An_FDI_Resilient_Dynamic_Average_Distributed_Control_for_DC_Microgrids
An_FDI_Resilient_Dynamic_Average_Distributed_Control_for_DC_Microgrids
Abstract—The distributed control DC microgrids with inte- also increases the exposure and vulnerabilities to cyber attacks
grated communication technologies form cyber-physical systems. in the DC microgrid [4]. FDI is considered one of the most
Cyber-physical DC microgrids rely on peer-to-peer (P2P) com- challenging types of cyberattacks to detect compared to other
munication to regulate average voltage and share proportional
power. These P2P communications have greater exposure and forms of cyberattacks. In an FDI attack, intruder adds mali-
increase the possibility of cyber intrusions. This paper aims to cious data to actual data to disrupt the system objectives. FDI
develop a cyber-resilient dynamic average consensus control for can occur in different forms, one can devise an FDI to either
an autonomous DC microgrid. The proposed dynamic average destabilize the microgrid [5] or to create deception, which
resilient controller is designed to accurately track the DC micro- deviates operation points without compromising regulation [6].
grid network average voltage despite false data injections (FDI)
attacks and also restores average voltage to nominal value while The main objective of this paper is to design a distributed
ensuring proportional current sharing. The proposed approach dynamic averaging control that provides resiliency against
eliminates the need for full network connectivity and without any FDI attacks on DC microgrids while satisfying the control
restrictions on the number of agents attacked. The convergence objectives.
studies are carried out using input-to-state stability analysis. In the literature, many strategies have been proposed for
Further, the simulation results validate the proposed controllers
efficacy against actuator and communication layer FDI attacks. detecting and mitigating attacks, which are mainly classified
as model-based and data-driven. The state-of-art literature on
Index Terms—Cyber-Physical Systems, Cyber-attacks, Dis- these techniques are detailed in [7]. In model-based detection,
tributed control, DC Microgrids, Dynamic-average consensus
Consensus, False data injection, Resilience. Observer-based methods [8], [9] are largely adopted. The
design complexity of such methods depends on the model’s
size and may fail under parameter uncertainties. In [10],
I. I NTRODUCTION
model- free distributed sliding observer is proposed, which
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:57:41 UTC from IEEE Xplore. Restrictions apply.
2
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:57:41 UTC from IEEE Xplore. Restrictions apply.
3
Source
Source
DC DC
DC
DC
Rfi Lfi D Lij vj DC DC
Rij iL1 iL4
vdci iLi Cyber
C fi
L34 R34
Si
R12 L12
Attack
DG2 DG3
Cyber 4 Control layer
Source
DC
Source
DC
DC
DC
Layer ifi DC R23 L23 DC
1 3
ii vi DG Controller vi iL2 iL3
ii Cyber Attack
2
ij v j
(a) Schematic of a ith DG unit with control and cyber layer (b) DC microgrid test system with 4 DG
Fig. 1: Schematic of a microgrid test system indicating DG units, physical network, cyber communication network and control
unit
of DGi is represented as Ni = j|(i, j) ∈ E. If there is data This paper proposes a control law, denoted as ui in (11) ,
exchange between DGi and DGj , then aij = 1, otherwise that is both distributed and resilient. The objective is to ensure
aij = 0. The Laplacian matrix L = D P − Aa , analyzes that the state variable, x̄i (t), satisfies (12) and (13), even in
the distributed graph dynamics. D = diag{ j∈Ni aij } is a the presence of cyber-attacks.
degree matrix. The eigenvalues of the L matrix determine the
condition for convergence and stability of the system and it III. P ROPOSED FALSE -DATA I NJECTION R ESILIENT
mandates that graph G must be a spanning tree for achieving CONSENSUS P ROTOCOL
consensus.
This section proposes the detailed design dynamic average
consensus protocol to withstand FDI attacks in DC microgrid
D. Problem Statement systems. Each agent tracks the average of a time-varying
In a DC microgrid consisting of n DG units, each DG unit exogenous input signal xi of ith DG using the following
is modeled in the form of (10), and its control input is obtained consensus protocol [18]:
from the dynamic average consensus algorithm given by:
X
x̄˙ i (t) = ẋi (t) + ui (t) (11) x̄˙ i = α(xi − x̄i ) + β α(x̄j − x̄i ) − (σxj − σxi ) + ẋi
j∈Ni
(16)
where x̄i ∈ {v̄i , īi } ∈ Rn , ui is the state and control input of
X
σ̇i = α(xi − σi ) + β(α(σj − σi ) + (x̄j − x̄i )) + ẋi
ith DG at cyber-layer and xi = {vi , ii } ∈ Rn is the exogenous j∈Ni
input from the physical system. Here, the control protocol ui
shall be designed to fulfill the objectives, Here, xi (t) and σi are time-varying reference and state of
ith DG, α and β are positive gains that are obatined us-
lim (x̄i (t) − x̄j (t)) = 0, i, j ∈ V, (12) ing the eigenvalues of L. Considering bounded FDI attack
t→∞ ′
1
n
X (d(t), d (t)), (16) can be reformulated in vector form as,
lim x̄i (t) = xavg = xk (13)
t→∞ n x̄˙ = α(x − x̄) − αβLx̄ + βLσ + ẋ + d(t)
k=1
Further, the communication links at the cyber layer are ex- σ̇ = α(x − σ) − αβLσ − βLx̄ + ẋ + d′ (t) (17)
posed and may be prone to cyber-attacks, disrupting system In order to demonstrate that (16) achieves dynamic average
operation. Especially the FDI attacks are more tricky to handle consensus, two error vectors are defined,
as they may destabilize the entire system while remaining
1 1
undetected if constructed in a stealthy manner. The FDI attacks ex̄ = x̄ −1n 1⊤
n x; eσ = σ − 1n 1⊤
n x. (18)
can be targeted at the actuator and/or the communication n n
channels of ith DG and can be formulated as, From the property of L, we have Lex̄ = Lx̄ and Leσ = Lσ.
Differentiating (18), one can obtain,
ũi = ui + ηi δui , actuator attack (14)
˜ij = x̄ij + ηij δx̄ij , communication attack
x̄ (15) ėx̄ = −(αIn + αβL)ex̄ + βLeσ + Πn (αx + ẋ),
ėσ = −(αIn + αβL)eσ − βLex̄ + Πn (αx + ẋ). (19)
where, ũi indicates corrupted control input of ith agent with
˜ij represents corrupted data received
bounded false data δui , x̄ Here Πn =In − n1 1n 1⊤
n ẋ. Further, (19) is written as,
at DGi from DGj . η, ηij ∈ 0, 1 is the activation function,
which is 1 in case of attack and 0 otherwise. ϱ̇ = Eϱ + Γ(αx, ẋ), (20)
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:57:41 UTC from IEEE Xplore. Restrictions apply.
4
Fig. 2: FDI Resilient distributed dynamic average control strategy for DC microgrid system
Here, ϱ̄ = [ϱ̂1 , ϱ̃1 , ϱ̃2 .....ϱ̃n−1 , ϱ̂2 , ϱ̃n , .....ϱ̃( 2n − 2)]T ,V is a Line inductance L12 = 50µH
L14 = 60µH
matrix of left eigen vectors of L. Upon differentiating, (22), L34 = 75µH
is obtained as L23 = 65µH
˙ϱ̄ = Λϱ̄; Λ = −αIn + αβJ + iβJ 0 Device level control gains Voltage controller:
(23) Kpv = 3, kiv = 10;
0 −αIn + αβJ − iβJ
Current controller:
Kpc = 0.1, kic = 3.5
Here, J = blockdiag(0, J̃) represents Jordan normal form of
−L, (i.e., −L = VJV−1 ) and λi (J) = λi (L)∀i ∈ V. Droop resistance 0.33Ω
Hence, the eigenvalue of E is:
λi (E) = −α − αβδi + iβδi ∀i ∈ V. (24)
where, µ(Λ̃) is the measure of matrix, and from its property,
where δi is the ith eigenvalue of L and δi > 0∀i = 2, ..n, µ(Λ̃) = µ(P + βQ) ≤ µ(P ) + βµ(Q), this implies to,
This ensures system stability if α > 0 and β > 0.
Next, considering the system (20) with x(t) ̸= 0, factoring out
dynamics associated to zero eigen value of L: ||ϱ̃(t)|| ≤ exp((−κ)t) ||ϱ̃(0)|| + 1/(κ) sup ||Γ̃(αx, ẋ)|| . (28)
0≤τ ≤t
ϱ̂˙ = Υϱ̂, Υ = diag(−α, −α), (25a)
ϱ̃˙ = Λ̃ϱ̃ + Γ̃(αx, ẋ). (25b) Here, κ = α + αβλ2 (sym(L) − βµ(Q)), µ2 (αβ J̃) =
T
where,ϱ̂ = [ϱ̂1 , ϱ̂2 ] , ϱ̃ = [ϱ̃1 , ....ϱ̃2n−2 ] , Γ̃(αx, ẋ) = T −αβλ2 (sym(L)), sym(L) = 12 (L + L⊤ ) and λ2 (sym(L)
[Γ̃1 , ..., Γ̃2n−2 ] and Λ̃=blockdiag (−αIn−1 + αβ J̃ + iβ J̃, is second eigne value of sym(L). The error corresponding to
−αIn−1 + αβ J̃ − iβ J̃)=P + βQ, where Q=blockdiag(iJ̃,-iJ̃), zero input response of (28) approaches zero exponentially if α
P =blockdiag(αIn−1 + αβ J̃, −αIn−1 + αβ J̃). and β are chosen such that α + αβλ2 (sym(L)) > βµ(Q). It
To prove that (20) is input-to-state stable (ISS), we prove can be observed from (28), that when α > µ(Q)/λ2 (sym(L)),
ISS of its equivalent system (25a)-(25b). For any α > 0, and the error decreases to zero, as the value of β increases.
the system (25a) is asymptotically stable. As we know Λ̃, is Now, by premultiplying ėx̄ and ėσ in (19) by 1Tn and using
Hurwitz, for α > 0 and β > 0, the solution of (20) is, balanced property of graph G,
Z t
n n n n
ϱ̃(t) = exp(tΛ̃)ϱ̃(0) + exp((t − τ )Λ̃)Γ̃(αx, ẋ) dτ. (26) X X X X
0 ėxi = −α ėxi , ėσi = −α ėσi (29)
i=1 i=1 i=1 i=1
Using inequality ||exp(t(Λ̄))|| ≤ exp(µ(Λ̄(t))), the solution
can be modified as: Pn
Z t As a result, xavg = 1/n i=1 xi remains within the state
||ϱ̃(t)|| ≤ exp(µΛ̃t) ||ϱ̃(0)|| + exp(µΛ̃(t − τ )) ||Γ̃|| dτ trajectories x̄i and σi ∀i ∈ 1, 2..n. This proves that dynamic
0 average consensus (16), can dynamically track the average
(27) value of exogenous input.
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:57:41 UTC from IEEE Xplore. Restrictions apply.
5
IV. R ESULTS AND D ISCUSSION shown in Fig. 3(c) and it appears as a load change to the
The proposed control strategy is tested on a DC microgrid operator as seen in Fig.3(a). But the actual output voltages
with 4 DG sources and communication topology, as shown and the true average value of the actual voltages were largely
in Fig.1. Each DG has a rated capacity of 5kW , and the deviated from the nominal values, which can be observed
nominal voltage is selected as 315V . The Table. I details the from Fig.3(b) and Fig.3(c), respectively. The results in Fig.3
line distribution network and system parameters used for sim- demonstrate the deception caused due to FDI attacks. This
ulation. The test system is simulated in MATLAB/SIMULINK attack is not easily detectable with traditional approaches and
platform under different operating conditions. may endanger the operation of the microgrid.
A. Microgrid Operation with Conventional Control under Ac- B. Microgrid Operation with Proposed Resilient Control un-
tuator FDI Attack der Actuator FDI Attack
The DC microgrid operation with the conventional dynamic This case study examines the operation of a microgrid
average consensus [16] under actuator FDI attacks is evaluated with proposed controller under load change conditions and
in this case study. Initially, the system is at a steady state, evaluates the resiliency against actuator FDI attacks. Initially,
all DGs share load the total load of 16.5kW proportion- the system is operating as in the previous case study. At
ally, as shown in Fig.3(a), while maintaining the average
18
voltage at a nominal value. At t = 2s, a load of 1.5kW
17 Load Change
18 16
17 15
14 12
0 1 2 3 4 5 6 7 8 9 10
Time(s)
13
Load Change
12
(a) Output current of DGs
1 2 3 4 5 6 7 8 9 10
325
Time(s)
325
315
320
310
FDI attack initiated
315
305 Load Change
FDI attack initiated
310
300
0 1 2 3 4 5 6 7 8 9 10
305 Time(s)
Load Change
300
(b) Ouput voltages of DGs
0 1 2 3 4 5 6 7 8 9 10
Time(s) 360
350
(b) Ouput voltages of DGs
340 Load Change
360
330
350
320
340
Load Change 310
330
300
320 FDI attack initiated
290
310
280
300 0 1 2 3 4 5 6 7 8 9 10
FDI attack initiated Time(s)
290
(c) Average voltage of DGs Fig. 4: Performance of DC microgrid under actuator FDI
attacks on all DGs
Fig. 3: DC microgrid operation with proposed consensus
algorithm under link failure conditions t = 2s, the load at DG3 has increased by 1.5kW , which is
proportionally distributed among the DGs and average voltage
is increased at DG3 , and the controller responds to load is regulated by the proposed controller, as shown in Fig. 4.
change and esures the load variation is distributed among A time-varying bounded attack vector δui similar to that of
all DGs. At t = 6s, a bounded stealth FDI attack vector the previous case is injected into all DGs, at t = 6s. This
δui = [0 5sin(100πt) 0 40] is injected into the actuator attack has led to some transient voltage drop across all the
of DGs. This attack did not induce any steady state deviations DGs, as shown in Fig. 4(b). But in less than 1s, the voltages
on the average voltage estimate (v̄) at individual DGs, as and currents were restored to their pre-attack condition by
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:57:41 UTC from IEEE Xplore. Restrictions apply.
6
Authorized licensed use limited to: University Town Library of Shenzhen. Downloaded on August 28,2024 at 07:57:41 UTC from IEEE Xplore. Restrictions apply.