12,116 research outputs found

    A distributed attack detection method for multi-agent systems governed by consensus-based control

    Get PDF
    The paper considers the problem of detecting cyber-attacks occurring in communication networks for distributed control schemes. A distributed methodology is proposed to detect the presence of malicious attacks aimed at compromising the stability of large-scale interconnected systems and multi-agent systems governed by consensus-based controllers. Only knowledge of the local model is required. The detectability properties of the proposed method are analyzed. A class of undetectable attacks is identified. Preliminary simulation results show the effectiveness of the proposed approach

    Resilient Learning-Based Control for Synchronization of Passive Multi-Agent Systems under Attack

    Full text link
    In this paper, we show synchronization for a group of output passive agents that communicate with each other according to an underlying communication graph to achieve a common goal. We propose a distributed event-triggered control framework that will guarantee synchronization and considerably decrease the required communication load on the band-limited network. We define a general Byzantine attack on the event-triggered multi-agent network system and characterize its negative effects on synchronization. The Byzantine agents are capable of intelligently falsifying their data and manipulating the underlying communication graph by altering their respective control feedback weights. We introduce a decentralized detection framework and analyze its steady-state and transient performances. We propose a way of identifying individual Byzantine neighbors and a learning-based method of estimating the attack parameters. Lastly, we propose learning-based control approaches to mitigate the negative effects of the adversarial attack

    Distributed watermarking for secure control of microgrids under replay attacks

    Full text link
    The problem of replay attacks in the communication network between Distributed Generation Units (DGUs) of a DC microgrid is examined. The DGUs are regulated through a hierarchical control architecture, and are networked to achieve secondary control objectives. Following analysis of the detectability of replay attacks by a distributed monitoring scheme previously proposed, the need for a watermarking signal is identified. Hence, conditions are given on the watermark in order to guarantee detection of replay attacks, and such a signal is designed. Simulations are then presented to demonstrate the effectiveness of the technique

    Detection and Mitigation of Biasing Attacks on Distributed Estimation Networks

    Full text link
    The paper considers a problem of detecting and mitigating biasing attacks on networks of state observers targeting cooperative state estimation algorithms. The problem is cast within the recently developed framework of distributed estimation utilizing the vector dissipativity approach. The paper shows that a network of distributed observers can be endowed with an additional attack detection layer capable of detecting biasing attacks and correcting their effect on estimates produced by the network. An example is provided to illustrate the performance of the proposed distributed attack detector.Comment: Accepted for publication in Automatic

    A novel distributed privacy-preserving control and data collection method for IoT-centric microgrids

    Get PDF
    Abstract The privacy of electricity consumers has become one of the most critical subjects in designing smart meters and their proliferation. In this work, a multilayer architecture has been proposed for anonymous data collection from smart meters, which provides: (1) The anonymity of information for third‐party data consumers; (2) Secure communication to utility provider network for billing purposes; (3) Online control of data sharing for end‐users; (4) Low communication costs based on available Internet of things (IoT) communication protocols. The core elements of this architecture are, first, the digital twin equivalent of the cyber‐physical system and, second, the Tangle distributed ledger network with IOTA cryptocurrency. In this architecture, digital twin models are updated in real‐time by information received from trusted nodes of the Tangle distributed network anonymously. A small‐scale laboratory prototype based on this architecture has been developed using the dSPACE SCALEXIO real‐time simulator and open‐source software tools to prove the feasibility of the proposed solution. The numerical results confirm that after a few seconds of anomaly detection, the microgrid was fully stabilized around its operating point with less than 5% deviation during the transition time

    On the Control of Microgrids Against Cyber-Attacks: A Review of Methods and Applications

    Get PDF
    Nowadays, the use of renewable generations, energy storage systems (ESSs) and microgrids (MGs) has been developed due to better controllability of distributed energy resources (DERs) as well as their cost-effective and emission-aware operation. The development of MGs as well as the use of hierarchical control has led to data transmission in the communication platform. As a result, the expansion of communication infrastructure has made MGs as cyber-physical systems (CPSs) vulnerable to cyber-attacks (CAs). Accordingly, prevention, detection and isolation of CAs during proper control of MGs is essential. In this paper, a comprehensive review on the control strategies of microgrids against CAs and its defense mechanisms has been done. The general structure of the paper is as follows: firstly, MGs operational conditions, i.e., the secure or insecure mode of the physical and cyber layers are investigated and the appropriate control to return to a safer mode are presented. Then, the common MGs communication system is described which is generally used for multi-agent systems (MASs). Also, classification of CAs in MGs has been reviewed. Afterwards, a comprehensive survey of available researches in the field of prevention, detection and isolation of CA and MG control against CA are summarized. Finally, future trends in this context are clarified

    Distributed Cyber-Attack Detection in the Secondary Control of DC Microgrids

    Get PDF
    The paper considers the problem of detecting cyber-attacks occurring in communication networks typically used in the secondary control layer of DC microgrids. The proposed distributed methodology allows for scalable monitoring of a microgrid and is able to detect the presence of data injection attacks in the communications among Distributed Generation Units (DGUs) - governed by consensus-based control - and isolate the communication link over which the attack is injected. Each local attack detector requires limited knowledge regarding the dynamics of its neighbors. Detectability properties of the method are analyzed, as well as a class of undetectable attacks. Some results from numerical simulation are presented to demonstrate the effectiveness of the proposed approach
    • 

    corecore