2022
DOI: 10.1109/access.2022.3145015
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Attack Detection and Countermeasure for Distributed Electric Springs for Smart Grid Applications

Abstract: With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system stability. However, cyber-attacks remain a threat to such distributed control. This paper addresses the cyber-attack detection and a countermeasure of distributed electric springs (ESs) that have emerged as a fast demand-response technology. A fully distributed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 21 publications
(36 reference statements)
0
3
0
Order By: Relevance
“…It has dealt with the issue from the perspective of network protection [33] Reduce the dimension of data in the PMU system via PCA [34] DR modelling via PCA DR Central: Expensive and highly vulnerable-Cannot auto-adapt [5] Distributed fusion Distributed DR by randomized ADMM DR Neglect to investigate the determinants of DR behaviour; Ignored the reduction of the computational dimensions-The method is fully distributed and cannot adjust the cyber security of the power system. It is relatively slow [6] Managing residential DR via ADMM DR [9] Fully distributed optimal operation by considering the uncertainty of DR OPF_DR [10] Distributed DR management DR [11] Distributed state estimator by Kalman filter Control-DR Despite providing a method to deal with cyber-attacks, it has not provided a preventive method [12] Blockchain-based transactive energy management (TEM) system DR-IOT It has dealt with the issue from the perspective of telecommunications and information technology [13] Distribution automation strategies Review [14][15][16][17][18][19] Consensus theory and distributed control method, Lagrangian-based approach and distributed optimization by multi agents EPD Slows down in a large-scale system; Determining the minimum number of agents to ensure the cyber security of the system is not discussed. Neglect the DR [21] Distributed optimization by AHADMM Neglect the DR-Ignored the reduction of computational dimensions [20,[26][27][28][29] Distributed optimization by ADMM Slows down in a large-scale system-The control parameters are fixed and lack adaptability, and the DR not considered [22] Distributed optimization over time-varying directed graphs by DGDM…”
Section: Network Protectionmentioning
confidence: 99%
See 1 more Smart Citation
“…It has dealt with the issue from the perspective of network protection [33] Reduce the dimension of data in the PMU system via PCA [34] DR modelling via PCA DR Central: Expensive and highly vulnerable-Cannot auto-adapt [5] Distributed fusion Distributed DR by randomized ADMM DR Neglect to investigate the determinants of DR behaviour; Ignored the reduction of the computational dimensions-The method is fully distributed and cannot adjust the cyber security of the power system. It is relatively slow [6] Managing residential DR via ADMM DR [9] Fully distributed optimal operation by considering the uncertainty of DR OPF_DR [10] Distributed DR management DR [11] Distributed state estimator by Kalman filter Control-DR Despite providing a method to deal with cyber-attacks, it has not provided a preventive method [12] Blockchain-based transactive energy management (TEM) system DR-IOT It has dealt with the issue from the perspective of telecommunications and information technology [13] Distribution automation strategies Review [14][15][16][17][18][19] Consensus theory and distributed control method, Lagrangian-based approach and distributed optimization by multi agents EPD Slows down in a large-scale system; Determining the minimum number of agents to ensure the cyber security of the system is not discussed. Neglect the DR [21] Distributed optimization by AHADMM Neglect the DR-Ignored the reduction of computational dimensions [20,[26][27][28][29] Distributed optimization by ADMM Slows down in a large-scale system-The control parameters are fixed and lack adaptability, and the DR not considered [22] Distributed optimization over time-varying directed graphs by DGDM…”
Section: Network Protectionmentioning
confidence: 99%
“…That is, from the point of view of the structure of calculations for the management of energy resources and DR, the centralized method is mostly used [7,8], or fully distributed computing methods are used [9,10]. Smart grid cyber-security cannot be provided by the fully distributed methods [11]. In addition, the computation method in distributed methods is usually swept step by step (node by node) for the whole system, and if computation parallelization methods are used in all nodes, the processing greatly increases [12].…”
Section: Introductionmentioning
confidence: 99%
“…To overcome this the concept of the switchable smart load was introduced [21] using indirect voltage control. The electric spring does not require, a communication network but with use of a communication network with ES can drastically reduce the power instability [22]. In microgrids for unplanned islanding operations, ES stabilizes the voltage across critical loads [23].…”
Section: Proposed Solutionmentioning
confidence: 99%