Concepedia

Publication | Closed Access

Distributed Resilient Finite-Time Secondary Control for Heterogeneous Battery Energy Storage Systems Under Denial-of-Service Attacks

236

Citations

35

References

2019

Year

TLDR

Distributed resilient finite‑time control of heterogeneous battery energy storage systems in a microgrid is challenged by denial‑of‑service attacks that block inter‑BESS communication. The authors propose a distributed secure control framework that uses ACK‑based attack detection and a communication recovery mechanism to restore the network topology after DoS attacks. Within this framework, a distributed resilient finite‑time secondary control scheme simultaneously achieves frequency regulation, active power sharing, and energy level balancing while satisfying operational constraints at all times. Theoretical analysis shows that the DoS attack duration directly affects convergence time, and case studies on a modified IEEE 57‑bus system confirm the scheme’s validity and effectiveness.

Abstract

This article addresses the problem of distributed resilient finite-time control of multiple heterogeneous battery energy storage systems (BESSs) in a microgrid subject to denial-of-service (DoS) attacks. Note that DoS attacks may block information transmission among BESSs by preventing the BESS from sending data, compromising the devices and jamming a communication network. A distributed secure control framework is presented, where an acknowledgment (ACK)-based attack detection strategy and a communication recovery mechanism are introduced to mitigate the impact of DoS attacks by repairing the paralyzed topology graphs caused by DoS attacks back into the initial connected graph. Under this framework, a distributed resilient finite-time secondary control scheme is proposed such that frequency regulation, active power sharing, and energy level balancing of BESSs can be achieved simultaneously in a finite time; meanwhile, operational constraints can be satisfied at any control transient time. Moreover, based on theoretical analysis, the impact of the duration time of DoS attacks on the convergence time of the control algorithm can be explicitly revealed. Finally, validity and effectiveness of the proposed control scheme are demonstrated by case studies on a modified IEEE 57-bus testing system.

References

YearCitations

Page 1