咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Detection and Estimation of Fa... 收藏

Detection and Estimation of False Data Injection Attacks for Load Frequency Control Systems

Detection and Estimation of False Data Injection Attacks for Load Frequency Control Systems

作     者:Jun Ye Xiang Yu Jun Ye;Xiang Yu

作者机构:Hangzhou Innovation InstituteBeihang UniversityHangzhouChina School of Automation Science and Electrical EngineeringBeihang UniversityBeijingChina 

出 版 物:《Journal of Modern Power Systems and Clean Energy》 (现代电力系统与清洁能源学报(英文))

年 卷 期:2022年第10卷第4期

页      面:861-870页

核心收录:

学科分类:0808[工学-电气工程] 080802[工学-电力系统及其自动化] 08[工学] 0839[工学-网络空间安全] 0802[工学-机械工程] 0811[工学-控制科学与工程] 080201[工学-机械制造及其自动化] 

基  金:This work was supported by the National Natural Science Foundation of China(No.61833013) Key Research and Development Project of Zhejiang Province(No.2021C03158). 

主  题:External disturbance false data injection attacks load frequency control robust adaptive observer unknown input observer 

摘      要:False data injection attacks(FDIAs)against the load frequency control(LFC)system can lead to unstable operation of power systems.In this paper,the problems of detecting and estimating the FDIAs for the LFC system in the presence of external disturbances are investigated.First,the LFC system model with FDIAs against frequency and tie-line power measurements is established.Then,a design procedure for the unknown input observer(UIO)is presented and the residual signal is generated to detect the FDIAs.The UIO is designed to decouple the effect of the unknown external disturbance on the residual signal.After that,an attack estimation method based on a robust adaptive observer(RAO)is proposed to estimate the state and the FDIAs simultaneously.In order to improve the performance of attack estimation,the H¥technique is employed to minimize the effect of external disturbance on estimation errors,and the uniform boundedness of the state and attack estimation errors is proven using Lyapunov stability theory.Finally,a two-area interconnected power system is simulated to demonstrate the effectiveness of the proposed attack detection and estimation algorithms.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分