Skip to main navigation Skip to search Skip to main content

Intrusion-detector-dependent distributed economic model predictive control for load frequency regulation with PEVs under cyber attacks

  • School of Astronautics, Harbin Institute of Technology
  • Carleton University
  • School of Electrical Engineering and Automation, Harbin Institute of Technology

Research output: Contribution to journalArticlepeer-review

Abstract

With the participation of a significant number of plug-in electric vehicles (PEVs), it is really challenging to achieve economic-effective in load frequency control (LFC) while sustaining satisfiable system performance. To tackle this challenge, a new distributed economic model predictive control (DEMPC) strategy is proposed for the LFC with the large-scale PEV participation. In the light of the vulnerability of LFC to false data injection (FDI) attacks, a model-based χ2 intrusion detection unit is integrated with the proposed DEMPC. This model-based intrusion detection unit can not only monitor the FDI attacks, but also generate a model-based state prediction for the DEMPC once the data is identified as compromised. Then, an event-triggering mechanism is presented to reduce the computation and communication burdens of each area controller. Simulation studies of a four-area power system are conducted and the results validate the effectiveness of the proposed intrusion detection unit and event-triggering conditions for the DEMPC.

Original languageEnglish
Article number9469777
Pages (from-to)3857-3868
Number of pages12
JournalIEEE Transactions on Circuits and Systems
Volume68
Issue number9
DOIs
StatePublished - Sep 2021
Externally publishedYes

Keywords

  • Distributed economic model predictive control
  • Event-triggering mechanism
  • False data injection attacks
  • Load frequency control
  • Plug-in electric vehicles
  • χ intrusion detection

Fingerprint

Dive into the research topics of 'Intrusion-detector-dependent distributed economic model predictive control for load frequency regulation with PEVs under cyber attacks'. Together they form a unique fingerprint.

Cite this