12,116 research outputs found
A distributed attack detection method for multi-agent systems governed by consensus-based control
The paper considers the problem of detecting cyber-attacks occurring in communication networks for distributed control schemes. A distributed methodology is proposed to detect the presence of malicious attacks aimed at compromising the stability of large-scale interconnected systems and multi-agent systems governed by consensus-based controllers. Only knowledge of the local model is required. The detectability properties of the proposed method are analyzed. A class of undetectable attacks is identified. Preliminary simulation results show the effectiveness of the proposed approach
Resilient Learning-Based Control for Synchronization of Passive Multi-Agent Systems under Attack
In this paper, we show synchronization for a group of output passive agents
that communicate with each other according to an underlying communication graph
to achieve a common goal. We propose a distributed event-triggered control
framework that will guarantee synchronization and considerably decrease the
required communication load on the band-limited network. We define a general
Byzantine attack on the event-triggered multi-agent network system and
characterize its negative effects on synchronization. The Byzantine agents are
capable of intelligently falsifying their data and manipulating the underlying
communication graph by altering their respective control feedback weights. We
introduce a decentralized detection framework and analyze its steady-state and
transient performances. We propose a way of identifying individual Byzantine
neighbors and a learning-based method of estimating the attack parameters.
Lastly, we propose learning-based control approaches to mitigate the negative
effects of the adversarial attack
Distributed watermarking for secure control of microgrids under replay attacks
The problem of replay attacks in the communication network between
Distributed Generation Units (DGUs) of a DC microgrid is examined. The DGUs are
regulated through a hierarchical control architecture, and are networked to
achieve secondary control objectives. Following analysis of the detectability
of replay attacks by a distributed monitoring scheme previously proposed, the
need for a watermarking signal is identified. Hence, conditions are given on
the watermark in order to guarantee detection of replay attacks, and such a
signal is designed. Simulations are then presented to demonstrate the
effectiveness of the technique
Detection and Mitigation of Biasing Attacks on Distributed Estimation Networks
The paper considers a problem of detecting and mitigating biasing attacks on
networks of state observers targeting cooperative state estimation algorithms.
The problem is cast within the recently developed framework of distributed
estimation utilizing the vector dissipativity approach. The paper shows that a
network of distributed observers can be endowed with an additional attack
detection layer capable of detecting biasing attacks and correcting their
effect on estimates produced by the network. An example is provided to
illustrate the performance of the proposed distributed attack detector.Comment: Accepted for publication in Automatic
A novel distributed privacy-preserving control and data collection method for IoT-centric microgrids
Abstract The privacy of electricity consumers has become one of the most critical subjects in designing smart meters and their proliferation. In this work, a multilayer architecture has been proposed for anonymous data collection from smart meters, which provides: (1) The anonymity of information for thirdâparty data consumers; (2) Secure communication to utility provider network for billing purposes; (3) Online control of data sharing for endâusers; (4) Low communication costs based on available Internet of things (IoT) communication protocols. The core elements of this architecture are, first, the digital twin equivalent of the cyberâphysical system and, second, the Tangle distributed ledger network with IOTA cryptocurrency. In this architecture, digital twin models are updated in realâtime by information received from trusted nodes of the Tangle distributed network anonymously. A smallâscale laboratory prototype based on this architecture has been developed using the dSPACE SCALEXIO realâtime simulator and openâsource software tools to prove the feasibility of the proposed solution. The numerical results confirm that after a few seconds of anomaly detection, the microgrid was fully stabilized around its operating point with less than 5% deviation during the transition time
On the Control of Microgrids Against Cyber-Attacks: A Review of Methods and Applications
Nowadays, the use of renewable generations, energy storage systems (ESSs) and microgrids (MGs) has been developed due to better controllability of distributed energy resources (DERs) as well as their cost-effective and emission-aware operation. The development of MGs as well as the use of hierarchical control has led to data transmission in the communication platform. As a result, the expansion of communication infrastructure has made MGs as cyber-physical systems (CPSs) vulnerable to cyber-attacks (CAs). Accordingly, prevention, detection and isolation of CAs during proper control of MGs is essential. In this paper, a comprehensive review on the control strategies of microgrids against CAs and its defense mechanisms has been done. The general structure of the paper is as follows: firstly, MGs operational conditions, i.e., the secure or insecure mode of the physical and cyber layers are investigated and the appropriate control to return to a safer mode are presented. Then, the common MGs communication system is described which is generally used for multi-agent systems (MASs). Also, classification of CAs in MGs has been reviewed. Afterwards, a comprehensive survey of available researches in the field of prevention, detection and isolation of CA and MG control against CA are summarized. Finally, future trends in this context are clarified
Distributed Cyber-Attack Detection in the Secondary Control of DC Microgrids
The paper considers the problem of detecting
cyber-attacks occurring in communication networks typically
used in the secondary control layer of DC microgrids. The proposed
distributed methodology allows for scalable monitoring of
a microgrid and is able to detect the presence of data injection
attacks in the communications among Distributed Generation
Units (DGUs) - governed by consensus-based control - and
isolate the communication link over which the attack is injected.
Each local attack detector requires limited knowledge regarding
the dynamics of its neighbors. Detectability properties of the
method are analyzed, as well as a class of undetectable attacks.
Some results from numerical simulation are presented to
demonstrate the effectiveness of the proposed approach
- âŠ