z-logo
open-access-imgOpen Access
Detecting and isolating false data injection attacks on electric vehicles of smart grids using distributed functional observers
Author(s) -
Pham Thanh Ngoc,
Oo Amanullah Maung Than,
Trinh Hieu
Publication year - 2021
Publication title -
iet generation, transmission and distribution
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.92
H-Index - 110
eISSN - 1751-8695
pISSN - 1751-8687
DOI - 10.1049/gtd2.12057
Subject(s) - news aggregator , computer science , smart grid , renewable energy , electric power system , process (computing) , distributed computing , stability (learning theory) , power (physics) , engineering , machine learning , electrical engineering , physics , quantum mechanics , operating system
Abstract This paper considers the problem of false data injection attacks (FDIAs) on load frequency control of interconnected smart grids (ISGs) with delayed electric vehicles (EVs) and renewable energies. By intruding incorrect information, unauthorised users can corrupt the system information leading to degradation in the performance and disruptions of ISGs. In this paper, a model of ISGs subject to FDIAs in aggregator of EVs and power plants is first presented. This mathematical representation comprises dynamic interactions of power plants, delayed EVs, renewable energies and FDIAs on both system states and outputs. Based on recent advanced techniques on functional observers and matrix inequalities for time‐delay systems, then a new distributed functional observers based scheme is developed to realise the tasks of detecting and isolating FDIAs. Also, an effective procedure presented in tractable linear matrix inequalitiesis build with an optimisation process for the synthesis of the detector. The proposed detector is distributed, of reduced order, avoids the risk of centralised malicious incidents, therefore easy for implementation and monitoring tasks. The stability of ISGs and contribution of EVs subject to FDIAs are also discussed. Comprehensive simulations are given to demonstrate the effectiveness of our proposed method by using three‐area ISGs.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here