Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
License: arXiv.org perpetual non-exclusive license
arXiv:2401.00180v1 [eess.SY] 30 Dec 2023

Auxiliary Network-Enabled Attack Detection and Resilient Control of Islanded AC Microgrid

Vaibhav Vaishnav, , Anoop Jain, , and Dushyant Sharma V. Vaishnav and A. Jain are with the Department of Electrical Engineering, Indian Institute of Technology Jodhpur 342030, India (e-mail: vaishnav.2@iitj.ac.in; anoopj@iitj.ac.in). D. Sharma is with Department of Electrical Engineering, Indian Institute of Technology (Indian School of Mines) Dhanbad 826004, India (e-mail: dushyant@iitism.ac.in).
Abstract

This paper proposes a cyber-resilient distributed control strategy equipped with attack detection capabilities for islanded AC microgrids in the presence of bounded stealthy cyber attacks affecting both frequency and power information exchanged among neighboring distributed generators (DGs). The proposed control methodology relies on the construction of an auxiliary layer and the establishment of effective inter-layer cooperation between the actual DGs in the control layer and the virtual DGs in the auxiliary layer. This cooperation aims to achieve robust frequency restoration and proportional active power-sharing. It is shown that the in situ presence of a concealed auxiliary layer not only guarantees resilience against stealthy bounded attacks on both frequency and power-sharing but also facilitates a network-enabled attack identification mechanism. The paper provides rigorous proof of the stability of the closed-loop system and derives bounds for frequency and power deviations under attack conditions, offering insights into the impact of the attack signal, control and pinning gains, and network connectivity on the system’s convergence properties. The performance of the proposed controllers is illustrated by simulating a networked islanded AC microgrid in a Simulink environment showcasing both attributes of attack resilience and attack detection.

Index Terms:
AC microgrids, cyber-security, network-enabled attack detection, resilient control, stealthy attacks.

I Introduction

Distributed control has been the most widely adopted strategy over the past decade to exercise frequency and voltage control of islanded AC microgrids [1]. The cooperation among the DGs in a microgrid relies on local information exchange over a sparse communication network, which is vulnerable to cyber attacks [2]. Such attacks, commonly known as false data injection (FDI) attacks, jeopardize the integrity of information transmitted across communication channels and have garnered significant attention in resilient microgrid control [3]. A trust factor-based control regime was proposed in [4] to synchronize the frequencies of DGs under attack, by real-time monitoring of a confidence factor associated with all the neighboring DGs. Wang et al.[5] proposed cyber-resilient adaptive controllers for frequency and voltage restoration with active/reactive power-sharing in networked AC/DC microgrids. These controllers utilize time-varying adaptive gains based on frequency, voltage, and power errors. An auxiliary state was introduced in [6] to make conventional distributed frequency consensus protocol cyber resilient and maintain frequency synchronization and proportional active power-sharing. Recently, [7] proposed attack magnitude-dependent time-variant communication weights, to implement an adaptive frequency regulation strategy using the most optimal communication channels in the presence of multiple link attacks.

Apart from incorporating cyber resilience in the control framework, topology switching induced by different types of attack detection techniques has been the other counterpart of attack mitigation strategies in microgrid control. These techniques can be further classified into (a) system-based [8, 9, 10] and (b) data-based approaches [11, 12], where the states of system under consideration are continuously estimated using an observer in (a), while historical training data is used for attack detection for redundancy in (b). To the best of the authors’ knowledge, the concepts of attack resilience and attack detection have often been addressed separately in the microgrid control literature. Therefore, designing a suitable distributed control framework together with resilience and detection capabilities is a crucial research direction for ensuring the safety and security of microgrid control.

In recent times, cyber adversaries have evolved to employ increasingly sophisticated and deceptive stealthy attacks [13] that might be challenging to ascertain using novel detection strategies like [8, 9, 10, 11, 12]. Equipped with the complete knowledge of dynamics and control architecture of the system, the attacks are now specifically designed as bounded intermittent disturbances with state-dependent linear/nonlinear dynamics [13, 14] which can easily deceive state observers and showcase zero neighborhood error, even when the neighboring DGs are out of synchronization [15]. In view of such bounded stealthy attacks, a virtual hidden layer-based cyber resilient framework was proposed in [16] for distributed control of networked systems. Motivated by [16], in this paper, we propose auxiliary virtual network-enabled distributed resilient control for frequency synchronization and proportional active power-sharing among a group of inverter-based DGs.

Distributed controllers adopting the aforementioned idea of the virtual layer have been previously developed in [17, 18, 19, 20], addressing the problem of frequency synchronization in microgrids. However, these works do not emphasize the need for a dedicated power controller that can provide resilience against any possible attack on power-sharing between neighboring DGs. The distributed secondary controllers in [17, 18, 19, 20] are devised to provide a frequency set point to the droop-based primary control which depends on the inherent linear relationship between frequency and active power [21]. However, any FDI attack affecting the sharing of active power can significantly hamper system frequency and lead to deviations in power demand beyond the rated values of the respective DGs. Therefore, a resilient power controller is obligatory for preserving the resilience of the frequency controller against cyber attacks. Motivated by this fact, in this paper, we design resilient frequency and power controllers capable of functioning in the presence of simultaneous attacks on both frequency and active power within a microgrid.

It is also evident to mention that the stability under proposed controllers in [16, 17, 19, 20] is leveraged by assumptions on the magnitude of resilient control gain and inclusion of attack vector in the Lyapunov candidate function. However, considering that a cyber attack is an external breach that is completely unknown to both the system and the control engineer, establishing the closed-loop stability of a cyber-resilient control system relying solely on the state dynamics of the system appears to be a more practical and mathematically viable approach. Further, the control architecture inclusive of an auxiliary layer hidden from the attacker provides an alternate safeguarded path for communication among neighboring DGs, thereby giving a provision to compare and detect any discrepancy in information being shared through the actual cyber layer. Leveraging this, we propose a straightforward test for detecting an attack, as compared to the works [17, 18, 19, 20]. In the light of above discussion, the major contributions of this paper can be summarized as follows:

  1. i)

    Relying on an auxiliary layer, we propose frequency and power-distributed controllers as leader-follower and leaderless resilient cooperative systems, respectively, for frequency regulation and proportional active power-sharing in an islanded AC microgrid, under the presence of FDI attacks affecting both frequency and power-sharing between the neighboring DGs. The FDI attacks are uniformly bounded and governed by the dynamics having finite 2subscript2\mathcal{L}_{2}caligraphic_L start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT gain.

  2. ii)

    Due to the difference in the nature of cooperation and distributed consensus protocols, we provide separate stability analyses under frequency and power attacks and obtain analytical bounds characterizing the deviations of frequency and power from their steady-state value under no-attack conditions. It is shown that these bounds depend on the underlying network topology, the magnitude of the attack signals, pinning gain and a gain term decided by the control designer.

  3. iii)

    As a byproduct of auxiliary layer-based control design, we propose a network-enabled attack detection mechanism showcasing secured propagation of control variables between the cyber and auxiliary layer, thereby devising a detection test for surveillance of any possible attack in the cyber layer.

Additionally, an extensive simulation study is presented under the simultaneous presence of both cyber attacks and load perturbations. The remnant of this paper is arranged as follows: Section I commences with an introduction, summarizing mathematical preliminaries and a brief review of secondary droop control. Section II describes system architecture and attack model and formulates the problem. Section III proposes a resilient frequency controller and obtains various bounds characterizing the effect of attack and network connectivity on the steady-sate frequency error. The philosophy behind resilient power controllers is discussed under Section IV. Section V explains the auxiliary network-enabled attack identification scheme and proposes a generalized test for detecting the attacks. Lastly, Section VI presents simulation case studies, before concluding the paper in Section VII.

I-A Notations, Graph Theory, and Mathematical Preliminaries

Throughout the paper, \mathbb{R}blackboard_R denotes the set of real numbers, and 𝟎n=[0,,0]Tn,𝟏n=[1,,1]Tnformulae-sequencesubscript𝟎𝑛superscript00𝑇superscript𝑛subscript𝟏𝑛superscript11𝑇superscript𝑛\textbf{{0}}_{n}=[0,\ldots,0]^{T}\in\mathbb{R}^{n},\textbf{{1}}_{n}=[1,\ldots,% 1]^{T}\in\mathbb{R}^{n}0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT = [ 0 , … , 0 ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , 1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT = [ 1 , … , 1 ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT. For x=[x1,,xn]Tn𝑥superscriptsubscript𝑥1subscript𝑥𝑛𝑇superscript𝑛x=[x_{1},\ldots,x_{n}]^{T}\in\mathbb{R}^{n}italic_x = [ italic_x start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_x start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, xnorm𝑥\|x\|∥ italic_x ∥ represents its Euclidean norm. The complex number is represented by jc=1subscript𝑗𝑐1j_{c}=\sqrt{-1}italic_j start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT = square-root start_ARG - 1 end_ARG. The symbol tensor-product\otimes denotes the Kronecker product of two matrices. λ(M)𝜆𝑀\lambda(M)italic_λ ( italic_M ) represents an eigenvalue of any square matrix Mn×n𝑀superscript𝑛𝑛M\in\mathbb{R}^{n\times n}italic_M ∈ blackboard_R start_POSTSUPERSCRIPT italic_n × italic_n end_POSTSUPERSCRIPT, MTsuperscript𝑀𝑇M^{T}italic_M start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT is its transpose and Mnorm𝑀\|M\|∥ italic_M ∥ denotes its operator (or induced) 2-norm such that M=λmax(MTM)norm𝑀subscript𝜆superscript𝑀𝑇𝑀\|M\|=\sqrt{\lambda_{\max}(M^{T}M)}∥ italic_M ∥ = square-root start_ARG italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( italic_M start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT italic_M ) end_ARG, where λmaxsubscript𝜆\lambda_{\max}italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT is the maximum eigenvalue of the symmetric matrix MTMsuperscript𝑀𝑇𝑀M^{T}Mitalic_M start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT italic_M. Consider a network of n𝑛nitalic_n DGs, described as an undirected graph 𝒢=(𝒱,)𝒢𝒱\mathcal{G}=(\mathcal{V},\mathcal{E})caligraphic_G = ( caligraphic_V , caligraphic_E ), with node set 𝒱={1,,n}𝒱1𝑛\mathcal{V}=\{1,\ldots,n\}caligraphic_V = { 1 , … , italic_n } and edge set 𝒱×𝒱𝒱𝒱\mathcal{E}\subset\mathcal{V}\times\mathcal{V}caligraphic_E ⊂ caligraphic_V × caligraphic_V. The information flow between ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT and jthsuperscript𝑗thj^{\text{th}}italic_j start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT nodes can be represented by an undirected edge (i,j)(j,i)𝑖𝑗𝑗𝑖(i,j)\in\mathcal{E}\Leftrightarrow(j,i)\in\mathcal{E}( italic_i , italic_j ) ∈ caligraphic_E ⇔ ( italic_j , italic_i ) ∈ caligraphic_E. The set of neighbors of the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT node is denoted by 𝒩isubscript𝒩𝑖\mathcal{N}_{i}caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = {j:(i,j),ji}conditional-set𝑗formulae-sequence𝑖𝑗𝑗𝑖\{j:(i,j)\in\mathcal{E},j\neq i\}{ italic_j : ( italic_i , italic_j ) ∈ caligraphic_E , italic_j ≠ italic_i }. The adjacency matrix of 𝒢𝒢\mathcal{G}caligraphic_G is denoted by 𝒜𝒜\mathcal{A}caligraphic_A = [aij]n×ndelimited-[]subscript𝑎𝑖𝑗superscript𝑛𝑛[a_{ij}]\in\mathbb{R}^{n\times n}[ italic_a start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT ] ∈ blackboard_R start_POSTSUPERSCRIPT italic_n × italic_n end_POSTSUPERSCRIPT with aij=1(i,j)subscript𝑎𝑖𝑗1𝑖𝑗a_{ij}=1\Leftrightarrow(i,j)\in\mathcal{E}italic_a start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = 1 ⇔ ( italic_i , italic_j ) ∈ caligraphic_E, else aij=0subscript𝑎𝑖𝑗0a_{ij}=0italic_a start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = 0. The Laplacian matrix of 𝒢𝒢\mathcal{G}caligraphic_G is denoted by L=[ij]n×n𝐿delimited-[]subscript𝑖𝑗superscript𝑛𝑛L=[\ell_{ij}]\in\mathbb{R}^{n\times n}italic_L = [ roman_ℓ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT ] ∈ blackboard_R start_POSTSUPERSCRIPT italic_n × italic_n end_POSTSUPERSCRIPT, where ii=j𝒩iaijsubscript𝑖𝑖subscript𝑗subscript𝒩𝑖subscript𝑎𝑖𝑗\ell_{ii}=\mathcal{\sum}_{j\in\mathcal{N}_{i}}a_{ij}roman_ℓ start_POSTSUBSCRIPT italic_i italic_i end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_j ∈ caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_a start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT and ij=aijsubscript𝑖𝑗subscript𝑎𝑖𝑗\ell_{ij}=-a_{ij}roman_ℓ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = - italic_a start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT for ij𝑖𝑗i\neq jitalic_i ≠ italic_j. For an undirected and connected graph 𝒢𝒢\mathcal{G}caligraphic_G, the eigenvalues of the Laplacian Ln×n𝐿superscript𝑛𝑛L\in\mathbb{R}^{n\times n}italic_L ∈ blackboard_R start_POSTSUPERSCRIPT italic_n × italic_n end_POSTSUPERSCRIPT can be arranged in the ascending order as 0=λ1(L)λ2(L)λn(L)0subscript𝜆1𝐿subscript𝜆2𝐿subscript𝜆𝑛𝐿0=\lambda_{1}(L)\leq\lambda_{2}(L)\leq\cdots\leq\lambda_{n}(L)0 = italic_λ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ( italic_L ) ≤ italic_λ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( italic_L ) ≤ ⋯ ≤ italic_λ start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ( italic_L ). The following lemmas will be useful in the subsequent analysis of this paper:

Lemma 1 ([22], [23]).

Let 𝒢𝒢\mathcal{G}caligraphic_G be an undirected and connected graph with Laplacian Ln×n𝐿superscript𝑛𝑛L\in\mathbb{R}^{n\times n}italic_L ∈ blackboard_R start_POSTSUPERSCRIPT italic_n × italic_n end_POSTSUPERSCRIPT, and B=diag{b1,,bn}n×n𝐵normal-diagsubscript𝑏1normal-…subscript𝑏𝑛superscript𝑛𝑛B={\rm diag}\{b_{1},\ldots,b_{n}\}\in\mathbb{R}^{n\times n}italic_B = roman_diag { italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT } ∈ blackboard_R start_POSTSUPERSCRIPT italic_n × italic_n end_POSTSUPERSCRIPT be a diagonal matrix with diagonal entries bi>0,isubscript𝑏𝑖0for-all𝑖b_{i}>0,\forall iitalic_b start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT > 0 , ∀ italic_i. Then, the matrix L+B𝐿𝐵L+Bitalic_L + italic_B is positive-definite.

Lemma 2 ([24]).

Consider a uniformly bounded signal p(t)Ω,t0formulae-sequencenorm𝑝𝑡normal-Ωfor-all𝑡0\|p(t)\|\leq\Omega,\ \forall t\geq 0∥ italic_p ( italic_t ) ∥ ≤ roman_Ω , ∀ italic_t ≥ 0, where Ωnormal-Ω\Omegaroman_Ω is a positive constant. Then, for a Hurwitz matrix Q𝑄Qitalic_Q, there exists a constant vector Ψnormal-Ψ\Psiroman_Ψ and some finite-time T𝑇Titalic_T such that following holds true for all tT𝑡𝑇t\geq Titalic_t ≥ italic_T:

0teQ(tτ)p(τ)𝑑τ0teQ(tτ)Ψ𝑑τ.normsuperscriptsubscript0𝑡superscripte𝑄𝑡𝜏𝑝𝜏differential-d𝜏normsuperscriptsubscript0𝑡superscripte𝑄𝑡𝜏Ψdifferential-d𝜏\left\|\int_{0}^{t}{\rm e}^{Q(t-\tau)}p(\tau)d\tau\right\|\leq\left\|\int_{0}^% {t}{\rm e}^{Q(t-\tau)}\Psi d\tau\right\|.∥ ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT roman_e start_POSTSUPERSCRIPT italic_Q ( italic_t - italic_τ ) end_POSTSUPERSCRIPT italic_p ( italic_τ ) italic_d italic_τ ∥ ≤ ∥ ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT roman_e start_POSTSUPERSCRIPT italic_Q ( italic_t - italic_τ ) end_POSTSUPERSCRIPT roman_Ψ italic_d italic_τ ∥ .

I-B Distributed Secondary Droop Control

Droop control exploits the linear dependence of frequency on active power, causing the frequency of an inverter-based DG to droop with its output active power [25], according to the relation

ωi=ωoimPiPi,subscript𝜔𝑖subscript𝜔subscript𝑜𝑖subscript𝑚subscript𝑃𝑖subscript𝑃𝑖\omega_{i}=\omega_{o_{i}}-m_{P_{i}}P_{i},italic_ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_ω start_POSTSUBSCRIPT italic_o start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT - italic_m start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , (1)

where ωisubscript𝜔𝑖\omega_{i}italic_ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is angular frequency, ωoisubscript𝜔subscript𝑜𝑖\omega_{o_{i}}italic_ω start_POSTSUBSCRIPT italic_o start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT is the nominal angular frequency, Pisubscript𝑃𝑖P_{i}italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is measured output active power and mPisubscript𝑚subscript𝑃𝑖m_{P_{i}}italic_m start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT is the droop coefficient associated with the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT DG. Due to primary droop control, since the inverter’s frequency undergoes a deviation from its nominal value, a suitable secondary control needs to be designed to restore the frequency of all the inverters to nominal microgrid frequency [21]. This is realized by cooperation among all the DGs at the secondary control level and designing distributed controllers uωi=ω˙isubscript𝑢subscript𝜔𝑖subscript˙𝜔𝑖u_{\omega_{i}}=\dot{\omega}_{i}italic_u start_POSTSUBSCRIPT italic_ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT = over˙ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and uPi=mPiP˙isubscript𝑢subscript𝑃𝑖subscript𝑚subscript𝑃𝑖subscript˙𝑃𝑖u_{P_{i}}=m_{P_{i}}\dot{P}_{i}italic_u start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT = italic_m start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT over˙ start_ARG italic_P end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT for frequency and active power for each i𝑖iitalic_i. Using these, the nominal frequency is obtained from (1) as:

ω˙oi=ω˙i+mPiP˙iωoi=uωi𝑑t+uPi𝑑t,i.formulae-sequencesubscript˙𝜔subscript𝑜𝑖subscript˙𝜔𝑖subscript𝑚subscript𝑃𝑖subscript˙𝑃𝑖subscript𝜔subscript𝑜𝑖subscript𝑢subscript𝜔𝑖differential-d𝑡subscript𝑢subscript𝑃𝑖differential-d𝑡for-all𝑖\dot{\omega}_{o_{i}}=\dot{\omega}_{i}+m_{P_{i}}\dot{P}_{i}\implies\omega_{o_{i% }}=\int u_{\omega_{i}}~{}dt+\int u_{P_{i}}~{}dt,\ \forall i.over˙ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_o start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT = over˙ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_m start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT over˙ start_ARG italic_P end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ⟹ italic_ω start_POSTSUBSCRIPT italic_o start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT = ∫ italic_u start_POSTSUBSCRIPT italic_ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_d italic_t + ∫ italic_u start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_d italic_t , ∀ italic_i . (2)

In the subsequent analysis, we use the vectors ω=[ω1,,ωn]Tn𝜔superscriptsubscript𝜔1subscript𝜔𝑛𝑇superscript𝑛\omega=[\omega_{1},\ldots,\omega_{n}]^{T}\in\mathbb{R}^{n}italic_ω = [ italic_ω start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_ω start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT, P=[P1,,Pn]Tn𝑃superscriptsubscript𝑃1subscript𝑃𝑛𝑇superscript𝑛P=[P_{1},\ldots,P_{n}]^{T}\in\mathbb{R}^{n}italic_P = [ italic_P start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_P start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT and mPP=[mP1P1,,mPnPn]Tnsubscript𝑚𝑃𝑃superscriptsubscript𝑚subscript𝑃1subscript𝑃1subscript𝑚subscript𝑃𝑛subscript𝑃𝑛𝑇superscript𝑛m_{P}P=[m_{P_{1}}P_{1},\ldots,m_{P_{n}}P_{n}]^{T}\in\mathbb{R}^{n}italic_m start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT italic_P = [ italic_m start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_m start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT to represent the frequency, power, and droop-coefficient associated active power for the network of n𝑛nitalic_n DGs.

Refer to caption
Figure 1: Microgrid network and control architecture.

II System Description and Problem Statement

II-A System Description

Consider a microgrid network comprising n𝑛nitalic_n DGs in the physical layer, along with the associated control layer ΣΣ\Sigmaroman_Σ and the auxiliary layer ΠΠ\Piroman_Π, as shown in Fig. 1. Each DG is equipped with individual primary and secondary controllers where frequency ωisubscript𝜔𝑖\omega_{i}italic_ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and active power Pisubscript𝑃𝑖P_{i}italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT are the physical state variables to be controlled for each i𝑖iitalic_i. According to (2), the secondary control generates nominal frequency to the primary droop controller for computing the actual frequency ωisubscript𝜔𝑖\omega_{i}italic_ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT of the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT DG. Consequently, both frequency and the average active power signals of the DGs are shared among them according to the communication network at the control layer ΣΣ\Sigmaroman_Σ for designing frequency and power controllers.

However, owing to the attacker’s knowledge about the control layer, the communication network over ΣΣ\Sigmaroman_Σ is vulnerable to FDI attacks on both frequency and power signals, deviating the system from the desired cooperative control objectives. To account for these attacks, our approach relies on the construction of an auxiliary layer ΠΠ\Piroman_Π and its integration with ΣΣ\Sigmaroman_Σ to assure resiliency toward frequency regulation and proportional active power-sharing. The auxiliary nodes in ΠΠ\Piroman_Π are considered to have their own state dynamics but the same inter-agent interaction network as in ΣΣ\Sigmaroman_Σ. Further, there exists a hidden network connecting the corresponding nodes in ΣΣ\Sigmaroman_Σ and ΠΠ\Piroman_Π (see Fig. 1).

Under an FDI attack, the frequency and power signals received at a particular node in ΣΣ\Sigmaroman_Σ may be different from the one transmitted by the neighboring nodes and can be expressed as:

ωˇij=ωj+δijω,Pˇij=Pj+δijP,j𝒩i{i},formulae-sequencesubscriptˇ𝜔𝑖𝑗subscript𝜔𝑗superscriptsubscript𝛿𝑖𝑗𝜔formulae-sequencesubscriptˇ𝑃𝑖𝑗subscript𝑃𝑗superscriptsubscript𝛿𝑖𝑗𝑃𝑗subscript𝒩𝑖𝑖\check{\omega}_{ij}={\omega}_{j}+\delta_{ij}^{\omega},\quad\check{P}_{ij}={P}_% {j}+\delta_{ij}^{P},\quad j\in\mathcal{N}_{i}\cup\{i\},overroman_ˇ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = italic_ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT + italic_δ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_ω end_POSTSUPERSCRIPT , overroman_ˇ start_ARG italic_P end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = italic_P start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT + italic_δ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_P end_POSTSUPERSCRIPT , italic_j ∈ caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∪ { italic_i } , (3)

where ωˇijsubscriptˇ𝜔𝑖𝑗\check{\omega}_{ij}overroman_ˇ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT is the frequency signal received at node i𝑖iitalic_i from node j𝑗jitalic_j, ωjsubscript𝜔𝑗{\omega}_{j}italic_ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT is the actual frequency of the jthsuperscript𝑗thj^{\text{th}}italic_j start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT DG, and δijωsuperscriptsubscript𝛿𝑖𝑗𝜔\delta_{ij}^{\omega}italic_δ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_ω end_POSTSUPERSCRIPT is the FDI attack affecting the link connecting nodes i𝑖iitalic_i and j𝑗jitalic_j. Similar notations can be defined for Pˇijsubscriptˇ𝑃𝑖𝑗\check{P}_{ij}overroman_ˇ start_ARG italic_P end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT. The total external injection at the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT node can be written as j𝒩i{i}δijω=dωisubscript𝑗subscript𝒩𝑖𝑖superscriptsubscript𝛿𝑖𝑗𝜔subscript𝑑subscript𝜔𝑖\sum_{j\in\mathcal{N}_{i}\cup\{i\}}\delta_{ij}^{\omega}=d_{\omega_{i}}∑ start_POSTSUBSCRIPT italic_j ∈ caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∪ { italic_i } end_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_ω end_POSTSUPERSCRIPT = italic_d start_POSTSUBSCRIPT italic_ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT (resp., for power as j𝒩i{i}δijP=dPisubscript𝑗subscript𝒩𝑖𝑖superscriptsubscript𝛿𝑖𝑗𝑃subscript𝑑subscript𝑃𝑖\sum_{j\in\mathcal{N}_{i}\cup\{i\}}\delta_{ij}^{P}=d_{P_{i}}∑ start_POSTSUBSCRIPT italic_j ∈ caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∪ { italic_i } end_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_P end_POSTSUPERSCRIPT = italic_d start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT), leading to the attack vector dω=[dω1,,dωn]Tsubscript𝑑𝜔superscriptsubscript𝑑subscript𝜔1subscript𝑑subscript𝜔𝑛𝑇d_{\omega}=[d_{\omega_{1}},\ldots,d_{\omega_{n}}]^{T}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT = [ italic_d start_POSTSUBSCRIPT italic_ω start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , … , italic_d start_POSTSUBSCRIPT italic_ω start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT (resp., dP=[dP1,,dPn]Tsubscript𝑑𝑃superscriptsubscript𝑑subscript𝑃1subscript𝑑subscript𝑃𝑛𝑇d_{P}=[d_{P_{1}},\ldots,d_{P_{n}}]^{T}italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = [ italic_d start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , … , italic_d start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT) for the n𝑛nitalic_n nodes in ΣΣ\Sigmaroman_Σ. In general, an attacker might employ an FDI attack varying as per the real-time states of the system, which dies out as the system states become stable. Such kinds of attacks deviate the system from achieving the desired convergence properties and even make it unstable while being stealthy [16]. In this paper, we model the frequency attack (resp., power attack) as a function of states ωisubscript𝜔𝑖\omega_{i}italic_ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT (resp., Pisubscript𝑃𝑖P_{i}italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT) and time t𝑡titalic_t such that dω(ω,t)subscript𝑑𝜔𝜔𝑡d_{\omega}(\omega,t)italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_ω , italic_t ) (resp., dP(P,t)subscript𝑑𝑃𝑃𝑡d_{P}(P,t)italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_P , italic_t )) satisfies the following assumption:

Assumption 1.

The injections dω(ω,t)subscript𝑑𝜔𝜔𝑡d_{\omega}(\omega,t)italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_ω , italic_t ) and dP(P,t)subscript𝑑𝑃𝑃𝑡d_{P}(P,t)italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_P , italic_t ) are uniformly bounded for bounded ω𝜔\omegaitalic_ω and P𝑃Pitalic_P, that is, there exist positive constants D¯ω,D¯Psubscriptnormal-¯𝐷𝜔subscriptnormal-¯𝐷𝑃\bar{D}_{\omega},\bar{D}_{P}over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT , over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT such that dω(ω,t)D¯ωnormsubscript𝑑𝜔𝜔𝑡subscriptnormal-¯𝐷𝜔\|d_{\omega}(\omega,t)\|\leq\bar{D}_{\omega}∥ italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_ω , italic_t ) ∥ ≤ over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT and dP(P,t)D¯Pnormsubscript𝑑𝑃𝑃𝑡subscriptnormal-¯𝐷𝑃\|d_{P}(P,t)\|\leq\bar{D}_{P}∥ italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_P , italic_t ) ∥ ≤ over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT for all ωn,Pnformulae-sequence𝜔superscript𝑛𝑃superscript𝑛\omega\in\mathbb{R}^{n},P\in\mathbb{R}^{n}italic_ω ∈ blackboard_R start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_P ∈ blackboard_R start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT and t0𝑡0t\geq 0italic_t ≥ 0. In particular, if these attacks are generated by the dynamics,

d˙ω=fω(dω,ω);d˙P=fP(dP,P),formulae-sequencesubscript˙𝑑𝜔subscript𝑓𝜔subscript𝑑𝜔𝜔subscript˙𝑑𝑃subscript𝑓𝑃subscript𝑑𝑃𝑃\dot{d}_{\omega}=f_{\omega}(d_{\omega},\omega);\quad\dot{d}_{P}=f_{P}(d_{P},P),over˙ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT = italic_f start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT , italic_ω ) ; over˙ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = italic_f start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT , italic_P ) , (4)

these must have a finite 2subscript2\mathcal{L}_{2}caligraphic_L start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT-gain.

The relevance of this assumption lies in the fact that an intelligent attacker always aims at inserting a bounded attack signal, as the injections with large magnitude are easy to detect and will be rejected before they spread across the network. Further, dynamics (4) having finite 2subscript2\mathcal{L}_{2}caligraphic_L start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT-gain implies that dωsubscript𝑑𝜔d_{\omega}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT and dPsubscript𝑑𝑃d_{P}italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT settle down to some value, as ω𝜔\omegaitalic_ω and P𝑃Pitalic_P reach the steady-state, respectively.

II-B Problem Statement

Consider n𝑛nitalic_n DGs, connected via an undirected and connected graph 𝒢𝒢\mathcal{G}caligraphic_G, as shown in Fig. 1. Assume that the DGs be governed by the droop-based frequency dynamics (2) and subject to frequency and power attacks dωsubscript𝑑𝜔d_{\omega}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT and dPsubscript𝑑𝑃d_{P}italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT in control layer ΣΣ\Sigmaroman_Σ, according to Assumption 1. Let z=[z1,,zn]Tn𝑧superscriptsubscript𝑧1subscript𝑧𝑛𝑇superscript𝑛z=[z_{1},\ldots,z_{n}]^{T}\in\mathbb{R}^{n}italic_z = [ italic_z start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_z start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT be the state vector associated with the auxiliary nodes and ω*>0superscript𝜔0\omega^{*}>0italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT > 0 be the desired value of the microgrid frequency. Based on the integration between ΣΣ\Sigmaroman_Σ and ΠΠ\Piroman_Π layers, design the vector functions ωc(ω,z),ωa(ω,z),Pc(P,z),Pa(P,z)subscriptsuperscript𝑐𝜔𝜔𝑧subscriptsuperscript𝑎𝜔𝜔𝑧subscriptsuperscript𝑐𝑃𝑃𝑧subscriptsuperscript𝑎𝑃𝑃𝑧\mathcal{F}^{c}_{\omega}(\omega,z),\mathcal{F}^{a}_{\omega}(\omega,z),\mathcal% {F}^{c}_{P}(P,z),\mathcal{F}^{a}_{P}(P,z)caligraphic_F start_POSTSUPERSCRIPT italic_c end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_ω , italic_z ) , caligraphic_F start_POSTSUPERSCRIPT italic_a end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_ω , italic_z ) , caligraphic_F start_POSTSUPERSCRIPT italic_c end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_P , italic_z ) , caligraphic_F start_POSTSUPERSCRIPT italic_a end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_P , italic_z ) such that the following auxiliary-state coupled dynamics, under the frequency and power attacks dωsubscript𝑑𝜔d_{\omega}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT and dPsubscript𝑑𝑃d_{P}italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT, disseminated over ΣΣ\Sigmaroman_Σ using Laplacian L𝐿Litalic_L, respectively,

Sω:{ω˙ωc(ω,z)+Ldωz˙ωa(ω,z),SP:{mPP˙Pc(P,z)+LdPz˙Pa(P,z),:subscript𝑆𝜔cases˙𝜔ωc(ω,z)+Ldω˙𝑧ωa(ω,z)subscript𝑆𝑃:casessubscript𝑚𝑃˙𝑃Pc(P,z)+LdP˙𝑧Pa(P,z)S_{\omega}:\begin{dcases*}\dot{\omega}&= $\mathcal{F}^{c}_{\omega}(\omega,z)+% Ld_{\omega}$\\ \dot{z}&= $\mathcal{F}^{a}_{\omega}(\omega,z)$\end{dcases*},\ S_{P}:\begin{% dcases*}m_{P}\dot{P}&= $\mathcal{F}^{c}_{P}(P,z)+Ld_{P}$\\ \dot{z}&= $\mathcal{F}^{a}_{P}(P,z)$\end{dcases*},italic_S start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT : { start_ROW start_CELL over˙ start_ARG italic_ω end_ARG end_CELL start_CELL = caligraphic_F start_POSTSUPERSCRIPT italic_c end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_ω , italic_z ) + italic_L italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL over˙ start_ARG italic_z end_ARG end_CELL start_CELL = caligraphic_F start_POSTSUPERSCRIPT italic_a end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_ω , italic_z ) end_CELL end_ROW , italic_S start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT : { start_ROW start_CELL italic_m start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT over˙ start_ARG italic_P end_ARG end_CELL start_CELL = caligraphic_F start_POSTSUPERSCRIPT italic_c end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_P , italic_z ) + italic_L italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL over˙ start_ARG italic_z end_ARG end_CELL start_CELL = caligraphic_F start_POSTSUPERSCRIPT italic_a end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_P , italic_z ) end_CELL end_ROW , (5)

assures that the following hold true for some small constants ϵω>0subscriptitalic-ϵ𝜔0\epsilon_{\omega}>0italic_ϵ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT > 0 and ϵP>0subscriptitalic-ϵ𝑃0\epsilon_{P}>0italic_ϵ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT > 0:

  • (P1)

    Frequency is maintained at the desired nominal value for all the DGs, that is, limtω(t)ω*𝟏nϵωsubscript𝑡norm𝜔𝑡superscript𝜔subscript1𝑛subscriptitalic-ϵ𝜔\lim_{t\to\infty}\|\omega(t)-\omega^{*}\boldsymbol{1}_{n}\|\leq\epsilon_{\omega}roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ italic_ω ( italic_t ) - italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ∥ ≤ italic_ϵ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT.

  • (P2)

    Power is shared among the DGs in proportion to their droop coefficients, that is, limtmPPΔP𝟏nϵPsubscript𝑡normsubscript𝑚𝑃𝑃subscriptΔ𝑃subscript1𝑛subscriptitalic-ϵ𝑃\lim_{t\to\infty}\|m_{P}P-\Delta_{P}\boldsymbol{1}_{n}\|\leq\epsilon_{P}roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ italic_m start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT italic_P - roman_Δ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ∥ ≤ italic_ϵ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT, where ΔP=(1/n)i=1nmPiPi(0)subscriptΔ𝑃1𝑛superscriptsubscript𝑖1𝑛subscript𝑚subscript𝑃𝑖subscript𝑃𝑖0\Delta_{P}=(1/n)\sum_{i=1}^{n}m_{P_{i}}P_{i}(0)roman_Δ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = ( 1 / italic_n ) ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_m start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( 0 ) is a constant.

Additionally,

  • (P3)

    Based on the integration of ΣΣ\Sigmaroman_Σ and ΠΠ\Piroman_Π, propose an attack detection mechanism such that non-zero FDI attacks δijωsuperscriptsubscript𝛿𝑖𝑗𝜔\delta_{ij}^{\omega}italic_δ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_ω end_POSTSUPERSCRIPT and δijPsuperscriptsubscript𝛿𝑖𝑗𝑃\delta_{ij}^{P}italic_δ start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_P end_POSTSUPERSCRIPT, as defined in (3), are detected for all (i,j)𝑖𝑗(i,j)\in\mathcal{E}( italic_i , italic_j ) ∈ caligraphic_E.

III Distributed Attack Resilient Frequency control

For resiliency towards frequency attacks dωsubscript𝑑𝜔d_{\omega}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT, we propose the system Sωsubscript𝑆𝜔S_{\omega}italic_S start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT in (5) as follows:

ω˙˙𝜔\displaystyle\dot{\omega}over˙ start_ARG italic_ω end_ARG =Aω+βAz+Bω*+Ldωabsent𝐴𝜔𝛽𝐴𝑧𝐵superscript𝜔𝐿subscript𝑑𝜔\displaystyle=A\omega+\beta Az+B\omega^{*}+Ld_{\omega}= italic_A italic_ω + italic_β italic_A italic_z + italic_B italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT + italic_L italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT (6a)
z˙˙𝑧\displaystyle\dot{z}over˙ start_ARG italic_z end_ARG =AzβAω+βCω*,absent𝐴𝑧𝛽𝐴𝜔𝛽𝐶superscript𝜔\displaystyle=Az-\beta A\omega+\beta C\omega^{*},= italic_A italic_z - italic_β italic_A italic_ω + italic_β italic_C italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT , (6b)

where ω*superscript𝜔\omega^{*}italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT is the reference frequency fed to the leader DGs in the group. The matrix A𝐴Aitalic_A is given by

A=[j=1na1ja12a1na21j=1na2ja2nan1an2j=1nanj]𝐴matrixsuperscriptsubscript𝑗1𝑛subscript𝑎1𝑗subscript𝑎12subscript𝑎1𝑛subscript𝑎21superscriptsubscript𝑗1𝑛subscript𝑎2𝑗subscript𝑎2𝑛subscript𝑎𝑛1subscript𝑎𝑛2superscriptsubscript𝑗1𝑛subscript𝑎𝑛𝑗\displaystyle A=-\begin{bmatrix}\sum_{j=1}^{n}a_{1j}&-a_{12}&\ldots&-a_{1n}\\ -a_{21}&\sum_{j=1}^{n}a_{2j}&\ldots&-a_{2n}\\ \vdots&\vdots&\vdots&\vdots\\ -a_{n1}&-a_{n2}&\ldots&\sum_{j=1}^{n}a_{nj}\end{bmatrix}italic_A = - [ start_ARG start_ROW start_CELL ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_a start_POSTSUBSCRIPT 1 italic_j end_POSTSUBSCRIPT end_CELL start_CELL - italic_a start_POSTSUBSCRIPT 12 end_POSTSUBSCRIPT end_CELL start_CELL … end_CELL start_CELL - italic_a start_POSTSUBSCRIPT 1 italic_n end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL - italic_a start_POSTSUBSCRIPT 21 end_POSTSUBSCRIPT end_CELL start_CELL ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_a start_POSTSUBSCRIPT 2 italic_j end_POSTSUBSCRIPT end_CELL start_CELL … end_CELL start_CELL - italic_a start_POSTSUBSCRIPT 2 italic_n end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL ⋮ end_CELL start_CELL ⋮ end_CELL start_CELL ⋮ end_CELL start_CELL ⋮ end_CELL end_ROW start_ROW start_CELL - italic_a start_POSTSUBSCRIPT italic_n 1 end_POSTSUBSCRIPT end_CELL start_CELL - italic_a start_POSTSUBSCRIPT italic_n 2 end_POSTSUBSCRIPT end_CELL start_CELL … end_CELL start_CELL ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_a start_POSTSUBSCRIPT italic_n italic_j end_POSTSUBSCRIPT end_CELL end_ROW end_ARG ] (11)
[g1000g2000gn]=(L+G),matrixsubscript𝑔1000subscript𝑔2000subscript𝑔𝑛𝐿𝐺\displaystyle-\begin{bmatrix}g_{1}&0&\ldots&0\\ 0&g_{2}&\ldots&0\\ \vdots&\vdots&\vdots&\vdots\\ 0&0&\ldots&g_{n}\end{bmatrix}=-(L+G),- [ start_ARG start_ROW start_CELL italic_g start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_CELL start_CELL 0 end_CELL start_CELL … end_CELL start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL start_CELL italic_g start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_CELL start_CELL … end_CELL start_CELL 0 end_CELL end_ROW start_ROW start_CELL ⋮ end_CELL start_CELL ⋮ end_CELL start_CELL ⋮ end_CELL start_CELL ⋮ end_CELL end_ROW start_ROW start_CELL 0 end_CELL start_CELL 0 end_CELL start_CELL … end_CELL start_CELL italic_g start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT end_CELL end_ROW end_ARG ] = - ( italic_L + italic_G ) , (16)

where G𝐺Gitalic_G is a diagonal matrix with its entries gisubscript𝑔𝑖g_{i}italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT represents the pinning gain, such that gi=1subscript𝑔𝑖1g_{i}=1italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = 1 if the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT DG is a leader and 00 otherwise. Further, β>0𝛽0\beta>0italic_β > 0 is a gain factor and the vectors B𝐵Bitalic_B and C𝐶Citalic_C are defined as BG𝟏n𝐵𝐺subscript1𝑛B\coloneqq G\boldsymbol{1}_{n}italic_B ≔ italic_G bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT and CA𝟏n𝐶𝐴subscript1𝑛C\coloneqq A\boldsymbol{1}_{n}italic_C ≔ italic_A bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT. In (III), matrices A𝐴Aitalic_A and B𝐵Bitalic_B are such that the frequency controller ω˙isubscript˙𝜔𝑖\dot{\omega}_{i}over˙ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT of the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT DG contains relative frequency term j𝒩i(ωjωi)subscript𝑗subscript𝒩𝑖subscript𝜔𝑗subscript𝜔𝑖\sum_{j\in\mathcal{N}_{i}}(\omega_{j}-\omega_{i})∑ start_POSTSUBSCRIPT italic_j ∈ caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( italic_ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - italic_ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) (because of the Laplacian L𝐿Litalic_L) responsible for frequency consensus, and the term gi(ωiω)subscript𝑔𝑖subscript𝜔𝑖superscript𝜔g_{i}(\omega_{i}-\omega^{\star})italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT - italic_ω start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT ) associated with the pinning gain gisubscript𝑔𝑖g_{i}italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, shapes the solution trajectories such that consensus occurs at the desired frequency ωsuperscript𝜔\omega^{\star}italic_ω start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT. The interconnection between the two layers ΣΣ\Sigmaroman_Σ and ΠΠ\Piroman_Π is realized by the matrix βA𝛽𝐴\beta Aitalic_β italic_A, associated with (i) the auxiliary state vector z𝑧zitalic_z in the ω˙˙𝜔\dot{\omega}over˙ start_ARG italic_ω end_ARG in dynamics (6a), and (ii) the actual frequency vector ω𝜔\omegaitalic_ω in the z˙˙𝑧\dot{z}over˙ start_ARG italic_z end_ARG dynamics (6b). Note that the auxiliary state vector z𝑧zitalic_z has no physical significance and may assume any steady-sate value. We have the following lemma relating matrices A,B,C𝐴𝐵𝐶A,B,Citalic_A , italic_B , italic_C and G𝐺Gitalic_G:

Lemma 3.

Consider system (III) with matrix A𝐴Aitalic_A in (11). Then, A𝟏n=B𝐴subscript1𝑛𝐵A\boldsymbol{1}_{n}=-Bitalic_A bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT = - italic_B and C=G𝐶𝐺C=-Gitalic_C = - italic_G for an undirected and connected graph 𝒢𝒢\mathcal{G}caligraphic_G.

Proof.

Multiplying by 𝟏nsubscript1𝑛\boldsymbol{1}_{n}bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT on both sides of (11), we have that A𝟏n=L𝟏nG𝟏n=G𝟏n=B𝐴subscript1𝑛𝐿subscript1𝑛𝐺subscript1𝑛𝐺subscript1𝑛𝐵A\boldsymbol{1}_{n}=-L\boldsymbol{1}_{n}-G\boldsymbol{1}_{n}=-G\boldsymbol{1}_% {n}=-Bitalic_A bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT = - italic_L bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT - italic_G bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT = - italic_G bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT = - italic_B, since L𝟏n=𝟎n𝐿subscript1𝑛subscript0𝑛L\boldsymbol{1}_{n}=\boldsymbol{0}_{n}italic_L bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT = bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT for an undirected and connected graph. Further, since CA𝟏n𝐶𝐴subscript1𝑛C\coloneqq A\boldsymbol{1}_{n}italic_C ≔ italic_A bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT by definition, it follows that C=G𝐶𝐺C=-Gitalic_C = - italic_G. ∎

For further analysis, let us introduce the frequency error vector

eω=ωω*𝟏n,subscript𝑒𝜔𝜔superscript𝜔subscript1𝑛e_{\omega}=\omega-\omega^{*}\boldsymbol{1}_{n},italic_e start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT = italic_ω - italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT , (17)

using which, (III) can be expressed as:

e˙ωsubscript˙𝑒𝜔\displaystyle\dot{e}_{\omega}over˙ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT =Aeω+βAz+Aω*𝟏n+Bω*+Ldωabsent𝐴subscript𝑒𝜔𝛽𝐴𝑧𝐴superscript𝜔subscript1𝑛𝐵superscript𝜔𝐿subscript𝑑𝜔\displaystyle=Ae_{\omega}+\beta Az+A\omega^{*}\boldsymbol{1}_{n}+B\omega^{*}+% Ld_{\omega}= italic_A italic_e start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT + italic_β italic_A italic_z + italic_A italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT + italic_B italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT + italic_L italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT
z˙˙𝑧\displaystyle\dot{z}over˙ start_ARG italic_z end_ARG =AzβA(eω+ω*𝟏n)+βCω*.absent𝐴𝑧𝛽𝐴subscript𝑒𝜔superscript𝜔subscript1𝑛𝛽𝐶superscript𝜔\displaystyle=Az-\beta A(e_{\omega}+\omega^{*}\boldsymbol{1}_{n})+\beta C% \omega^{*}.= italic_A italic_z - italic_β italic_A ( italic_e start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT + italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ) + italic_β italic_C italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT .

Following Lemma 3, the above equations are simplified as:

e˙ωsubscript˙𝑒𝜔\displaystyle\dot{e}_{\omega}over˙ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT =Aeω+βAz+Ldωabsent𝐴subscript𝑒𝜔𝛽𝐴𝑧𝐿subscript𝑑𝜔\displaystyle=Ae_{\omega}+\beta Az+Ld_{\omega}= italic_A italic_e start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT + italic_β italic_A italic_z + italic_L italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT (18a)
z˙˙𝑧\displaystyle\dot{z}over˙ start_ARG italic_z end_ARG =AzβAeω.absent𝐴𝑧𝛽𝐴subscript𝑒𝜔\displaystyle=Az-\beta Ae_{\omega}.= italic_A italic_z - italic_β italic_A italic_e start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT . (18b)

Let ξω=[eωT,zT]T2nsubscript𝜉𝜔superscriptsuperscriptsubscript𝑒𝜔𝑇superscript𝑧𝑇𝑇superscript2𝑛\xi_{\omega}=[e_{\omega}^{T},z^{T}]^{T}\in\mathbb{R}^{2n}italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT = [ italic_e start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT , italic_z start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT 2 italic_n end_POSTSUPERSCRIPT be the joint state vector, using which, (III) can be written in the compact form as:

ξ˙ω=𝒦ξω+Dω,subscript˙𝜉𝜔𝒦subscript𝜉𝜔subscript𝐷𝜔\dot{\xi}_{\omega}=\mathcal{K}\xi_{\omega}+D_{\omega},over˙ start_ARG italic_ξ end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT = caligraphic_K italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT + italic_D start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT , (19)

where Dω=[(Ldω)T,𝟎nT]T2nsubscript𝐷𝜔superscriptsuperscript𝐿subscript𝑑𝜔𝑇superscriptsubscript0𝑛𝑇𝑇superscript2𝑛D_{\omega}=[(Ld_{\omega})^{T},\boldsymbol{0}_{n}^{T}]^{T}\in\mathbb{R}^{2n}italic_D start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT = [ ( italic_L italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT , bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT 2 italic_n end_POSTSUPERSCRIPT and the block matrix 𝒦2n×2nsubscript𝒦2𝑛2𝑛\mathcal{K}_{2n\times 2n}caligraphic_K start_POSTSUBSCRIPT 2 italic_n × 2 italic_n end_POSTSUBSCRIPT is given by

𝒦=[AβAβAA].𝒦matrix𝐴𝛽𝐴𝛽𝐴𝐴\mathcal{K}=\begin{bmatrix}A&\beta A\\ -\beta A&A\end{bmatrix}.caligraphic_K = [ start_ARG start_ROW start_CELL italic_A end_CELL start_CELL italic_β italic_A end_CELL end_ROW start_ROW start_CELL - italic_β italic_A end_CELL start_CELL italic_A end_CELL end_ROW end_ARG ] . (20)
Lemma 4.

The block matrix 𝒦𝒦\mathcal{K}caligraphic_K in (20) is Hurwitz.

Proof.

Using Kronecker product, (20) can be written as 𝒦=ΦA𝒦tensor-productΦ𝐴\mathcal{K}=\Phi\otimes Acaligraphic_K = roman_Φ ⊗ italic_A, where

Φ=[1ββ1],Φmatrix1𝛽𝛽1\Phi=\begin{bmatrix}1&\beta\\ -\beta&1\end{bmatrix},roman_Φ = [ start_ARG start_ROW start_CELL 1 end_CELL start_CELL italic_β end_CELL end_ROW start_ROW start_CELL - italic_β end_CELL start_CELL 1 end_CELL end_ROW end_ARG ] , (21)

is a 2×2222\times 22 × 2 matrix with eigenvalues λ(Φ)=1±jcβ𝜆Φplus-or-minus1subscript𝑗𝑐𝛽\lambda(\Phi)=1\pm j_{c}\betaitalic_λ ( roman_Φ ) = 1 ± italic_j start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT italic_β. Further, since graph 𝒢𝒢\mathcal{G}caligraphic_G is undirected and connected, L𝐿Litalic_L is positive semi-definite [22]. Also, matrix G𝐺Gitalic_G contains at least one non-zero diagonal entry (as there is at least one leader in the group). Using Lemma 1 from Subsection I-A, it can be stated that L+G𝐿𝐺L+Gitalic_L + italic_G is symmetric and positive-definite. Alternatively, A=(L+G)𝐴𝐿𝐺A=-(L+G)italic_A = - ( italic_L + italic_G ), as defined in (11), is symmetric and negative-definite, and hence, has all real and strictly negative eigenvalues λi(A)<0,i=1,,nformulae-sequencesubscript𝜆𝑖𝐴0for-all𝑖1𝑛\lambda_{i}(A)<0,\forall i=1,\ldots,nitalic_λ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_A ) < 0 , ∀ italic_i = 1 , … , italic_n. Now, using the multiplicative property of Kronecker product [26, Theorem 4.2.12], it can be inferred that λi(𝒦)=λi(Φ)λi(A),i=1,,2nformulae-sequencesubscript𝜆𝑖𝒦subscript𝜆𝑖Φsubscript𝜆𝑖𝐴for-all𝑖12𝑛\lambda_{i}(\mathcal{K})=\lambda_{i}(\Phi)\lambda_{i}(A),\forall i=1,\ldots,2nitalic_λ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( caligraphic_K ) = italic_λ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( roman_Φ ) italic_λ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_A ) , ∀ italic_i = 1 , … , 2 italic_n. Alternatively, all 2n2𝑛2n2 italic_n eigenvalues of 𝒦𝒦\mathcal{K}caligraphic_K are complex conjugate having strictly negative real part, implying that 𝒦𝒦\mathcal{K}caligraphic_K is Hurwitz. ∎

For better motivation and simplicity, we first discuss that the proposed framework (19) assures the frequency consensus in the absence of an attack, followed by the result in the attacked scenario.

Lemma 5 (Frequency control in absence of attack).

If dω𝟎nsubscript𝑑𝜔subscript0𝑛d_{\omega}\equiv\boldsymbol{0}_{n}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ≡ bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT, the dynamics (19) assures that ωω𝟏nnormal-→𝜔superscript𝜔normal-⋆subscript1𝑛\omega\to\omega^{\star}\boldsymbol{1}_{n}italic_ω → italic_ω start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT as tnormal-→𝑡t\to\inftyitalic_t → ∞.

Proof.

For dω𝟎nsubscript𝑑𝜔subscript0𝑛d_{\omega}\equiv\boldsymbol{0}_{n}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ≡ bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT, (19) becomes ξ˙ω=𝒦ξωsubscript˙𝜉𝜔𝒦subscript𝜉𝜔\dot{\xi}_{\omega}=\mathcal{K}\xi_{\omega}over˙ start_ARG italic_ξ end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT = caligraphic_K italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT and has the solution ξω(t)=e𝒦tξω(0)subscript𝜉𝜔𝑡superscripte𝒦𝑡subscript𝜉𝜔0\xi_{\omega}(t)={\rm e}^{\mathcal{K}t}\xi_{\omega}(0)italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_t ) = roman_e start_POSTSUPERSCRIPT caligraphic_K italic_t end_POSTSUPERSCRIPT italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( 0 ). Now, it is straightforward to conclude that ξω𝟎2nsubscript𝜉𝜔subscript02𝑛\xi_{\omega}\to\boldsymbol{0}_{2n}italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT → bold_0 start_POSTSUBSCRIPT 2 italic_n end_POSTSUBSCRIPT at t𝑡t\to\inftyitalic_t → ∞, since 𝒦𝒦\mathcal{K}caligraphic_K is Hurwitz (see Lemma 4). In other words, ωω𝟏n𝜔superscript𝜔subscript1𝑛\omega\to\omega^{\star}\boldsymbol{1}_{n}italic_ω → italic_ω start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT as t𝑡t\to\inftyitalic_t → ∞ in absence of dωsubscript𝑑𝜔d_{\omega}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT (the steady-state value of the auxiliary state z𝑧zitalic_z is not important). ∎

If dω𝟎nsubscript𝑑𝜔subscript0𝑛d_{\omega}\neq\boldsymbol{0}_{n}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ≠ bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT, we have the following convergence theorem for microgrid frequency, addressing the problem (P1).

Theorem 1 (Frequency control in presence of attack).

Consider the system (19) where the frequency attack signal dω𝟎nsubscript𝑑𝜔subscript0𝑛d_{\omega}\neq\boldsymbol{0}_{n}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ≠ bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT satisfies Assumption 1. Then, for a sufficiently large value of gain β𝛽\betaitalic_β, the frequencies of all DGs remain in a small neighborhood of nominal frequency, i.e., ωω𝟏nϵωnorm𝜔superscript𝜔normal-⋆subscript1𝑛subscriptitalic-ϵ𝜔\|\omega-\omega^{\star}\boldsymbol{1}_{n}\|\leq\epsilon_{\omega}∥ italic_ω - italic_ω start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ∥ ≤ italic_ϵ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT for some small ϵω>0subscriptitalic-ϵ𝜔0\epsilon_{\omega}>0italic_ϵ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT > 0.

Before proceeding to the proof, we first discuss the below important result:

Lemma 6.

Let β=[(A+β2A)1β(A+β2A)1]subscript𝛽matrixsuperscript𝐴superscript𝛽2𝐴1𝛽superscript𝐴superscript𝛽2𝐴1\mathcal{H}_{\beta}=\begin{bmatrix}(A+{\beta}^{2}A)^{-1}\\ \beta(A+{\beta}^{2}A)^{-1}\end{bmatrix}caligraphic_H start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT = [ start_ARG start_ROW start_CELL ( italic_A + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_A ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_CELL end_ROW start_ROW start_CELL italic_β ( italic_A + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_A ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_CELL end_ROW end_ARG ] be a block matrix of dimension 2n×n2𝑛𝑛2n\times n2 italic_n × italic_n, where A𝐴Aitalic_A is given by (11). The operator norm of βsubscript𝛽\mathcal{H}_{\beta}caligraphic_H start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT is given by

β=1λmin(L+G)1+β2.normsubscript𝛽1subscript𝜆𝐿𝐺1superscript𝛽2\|\mathcal{H}_{\beta}\|=\frac{1}{\lambda_{\min}(L+G)\sqrt{1+\beta^{2}}}.∥ caligraphic_H start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT ∥ = divide start_ARG 1 end_ARG start_ARG italic_λ start_POSTSUBSCRIPT roman_min end_POSTSUBSCRIPT ( italic_L + italic_G ) square-root start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_ARG .
Proof.

Using Kronecker product, the matrix βsubscript𝛽\mathcal{H}_{\beta}caligraphic_H start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT can be rewritten as β=[11+β2β1+β2]A1subscript𝛽tensor-productmatrix11superscript𝛽2𝛽1superscript𝛽2superscript𝐴1\mathcal{H}_{\beta}=\begin{bmatrix}\frac{1}{1+\beta^{2}}\\ \frac{\beta}{1+\beta^{2}}\end{bmatrix}\otimes A^{-1}caligraphic_H start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT = [ start_ARG start_ROW start_CELL divide start_ARG 1 end_ARG start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_CELL end_ROW start_ROW start_CELL divide start_ARG italic_β end_ARG start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_CELL end_ROW end_ARG ] ⊗ italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT. Taking operator norm on both sides, we have

β=[11+β2β1+β2]A1=[11+β2β1+β2]A1,normsubscript𝛽normtensor-productmatrix11superscript𝛽2𝛽1superscript𝛽2superscript𝐴1normmatrix11superscript𝛽2𝛽1superscript𝛽2normsuperscript𝐴1\|\mathcal{H}_{\beta}\|=\left\|\begin{bmatrix}\frac{1}{1+\beta^{2}}\\ \frac{\beta}{1+\beta^{2}}\end{bmatrix}\otimes A^{-1}\right\|=\left\|\begin{% bmatrix}\frac{1}{1+\beta^{2}}\\ \frac{\beta}{1+\beta^{2}}\end{bmatrix}\right\|\|A^{-1}\|,∥ caligraphic_H start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT ∥ = ∥ [ start_ARG start_ROW start_CELL divide start_ARG 1 end_ARG start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_CELL end_ROW start_ROW start_CELL divide start_ARG italic_β end_ARG start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_CELL end_ROW end_ARG ] ⊗ italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ∥ = ∥ [ start_ARG start_ROW start_CELL divide start_ARG 1 end_ARG start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_CELL end_ROW start_ROW start_CELL divide start_ARG italic_β end_ARG start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_CELL end_ROW end_ARG ] ∥ ∥ italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ∥ ,

using the property 𝒜=𝒜normtensor-product𝒜norm𝒜norm\|\mathcal{A}\otimes\mathcal{B}\|=\|\mathcal{A}\|\|\mathcal{B}\|∥ caligraphic_A ⊗ caligraphic_B ∥ = ∥ caligraphic_A ∥ ∥ caligraphic_B ∥ of the operator norms for Kronecker products of two matrices 𝒜𝒜\mathcal{A}caligraphic_A and \mathcal{B}caligraphic_B [27, Theorem 8, p. 412]. Note that [11+β2β1+β2]=11+β2normmatrix11superscript𝛽2𝛽1superscript𝛽211superscript𝛽2\left\|\begin{bmatrix}\frac{1}{1+\beta^{2}}\\ \frac{\beta}{1+\beta^{2}}\end{bmatrix}\right\|=\frac{1}{\sqrt{1+\beta^{2}}}∥ [ start_ARG start_ROW start_CELL divide start_ARG 1 end_ARG start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_CELL end_ROW start_ROW start_CELL divide start_ARG italic_β end_ARG start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_CELL end_ROW end_ARG ] ∥ = divide start_ARG 1 end_ARG start_ARG square-root start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_ARG and A1=λmax((A1)TA1)normsuperscript𝐴1subscript𝜆superscriptsuperscript𝐴1𝑇superscript𝐴1\|A^{-1}\|=\sqrt{\lambda_{\max}((A^{-1})^{T}A^{-1})}∥ italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ∥ = square-root start_ARG italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( ( italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) end_ARG. From (11), it is straightforward to check that AT=A(AT)1=A1(A1)T=A1superscript𝐴𝑇𝐴superscriptsuperscript𝐴𝑇1superscript𝐴1superscriptsuperscript𝐴1𝑇superscript𝐴1A^{T}=A\implies(A^{T})^{-1}=A^{-1}\implies(A^{-1})^{T}=A^{-1}italic_A start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT = italic_A ⟹ ( italic_A start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT = italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ⟹ ( italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT = italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT. The last relation can also be rewritten as ((A)1)T=(A)1superscriptsuperscript𝐴1𝑇superscript𝐴1((-A)^{-1})^{T}=(-A)^{-1}( ( - italic_A ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT = ( - italic_A ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT, where matrix A𝐴-A- italic_A is positive-definite. Using this, one can write A1=λmax((A1)T(A)1)=λmax(A1)=1λmin(A)normsuperscript𝐴1subscript𝜆superscriptsuperscript𝐴1𝑇superscript𝐴1subscript𝜆superscript𝐴11subscript𝜆𝐴\|A^{-1}\|=\sqrt{\lambda_{\max}((-A^{-1})^{T}(-A)^{-1})}=\lambda_{\max}(-A^{-1% })=\frac{1}{\lambda_{\min}(-A)}∥ italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ∥ = square-root start_ARG italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( ( - italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ( - italic_A ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) end_ARG = italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( - italic_A start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) = divide start_ARG 1 end_ARG start_ARG italic_λ start_POSTSUBSCRIPT roman_min end_POSTSUBSCRIPT ( - italic_A ) end_ARG. Consequently, it can be concluded using (11) that β=1λmin(L+G)1+β2normsubscript𝛽1subscript𝜆𝐿𝐺1superscript𝛽2\|\mathcal{H}_{\beta}\|=\frac{1}{\lambda_{\min}(L+G)\sqrt{1+\beta^{2}}}∥ caligraphic_H start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT ∥ = divide start_ARG 1 end_ARG start_ARG italic_λ start_POSTSUBSCRIPT roman_min end_POSTSUBSCRIPT ( italic_L + italic_G ) square-root start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_ARG, and hence, proving the result. ∎

We are now ready to prove Theorem 1.

Proof of Theorem 1.

If dω𝟎nsubscript𝑑𝜔subscript0𝑛d_{\omega}\neq\boldsymbol{0}_{n}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ≠ bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT, the solution of linear system (19) is obtained as ξω(t)=e𝒦tξω(0)+0te𝒦(tτ)Dω𝑑τsubscript𝜉𝜔𝑡superscripte𝒦𝑡subscript𝜉𝜔0superscriptsubscript0𝑡superscripte𝒦𝑡𝜏subscript𝐷𝜔differential-d𝜏\xi_{\omega}(t)={\rm e}^{\mathcal{K}t}\xi_{\omega}(0)+\int_{0}^{t}{\rm e}^{% \mathcal{K}(t-\tau)}D_{\omega}d\tauitalic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_t ) = roman_e start_POSTSUPERSCRIPT caligraphic_K italic_t end_POSTSUPERSCRIPT italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( 0 ) + ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT roman_e start_POSTSUPERSCRIPT caligraphic_K ( italic_t - italic_τ ) end_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_d italic_τ. Now, taking 2subscript2\mathcal{L}_{2}caligraphic_L start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT norm on both sides and applying the Cauchy–Schwarz inequality results in limtξω(t)limte𝒦tξω(0)+limt0te𝒦(tτ)Dω𝑑τsubscript𝑡normsubscript𝜉𝜔𝑡subscript𝑡normsuperscripte𝒦𝑡subscript𝜉𝜔0subscript𝑡normsuperscriptsubscript0𝑡superscripte𝒦𝑡𝜏subscript𝐷𝜔differential-d𝜏\lim_{t\to\infty}\|\xi_{\omega}(t)\|\leq\lim_{t\to\infty}\|{\rm e}^{\mathcal{K% }t}\xi_{\omega}(0)\|+\lim_{t\to\infty}\|\int_{0}^{t}{\rm e}^{\mathcal{K}(t-% \tau)}D_{\omega}d\tau\|roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_t ) ∥ ≤ roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ roman_e start_POSTSUPERSCRIPT caligraphic_K italic_t end_POSTSUPERSCRIPT italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( 0 ) ∥ + roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT roman_e start_POSTSUPERSCRIPT caligraphic_K ( italic_t - italic_τ ) end_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_d italic_τ ∥. Since limte𝒦tξω(0)0subscript𝑡normsuperscripte𝒦𝑡subscript𝜉𝜔00\lim_{t\to\infty}\|{\rm e}^{\mathcal{K}t}\xi_{\omega}(0)\|\to 0roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ roman_e start_POSTSUPERSCRIPT caligraphic_K italic_t end_POSTSUPERSCRIPT italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( 0 ) ∥ → 0, as 𝒦𝒦\mathcal{K}caligraphic_K is Hurwitz (see Lemma 4), it can be written that limtξω(t)limt0te𝒦(tτ)Dω𝑑τsubscript𝑡normsubscript𝜉𝜔𝑡subscript𝑡normsuperscriptsubscript0𝑡superscripte𝒦𝑡𝜏subscript𝐷𝜔differential-d𝜏\lim_{t\to\infty}\|\xi_{\omega}(t)\|\leq\lim_{t\to\infty}\|\int_{0}^{t}{\rm e}% ^{\mathcal{K}(t-\tau)}D_{\omega}d\tau\|roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_t ) ∥ ≤ roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT roman_e start_POSTSUPERSCRIPT caligraphic_K ( italic_t - italic_τ ) end_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_d italic_τ ∥. Note that Dωsubscript𝐷𝜔D_{\omega}italic_D start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT is uniformly bounded, as it is dωsubscript𝑑𝜔d_{\omega}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT, according to Assumption 1. Now, it immediately follows from Lemma 2 (from Subsection I-A) that there exists a time-independent vector d^ωnsubscript^𝑑𝜔superscript𝑛\hat{d}_{\omega}\in\mathbb{R}^{n}over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT with d^ωD¯ωnormsubscript^𝑑𝜔subscript¯𝐷𝜔\|\hat{d}_{\omega}\|\leq\bar{D}_{\omega}∥ over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∥ ≤ over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT (where D¯ωsubscript¯𝐷𝜔\bar{D}_{\omega}over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT is defined in Assumption 1) such that 0te𝒦(tτ)Dω(τ)𝑑τ0te𝒦(tτ)D^ω𝑑τnormsuperscriptsubscript0𝑡superscripte𝒦𝑡𝜏subscript𝐷𝜔𝜏differential-d𝜏normsuperscriptsubscript0𝑡superscripte𝒦𝑡𝜏subscript^𝐷𝜔differential-d𝜏\|\int_{0}^{t}{\rm e}^{\mathcal{K}(t-\tau)}D_{\omega}(\tau)d\tau\|\leq\|\int_{% 0}^{t}{\rm e}^{\mathcal{K}(t-\tau)}\hat{D}_{\omega}d\tau\|∥ ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT roman_e start_POSTSUPERSCRIPT caligraphic_K ( italic_t - italic_τ ) end_POSTSUPERSCRIPT italic_D start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_τ ) italic_d italic_τ ∥ ≤ ∥ ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT roman_e start_POSTSUPERSCRIPT caligraphic_K ( italic_t - italic_τ ) end_POSTSUPERSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_d italic_τ ∥ for some constant vector D^ω=[(Ld^ω)T,𝟎nT]T2nsubscript^𝐷𝜔superscriptsuperscript𝐿subscript^𝑑𝜔𝑇superscriptsubscript0𝑛𝑇𝑇superscript2𝑛\hat{D}_{\omega}=[(L\hat{d}_{\omega})^{T},\boldsymbol{0}_{n}^{T}]^{T}\in% \mathbb{R}^{2n}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT = [ ( italic_L over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT , bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT 2 italic_n end_POSTSUPERSCRIPT for all tT𝑡𝑇t\geq Titalic_t ≥ italic_T. This implies that limtξω(t)limt0te𝒦(tτ)D^ω𝑑τsubscript𝑡normsubscript𝜉𝜔𝑡subscript𝑡normsuperscriptsubscript0𝑡superscripte𝒦𝑡𝜏subscript^𝐷𝜔differential-d𝜏\lim_{t\to\infty}\|\xi_{\omega}(t)\|\leq\lim_{t\to\infty}\|\int_{0}^{t}{\rm e}% ^{\mathcal{K}(t-\tau)}\hat{D}_{\omega}d\tau\|roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_t ) ∥ ≤ roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT roman_e start_POSTSUPERSCRIPT caligraphic_K ( italic_t - italic_τ ) end_POSTSUPERSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_d italic_τ ∥, which on further simplification results in limtξω(t)𝒦1D^ωsubscript𝑡normsubscript𝜉𝜔𝑡normsuperscript𝒦1subscript^𝐷𝜔\lim_{t\to\infty}\|\xi_{\omega}(t)\|\leq\|\mathcal{K}^{-1}\hat{D}_{\omega}\|roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_t ) ∥ ≤ ∥ caligraphic_K start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∥. Note that 𝒦𝒦\mathcal{K}caligraphic_K is invertible as it has all non-zero eigenvalues (Lemma 4) and its inverse is given by [28, Theorem 0.7.3]:

𝒦1=[11122122],superscript𝒦1matrixsubscript11subscript12subscript21subscript22\mathcal{K}^{-1}=\begin{bmatrix}\mathcal{M}_{11}&\mathcal{M}_{12}\\ \mathcal{M}_{21}&\mathcal{M}_{22}\end{bmatrix},caligraphic_K start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT = [ start_ARG start_ROW start_CELL caligraphic_M start_POSTSUBSCRIPT 11 end_POSTSUBSCRIPT end_CELL start_CELL caligraphic_M start_POSTSUBSCRIPT 12 end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL caligraphic_M start_POSTSUBSCRIPT 21 end_POSTSUBSCRIPT end_CELL start_CELL caligraphic_M start_POSTSUBSCRIPT 22 end_POSTSUBSCRIPT end_CELL end_ROW end_ARG ] , (22)

using which, it holds that

limtξω(t)[11(Ld^ω)21(Ld^ω)],subscript𝑡normsubscript𝜉𝜔𝑡normmatrixsubscript11𝐿subscript^𝑑𝜔subscript21𝐿subscript^𝑑𝜔\lim_{t\to\infty}\|\xi_{\omega}(t)\|\leq\left\|\begin{bmatrix}\mathcal{M}_{11}% (L\hat{d}_{\omega})\\ \mathcal{M}_{21}(L\hat{d}_{\omega})\end{bmatrix}\right\|,roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ italic_ξ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_t ) ∥ ≤ ∥ [ start_ARG start_ROW start_CELL caligraphic_M start_POSTSUBSCRIPT 11 end_POSTSUBSCRIPT ( italic_L over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ) end_CELL end_ROW start_ROW start_CELL caligraphic_M start_POSTSUBSCRIPT 21 end_POSTSUBSCRIPT ( italic_L over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ) end_CELL end_ROW end_ARG ] ∥ , (23)

where 11=(𝒦11𝒦12𝒦221𝒦21)1subscript11superscriptsubscript𝒦11subscript𝒦12superscriptsubscript𝒦221subscript𝒦211\mathcal{M}_{11}=(\mathcal{K}_{11}-\mathcal{K}_{12}\mathcal{K}_{22}^{-1}% \mathcal{K}_{21})^{-1}caligraphic_M start_POSTSUBSCRIPT 11 end_POSTSUBSCRIPT = ( caligraphic_K start_POSTSUBSCRIPT 11 end_POSTSUBSCRIPT - caligraphic_K start_POSTSUBSCRIPT 12 end_POSTSUBSCRIPT caligraphic_K start_POSTSUBSCRIPT 22 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT caligraphic_K start_POSTSUBSCRIPT 21 end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT and 21=𝒦221𝒦21(𝒦12𝒦221𝒦21𝒦11)1subscript21superscriptsubscript𝒦221subscript𝒦21superscriptsubscript𝒦12superscriptsubscript𝒦221subscript𝒦21subscript𝒦111\mathcal{M}_{21}=\mathcal{K}_{22}^{-1}\mathcal{K}_{21}(\mathcal{K}_{12}% \mathcal{K}_{22}^{-1}\mathcal{K}_{21}-\mathcal{K}_{11})^{-1}caligraphic_M start_POSTSUBSCRIPT 21 end_POSTSUBSCRIPT = caligraphic_K start_POSTSUBSCRIPT 22 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT caligraphic_K start_POSTSUBSCRIPT 21 end_POSTSUBSCRIPT ( caligraphic_K start_POSTSUBSCRIPT 12 end_POSTSUBSCRIPT caligraphic_K start_POSTSUBSCRIPT 22 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT caligraphic_K start_POSTSUBSCRIPT 21 end_POSTSUBSCRIPT - caligraphic_K start_POSTSUBSCRIPT 11 end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT [28, Theorem 0.7.3], with 𝒦11=𝒦22=Asubscript𝒦11subscript𝒦22𝐴\mathcal{K}_{11}=\mathcal{K}_{22}=Acaligraphic_K start_POSTSUBSCRIPT 11 end_POSTSUBSCRIPT = caligraphic_K start_POSTSUBSCRIPT 22 end_POSTSUBSCRIPT = italic_A and 𝒦12=𝒦21=βAsubscript𝒦12subscript𝒦21𝛽𝐴\mathcal{K}_{12}=-\mathcal{K}_{21}=\beta Acaligraphic_K start_POSTSUBSCRIPT 12 end_POSTSUBSCRIPT = - caligraphic_K start_POSTSUBSCRIPT 21 end_POSTSUBSCRIPT = italic_β italic_A, from (20). Substituting these, we get 11=(A+β2A)1subscript11superscript𝐴superscript𝛽2𝐴1\mathcal{M}_{11}=(A+{\beta}^{2}A)^{-1}caligraphic_M start_POSTSUBSCRIPT 11 end_POSTSUBSCRIPT = ( italic_A + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_A ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT and 21=β(A+β2A)1subscript21𝛽superscript𝐴superscript𝛽2𝐴1\mathcal{M}_{21}=\beta(A+{\beta}^{2}A)^{-1}caligraphic_M start_POSTSUBSCRIPT 21 end_POSTSUBSCRIPT = italic_β ( italic_A + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_A ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT, and hence,

limt[eω(t)z(t)][(A+β2A)1β(A+β2A)1]Ld^ω=βLd^ω,subscript𝑡normmatrixsubscript𝑒𝜔𝑡𝑧𝑡normmatrixsuperscript𝐴superscript𝛽2𝐴1𝛽superscript𝐴superscript𝛽2𝐴1norm𝐿subscript^𝑑𝜔normsubscript𝛽norm𝐿subscript^𝑑𝜔\lim_{t\to\infty}\left\|\begin{bmatrix}e_{\omega}(t)\\ z(t)\end{bmatrix}\right\|\leq\left\|\begin{bmatrix}(A+{\beta}^{2}A)^{-1}\\ \beta(A+{\beta}^{2}A)^{-1}\end{bmatrix}\right\|\|L\hat{d}_{\omega}\|=\|% \mathcal{H}_{\beta}\|\|L\hat{d}_{\omega}\|,roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ [ start_ARG start_ROW start_CELL italic_e start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_t ) end_CELL end_ROW start_ROW start_CELL italic_z ( italic_t ) end_CELL end_ROW end_ARG ] ∥ ≤ ∥ [ start_ARG start_ROW start_CELL ( italic_A + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_A ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_CELL end_ROW start_ROW start_CELL italic_β ( italic_A + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_A ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_CELL end_ROW end_ARG ] ∥ ∥ italic_L over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∥ = ∥ caligraphic_H start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT ∥ ∥ italic_L over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∥ ,

where we have replaced the first term by βnormsubscript𝛽\|\mathcal{H}_{\beta}\|∥ caligraphic_H start_POSTSUBSCRIPT italic_β end_POSTSUBSCRIPT ∥, using Lemma 6. Since Ld^ωLd^ω=λmax(LTL)d^ω=λmax(L)d^ωnorm𝐿subscript^𝑑𝜔norm𝐿normsubscript^𝑑𝜔subscript𝜆superscript𝐿𝑇𝐿normsubscript^𝑑𝜔subscript𝜆𝐿normsubscript^𝑑𝜔\|L\hat{d}_{\omega}\|\leq\|L\|\|\hat{d}_{\omega}\|=\sqrt{\lambda_{\max}(L^{T}L% )}\|\hat{d}_{\omega}\|=\lambda_{\max}(L)\|\hat{d}_{\omega}\|∥ italic_L over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∥ ≤ ∥ italic_L ∥ ∥ over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∥ = square-root start_ARG italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( italic_L start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT italic_L ) end_ARG ∥ over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∥ = italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( italic_L ) ∥ over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∥ (since L=LT𝐿superscript𝐿𝑇L=L^{T}italic_L = italic_L start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT for an undirected and connected graph 𝒢𝒢\mathcal{G}caligraphic_G) and d^ωD¯ωnormsubscript^𝑑𝜔subscript¯𝐷𝜔\|\hat{d}_{\omega}\|\leq\bar{D}_{\omega}∥ over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ∥ ≤ over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT (see Assumption 1), it holds that

limt[eω(t)z(t)]λmax(L)D¯ωλmin(L+G)1+β2,subscript𝑡normmatrixsubscript𝑒𝜔𝑡𝑧𝑡subscript𝜆𝐿subscript¯𝐷𝜔subscript𝜆𝐿𝐺1superscript𝛽2\lim_{t\to\infty}\left\|\begin{bmatrix}e_{\omega}(t)\\ z(t)\end{bmatrix}\right\|\leq\frac{\lambda_{\max}(L)\bar{D}_{\omega}}{\lambda_% {\min}(L+G)\sqrt{1+\beta^{2}}},roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ [ start_ARG start_ROW start_CELL italic_e start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_t ) end_CELL end_ROW start_ROW start_CELL italic_z ( italic_t ) end_CELL end_ROW end_ARG ] ∥ ≤ divide start_ARG italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( italic_L ) over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT end_ARG start_ARG italic_λ start_POSTSUBSCRIPT roman_min end_POSTSUBSCRIPT ( italic_L + italic_G ) square-root start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_ARG , (24)

exploiting Lemma 6. From (24), one can conclude that eω(t)ϵωnormsubscript𝑒𝜔𝑡subscriptitalic-ϵ𝜔\|e_{\omega}(t)\|\leq\epsilon_{\omega}∥ italic_e start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_t ) ∥ ≤ italic_ϵ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT as t𝑡t\to\inftyitalic_t → ∞, with ϵω=λmax(L)D¯ωλmin(L+G)1+β2subscriptitalic-ϵ𝜔subscript𝜆𝐿subscript¯𝐷𝜔subscript𝜆𝐿𝐺1superscript𝛽2\epsilon_{\omega}=\frac{\lambda_{\max}(L)\bar{D}_{\omega}}{\lambda_{\min}(L+G)% \sqrt{1+\beta^{2}}}italic_ϵ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT = divide start_ARG italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( italic_L ) over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT end_ARG start_ARG italic_λ start_POSTSUBSCRIPT roman_min end_POSTSUBSCRIPT ( italic_L + italic_G ) square-root start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_ARG. Further, since ϵωsubscriptitalic-ϵ𝜔\epsilon_{\omega}italic_ϵ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT is small for sufficiently large values of gain β𝛽\betaitalic_β (which is a design parameter), ω𝜔\omegaitalic_ω converges to a small neighborhood around ω*𝟏nsuperscript𝜔subscript1𝑛{\omega}^{*}\boldsymbol{1}_{n}italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT as t𝑡t\to\inftyitalic_t → ∞, using (17). ∎

Remark 1.

It can be inferred from inequality (24) that the steady-state bound ϵωsubscriptitalic-ϵ𝜔\epsilon_{\omega}italic_ϵ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT is:

  • proportional to the maximum eigenvalue λmax(L)subscript𝜆𝐿\lambda_{\max}(L)italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( italic_L ) of Laplacian L𝐿Litalic_L and the attack bound D¯ωsubscript¯𝐷𝜔\bar{D}_{\omega}over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT. If the graph 𝒢𝒢\mathcal{G}caligraphic_G has minimal connectivity (i.e., small λmax(L)subscript𝜆𝐿\lambda_{\max}(L)italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( italic_L )), the attacker will have fewer links to target, and hence, will have relatively less impact.

  • inversely proportional to the minimum eigenvalue λmin(L+G)subscript𝜆𝐿𝐺\lambda_{\min}(L+G)italic_λ start_POSTSUBSCRIPT roman_min end_POSTSUBSCRIPT ( italic_L + italic_G ) of matrix L+G𝐿𝐺L+Gitalic_L + italic_G and the design parameter β𝛽\betaitalic_β. Beside selecting large β𝛽\betaitalic_β, it is possible to make λmin(L+G)subscript𝜆𝐿𝐺\lambda_{\min}(L+G)italic_λ start_POSTSUBSCRIPT roman_min end_POSTSUBSCRIPT ( italic_L + italic_G ) large by choosing the large value of pinning gain gisubscript𝑔𝑖g_{i}italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, since λmin(L+G)λmin(L)+mini{gi}=mini{gi}subscript𝜆𝐿𝐺subscript𝜆𝐿subscript𝑖subscript𝑔𝑖subscript𝑖subscript𝑔𝑖\lambda_{\min}(L+G)\geq\lambda_{\min}(L)+\min_{i}\{g_{i}\}=\min_{i}\{g_{i}\}italic_λ start_POSTSUBSCRIPT roman_min end_POSTSUBSCRIPT ( italic_L + italic_G ) ≥ italic_λ start_POSTSUBSCRIPT roman_min end_POSTSUBSCRIPT ( italic_L ) + roman_min start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT { italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT } = roman_min start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT { italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT }, using Weyl’s theorem [28, Chapter 4, p. 239] and the fact that λmin(L)=0subscript𝜆𝐿0\lambda_{\min}(L)=0italic_λ start_POSTSUBSCRIPT roman_min end_POSTSUBSCRIPT ( italic_L ) = 0. Therefore, λmin(L+G)subscript𝜆𝐿𝐺\lambda_{\min}(L+G)italic_λ start_POSTSUBSCRIPT roman_min end_POSTSUBSCRIPT ( italic_L + italic_G ) primarily influenced by the pinning gain gisubscript𝑔𝑖g_{i}italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT.

In summary, it is evident that the effect of varying β𝛽\betaitalic_β is more dominant on the value of ϵωsubscriptitalic-ϵ𝜔\epsilon_{\omega}italic_ϵ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT, as compared to gisubscript𝑔𝑖g_{i}italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, and can be decided appropriately by the user.

IV Distributed Attack Resilient Power Control

Unlike frequency control, the implementation of the distributed power controller is done in a leaderless configuration to assure the proportional power-sharing among the DGs, leading to the system SPsubscript𝑆𝑃S_{P}italic_S start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT in (5) as follows:

mPP˙subscript𝑚𝑃˙𝑃\displaystyle m_{P}\dot{P}italic_m start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT over˙ start_ARG italic_P end_ARG =L(mPP)+βLz+LdPabsent𝐿subscript𝑚𝑃𝑃𝛽𝐿𝑧𝐿subscript𝑑𝑃\displaystyle=-L(m_{P}P)+\beta Lz+L{d_{P}}= - italic_L ( italic_m start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT italic_P ) + italic_β italic_L italic_z + italic_L italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT (25a)
z˙˙𝑧\displaystyle\dot{z}over˙ start_ARG italic_z end_ARG =LzβL(mPP),absent𝐿𝑧𝛽𝐿subscript𝑚𝑃𝑃\displaystyle=-Lz-\beta L(m_{P}P),= - italic_L italic_z - italic_β italic_L ( italic_m start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT italic_P ) , (25b)

where Laplacian L𝐿Litalic_L is associated with the state vector mPPsubscript𝑚𝑃𝑃m_{P}Pitalic_m start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT italic_P, instead of matrix A𝐴Aitalic_A as in (III). Here, the interconnection between ΣΣ\Sigmaroman_Σ and ΠΠ\Piroman_Π is realized by the matrix βL𝛽𝐿\beta Litalic_β italic_L. Defining power-sharing error as (where ΔPsubscriptΔ𝑃\Delta_{P}roman_Δ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT is defined in Problem (P2))

eP=mPPΔP𝟏n,subscript𝑒𝑃subscript𝑚𝑃𝑃subscriptΔ𝑃subscript1𝑛e_{P}=m_{P}P-\Delta_{P}\boldsymbol{1}_{n},italic_e start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = italic_m start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT italic_P - roman_Δ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT , (26)

(IV) can be expressed in terms of ePsubscript𝑒𝑃e_{P}italic_e start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT as:

e˙Psubscript˙𝑒𝑃\displaystyle\dot{e}_{P}over˙ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT =LeP+βLz+LdPabsent𝐿subscript𝑒𝑃𝛽𝐿𝑧𝐿subscript𝑑𝑃\displaystyle=-Le_{P}+\beta Lz+Ld_{P}= - italic_L italic_e start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT + italic_β italic_L italic_z + italic_L italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT (27a)
z˙˙𝑧\displaystyle\dot{z}over˙ start_ARG italic_z end_ARG =βLePLz.absent𝛽𝐿subscript𝑒𝑃𝐿𝑧\displaystyle=-\beta Le_{P}-Lz.= - italic_β italic_L italic_e start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT - italic_L italic_z . (27b)

We have the following lemma in absence of power attacks:

Lemma 7 (Power-sharing control in absence of attack).

If dP𝟎nsubscript𝑑𝑃subscript0𝑛d_{P}\equiv\boldsymbol{0}_{n}italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ≡ bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT, the dynamics (IV) assures that PΔP𝟏nnormal-→𝑃subscriptnormal-Δ𝑃subscript1𝑛P\to\Delta_{P}\boldsymbol{1}_{n}italic_P → roman_Δ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT as tnormal-→𝑡t\to\inftyitalic_t → ∞.

Proof.

Consider the candidate Lyapunov function VP=0.5epTep+0.5zTzsubscript𝑉𝑃0.5superscriptsubscript𝑒𝑝𝑇subscript𝑒𝑝0.5superscript𝑧𝑇𝑧V_{P}=0.5e_{p}^{T}e_{p}+0.5z^{T}zitalic_V start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = 0.5 italic_e start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT italic_e start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT + 0.5 italic_z start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT italic_z, whose time-derivative along (IV) with dP𝟎nsubscript𝑑𝑃subscript0𝑛d_{P}\equiv\boldsymbol{0}_{n}italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ≡ bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT is obtained as V˙p=epTe˙p+zTz˙=epT[L(mPP)+βLz]+zT[LzβL(mpP)]subscript˙𝑉𝑝superscriptsubscript𝑒𝑝𝑇subscript˙𝑒𝑝superscript𝑧𝑇˙𝑧superscriptsubscript𝑒𝑝𝑇delimited-[]𝐿subscript𝑚𝑃𝑃𝛽𝐿𝑧superscript𝑧𝑇delimited-[]𝐿𝑧𝛽𝐿subscript𝑚𝑝𝑃\dot{V}_{p}=e_{p}^{T}\dot{e}_{p}+z^{T}\dot{z}=e_{p}^{T}[-L(m_{P}P)+\beta Lz]+z% ^{T}[-Lz-\beta L(m_{p}P)]over˙ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT = italic_e start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT over˙ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT + italic_z start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT over˙ start_ARG italic_z end_ARG = italic_e start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT [ - italic_L ( italic_m start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT italic_P ) + italic_β italic_L italic_z ] + italic_z start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT [ - italic_L italic_z - italic_β italic_L ( italic_m start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT italic_P ) ], where we used the fact that LΔP𝟏n=𝟎n𝐿subscriptΔ𝑃subscript1𝑛subscript0𝑛L\Delta_{P}\boldsymbol{1}_{n}=\boldsymbol{0}_{n}italic_L roman_Δ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT = bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT for an undirected and connected graph 𝒢𝒢\mathcal{G}caligraphic_G. On further simplification, one can get that V˙P=epTLepzTLz0subscript˙𝑉𝑃superscriptsubscript𝑒𝑝𝑇𝐿subscript𝑒𝑝superscript𝑧𝑇𝐿𝑧0\dot{V}_{P}=-e_{p}^{T}Le_{p}-z^{T}Lz\leq 0over˙ start_ARG italic_V end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = - italic_e start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT italic_L italic_e start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT - italic_z start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT italic_L italic_z ≤ 0, which is negative semi-definite. Now, using LaSalle’s invariance theorem [29, Corollary 4.2, p. 129], it can be concluded that eP=z=𝟎nsubscript𝑒𝑃𝑧subscript0𝑛e_{P}=z=\boldsymbol{0}_{n}italic_e start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = italic_z = bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT is the desired equilibrium point, implying that, PΔP𝟏n𝑃subscriptΔ𝑃subscript1𝑛P\to\Delta_{P}\boldsymbol{1}_{n}italic_P → roman_Δ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT as t𝑡t\to\inftyitalic_t → ∞, using (26). ∎

In case dP𝟎nsubscript𝑑𝑃subscript0𝑛d_{P}\neq\boldsymbol{0}_{n}italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ≠ bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT, the analysis is different from the earlier Theorem 1, as the system matrix L𝐿Litalic_L in (IV) has one zero eigenvalue and rest positive eigenvalues for an undirected and connected graph 𝒢𝒢\mathcal{G}caligraphic_G. To proceed further, we filter out the dynamics associated with the simple zero eigenvalue by using the transformation:

eP=T[e¯Pe~P],z=T[z¯z~],dP=T[d¯Pd~P],formulae-sequencesubscript𝑒𝑃𝑇matrixsubscript¯𝑒𝑃subscript~𝑒𝑃formulae-sequence𝑧𝑇matrix¯𝑧~𝑧subscript𝑑𝑃𝑇matrixsubscript¯𝑑𝑃subscript~𝑑𝑃e_{P}=T\begin{bmatrix}\bar{e}_{P}\\ \tilde{e}_{P}\end{bmatrix},\ z=T\begin{bmatrix}\bar{z}\\ \tilde{z}\end{bmatrix},\ d_{P}=T\begin{bmatrix}\bar{d}_{P}\\ \tilde{d}_{P}\end{bmatrix},italic_e start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = italic_T [ start_ARG start_ROW start_CELL over¯ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL over~ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_CELL end_ROW end_ARG ] , italic_z = italic_T [ start_ARG start_ROW start_CELL over¯ start_ARG italic_z end_ARG end_CELL end_ROW start_ROW start_CELL over~ start_ARG italic_z end_ARG end_CELL end_ROW end_ARG ] , italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = italic_T [ start_ARG start_ROW start_CELL over¯ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL over~ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_CELL end_ROW end_ARG ] , (28)

where e¯P,z¯,d¯Psubscript¯𝑒𝑃¯𝑧subscript¯𝑑𝑃\bar{e}_{P},\bar{z},\bar{d}_{P}\in\mathbb{R}over¯ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT , over¯ start_ARG italic_z end_ARG , over¯ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ∈ blackboard_R and e~P,z~,d~Pn1subscript~𝑒𝑃~𝑧subscript~𝑑𝑃superscript𝑛1\tilde{e}_{P},\tilde{z},\tilde{d}_{P}\in\mathbb{R}^{n-1}over~ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT , over~ start_ARG italic_z end_ARG , over~ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_n - 1 end_POSTSUPERSCRIPT and the transformation T=[v1,,vn]𝑇subscript𝑣1subscript𝑣𝑛T=[v_{1},\ldots,v_{n}]italic_T = [ italic_v start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_v start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ] with visubscript𝑣𝑖v_{i}italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT being the left eigenvector associated with λi(L)subscript𝜆𝑖𝐿\lambda_{i}(L)italic_λ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ( italic_L ), i=1,,n𝑖1𝑛i=1,\ldots,nitalic_i = 1 , … , italic_n. Using transformation T𝑇Titalic_T, L𝐿Litalic_L can be diagonalized as:

T1LT=[λ1(L)000λ2(L)000λn(L)]=[0𝟎n1T𝟎n1],superscript𝑇1𝐿𝑇matrixsubscript𝜆1𝐿000subscript𝜆2𝐿000subscript𝜆𝑛𝐿matrix0subscriptsuperscript0𝑇𝑛1missing-subexpressionmissing-subexpressionsubscript0𝑛1T^{-1}LT=\begin{bmatrix}\lambda_{1}(L)&0&\cdots&0\\ 0&\lambda_{2}(L)&\cdots&0\\ \vdots&\vdots&\ddots&\vdots\\ 0&0&\cdots&\lambda_{n}(L)\end{bmatrix}=\begin{bmatrix}\begin{array}[]{c|c}0&% \boldsymbol{0}^{T}_{n-1}\\ \hline\cr\boldsymbol{0}_{n-1}&\mathcal{R}\end{array}\end{bmatrix},italic_T start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT italic_L italic_T = [ start_ARG start_ROW start_CELL italic_λ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ( italic_L ) end_CELL start_CELL 0 end_CELL start_CELL ⋯ end_CELL start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL start_CELL italic_λ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( italic_L ) end_CELL start_CELL ⋯ end_CELL start_CELL 0 end_CELL end_ROW start_ROW start_CELL ⋮ end_CELL start_CELL ⋮ end_CELL start_CELL ⋱ end_CELL start_CELL ⋮ end_CELL end_ROW start_ROW start_CELL 0 end_CELL start_CELL 0 end_CELL start_CELL ⋯ end_CELL start_CELL italic_λ start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ( italic_L ) end_CELL end_ROW end_ARG ] = [ start_ARG start_ROW start_CELL start_ARRAY start_ROW start_CELL 0 end_CELL start_CELL bold_0 start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_n - 1 end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL end_CELL start_CELL end_CELL end_ROW start_ROW start_CELL bold_0 start_POSTSUBSCRIPT italic_n - 1 end_POSTSUBSCRIPT end_CELL start_CELL caligraphic_R end_CELL end_ROW end_ARRAY end_CELL end_ROW end_ARG ] , (29)

where (n1)×(n1)superscript𝑛1𝑛1\mathcal{R}\in\mathbb{R}^{(n-1)\times(n-1)}caligraphic_R ∈ blackboard_R start_POSTSUPERSCRIPT ( italic_n - 1 ) × ( italic_n - 1 ) end_POSTSUPERSCRIPT is a diagonal matrix comprising non-zero eigenvalues of L𝐿Litalic_L. Using (28), (IV) can be rewritten as:

[e¯˙Pe~˙P]matrixsubscript˙¯𝑒𝑃subscript˙~𝑒𝑃\displaystyle\begin{bmatrix}\dot{\bar{e}}_{P}\\ \dot{\tilde{e}}_{P}\end{bmatrix}[ start_ARG start_ROW start_CELL over˙ start_ARG over¯ start_ARG italic_e end_ARG end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL over˙ start_ARG over~ start_ARG italic_e end_ARG end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_CELL end_ROW end_ARG ] =T1LT[e¯Pe~P]+βT1LT[z¯z~]+T1LT[d¯Pd~P],absentsuperscript𝑇1𝐿𝑇matrixsubscript¯𝑒𝑃subscript~𝑒𝑃𝛽superscript𝑇1𝐿𝑇matrix¯𝑧~𝑧superscript𝑇1𝐿𝑇matrixsubscript¯𝑑𝑃subscript~𝑑𝑃\displaystyle=-T^{-1}LT\begin{bmatrix}\bar{e}_{P}\\ \tilde{e}_{P}\end{bmatrix}+\beta T^{-1}LT\begin{bmatrix}\bar{z}\\ \tilde{z}\end{bmatrix}+T^{-1}LT\begin{bmatrix}\bar{d}_{P}\\ \tilde{d}_{P}\end{bmatrix},= - italic_T start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT italic_L italic_T [ start_ARG start_ROW start_CELL over¯ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL over~ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_CELL end_ROW end_ARG ] + italic_β italic_T start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT italic_L italic_T [ start_ARG start_ROW start_CELL over¯ start_ARG italic_z end_ARG end_CELL end_ROW start_ROW start_CELL over~ start_ARG italic_z end_ARG end_CELL end_ROW end_ARG ] + italic_T start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT italic_L italic_T [ start_ARG start_ROW start_CELL over¯ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL over~ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_CELL end_ROW end_ARG ] , (30i)
[z¯˙z~˙]matrix˙¯𝑧˙~𝑧\displaystyle\begin{bmatrix}\dot{\bar{z}}\\ \dot{\tilde{z}}\end{bmatrix}[ start_ARG start_ROW start_CELL over˙ start_ARG over¯ start_ARG italic_z end_ARG end_ARG end_CELL end_ROW start_ROW start_CELL over˙ start_ARG over~ start_ARG italic_z end_ARG end_ARG end_CELL end_ROW end_ARG ] =βT1LT[e¯Pe~P]T1LT[z¯z~].absent𝛽superscript𝑇1𝐿𝑇matrixsubscript¯𝑒𝑃subscript~𝑒𝑃superscript𝑇1𝐿𝑇matrix¯𝑧~𝑧\displaystyle=-\beta T^{-1}LT\begin{bmatrix}\bar{e}_{P}\\ \tilde{e}_{P}\end{bmatrix}-T^{-1}LT\begin{bmatrix}\bar{z}\\ \tilde{z}\end{bmatrix}.= - italic_β italic_T start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT italic_L italic_T [ start_ARG start_ROW start_CELL over¯ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL over~ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_CELL end_ROW end_ARG ] - italic_T start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT italic_L italic_T [ start_ARG start_ROW start_CELL over¯ start_ARG italic_z end_ARG end_CELL end_ROW start_ROW start_CELL over~ start_ARG italic_z end_ARG end_CELL end_ROW end_ARG ] . (30p)

Now, using (29), since e¯˙P=z¯˙=0subscript˙¯𝑒𝑃˙¯𝑧0\dot{\bar{e}}_{P}=\dot{\bar{z}}=0over˙ start_ARG over¯ start_ARG italic_e end_ARG end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = over˙ start_ARG over¯ start_ARG italic_z end_ARG end_ARG = 0, (IV) further reduces to

e~˙psubscript˙~𝑒𝑝\displaystyle\dot{\tilde{e}}_{p}over˙ start_ARG over~ start_ARG italic_e end_ARG end_ARG start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT =e~P+βz~+d~pabsentsubscript~𝑒𝑃𝛽~𝑧subscript~𝑑𝑝\displaystyle=-\mathcal{R}\tilde{e}_{P}+\beta\mathcal{R}\tilde{z}+\mathcal{R}% \tilde{d}_{p}= - caligraphic_R over~ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT + italic_β caligraphic_R over~ start_ARG italic_z end_ARG + caligraphic_R over~ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT (31a)
z~˙˙~𝑧\displaystyle\dot{\tilde{z}}over˙ start_ARG over~ start_ARG italic_z end_ARG end_ARG =βe~Pz~,absent𝛽subscript~𝑒𝑃~𝑧\displaystyle=-\beta\mathcal{R}\tilde{e}_{P}-\mathcal{R}\tilde{z},= - italic_β caligraphic_R over~ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT - caligraphic_R over~ start_ARG italic_z end_ARG , (31b)
which can be expressed in the compact form as:
ξ˙P=𝒦~ξP+D~P,subscript˙𝜉𝑃~𝒦subscript𝜉𝑃subscript~𝐷𝑃\dot{\xi}_{P}=\tilde{\mathcal{K}}\xi_{P}+\tilde{D}_{P},over˙ start_ARG italic_ξ end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = over~ start_ARG caligraphic_K end_ARG italic_ξ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT + over~ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT , (32)

where ξP=[e~PT,z~T]T2(n1)subscript𝜉𝑃superscriptsuperscriptsubscript~𝑒𝑃𝑇superscript~𝑧𝑇𝑇superscript2𝑛1\xi_{P}=[{\tilde{e}_{P}}^{T},\tilde{z}^{T}]^{T}\in\mathbb{R}^{2(n-1)}italic_ξ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = [ over~ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT , over~ start_ARG italic_z end_ARG start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT 2 ( italic_n - 1 ) end_POSTSUPERSCRIPT, D~P=[(d~p)T,𝟎n1T]T2(n1)subscript~𝐷𝑃superscriptsuperscriptsubscript~𝑑𝑝𝑇superscriptsubscript0𝑛1𝑇𝑇superscript2𝑛1\tilde{D}_{P}=[(\mathcal{R}\tilde{d}_{p})^{T},\boldsymbol{0}_{n-1}^{T}]^{T}\in% \mathbb{R}^{2(n-1)}over~ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = [ ( caligraphic_R over~ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT , bold_0 start_POSTSUBSCRIPT italic_n - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT 2 ( italic_n - 1 ) end_POSTSUPERSCRIPT and

𝒦~=[ββ]=[1ββ1]=Φ~.~𝒦matrix𝛽𝛽tensor-productmatrix1𝛽𝛽1tensor-product~Φ\displaystyle\tilde{\mathcal{K}}=\begin{bmatrix}-\mathcal{R}&\beta\mathcal{R}% \\ -\beta\mathcal{R}&-\mathcal{R}\end{bmatrix}=\begin{bmatrix}-1&\beta\\ -\beta&-1\end{bmatrix}\otimes\mathcal{R}=\tilde{\Phi}\otimes\mathcal{R}.over~ start_ARG caligraphic_K end_ARG = [ start_ARG start_ROW start_CELL - caligraphic_R end_CELL start_CELL italic_β caligraphic_R end_CELL end_ROW start_ROW start_CELL - italic_β caligraphic_R end_CELL start_CELL - caligraphic_R end_CELL end_ROW end_ARG ] = [ start_ARG start_ROW start_CELL - 1 end_CELL start_CELL italic_β end_CELL end_ROW start_ROW start_CELL - italic_β end_CELL start_CELL - 1 end_CELL end_ROW end_ARG ] ⊗ caligraphic_R = over~ start_ARG roman_Φ end_ARG ⊗ caligraphic_R . (37)

Since λ(Φ~)=1±jcβ𝜆~Φplus-or-minus1subscript𝑗𝑐𝛽\lambda(\tilde{\Phi})=-1\pm j_{c}\betaitalic_λ ( over~ start_ARG roman_Φ end_ARG ) = - 1 ± italic_j start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT italic_β and \mathcal{R}caligraphic_R is a positive definite matrix by construction, 𝒦~~𝒦\tilde{\mathcal{K}}over~ start_ARG caligraphic_K end_ARG is Hurwitz and has 2(n1)2𝑛12(n-1)2 ( italic_n - 1 ) strictly negative eigenvalues in accordance with Lemma 4. We are now ready to state the following convergence result, solving Problem (P2):

Theorem 2 (Power-sharing control in presence of attack).

Consider the system (IV) where the power attack signal dP𝟎nsubscript𝑑𝑃subscript0𝑛d_{P}\neq\boldsymbol{0}_{n}italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ≠ bold_0 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT satisfies Assumption 1. Then, for a sufficiently large value of β𝛽\betaitalic_β, the vector mPPsubscript𝑚𝑃𝑃m_{P}Pitalic_m start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT italic_P remains in a small neighborhood of its nominal value while sharing proportional active power, i.e., mPPΔP𝟏nϵPnormsubscript𝑚𝑃𝑃subscriptnormal-Δ𝑃subscript1𝑛subscriptitalic-ϵ𝑃\|m_{P}P-\Delta_{P}\boldsymbol{1}_{n}\|\leq\epsilon_{P}∥ italic_m start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT italic_P - roman_Δ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ∥ ≤ italic_ϵ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT for some small ϵPsubscriptitalic-ϵ𝑃\epsilon_{P}italic_ϵ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT.

Proof.

The solution of (32) is given by ξP(t)=e𝒦~tξP(0)+0te𝒦~(tτ)D~p𝑑τsubscript𝜉𝑃𝑡superscripte~𝒦𝑡subscript𝜉𝑃0superscriptsubscript0𝑡superscripte~𝒦𝑡𝜏subscript~𝐷𝑝differential-d𝜏\xi_{P}(t)={\rm e}^{\tilde{\mathcal{K}}t}\xi_{P}(0)+\int_{0}^{t}{\rm e}^{% \tilde{\mathcal{K}}(t-\tau)}\tilde{D}_{p}d\tauitalic_ξ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_t ) = roman_e start_POSTSUPERSCRIPT over~ start_ARG caligraphic_K end_ARG italic_t end_POSTSUPERSCRIPT italic_ξ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( 0 ) + ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT roman_e start_POSTSUPERSCRIPT over~ start_ARG caligraphic_K end_ARG ( italic_t - italic_τ ) end_POSTSUPERSCRIPT over~ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT italic_d italic_τ. Upon taking norm on both sides and following similar steps as in the proof of Theorem 1, one can obtain limtξP(t)𝒦~1D^Psubscript𝑡normsubscript𝜉𝑃𝑡normsuperscript~𝒦1subscript^𝐷𝑃\lim_{t\to\infty}\|\xi_{P}(t)\|\leq\|\tilde{\mathcal{K}}^{-1}\hat{D}_{P}\|roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ italic_ξ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_t ) ∥ ≤ ∥ over~ start_ARG caligraphic_K end_ARG start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ∥, where D^P=[(d^P)T,𝟎n1T]T2(n1)subscript^𝐷𝑃superscriptsuperscriptsubscript^𝑑𝑃𝑇superscriptsubscript0𝑛1𝑇𝑇superscript2𝑛1\hat{D}_{P}=[(\mathcal{R}\hat{d}_{P})^{T},\boldsymbol{0}_{n-1}^{T}]^{T}\in% \mathbb{R}^{2(n-1)}over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = [ ( caligraphic_R over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT , bold_0 start_POSTSUBSCRIPT italic_n - 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT 2 ( italic_n - 1 ) end_POSTSUPERSCRIPT for some time-independent vector d^Pn1subscript^𝑑𝑃superscript𝑛1\hat{d}_{P}\in\mathbb{R}^{n-1}over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT italic_n - 1 end_POSTSUPERSCRIPT satisfying d^PD¯Pnormsubscript^𝑑𝑃subscript¯𝐷𝑃\|\hat{d}_{P}\|\leq\bar{D}_{P}∥ over^ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ∥ ≤ over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT (see Assumption 1 for D¯Psubscript¯𝐷𝑃\bar{D}_{P}over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT) such that 0te𝒦~(tτ)D~p(τ)𝑑τ0te𝒦~(tτ)D^P𝑑τnormsuperscriptsubscript0𝑡superscripte~𝒦𝑡𝜏subscript~𝐷𝑝𝜏differential-d𝜏normsuperscriptsubscript0𝑡superscripte~𝒦𝑡𝜏subscript^𝐷𝑃differential-d𝜏\|\int_{0}^{t}{\rm e}^{\tilde{\mathcal{K}}(t-\tau)}\tilde{D}_{p}(\tau)d\tau\|% \leq\|\int_{0}^{t}{\rm e}^{\tilde{\mathcal{K}}(t-\tau)}\hat{D}_{P}d\tau\|∥ ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT roman_e start_POSTSUPERSCRIPT over~ start_ARG caligraphic_K end_ARG ( italic_t - italic_τ ) end_POSTSUPERSCRIPT over~ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT ( italic_τ ) italic_d italic_τ ∥ ≤ ∥ ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_t end_POSTSUPERSCRIPT roman_e start_POSTSUPERSCRIPT over~ start_ARG caligraphic_K end_ARG ( italic_t - italic_τ ) end_POSTSUPERSCRIPT over^ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT italic_d italic_τ ∥, according to Lemma 2 from Subsection I-A. Now, similar to (24), it can be concluded that

limt[e~P(t)z~(t)]λmax()[(+β2)1β(+β2)1]D¯P.subscript𝑡normmatrixsubscript~𝑒𝑃𝑡~𝑧𝑡subscript𝜆normmatrixsuperscriptsuperscript𝛽21𝛽superscriptsuperscript𝛽21subscript¯𝐷𝑃\lim_{t\to\infty}\left\|\begin{bmatrix}\tilde{e}_{P}(t)\\ \tilde{z}(t)\end{bmatrix}\right\|\leq\lambda_{\max}(\mathcal{R})\left\|\begin{% bmatrix}(\mathcal{R}+{\beta}^{2}\mathcal{R})^{-1}\\ \beta(\mathcal{R}+{\beta}^{2}\mathcal{R})^{-1}\end{bmatrix}\right\|\bar{D}_{P}.roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ [ start_ARG start_ROW start_CELL over~ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_t ) end_CELL end_ROW start_ROW start_CELL over~ start_ARG italic_z end_ARG ( italic_t ) end_CELL end_ROW end_ARG ] ∥ ≤ italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( caligraphic_R ) ∥ [ start_ARG start_ROW start_CELL ( caligraphic_R + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT caligraphic_R ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_CELL end_ROW start_ROW start_CELL italic_β ( caligraphic_R + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT caligraphic_R ) start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT end_CELL end_ROW end_ARG ] ∥ over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT . (38)

Now, exploiting Lemma 6 by replacing A𝐴Aitalic_A by \mathcal{R}caligraphic_R, it can be obtained that

limt[e~P(t)z~(t)]λmax()D¯Pλmin()1+β2=λmax(L)D¯Pλ2(L)1+β2,subscript𝑡normmatrixsubscript~𝑒𝑃𝑡~𝑧𝑡subscript𝜆subscript¯𝐷𝑃subscript𝜆1superscript𝛽2subscript𝜆𝐿subscript¯𝐷𝑃subscript𝜆2𝐿1superscript𝛽2\lim_{t\to\infty}\left\|\begin{bmatrix}\tilde{e}_{P}(t)\\ \tilde{z}(t)\end{bmatrix}\right\|\leq\frac{\lambda_{\max}(\mathcal{R})\bar{D}_% {P}}{\lambda_{\min}(\mathcal{R})\sqrt{1+\beta^{2}}}=\frac{\lambda_{\max}(L)% \bar{D}_{P}}{\lambda_{2}(L)\sqrt{1+\beta^{2}}},roman_lim start_POSTSUBSCRIPT italic_t → ∞ end_POSTSUBSCRIPT ∥ [ start_ARG start_ROW start_CELL over~ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_t ) end_CELL end_ROW start_ROW start_CELL over~ start_ARG italic_z end_ARG ( italic_t ) end_CELL end_ROW end_ARG ] ∥ ≤ divide start_ARG italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( caligraphic_R ) over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_ARG start_ARG italic_λ start_POSTSUBSCRIPT roman_min end_POSTSUBSCRIPT ( caligraphic_R ) square-root start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_ARG = divide start_ARG italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( italic_L ) over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_ARG start_ARG italic_λ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( italic_L ) square-root start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_ARG , (39)

since λmax()=λmax(L)subscript𝜆subscript𝜆𝐿\lambda_{\max}(\mathcal{R})=\lambda_{\max}(L)italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( caligraphic_R ) = italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( italic_L ) and λmin()=λ2(L)subscript𝜆subscript𝜆2𝐿\lambda_{\min}(\mathcal{R})=\lambda_{2}(L)italic_λ start_POSTSUBSCRIPT roman_min end_POSTSUBSCRIPT ( caligraphic_R ) = italic_λ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( italic_L ) by construction, where λ2(L)subscript𝜆2𝐿\lambda_{2}(L)italic_λ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( italic_L ) is the Fielder eigenvalue of the Laplacian L𝐿Litalic_L. From (39), it can be concluded that e~P(t)ϵPnormsubscript~𝑒𝑃𝑡subscriptitalic-ϵ𝑃\|\tilde{e}_{P}(t)\|\leq\epsilon_{P}∥ over~ start_ARG italic_e end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_t ) ∥ ≤ italic_ϵ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT (and hence, eP(t)ϵPnormsubscript𝑒𝑃𝑡subscriptitalic-ϵ𝑃\|{e}_{P}(t)\|\leq\epsilon_{P}∥ italic_e start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_t ) ∥ ≤ italic_ϵ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT) as t𝑡t\to\inftyitalic_t → ∞, where ϵP=λmax(L)D¯Pλ2(L)1+β2subscriptitalic-ϵ𝑃subscript𝜆𝐿subscript¯𝐷𝑃subscript𝜆2𝐿1superscript𝛽2\epsilon_{P}=\frac{\lambda_{\max}(L)\bar{D}_{P}}{\lambda_{2}(L)\sqrt{1+\beta^{% 2}}}italic_ϵ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = divide start_ARG italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT ( italic_L ) over¯ start_ARG italic_D end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT end_ARG start_ARG italic_λ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( italic_L ) square-root start_ARG 1 + italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG end_ARG. Furthermore, for sufficiently large values of gain β𝛽\betaitalic_β, ϵPsubscriptitalic-ϵ𝑃\epsilon_{P}italic_ϵ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT assumes small value, and hence, mPPsubscript𝑚𝑃𝑃m_{P}Pitalic_m start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT italic_P converges to a small neighborhood around ΔP𝟏nsubscriptΔ𝑃subscript1𝑛\Delta_{P}\boldsymbol{1}_{n}roman_Δ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT as t𝑡t\to\inftyitalic_t → ∞, using (26). ∎

V Attack Detection: Exploring Interaction Between Control and Auxiliary Layers

Addressing Problem (P3), this section proposes an attack detection method relying on the interaction between the control layer ΣΣ\Sigmaroman_Σ and auxiliary layer ΠΠ\Piroman_Π in Fig. 1. For brevity and clarity, we provide a discussion for the frequency attacks dωsubscript𝑑𝜔d_{\omega}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT affecting dynamics Sωsubscript𝑆𝜔S_{\omega}italic_S start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT in (5). However, it is equally applicable to the power attacks dPsubscript𝑑𝑃d_{P}italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT appearing in the dynamics SPsubscript𝑆𝑃S_{P}italic_S start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT.

Refer to caption
Figure 2: Information flow due to interaction network (βA𝛽𝐴\beta Aitalic_β italic_A) between control (ΣΣ\Sigmaroman_Σ) and auxiliary (ΠΠ\Piroman_Π) layers.

Since the layer ΣΣ\Sigmaroman_Σ is vulnerable to attacks injected by the attacker as compared to the secured and hidden layer ΠΠ\Piroman_Π, one can exploit the layer ΠΠ\Piroman_Π to check the authenticity of the information shared between two nodes in the layer ΣΣ\Sigmaroman_Σ. As shown in Fig. 1, the layer ΠΠ\Piroman_Π contains a set of (virtual) nodes, directly associated with individual (actual) nodes in the layer ΣΣ\Sigmaroman_Σ. Consequently, the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT node in ΣΣ\Sigmaroman_Σ has state information zisubscript𝑧𝑖z_{i}italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT of the associated node in ΠΠ\Piroman_Π and similarly the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT node in ΠΠ\Piroman_Π has information ωisubscript𝜔𝑖\omega_{i}italic_ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT of the associated node in ΣΣ\Sigmaroman_Σ. Further, both the layers are connected to each other via interconnection matrices βA𝛽𝐴\beta Aitalic_β italic_A. With respect to the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT node, (III) can be rewritten, by segregating terms on the basis of the contributions by the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT node itself and the neighboring nodes in both ΣΣ\Sigmaroman_Σ and ΠΠ\Piroman_Π layers, as follows [30]:

ω˙isubscript˙𝜔𝑖\displaystyle\dot{\omega}_{i}over˙ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT =A[i]ωβ(|𝒩i|+gi)zi+j𝒩iβzj+giω*+L[i]dωabsentsubscript𝐴delimited-[]𝑖𝜔𝛽subscript𝒩𝑖subscript𝑔𝑖subscript𝑧𝑖subscript𝑗subscript𝒩𝑖𝛽subscript𝑧𝑗subscript𝑔𝑖superscript𝜔subscript𝐿delimited-[]𝑖subscript𝑑𝜔\displaystyle=A_{[i]}\omega-\beta(|\mathcal{N}_{i}|+g_{i})z_{i}+\sum_{j\in% \mathcal{N}_{i}}\beta z_{j}+g_{i}{\omega}^{*}+L_{[i]}d_{\omega}= italic_A start_POSTSUBSCRIPT [ italic_i ] end_POSTSUBSCRIPT italic_ω - italic_β ( | caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | + italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + ∑ start_POSTSUBSCRIPT italic_j ∈ caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_β italic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT + italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT + italic_L start_POSTSUBSCRIPT [ italic_i ] end_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT (40a)
z˙isubscript˙𝑧𝑖\displaystyle\dot{z}_{i}over˙ start_ARG italic_z end_ARG start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT =(|𝒩i|+gi)zi+β(|𝒩i|+gi)ωi+j𝒩i(zjβωj)absentsubscript𝒩𝑖subscript𝑔𝑖subscript𝑧𝑖𝛽subscript𝒩𝑖subscript𝑔𝑖subscript𝜔𝑖subscript𝑗subscript𝒩𝑖subscript𝑧𝑗𝛽subscript𝜔𝑗\displaystyle=-(|\mathcal{N}_{i}|+g_{i})z_{i}+\beta(|\mathcal{N}_{i}|+g_{i})% \omega_{i}+\sum_{j\in\mathcal{N}_{i}}(z_{j}-\beta{\omega}_{j})= - ( | caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | + italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_β ( | caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | + italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) italic_ω start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + ∑ start_POSTSUBSCRIPT italic_j ∈ caligraphic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( italic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - italic_β italic_ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT )
βgiω*,𝛽subscript𝑔𝑖superscript𝜔\displaystyle\qquad-\beta g_{i}{\omega}^{*},- italic_β italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT , (40b)

where A[i],L[i]subscript𝐴delimited-[]𝑖subscript𝐿delimited-[]𝑖A_{[i]},L_{[i]}italic_A start_POSTSUBSCRIPT [ italic_i ] end_POSTSUBSCRIPT , italic_L start_POSTSUBSCRIPT [ italic_i ] end_POSTSUBSCRIPT denote the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT row of matrices A𝐴Aitalic_A and L𝐿Litalic_L, respectively. Further, gi=1subscript𝑔𝑖1g_{i}=1italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = 1 if the node i𝑖iitalic_i is the leader, else gi=0subscript𝑔𝑖0g_{i}=0italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = 0. The following observations are straightforward toward practical implementation of (V):

  • In (40a), the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT node in ΣΣ\Sigmaroman_Σ has access to the information βzj𝛽subscript𝑧𝑗\beta z_{j}italic_β italic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT of the neighboring nodes in ΠΠ\Piroman_Π via its corresponding ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT node in ΠΠ\Piroman_Π, shared through the interaction network between ΣΣ\Sigmaroman_Σ and ΠΠ\Piroman_Π, as shown in Fig. 2(a). The implementation of remaining terms in (40a) is straightforward.

  • Analogously, in (40b), the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT node in ΠΠ\Piroman_Π has information zjβωjsubscript𝑧𝑗𝛽subscript𝜔𝑗z_{j}-\beta\omega_{j}italic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - italic_β italic_ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT from the neighboring nodes in ΠΠ\Piroman_Π itself where the information βωj𝛽subscript𝜔𝑗-\beta\omega_{j}- italic_β italic_ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT is shared through the interaction between the two layers, as shown Fig. 2(b). Again, the implementation of the remaining terms in (40b) is straightforward.

From the above discussion, it is clear that the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT node in ΣΣ\Sigmaroman_Σ has access to the following two pieces of additional information due to the interaction between ΣΣ\Sigmaroman_Σ and ΠΠ\Piroman_Π:

z¯ij=βzj,ω¯ij=zjβωj,formulae-sequencesubscript¯𝑧𝑖𝑗𝛽subscript𝑧𝑗subscript¯𝜔𝑖𝑗subscript𝑧𝑗𝛽subscript𝜔𝑗\displaystyle\bar{z}_{ij}=\beta z_{j},\qquad\bar{\omega}_{ij}=z_{j}-\beta{% \omega}_{j},over¯ start_ARG italic_z end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = italic_β italic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , over¯ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = italic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - italic_β italic_ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , (41)

where notations ω¯ijsubscript¯𝜔𝑖𝑗\bar{\omega}_{ij}over¯ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT and z¯ijsubscript¯𝑧𝑖𝑗\bar{z}_{ij}over¯ start_ARG italic_z end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT are used to emphasize that these signals contain information about the neighboring nodes j𝑗jitalic_j in ΠΠ\Piroman_Π. According to (41), the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT node estimates the frequency received from the jthsuperscript𝑗thj^{\text{th}}italic_j start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT node in ΠΠ\Piroman_Π as:

ω^ij=1β[z¯ijβω¯ij],subscript^𝜔𝑖𝑗1𝛽delimited-[]subscript¯𝑧𝑖𝑗𝛽subscript¯𝜔𝑖𝑗\hat{\omega}_{ij}=\frac{1}{\beta}\left[\frac{\bar{z}_{ij}}{\beta}-\bar{\omega}% _{ij}\right],over^ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT = divide start_ARG 1 end_ARG start_ARG italic_β end_ARG [ divide start_ARG over¯ start_ARG italic_z end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT end_ARG start_ARG italic_β end_ARG - over¯ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT ] , (42)

which can be compared with the actual frequency signal ωˇijsubscriptˇ𝜔𝑖𝑗\check{\omega}_{ij}overroman_ˇ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT in (3) received at the ithsuperscript𝑖thi^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT node to testify whether the communication link (i,j)𝑖𝑗(i,j)\in\mathcal{E}( italic_i , italic_j ) ∈ caligraphic_E in ΣΣ\Sigmaroman_Σ is under attack or not. Consequently, if ω^ijωˇijsubscript^𝜔𝑖𝑗subscriptˇ𝜔𝑖𝑗\hat{\omega}_{ij}\neq\check{\omega}_{ij}over^ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT ≠ overroman_ˇ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT italic_i italic_j end_POSTSUBSCRIPT, the corresponding (i,j)thsuperscript𝑖𝑗th(i,j)^{\text{th}}( italic_i , italic_j ) start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT link is declared to be under attack. Once the corrupted communication link is identified, it can be isolated (provided the remaining network contains a spanning tree) from the rest of the control layer till the time attack remains prevalent in the network.

Remark 2.

It is essential to emphasize that the attack detection approach described above is a byproduct of the interaction between Σnormal-Σ\Sigmaroman_Σ and Πnormal-Π\Piroman_Π. It can be employed if there is a specific need to isolate any corrupted link, thereby enhancing the accuracy of the steady-state behavior. However, it’s crucial to note that the isolation of any link is not mandatory for the proper functioning of the proposed resilient controllers (III) and (IV) for some finite ϵωsubscriptitalic-ϵ𝜔\epsilon_{\omega}italic_ϵ start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT and ϵPsubscriptitalic-ϵ𝑃\epsilon_{P}italic_ϵ start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT. Moreover, the isolation between the layers Σnormal-Σ\Sigmaroman_Σ and Πnormal-Π\Piroman_Π can be ensured using contemporary communication network slicing approaches, such as cloud computing management and software-defined networking [31, 32]. These advanced techniques provide effective mechanisms for segregating communication channels and ensuring the secure operation of the system.

Refer to caption
Figure 3: The test islanded AC microgrid under consideration.
TABLE I: System Parameters
Parameter Value
Droop gain (mP1,mP2subscript𝑚subscript𝑃1subscript𝑚subscript𝑃2m_{P_{1}},m_{P_{2}}italic_m start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_m start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT) 2×1032superscript1032\times 10^{-3}2 × 10 start_POSTSUPERSCRIPT - 3 end_POSTSUPERSCRIPT
Droop gain (mP3,mP4subscript𝑚subscript𝑃3subscript𝑚subscript𝑃4m_{P_{3}},m_{P_{4}}italic_m start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_m start_POSTSUBSCRIPT italic_P start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT end_POSTSUBSCRIPT) 3×1033superscript1033\times 10^{-3}3 × 10 start_POSTSUPERSCRIPT - 3 end_POSTSUPERSCRIPT
Filter inductance (Lfsubscript𝐿𝑓L_{f}italic_L start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT) 1.351.351.351.35 mH
Filter capacitance (Cfsubscript𝐶𝑓C_{f}italic_C start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT) 50505050μ𝜇\muitalic_μF
Coupling inductance (Lcsubscript𝐿𝑐L_{c}italic_L start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT) 0.350.350.350.35 mH
Line impedance (Z1,Z2subscriptZ1subscriptZ2\rm{Z_{1}},\rm{Z_{2}}roman_Z start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , roman_Z start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT) R=1.2Ω𝑅1.2ΩR=1.2\Omegaitalic_R = 1.2 roman_Ω, L=𝐿absentL=italic_L =12mH
Line impedance (Z3,Z4subscriptZ3subscriptZ4\rm{Z_{3}},\rm{Z_{4}}roman_Z start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT , roman_Z start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT) R=1Ω𝑅1ΩR=1\Omegaitalic_R = 1 roman_Ω, L=𝐿absentL=italic_L =10mH
Line impedance (Z5,Z6subscriptZ5subscriptZ6\rm{Z_{5}},\rm{Z_{6}}roman_Z start_POSTSUBSCRIPT 5 end_POSTSUBSCRIPT , roman_Z start_POSTSUBSCRIPT 6 end_POSTSUBSCRIPT) R=0.8Ω𝑅0.8ΩR=0.8\Omegaitalic_R = 0.8 roman_Ω, L=𝐿absentL=italic_L =8mH
Line impedance (Z7,Z8subscriptZ7subscriptZ8\rm{Z_{7}},\rm{Z_{8}}roman_Z start_POSTSUBSCRIPT 7 end_POSTSUBSCRIPT , roman_Z start_POSTSUBSCRIPT 8 end_POSTSUBSCRIPT) R=0.5Ω𝑅0.5ΩR=0.5\Omegaitalic_R = 0.5 roman_Ω, L=𝐿absentL=italic_L =5mH
Loads (L1,L3,L5subscriptL1subscriptL3subscriptL5\rm{L_{1},L_{3},L_{5}}roman_L start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , roman_L start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT , roman_L start_POSTSUBSCRIPT 5 end_POSTSUBSCRIPT) P=7𝑃7P=7italic_P = 7 kW, Q=4𝑄4Q=4italic_Q = 4 kVar
Loads (L2,L4subscriptL2subscriptL4\rm{L_{2},L_{4}}roman_L start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , roman_L start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT) P=10𝑃10P=10italic_P = 10 kW, Q=5𝑄5Q=5italic_Q = 5 kVar

VI Simulation Case Studies

Consider a 3-phase, 415 V islanded AC microgrid as shown in Fig. 3, which comprises 4444 DGs, connected through 8888 transmission lines and 5555 loads, whose values are as listed in Table I. The DGs are connected as per the undirected and connected communication topology, as shown in Fig. 3, which has the following Laplacian:

L=[2101121001211012].𝐿matrix2101121001211012L=\begin{bmatrix}2&-1&0&-1\\ -1&2&-1&0\\ 0&-1&2&-1\\ -1&0&-1&2\end{bmatrix}.italic_L = [ start_ARG start_ROW start_CELL 2 end_CELL start_CELL - 1 end_CELL start_CELL 0 end_CELL start_CELL - 1 end_CELL end_ROW start_ROW start_CELL - 1 end_CELL start_CELL 2 end_CELL start_CELL - 1 end_CELL start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL start_CELL - 1 end_CELL start_CELL 2 end_CELL start_CELL - 1 end_CELL end_ROW start_ROW start_CELL - 1 end_CELL start_CELL 0 end_CELL start_CELL - 1 end_CELL start_CELL 2 end_CELL end_ROW end_ARG ] .

Assume that DG 1111 acts as the leader and has access to reference frequency ω*=314superscript𝜔314\omega^{*}=314italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT = 314 rad/s (f*=ω*/2π=50superscript𝑓superscript𝜔2𝜋50f^{*}=\omega^{*}/2\pi=50italic_f start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT = italic_ω start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT / 2 italic_π = 50 Hz), with all the remaining DGs acting as fully connected followers. Therefore, the pinning gain g1=1subscript𝑔11g_{1}=1italic_g start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = 1 and gi=0subscript𝑔𝑖0g_{i}=0italic_g start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = 0 for i=2,3,4𝑖234i=2,3,4italic_i = 2 , 3 , 4. Associated with each DG, there exist control and auxiliary nodes in the layers ΣΣ\Sigmaroman_Σ and ΠΠ\Piroman_Π, respectively. Consequently, the matrices A,B,C𝐴𝐵𝐶A,B,Citalic_A , italic_B , italic_C in (III) can be obtained as

A=[3101121001211012],B=[1000],C=A𝟏n=[1000].formulae-sequence𝐴matrix3101121001211012formulae-sequence𝐵matrix1000𝐶𝐴subscript1𝑛matrix1000A=\begin{bmatrix}-3&1&0&1\\ 1&-2&1&0\\ 0&1&-2&1\\ 1&0&1&-2\end{bmatrix},\ B=\begin{bmatrix}1\\ 0\\ 0\\ 0\end{bmatrix},\ C=A\boldsymbol{1}_{n}=\begin{bmatrix}-1\\ 0\\ 0\\ 0\end{bmatrix}.italic_A = [ start_ARG start_ROW start_CELL - 3 end_CELL start_CELL 1 end_CELL start_CELL 0 end_CELL start_CELL 1 end_CELL end_ROW start_ROW start_CELL 1 end_CELL start_CELL - 2 end_CELL start_CELL 1 end_CELL start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL start_CELL 1 end_CELL start_CELL - 2 end_CELL start_CELL 1 end_CELL end_ROW start_ROW start_CELL 1 end_CELL start_CELL 0 end_CELL start_CELL 1 end_CELL start_CELL - 2 end_CELL end_ROW end_ARG ] , italic_B = [ start_ARG start_ROW start_CELL 1 end_CELL end_ROW start_ROW start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL end_ROW end_ARG ] , italic_C = italic_A bold_1 start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT = [ start_ARG start_ROW start_CELL - 1 end_CELL end_ROW start_ROW start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL end_ROW end_ARG ] .

According to Lemma 5 and Lemma 7, one can easily verify that, in the absence of any attack, the frequencies of all the DGs converge to 314314314314 rad/s, while DGs 1, 2 and DGs 3, 4 share equal active power as per their equal droop coefficients. We now analyze protocols (III) and (IV) in case of an attack as discussed below.

Refer to caption
Figure 4: DG frequency under attack and absence of ΠΠ\Piroman_Π layer.
Refer to caption
Figure 5: DG active power under attack and absence of ΠΠ\Piroman_Π layer.
Refer to caption
Figure 6: DG frequency under attack and presence of ΠΠ\Piroman_Π layer.
Refer to caption
Figure 7: DG active power under attack and presence of ΠΠ\Piroman_Π layer.

VI-A Controller performance under attacked condition

According to Assumption 1, we consider that the frequency and power attacks are governed by the dynamics:

d˙ω=Fωdω+Gωω,subscript˙𝑑𝜔subscript𝐹𝜔subscript𝑑𝜔subscript𝐺𝜔𝜔\dot{d}_{\omega}=F_{\omega}d_{\omega}+G_{\omega}\omega,over˙ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT = italic_F start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT + italic_G start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_ω , (43)

where

Fω=[5000030000500003],subscript𝐹𝜔matrix5000030000500003F_{\omega}=\begin{bmatrix}-5&0&0&0\\ 0&-3&0&0\\ 0&0&-5&0\\ 0&0&0&-3\end{bmatrix},italic_F start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT = [ start_ARG start_ROW start_CELL - 5 end_CELL start_CELL 0 end_CELL start_CELL 0 end_CELL start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL start_CELL - 3 end_CELL start_CELL 0 end_CELL start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL start_CELL 0 end_CELL start_CELL - 5 end_CELL start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL start_CELL 0 end_CELL start_CELL 0 end_CELL start_CELL - 3 end_CELL end_ROW end_ARG ] ,
Gω=[0.0010.0020.0030.0040.0030.0010.0040.0020.0040.0030.0020.0010.0020.0040.0010.003].subscript𝐺𝜔matrix0.0010.0020.0030.0040.0030.0010.0040.0020.0040.0030.0020.0010.0020.0040.0010.003G_{\omega}=\begin{bmatrix}-0.001&-0.002&-0.003&-0.004\\ -0.003&-0.001&-0.004&-0.002\\ 0.004&0.003&0.002&0.001\\ 0.002&0.004&0.001&0.003\end{bmatrix}.italic_G start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT = [ start_ARG start_ROW start_CELL - 0.001 end_CELL start_CELL - 0.002 end_CELL start_CELL - 0.003 end_CELL start_CELL - 0.004 end_CELL end_ROW start_ROW start_CELL - 0.003 end_CELL start_CELL - 0.001 end_CELL start_CELL - 0.004 end_CELL start_CELL - 0.002 end_CELL end_ROW start_ROW start_CELL 0.004 end_CELL start_CELL 0.003 end_CELL start_CELL 0.002 end_CELL start_CELL 0.001 end_CELL end_ROW start_ROW start_CELL 0.002 end_CELL start_CELL 0.004 end_CELL start_CELL 0.001 end_CELL start_CELL 0.003 end_CELL end_ROW end_ARG ] .

and

d˙P=FpdP+GP(mPP),subscript˙𝑑𝑃subscript𝐹𝑝subscript𝑑𝑃subscript𝐺𝑃subscript𝑚𝑃𝑃\dot{d}_{P}=F_{p}d_{P}+G_{P}(m_{P}P),over˙ start_ARG italic_d end_ARG start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = italic_F start_POSTSUBSCRIPT italic_p end_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT + italic_G start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_m start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT italic_P ) , (44)

where

FP=[2.50000300002.500003],subscript𝐹𝑃matrix2.50000300002.500003F_{P}=\begin{bmatrix}-2.5&0&0&0\\ 0&-3&0&0\\ 0&0&-2.5&0\\ 0&0&0&-3\end{bmatrix},italic_F start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = [ start_ARG start_ROW start_CELL - 2.5 end_CELL start_CELL 0 end_CELL start_CELL 0 end_CELL start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL start_CELL - 3 end_CELL start_CELL 0 end_CELL start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL start_CELL 0 end_CELL start_CELL - 2.5 end_CELL start_CELL 0 end_CELL end_ROW start_ROW start_CELL 0 end_CELL start_CELL 0 end_CELL start_CELL 0 end_CELL start_CELL - 3 end_CELL end_ROW end_ARG ] ,
GP=[0.0350.0360.0370.0380.0880.0850.0860.0870.0370.0380.0350.0360.0860.0870.0880.085].subscript𝐺𝑃matrix0.0350.0360.0370.0380.0880.0850.0860.0870.0370.0380.0350.0360.0860.0870.0880.085G_{P}=\begin{bmatrix}-0.035&-0.036&-0.037&-0.038\\ -0.088&-0.085&-0.086&-0.087\\ 0.037&0.038&0.035&0.036\\ 0.086&0.087&0.088&0.085\end{bmatrix}.italic_G start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT = [ start_ARG start_ROW start_CELL - 0.035 end_CELL start_CELL - 0.036 end_CELL start_CELL - 0.037 end_CELL start_CELL - 0.038 end_CELL end_ROW start_ROW start_CELL - 0.088 end_CELL start_CELL - 0.085 end_CELL start_CELL - 0.086 end_CELL start_CELL - 0.087 end_CELL end_ROW start_ROW start_CELL 0.037 end_CELL start_CELL 0.038 end_CELL start_CELL 0.035 end_CELL start_CELL 0.036 end_CELL end_ROW start_ROW start_CELL 0.086 end_CELL start_CELL 0.087 end_CELL start_CELL 0.088 end_CELL start_CELL 0.085 end_CELL end_ROW end_ARG ] .

Please note that these frequency and power attacks (43) and (44) are completely unknown to the controller and are initialized in the system as injections by the attacker at a given time. To emphasize the importance of introducing an auxiliary layer in the distributed control framework, we now discuss the performance of proposed controllers in the absence and presence of ΠΠ\Piroman_Π, followed by the effect of load perturbations.

Refer to caption
Figure 8: DG frequency under attack and load perturbation.
Refer to caption
Figure 9: DG active power under attack and load perturbation.
Refer to caption
Figure 10: Plot of frequency attack dωsubscript𝑑𝜔d_{\omega}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT components with time.
Refer to caption
Figure 11: Plot of power attack dPsubscript𝑑𝑃d_{P}italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT components with time.

VI-A1 Absence of auxiliary layer

We first illustrate the test system in the presence of cyber-attacks and the absence of an auxiliary layer (and hence, the auxiliary nodes) from the frequency and power controllers (III) and (IV), respectively.

Initially, in the absence of an attack, the microgrid is operating normally under controllers (6a) and (25a), at 314314314314 rad/s with DGs 1, 2 and 3, 4 delivering equal power at 6.76.76.76.7 kW and 4.54.54.54.5 kW, respectively, as shown in Figs. 4 and 5 for the initial 10 s. The frequency and power attacks in (43) and (44) are initialized at t=10𝑡10t=10italic_t = 10 s and t=30𝑡30t=30italic_t = 30 s, causing the frequency of all the DGs to deviate by about 19191919 rad/s from the nominal value at 10 s and settle down to a common steady-state value of 295295295295 rad/s due to the distributed action of nodes in the control layer, which is further shifted to 298298298298 rad/s post introduction of power attack at t=30𝑡30t=30italic_t = 30 s. Similarly, the active power-sharing is also adversely affected, as depicted by Fig. 5.

VI-A2 Presence of auxiliary layer

We now simulate the test microgrid in the presence of auxiliary layer in (III) and (IV), where the initial states z(0)𝑧0z(0)italic_z ( 0 ) of the auxiliary nodes are randomly chosen and gain β=2𝛽2\beta=2italic_β = 2. As shown in Fig. 6, frequencies are restored in the neighborhood of 314314314314 rad/s in about 5555 s, post attacks (43) and (44), introduced at t=10𝑡10t=10italic_t = 10 s and t=30𝑡30t=30italic_t = 30 s, respectively. Similarly, Fig. 7 shows that power-sharing is also maintained for DGs 1, 2 and 3, 4 in the neighborhood of their nominal values, after a slight deviation at t=10𝑡10t=10italic_t = 10 s and t=30𝑡30t=30italic_t = 30 s, which lasts approximately about 1.51.51.51.5 s.

VI-A3 Effect of load perturbations

In addition to the resiliency against frequency and power attacks, we also verify the robustness of proposed controllers (III) and (IV) against abrupt load deviations. For illustration, we consider here that the frequency and power attacks are initiated at t=10𝑡10t=10italic_t = 10 s and t=50𝑡50t=50italic_t = 50 s with different (initial) values for each communication link, given by, dω(t=10s)=[4.5,2.5,4,2]Tsubscript𝑑𝜔𝑡10ssuperscript4.52.542𝑇d_{\omega}(t=10~{}{\rm s})=[4.5,2.5,-4,-2]^{T}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT ( italic_t = 10 roman_s ) = [ 4.5 , 2.5 , - 4 , - 2 ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT and dP(t=50s)=[4,2.5,3,1.5]Tsubscript𝑑𝑃𝑡50ssuperscript42.531.5𝑇d_{P}(t=50~{}{\rm s})=[-4,-2.5,3,1.5]^{T}italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT ( italic_t = 50 roman_s ) = [ - 4 , - 2.5 , 3 , 1.5 ] start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT, respectively. Further, the loads L2,L4subscriptL2subscriptL4\rm{L_{2},L_{4}}roman_L start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , roman_L start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT are increased by 0.50.50.50.5 times their initial magnitude at t=30𝑡30t=30italic_t = 30 s and then decreased by the same amount at t=70𝑡70t=70italic_t = 70 s, respectively. Fig. 8 depicts that the proposed resilient control scheme restores the DG frequencies to their nominal value within a span of 10101010 s. Similarly, Fig. 9 illustrates accurate power-sharing post load perturbation, with DGs 1, 2 now sharing 8888 kW and DGs 3, 4 sharing 5.45.45.45.4 kW, respectively. The plots for dωsubscript𝑑𝜔d_{\omega}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT and dPsubscript𝑑𝑃d_{P}italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT are shown in Figs. 10 and 11, respectively, where the attacks converge to different steady-state values. Note that the term Gωωsubscript𝐺𝜔𝜔G_{\omega}\omegaitalic_G start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_ω in (43) is of the order of 103superscript10310^{-3}10 start_POSTSUPERSCRIPT - 3 end_POSTSUPERSCRIPT and is dominated by the first term Fωdωsubscript𝐹𝜔subscript𝑑𝜔F_{\omega}d_{\omega}italic_F start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT, the plot for dωsubscript𝑑𝜔d_{\omega}italic_d start_POSTSUBSCRIPT italic_ω end_POSTSUBSCRIPT does not show noticeable fluctuations with load perturbations, as compared to dPsubscript𝑑𝑃d_{P}italic_d start_POSTSUBSCRIPT italic_P end_POSTSUBSCRIPT.

VI-B Attack Detection

Refer to caption
(a) During attack
Refer to caption
(b) After attack
Figure 12: Communication topology before and after attack isolation. Topology (b) also contains a spanning tree.
Refer to caption
Figure 13: Plot of dω4subscript𝑑subscript𝜔4d_{\omega_{4}}italic_d start_POSTSUBSCRIPT italic_ω start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT end_POSTSUBSCRIPT with time.
Refer to caption
Figure 14: Attack detection at t=10𝑡10t=10italic_t = 10 s as ωˇ14ω^14subscriptˇ𝜔14subscript^𝜔14\check{\omega}_{14}\neq\hat{\omega}_{14}overroman_ˇ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT 14 end_POSTSUBSCRIPT ≠ over^ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT 14 end_POSTSUBSCRIPT.
Refer to caption
Figure 15: DG frequency with topology in Fig. 12(a).
Refer to caption
Figure 16: DG active power with topology in Fig. 12(b).

To illustrate this, we consider the following scenario wherein the communication link between DG 1 and DG 4 is under attack dω4subscript𝑑subscript𝜔4d_{\omega_{4}}\in\mathbb{R}italic_d start_POSTSUBSCRIPT italic_ω start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT end_POSTSUBSCRIPT ∈ blackboard_R as shown in Fig. 12(a), which is initialized at t=10𝑡10t=10italic_t = 10 s with an initial magnitude of 22-2- 2 rad/s as shown in Fig. 13, with all the other attack components being 0. Due to this, a corrupted frequency signal ωˇ14=ω4+dω4subscriptˇ𝜔14subscript𝜔4subscript𝑑subscript𝜔4\check{\omega}_{14}=\omega_{4}+d_{\omega_{4}}overroman_ˇ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT 14 end_POSTSUBSCRIPT = italic_ω start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT + italic_d start_POSTSUBSCRIPT italic_ω start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT end_POSTSUBSCRIPT (please refer to (3)) is sent from node 4444 to node 1111 in the control layer ΣΣ\Sigmaroman_Σ. However, DGs 1111 and 4444 share an additional information through the auxiliary layer ΠΠ\Piroman_Π according to (41), and is given by z¯14=βz4,ω¯14=z4βω4formulae-sequencesubscript¯𝑧14𝛽subscript𝑧4subscript¯𝜔14subscript𝑧4𝛽subscript𝜔4\bar{z}_{14}=\beta z_{4},\ \bar{\omega}_{14}=z_{4}-\beta{\omega}_{4}over¯ start_ARG italic_z end_ARG start_POSTSUBSCRIPT 14 end_POSTSUBSCRIPT = italic_β italic_z start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT , over¯ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT 14 end_POSTSUBSCRIPT = italic_z start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT - italic_β italic_ω start_POSTSUBSCRIPT 4 end_POSTSUBSCRIPT, using which, the estimated frequency signal at node 1, due to an attack on node 4, can be calculated using (42) as ω^14=1β(z¯14βω¯14)subscript^𝜔141𝛽subscript¯𝑧14𝛽subscript¯𝜔14\hat{\omega}_{14}=\frac{1}{\beta}(\frac{\bar{z}_{14}}{\beta}-\bar{\omega}_{14})over^ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT 14 end_POSTSUBSCRIPT = divide start_ARG 1 end_ARG start_ARG italic_β end_ARG ( divide start_ARG over¯ start_ARG italic_z end_ARG start_POSTSUBSCRIPT 14 end_POSTSUBSCRIPT end_ARG start_ARG italic_β end_ARG - over¯ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT 14 end_POSTSUBSCRIPT ).

Fig. 14 shows the plot of actual ωˇ14subscriptˇ𝜔14\check{\omega}_{14}overroman_ˇ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT 14 end_POSTSUBSCRIPT and estimated frequency signal ω^14subscript^𝜔14\hat{\omega}_{14}over^ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT 14 end_POSTSUBSCRIPT with time. Clearly, ωˇ14ω^14subscriptˇ𝜔14subscript^𝜔14\check{\omega}_{14}\neq\hat{\omega}_{14}overroman_ˇ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT 14 end_POSTSUBSCRIPT ≠ over^ start_ARG italic_ω end_ARG start_POSTSUBSCRIPT 14 end_POSTSUBSCRIPT after t=10𝑡10t=10italic_t = 10 s, and hence, an attack is detected on the communication link connecting nodes 1 and 4. This attack can be isolated by removing the edge (1,4)14(1,4)\in\mathcal{E}( 1 , 4 ) ∈ caligraphic_E provided the remaining network is connected, that is, the isolated network contains at least one spanning tree. As shown in Fig. 12(b), since the microgrid system remains connected even after isolation of the corrupted communication link, it operates normally likewise in subsection VI-A; please refer to Figs. 15 and 16 for frequency restoration and power-sharing in this situation. Here, the load perturbations are introduced with the same magnitude and at similar time instants as in the previous subsection.

VII Conclusion

Relying on an auxiliary layer-based design, we investigated an attack-resilient distributed control mechanism for achieving frequency regulation and active power-sharing in an islanded AC microgrid network. One of the main features of our approach is that it not only guarantees the resiliency against simultaneous frequency and power attacks but also, devises an attack detection mechanism as a byproduct, leveraging the interaction between the control and auxiliary layers. The frequency and power controllers were formulated as leader-follower and leaderless multi-agent systems, respectively, accompanied by suitable auxiliary-state dynamics. Under (standard) assumptions on frequency and power attacks, it was shown that the proposed approach assures the frequency restoration and active power-sharing in the small neighborhood of their steady-state values in the presence of any attack. It was proved that these bounds depend on the underlying network topology, the magnitude of the attack signal, and the pinning and control gains decided by the designer. Extensive simulation results were provided to illustrate and verify the theoretical developments in the paper, followed by a simulation demonstrating attack detection and isolation provided the resulting network is connected.

It would be interesting in future work to extend the analysis to a resilient finite-time distributed framework as the power systems are expected to respond in a certain time to avoid any serious damage.

References

  • [1] Q. Zhou, M. Shahidehpour, A. Paaso, S. Bahramirad, A. Alabdulwahab, and A. Abusorrah, “Distributed control and communication strategies in networked microgrids,” IEEE Communications Surveys & Tutorials, vol. 22, no. 4, pp. 2586–2633, 2020.
  • [2] C. Peng, H. Sun, M. Yang, and Y.-L. Wang, “A survey on security communication and control for smart grids under malicious cyber attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 8, pp. 1554–1569, 2019.
  • [3] H. T. Reda, A. Anwar, and A. Mahmood, “Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts,” Renewable and Sustainable Energy Reviews, vol. 163, p. 112423, 2022.
  • [4] R. Lu, J. Wang, and Z. Wang, “Distributed observer-based finite-time control of ac microgrid under attack,” IEEE Transactions on Smart Grid, vol. 12, no. 1, pp. 157–168, 2020.
  • [5] Y. Wang, S. Mondal, C. Deng, K. Satpathi, Y. Xu, and S. Dasgupta, “Cyber-resilient cooperative control of bidirectional interlinking converters in networked ac/dc microgrids,” IEEE Transactions on Industrial Electronics, vol. 68, no. 10, pp. 9707–9718, 2020.
  • [6] M. S. Sadabadi, S. Sahoo, and F. Blaabjerg, “A fully resilient cyber-secure synchronization strategy for ac microgrids,” IEEE Transactions on Power Electronics, vol. 36, no. 12, pp. 13 372–13 378, 2021.
  • [7] J. Xiao, L. Wang, Z. Qin, and P. Bauer, “A resilience enhanced secondary control for ac micro-grids,” IEEE Transactions on Smart Grid, 2023.
  • [8] A. Intriago, F. Liberati, N. D. Hatziargyriou, and C. Konstantinou, “Residual-based detection of attacks in cyber-physical inverter-based microgrids,” IEEE Transactions on Power Systems, 2023.
  • [9] S. Madichetty and S. Mishra, “Cyber attack detection and correction mechanisms in a distributed dc microgrid,” IEEE Transactions on Power Electronics, vol. 37, no. 2, pp. 1476–1485, 2021.
  • [10] M. Liu, C. Zhao, J. Xia, R. Deng, P. Cheng, and J. Chen, “Pddl: Proactive distributed detection and localization against stealthy deception attacks in dc microgrids,” IEEE Transactions on Smart Grid, vol. 14, no. 1, pp. 714–731, 2022.
  • [11] Y. Wan and T. Dragičević, “Data-driven cyber-attack detection of intelligent attacks in islanded dc microgrids,” IEEE Transactions on Industrial Electronics, vol. 70, no. 4, pp. 4293–4299, 2022.
  • [12] A. Takiddin, S. Rath, M. Ismail, and S. Sahoo, “Data-driven detection of stealth cyber-attacks in dc microgrids,” IEEE Systems Journal, vol. 16, no. 4, pp. 6097–6106, 2022.
  • [13] K. Zhang, C. Keliris, T. Parisini, and M. M. Polycarpou, “Stealthy integrity attacks for a class of nonlinear cyber-physical systems,” IEEE Transactions on Automatic Control, vol. 67, no. 12, pp. 6723–6730, 2021.
  • [14] L.-Y. Lu, J.-H. Liu, S.-W. Lin, and C.-C. Chu, “Concurrent cyber deception attack detection of consensus control in isolated ac microgrids,” IEEE Transactions on Industry Applications, 2023.
  • [15] A. Mustafa and H. Modares, “Attack analysis and resilient control design for discrete-time distributed multi-agent systems,” IEEE Robotics and Automation Letters, vol. 5, no. 2, pp. 369–376, 2019.
  • [16] A. Gusrialdi, Z. Qu, and M. A. Simaan, “Competitive interaction design of cooperative systems against attacks,” IEEE Transactions on Automatic Control, vol. 63, no. 9, pp. 3159–3166, 2018.
  • [17] Y. Chen, D. Qi, H. Dong, C. Li, Z. Li, and J. Zhang, “A fdi attack-resilient distributed secondary control strategy for islanded microgrids,” IEEE Transactions on Smart Grid, vol. 12, no. 3, pp. 1929–1938, 2020.
  • [18] Q. Zhou, M. Shahidehpour, A. Alabdulwahab, A. Abusorrah, L. Che, and X. Liu, “Cross-layer distributed control strategy for cyber resilient microgrids,” IEEE Transactions on Smart Grid, vol. 12, no. 5, pp. 3705–3717, 2021.
  • [19] Y. Liu, Y. Li, Y. Wang, X. Zhang, H. B. Gooi, and H. Xin, “Robust and resilient distributed optimal frequency control for microgrids against cyber attacks,” IEEE Transactions on Industrial Informatics, vol. 18, no. 1, pp. 375–386, 2021.
  • [20] M. Jamali, M. S. Sadabadi, M. Davari, S. Sahoo, and F. Blaabjerg, “Resilient cooperative secondary control of islanded ac microgrids utilizing inverter-based resources against state-dependent false data injection attacks,” IEEE Transactions on Industrial Electronics, 2023.
  • [21] J. M. Guerrero, J. C. Vasquez, J. Matas, L. G. De Vicuña, and M. Castilla, “Hierarchical control of droop-controlled AC and DC microgrids—a general approach toward standardization,” IEEE Transactions on industrial electronics, vol. 58, no. 1, pp. 158–172, 2010.
  • [22] L. Wang and F. Xiao, “Finite-time consensus problems for networks of dynamic agents,” IEEE Transactions on Automatic Control, vol. 55, no. 4, pp. 950–955, 2010.
  • [23] V. Vaishnav, D. Sharma, and A. Jain, “Quadratic-droop-based distributed secondary control of microgrid with detail-balanced communication topology,” IEEE Systems Journal, 2023.
  • [24] H. Dong, C. Li, and Y. Zhang, “Resilient consensus of multi-agent systems against malicious data injections,” Journal of the Franklin Institute, vol. 357, no. 4, pp. 2217–2231, 2020.
  • [25] J. Guerrero, L. G. de Vicuna, J. Matas, M. Castilla, and J. Miret, “Output impedance design of parallel-connected ups inverters with wireless load-sharing control,” IEEE Transactions on Industrial Electronics, vol. 52, no. 4, pp. 1126–1135, 2005.
  • [26] R. A. Horn and C. R. Johnson, Topics in matrix analysis.   Cambridge university press, 1991.
  • [27] P. Lancaster and H. K. C. R. Farahat, “Norms on direct sums and tensor products,” mathematics of computation, vol. 26, no. 118, pp. 401–414, 1972.
  • [28] R. A. Horn and C. R. Johnson, Matrix analysis.   Cambridge university press, 2012.
  • [29] H. K. Khalil, “Nonlinear systems third edition,” Patience Hall, vol. 115, 2002.
  • [30] A. Gusrialdi and Z. Qu, “Cooperative systems in presence of cyber-attacks: a unified framework for resilient control and attack identification,” in 2022 American Control Conference (ACC).   IEEE, 2022, pp. 330–335.
  • [31] P. Danzi, M. Angjelichinoski, C. Stefanovic, T. Dragicevic, and P. Popovski, “Software-defined microgrid control for resilience against denial-of-service attacks,” IEEE Transactions on Smart Grid, vol. 10, no. 5, pp. 5258–5268, 2019.
  • [32] S. Zhang, “An overview of network slicing for 5g,” IEEE Wireless Communications, vol. 26, no. 3, pp. 111–117, 2019.