics into the design of an adaptive consensus law to effectively handle attacks.
β ( s i ) = Δ i s i | s i | , if Δ i | s i | Ξ , Δ i 2 s i , if Δ i | s i | < Ξ ,
Therefore, to mitigate the effects of attacks, the following integral SMC is proposed
s i = x ¯ i t + x ¯ i 0 0 t u ¯ i Γ n r + F ¯ i Γ d Γ .
The MAPS states are maintained on the integral SMC, characterized by s i = s ˙ i = 0 . When s ˙ i = 0 , it signifies
x ¯ ˙ i t = u ¯ i t n r + F ¯ i t .
Hence, an integral SMC-based equal power sharing strategy is illustrated by
u ¯ t = u ¯ i t n + u ¯ i t c .
Provided that u ¯ i t c = [ β ( s 1 ) T , β ( s 2 ) T , , β ( s n ) T ] T , next, the integral SMC law of MAPSs in the presence of FDI attacks are being explained by Theorem 3.
Theorem 3. 
It is assumed that equal power sharing in the consensus control problem of the MAPS can be addressed using an integral SMC-based law combined with resilient control techniques, even in the presence of FDI attacks.
Proof. 
To demonstrate this theorem, we first calculate the first derivative of (47), specifically the sliding surface s i . Consequently, the Lyapunov function’s candidate can be formulated as follows
Z t = 1 2 s T s + 1 2 ε i = 1 n ( Δ i Δ ¯ ) 2
where the upper bound of Δ i is Δ ¯ , where Δ ¯ be Δ ¯ > δ P + Δ 0 , δ = [ δ 1 T , δ 2 T , , δ n T ] T , Δ 0 > 0 .
Now, differentiation of Z ( t ) with the trajectory of consensus control gives
Z ˙ t = s T s ˙ + 1 ε i = 1 n ( Δ i Δ ¯ ) Δ ˙ = s T u ¯ t c + F t F ¯ ( t ) + i = 1 n Δ i Δ ¯ ( | s i | Δ i ) δ P | s | + s T u ¯ ( t ) c + i = 1 n ( Δ i Δ ¯ ( | s i | Δ i ) .
Case 1: Δ i | s i | Ξ , i = 1 , 2 , 3 , , n , s T = i = 1 n Δ i | s i | .
Since
Z ˙ t = δ P | s | i = 1 n Δ i | s i | + i = 1 n ( Δ i Δ ¯ ) ( | s i | Δ i ) = δ P | s | Δ ¯ i = 1 n | s i | i = 1 n ( Δ i Δ ¯ ) Δ i ( δ P Δ ¯ ) | s | + 4 i = 1 n Δ 2 Δ 0 | s | + β i ,
where β 1 = n 4 Δ ¯ 2 .
Case 2: If Δ i | s i | < Ξ , for i = 1 , 2 , 3 , , n , then s T ( t ) u ¯ ( t ) c = i = 1 n Δ i 2 Ξ | s i | .
One can write
V ˙ t δ P | s | i = 1 n Δ i 2 Ξ | s i | 2 + i = 1 n Δ i Δ ¯ ( | s i | Δ i ) Δ 0 | s | + β 1 + i = 1 n ( Δ i 2 Ξ | s i | 2 + Δ i | s i | ) .
Since Δ i | s i | Ξ therefore it is clear that [ Δ i 2 Ξ + Δ i | s i | ] has the maximum value of Ξ 4 when Δ i | s i | = Ξ 2 . Hence, we obtain Z ˙ t Δ 0 | s | + β 2 , Here, β 1 = β 2 + Ξ n 4 .
Case 3: If Δ i | s i | applies to certain areas of the network, then Δ i | s i | < Ξ holds for other areas. Similarly, one can derive the following
Z ˙ t Δ 0 | s | + β 3 ,
where β 1 β 3 β 2 .
Building on the previous discussion, the following expression can be verified whichever Δ i | s i | , i.e,
Z ˙ t Δ 0 s + β Δ 0 | s | + σ Δ 0 | s | + β 1 σ β 0 | s | , | s | β σ Δ 0
where σ 0 , 1 , β = max β 1 , β 2 , β 3 = n Δ ¯ 2 + Ξ 4 . From the aforementioned results, the boundary layer may attained in bounded time on an appropriate sliding surface. □
Next, Theorem 4 will describe the equal power sharing of the MAPS based on communication infrastructure in the presence of attacks.
Theorem 4. 
If the MAPS adheres to a one-way communication framework, the equal power sharing problem under FDI attacks can be tackled by introducing a continuous integral SMC along with standard communication infrastructure.
Proof. 
To obtain proof of Theorem 4, an appropriate Lyapunov function is considered by
Z 2 t = 1 2 x ¯ t T Δ I n T Δ I n x ¯ t + Z ( t ) = 1 2 N T N + Z ( t ) .
One may have
Z ˙ 2 t = N T Δ I n x ¯ ˙ t + Z ˙ ( t )
Utilizing (55), Z ˙ 2 t can be rewritten as if
Z ˙ 2 t N T Δ I n x ¯ ˙ t Δ 0 | s | + β δ m i n ( τ t I n ) δ m i n ( Δ I n ) | N | 1 + a Δ 0 | s | + β H | N | 1 + a + β H | N | 1 + a + σ 1 H | N | 1 + a σ 1 H | N | 1 + a + β ( 1 σ 1 ) | N | 1 + a , | N | 1 + a β σ 1 H .
In which H = δ m i n ( τ t I n ) τ m i n ( Δ I n ) 2 1 + a and σ 1 0 , 1 . This may have Z 2 t < 0 . If N [ 0 , 1 ) ,
Z ˙ 2 t H | N | 2 + β ( 1 σ 1 ) H | N | 2 .
Then, the bounded limit of | N | β σ 1 H .
If N [ 1 , inf ) ,
Z ˙ 2 t H | N | 2 + β ( 1 σ 1 ) H | N | .
Hence, it is verifiable that | N | β σ 1 H .
Also, Z 2 ( t ) < 0 , which ensures adaptive power sharing of the MAPS in the presence of FDI attacks using the SMC protocol. If Δ = β σ 1 H , β σ 1 H , subsequently, the MAPS can achieve the specified desired trajectories, namely, Δ 1 = | N | Δ , | s | β Δ 0 H . □
Remark 2. 
The response of the proposed SMC approach is affected by ε. The parameters Ξ and ∂ are maintained at low values to improve tracking performance. However, time delays ∂ can result in chattering effects. This study mitigates chattering by utilizing an integral adaptive SMC instead of a non-continuous one. Also, the suggested scheme is resilient to variations in attacks and the communication framework of the MAPS.

7. Simulations

This section presents the simulation outcomes and discusses the performance of a MAPS using SMC in the presence of FDI attacks and load change while achieving equal power sharing within the MAPS. To conduct experiments and provide simulation outcomes, we considered a communication topology, as shown in Figure 2, in which areas communicate with each other to ensure equal power sharing. For a better understanding, simulation results are described through five different cases based on FDI attacks and load change conditions.
Case 1: Normal MAPS.
In this case, a MAPS is assumed to perform its standard operations without any hurdle. All the areas of the MAPS ensure equal power sharing in the absence of uncertainties such as FDI attacks or sudden load changes, as given in (1). This serves as a baseline since any interruption in power sharing would be identified through this.
The simulation results presented in Figure 3 provide a detailed closed-loop analysis of the MAPS. Figure 3 demonstrates that all areas of the MAPS achieve equal power sharing under normal conditions, as depicted in Case 1, where no attacks or load changes are present. This uniform power distribution highlights the system’s baseline efficiency and stable operations in the absence of disturbances.
Case 2: Unstable or unequal power-sharing MAPS.
This case describes the performance of a MAPS when subjected to FDI attacks without any control mechanism. In this case, the equal power-sharing state of the MAPS is affected by FDI attacks. As a result, the MAPS fails to achieve equal power sharing.
Figure 4 illustrates the significant effects of FDI attacks on the MAPS. This figure demonstrates how FDI attacks disrupt MAPS operations by impairing key functionalities such as maintaining an equal power-sharing state. Specifically, Figure 4 shows undesired fluctuations in the power-sharing response caused by the attack. These fluctuations are so severe that they lead to persistent instability within the MAPS, as evidenced by the continuous random ripples observed in the power-sharing response. This instability prevents the system from achieving or maintaining an equal power-sharing state, underscoring the detrimental impact of FDI attacks on the overall stability and efficiency of the MAPS. The visual representation in Figure 4 highlights the challenge of restoring system equilibrium under such attack conditions, emphasizing the need for effective detection and mitigation strategies.
Case 3: MAPS under root node (area) FDI attack.
This case focuses on the equal power sharing of the MAPS with the FDI attack, as expressed in (12). In this case, the coordination of different areas in the MAPS is affected by FDI attacks by injecting noise or random signals. Also, the existence of communication delay due to FDI attacks results in a latency of power information sharing between the MGs. As a result, there will be no coordinated power-sharing information, and this can cause the MAPS to fail to achieve an equal power-sharing state.
Figure 5 illustrates the power-sharing response of the proposed resilient consensus control mechanism for equal power sharing in a MAPS under root area attacks. The figure demonstrates that while the power-sharing response exhibits some compromised regulation performance and minor ripples due to the presence of FDI attacks, the system remains largely effective. Specifically, Figure 5 shows that the equal power-sharing state is temporarily affected from approximately t = 0.09 s to t = 0.15 s. Despite these temporary disturbances, the the MAPS achieves a stable equal power-sharing state shortly after the transient period. This behavior aligns with Theorems 2–4 and Case 3, which confirm that the proposed scheme is sufficiently resilient to root area attacks, ensuring that the the MAPS returns to and maintains equal power sharing effectively.
Case 4: MAPS under non-root (area) attacks.
This case explores MAPSs under non-root attacks, as described in (1), (12), and (30). In a non-root attack, the attacker injects false data into the legitimate power-sharing information shared between the coordinating areas of the MAPS. It is assumed that area 2, area 3, area 4, and area 5 are under FDI attack which further affects the overall performance of the MAPS. This work is expected to ensure equal power distribution among the areas within the MAPS while maintaining consensus between them based on SMC.
Figure 6 depicts the response of the equal power-sharing state of the MAPS under a non-root node attack. According to Theorems 2–4 and Case 4, the MAPS is expected to maintain an equal power-sharing state despite the presence of these attacks. However, Figure 6 illustrates that non-root area attacks disrupt the flow of measurement power information between the areas of MAPSs, leading to significant deviations in the equal power-sharing state. Specifically, the figure shows fluctuations in the power-sharing response from approximately t = 0.09 s to t = 0.20 s, indicating the impact of the attacks. These observations underscore the importance of the proposed controller, as discussed in Theorems 2–4. The proposed consensus control technique effectively balances security measures with power-sharing requirements, demonstrating its capability to maintain equal power sharing across the MAPS even in non-root area attack scenarios.
Case 5: MAPS under load change conditions.
The MAPS in this case is subjected to load changes. Consensus control of the MAPS ensures equal power sharing despite uncertainties. Despite the increased or decreased electrical load in a particular area, the SMC-based control mechanism adapts to ensure stability and efficiency across the MAPS.
Figure 7 illustrates the impact of load changes and communication delays caused by FDI attacks on MAPSs. Despite substantial load variations starting around t = 0.4 s, the proposed SMC-based techniques effectively maintain equal power sharing among the areas of MAPSs. This figure demonstrates the resilience of the proposed method in managing significant disruptions. Table 1 provides a summary of various cases, their status, and the stability times for the MAPS under attack. This table confirms that the proposed method achieves promising results in ensuring balanced power sharing across MAPSs and effectively mitigates the effects of attacks, achieving high detection accuracy. This comprehensive analysis highlights the robustness and reliability of the proposed approach in maintaining system stability and performance despite external disturbances and attack-induced challenges.

8. Conclusions

In this paper, the detection and isolation of FDI attacks to ensure equal power sharing in MAPSs have been addressed. The proposed SMC-based strategy offers notable advantages by enabling robust and timely detection of FDI attacks while preserving normal system operations. By utilizing adaptive sliding mode observers and distributed control principles, this strategy not only enhances resilience against cyber–physical threats but also improves network efficiency. Specifically, the SMC-based approach ensures high detection accuracy and effectively manages uncertainties such as attacks and load changes. This results in significant energy savings by minimizing power disruptions and inefficiencies, as well as reducing the need for excessive backup power and operational adjustments despite attacks and load changes. The efficient management of attacks and disruptions contributes to better overall network performance and stability. Future research directions include further optimization of detection algorithms for real-time applications and the integration of advanced cybersecurity measures into power system infrastructures to bolster resilience, security, and energy efficiency.

Author Contributions

All authors contributed equally where Z.A. led the conceptualization, methodology, and initial drafting of the manuscript, also overseeing the software development and project administration. M.N. focused on data curation, validation, and formal analysis and provided critical review and editing. D.M.A. contributed through supervision, funding acquisition, and manuscript review. M.Z.H.S. conducted investigations and managed resources, assisting with the manuscript review. D.S.A. provided supervision, resources, and validation and reviewed the manuscript. Finally, F.A. contributed to software implementation, data analysis, and visualization, supporting the original draft preparation. All authors have read and agreed to the published version of the manuscript.

Funding

This research is funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2024R435), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Acknowledgments

The authors would like to acknowledge the support of Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2024R435), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Wen, S.; Yu, X.; Zeng, Z.; Wang, J. Event-triggering load frequency control for multiarea power systems with communication delays. IEEE Trans. Ind. Electron. 2015, 63, 1308–1317. [Google Scholar] [CrossRef]
  2. Wang, Z.; Liu, Y.; Yang, Z.; Yang, W. Load frequency control of multi-region interconnected power systems with wind power and electric vehicles based on sliding mode control. Energies 2021, 14, 2288. [Google Scholar] [CrossRef]
  3. Xu, K.; Niu, Y. Decentralized event-triggered sliding mode scheme for frequency regulation of multi-area power systems under deception attacks. Trans. Inst. Meas. Control 2023, 01423312231156237. [Google Scholar] [CrossRef]
  4. Yue, D.; Hu, S.; Cheng, Z.; Yue, D.; Hu, S.; Cheng, Z. Secure Distributed Optimal Frequency Regulation of Power Grid with Time-Varying Voltages Under False Data Injection Attacks. In Secure Control of Networked Control Systems and Its Applications; Springer: Singapore, 2021; pp. 251–270. [Google Scholar]
  5. Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Trans. Power Syst. 2016, 32, 3317–3318. [Google Scholar] [CrossRef]
  6. Zhao, P.; Gu, C.; Ding, Y.; Liu, H.; Bian, Y.; Li, S. Cyber-resilience enhancement and protection for uneconomic power dispatch under cyber-attacks. IEEE Trans. Power Deliv. 2020, 36, 2253–2263. [Google Scholar] [CrossRef]
  7. Ahmed, Z.; Saeed, M.A.; Jenabzadeh, A.; Xu, X.; Zhang, W. Frequency domain resilient consensus of multi-agent systems under IMP-based and non IMP-based attacks. Automatica 2022, 146, 110582. [Google Scholar] [CrossRef]
  8. Ahmed, Z.; Ali, N.; Zhang, W. H2 Resilient Consensus Control of Multiagent Systems Under Deception Attack. IEEE Trans. Circuits Syst. II Express Briefs 2023, 70, 2530–2534. [Google Scholar] [CrossRef]
  9. Tan, S.; Xie, P.; Guerrero, J.M.; Vasquez, J.C. False data injection cyber-attacks detection for multiple DC microgrid clusters. Appl. Energy 2022, 310, 118425. [Google Scholar] [CrossRef]
  10. Zhou, Q.; Shahidehpour, M.; Alabdulwahab, A.; Abusorrah, A. A cyber-attack resilient distributed control strategy in islanded microgrids. IEEE Trans. Smart Grid 2020, 11, 3690–3701. [Google Scholar] [CrossRef]
  11. He, H.; Yan, J. Cyber-physical attacks and defences in the smart grid: A survey. IET Cyber-Phys. Syst. Theory Appl. 2016, 1, 13–27. [Google Scholar] [CrossRef]
  12. Ranjbar, M.H.; Kheradmandi, M.; Pirayesh, A. Assigning operating reserves in power systems under imminent intelligent attack threat. IEEE Trans. Power Syst. 2019, 34, 2768–2777. [Google Scholar] [CrossRef]
  13. Pasqualetti, F.; Dörfler, F.; Bullo, F. Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 2013, 58, 2715–2729. [Google Scholar] [CrossRef]
  14. Paridari, K.; O’Mahony, N.; Mady, A.E.D.; Chabukswar, R.; Boubekeur, M.; Sandberg, H. A framework for attack-resilient industrial control systems: Attack detection and controller reconfiguration. Proc. IEEE 2017, 106, 113–128. [Google Scholar] [CrossRef]
  15. Zhang, X.G.; Yang, G.H.; Ren, X.X. Network steganography based security framework for cyber-physical systems. Inf. Sci. 2022, 609, 963–983. [Google Scholar] [CrossRef]
  16. Rawat, D.B.; Bajracharya, C. Detection of false data injection attacks in smart grid communication systems. IEEE Signal Process. Lett. 2015, 22, 1652–1656. [Google Scholar] [CrossRef]
  17. Manandhar, K.; Cao, X.; Hu, F.; Liu, Y. Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control Netw. Syst. 2014, 1, 370–379. [Google Scholar] [CrossRef]
  18. Ao, W.; Song, Y.; Wen, C. Adaptive cyber-physical system attack detection and reconstruction with application to power systems. IET Control Theory Appl. 2016, 10, 1458–1468. [Google Scholar] [CrossRef]
  19. Yan, Y.; Yu, S.; Yu, X. Euler’s discretization effect on a sliding-mode control system with supertwisting algorithm. IEEE Trans. Autom. Control 2020, 66, 2817–2824. [Google Scholar] [CrossRef]
  20. Zhou, Q.; Shahidehpour, M.; Yan, M.; Wu, X.; Alabdulwahab, A.; Abusorrah, A. Distributed secondary control for islanded microgrids with mobile emergency resources. IEEE Trans. Power Syst. 2019, 35, 1389–1399. [Google Scholar] [CrossRef]
  21. Zhou, Q.; Tian, Z.; Shahidehpour, M.; Liu, X.; Alabdulwahab, A.; Abusorrah, A. Optimal consensus-based distributed control strategy for coordinated operation of networked microgrids. IEEE Trans. Power Syst. 2019, 35, 2452–2462. [Google Scholar] [CrossRef]
  22. Beg, O.A.; Johnson, T.T.; Davoudi, A. Detection of false-data injection attacks in cyber-physical DC microgrids. IEEE Trans. Ind. Inform. 2017, 13, 2693–2703. [Google Scholar] [CrossRef]
  23. Jin, D.; Li, Z.; Hannon, C.; Chen, C.; Wang, J.; Shahidehpour, M.; Lee, C.W. Toward a cyber resilient and secure microgrid using software-defined networking. IEEE Trans. Smart Grid 2017, 8, 2494–2504. [Google Scholar] [CrossRef]
  24. Li, Y.; Zhang, P.; Zhang, L.; Wang, B. Active synchronous detection of deception attacks in microgrid control systems. IEEE Trans. Smart Grid 2016, 8, 373–375. [Google Scholar] [CrossRef]
  25. Duan, J.; Chow, M.Y. A resilient consensus-based distributed energy management algorithm against data integrity attacks. IEEE Trans. Smart Grid 2018, 10, 4729–4740. [Google Scholar] [CrossRef]
  26. Wang, H.; Yan, Z.; Xu, X.; He, K. Probabilistic power flow analysis of microgrid with renewable energy. Int. J. Electr. Power Energy Syst. 2020, 114, 105393. [Google Scholar] [CrossRef]
  27. Lu, L.Y.; Liu, H.J.; Zhu, H.; Chu, C.C. Intrusion detection in distributed frequency control of isolated microgrids. IEEE Trans. Smart Grid 2019, 10, 6502–6515. [Google Scholar] [CrossRef]
  28. Che, L.; Liu, X.; Li, Z.; Wen, Y. False data injection attacks induced sequential outages in power systems. IEEE Trans. Power Syst. 2018, 34, 1513–1523. [Google Scholar] [CrossRef]
  29. Abhinav, S.; Schizas, I.D.; Lewis, F.L.; Davoudi, A. Distributed noise-resilient networked synchrony of active distribution systems. IEEE Trans. Smart Grid 2016, 9, 836–846. [Google Scholar] [CrossRef]
  30. Brentan, B.M.; Campbell, E.; Lima, G.; Manzi, D.; Ayala-Cabrera, D.; Herrera, M.; Montalvo, I.; Izquierdo, J.; Luvizotto, E., Jr. On-line cyber attack detection in water networks through state forecasting and control by pattern recognition. In Proceedings of the World Environmental and Water Resources Congress 2017, Sacramento, CA, USA, 21–25 May 2017; pp. 583–592. [Google Scholar]
  31. Sabzehgar, R.; Amirhosseini, D.Z.; Rasouli, M. Solar power forecast for a residential smart microgrid based on numerical weather predictions using artificial intelligence methods. J. Build. Eng. 2020, 32, 101629. [Google Scholar] [CrossRef]
  32. Canaan, B.; Colicchio, B.; Abdeslam, D.O. Detecting Cyber-Physical-Attacks in AC microgrids using artificial neural networks. In Proceedings of the 2021 IEEE 30th International Symposium on Industrial Electronics (ISIE), Kyoto, Japan, 20–23 June 2021; pp. 1–6. [Google Scholar]
  33. Abudin, M.J.; Thokchom, S.; Naayagi, R.; Panda, G. Detecting False Data Injection Attacks Using Machine Learning-Based Approaches for Smart Grid Networks. Appl. Sci. 2024, 14, 4764. [Google Scholar] [CrossRef]
Figure 1. SMC-based control of MAPS.
Figure 1. SMC-based control of MAPS.
Energies 17 05757 g001
Figure 2. Communication topology of MAPS.
Figure 2. Communication topology of MAPS.
Energies 17 05757 g002
Figure 3. Equal power sharing of a MAPS in the absence of attacks.
Figure 3. Equal power sharing of a MAPS in the absence of attacks.
Energies 17 05757 g003
Figure 4. Unstable or unequal power sharing of a MAPS in the presence of attacks.
Figure 4. Unstable or unequal power sharing of a MAPS in the presence of attacks.
Energies 17 05757 g004
Figure 5. Equal power sharing of a MAPS in the presence of root node under attacks.
Figure 5. Equal power sharing of a MAPS in the presence of root node under attacks.
Energies 17 05757 g005
Figure 6. Equal power sharing of a MAPS in the presence of non-root node under attacks.
Figure 6. Equal power sharing of a MAPS in the presence of non-root node under attacks.
Energies 17 05757 g006
Figure 7. Equal power sharing of a MAPS in the presence of non-root node under load change conditions.
Figure 7. Equal power sharing of a MAPS in the presence of non-root node under load change conditions.
Energies 17 05757 g007
Table 1. Summary of the time required to restore stability in each case.
Table 1. Summary of the time required to restore stability in each case.
CasesStatusStability Time (s)
Case 1Normal0.015
Case 2UnstableUnstable
Case 3Stale with root area under attacks0.15
Case 4Stale with non-root area under attacks0.2
Case 5Stable with load change0.4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ahmed, Z.; Nasir, M.; Alsekait, D.M.; Shah, M.Z.H.; AbdElminaam, D.S.; Ahmad, F. Control Conditions for Equal Power Sharing in Multi-Area Power Systems for Resilience Against False Data Injection Attacks. Energies 2024, 17, 5757. https://doi.org/10.3390/en17225757

AMA Style

Ahmed Z, Nasir M, Alsekait DM, Shah MZH, AbdElminaam DS, Ahmad F. Control Conditions for Equal Power Sharing in Multi-Area Power Systems for Resilience Against False Data Injection Attacks. Energies. 2024; 17(22):5757. https://doi.org/10.3390/en17225757

Chicago/Turabian Style

Ahmed, Zahoor, Muhammad Nasir, Deema Mohammed Alsekait, Muhammad Zohaib Hassan Shah, Diaa Salama AbdElminaam, and Furqan Ahmad. 2024. "Control Conditions for Equal Power Sharing in Multi-Area Power Systems for Resilience Against False Data Injection Attacks" Energies 17, no. 22: 5757. https://doi.org/10.3390/en17225757

APA Style

Ahmed, Z., Nasir, M., Alsekait, D. M., Shah, M. Z. H., AbdElminaam, D. S., & Ahmad, F. (2024). Control Conditions for Equal Power Sharing in Multi-Area Power Systems for Resilience Against False Data Injection Attacks. Energies, 17(22), 5757. https://doi.org/10.3390/en17225757

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop