Jestie 2020 3004744-R
Jestie 2020 3004744-R
Jestie 2020 3004744-R
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JESTIE.2020.3004744, IEEE Journal
of Emerging and Selected Topics in Industrial Electronics
IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN INDUSTRIAL ELECTRONICS 1
Abstract—Load shedding is usually adopted as an emergency However, as reported in [6], a centralized algorithm usu-
management to cope with large frequency deviation and supply- ally involves a number of disadvantages, such as high com-
demand imbalance in a microgrid (MG). As generators and loads putational cost, lack of flexibility, etc. Furthermore, it is
are usually highly distributed in MG, distributed load shedding
strategy is considered in this paper. In the proposed strategy, noted that the traditional power grids are undergoing huge
each agent first locally discovers the system’s global knowledge. evolution towards more intelligent ones, where loads and
Efficient load shedding decisions are then made with the ac- generators are highly distributed. Consequently, it is natural
quired information. Inspired by the fact that the communication and more reasonable to develop a distributed load shedding
channels are very vulnerable to malicious attacks, we further algorithm. For example, Gu et al. investigate a decentralized
address the security issue of the considered strategy. It is assumed
that an attacker intends to disrupt the information discovery under-frequency load shedding scheme for smart distribution
procedure and further deteriorates the system operation by networks [7]. Similarly, a multi-agent based load shedding
injecting malicious signals. By considering the injected signal algorithm is proposed in [8]. However, in above methods, the
as an external input with no prior knowledge, we first establish load shedding priority is not considered. Inspired by the work
necessary and sufficient conditions for the misbehaviors to be in [9], this paper first provides a multi-stage load shedding
observed. The design procedure of an unknown input observer
(UIO) is then presented, based on which, a detect and isolate strategy of MG system by considering different load priorities
mechanism is further developed to distributively detect and at each bus. With the developed strategy, each local bus
isolate the misbehaving agent, and mitigate the induced negative only acquires its local information and communicates with its
effects. The simulation and experimental results finally validate immediate neighbors. It is shown that through consensus-based
the effectiveness of our schemes. information exchanges, each agent can make load shedding
Index Terms—Distributed load shedding; cyber security; at- decision locally.
tack detection and isolation; unknown input observer (UIO). On the other hand, the proposed algorithm, although takes
full advantage of distributed resources, is also vulnerable to
I. I NTRODUCTION possible cyber attacks due to the wide use of communication
channels [10]. Typical attacks in smart grid include integrity
Microgrid (MG) is usually an independent power system
attacks ([11]–[14]), which damages the system operations by
with a small equivalent inertia constant. Therefore, both dra-
injecting false data into original measurements, and Denial-
matic load changes and insufficient power generations can
of-Service (DoS) attacks ([15], [16]), where the adversary
cause large frequency deviations in an MG system. In worse
degrades the system performance by jamming or breaking the
cases, they may even create an imbalance between power gen-
communications between agents.
eration and load consumption, and further lead to the collapse
Inspired by the fact that cyber threat is an area with growing
of system. To cope with this problem, efficient load shedding
concerns in smart grids, we further evaluate the proposed
operations are usually adopted as emergency managements to
load shedding strategy in adversarial environment. We study
maintain the system frequency and supply-demand balance by
the scenario where an intruder aims to deteriorate the system
cutting off some non-critical loads [1].
operation by maliciously injecting false signals into an agent’s
The problem of optimal load shedding in MG has been states at the information discovery stage. It is revealed that the
extensively investigated in recent decades. Various load shed- MG system performance can be heavily deteriorated by such
ding techniques have been proposed to determine the most type of attacks. For example, the frequency could fluctuate
appropriate loads to be shed [2]–[5]. In [2], a load shedding seriously, which may even lead to a system collapse. These
algorithm is proposed for MGs based on a distribution state observations urge the design of an efficient attack detection
estimator. A multiscenario under frequency load shedding and isolation mechanism.
problem is solved in [3] by applying genetic algorithms. Most In fact, research against cyber attacks in smart grid has been
of these approaches are centralized, where a fusion center is quite active in the last decades. By posing the attack detection
required to process the information from all generators and in grids as statistical learning problems, machine learning
loads and makes load shedding decisions. algorithms, such as support vector machines, Bayesian net-
J. Yan and C. Wen are with the School of Electrical and Electronic works, etc, are used in literatures to classify the measurements
Engineering, Nanyang Technological University, 639798, Singapore. Emails: as being either secure or attacked ([17], [18]). These data-
jyan004@e.ntu.edu.sg (J. Yan), ecywen@ntu.edu.sg (C. Wen). based approaches, although are proved to be effective working
F. Guo is the corresponding author and is with the Department of Automa-
tion, Zhejiang University of Technology, Hangzhou 310032, China. E-mail: against certain attacks, may fail in the scenario where the
fhguo@zjut.edu.cn. behaviors of intruders are arbitrary –which is quite the case
2687-9735 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on July 23,2020 at 19:29:30 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JESTIE.2020.3004744, IEEE Journal
of Emerging and Selected Topics in Industrial Electronics
IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN INDUSTRIAL ELECTRONICS 2
in practice. The reason is that the unexpected misbehaviors (DGs) and loads, as shown in Fig. 1. In order to illustrate
prevent the training data from being properly selected. our design clearly, we treat each local bus as an “agent”, and
Some works also exploit the traditional IT security mea- each agent is assigned a unique ID. In addition, to protect the
sures, such as firewalls, encryption and authentication ([19], privacy at local buses, each agent only has access to its local
[20]). These methods focus on the protection of information in information.
the cyberworld. However, the cyber and physical components Suppose that all the DGs in MG system are operating in the
become coupled in smart grid and thus their security is in- grid-forming mode with droop control function implemented
terdependent. Moreover, proactive mechanisms in IT security in the primary controllers. The frequency droop function is
have mainly focused on integrity and availability from a usually designed as follows
communication network point of view. They do not consider
ωi = ω ∗ − kPi (PGi − PGd i ), (1)
how the successful attacks affect the estimation and control
algorithms in the physical world. where ωi , PGi are the actual frequency and active power
The above issues have motivated another commonly adopted output at ith DG , ω ∗ , PGd i are the desired frequency and
strategy, which is to construct a model-based attack detection active power output, and kPi is the frequency droop gain.
system by using observer techniques by taking into account In practice, the droop gain in (1) can be either fixed in their
the dynamics of the physical systems and addressing how this primary controller or manually set by the MG operator [24].
model can be used to detect compromised nodes ([21], [22]). Hence it is assumed that kPi can be directly accessed by the
With such techniques, one could reconstruct the process states MG system operator.
with an observer, and make decision on possible misbehaviors According to [25], the frequency of the MG will be syn-
based on the residuals generated by the estimations. chronized as:
Since an attacker can inject arbitrary signals into the system, n
(PGd i − PGi )
P
in this paper, the malicious data is regarded as an unknown ∗ i=1
input without a priori knowledge being assumed. An unknown ωss = ω + n . (2)
1
P
input observer (UIO)-based mechanism is then proposed to kPi
i=1
detect and further isolate the attacked agent in the developed
load shedding algorithm. Compared to other observers, such In this paper, we mainly consider the under-frequency
as Kalman filter which assumes a Gaussian white noise model, load shedding problem in the MG system. Similar to the
UIO ensures its estimated state always track the actual process conventional power system, the frequency output of the DG-
state, regardless of the value and distribution of the unknown based MG system will drop if the total load consumption is
inputs [23]. This fact enables UIO to figure out any attacking larger than the total desired power output. Suppose we set a
behaviors based on the system model. load shedding triggering threshold as ω LS , which means that
The main contributions of this paper are summarized as once the frequency drops below ω ∗ − ω LS , i.e.,
follows: ω ∗ − ωss ≥ ω LS , (3)
(1) We provide a multi-stage and distributed load shed-
ding strategy. Its performance under cyber attacks, where the the load shedding process is activated.
agent’s normal behavior is manipulated by an intruder, is The key problem in the load shedding process is to deter-
further evaluated. By injecting malicious signals on a single mine 1) how many loads should be shed in total and 2) how
agent’s state, the attack is shown to deteriorate the load to allocate these shed loads among local buses. In this sub-
shedding process seriously, and harm the operation of MG section, a distributed algorithm is proposed to address these
system. two problems.
(2) Treating the attack signals as unknown exogenous in- According to (2), in order to maintain the system frequency
puts, a detection and isolation scheme is developed, where being close to the desired value ω ∗ , it is preferred to regulate
each agent is built with a bank of UIOs. The designed observer the total power output of all the DGs being equal to the sum
Pn
is proved to be only insensitive to the attacks injected on of the desired active power output, i.e., to make PGi =
i=1
a certain agent. Therefore, the misbehaving agent can be n
PGd i .
P
successfully detected and isolated by its neighbors. However, based on the triggering threshold defined
i=1
0 in (3), it is easy to derive the steady-state upper bound of the
Notations: For a vector a, ai and a are respectively applied
to denote its ith element and its transpose. For a matrix M , total power output is
we denote by [M ]S as the columns of M with index S. n
X 1
PGi ≤ PfLS = PGd + ω LS , (4)
kP
II. D ISTRIBUTED L OAD S HEDDING IN MG S YSTEM i=1
n n
We will first present a consensus-based distributed load where PGd =
P
PGd i , and 1
=
P 1
. Hence, as shown in
kP kPi
shedding algorithm in MG system. i=1 i=1
Fig. 2, to preserve the frequency output in the range [ω ∗ , ω ∗ −
A. Load shedding in MG system ω LS ], the minimum load to be shed can be determined as
n
Consider a microgrid system with n buses. Each bus is X
∆P = PGi − PfLS . (5)
assumed to be connected with local distributed generators i=1
2687-9735 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on July 23,2020 at 19:29:30 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JESTIE.2020.3004744, IEEE Journal
of Emerging and Selected Topics in Industrial Electronics
IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN INDUSTRIAL ELECTRONICS 3
2687-9735 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on July 23,2020 at 19:29:30 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JESTIE.2020.3004744, IEEE Journal
of Emerging and Selected Topics in Industrial Electronics
IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN INDUSTRIAL ELECTRONICS 4
of the most important challenges in smart grid. To address Proof. For simplicity, we denote mi (t) , ei ui (t), which is a
such an issue, we now consider the performance of the vector with ith entry being ui (t), and others remaining 0.
proposed multi-stage load shedding algorithm in an adversarial As a direct result of Cauchy convergence criterion [28,
environment. chapter 2] and Eqn. (13), it holds that
An attacker is assumed to deteriorate the load shedding X∞
process by interrupting the consensus procedure of global lim |ui (t)| = 0,
k→∞
information discovery at Step 1. To this end, it injects ma- t=k
licious signals ui (k) at agent i, whose updating rule is thus further implying
manipulated to be ∞
X
X lim ||mi (t)||1 = 0.
xi (k + 1) = xi (k) + wij [xj (k) − xi (k)] + ui (k). (11) k→∞
t=k
j∈Ni
Furthermore, since A is doubly stochastic, so is Ak−t . One
Therefore, the matrix representation becomes thus derives that
x(k + 1) = Ax(k) + ei ui (k), (12) ||Ak−t mi (t)||1 = ||Ak−t ||1 ||mi (t)||1 = ||mi (t)||1 . (16)
where ei is the ith canonical basis vector in Rn . We further We then have the following result,
refer agent i to a misbehaving agent. k
X k
X
lim ||Ak−t mi (t)||1 = lim ||mi (t)||1 = 0. (17)
Remark 1. The considered attack model covers the scenarios k→∞
t=∞
k→∞
t=∞
where the behavior of an agent is manipulated by an ad-
One thus obtains that
versary and no longer follows the normal update law (7).
k k
It not only includes the cases of DoS and integrity attacks X
k−t
X
lim A mi (t) ≤ lim ||Ak−t mi (t)|| = 0.
on the in-going communication channels of this agent, but k→∞ k→∞
t=∞ t=∞
also captures the behaviors of the “selfish agent”. Namely, (18)
the agent refuses to follow the prescribed updating rule, but Since the left hand is clearly non-negative, we know
instead intentionally send self-designed data to neighbors to k
X
achieve their individual objectives. This is highly possible lim Ak−t mi (t) = 0. (19)
since the participating agents usually have different interests in k→∞
t=∞
networked systems. For example, [27] considers the situation
where a selfish agent broadcasts falsified data in order to Pkfrom Cauchy convergence criterion, as k goes to
Therefore,
infinity, t=0 Ak−t mi (t) has a finite limit. On the other hand,
place the load shedding responsibility to others. As reported since A is doubly stochastic, we know that limk→∞ Ak ei =
therein, this misbehavior may also cause serious consequences 1
n 1. Given the definition of mi (t), one concludes that
to the operations. However, this misbehavior will never be
prevented by any encryption and authentication methods, as ui (t)
lim Ak mi (t) = lim Ak ei ui (t) = 1.
the information is indeed sent from the authorized agents. As k→∞ k→∞ n
to be shown later, we can instead apply the observer-based Finally from Cauchy convergence criterion, there exists some
method in this paper to detect and isolate it to protect the constant c̄, such that
system security. k
X
lim Ak−t mi (t) = c̄ 1 . (20)
Clearly, such kind of malicious attack can potentially either k→∞
t=0
prevent the benign agents from reaching a consensus, or
Now from (12), we obtain that
manipulate the final agreement to be false. In what follows,
k
sufficient and necessary conditions would be proposed for the h X i
consensus to be achieved in the presence of an intruder. lim x(k + 1) = lim Ak+1 x(0) + Ak−t mi (t)
k→∞ k→∞
t=0
(21)
Theorem 1 (Sufficiency). Consider the manipulated update = (x̄ + c̄) 1 .
rule (12). Suppose A in (12) is doubly stochastic. If the sum By denoting c = x̄ + c̄, the first part of proof is completed.
of attacking signal is bounded, i.e., there exists a constant B Then from (16) and (20), it is held that
such that Pk
∞
X || limk→∞ t=0 Ak−t mi (t)||1
|ui (k)| ≤ B, (13) |c − x̄| =
n
k=0 Pk
limk→∞ t=0 ||Ak−t mi (t)||1
then the following results hold: =
n
1) All agents achieve a consensus, i.e., Pk
limk→∞ t=0 ||mi (t)||1
= (22)
lim x(k) = c1, with c being a constant; (14) n
k→∞
Pk
limk→∞ t=0 |ui (t)|
2) The bias induced by the attacker is quantified as =
n
B
|c − x̄| ≤ B/n. (15) ≤ ,
n
2687-9735 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on July 23,2020 at 19:29:30 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JESTIE.2020.3004744, IEEE Journal
of Emerging and Selected Topics in Industrial Electronics
IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN INDUSTRIAL ELECTRONICS 5
which proves
P∞ (15). It is noted that the equality holds if and Proposition 1 ([29]). There exists a UIO for system Σij , if
only if t=0 |ui (t)| = B. This indicates that if the intruder and only if the graph G is connected and i ∈ Nj .
knows how much attacking signal has been injected into the
Suppose that Σij satisfies the conditions in Proposition 1.
system in total, then it exactly knows the bias induced to the
That is, there exists a UIO for it. In what follows, the design
consensus value.
scheme of such an observer would be provided, followed by
Theorem 1 indicates that the attacking signal with a bounded the analysis of its effectiveness.
accumulative effect can make all agents achieve an incorrect 1) Design procedure of UIO: We now present the design
agreement, and thus be misled to believe on a manipulated procedure of the unknown matrices in (24) (namely, Fij , Kij
global information about ∆P . A false load shedding decision and Hij ):
will thus be made, which may cause different adverse impacts. (i) Choose Fij with all eigenvalues within the unit circle.
For example, it may involve abrupt increases of the load at That is, design Fij to be stable.
crucial locations to cause an overflow on the transmission lines (ii) Compute Hij as: Hij = [ei e0i ]Nj .
and incur significant damage to the utility company or user (iii) Denote A1 = (I − Hij Cj )A. With Fij from step (i),
equipment. (1)
solve the equation Fij = A1 − Kij Cj to obtain the
In practice, an intruder is more likely to adopt the attacking (1) (1)
matrix Kij . The existence of such a Kij requires
rule of (13), as the process without converging would alert that the pair (Cj , A1) is detectable. From [30, Lemma
the operators easily. However, in the rest of this paper, we 5.2], we conclude that the considered system meets this
place no assumption on ui (k). Namely, the value of ui (k) requirement. Therefore, such equation is solvable and
can be chosen arbitrarily by the intruder to achieve certain could be achieved with the pole placement routine.
attack goals. (2) (1) (2)
(iv) Compute Kij as: Kij = Fij Hij , Kij = Kij + Kij .
Note that the matrices Hij and Kij are calculated with the
IV. ATTACK D ETECTION A ND I SOLATION above procedure and a user-chosen stable matrix Fij . As a
Since the operation of power system can be seriously result, we complete the design of observer by applying these
deteriorated in the presence of attacks, it is important to matrices to (24).
design a mechanism to detect and isolate the possible security 2) Analysis of effectiveness: This part is devoted to effi-
breaches. By formulating the attacking signal ui (k) as an ciency analysis of the designed observer. Applying (24) to
unknown input, this section proposes a detection scheme based Σij yields
on the Unknown Input Observer (UIO). (1)
ij (k + 1) = (A − Hij Cj A − Kij Cj )ij (k)
(1)
A. Unknown Input Observer (UIO) + (A − Hij Cj A − Kij Cj − Fij )zij (k)
(1) (2)
Consider any agent j. Suppose that Nj = {j1 , j2 , ..., jp }, + [(A − Hij Cj A − Kij Cj )Hij − Kij ]yj (k)
let us define Cj = [ej1 , ej2 , ..., ejp ]0 . Denote the information + (I − Hij Cj )ei ui (k).
available to agent j as (25)
yj (k) = Cj x(k). (23) Based on the choices of the matrices from the proposed design
procedure, we have
Clearly, yj (k) encloses the information received from the
(1) (2)
neighbors of agent j. For simplicity, denote the system de- Fij = A − Hij Cj A − Kij Cj ; Kij = Fij Hij . (26)
scribed by (12) and (23) as Σij .
Furthermore, one notes that with Step (ii), Hij Ci produces
Based on Σij and the neighborhood information yj (k),
an n-dimensional diagonal matrix in the form of Hij Ci =
agent j is able to construct a full-order observer Oij , which
diag(0, · · · , 0, 1, 0, · · · , 0), which makes (I − Hij Cj )ei = 0
estimates the state of agent i, denoted by x̂ij (k), as: | {z } | {z }
i−1 n−i
zij (k + 1) = Fij zij (k) + Kij yj (k), holds. Then the dynamics of estimation error (25) becomes
(24)
x̂ij (k) = zij (k) + Hij yj (k), ij (k + 1) = Fij ij (k). (27)
where zij (k) is the internal state of Oij , and Fij , Kij , Hij Since Fij is chosen to be stable, ij (k) approaches 0 asymp-
are design matrices chosen according to the design procedure totically for any input trajectories ui (k).
given later. On the other hand, one could check that for any other
Definition 1 ([23]). Denote the estimation error of Oij canonical basis vector ep with p 6= i, it is held that (I −
as ij (k) = x(k) − x̂ij (k). If for any input ui (k), Hij Cj )ep 6= 0. This makes the estimation error ij (k + 1) in
limk→∞ ij (k) = 0, then Oij is an Unknown Input Observer (25) never vanish. As a result, the designed observer Oij is
(UIO). insensitive only to the misbehaviors/attacks on agent i.
2687-9735 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on July 23,2020 at 19:29:30 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JESTIE.2020.3004744, IEEE Journal
of Emerging and Selected Topics in Industrial Electronics
IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN INDUSTRIAL ELECTRONICS 6
2687-9735 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on July 23,2020 at 19:29:30 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JESTIE.2020.3004744, IEEE Journal
of Emerging and Selected Topics in Industrial Electronics
IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN INDUSTRIAL ELECTRONICS 7
B12 B34
×
Agent 2 Agent 3 Agent 2 × Agent 3
(a) (b)
shedding operation once the system frequency drops below
Fig. 5. Communication topology before and after attack isolation
49.5Hz.
It is noted that the calculation of PGd and k1P at Step 0 could
W ). For easy illustration, we choose the same communication be realized before the load shedding calculation. Consequently,
graph (Fig. 5(a)) as the physical one. To facilitate the process each agent conducts the initialization and acquires the system
of average consensus, the following doubly stochastic matrix parameters PGd and k1P . The case study is then divided into 2
is applied: phases with experimental results shown in Fig. 7:
0.6 0.3 0 0.1 1) Phase 1 (0 − 0.5s): In this phase, constant loads are
0.3 0.5 0.2 0 connected to the MG system with PL1 = 1.5e6, PL2 =
A= 0 0.2 0.6 0.2 .
(33)
1.5e6, PL3 = 4e6, and PL4 = 3e6. We note that the
0.1 0 0.2 0.7 local loads are consistent with DG’s desired active power
output. Therefore, system frequency is maintained at the
This part investigates the performance of the proposed
nominal value of 50Hz.
method using Piecewise Linear Electrical Circuit Simulator
2) Phase 2 (0.5 − 5s): At t = 0.5s, a constant load is
(PLECS). The experimental setup is shown in Fig. 6. We also
added to Load 4, and PL4 changes to 3.5e6. From
detail the information of the setup as follows. Power-stage
Fig. 7, it is observed that a sudden frequency decline
simulations have been used to represent the physical system
occurs at this moment. The proposed multi-stage load
and the minimal step size for the simulation is 1 × 10−5 s,
shedding strategy is triggered once (4) is violated.
which is small enough to accurately reflect the dynamics of
The DGs’ power output at this triggering moment is
the MG system load shedding. In addition, all the inverters
PG1 = 1.5576e6, PG2 = 1.5049e6, PG3 = 4.0630e6,
are represented by average-models. To be specific, these
and PG4 = 3.3745e6. Set initial state as xi (0) =
converters are modelled as controlled AC voltage sources
[PGi , γiL PiLmax ]. The average consensus algorithm con-
without considering the switching states. This simplification is
verges at x̄ = [2.6250e6, 0.1875e6] within several mil-
reasonable since the converter switching behaviors have little
liseconds. ThenP4each agent canP4 discover the global in-
influence on the system-level power management and load
formation on i=1 PGi and i=1 γiL PiLmax and make
shedding. For the hardware-in-loop verification, one micro
local decision with (6).
controller (TI Launchpad LAUNCHXL-F28069M) is used
for each agent. Modbus TCP/IP communication protocol is 2) Multi-stage load shedding algorithm in the presence of
utilized for the distributed communication among these micro attacks: In this sub-section, we discuss the scenario where
controllers. In addition, in the communication network, these the proposed load shedding strategy is under cyber attacks.
controllers are connected to one switch (Cisco C2960), hence
the communication among these controllers is just within one
TABLE I
hop and the one-way-delay can be negligible. One 4-chanel PARAMETERS OF MG S YSTEM
digital oscilloscope is used to collect the outputs from the
Bus 1 Bus 2 Bus 3 Bus 4
PLECS. d d d d
PG 1.5e6 PG 1.5e6 PG 4e6 PG 3e6
1) Multi-stage load shedding algorithm without attacks: 1
P1Lmax 1e6
2
P2Lmax 2e6
3
P3Lmax 3e6
4
P4Lmax 4e6
We first study the performance of the proposed load shedding kP1 1e-5 kP2 1e-5 kP3 0.375e-5 kP4 0.5e-5
algorithm in benign environment. The triggering threshold is γ1 0 γ2 0.1 γ3 0.05 γ4 0.1
set to be ω LS = 0.5Hz. That is, the agents activate load B12 = 10Ω−1 , B23 = 10.6Ω−1 , B34 = 9.2Ω−1 , B41 = 9Ω−1
2687-9735 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on July 23,2020 at 19:29:30 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JESTIE.2020.3004744, IEEE Journal
of Emerging and Selected Topics in Industrial Electronics
IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN INDUSTRIAL ELECTRONICS 8
Residuals
||r32 ||1
x(k + 1) = Ax(k) + e3 u3 (k), (34) 0.6
where ( 0.4
−0.02e6, if 6 ≤ k ≤ 12, 0.2
u3 (k) = (35)
0, else. 0
5 10
We first show the influence of such an attack on system Iteration k
operation. Under (34), the agents achieve a false consensus
on c = 2.5900e6 instead of x̄1 = 2.6250e6. The manipulated Fig. 9. UIO residuals when an attack occurs in agent 3.
consensus leads to a false global information, and thus incor-
rect load shedding decision. As is illustrated in Fig. 8, the
system frequency declines heavily to around 49.2Hz because
of such an attack.
Fig. 10. Performance of the multi-stage load shedding algorithm after attack
detection and isolation.
Fig. 8. Performance of the multi-stage load shedding algorithm under attacks. VI. C ONCLUSION
In this paper, we propose a distributed load shedding algo-
To avoid such negative effects, the attack detection and rithm for MG system. Its performance is further explored in an
isolation algorithm proposed in this paper is adopted. As adversarial environment, where an attacker intends to disrupt
discussed in Section IV-B, each agent is built with a bank the consensus procedure in global information discovery, so as
of UIOs. Consider the ones at agent 2 as an example. The to purposely deteriorate the normal operation of MG system.
information collected at agent 2 is given by By considering the malicious data as an input signal with
y2 (k) = C2 x(k), (36) no prior knowledge, we design an unknown input observer
(UIO). A UIO-based detection and isolation mechanism is
with C2 = [e1, e3]0 . Following the design procedure, the UIO then developed to detect the attack and compensate for the
for Σ12 is designed as negative effects caused. Experimental and numerical results
are also presented to verify the theoretical outcomes.
0.5085 0 0.0209 0
0.0164 0.5000 0.0404 0
F12 = 0.1168 0.2000 0.4915 0.2000 ,
(37) R EFERENCES
0.0270 0 −0.0029 0.7000 [1] D. Xu and A. A. Girgis, “Optimal load shedding strategy in power
systems with distributed generation,” in Power Engineering Society
0 −0.0209 1 0 Winter Meeting, 2001. IEEE, vol. 2. IEEE, 2001, pp. 788–793.
0.3000 0.1596 [2] M. Karimi, P. Wall, H. Mokhlis, and V. Terzija, “A new centralized
, H12 = 0 0 ,
K12 = (38) adaptive underfrequency load shedding controller for microgrids based
0 0.1085 0 0 on a distribution state estimator,” IEEE Transactions on Power Delivery,
0.1000 0.2029 0 0 vol. 32, no. 1, pp. 370–380, 2016.
2687-9735 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on July 23,2020 at 19:29:30 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JESTIE.2020.3004744, IEEE Journal
of Emerging and Selected Topics in Industrial Electronics
IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN INDUSTRIAL ELECTRONICS 9
[3] Y.-Y. Hong, M.-C. Hsiao, Y.-R. Chang, Y.-D. Lee, and H.-C. Huang, [25] A. Ameli, A. Hooshyar, E. F. El-Saadany, and A. M. Youssef, “Attack
“Multiscenario underfrequency load shedding in a microgrid consist- detection and identification for automatic generation control systems,”
ing of intermittent renewables,” IEEE transactions on power delivery, IEEE Transactions on Power Systems, vol. 33, no. 5, pp. 4760–4774,
vol. 28, no. 3, pp. 1610–1617, 2013. 2018.
[4] Q. Zhou, Z. Li, Q. Wu, and M. Shahidehpour, “Two-stage load shedding [26] R. Olfati-Saber and R. M. Murray, “Consensus problems in networks
for secondary control in hierarchical operation of islanded microgrids,” of agents with switching topology and time-delays,” IEEE Transactions
IEEE Transactions on Smart Grid, 2018. on Automatic Control, vol. 49, no. 9, pp. 1520–1533, 2004.
[5] A. Ketabi and M. H. Fini, “An underfrequency load shedding scheme [27] J. Duan and M.-Y. Chow, “Data integrity attack on consensus-based load
for hybrid and multiarea power systems,” IEEE Transactions on Smart shedding algorithm for power systems,” in Industrial Electronics Society,
Grid, vol. 6, no. 1, pp. 82–91, 2015. IECON 2017-43rd Annual Conference of the IEEE. IEEE, 2017, pp.
[6] H. Gao, Y. Chen, Y. Xu, and C.-C. Liu, “Dynamic load shedding for an 7641–7646.
islanded microgrid with limited generation resources,” IET Generation, [28] H. L. Royden, Real analysis. Krishna Prakashan Media, 1968.
Transmission & Distribution, vol. 10, no. 12, pp. 2953–2961, 2016. [29] F. Pasqualetti, A. Bicchi, and F. Bullo, “Distributed intrusion detection
[7] W. Gu, W. Liu, J. Zhu, B. Zhao, Z. Wu, Z. Luo, and J. Yu, “Adaptive for secure consensus computations,” in Decision and Control, 2007 46th
decentralized under-frequency load shedding for islanded smart distribu- IEEE Conference on. IEEE, 2007, pp. 5594–5599.
tion networks,” IEEE Transactions on Sustainable Energy, vol. 5, no. 3, [30] A. Teixeira, H. Sandberg, and K. H. Johansson, “Networked control
pp. 886–895, 2014. systems under cyber attacks with applications to power networks,” in
[8] Y. Xu, W. Liu, and J. Gong, “Stable multi-agent-based load shedding American Control Conference (ACC), 2010. IEEE, 2010, pp. 3690–
algorithm for power systems,” IEEE Transactions on Power Systems, 3696.
vol. 26, no. 4, pp. 2006–2014, 2011. [31] P. M. Frank and X. Ding, “Survey of robust residual generation and
[9] W. Gu, W. Liu, C. Shen, and Z. Wu, “Multi-stage underfrequency evaluation methods in observer-based fault detection systems,” Journal
load shedding for islanded microgrid with equivalent inertia constant of Process Control, vol. 7, no. 6, pp. 403–424, 1997.
analysis,” International Journal of Electrical Power & Energy Systems,
vol. 46, pp. 36–39, 2013.
[10] R. Deng, G. Xiao, R. Lu, H. Liang, and A. V. Vasilakos, “False data
injection on state estimation in power systems—attacks, impacts, and
defense: A survey,” IEEE Transactions on Industrial Informatics, vol. 13,
no. 2, pp. 411–423, 2017.
[11] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against
state estimation in electric power grids,” ACM Transactions on Informa-
tion and System Security (TISSEC), vol. 14, no. 1, p. 13, 2011.
[12] L. Xie, Y. Mo, and B. Sinopoli, “Integrity data attacks in power market
operations,” IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 659–
666, 2011.
[13] H. Sandberg, A. Teixeira, and K. H. Johansson, “On security indices
for state estimators in power networks,” in First Workshop on Secure
Control Systems (SCS), Stockholm, 2010, 2010.
[14] R. Tan, H. H. Nguyen, E. Y. S. Foo, D. K. Y. Yau, Z. Kalbarczyk, R. K.
Iyer, and H. B. Gooi, “Modeling and mitigating impact of false data
injection attacks on automatic generation control,” IEEE Transactions
on Information Forensics and Security, vol. 12, no. 7, pp. 1609–1624.
[15] S. Liu, X. P. Liu, and A. El Saddik, “Denial-of-service (dos) attacks
on load frequency control in smart grids,” in Innovative Smart Grid
Technologies (ISGT), 2013 IEEE PES. IEEE, 2013, pp. 1–6.
[16] S. Liu, Z. Hu, X. Wang, and L. Wu, “Stochastic stability analysis
and control of secondary frequency regulation for islanded microgrids
under random denial of service attacks,” IEEE Transactions on Industrial
Informatics, vol. 15, no. 7, pp. 4066–4075, 2019.
[17] M. Ozay, I. Esnaola, F. T. Y. Vural, S. R. Kulkarni, and H. V. Poor,
“Machine learning methods for attack detection in the smart grid,” IEEE
transactions on neural networks and learning systems, vol. 27, no. 8,
pp. 1773–1786, 2015.
[18] C. Rudin, D. Waltz, R. N. Anderson, A. Boulanger, A. Salleb-Aouissi,
M. Chow, H. Dutta, P. N. Gross, B. Huang, S. Ierome et al., “Machine
learning for the new york city power grid,” IEEE transactions on pattern
analysis and machine intelligence, vol. 34, no. 2, pp. 328–345, 2011.
[19] D. Kang, J. Lee, B. Kim, and D. Hur, “Proposal strategies of key
management for data encryption in scada network of electric power
systems,” International Journal of Electrical Power & Energy Systems,
vol. 33, no. 9, pp. 1521–1526, 2011.
[20] C. Yan, D. Englender, M. Prvulovic, B. Rogers, and Y. Solihin, “Im-
proving cost, performance, and security of memory encryption and
authentication,” ACM SIGARCH Computer Architecture News, vol. 34,
no. 2, pp. 179–190, 2006.
[21] S. Rahmé, Y. Labit, and F. Gouaisbaut, “An unknown input sliding
observer for anomaly detection in tcp/ip networks,” in 2009 International
Conference on Ultra Modern Telecommunications & Workshops. IEEE,
2009, pp. 1–7.
[22] C. Mellucci, P. P. Menon, C. Edwards, and A. Ferrara, “Second-order
sliding mode observers for fault reconstruction in power networks,” IET
Control Theory & Applications, vol. 11, no. 16, pp. 2772–2782, 2017.
[23] J. Chen and R. J. Patton, Robust model-based fault diagnosis for dynamic
systems. Springer Science & Business Media, 2012, vol. 3.
[24] F. Guo, C. Wen, J. Mao, J. Chen, and Y.-D. Song, “Distributed
cooperative secondary control for voltage unbalance compensation in
an islanded microgrid,” IEEE Transactions on Industrial Informatics,
vol. 11, no. 5, pp. 1078–1088, 2015.
2687-9735 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on July 23,2020 at 19:29:30 UTC from IEEE Xplore. Restrictions apply.