4.7 Article

An Adaptive Resilient Load Frequency Controller for Smart Grids With DoS Attacks

Journal

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Volume 69, Issue 5, Pages 4689-4699

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2020.2983565

Keywords

Load frequency control; denial-of-service attacks; event-triggering communication; adaptive resilient event-triggering communication

Funding

  1. National Natural Science Foundation of China [61972288, 61972454, 61872153, 61825203, U1736203, 61732021]
  2. National Key RD Plan of China [2017YFB0802203]
  3. Guangdong Provincial Special Funds for Applied Technology Research and Development and Transformation of Important Scientific and Technological Achieve [2016B010124009]
  4. Natural Science Foundation of Guangdong Province [2018A030313318]
  5. Guangzhou Key Laboratory of Data Security and Privacy Preserving
  6. Guangdong Key Laboratory of Data Security and Privacy Preserving
  7. National Joint Engineering Research Center of Network Security Detection and Protection Technology

Ask authors/readers for more resources

Load frequency control (LFC) is widely employed to keep smart grids stable and secure. This paper proposes an adaptive resilient LFC scheme for sub-systems of smart grids under denial-of-service (DoS) attacks with energy constraint. Firstly, a resilient triggering communication scheme is introduced, where the triggering condition includes the uncertainty item induced by DoS attacks. Secondly, an adaptive resilient event-triggering LFC scheme is proposed to further reduce the communication burden and defeat the DoS attacks, where the event-triggering parameter can be dynamically adjusted. Third, a stability criterion is derived for Proportional Integral-based LFC systems by employing Lyapunov theory. Finally, to validate the proposed control scheme, case studies are carried out based on three different LFC power generation systems including one-area, two-area and three-area models. The simulation results clearly demonstrate that the proposed adaptive resilient LFC scheme can reduce the communication burden while defeating DoS attacks by comparing with resilient event-triggering LFC scheme and event-triggering LFC scheme in term of defense effect and average triggering period.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Hardware & Architecture

Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage

Jia-Nan Liu, Xizhao Luo, Jian Weng, Anjia Yang, Xu An Wang, Ming Li, Xiaodong Lin

Summary: An efficient, secure and privacy-preserving mobile cloud storage scheme is proposed, which protects data confidentiality and privacy, with fine-grained data structure, lightweight client-side computation and constant communication overhead, making it more suitable for MCS scenario.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Artificial Intelligence

Fractional-order convolutional neural networks with population extremal optimization

Bi-Peng Chen, Yun Chen, Guo-Qiang Zeng, Qingshan She

Summary: This article focuses on the intelligent optimization issue using PEO-FOCNN, which combines fractional order convolutional neural networks (FOCNNs) with population extremal optimization (PEO). The Caputo fractional-order gradient method (CFOGM) is introduced to improve the optimization performance of FOCNN. The experiments demonstrate the superiority of PEO-FOCNN over other optimization algorithms on the MNIST dataset.

NEUROCOMPUTING (2022)

Article Automation & Control Systems

A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT

Xiaohan Zhang, Xinghua Li, Yinbin Miao, Xizhao Luo, Yunwei Wang, Siqi Ma, Jian Weng

Summary: This article proposes a monitor-based usage control model that utilizes blockchain smart contract and software guard extensions to enable efficient data trading and full control of user identities and operations, effectively preventing data abuse and ensuring fair data exchange.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Automation & Control Systems

Constrained-Differential-Evolution-Based Stealthy Sparse Cyber-Attack and Countermeasure in an AC Smart Grid

Kang-Di Lu, Zheng-Guang Wu

Summary: This article investigates the stealthy cyber-attack and its countermeasure in smart grids. A stealthy sparse cyber-attack model is proposed, and a constrained optimization problem is formulated to design the model by minimizing the number of contaminated meters. A generalized-cumulative-sum-based detector is developed to detect the proposed cyber-attacks. Numerical studies demonstrate the feasibility and effectiveness of the proposed countermeasure.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

PIPC: Privacy- and Integrity-Preserving Clustering Analysis for Load Profiling in Smart Grids

Haomiao Yang, Shaopeng Liang, Xizhao Luo, Dianhua Tang, Hongwei Li, Xuemin Shen

Summary: This article proposes a secure K-means clustering scheme called PIPC, which aims to protect the privacy and integrity of load profiling. By using techniques such as encrypted distance measurement and integrity assurance, PIPC successfully protects the privacy of smart-meter data and maintains the integrity of outsourced clustering.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Engineering, Electrical & Electronic

Multi-Objective False Data Injection Attacks of Cyber-Physical Power Systems

Kang-Di Lu, Zheng-Guang Wu

Summary: This paper proposes a multi-objective stealthy false data injection attack scheme to improve the cyber-security of cyber-physical power systems. The attack model is described as a multi-objective optimization problem and a non-dominated sorting genetic algorithm II is introduced as the solver. A new representation mechanism is proposed to improve the efficiency of generating attack vector.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS (2022)

Article Computer Science, Artificial Intelligence

IFA-EO: An improved firefly algorithm hybridized with extremal optimization for continuous unconstrained optimization problems

Min-Rong Chen, Liu-Qing Yang, Guo-Qiang Zeng, Kang-Di Lu, Yi-Yuan Huang

Summary: This paper presents an improved firefly algorithm (IFA-EO) by incorporating extremal optimization (EO) and adaptive step size strategies to address the drawbacks of slow convergence rate and local optimum trapping in traditional firefly algorithm. Experimental results demonstrate that IFA-EO performs well on complex optimization problems.

SOFT COMPUTING (2023)

Article Automation & Control Systems

Differential Evolution-Based Three Stage Dynamic Cyber-Attack of Cyber-Physical Power Systems

Kang-Di Lu, Zheng-Guang Wu, Tingwen Huang

Summary: This article proposes a novel three-stage dynamic false data injection attack (DFDIA) model in cyber-physical power systems (CPPS) by considering potential dynamic behaviors. It formulates the designing DFDIA as two constrained single-objective optimization problems and presents two versions of constrained differential evolution as solvers. It also proposes an interval state forecasting-based countermeasure to detect the established DFDIA and demonstrates their feasibility and effectiveness through extensive simulation experiments on IEEE bus systems.

IEEE-ASME TRANSACTIONS ON MECHATRONICS (2023)

Article Computer Science, Information Systems

F-PVNet: Frustum-Level 3-D Object Detection on Point-Voxel Feature Representation for Autonomous Driving

Chongben Tao, Shiping Fu, Chen Wang, Xizhao Luo, Huayi Li, Zhen Gao, Zufeng Zhang, Sifa Zheng

Summary: The paper proposes a point-voxel-based 3-D dynamic object detection algorithm that improves the accuracy and generalization capabilities of object detection by aggregating local sensitive points and global features.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Automation & Control Systems

SOPA-GA-CNN: Synchronous optimisation of parameters and architectures by genetic algorithms with convolutional neural network blocks for securing Industrial Internet-of-Things

Jia-Cheng Huang, Guo-Qiang Zeng, Guang-Gang Geng, Jian Weng, Kang-Di Lu

Summary: This article presents a new automated deep learning method for optimizing the security of Industrial Internet of Things (IIoT). By using genetic algorithms (GA) to simultaneously optimize the hyperparameters and block-based architectures of convolutional neural networks (CNNs), it achieves better experimental results than existing manually designed models and neuron-evolutionary methods.

IET CYBER-SYSTEMS AND ROBOTICS (2023)

Article Computer Science, Information Systems

Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems

Jia-Cheng Huang, Guo-Qiang Zeng, Guang-Gang Geng, Jian Weng, Kang-Di Lu, Yu Zhang

Summary: This study proposes an automatic architecture design method of convolutional neural networks (CNNs) based on differential evolution (DE-CNN) for intrusion detection in industrial control systems (ICSs). The DE-CNN optimizes the architecture parameters of CNNs through an evolutionary process and selects the best individual based on validation accuracy and the number of CNN model parameters. Experimental results demonstrate the superiority of DE-CNN over manually-designed and neuroevolution-based methods in ICSs intrusion detection.

COMPUTERS & SECURITY (2023)

Article Computer Science, Artificial Intelligence

Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power Systems

Kang-Di Lu, Le Zhou, Zheng-Guang Wu

Summary: This article proposes a representation-learning-based convolutional neural network (RL-CNN) for intelligent attack localization and system recovery of cyber-physical power systems (CPPSs). The RL-CNN is used as a multilabel classifier to improve the performance of attack localization by exploring and exploiting the implicit information of measurements. Additionally, a mean-squared estimator is employed to filter contaminated measurements and perform system recovery based on prior knowledge of the system state. Extensive simulation results demonstrate the effectiveness of the proposed method in achieving high accuracy for attack localization and automatic attack filtering.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2023)

Proceedings Paper Automation & Control Systems

An Ensemble Learning-Based Cyber-Attacks Detection Method of Cyber-Physical Power Systems

Kang-Di Lu, Zheng-Guang Wu

Summary: This paper proposes an ensemble learning-based cyber-attacks detection model for CPPS state estimation. The model uses subspace features and decision trees and random vector functional link networks as the basic classifier. Simulation results demonstrate the performance of the proposed model.

2022 INTERNATIONAL CONFERENCE ON ADVANCED ROBOTICS AND MECHATRONICS (ICARM 2022) (2022)

Article Engineering, Electrical & Electronic

Genetic Algorithm-Based Cumulative Sum Method for Jamming Attack Detection of Cyber-Physical Power Systems

Kang-Di Lu, Zheng-Guang Wu

Summary: This article proposes genetic-algorithm-based cumulative sum methods for online detection of jamming attacks in cyber-physical power systems (CPPSs). The proposed detectors are robust to time-varying jamming magnitudes and time-varying attacked locations, and show effectiveness in detecting jamming attacks in CPPSs.

IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT (2022)

No Data Available