A_Stealth_Cyber-Attack_Detection_Strategy_for_DC_Microgrids
A_Stealth_Cyber-Attack_Detection_Strategy_for_DC_Microgrids
8, AUGUST 2019
Abstract—This paper proposes a cooperative mechanism for owing to their highly reliable operation during link failures.
detecting potentially deceptive cyber attacks that attempt to Moreover, distributed control philosophy is an economic op-
disregard average voltage regulation and current sharing in tion since it can be easily accommodated by transmitting lesser
cyber-physical dc microgrids. Considering a set of conventional
cyber attacks, the detection becomes fairly easy for distributed ob- volume of data without entailing much traffic in contrast to the
server based techniques. However, a well-planned set of balanced centralized communication [6]. In dc microgrids, cooperative
attacks, termed as the stealth attack, can bypass the conventional secondary controllers have been deliberately used for various
observer based detection theory as the control objectives are met objectives, such as average voltage regulation [7], proportional
without any physical error involved. In this paper, we discuss load sharing [8], and energy balancing [9].
the formulation and associated scope of instability from stealth
attacks to deceive distributed observers realizing the necessary To enhance the scope of reliability, system security plays an
and sufficient conditions to model such attacks. To address this increasingly important role in maintaining unbiased coordina-
issue, a novel cooperative vulnerability factor (CVF) framework tion among the sources since it directly affects the technological
for each agent is introduced, which accurately identifies the aspects based on penalties specifically allocated for poor per-
attacked agent(s) under various scenarios. To facilitate detection formance metrics [10]. Few potential ways to violate security
under worst cases, the CVFs from the secondary voltage control
sublayer is strategically cross coupled to the current sublayer, measures are cyber attacks, which typically include false data
which ultimately disorients the control objectives in the presence injection attacks (FDIAs) [11], denial of service (DoS) [12],
of stealth attacks and provides a clear norm for triggering defense replay attacks [13], etc. Such attacks are adept at disrupting
mechanisms. Finally, the performance of the proposed detection the network stability as well as control structures. Several in-
strategy is simulated in MATLAB/SIMULINK environment and stances have been reported in the past, which became a critical
experimentally validated for false data injection and stealth
attacks on sensors and communication links. concern for the control centers [14]. FDIAs alter the system
state by injecting a false data into any of the compromised sen-
Index Terms—DC microgrid, distributed control, false data sors/actuators. An example of implementation of such attacks
injection, stealth attack.
is given in [11]. To analyze the impact of such attacks, further
I. INTRODUCTION investigation is done in [15] to assess their impacts on the eco-
nomic load dispatch that is realized in a cooperative manner. In
C microgrids are an effective means of integrating renew-
D able energy sources, storage devices, and modern elec-
tronic loads, capable of operating independently of the utility
this respect, the system under attack reaches a consensus stage
that is not optimal. Broadly, detection and mitigation of conven-
tional attacks are already well classified in the literature since
grid [1], [2]. Moreover, the operating nature of these units in the such attacks disrupt the operation of observers that becomes
dc paradigm makes it a vivid option to enhance the efficiency a simple criterion for detection. However, it is reported that
[3]. For enhancing the scalability and robustness, distributed generalized FDIAs, commonly known as stealth attacks [16],
controllers are desirable in microgrids [4], [5] to avoid single can easily penetrate into networked systems without altering the
point of failure as compared to the centralized communication, system observability. These attacks can be specifically classified
as coordinated intelligent attacks [17] that involves coordinated
Manuscript received May 22, 2018; revised July 18, 2018 and August 29, attack vectors in multiple nodes to nullify system dynamics.
2018; accepted October 29, 2018. Date of publication November 7, 2018; date
of current version May 22, 2019. This work was supported by the Academic As a result, the system/agent operator would be unaware of
Research Fund Tier 1 from the Ministry of Education, Government of Singapore, any online attack vectors present in the system. Prior to this,
under Grant R-263-000-C27-133. Recommended for publication by Associate the attacker could cause an unfair increase in the magnitude
Editor L. Peng. (Corresponding author: Jimmy Chih-Hsien Peng.)
S. Sahoo and J. C. H. Peng are with the Department of Electrical and Computer of attack vectors that may cause system shutdown depending
Engineering, National University of Singapore, Singapore, 119007 (e-mail:, upon the severity of the attack. Additionally, implementation of
[email protected]; [email protected]). such attacks gets easier when the attacker has obtained a priori
S. Mishra is with the Department of Electrical Engineering, Indian Institute of
Technology Delhi, New Delhi 110016, India (e-mail:,[email protected]). knowledge about the system using adequate system monitor-
T. Dragičević is with the Aalborg University, Aalborg 9220, Denmark ing [18]. More instances of coordinated attacks on large power
(e-mail:,[email protected]). systems and their vulnerability assessment are provided in [19]
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org. and [20]. In this regard, risk assessment along with control vul-
Digital Object Identifier 10.1109/TPEL.2018.2879886 nerabilities is crucial since the modeling of coordinated attacks
0885-8993 © 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Malaviya National Institute of Technology Jaipur. Downloaded on October 20,2024 at 12:50:07 UTC from IEEE Xplore. Restrictions apply.
SAHOO et al.: STEALTH CYBER-ATTACK DETECTION STRATEGY FOR DC MICROGRIDS 8163
for microgrids can be easier owing to their small system size multiple sensors/communication links are studied extensively.
without significant security measures [21], [22]. Moreover, the impact of FDI and stealth attacks on sensors
In [23], Hao et al. have identified an aberrant operation of and communication links is studied for intrusion in voltage and
a microgrid when a false data is injected into the voltage con- current information separately to preserve system security and
troller of the substation. Apart from stability, it is also crucial to energy efficiency simultaneously. Since the distributed control
analyze if the proposed strategies can attain economic vulnera- philosophy in dc microgrids is based on voltage observer that
bilities in a microgrid. In fact, this attribute is well addressed in can easily translate any uncoordinated data injection into a resid-
[27] where the FDIAs are categorized by their utilization levels ual output, the authors have identified the concept of balanced
having monitored the stability of microgrids under different con- attacks as stealth attack modeling with further investigation on
ditions. On the other hand, Beg et al. in [24] have stressed on the its detection. Based on these findings, the CVFs of each agent
identification of the variation of candidate invariants to detect determined from the secondary voltage sublayer are strategi-
the presence of FDIAs. Moreover, it has been demonstrated that cally coupled into the local current sharing secondary control
stealth attacks in dc microgrids can deceive the control system loop. For this reason, any subsequent disruption/attack necessar-
without creating any negative impact/disturbance. However, it ily disorients the control operation of the agents, thereby serving
is crucial to understand that such undetectable attacks, which as an apparent detection criterion considering that the attacker
are able to penetrate while maintaining discretion, can cause may attempt to manipulate CVF locally. On the other hand, the
network instability in unforeseeable ways. agent(s) representing positive value of CVF is resolved as at-
Since distributed observer based strategy [25] is more prone to tacked which suggests that their respective measurements are
cyber attacks for a well-spanned distributed graph as the injected untrue. This can be easily extended to trigger the likely defense
false data propagates in the entire network, proper analysis has mechanisms to prevent further instability.
to be carried out toward the detection of the attacked agent in To sum up, the research contributions of this paper are as
a microgrid to establish corrective action. False data propaga- follows.
tion in dc microgrids may lead to loss of generality from an 1) To ascertain the possibility of FDI and stealth attacks in dc
economic point of view, causing current sharing errors, which microgrids, a new methodology based on a CVF is pro-
lead to circulating currents between each converter. Using dis- posed using the outputs from secondary sublayers used
tributed computation, the estimated states will converge to a for global average voltage regulation in dc microgrids.
non-zero steady value under FDIAs, which makes them sim- Generalization of distributed observers is done to detect
ple to detect. In [28], the compromised agent with false data such attacks and how it can be circumvented for a multi-
is detected using a cooperative-based trust and confidence fac- ple sensor/link based stealth attacks. For detection of the
tors to realize mitigation of the propagation of false data in the compromised/attacked agent, CVF of each agent is locally
cyber network. However, considering the worst case for such monitored for positive values across the network that rep-
attacks, the above-mentioned factors can also be manipulated resents the attacked agent(s). This technique is used as
by adding/subtracting a large constant value while the controller an apparent method of detecting attacks locally such that
is attacked, which may lead to false values corresponding to the corrective actions can take place. To the best of authors’
attacked node. Consequently, it will result in maloperation of the knowledge, CVF has never been proposed in the realm of
mitigation strategy since it operates on non-attacked agent(s). cyber-attack detection in microgrids.
In [26], Fawzi et al. have determined a theoretical limit on the 2) A new cross-coupling methodology of the CVF output
number of compromised sensors in a system beyond which it is of each agent from the secondary voltage sublayer is
impossible to characterize the detection of such attacks. Con- proposed to strategically disorient the control operation
sidering this view point, theoretical analysis for stealth attacks for the worst case of consecutive attacks when the at-
at multiple sensors/actuators in a cooperative network to create tacker can attempt to reduce CVF into a negative value
instability and the corresponding detection methodologies in dc so as to deceive the above-mentioned detection philoso-
microgrids has not gained significant attention yet. On the other phy. Hence, the cross-coupling approach ensures accurate
hand, Zhao et al. [29] have addressed this issue for an economic detection of the attacked agent(s) by prevention against
dispatch problem as it decreases the overall efficiency with an further attacks into the proposed detection metric, i.e.,
increase in the generation cost by dislocating toward a non- CVF.
optimal point. However, it does not administer a mechanism The rest of this paper is organized as follows. The system
for detection of the compromised agent during a stealth attack, architecture of dc microgrids along with cyber-layer prelimi-
which is crucial to cease its propagation into the network and naries providing an overview of the secondary control strategy
may consequently lead to instability. is illustrated in Section II. Section III depicts the problem for-
The idea behind stealth attack detection in this paper is the mulation to demonstrate the behavior of cooperative control
identification of the merits of a well-spanned network in a coop- strategy under FDI and stealth attacks. Moreover, the necessary
erative control mechanism. In particular, the difference between and sufficient conditions of modeling such attacks with multi-
the secondary output of voltage sublayer, termed as coopera- ple sensors/cyber link have been discussed in detail. Section IV
tive vulnerability factor (CVF), converges to zero if the system provides a brief overview on the calculation of the CVF for
is not under attack. Furthermore, the necessary and sufficient each agent and its significance in the detection of such attacks.
conditions for modeling of worst case stealth attack involving Simulations along with experimental validation are presented in
Authorized licensed use limited to: Malaviya National Institute of Technology Jaipur. Downloaded on October 20,2024 at 12:50:07 UTC from IEEE Xplore. Restrictions apply.
8164 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 34, NO. 8, AUGUST 2019
where E is an edge connecting two nodes, xi is the local node, such that L = L1 + L2 , where
and xj is the neighboring node. It is to be noted that the com-
munication weights depict information exchange between two ⎡ ⎤
0 l12 ... l1M
corresponding nodes only. Mathematically, itcan be denoted by ⎢ ⎥
a matrix with incoming information Zin = i M aij . Hence, ⎢ l21 0 ... l2M ⎥
⎢ ⎥
L1 = ⎢ .. .. .. ⎥
if both matrices match each other, the Laplacian matrix L is ⎢ ..
. ⎥
balanced, where L = Zin − A and its elements are given by ⎣ . . . ⎦
⎧ lM 1 lM 2 ... 0
⎪
⎪ deg(mi ), i = j ⎡ ⎤
⎨ l11 0 ... 0
lij = −1, i = j (2) ⎢ ⎥
⎪
⎪ ⎢ 0 l22 ... 0 ⎥
⎩ ⎢ ⎥
0, otherwise L2 = ⎢ .. .. .. ⎥.
⎢ ..
. ⎥
where deg(mi ) is the degree of the ith node and L = ⎣ . . . ⎦
[lij ] RM xM . 0 0 ... lM M
Remark 1: All the units will achieve consensus using
x(k + 1) − x(k) = −μLx(k) for a well-spanned matrix L such 2) Sublayer II: Proportionate Current Sharing: Similarly,
that lim xi (k) = c, ∀ i M , where c is a constant, μ is a the normalized current regulation cooperative input for the ith
k →∞
positive value, and M is the number of agents in the system. agent using the neighboring output current measurements Idcj ,
Authorized licensed use limited to: Malaviya National Institute of Technology Jaipur. Downloaded on October 20,2024 at 12:50:07 UTC from IEEE Xplore. Restrictions apply.
SAHOO et al.: STEALTH CYBER-ATTACK DETECTION STRATEGY FOR DC MICROGRIDS 8165
where KPH 1 , KIH 1 , KPH 2 , and KIH 2 are PI controller gains of H1 III. MODELING OF STEALTH ATTACKS IN
and H2 in Fig. 4, and Vdcref and Idcref denote the global reference COOPERATIVE DC MICROGRIDS
voltage and current quantities for all the agents, respectively. Considering the attacker injecting false data into multiple
The correction terms obtained in (7)–(8) are finally added to the sensors/communication links to formulate a stealth attack, an
global reference voltage Vdcref setpoint to achieve local voltage analysis of how the convergence in (10) can be guaranteed is
reference Vdci ref for the ith agent using provided in this section. Furthermore, the necessary and suffi-
Vdci ref (k) = Vdcref + ΔVi1 (k) + ΔVi2 (k). (9) cient conditions to formulate a stealth attack on multiple sensors
in a cooperative network is given in detail.
Remark 2: Generally, the line impedances between agents in For each agent, the local power balancing equation can be
a microgrid are significantly different, which usually introduces expressed in terms of
a poor current sharing profile using the primary droop concept
without using communication [8]. However, by using (8), the χi (k) = Idci (k) − Io i (k) (12)
voltage correction term ΔVi2 (k) from the secondary controller where Io i (k) denote the total output current from the ith agent.
compensates for the cable resistance as well as carries out pro- Using (12), the consensus algorithm in (3)–(6) under attacks can
portionate sharing under different load conditions. As a result, be rewritten as
the value of ΔVi2 (k) is globally asymmetric in a microgrid with ⎧
⎪
⎪ V̄dci (k + 1) = V̄dci (k) − j M lij V̄dcj (k − τini − τdij )
different tie-line resistances. ⎪
⎪
⎪
⎪
Remark 3: Using the cooperative-based consensus algo- ⎪
⎪ + σχi (k) + uaV i (k)
⎪
⎪
rithm for a well-connected cyber graph for a dc microgrid, the ⎨Idc (k + 1) = Idc (k) −
⎪ ij
j M lij Idcj (k − τo − τd )
j
solutions in (3)–(6) shall converge to i i
⎪
⎪ + uaIi (k)
lim V̄dci (k) = Vdcref , lim I¯dci (k) = 0 ∀i M. (10) ⎪
⎪
⎪
k →∞ k →∞ ⎪
⎪
⎪
⎪χi (k + 1) = χi (k) − j M lij χj (k) − (Idci (k + 1)
It should be noted that Idcref in (8) has been kept zero for the ⎪
⎪
⎩
load currents to be shared proportionately. However for FDIAs − Idci (k))
in single sensor/communication link, (10) modifies to where uaV i (k) and uaIi (k) denote the attack vectors imposed into
lim V̄dci (k) = Vdca ref , lim I¯dci (k) = 0 ∀i M (11) voltage and current secondary sublayers in the ith agent at the
k →∞ k →∞ kth instant, respectively. It should be noted that since χi (k) is
where Vdca ref = Vdcref . Assuming a pre-condition that the sys- not a physical measurement entity, the possibility of attack in
tem always operates at a certain global reference voltage is χi (k) will be entirely due to uaIi (k). To provide with the basic
known to each agent, (11) should be a sufficient criterion to understanding and investigating the effect of stealth attacks in
justify that the system is attacked by an external entity. Many multiple sensors/links in a cooperative network based dc micro-
Authorized licensed use limited to: Malaviya National Institute of Technology Jaipur. Downloaded on October 20,2024 at 12:50:07 UTC from IEEE Xplore. Restrictions apply.
8166 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 34, NO. 8, AUGUST 2019
under a stealth attack where Il i is the local load at the ith agent.
Due to (16), convergence of (12) is guaranteed. By the iterative
Fig. 2. Case study I: Instability caused by injecting an attack consisting of bal- rule, subtracting Idci (k + 1) from χi (k + 1), we get
anced set of zero sum errors into the voltage sensors in dc microgrid consisting
of M = 4 agents. χi (k + 1) − Idci (k + 1)
i M i M
grids (rated voltage of 315 V), a case study in Fig. 2 is done by
injecting a balanced set of zero sum errors s and −s into the volt- = χi (k) − Idci (k) − uaIi (k) (17)
age sensors in agents I and III, respectively during t = 1 s, where i M
i M
i M
such attacks can lead to various unintentional scenarios without A similar analysis can be carried out to determine the effect of
any trace for failure assessment. This case study necessitates the uaV (k) in the convergence of the algorithm to get
study of stealth attacks using multiple sensors/links along with
an authentic detection mechanism. As a consequence, we obtain
k
the necessary and sufficient conditions for the convergence of uaV i (p) = 0 (21)
p=0 i M
system under such attacks in (13).
Problem Statement: If there exist a constant R such that using χi (k + 1) and V̄dci (k + 1) in (17).
∞ ∞ Remark 4: Following the concept of cooperative synchro-
|uaV (k)| ≤ R, |uaI (k)| ≤ R ∀ i M. (13) nization [30], the average voltage estimate in (5) tends to achieve
k =0 k =0 consensus for all its elements for a spanning cyber graph such
Then, (13) in the presence of stealth attack shall converge as per that LV̄dc (k) = 0 during steady state to reach a steady-state
(10) with limk →∞ χi (k) = 0. value of Vdcref 1. Alternatively, a similar representation can be
Authorized licensed use limited to: Malaviya National Institute of Technology Jaipur. Downloaded on October 20,2024 at 12:50:07 UTC from IEEE Xplore. Restrictions apply.
SAHOO et al.: STEALTH CYBER-ATTACK DETECTION STRATEGY FOR DC MICROGRIDS 8167
given using ei1 (k) in (7) such that LE1 (k) = 0 reaches a steady- Using Remark 5, the control input for voltage regulation is
state solution of zero, where E1 (k) denotes the vector notation particularly used to present a strong case for a stealth attack in
of ei1 (k). Using (21) as an attack vector for the above-mentioned this paper. Hence, the control input for average voltage regula-
consensus theory, it can be concluded that the steady solution tion [36] at the ith agent is given by
is not affected for E1 (k) owing to the consensus properties of a
Laplacian graph [30]. Hence, it can be concluded that the final ui (k) = aij (V̄dcj (k) − V̄dci (k)) + bi ei1 (k). (22)
j N i
state convergence as per (10) is not affected even under stealth u i j (k )
attacks since it gets nullified by the sum of false data injection in
For various attacks in the ith controller, the attacked control
multiple sensors/links for a cooperative network as established
input can be modeled as
in (20) and (21).
Sensor attack: ufi (k) = ui (k − τini ) + κuai (k) (23)
Authorized licensed use limited to: Malaviya National Institute of Technology Jaipur. Downloaded on October 20,2024 at 12:50:07 UTC from IEEE Xplore. Restrictions apply.
8168 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 34, NO. 8, AUGUST 2019
Fig. 3. Performance of a dc microgrid consisting of M = 3 agents for (a) FDI attack on current sensor of agent I and (b) stealth attack on current sensors of
agent I and II: Deteriorates current sharing profile.
Fig. 4. Proposed controller for the ith agent to detect an attack on sensors and communication links in dc microgrids.
where ΔV1 (k) denotes the vector notation of ΔV1i (k) in (7). multiple voltage sensors on agents II and III in a dc microgrid of
Since sublayer I operates as a secondary controller to achieve different line resistances. It can be seen that the voltage correc-
asymptotic convergence, KIH 1 < < KPH 1 such that the time tion terms from the average voltage sublayer in Fig. 5(a) change
constant of the secondary layer PI controller (KPH 1/KIH 1 ) is at symmetrically as compared to the current sharing sublayer in
least 20 times higher than the outer voltage controller in Fig. 4 Fig. 5(b) following a stealth attack at t = 1 s. This attribute can
to provide smooth response [37], (28) can be rewritten using be explained using Remark 2. Considering the system operating
Remark 1 as at a steady state, a step change of balanced zero sum attack
uai (k) is injected into two agents during the (k − 1)th instant,
ΔV1 (k + 1) − ΔV1 (k) = E1 (k + 1) − E1 (k) and (26) can be represented as
1
=− LE1 (k) = 0. (29)
k
KPH 1 ΔVi1 (k) = KPH 1 uai (k) + KIH 1 (ui (p − τin
i
))
Using (29) and Remark 4, it can be concluded that cooperative p=τ iin
synchronization law [30] holds true in the absence of attacks.
k
However in the presence of attacks, (29) synchronizes to a non- + KIH 1 (uai (p)) . (30)
zero value that varies on the magnitude of injected attack vec- p=(k −1)
tor. The above-mentioned action can be justified by observing
each secondary sublayer output in Fig. 5 for a stealth attack on Γ i (p)
Authorized licensed use limited to: Malaviya National Institute of Technology Jaipur. Downloaded on October 20,2024 at 12:50:07 UTC from IEEE Xplore. Restrictions apply.
SAHOO et al.: STEALTH CYBER-ATTACK DETECTION STRATEGY FOR DC MICROGRIDS 8169
Fig. 5. Case study II: Performance of (a) average voltage regulation and (b) current sharing for a strong case of stealth attack on voltage sensors of agents II and III.
Authorized licensed use limited to: Malaviya National Institute of Technology Jaipur. Downloaded on October 20,2024 at 12:50:07 UTC from IEEE Xplore. Restrictions apply.
8170 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 34, NO. 8, AUGUST 2019
Fig. 7. Considered system: (a) Agent model and (b) cyber-physical dc micro-
grid with four sources.
V. SIMULATION RESULTS
The proposed attack detection strategy is tested on a cyber-
physical dc microgrid as shown in Fig. 7(b) with Vdcref = 315 V
consisting of four agents of equal capacities interconnected
to each other via resistive lines. It should be noted that each
agent consists of a battery accompanied via dc/dc bidirectional
converters, respectively, as shown in Fig. 7(a). To test the perfor-
mance of the proposed attack detection strategy for a coopera-
tive dc microgrid, it has been tested against several disturbances,
such as FDIA, stealth attack in multiple sensors, which usually
goes undetected by distributed observers, and communication
links, to detect the affected node such that necessary action can
be taken to maintain security. The system and control parameters
are provided in the Appendix. It should be noted that each event
in the above-mentioned scenarios are separated by a certain time Fig. 8. Proposed detection strategy for case study I in Fig. 2. (a) Without
gap to provide clear understanding. input, output, and communication delay. (b) With delay (maximum value in the
network): τ in Δt = 1 ms, τ o Δt = 3.5 ms, and τ d Δt = 45 ms. (c) With delay
(maximum value in the network): τ in Δt = 1 ms, τ o Δt = 3.5 ms, and τ d Δt =
A. Behavior of Proposed Stealth Detection Strategy 80 ms, where Δt is the sampling time.
for Case Study I
For case study I in Fig. 2, the behavior of the proposed strategy It is worth notifying that the results in Fig. 8(b) and (c) have
without considering input, output, and communication delay is been investigated for maximum value of delay in the network
shown in Fig. 8(a). As the stealth attack is initiated at t = 1 s to test the robustness of the proposed strategy. Since the CVF
in agents I and III, the values of C1 and C3 rise up into the values of the affected agent go instantly into the positive region
positive region suggesting those agents to be the attacked units. in Fig. 8(a)–(c), it can be concluded that the proposed strategy
Further, the performance of the proposed strategy in response entails faster detection of stealth attacks even under delays.
to case study I is tested with input, output (within the agent),
and communication (between two agents) delays in Fig. 8(b)
B. Scenario I
and (c). It should be noted that input and output delays are con-
stant whereas communication delays are time varying [31]. As In scenario I, the voltage sensor in agent I is attacked with
the distributed control law for dc microgrids provides rugged ua1 = −7 V at t = 1 s. As a result, due to the presence of a
response to delays due to the dynamic averaging concept within distributed voltage observer designed for each agent in (5), the
an upper bound on the communication delay for a given well- average voltage estimate in Fig. 9 immediately dips to 313 V
spanned network [36], the philosophy of the proposed detection for each agent. Assuming that the reference voltage of operation
strategy under delays will be unaltered if the cooperative syn- is known to every agent, the error in average voltage estimate
chronization law in Remark 4 holds true for the underlying should serve as a sufficient criterion to detect the presence of
control layer. As compared to Fig. 8(a), it can be seen that the FDIA in the system. However, the identification of the attacked
CVF of the attacked agents initially rise with different peak agent still remains a question. This paper has dealt with this issue
magnitudes under delays of τin Δt = 1 ms, τo Δt = 3.5 ms, by observing Ci (k) in (27), which always converges to zero in
τd Δt = 45 ms, and 80 ms (Δt is the sampling time) in Fig. 8(b) the absence of attacks. In this case, it can be seen that the average
and (c), respectively, which can be attributed to varying delay in voltage estimates do achieve consensus however, they synchro-
achieving consensus due to delayed measurements and inputs. nize to a different value Vdca ref . When the PI output of the voltage
Authorized licensed use limited to: Malaviya National Institute of Technology Jaipur. Downloaded on October 20,2024 at 12:50:07 UTC from IEEE Xplore. Restrictions apply.
SAHOO et al.: STEALTH CYBER-ATTACK DETECTION STRATEGY FOR DC MICROGRIDS 8171
Fig. 9. Scenario I. (a) Currents. (b) Voltages. (c) CVF. (d) Average voltages. FDIA on voltage sensor at t = 1 s in agent I. The average voltage dips on initiating
FDIA. The CVF of agent I instantly shoots into the positive region to detect the affected agent.
Authorized licensed use limited to: Malaviya National Institute of Technology Jaipur. Downloaded on October 20,2024 at 12:50:07 UTC from IEEE Xplore. Restrictions apply.
8172 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 34, NO. 8, AUGUST 2019
Fig. 10. Scenario II. (a) Currents. (b) Voltages. (c) CVF. (d) Average voltages. Stealth attack on two outgoing cyber links at t = 1 s from agent III. The average
voltage estimates diverge symmetrically on initiating the attack. The proposed strategy accurately detects the attacked agent.
Fig. 11. Scenario III. (a) Currents. (b) Voltages. (c) CVF. Stealth attack on voltage sensors of agents I and IV at t = 1 s. Upon initiating the attack, the average
voltages and current sharing remain intact. The proposed strategy identifies the attacked agents instantly with the CVF for agents I and IV in the positive region.
B. Scenario II
Fig. 12. Experimental setup of a dc microgrid comprising two agents.
Similarly in Fig. 13(b), a stealth attack is modeled by inject-
ing a balanced set of zero sum vectors ufi = ±3 V into voltage
an increase in the voltage observer output. Consequently, the sensors of both the agents prior to event A. Following the tran-
voltage of agent II also increases from 48.1 to 51.6 V. This sient, both the voltages return back to their respective set points
results into increase of C1 from 0 to 0.2 V, which ensures the before attacks. However, C1 and C2 increase from 0 to 0.2 V,
attack vector in agent I. After a certain instant, when the link which suggests that both agents are attacked. To prevent further
Authorized licensed use limited to: Malaviya National Institute of Technology Jaipur. Downloaded on October 20,2024 at 12:50:07 UTC from IEEE Xplore. Restrictions apply.
SAHOO et al.: STEALTH CYBER-ATTACK DETECTION STRATEGY FOR DC MICROGRIDS 8173
(a) (b)
Fig. 13. Experimental validation of (a) FDIA and (b) stealth attack on voltage sensor(s) in a dc microgrid with M = 2 agents. The experimental results validate
the proposed findings.
Authorized licensed use limited to: Malaviya National Institute of Technology Jaipur. Downloaded on October 20,2024 at 12:50:07 UTC from IEEE Xplore. Restrictions apply.
8174 IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 34, NO. 8, AUGUST 2019
[17] S. Sridhar, M. Govindarasu, and C. C. Liu, “Risk analysis of coordinated Sukumar Mishra (M’97–SM’04) received the M.Sc.
cyber attacks on power grid,” in Control Optim. Methods Electric Smart and Ph.D. degrees in electrical engineering from the
Grids. New York, NY, USA: Springer, 2012, pp. 275–294. Regional Engineering College, Rourkela, India, in
[18] J. Salmeron, K. Wood, and R. Baldick, “Analysis of electric grid security 1992 and 2000, respectively.
under terrorist threat,” IEEE Trans Power Syst., vol. 19, no. 2, pp. 905–912, He is currently a Professor with the Indian Insti-
May 2004. tute of Technology (IIT) Delhi, New Delhi, India, and
[19] Z. Li, M. Shahidehpour, A. Alabdulwahab, and A. Abusorrah, “Bilevel has been part of the IIT Delhi for the past 15 years.
model for analyzing coordinated cyber-physical attacks on power sys- He authored or coauthored more than 200 research
tems,” IEEE Trans. Smart Grid, vol. 7, no. 5, pp. 2260–2272, Sep. 2016. articles (including papers in international journals,
[20] Y. Chakhchoukh and H. Ishii, “Coordinated cyber-attacks on the measure- conferences, and book chapters). His research exper-
ment function in hybrid state estimation,” IEEE Trans. Power Sys., vol. 30, tise lies in the field of power systems, power quality
no. 5, pp. 2487–2497, Sep. 2018. studies, renewable energy, and smart grids.
[21] S. D. Manshadi and M. E. Khodayar, “Resilient operation of multiple en- Prof. Mishra is currently an Editor for the IEEE TRANSACTIONS ON SMART
ergy carrier microgrids,” IEEE Trans. Smart Grid, vol. 6, no. 5, pp. 2283– GRID and an Associate Editor for the IET Generation, Transmission & Distribu-
2292, Sep. 2015. tion journal. He is the Vice-Chair of Intelligent System Subcommittee of Power
[22] M. M. Rana, L. Li, and S. W. Su, “Cyber attack protection and control of and Energy Society of the IEEE. Apart from all research and academic collabo-
microgrids,” IEEE/CAA J. Automatica Sinica, vol. 5, no. 2, pp. 602–609, rations, he is very actively involved in industrial collaborations. He is currently
Mar. 2018. the acting INAE Chair Professor and has previously delegated as the NTPC and
[23] J. Hao et al., “An adaptive Markov strategy for defending smart grid false Power Grid Chair Professor. He is also the Independent Director of the Cross
data injection from malicious attackers,” IEEE Trans. Smart Grid, vol. 9, Border Power Transmission Company Ltd. and the River Engineering Pvt. Ltd.
no. 4, pp. 2398–2408, Jul. 2018. He has won many accolades throughout his academic tenure of 25 years. He
[24] O. Beg, T. Johnson, and A. Davoudi, “Detection of false-data injection was the recipient of the INSA Medal for Young Scientist (2002), the INAE
attacks in cyber-physical dc microgrids,” IEEE Trans. Ind. Inform., vol. 13, Young Engineer Award (2009), the INAE Silver Jubilee Young Engineer Award
no. 5, pp. 2693–2703, Oct. 2017. (2012), and the Samanta Chandra Shekhar Award (2016). He has been granted
[25] D. Ding et al., “Observer-based event-triggering consensus control for fellowship from many prestigious technical societies such as IET (U.K.), NASI
multiagent systems with lossy sensors and cyber-attacks,” IEEE Trans. (India), INAE (India), IETE (India), and IE (India), and is also recognized as
Cybern., vol. 47, no. 8, pp. 1936-1947, Aug. 2017. the INAE Industry Academic Distinguish Professor.
[26] H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and control for
cyber-physical systems under adversarial attacks,” IEEE Trans. Autom.
Control, vol. 59, no. 6, pp. 1454–1467, Jun. 2014.
[27] H. Zhang, W. Meng, J. Qi, X. Wang, and W. X. Zheng, “Distributed
load sharing under false data injection attack in inverter-based microgrid,”
IEEE Trans. Ind. Electron., vol. 66, no. 2, pp. 1543–1551, Feb. 2019, doi: Jimmy Chih-Hsien Peng (S’04–M’12) received the
10.1109/TIE.2018.2793241. B.E. and Ph.D. degrees in electrical and computer
[28] S. Abhinav, H. Modares, F. L. Lewis, F. Ferrese, and A. Davoudi, “Syn- engineering from the University of Auckland, Auck-
chrony in networked microgrids under attacks,” IEEE Trans. Smart Grid, land, New Zealand, in 2008 and 2012, respectively.
vol. 9, no. 6, pp. 6731–6741, Nov. 2018, doi: 10.1109/TSG.2017.2721382. He is currently an Assistant Professor in electrical
[29] C. Zhao, J. He, P. Cheng, and J. Chen, “Analysis of consensus-based and computer engineering with the National Univer-
distributed economic dispatch under stealthy attacks,” IEEE Trans. Ind. sity of Singapore, Singapore. Previously, he was an
Electron., vol. 64, no. 6, pp. 5107–5117, Jun. 2017. Assistant Professor with the Masdar Institute (now
[30] M. Zhu and S. Martinez, “Discrete-time dynamic average consensus,” part of the Khalifa University), Abu Dhabi, United
Automatica, vol. 46, no. 2, pp. 322–329, 2010. Arab Emirates. In 2013, he was appointed a Visiting
[31] X. Xu, L. Liu, and G. Feng, “Consensus of discrete-time linear multia- Scientist with the Research Laboratory of Electron-
gent systems with communication, input and output delays,” IEEE Trans. ics, Massachusetts Institute of Technology, Cambridge, MA, USA, where he
Autom. Control, vol. 63, no. 2, pp. 492–497, Feb. 2018. became a Visiting Assistant Professor in 2014. His research interests include
[32] O. Beg, L. V. Nguyen, T. Johnson, and A. Davoudi, “Signal temporal power system stability, cyber security, microgrids, and high-performance com-
logic-based attack detection in DC microgrids,” IEEE Trans. Smart Grid, puting.
2018, to be published, doi: 10.1109/TSG.2018.2832544. Prof. Peng is currently the Secretary of the IEEE Power and Energy Society
[33] P. Danzi, C. Stefanovic, L. Meng, J. M. Guerrero, and P. Popovski, “On Working Group on High-Performance Computing for Power Grid Analysis and
the impact of wireless jamming on the distributed secondary microgrid Operation. He is also a Committee Member for Singapore Standard SS 535.
control,” in Proc. IEEE Globecom Workshops, Washington, DC, 2016,
pp. 1–6.
[34] X. Zhong, L. Yu, R. Brooks, and G. K. Venayagamoorthy, “Cyber se-
curity in smart DC microgrid operations,” in Proc. IEEE Int. Conf. DC
Microgrids, 2015, pp. 1–6.
[35] R. A. Brualdi, and J. R. Herbert, Combinatorial Matrix Theory, vol. 39.
Cambridge, U.K.: Cambridge Univ. Press, 1991. Tomislav Dragičević (S’09–M’13–SM’17) received
[36] S. Sahoo and S. Mishra, “A distributed finite-time secondary average the M.Sc. and Industrial Ph.D. degrees in electrical
voltage regulation and current sharing controller for DC microgrids,” IEEE engineering from the Faculty of Electrical Engineer-
Trans. Smart Grid, to be published, doi: 10.1109/TSG.2017.2737938. ing, University of Zagreb, Zagreb, Croatia, in 2009
[37] S. Mishra, S. Sahoo, and A. Dugar, “Hybrid MVMO based controller for and 2013, respectively.
energy management in a grid connected DC microgrid,” in Proc. IEEE From 2013 until 2016, he was a Postdoctoral Re-
Power, Commun. Inf. Technol. Conf., 2015, pp. 114–119. search Associate with Aalborg University, Aalborg,
Denmark, where he has been an Associate Professor
Subham Sahoo (S’16–M’18) received the B.Tech. from March 2016. He made a Guest Professor Stay
degree in electrical and electronics engineering from with Nottingham University, Nottingham, U.K., dur-
the Veer Surendra Sai University of Technology, ing Spring/Summer of 2018. His principal field of
Burla, India, in 2014, and the Ph.D. degree in electri- interest is overall system design of autonomous and grid connected dc and ac
cal engineering from the Indian Institute of Technol- microgrids, and application of advanced modeling and control concepts to power
ogy, Delhi, New Delhi, India, in 2018. electronic systems. He has authored and coauthored more than 140 technical
He was a Visiting Student with the Department papers (more than 55 of them have been published in international journals,
of Electrical and Electronics Engineering, Cardiff mostly the IEEE transactions) in his domain of interest and 8 book chapters and
University, Cardiff, U.K., in 2017. He is currently a book in the field.
a Research Fellow with the Department of Electrical Dr. Dragičević was an Associate Editor for the IEEE TRANSACTIONS ON
and Computer Engineering, National University of INDUSTRIAL ELECTRONICS and for the Journal of Power Electronics. He was
Singapore, Singapore. His current research interests include microgrids, cyber- the recipient of the Končar prize for the best industrial Ph.D. thesis in Croatia
security, coordinated control, and stability of cyber-physical systems. and the Robert Mayer Energy Conservation Award.
Authorized licensed use limited to: Malaviya National Institute of Technology Jaipur. Downloaded on October 20,2024 at 12:50:07 UTC from IEEE Xplore. Restrictions apply.