Microgrid self-triggering control method and system for resisting FDI attacks

Information

  • Patent Grant
  • 12189766
  • Patent Number
    12,189,766
  • Date Filed
    Monday, August 12, 2024
    5 months ago
  • Date Issued
    Tuesday, January 7, 2025
    22 days ago
Abstract
A microgrid self-triggering control method and system for resisting FDI attacks is provided. The method includes the following steps: S1: adopting primary control based on droop control for a microgrid; S2: designing a secondary control strategy of the microgrid, where the secondary control strategy includes frequency recovery and fair distribution of active power; and S3: designing a microgrid distributed self-triggering control method of a hash encryption method after considering the condition that the FDI attacks are injected into a secondary control communication link, so as to resist false malicious data in the microgrid and achieve secondary control. According to the microgrid self-triggering control method and system, a distributed secondary control target of the microgrid is achieved even under the FDI attacks, the injected malicious data can be quickly detected and eliminated, and the distributed secondary control communication network of the microgrid can be protected.
Description
CROSS REFERENCE TO THE RELATED APPLICATIONS

This application is based upon and claims priority to Chinese Patent Application No. 202311101885.X, filed on Aug. 29, 2023, the entire contents of which are incorporated herein by reference.


TECHNICAL FIELD

The present invention relates to the technical field of microgrid control, and more specifically to a microgrid self-triggering control method and system for resisting FDI attacks.


BACKGROUND

At present, with the rapid development of information systems, microgrids face more potential threats of cyber attacks. Among many network attacks, false data injection (FDI) attacks can be applied without causing controller tracking errors and are difficult to be directly detected and eliminated by distributed controllers.


However, the traditional microgrid distributed secondary control has a small fixed sampling period, which inevitably wastes communication and computing resources.


Therefore, to solve the above problems, a microgrid distributed self-triggering control strategy and system for resisting FDI attacks based on a hash encryption algorithm are provided.


SUMMARY

In view of this, the present invention provides a microgrid self-triggering control method and system for resisting FDI attacks, which achieves a distributed secondary control target of the microgrid even under the FDI attacks, quickly detects and eliminates the injected malicious data, and protects the distributed secondary control communication network of the microgrid. Meanwhile, the present invention significantly reduces the computing and communication burden of a controller, effectively ensures the stable operation of the microgrid.


In order to achieve the above objective, the present invention adopts the following technical solutions.


A microgrid self-triggering control method for resisting FDI attacks includes the following steps:

    • S1: adopting primary control based on droop control for the microgrid;
    • S2: designing a secondary control strategy of the microgrid, which includes frequency recovery and fair distribution of active power; and
    • S3: designing a microgrid distributed self-triggering control method of a hash encryption method after considering the condition that the FDI attacks are injected into a secondary control communication link, so as to resist false malicious data in the microgrid and achieve secondary control.


Preferably, the control method further includes the following step:

    • S4: performing verification by a Lyapunov stability method and a simulation experiment.


Preferably, in the S1, the microgrid adjusts output of each distributed generation by adopting a primary control strategy based on droop control to so as to achieve rapid balance between load and output power in the microgrid.


Preferably, the S2 includes the following steps:

    • for the frequency recovery, recovering the frequency setting of the microgrid by adopting a local PI control method; and
    • for the fair distribution of active power, setting an active power self-triggering controller for each distributed generation i in the microgrid, and achieving the fair distribution of active power through the active power self-triggering controller.


Preferably, the S3 includes the following steps:

    • S31: the distributed generation performs hash transformation on the active power value to be transmitted to obtain a corresponding self hash transformation value and sends the hash transformation value to an adjacent distributed generation;
    • S32: after the adjacent distributed generation receives corresponding data packet, the adjacent distributed generation performs hash transformation on the received active power value to obtain a corresponding received hash transformation value; and
    • S33: the adjacent distributed generation judges the self hash transformation value and the received hash transformation value, if the two hash values are not equal, the distributed generation is judged to suffer from the FDI attacks, and otherwise, the distributed generation is not attacked by the FDI attacks.


Preferably, in the S33, when FDI attacks occur, the received hash transformation value is not used, but an active power value before the transformation is used.


The present invention further provides a control system using the microgrid self-triggering control method for resisting FDI attacks according to any one of aspects, which includes:

    • a primary control module, configured to adjust output of each distributed generation in the microgrid by applying a droop control strategy so as to achieve rapid balance between load and output power in the microgrid;
    • a secondary control module, configured to design a secondary control strategy of the microgrid, which includes frequency recovery and fair distribution of active power; and
    • an attack module, configured to design a microgrid distributed self-triggering control method of a hash encryption method after considering the condition that the FDI attacks are injected into a secondary control communication link, so as to resist false malicious data in the microgrid and achieve secondary control.


Preferably, the control system further includes:

    • a verification module, configured to perform verification by applying a Lyapunov stability method and a simulation experiment.


It can be known from the technical solutions that, compared with the prior art, the present invention provides a microgrid self-triggering control method and system for resisting FDI attacks, and has the following beneficial effects.


(1) The present invention designs a distributed self-triggering control strategy and system for resisting FDI attacks based on a hash encryption algorithm on the basis of the traditional distributed time-triggering-based control strategy. Firstly, the distributed self-triggering control strategy is designed to enable the controller to trigger only when a triggering condition is met, and the computing and communication burden of the controller is significantly reduced. Moreover, the hash encryption algorithm is designed, so that the distributed secondary control target of the microgrid can be achieved even under the FDI attacks, and the stable operation of the microgrid is effectively ensured.


(2) It is proved from the Lyapunov stability theory and simulation experiments that the control method of the present invention can still achieve the distributed secondary control target of the microgrid even under the FDI attacks, and achieve frequency recovery and fair distribution of active power.


In conclusion, compared with the traditional distributed control strategy based on time triggering, the present invention significantly reduces the computing and communication burden of the controller, and achieves safe and stable operation of the microgrid under the FDI attacks; in addition, the improved self-triggering control strategy is also applicable to various FDI attacks.





BRIEF DESCRIPTION OF THE DRAWINGS

The patent or application file contains at least one drawing executed in color. Copies of this patent or patent application publication with color drawing(s) will be provided by the Office upon request and payment of the necessary fee.


To more clearly illustrate the technical solutions in the embodiments of the present invention or in the prior art, the drawings required to be used in the description of the embodiments or the prior art are briefly introduced below. It is obvious that the drawings in the description below are merely embodiments of the present invention, and those of ordinary skill in the art can obtain other drawings according to the drawings provided without creative efforts.



FIG. 1 is an overall flowchart of a microgrid self-triggering control method for resisting FDI attacks provided in the present invention;



FIG. 2 is a block diagram of a structural principle of a microgrid self-triggering control system for resisting FDI attacks provided in the present invention;



FIG. 3 is a structural diagram of an islanded microgrid test system provided in Embodiment 2 of the present invention;



FIG. 4A is a schematic diagram of output frequencies of distributed generations using a traditional control strategy based on time triggering under FDI attacks provided in Embodiment 2 of the present invention;



FIG. 4B is a schematic diagram of output active powers of distributed generations using a traditional control strategy based on time triggering under FDI attacks provided in Embodiment 2 of the present invention;



FIG. 5A is a schematic diagram of output frequencies of distributed generations using a control strategy of the present invention under FDI attacks provided in Embodiment 2 of the present invention; and



FIG. 5B is a schematic diagram of output active powers of distributed generations using a control strategy of the present invention under FDI attacks provided in Embodiment 2 of the present invention.





DETAILED DESCRIPTION OF THE EMBODIMENTS

The following clearly and completely describes the technical solutions in the embodiments of the present invention with reference to drawings in the embodiments of the present invention. It is clear that the described embodiments are merely a part rather than all of the embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.


Embodiment 1

As shown in FIG. 1, Embodiment 1 of the present invention discloses a microgrid self-triggering control method for resisting FDI attacks, which includes the following steps:

    • S1: adopting primary control based on droop control for the microgrid;
    • S2: designing a secondary control strategy of the microgrid, which includes frequency recovery and fair distribution of active power; and
    • S3: designing a microgrid distributed self-triggering control method of a hash encryption method after considering the condition that the FDI attacks are injected into a secondary control communication link, so as to resist false malicious data in the microgrid and achieve secondary control.


In a specific embodiment, the control method further includes the following step:

    • S4: performing verification by a Lyapunov stability method and a simulation experiment.


In a specific embodiment, in the S1, the microgrid adjusts output of each distributed generation by adopting a primary control strategy based on droop control to so as to achieve rapid balance between load and output power in the microgrid.


In a specific embodiment, the S2 includes the following steps:

    • for the frequency recovery, recovering the frequency setting of the microgrid by adopting a local PI control method; and
    • for the fair distribution of active power, setting an active power self-triggering controller for each distributed generation i in the microgrid, and achieving the fair distribution of active power through the active power self-triggering controller.


In a specific embodiment, the S3 includes the following steps:

    • S31: the distributed generation performs hash transformation on the active power value to be transmitted to obtain a corresponding self hash transformation value and sends the hash transformation value to an adjacent distributed generation;
    • S32: after the adjacent distributed generation receives corresponding data packet, the adjacent distributed generation performs hash transformation on the received active power value to obtain a corresponding received hash transformation value; and
    • S33: the adjacent distributed generation judges the self hash transformation value and the received hash transformation value, if the two hash values are not equal, the distributed generation is judged to suffer from the FDI attacks, and otherwise, the distributed generation is not attacked by the FDI attacks.


In a specific embodiment, in the S33, when FDI attacks occur, the received hash transformation value is not used, but an active power value before the transformation is used.


Referring to FIG. 2, Embodiment 1 of the present invention further provides a control system using the microgrid self-triggering control method for resisting FDI attacks according to any one of the above embodiments, which includes:

    • a primary control module, configured to adjust output of each distributed generation in the microgrid by applying a droop control strategy so as to achieve rapid balance between load and output power in the microgrid;
    • a secondary control module, configured to design a secondary control strategy of the microgrid, which includes frequency recovery and fair distribution of active power; and
    • an attack module, configured to design a microgrid distributed self-triggering control method of a hash encryption method after considering the condition that the FDI attacks are injected into a secondary control communication link, so as to resist false malicious data in the microgrid and achieve secondary control.


In a specific embodiment, the control system further includes:

    • a verification module, configured to perform verification by applying a Lyapunov stability method and a simulation experiment.


Embodiment 2

The detailed process of specifically applying the method provided in Embodiment 1 includes the following steps.


Step 1: the microgrid adjusts output of each distributed generation in the microgrid by adopting a primary control strategy based on droop control to achieve rapid balance between load and output power in the microgrid, the frequency-active power is taken as an example, and the specific expression of the droop control is as follows:

ωini−mpiPi  (1)

    • wherein ωi and ωni are the output frequency and the frequency set point of the distributed generation i, Pi is a terminal active power of the distributed generation i, and mpi is a ω-p control droop coefficient of the distributed generation i.


Step 2: a corresponding microgrid distributed secondary control strategy is designed, wherein the distributed secondary control strategy includes frequency recovery and fair distribution of active power, specifically, (1) for the frequency recovery, the voltage and the frequency of each distributed generation are recovered to reference values by adopting local PI control; (2) for the fair distribution of active power, firstly, an active power self-triggering controller based on a linear clock is designed for each distributed generation, so that the controller is triggered only when the condition is met, fair distribution of the active power according to the capacity of each distributed generation is achieved, and the specific process includes as follows:

    • the distributed secondary control target of the microgrid is specifically as follows:











lim

t







"\[LeftBracketingBar]"



ω
i

-

ω
ref




"\[RightBracketingBar]"



=
0




(
2
)









m
p1
P
i
= . . . =m
pn
P
n  (3)

    • wherein i=1, 2, . . . n; and ωref is the reference frequency.


For the frequency recovery, a frequency set point ωni is adjusted by adopting a local PI control so as to recover the voltage and the frequency of each distributed generation to a reference value, wherein a specific expression of the frequency set point ωni is as follows:

ωini+uωi+uPi−mpiPi  (4)


wherein uωi is frequency control input, and uPi is active power control input.


A specific expression of recovering the frequency of each distributed generation by adopting the local PI control is as follows:

uωi=−kPi−ωref)−kI∫(ωi−ωref)dt  (5)

    • wherein ωref is reference frequency, kP and kI are proportional and integral coefficients of a local PI controller, respectively.


For active power distribution, a specific expression of designing the active power control input uPi is as follows:










u

P

i


=


-

k
P







j


N
i





a

i

j


(



m

p

i




P
i


-


m

p

j




P
j



)







(
6
)









    • wherein kP>0 is an active power control gain, and Ni is a neighbor set of the distributed generation i.





It can be seen that the traditional active power control strategy is periodic sampling communication, which inevitably increases the waste of communication and computing resources. Therefore, in this embodiment, a specific expression of performing aperiodic triggering by designing the distributed active power self-triggering controller is as follows:









{






m

p

i





P
˙

i


=


u

p

i


=




j


N
i




u

i

j












u
.


i

j


=
0








θ
˙


i

j


=

-
1









(
7
)









    • wherein mpP is an active power state variable of the distributed generation i, uij∈{−γ,0,γ} is a local active power control input of the distributed generation i and a distributed generation j, and θij is a clock variable on a communication link (i, j)∈E.





A specific expression of defining a trigger rule of the active power self-triggering controller is as follows:

    • wherein when θij reaches 0, the distributed generation i obtains active power state information of the distributed generation j, then the active power control input uij and the clock variable θij are correspondingly updated.


A specific expression of an active power difference medij(t) between the distributed generation i and the distributed generation j at the moment t is as follows:

medij(t)=mpjPj(t)−mpiPi(t)  (8)


Correspondingly, a specific expression of an update rule for designing the active power control input uij is as follows:












u

i

j


(

t
+

)

=



{





sign
ε

(


med
ij

(
t
)

)





if




"\[LeftBracketingBar]"



med
ij

(
t
)



"\[RightBracketingBar]"




ε







u
ij

(
t
)



otherwise








(
9
)









    • wherein signε(medij(t)) meets the following formula:














sign
ε

(


med

i

j


(
t
)

)

=

{




γ


sign

(


med
ij

(
t
)

)






if




"\[LeftBracketingBar]"



med
ij

(
t
)



"\[RightBracketingBar]"




ε





0


otherwise








(
10
)









    • wherein sign (x) is a sign function, γ>0 is a constant, and ε>0 is a preset active power error.





An update rule for designing the clock variable θij is as follows:












θ

i

j


(

t
+

)

=



{





f
ij

(


m
pi




P
i

(
t
)


)





if




"\[LeftBracketingBar]"



med
ij

(
t
)



"\[RightBracketingBar]"




ε







θ
ij

(
t
)



otherwise








(
11
)









    • wherein fij (mpiPi(t)) may be specifically represented as:















f

i

j


(


m

p

i





P
i

(
t
)


)

=



{







"\[LeftBracketingBar]"


med
ij



"\[RightBracketingBar]"



2


γ

(


d
i

+

d
j


)







if




"\[LeftBracketingBar]"



med
ij

(
t
)



"\[RightBracketingBar]"




ε






ε

2


γ

(


d
i

+

d
j


)





otherwise








(
12
)









    • correspondingly, the trigger moment of the active power self-triggering controller is defined as:

      tk+1ij=tkij+fij(mpiPi(tkij))  (13)





wherein tki is a kth triggering moment of the active power self-triggering controller of distributed generation i.


Therefore, the fair distribution of the active power is achieved by properly designing the distributed active power self-triggering controller.


Step 3: a microgrid distributed self-triggering control strategy is designed based on a hash encryption algorithm, so that the microgrid can still achieve a distributed secondary control target even under the FDI attacks. Firstly, the designing of a hash encryption algorithm is specifically as follows:

    • performing hash transformation on each active power value to be transmitted, which is specifically expressed as:

      H(Bij)=Bij<<3  (14)
    • wherein Bpj is a binary value of the active power Pj, and H (Bpj) is a binary value of Bpj shifted to the left by 3 bits; and therefore, the hash transformation of the active power Pj is represented as: Pj→Hj.


The designing of a microgrid distributed self-triggering control strategy for resisting FDI attack based on a hash encryption algorithm is as follows:

    • each distributed generation sends its own active power value and the corresponding hash transformation value to the adjacent distributed generation. When receiving the corresponding data packet, the adjacent distributed generation performs hash transformation on the received active power value, and compares the received hash transformation value with a hash value obtained after the hash transformation is performed on the received hash transformation value, and if the two hash values are not equal, the FDI attack signal is detected to be received. A distributed generation i is taken as an example, which is specifically designed as follows:
    • the distributed generation j sends its own active power value Pj and a corresponding hash transformation value Hj to the distributed generation i, which is represented as (Pj,Hj). When the distributed generation i receives the active power value Pj′ of the distributed generation j, the hash transformation is performed to obtain a hash value Hj′. If Hj′=Hj, it indicates that the communication link does not suffer from the FDI attacks, and otherwise, the communication link suffers from the FDI attacks. The strategy achieves the secondary control target of the microgrid under the FDI attacks.


Step 4: it is proved from the Lyapunov stability theory and simulation experiments that the control method of the present invention can still achieve the distributed secondary control target of the microgrid even under the FDI attacks.


For any t>0 and γ>0, the Lyapunov function V (t) is defined as:










V

(
t
)

=




1
2

[


m
p



P

(
t
)


]

T

[


m
p



P

(
t
)


]





(
15
)









    • wherein mpP(t)=[mp1P1(t), . . . , mpnPn(t)]T, V(t)>0 is noted.





The formula (15) is derived to obtain:











V
.

(
t
)

=





1
2

[


m
pi





P
.

i

(
t
)


]

T

[


m
pi




P
i

(
t
)


]

+




1
2

[


m
pi





P
.

i

(
t
)


]

T

[


m
pi





P
.

i

(
t
)


]






(
16
)







The formulas (9), (10) and (11) are substituted into the formula (16) to obtain:











V
.

(
t
)

=





i
=
1

n



m
pi




P
i

(
t
)




u
ij

(
t
)



=





i
=
1

n



m
pi




P
i

(
t
)




sign


ε


(


med
ij

(
t
)

)



=


-
γ





A




med
ij

(
t
)



sign

(


med
ij

(

t
k
ij

)

)










(
17
)









    • wherein A={|medij(tkij)|≥ε, ∀(i, j)∈E}.





For t∈[tkij,tk+1ij), if medij(tkij)≥ε, the derivation is performed to obtain:












m
pj




P
j

(
t
)


-


m

p

i





P
i

(
t
)







m
pj




P
j

(

t
k
ij

)


-


m
pi




P
i

(

t
k
ij

)


-


γ

(


d
i

+

d
j


)



(

t
-

t
k
ij


)






m

e



d

i

j


(

t
k
ij

)


2





(
18
)







Correspondingly, if medij(tkij)≤−ε, the derivation is performed to obtain:












m

p

j





P
j

(
t
)


-


m

p

i





P
i

(
t
)






m

e



d

i

j


(

t
k

i

j


)


2





(
19
)







Therefore, if |medij(tkij)≥ε, the following can be obtained:












med

i

j


(
t
)




sign
ε

(


med

i

j


(

t
k

i

j


)

)


=




med

i

j


(
t
)




sign
ε

(


med

i

j


(
t
)

)


=



"\[LeftBracketingBar]"



med

i

j


(
t
)



"\[RightBracketingBar]"







(
20
)







The following is obtained:












"\[LeftBracketingBar]"



med
ij

(
t
)



"\[RightBracketingBar]"







"\[LeftBracketingBar]"




m
pj




P
j

(

t
k
ij

)


-


m
pi




P
i

(

t
k
ij

)





"\[RightBracketingBar]"


-


γ

(


d
i

+

d
j


)



(

t
-

t
k
ij


)






|


med
ij

(

t
k
ij

)

|

2





(
21
)







Combined with the formulas (18) and (19), the formula (16) can be written as:










V

(
t
)




-
γ





A





"\[LeftBracketingBar]"



med
j

(

t
k
ij

)



"\[RightBracketingBar]"


2






-
γ





A


ε
2







(
22
)







Since γ>0, {dot over (v)}(t) is strictly negative semidefinite.


The proof is complete.


In a specific application, the islanded microgrid test system is shown in FIG. 3, and system parameters are shown in Table 1.









TABLE 1







Parameters of islanded microgrid test system










DG1&2 (10.64 kW)
DG3&4 (8.0 kW)














Distributed
mp
nq
mp
nq


generation
9.4 × 10−5
   2 × 10−4
 12.5 × 10−5
  2 × 10−4



Rc
Lc
Rc
Lc



0.2
   3 × 10−3
0.2
  3 × 10−3










Line
Line 1
Line 2
Line 3














RLine1
LLine1
RLine2
LLine2
RLine3
LLine3



0.23
0.318 × 10−3
0.35
1.847 × 10−3
0.23
0.318 × 10−3









Load
Load 1
Load 2












PLoad1
QLoad1
PLoad2
QLoad2



10 × 103
 15 × 103
15.6 × 103
7.6 × 103









To verify the effectiveness of the proposed microgrid distributed self-triggering control strategy for resisting FDI attack based on the hash encryption algorithm, the simulation process is designed as follows:


1) t=0 s, the microgrid enters an island operation mode;


2) t=1 s, the distributed self-triggering control strategy of the microgrid for resisting FDI attacks based on the hash encryption algorithm is applied;


3) t=2 s, load 1 increases the load by 3 kW;


4) t=3.5 s, the random FDI attacks are injected to the communication link; and


5) t=4.5 s, DG1 increases the load by 3 kW.


The total simulation time is 7 s; wherein the self-triggering controller parameter kω=40, and the frequency reference value ωref=50 Hz.


The experimental screenshots are as follows:


(1) FIG. 4A and FIG. 4B respectively show the frequency and active power of each distributed generation under the conventional control method. During 0 s to 1 s, the output frequency of each distributed generation is below 50 Hz using the droop control strategy. When t=1 s, the frequency of each distributed generation is restored to 50 Hz by applying the traditional distributed secondary control strategy based on time triggering, and meanwhile, fair distribution of active power is achieved. The performance verifies the effectiveness of the provided microgrid distributed self-triggering control strategy. However, when t=3.5 s, random FDI attacks are injected into the communication link, the frequency of each distributed generation deviates from the reference value again, and even oscillation occurs, so that it is of practical significance to design an effective control strategy to resist the FDI attacks.


(2) FIG. 5A and FIG. 5B respectively show schematic diagrams of the frequency and the active power of each distributed generation under the microgrid distributed self-triggering control strategy for resisting FDI attacks based on the hash encryption algorithm. It can be seen from the figure that even if the FDI attacks exist, the frequency of each distributed generation is still stabilized at the reference value by applying the strategy for resisting the FDI attacks provided in the present invention, and the fair distribution of the active power is achieved. The control method provided in the present invention can still achieve the distributed secondary control target of the microgrid even under the FDI attacks.


The embodiments in the specification are all described in a progressive manner, and each embodiment focuses on differences from other embodiments, and portions that are the same and similar between the embodiments may be referred to each other. Since the apparatus disclosed in the embodiment corresponds to the method disclosed in the embodiment, the description is relatively simple, and reference may be made to the partial description of the method.


The above description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the present invention. Thus, the present invention is not intended to be limited to these embodiments shown herein but is to be accorded the broadest scope consistent with the principles and novel features disclosed herein.

Claims
  • 1. A microgrid self-triggering control method for resisting false data injection (FDI) attacks, wherein the microgrid self-triggering control method is performed by a control system of a microgrid containing electronic circuitries, and the method comprises the following steps: S1: adopting a primary control based on a droop control for the microgrid;S2: generating a secondary control strategy of the microgrid, wherein the secondary control strategy comprises a frequency recovery and a distribution of an active power; wherein the S2 comprises the following steps: for the frequency recovery, recovering a frequency setting of the microgrid by adopting a local proportional-integral (PI) control method; andfor the distribution of the active power, setting an active power self-triggering controller for each distributed generation i in the microgrid, wherein each of the distributed generation i represents a distributed power in the microgrid, and achieving the distribution of the active power through the active power self-triggering controller, wherein a distributed secondary control target of the microgrid is as follows:
  • 2. The microgrid self-triggering control method for resisting the FDI attacks according to claim 1, further comprising the following step: S4: performing a verification by a Lyapunov stability method and a simulation experiment.
  • 3. The microgrid self-triggering control method for resisting the FDI attacks according to claim 1, wherein in the S1, the microgrid adjusts an output of each distributed generation by adopting a primary control strategy based on the droop control to achieve a rapid balance between a load and an output power in the microgrid.
  • 4. The microgrid self-triggering control method for resisting the FDI attacks according to claim 1, wherein in the S33, when the FDI attacks occur, the corresponding received hash transformation value is not used, but an active power value before the transformation is used.
  • 5. A control system using the microgrid self-triggering control method for resisting the FDI attacks according to claim 1, comprising: a primary control circuitry, configured to adjust an output of each distributed generation in the microgrid by applying a droop control strategy to achieve a rapid balance between a load and an output power in the microgrid;a secondary control circuitry, configured to design the secondary control strategy of the microgrid, wherein the secondary control strategy comprises the frequency recovery and the distribution of the active power; andan attack circuitry, configured to design the microgrid distributed self-triggering control method of the hash encryption method after considering the condition that the FDI attacks are injected into the secondary control communication link to resist the false malicious data in the microgrid and achieve the secondary control.
  • 6. The control system according to claim 5, further comprising: a verification circuitry, configured to perform a verification by applying a Lyapunov stability method and a simulation experiment.
  • 7. The control system according to claim 5, wherein the microgrid self-triggering control method further comprises the following step: S4: performing a verification by a Lyapunov stability method and a simulation experiment.
  • 8. The control system according to claim 5, wherein in the S1 of the microgrid self-triggering control method, the microgrid adjusts the output of each distributed generation by adopting a primary control strategy based on the droop control to achieve the rapid balance between the load and the output power in the microgrid.
  • 9. The control system according to claim 5, wherein in the S33 of the microgrid self-triggering control method, when the FDI attacks occur, the corresponding received hash transformation value is not used, but an active power value before the transformation is used.
Priority Claims (1)
Number Date Country Kind
202311101885.X Aug 2023 CN national
US Referenced Citations (7)
Number Name Date Kind
10305932 Hong May 2019 B2
11593479 Sarwat Feb 2023 B1
20180024900 Premerlani Jan 2018 A1
20190113549 Nakayama Apr 2019 A1
20200036748 Tebekaemi et al. Jan 2020 A1
20200106301 Hong Apr 2020 A1
20220342435 Qi Oct 2022 A1
Foreign Referenced Citations (5)
Number Date Country
110474892 Nov 2019 CN
112701723 Apr 2021 CN
114336674 Apr 2022 CN
115225305 Oct 2022 CN
116094769 May 2023 CN
Non-Patent Literature Citations (1)
Entry
Pengcheng Cai, et al., Secondary Frequency Control of Islanded Microgrids Based on Ratio Consensue Algorithm, Acta Energiae Solaris Sinica, 2020, pp. 74-81, vol. 41 No. 10.