DC microgrids often present a hierarchical control architecture, requiring integration of communication layers. This leads to the possibility of malicious attackers disrupting the overall system. Motivated by this application, in this paper we present a distributed monitoring scheme to provide attackdetection capabilities for linear Large-Scale Systems. The proposed architecture relies on a Luenberger observer together with a bank of Unknown-Intput Observers (UIOs) at each subsystem, providing attack detection capabilities. We describe the architecture and analyze conditions under which attacks are guaranteed to be detected, and, conversely, when they are stealthy. Our analysis shows that some classes of attacks cannot be detected using either module independently; rather, by exploiting both modules simultaneously, we are able to improve the detection properties of the diagnostic tool as a whole. Theoretical results are backed up by simulations, where our method is applied to a realistic model of a low-voltage DC microgrid under attack.
The paper considers the problem of detecting cyber-attacks occurring in communication networks typically used in the secondary control layer of DC microgrids. The proposed distributed methodology allows for scalable monitoring of a microgrid and is able to detect the presence of data injection attacks in the communications among Distributed Generation Units (DGUs)-governed by consensus-based control-and isolate the communication link over which the attack is injected. Each local attack detector requires limited knowledge regarding the dynamics of its neighbors. Detectability properties of the method are analyzed, as well as a class of undetectable attacks. Some results from numerical simulation are presented to demonstrate the effectiveness of the proposed approach.
The problem of replay attacks in the communication network between Distributed Generation Units (DGUs) of a DC microgrid is examined. The DGUs are regulated through a hierarchical control architecture, and are networked to achieve secondary control objectives. Following analysis of the detectability of replay attacks by a distributed monitoring scheme previously proposed, the need for a watermarking signal is identified. Hence, conditions are given on the watermark in order to guarantee detection of replay attacks, and such a signal is designed. Simulations are then presented to demonstrate the effectiveness of the technique.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.