This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Auxiliary Network-Enabled Attack Detection and Resilient Control of Islanded AC Microgrid

Vaibhav Vaishnav, , Anoop Jain, , and Dushyant Sharma V. Vaishnav and A. Jain are with the Department of Electrical Engineering, Indian Institute of Technology Jodhpur 342030, India (e-mail: vaishnav.2@iitj.ac.in; anoopj@iitj.ac.in). D. Sharma is with Department of Electrical Engineering, Indian Institute of Technology (Indian School of Mines) Dhanbad 826004, India (e-mail: dushyant@iitism.ac.in).
Abstract

This paper proposes a cyber-resilient distributed control strategy equipped with attack detection capabilities for islanded AC microgrids in the presence of bounded stealthy cyber attacks affecting both frequency and power information exchanged among neighboring distributed generators (DGs). The proposed control methodology relies on the construction of an auxiliary layer and the establishment of effective inter-layer cooperation between the actual DGs in the control layer and the virtual DGs in the auxiliary layer. This cooperation aims to achieve robust frequency restoration and proportional active power-sharing. It is shown that the in situ presence of a concealed auxiliary layer not only guarantees resilience against stealthy bounded attacks on both frequency and power-sharing but also facilitates a network-enabled attack identification mechanism. The paper provides rigorous proof of the stability of the closed-loop system and derives bounds for frequency and power deviations under attack conditions, offering insights into the impact of the attack signal, control and pinning gains, and network connectivity on the system’s convergence properties. The performance of the proposed controllers is illustrated by simulating a networked islanded AC microgrid in a Simulink environment showcasing both attributes of attack resilience and attack detection.

Index Terms:
AC microgrids, cyber-security, network-enabled attack detection, resilient control, stealthy attacks.

I Introduction

Distributed control has been the most widely adopted strategy over the past decade to exercise frequency and voltage control of islanded AC microgrids [1]. The cooperation among the DGs in a microgrid relies on local information exchange over a sparse communication network, which is vulnerable to cyber attacks [2]. Such attacks, commonly known as false data injection (FDI) attacks, jeopardize the integrity of information transmitted across communication channels and have garnered significant attention in resilient microgrid control [3]. A trust factor-based control regime was proposed in [4] to synchronize the frequencies of DGs under attack, by real-time monitoring of a confidence factor associated with all the neighboring DGs. Wang et al.[5] proposed cyber-resilient adaptive controllers for frequency and voltage restoration with active/reactive power-sharing in networked AC/DC microgrids. These controllers utilize time-varying adaptive gains based on frequency, voltage, and power errors. An auxiliary state was introduced in [6] to make conventional distributed frequency consensus protocol cyber resilient and maintain frequency synchronization and proportional active power-sharing. Recently, [7] proposed attack magnitude-dependent time-variant communication weights, to implement an adaptive frequency regulation strategy using the most optimal communication channels in the presence of multiple link attacks.

Apart from incorporating cyber resilience in the control framework, topology switching induced by different types of attack detection techniques has been the other counterpart of attack mitigation strategies in microgrid control. These techniques can be further classified into (a) system-based [8, 9, 10] and (b) data-based approaches [11, 12], where the states of system under consideration are continuously estimated using an observer in (a), while historical training data is used for attack detection for redundancy in (b). To the best of the authors’ knowledge, the concepts of attack resilience and attack detection have often been addressed separately in the microgrid control literature. Therefore, designing a suitable distributed control framework together with resilience and detection capabilities is a crucial research direction for ensuring the safety and security of microgrid control.

In recent times, cyber adversaries have evolved to employ increasingly sophisticated and deceptive stealthy attacks [13] that might be challenging to ascertain using novel detection strategies like [8, 9, 10, 11, 12]. Equipped with the complete knowledge of dynamics and control architecture of the system, the attacks are now specifically designed as bounded intermittent disturbances with state-dependent linear/nonlinear dynamics [13, 14] which can easily deceive state observers and showcase zero neighborhood error, even when the neighboring DGs are out of synchronization [15]. In view of such bounded stealthy attacks, a virtual hidden layer-based cyber resilient framework was proposed in [16] for distributed control of networked systems. Motivated by [16], in this paper, we propose auxiliary virtual network-enabled distributed resilient control for frequency synchronization and proportional active power-sharing among a group of inverter-based DGs.

Distributed controllers adopting the aforementioned idea of the virtual layer have been previously developed in [17, 18, 19, 20], addressing the problem of frequency synchronization in microgrids. However, these works do not emphasize the need for a dedicated power controller that can provide resilience against any possible attack on power-sharing between neighboring DGs. The distributed secondary controllers in [17, 18, 19, 20] are devised to provide a frequency set point to the droop-based primary control which depends on the inherent linear relationship between frequency and active power [21]. However, any FDI attack affecting the sharing of active power can significantly hamper system frequency and lead to deviations in power demand beyond the rated values of the respective DGs. Therefore, a resilient power controller is obligatory for preserving the resilience of the frequency controller against cyber attacks. Motivated by this fact, in this paper, we design resilient frequency and power controllers capable of functioning in the presence of simultaneous attacks on both frequency and active power within a microgrid.

It is also evident to mention that the stability under proposed controllers in [16, 17, 19, 20] is leveraged by assumptions on the magnitude of resilient control gain and inclusion of attack vector in the Lyapunov candidate function. However, considering that a cyber attack is an external breach that is completely unknown to both the system and the control engineer, establishing the closed-loop stability of a cyber-resilient control system relying solely on the state dynamics of the system appears to be a more practical and mathematically viable approach. Further, the control architecture inclusive of an auxiliary layer hidden from the attacker provides an alternate safeguarded path for communication among neighboring DGs, thereby giving a provision to compare and detect any discrepancy in information being shared through the actual cyber layer. Leveraging this, we propose a straightforward test for detecting an attack, as compared to the works [17, 18, 19, 20]. In the light of above discussion, the major contributions of this paper can be summarized as follows:

  1. i)

    Relying on an auxiliary layer, we propose frequency and power-distributed controllers as leader-follower and leaderless resilient cooperative systems, respectively, for frequency regulation and proportional active power-sharing in an islanded AC microgrid, under the presence of FDI attacks affecting both frequency and power-sharing between the neighboring DGs. The FDI attacks are uniformly bounded and governed by the dynamics having finite 2\mathcal{L}_{2} gain.

  2. ii)

    Due to the difference in the nature of cooperation and distributed consensus protocols, we provide separate stability analyses under frequency and power attacks and obtain analytical bounds characterizing the deviations of frequency and power from their steady-state value under no-attack conditions. It is shown that these bounds depend on the underlying network topology, the magnitude of the attack signals, pinning gain and a gain term decided by the control designer.

  3. iii)

    As a byproduct of auxiliary layer-based control design, we propose a network-enabled attack detection mechanism showcasing secured propagation of control variables between the cyber and auxiliary layer, thereby devising a detection test for surveillance of any possible attack in the cyber layer.

Additionally, an extensive simulation study is presented under the simultaneous presence of both cyber attacks and load perturbations. The remnant of this paper is arranged as follows: Section I commences with an introduction, summarizing mathematical preliminaries and a brief review of secondary droop control. Section II describes system architecture and attack model and formulates the problem. Section III proposes a resilient frequency controller and obtains various bounds characterizing the effect of attack and network connectivity on the steady-sate frequency error. The philosophy behind resilient power controllers is discussed under Section IV. Section V explains the auxiliary network-enabled attack identification scheme and proposes a generalized test for detecting the attacks. Lastly, Section VI presents simulation case studies, before concluding the paper in Section VII.

I-A Notations, Graph Theory, and Mathematical Preliminaries

Throughout the paper, \mathbb{R} denotes the set of real numbers, and 0n=[0,,0]Tn,1n=[1,,1]Tn\textbf{{0}}_{n}=[0,\ldots,0]^{T}\in\mathbb{R}^{n},\textbf{{1}}_{n}=[1,\ldots,1]^{T}\in\mathbb{R}^{n}. For x=[x1,,xn]Tnx=[x_{1},\ldots,x_{n}]^{T}\in\mathbb{R}^{n}, x\|x\| represents its Euclidean norm. The complex number is represented by jc=1j_{c}=\sqrt{-1}. The symbol \otimes denotes the Kronecker product of two matrices. λ(M)\lambda(M) represents an eigenvalue of any square matrix Mn×nM\in\mathbb{R}^{n\times n}, MTM^{T} is its transpose and M\|M\| denotes its operator (or induced) 2-norm such that M=λmax(MTM)\|M\|=\sqrt{\lambda_{\max}(M^{T}M)}, where λmax\lambda_{\max} is the maximum eigenvalue of the symmetric matrix MTMM^{T}M. Consider a network of nn DGs, described as an undirected graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}), with node set 𝒱={1,,n}\mathcal{V}=\{1,\ldots,n\} and edge set 𝒱×𝒱\mathcal{E}\subset\mathcal{V}\times\mathcal{V}. The information flow between ithi^{\text{th}} and jthj^{\text{th}} nodes can be represented by an undirected edge (i,j)(j,i)(i,j)\in\mathcal{E}\Leftrightarrow(j,i)\in\mathcal{E}. The set of neighbors of the ithi^{\text{th}} node is denoted by 𝒩i\mathcal{N}_{i} = {j:(i,j),ji}\{j:(i,j)\in\mathcal{E},j\neq i\}. The adjacency matrix of 𝒢\mathcal{G} is denoted by 𝒜\mathcal{A} = [aij]n×n[a_{ij}]\in\mathbb{R}^{n\times n} with aij=1(i,j)a_{ij}=1\Leftrightarrow(i,j)\in\mathcal{E}, else aij=0a_{ij}=0. The Laplacian matrix of 𝒢\mathcal{G} is denoted by L=[ij]n×nL=[\ell_{ij}]\in\mathbb{R}^{n\times n}, where ii=j𝒩iaij\ell_{ii}=\mathcal{\sum}_{j\in\mathcal{N}_{i}}a_{ij} and ij=aij\ell_{ij}=-a_{ij} for iji\neq j. For an undirected and connected graph 𝒢\mathcal{G}, the eigenvalues of the Laplacian Ln×nL\in\mathbb{R}^{n\times n} can be arranged in the ascending order as 0=λ1(L)λ2(L)λn(L)0=\lambda_{1}(L)\leq\lambda_{2}(L)\leq\cdots\leq\lambda_{n}(L). The following lemmas will be useful in the subsequent analysis of this paper:

Lemma 1 ([22], [23]).

Let 𝒢\mathcal{G} be an undirected and connected graph with Laplacian Ln×nL\in\mathbb{R}^{n\times n}, and B=diag{b1,,bn}n×nB={\rm diag}\{b_{1},\ldots,b_{n}\}\in\mathbb{R}^{n\times n} be a diagonal matrix with diagonal entries bi>0,ib_{i}>0,\forall i. Then, the matrix L+BL+B is positive-definite.

Lemma 2 ([24]).

Consider a uniformly bounded signal p(t)Ω,t0\|p(t)\|\leq\Omega,\ \forall t\geq 0, where Ω\Omega is a positive constant. Then, for a Hurwitz matrix QQ, there exists a constant vector Ψ\Psi and some finite-time TT such that following holds true for all tTt\geq T:

0teQ(tτ)p(τ)𝑑τ0teQ(tτ)Ψ𝑑τ.\left\|\int_{0}^{t}{\rm e}^{Q(t-\tau)}p(\tau)d\tau\right\|\leq\left\|\int_{0}^{t}{\rm e}^{Q(t-\tau)}\Psi d\tau\right\|.

I-B Distributed Secondary Droop Control

Droop control exploits the linear dependence of frequency on active power, causing the frequency of an inverter-based DG to droop with its output active power [25], according to the relation

ωi=ωoimPiPi,\omega_{i}=\omega_{o_{i}}-m_{P_{i}}P_{i}, (1)

where ωi\omega_{i} is angular frequency, ωoi\omega_{o_{i}} is the nominal angular frequency, PiP_{i} is measured output active power and mPim_{P_{i}} is the droop coefficient associated with the ithi^{\text{th}} DG. Due to primary droop control, since the inverter’s frequency undergoes a deviation from its nominal value, a suitable secondary control needs to be designed to restore the frequency of all the inverters to nominal microgrid frequency [21]. This is realized by cooperation among all the DGs at the secondary control level and designing distributed controllers uωi=ω˙iu_{\omega_{i}}=\dot{\omega}_{i} and uPi=mPiP˙iu_{P_{i}}=m_{P_{i}}\dot{P}_{i} for frequency and active power for each ii. Using these, the nominal frequency is obtained from (1) as:

ω˙oi=ω˙i+mPiP˙iωoi=uωi𝑑t+uPi𝑑t,i.\dot{\omega}_{o_{i}}=\dot{\omega}_{i}+m_{P_{i}}\dot{P}_{i}\implies\omega_{o_{i}}=\int u_{\omega_{i}}~{}dt+\int u_{P_{i}}~{}dt,\ \forall i. (2)

In the subsequent analysis, we use the vectors ω=[ω1,,ωn]Tn\omega=[\omega_{1},\ldots,\omega_{n}]^{T}\in\mathbb{R}^{n}, P=[P1,,Pn]TnP=[P_{1},\ldots,P_{n}]^{T}\in\mathbb{R}^{n} and mPP=[mP1P1,,mPnPn]Tnm_{P}P=[m_{P_{1}}P_{1},\ldots,m_{P_{n}}P_{n}]^{T}\in\mathbb{R}^{n} to represent the frequency, power, and droop-coefficient associated active power for the network of nn DGs.

Refer to caption
Figure 1: Microgrid network and control architecture.

II System Description and Problem Statement

II-A System Description

Consider a microgrid network comprising nn DGs in the physical layer, along with the associated control layer Σ\Sigma and the auxiliary layer Π\Pi, as shown in Fig. 1. Each DG is equipped with individual primary and secondary controllers where frequency ωi\omega_{i} and active power PiP_{i} are the physical state variables to be controlled for each ii. According to (2), the secondary control generates nominal frequency to the primary droop controller for computing the actual frequency ωi\omega_{i} of the ithi^{\text{th}} DG. Consequently, both frequency and the average active power signals of the DGs are shared among them according to the communication network at the control layer Σ\Sigma for designing frequency and power controllers.

However, owing to the attacker’s knowledge about the control layer, the communication network over Σ\Sigma is vulnerable to FDI attacks on both frequency and power signals, deviating the system from the desired cooperative control objectives. To account for these attacks, our approach relies on the construction of an auxiliary layer Π\Pi and its integration with Σ\Sigma to assure resiliency toward frequency regulation and proportional active power-sharing. The auxiliary nodes in Π\Pi are considered to have their own state dynamics but the same inter-agent interaction network as in Σ\Sigma. Further, there exists a hidden network connecting the corresponding nodes in Σ\Sigma and Π\Pi (see Fig. 1).

Under an FDI attack, the frequency and power signals received at a particular node in Σ\Sigma may be different from the one transmitted by the neighboring nodes and can be expressed as:

ωˇij=ωj+δijω,Pˇij=Pj+δijP,j𝒩i{i},\check{\omega}_{ij}={\omega}_{j}+\delta_{ij}^{\omega},\quad\check{P}_{ij}={P}_{j}+\delta_{ij}^{P},\quad j\in\mathcal{N}_{i}\cup\{i\}, (3)

where ωˇij\check{\omega}_{ij} is the frequency signal received at node ii from node jj, ωj{\omega}_{j} is the actual frequency of the jthj^{\text{th}} DG, and δijω\delta_{ij}^{\omega} is the FDI attack affecting the link connecting nodes ii and jj. Similar notations can be defined for Pˇij\check{P}_{ij}. The total external injection at the ithi^{\text{th}} node can be written as j𝒩i{i}δijω=dωi\sum_{j\in\mathcal{N}_{i}\cup\{i\}}\delta_{ij}^{\omega}=d_{\omega_{i}} (resp., for power as j𝒩i{i}δijP=dPi\sum_{j\in\mathcal{N}_{i}\cup\{i\}}\delta_{ij}^{P}=d_{P_{i}}), leading to the attack vector dω=[dω1,,dωn]Td_{\omega}=[d_{\omega_{1}},\ldots,d_{\omega_{n}}]^{T} (resp., dP=[dP1,,dPn]Td_{P}=[d_{P_{1}},\ldots,d_{P_{n}}]^{T}) for the nn nodes in Σ\Sigma. In general, an attacker might employ an FDI attack varying as per the real-time states of the system, which dies out as the system states become stable. Such kinds of attacks deviate the system from achieving the desired convergence properties and even make it unstable while being stealthy [16]. In this paper, we model the frequency attack (resp., power attack) as a function of states ωi\omega_{i} (resp., PiP_{i}) and time tt such that dω(ω,t)d_{\omega}(\omega,t) (resp., dP(P,t)d_{P}(P,t)) satisfies the following assumption:

Assumption 1.

The injections dω(ω,t)d_{\omega}(\omega,t) and dP(P,t)d_{P}(P,t) are uniformly bounded for bounded ω\omega and PP, that is, there exist positive constants D¯ω,D¯P\bar{D}_{\omega},\bar{D}_{P} such that dω(ω,t)D¯ω\|d_{\omega}(\omega,t)\|\leq\bar{D}_{\omega} and dP(P,t)D¯P\|d_{P}(P,t)\|\leq\bar{D}_{P} for all ωn,Pn\omega\in\mathbb{R}^{n},P\in\mathbb{R}^{n} and t0t\geq 0. In particular, if these attacks are generated by the dynamics,

d˙ω=fω(dω,ω);d˙P=fP(dP,P),\dot{d}_{\omega}=f_{\omega}(d_{\omega},\omega);\quad\dot{d}_{P}=f_{P}(d_{P},P), (4)

these must have a finite 2\mathcal{L}_{2}-gain.

The relevance of this assumption lies in the fact that an intelligent attacker always aims at inserting a bounded attack signal, as the injections with large magnitude are easy to detect and will be rejected before they spread across the network. Further, dynamics (4) having finite 2\mathcal{L}_{2}-gain implies that dωd_{\omega} and dPd_{P} settle down to some value, as ω\omega and PP reach the steady-state, respectively.

II-B Problem Statement

Consider nn DGs, connected via an undirected and connected graph 𝒢\mathcal{G}, as shown in Fig. 1. Assume that the DGs be governed by the droop-based frequency dynamics (2) and subject to frequency and power attacks dωd_{\omega} and dPd_{P} in control layer Σ\Sigma, according to Assumption 1. Let z=[z1,,zn]Tnz=[z_{1},\ldots,z_{n}]^{T}\in\mathbb{R}^{n} be the state vector associated with the auxiliary nodes and ω>0\omega^{*}>0 be the desired value of the microgrid frequency. Based on the integration between Σ\Sigma and Π\Pi layers, design the vector functions ωc(ω,z),ωa(ω,z),Pc(P,z),Pa(P,z)\mathcal{F}^{c}_{\omega}(\omega,z),\mathcal{F}^{a}_{\omega}(\omega,z),\mathcal{F}^{c}_{P}(P,z),\mathcal{F}^{a}_{P}(P,z) such that the following auxiliary-state coupled dynamics, under the frequency and power attacks dωd_{\omega} and dPd_{P}, disseminated over Σ\Sigma using Laplacian LL, respectively,

Sω:{ω˙ωc(ω,z)+Ldωz˙ωa(ω,z),SP:{mPP˙Pc(P,z)+LdPz˙Pa(P,z),S_{\omega}:\begin{dcases*}\dot{\omega}&= $\mathcal{F}^{c}_{\omega}(\omega,z)+Ld_{\omega}$\\ \dot{z}&= $\mathcal{F}^{a}_{\omega}(\omega,z)$\end{dcases*},\ S_{P}:\begin{dcases*}m_{P}\dot{P}&= $\mathcal{F}^{c}_{P}(P,z)+Ld_{P}$\\ \dot{z}&= $\mathcal{F}^{a}_{P}(P,z)$\end{dcases*}, (5)

assures that the following hold true for some small constants ϵω>0\epsilon_{\omega}>0 and ϵP>0\epsilon_{P}>0:

  • (P1)

    Frequency is maintained at the desired nominal value for all the DGs, that is, limtω(t)ω𝟏nϵω\lim_{t\to\infty}\|\omega(t)-\omega^{*}\boldsymbol{1}_{n}\|\leq\epsilon_{\omega}.

  • (P2)

    Power is shared among the DGs in proportion to their droop coefficients, that is, limtmPPΔP𝟏nϵP\lim_{t\to\infty}\|m_{P}P-\Delta_{P}\boldsymbol{1}_{n}\|\leq\epsilon_{P}, where ΔP=(1/n)i=1nmPiPi(0)\Delta_{P}=(1/n)\sum_{i=1}^{n}m_{P_{i}}P_{i}(0) is a constant.

Additionally,

  • (P3)

    Based on the integration of Σ\Sigma and Π\Pi, propose an attack detection mechanism such that non-zero FDI attacks δijω\delta_{ij}^{\omega} and δijP\delta_{ij}^{P}, as defined in (3), are detected for all (i,j)(i,j)\in\mathcal{E}.

III Distributed Attack Resilient Frequency control

For resiliency towards frequency attacks dωd_{\omega}, we propose the system SωS_{\omega} in (5) as follows:

ω˙\displaystyle\dot{\omega} =Aω+βAz+Bω+Ldω\displaystyle=A\omega+\beta Az+B\omega^{*}+Ld_{\omega} (6a)
z˙\displaystyle\dot{z} =AzβAω+βCω,\displaystyle=Az-\beta A\omega+\beta C\omega^{*}, (6b)

where ω\omega^{*} is the reference frequency fed to the leader DGs in the group. The matrix AA is given by

A=[j=1na1ja12a1na21j=1na2ja2nan1an2j=1nanj]\displaystyle A=-\begin{bmatrix}\sum_{j=1}^{n}a_{1j}&-a_{12}&\ldots&-a_{1n}\\ -a_{21}&\sum_{j=1}^{n}a_{2j}&\ldots&-a_{2n}\\ \vdots&\vdots&\vdots&\vdots\\ -a_{n1}&-a_{n2}&\ldots&\sum_{j=1}^{n}a_{nj}\end{bmatrix}
[g1000g2000gn]=(L+G),\displaystyle-\begin{bmatrix}g_{1}&0&\ldots&0\\ 0&g_{2}&\ldots&0\\ \vdots&\vdots&\vdots&\vdots\\ 0&0&\ldots&g_{n}\end{bmatrix}=-(L+G), (7)

where GG is a diagonal matrix with its entries gig_{i} represents the pinning gain, such that gi=1g_{i}=1 if the ithi^{\text{th}} DG is a leader and 0 otherwise. Further, β>0\beta>0 is a gain factor and the vectors BB and CC are defined as BG𝟏nB\coloneqq G\boldsymbol{1}_{n} and CA𝟏nC\coloneqq A\boldsymbol{1}_{n}. In (6), matrices AA and BB are such that the frequency controller ω˙i\dot{\omega}_{i} of the ithi^{\text{th}} DG contains relative frequency term j𝒩i(ωjωi)\sum_{j\in\mathcal{N}_{i}}(\omega_{j}-\omega_{i}) (because of the Laplacian LL) responsible for frequency consensus, and the term gi(ωiω)g_{i}(\omega_{i}-\omega^{\star}) associated with the pinning gain gig_{i}, shapes the solution trajectories such that consensus occurs at the desired frequency ω\omega^{\star}. The interconnection between the two layers Σ\Sigma and Π\Pi is realized by the matrix βA\beta A, associated with (i) the auxiliary state vector zz in the ω˙\dot{\omega} in dynamics (6a), and (ii) the actual frequency vector ω\omega in the z˙\dot{z} dynamics (6b). Note that the auxiliary state vector zz has no physical significance and may assume any steady-sate value. We have the following lemma relating matrices A,B,CA,B,C and GG:

Lemma 3.

Consider system (6) with matrix AA in (III). Then, A𝟏n=BA\boldsymbol{1}_{n}=-B and C=GC=-G for an undirected and connected graph 𝒢\mathcal{G}.

Proof.

Multiplying by 𝟏n\boldsymbol{1}_{n} on both sides of (III), we have that A𝟏n=L𝟏nG𝟏n=G𝟏n=BA\boldsymbol{1}_{n}=-L\boldsymbol{1}_{n}-G\boldsymbol{1}_{n}=-G\boldsymbol{1}_{n}=-B, since L𝟏n=𝟎nL\boldsymbol{1}_{n}=\boldsymbol{0}_{n} for an undirected and connected graph. Further, since CA𝟏nC\coloneqq A\boldsymbol{1}_{n} by definition, it follows that C=GC=-G. ∎

For further analysis, let us introduce the frequency error vector

eω=ωω𝟏n,e_{\omega}=\omega-\omega^{*}\boldsymbol{1}_{n}, (8)

using which, (6) can be expressed as:

e˙ω\displaystyle\dot{e}_{\omega} =Aeω+βAz+Aω𝟏n+Bω+Ldω\displaystyle=Ae_{\omega}+\beta Az+A\omega^{*}\boldsymbol{1}_{n}+B\omega^{*}+Ld_{\omega}
z˙\displaystyle\dot{z} =AzβA(eω+ω𝟏n)+βCω.\displaystyle=Az-\beta A(e_{\omega}+\omega^{*}\boldsymbol{1}_{n})+\beta C\omega^{*}.

Following Lemma 3, the above equations are simplified as:

e˙ω\displaystyle\dot{e}_{\omega} =Aeω+βAz+Ldω\displaystyle=Ae_{\omega}+\beta Az+Ld_{\omega} (9a)
z˙\displaystyle\dot{z} =AzβAeω.\displaystyle=Az-\beta Ae_{\omega}. (9b)

Let ξω=[eωT,zT]T2n\xi_{\omega}=[e_{\omega}^{T},z^{T}]^{T}\in\mathbb{R}^{2n} be the joint state vector, using which, (9) can be written in the compact form as:

ξ˙ω=𝒦ξω+Dω,\dot{\xi}_{\omega}=\mathcal{K}\xi_{\omega}+D_{\omega}, (10)

where Dω=[(Ldω)T,𝟎nT]T2nD_{\omega}=[(Ld_{\omega})^{T},\boldsymbol{0}_{n}^{T}]^{T}\in\mathbb{R}^{2n} and the block matrix 𝒦2n×2n\mathcal{K}_{2n\times 2n} is given by

𝒦=[AβAβAA].\mathcal{K}=\begin{bmatrix}A&\beta A\\ -\beta A&A\end{bmatrix}. (11)
Lemma 4.

The block matrix 𝒦\mathcal{K} in (11) is Hurwitz.

Proof.

Using Kronecker product, (11) can be written as 𝒦=ΦA\mathcal{K}=\Phi\otimes A, where

Φ=[1ββ1],\Phi=\begin{bmatrix}1&\beta\\ -\beta&1\end{bmatrix}, (12)

is a 2×22\times 2 matrix with eigenvalues λ(Φ)=1±jcβ\lambda(\Phi)=1\pm j_{c}\beta. Further, since graph 𝒢\mathcal{G} is undirected and connected, LL is positive semi-definite [22]. Also, matrix GG contains at least one non-zero diagonal entry (as there is at least one leader in the group). Using Lemma 1 from Subsection I-A, it can be stated that L+GL+G is symmetric and positive-definite. Alternatively, A=(L+G)A=-(L+G), as defined in (III), is symmetric and negative-definite, and hence, has all real and strictly negative eigenvalues λi(A)<0,i=1,,n\lambda_{i}(A)<0,\forall i=1,\ldots,n. Now, using the multiplicative property of Kronecker product [26, Theorem 4.2.12], it can be inferred that λi(𝒦)=λi(Φ)λi(A),i=1,,2n\lambda_{i}(\mathcal{K})=\lambda_{i}(\Phi)\lambda_{i}(A),\forall i=1,\ldots,2n. Alternatively, all 2n2n eigenvalues of 𝒦\mathcal{K} are complex conjugate having strictly negative real part, implying that 𝒦\mathcal{K} is Hurwitz. ∎

For better motivation and simplicity, we first discuss that the proposed framework (10) assures the frequency consensus in the absence of an attack, followed by the result in the attacked scenario.

Lemma 5 (Frequency control in absence of attack).

If dω𝟎nd_{\omega}\equiv\boldsymbol{0}_{n}, the dynamics (10) assures that ωω𝟏n\omega\to\omega^{\star}\boldsymbol{1}_{n} as tt\to\infty.

Proof.

For dω𝟎nd_{\omega}\equiv\boldsymbol{0}_{n}, (10) becomes ξ˙ω=𝒦ξω\dot{\xi}_{\omega}=\mathcal{K}\xi_{\omega} and has the solution ξω(t)=e𝒦tξω(0)\xi_{\omega}(t)={\rm e}^{\mathcal{K}t}\xi_{\omega}(0). Now, it is straightforward to conclude that ξω𝟎2n\xi_{\omega}\to\boldsymbol{0}_{2n} at tt\to\infty, since 𝒦\mathcal{K} is Hurwitz (see Lemma 4). In other words, ωω𝟏n\omega\to\omega^{\star}\boldsymbol{1}_{n} as tt\to\infty in absence of dωd_{\omega} (the steady-state value of the auxiliary state zz is not important). ∎

If dω𝟎nd_{\omega}\neq\boldsymbol{0}_{n}, we have the following convergence theorem for microgrid frequency, addressing the problem (P1).

Theorem 1 (Frequency control in presence of attack).

Consider the system (10) where the frequency attack signal dω𝟎nd_{\omega}\neq\boldsymbol{0}_{n} satisfies Assumption 1. Then, for a sufficiently large value of gain β\beta, the frequencies of all DGs remain in a small neighborhood of nominal frequency, i.e., ωω𝟏nϵω\|\omega-\omega^{\star}\boldsymbol{1}_{n}\|\leq\epsilon_{\omega} for some small ϵω>0\epsilon_{\omega}>0.

Before proceeding to the proof, we first discuss the below important result:

Lemma 6.

Let β=[(A+β2A)1β(A+β2A)1]\mathcal{H}_{\beta}=\begin{bmatrix}(A+{\beta}^{2}A)^{-1}\\ \beta(A+{\beta}^{2}A)^{-1}\end{bmatrix} be a block matrix of dimension 2n×n2n\times n, where AA is given by (III). The operator norm of β\mathcal{H}_{\beta} is given by

β=1λmin(L+G)1+β2.\|\mathcal{H}_{\beta}\|=\frac{1}{\lambda_{\min}(L+G)\sqrt{1+\beta^{2}}}.
Proof.

Using Kronecker product, the matrix β\mathcal{H}_{\beta} can be rewritten as β=[11+β2β1+β2]A1\mathcal{H}_{\beta}=\begin{bmatrix}\frac{1}{1+\beta^{2}}\\ \frac{\beta}{1+\beta^{2}}\end{bmatrix}\otimes A^{-1}. Taking operator norm on both sides, we have

β=[11+β2β1+β2]A1=[11+β2β1+β2]A1,\|\mathcal{H}_{\beta}\|=\left\|\begin{bmatrix}\frac{1}{1+\beta^{2}}\\ \frac{\beta}{1+\beta^{2}}\end{bmatrix}\otimes A^{-1}\right\|=\left\|\begin{bmatrix}\frac{1}{1+\beta^{2}}\\ \frac{\beta}{1+\beta^{2}}\end{bmatrix}\right\|\|A^{-1}\|,

using the property 𝒜=𝒜\|\mathcal{A}\otimes\mathcal{B}\|=\|\mathcal{A}\|\|\mathcal{B}\| of the operator norms for Kronecker products of two matrices 𝒜\mathcal{A} and \mathcal{B} [27, Theorem 8, p. 412]. Note that [11+β2β1+β2]=11+β2\left\|\begin{bmatrix}\frac{1}{1+\beta^{2}}\\ \frac{\beta}{1+\beta^{2}}\end{bmatrix}\right\|=\frac{1}{\sqrt{1+\beta^{2}}} and A1=λmax((A1)TA1)\|A^{-1}\|=\sqrt{\lambda_{\max}((A^{-1})^{T}A^{-1})}. From (III), it is straightforward to check that AT=A(AT)1=A1(A1)T=A1A^{T}=A\implies(A^{T})^{-1}=A^{-1}\implies(A^{-1})^{T}=A^{-1}. The last relation can also be rewritten as ((A)1)T=(A)1((-A)^{-1})^{T}=(-A)^{-1}, where matrix A-A is positive-definite. Using this, one can write A1=λmax((A1)T(A)1)=λmax(A1)=1λmin(A)\|A^{-1}\|=\sqrt{\lambda_{\max}((-A^{-1})^{T}(-A)^{-1})}=\lambda_{\max}(-A^{-1})=\frac{1}{\lambda_{\min}(-A)}. Consequently, it can be concluded using (III) that β=1λmin(L+G)1+β2\|\mathcal{H}_{\beta}\|=\frac{1}{\lambda_{\min}(L+G)\sqrt{1+\beta^{2}}}, and hence, proving the result. ∎

We are now ready to prove Theorem 1.

Proof of Theorem 1.

If dω𝟎nd_{\omega}\neq\boldsymbol{0}_{n}, the solution of linear system (10) is obtained as ξω(t)=e𝒦tξω(0)+0te𝒦(tτ)Dω𝑑τ\xi_{\omega}(t)={\rm e}^{\mathcal{K}t}\xi_{\omega}(0)+\int_{0}^{t}{\rm e}^{\mathcal{K}(t-\tau)}D_{\omega}d\tau. Now, taking 2\mathcal{L}_{2} norm on both sides and applying the Cauchy–Schwarz inequality results in limtξω(t)limte𝒦tξω(0)+limt0te𝒦(tτ)Dω𝑑τ\lim_{t\to\infty}\|\xi_{\omega}(t)\|\leq\lim_{t\to\infty}\|{\rm e}^{\mathcal{K}t}\xi_{\omega}(0)\|+\lim_{t\to\infty}\|\int_{0}^{t}{\rm e}^{\mathcal{K}(t-\tau)}D_{\omega}d\tau\|. Since limte𝒦tξω(0)0\lim_{t\to\infty}\|{\rm e}^{\mathcal{K}t}\xi_{\omega}(0)\|\to 0, as 𝒦\mathcal{K} is Hurwitz (see Lemma 4), it can be written that limtξω(t)limt0te𝒦(tτ)Dω𝑑τ\lim_{t\to\infty}\|\xi_{\omega}(t)\|\leq\lim_{t\to\infty}\|\int_{0}^{t}{\rm e}^{\mathcal{K}(t-\tau)}D_{\omega}d\tau\|. Note that DωD_{\omega} is uniformly bounded, as it is dωd_{\omega}, according to Assumption 1. Now, it immediately follows from Lemma 2 (from Subsection I-A) that there exists a time-independent vector d^ωn\hat{d}_{\omega}\in\mathbb{R}^{n} with d^ωD¯ω\|\hat{d}_{\omega}\|\leq\bar{D}_{\omega} (where D¯ω\bar{D}_{\omega} is defined in Assumption 1) such that 0te𝒦(tτ)Dω(τ)𝑑τ0te𝒦(tτ)D^ω𝑑τ\|\int_{0}^{t}{\rm e}^{\mathcal{K}(t-\tau)}D_{\omega}(\tau)d\tau\|\leq\|\int_{0}^{t}{\rm e}^{\mathcal{K}(t-\tau)}\hat{D}_{\omega}d\tau\| for some constant vector D^ω=[(Ld^ω)T,𝟎nT]T2n\hat{D}_{\omega}=[(L\hat{d}_{\omega})^{T},\boldsymbol{0}_{n}^{T}]^{T}\in\mathbb{R}^{2n} for all tTt\geq T. This implies that limtξω(t)limt0te𝒦(tτ)D^ω𝑑τ\lim_{t\to\infty}\|\xi_{\omega}(t)\|\leq\lim_{t\to\infty}\|\int_{0}^{t}{\rm e}^{\mathcal{K}(t-\tau)}\hat{D}_{\omega}d\tau\|, which on further simplification results in limtξω(t)𝒦1D^ω\lim_{t\to\infty}\|\xi_{\omega}(t)\|\leq\|\mathcal{K}^{-1}\hat{D}_{\omega}\|. Note that 𝒦\mathcal{K} is invertible as it has all non-zero eigenvalues (Lemma 4) and its inverse is given by [28, Theorem 0.7.3]:

𝒦1=[11122122],\mathcal{K}^{-1}=\begin{bmatrix}\mathcal{M}_{11}&\mathcal{M}_{12}\\ \mathcal{M}_{21}&\mathcal{M}_{22}\end{bmatrix}, (13)

using which, it holds that

limtξω(t)[11(Ld^ω)21(Ld^ω)],\lim_{t\to\infty}\|\xi_{\omega}(t)\|\leq\left\|\begin{bmatrix}\mathcal{M}_{11}(L\hat{d}_{\omega})\\ \mathcal{M}_{21}(L\hat{d}_{\omega})\end{bmatrix}\right\|, (14)

where 11=(𝒦11𝒦12𝒦221𝒦21)1\mathcal{M}_{11}=(\mathcal{K}_{11}-\mathcal{K}_{12}\mathcal{K}_{22}^{-1}\mathcal{K}_{21})^{-1} and 21=𝒦221𝒦21(𝒦12𝒦221𝒦21𝒦11)1\mathcal{M}_{21}=\mathcal{K}_{22}^{-1}\mathcal{K}_{21}(\mathcal{K}_{12}\mathcal{K}_{22}^{-1}\mathcal{K}_{21}-\mathcal{K}_{11})^{-1} [28, Theorem 0.7.3], with 𝒦11=𝒦22=A\mathcal{K}_{11}=\mathcal{K}_{22}=A and 𝒦12=𝒦21=βA\mathcal{K}_{12}=-\mathcal{K}_{21}=\beta A, from (11). Substituting these, we get 11=(A+β2A)1\mathcal{M}_{11}=(A+{\beta}^{2}A)^{-1} and 21=β(A+β2A)1\mathcal{M}_{21}=\beta(A+{\beta}^{2}A)^{-1}, and hence,

limt[eω(t)z(t)][(A+β2A)1β(A+β2A)1]Ld^ω=βLd^ω,\lim_{t\to\infty}\left\|\begin{bmatrix}e_{\omega}(t)\\ z(t)\end{bmatrix}\right\|\leq\left\|\begin{bmatrix}(A+{\beta}^{2}A)^{-1}\\ \beta(A+{\beta}^{2}A)^{-1}\end{bmatrix}\right\|\|L\hat{d}_{\omega}\|=\|\mathcal{H}_{\beta}\|\|L\hat{d}_{\omega}\|,

where we have replaced the first term by β\|\mathcal{H}_{\beta}\|, using Lemma 6. Since Ld^ωLd^ω=λmax(LTL)d^ω=λmax(L)d^ω\|L\hat{d}_{\omega}\|\leq\|L\|\|\hat{d}_{\omega}\|=\sqrt{\lambda_{\max}(L^{T}L)}\|\hat{d}_{\omega}\|=\lambda_{\max}(L)\|\hat{d}_{\omega}\| (since L=LTL=L^{T} for an undirected and connected graph 𝒢\mathcal{G}) and d^ωD¯ω\|\hat{d}_{\omega}\|\leq\bar{D}_{\omega} (see Assumption 1), it holds that

limt[eω(t)z(t)]λmax(L)D¯ωλmin(L+G)1+β2,\lim_{t\to\infty}\left\|\begin{bmatrix}e_{\omega}(t)\\ z(t)\end{bmatrix}\right\|\leq\frac{\lambda_{\max}(L)\bar{D}_{\omega}}{\lambda_{\min}(L+G)\sqrt{1+\beta^{2}}}, (15)

exploiting Lemma 6. From (15), one can conclude that eω(t)ϵω\|e_{\omega}(t)\|\leq\epsilon_{\omega} as tt\to\infty, with ϵω=λmax(L)D¯ωλmin(L+G)1+β2\epsilon_{\omega}=\frac{\lambda_{\max}(L)\bar{D}_{\omega}}{\lambda_{\min}(L+G)\sqrt{1+\beta^{2}}}. Further, since ϵω\epsilon_{\omega} is small for sufficiently large values of gain β\beta (which is a design parameter), ω\omega converges to a small neighborhood around ω𝟏n{\omega}^{*}\boldsymbol{1}_{n} as tt\to\infty, using (8). ∎

Remark 1.

It can be inferred from inequality (15) that the steady-state bound ϵω\epsilon_{\omega} is:

  • proportional to the maximum eigenvalue λmax(L)\lambda_{\max}(L) of Laplacian LL and the attack bound D¯ω\bar{D}_{\omega}. If the graph 𝒢\mathcal{G} has minimal connectivity (i.e., small λmax(L)\lambda_{\max}(L)), the attacker will have fewer links to target, and hence, will have relatively less impact.

  • inversely proportional to the minimum eigenvalue λmin(L+G)\lambda_{\min}(L+G) of matrix L+GL+G and the design parameter β\beta. Beside selecting large β\beta, it is possible to make λmin(L+G)\lambda_{\min}(L+G) large by choosing the large value of pinning gain gig_{i}, since λmin(L+G)λmin(L)+mini{gi}=mini{gi}\lambda_{\min}(L+G)\geq\lambda_{\min}(L)+\min_{i}\{g_{i}\}=\min_{i}\{g_{i}\}, using Weyl’s theorem [28, Chapter 4, p. 239] and the fact that λmin(L)=0\lambda_{\min}(L)=0. Therefore, λmin(L+G)\lambda_{\min}(L+G) primarily influenced by the pinning gain gig_{i}.

In summary, it is evident that the effect of varying β\beta is more dominant on the value of ϵω\epsilon_{\omega}, as compared to gig_{i}, and can be decided appropriately by the user.

IV Distributed Attack Resilient Power Control

Unlike frequency control, the implementation of the distributed power controller is done in a leaderless configuration to assure the proportional power-sharing among the DGs, leading to the system SPS_{P} in (5) as follows:

mPP˙\displaystyle m_{P}\dot{P} =L(mPP)+βLz+LdP\displaystyle=-L(m_{P}P)+\beta Lz+L{d_{P}} (16a)
z˙\displaystyle\dot{z} =LzβL(mPP),\displaystyle=-Lz-\beta L(m_{P}P), (16b)

where Laplacian LL is associated with the state vector mPPm_{P}P, instead of matrix AA as in (6). Here, the interconnection between Σ\Sigma and Π\Pi is realized by the matrix βL\beta L. Defining power-sharing error as (where ΔP\Delta_{P} is defined in Problem (P2))

eP=mPPΔP𝟏n,e_{P}=m_{P}P-\Delta_{P}\boldsymbol{1}_{n}, (17)

(16) can be expressed in terms of ePe_{P} as:

e˙P\displaystyle\dot{e}_{P} =LeP+βLz+LdP\displaystyle=-Le_{P}+\beta Lz+Ld_{P} (18a)
z˙\displaystyle\dot{z} =βLePLz.\displaystyle=-\beta Le_{P}-Lz. (18b)

We have the following lemma in absence of power attacks:

Lemma 7 (Power-sharing control in absence of attack).

If dP𝟎nd_{P}\equiv\boldsymbol{0}_{n}, the dynamics (18) assures that PΔP𝟏nP\to\Delta_{P}\boldsymbol{1}_{n} as tt\to\infty.

Proof.

Consider the candidate Lyapunov function VP=0.5epTep+0.5zTzV_{P}=0.5e_{p}^{T}e_{p}+0.5z^{T}z, whose time-derivative along (18) with dP𝟎nd_{P}\equiv\boldsymbol{0}_{n} is obtained as V˙p=epTe˙p+zTz˙=epT[L(mPP)+βLz]+zT[LzβL(mpP)]\dot{V}_{p}=e_{p}^{T}\dot{e}_{p}+z^{T}\dot{z}=e_{p}^{T}[-L(m_{P}P)+\beta Lz]+z^{T}[-Lz-\beta L(m_{p}P)], where we used the fact that LΔP𝟏n=𝟎nL\Delta_{P}\boldsymbol{1}_{n}=\boldsymbol{0}_{n} for an undirected and connected graph 𝒢\mathcal{G}. On further simplification, one can get that V˙P=epTLepzTLz0\dot{V}_{P}=-e_{p}^{T}Le_{p}-z^{T}Lz\leq 0, which is negative semi-definite. Now, using LaSalle’s invariance theorem [29, Corollary 4.2, p. 129], it can be concluded that eP=z=𝟎ne_{P}=z=\boldsymbol{0}_{n} is the desired equilibrium point, implying that, PΔP𝟏nP\to\Delta_{P}\boldsymbol{1}_{n} as tt\to\infty, using (17). ∎

In case dP𝟎nd_{P}\neq\boldsymbol{0}_{n}, the analysis is different from the earlier Theorem 1, as the system matrix LL in (18) has one zero eigenvalue and rest positive eigenvalues for an undirected and connected graph 𝒢\mathcal{G}. To proceed further, we filter out the dynamics associated with the simple zero eigenvalue by using the transformation:

eP=T[e¯Pe~P],z=T[z¯z~],dP=T[d¯Pd~P],e_{P}=T\begin{bmatrix}\bar{e}_{P}\\ \tilde{e}_{P}\end{bmatrix},\ z=T\begin{bmatrix}\bar{z}\\ \tilde{z}\end{bmatrix},\ d_{P}=T\begin{bmatrix}\bar{d}_{P}\\ \tilde{d}_{P}\end{bmatrix}, (19)

where e¯P,z¯,d¯P\bar{e}_{P},\bar{z},\bar{d}_{P}\in\mathbb{R} and e~P,z~,d~Pn1\tilde{e}_{P},\tilde{z},\tilde{d}_{P}\in\mathbb{R}^{n-1} and the transformation T=[v1,,vn]T=[v_{1},\ldots,v_{n}] with viv_{i} being the left eigenvector associated with λi(L)\lambda_{i}(L), i=1,,ni=1,\ldots,n. Using transformation TT, LL can be diagonalized as:

T1LT=[λ1(L)000λ2(L)000λn(L)]=[0𝟎n1T𝟎n1],T^{-1}LT=\begin{bmatrix}\lambda_{1}(L)&0&\cdots&0\\ 0&\lambda_{2}(L)&\cdots&0\\ \vdots&\vdots&\ddots&\vdots\\ 0&0&\cdots&\lambda_{n}(L)\end{bmatrix}=\begin{bmatrix}\begin{array}[]{c|c}0&\boldsymbol{0}^{T}_{n-1}\\ \hline\cr\boldsymbol{0}_{n-1}&\mathcal{R}\end{array}\end{bmatrix}, (20)

where (n1)×(n1)\mathcal{R}\in\mathbb{R}^{(n-1)\times(n-1)} is a diagonal matrix comprising non-zero eigenvalues of LL. Using (19), (18) can be rewritten as:

[e¯˙Pe~˙P]\displaystyle\begin{bmatrix}\dot{\bar{e}}_{P}\\ \dot{\tilde{e}}_{P}\end{bmatrix} =T1LT[e¯Pe~P]+βT1LT[z¯z~]+T1LT[d¯Pd~P],\displaystyle=-T^{-1}LT\begin{bmatrix}\bar{e}_{P}\\ \tilde{e}_{P}\end{bmatrix}+\beta T^{-1}LT\begin{bmatrix}\bar{z}\\ \tilde{z}\end{bmatrix}+T^{-1}LT\begin{bmatrix}\bar{d}_{P}\\ \tilde{d}_{P}\end{bmatrix}, (21a)
[z¯˙z~˙]\displaystyle\begin{bmatrix}\dot{\bar{z}}\\ \dot{\tilde{z}}\end{bmatrix} =βT1LT[e¯Pe~P]T1LT[z¯z~].\displaystyle=-\beta T^{-1}LT\begin{bmatrix}\bar{e}_{P}\\ \tilde{e}_{P}\end{bmatrix}-T^{-1}LT\begin{bmatrix}\bar{z}\\ \tilde{z}\end{bmatrix}. (21b)

Now, using (20), since e¯˙P=z¯˙=0\dot{\bar{e}}_{P}=\dot{\bar{z}}=0, (21) further reduces to

e~˙p\displaystyle\dot{\tilde{e}}_{p} =e~P+βz~+d~p\displaystyle=-\mathcal{R}\tilde{e}_{P}+\beta\mathcal{R}\tilde{z}+\mathcal{R}\tilde{d}_{p} (22a)
z~˙\displaystyle\dot{\tilde{z}} =βe~Pz~,\displaystyle=-\beta\mathcal{R}\tilde{e}_{P}-\mathcal{R}\tilde{z}, (22b)
which can be expressed in the compact form as:
ξ˙P=𝒦~ξP+D~P,\dot{\xi}_{P}=\tilde{\mathcal{K}}\xi_{P}+\tilde{D}_{P}, (23)

where ξP=[e~PT,z~T]T2(n1)\xi_{P}=[{\tilde{e}_{P}}^{T},\tilde{z}^{T}]^{T}\in\mathbb{R}^{2(n-1)}, D~P=[(d~p)T,𝟎n1T]T2(n1)\tilde{D}_{P}=[(\mathcal{R}\tilde{d}_{p})^{T},\boldsymbol{0}_{n-1}^{T}]^{T}\in\mathbb{R}^{2(n-1)} and

𝒦~=[ββ]=[1ββ1]=Φ~.\displaystyle\tilde{\mathcal{K}}=\begin{bmatrix}-\mathcal{R}&\beta\mathcal{R}\\ -\beta\mathcal{R}&-\mathcal{R}\end{bmatrix}=\begin{bmatrix}-1&\beta\\ -\beta&-1\end{bmatrix}\otimes\mathcal{R}=\tilde{\Phi}\otimes\mathcal{R}. (24)

Since λ(Φ~)=1±jcβ\lambda(\tilde{\Phi})=-1\pm j_{c}\beta and \mathcal{R} is a positive definite matrix by construction, 𝒦~\tilde{\mathcal{K}} is Hurwitz and has 2(n1)2(n-1) strictly negative eigenvalues in accordance with Lemma 4. We are now ready to state the following convergence result, solving Problem (P2):

Theorem 2 (Power-sharing control in presence of attack).

Consider the system (18) where the power attack signal dP𝟎nd_{P}\neq\boldsymbol{0}_{n} satisfies Assumption 1. Then, for a sufficiently large value of β\beta, the vector mPPm_{P}P remains in a small neighborhood of its nominal value while sharing proportional active power, i.e., mPPΔP𝟏nϵP\|m_{P}P-\Delta_{P}\boldsymbol{1}_{n}\|\leq\epsilon_{P} for some small ϵP\epsilon_{P}.

Proof.

The solution of (23) is given by ξP(t)=e𝒦~tξP(0)+0te𝒦~(tτ)D~p𝑑τ\xi_{P}(t)={\rm e}^{\tilde{\mathcal{K}}t}\xi_{P}(0)+\int_{0}^{t}{\rm e}^{\tilde{\mathcal{K}}(t-\tau)}\tilde{D}_{p}d\tau. Upon taking norm on both sides and following similar steps as in the proof of Theorem 1, one can obtain limtξP(t)𝒦~1D^P\lim_{t\to\infty}\|\xi_{P}(t)\|\leq\|\tilde{\mathcal{K}}^{-1}\hat{D}_{P}\|, where D^P=[(d^P)T,𝟎n1T]T2(n1)\hat{D}_{P}=[(\mathcal{R}\hat{d}_{P})^{T},\boldsymbol{0}_{n-1}^{T}]^{T}\in\mathbb{R}^{2(n-1)} for some time-independent vector d^Pn1\hat{d}_{P}\in\mathbb{R}^{n-1} satisfying d^PD¯P\|\hat{d}_{P}\|\leq\bar{D}_{P} (see Assumption 1 for D¯P\bar{D}_{P}) such that 0te𝒦~(tτ)D~p(τ)𝑑τ0te𝒦~(tτ)D^P𝑑τ\|\int_{0}^{t}{\rm e}^{\tilde{\mathcal{K}}(t-\tau)}\tilde{D}_{p}(\tau)d\tau\|\leq\|\int_{0}^{t}{\rm e}^{\tilde{\mathcal{K}}(t-\tau)}\hat{D}_{P}d\tau\|, according to Lemma 2 from Subsection I-A. Now, similar to (15), it can be concluded that

limt[e~P(t)z~(t)]λmax()[(+β2)1β(+β2)1]D¯P.\lim_{t\to\infty}\left\|\begin{bmatrix}\tilde{e}_{P}(t)\\ \tilde{z}(t)\end{bmatrix}\right\|\leq\lambda_{\max}(\mathcal{R})\left\|\begin{bmatrix}(\mathcal{R}+{\beta}^{2}\mathcal{R})^{-1}\\ \beta(\mathcal{R}+{\beta}^{2}\mathcal{R})^{-1}\end{bmatrix}\right\|\bar{D}_{P}. (25)

Now, exploiting Lemma 6 by replacing AA by \mathcal{R}, it can be obtained that

limt[e~P(t)z~(t)]λmax()D¯Pλmin()1+β2=λmax(L)D¯Pλ2(L)1+β2,\lim_{t\to\infty}\left\|\begin{bmatrix}\tilde{e}_{P}(t)\\ \tilde{z}(t)\end{bmatrix}\right\|\leq\frac{\lambda_{\max}(\mathcal{R})\bar{D}_{P}}{\lambda_{\min}(\mathcal{R})\sqrt{1+\beta^{2}}}=\frac{\lambda_{\max}(L)\bar{D}_{P}}{\lambda_{2}(L)\sqrt{1+\beta^{2}}}, (26)

since λmax()=λmax(L)\lambda_{\max}(\mathcal{R})=\lambda_{\max}(L) and λmin()=λ2(L)\lambda_{\min}(\mathcal{R})=\lambda_{2}(L) by construction, where λ2(L)\lambda_{2}(L) is the Fielder eigenvalue of the Laplacian LL. From (26), it can be concluded that e~P(t)ϵP\|\tilde{e}_{P}(t)\|\leq\epsilon_{P} (and hence, eP(t)ϵP\|{e}_{P}(t)\|\leq\epsilon_{P}) as tt\to\infty, where ϵP=λmax(L)D¯Pλ2(L)1+β2\epsilon_{P}=\frac{\lambda_{\max}(L)\bar{D}_{P}}{\lambda_{2}(L)\sqrt{1+\beta^{2}}}. Furthermore, for sufficiently large values of gain β\beta, ϵP\epsilon_{P} assumes small value, and hence, mPPm_{P}P converges to a small neighborhood around ΔP𝟏n\Delta_{P}\boldsymbol{1}_{n} as tt\to\infty, using (17). ∎

V Attack Detection: Exploring Interaction Between Control and Auxiliary Layers

Addressing Problem (P3), this section proposes an attack detection method relying on the interaction between the control layer Σ\Sigma and auxiliary layer Π\Pi in Fig. 1. For brevity and clarity, we provide a discussion for the frequency attacks dωd_{\omega} affecting dynamics SωS_{\omega} in (5). However, it is equally applicable to the power attacks dPd_{P} appearing in the dynamics SPS_{P}.

Refer to caption
Figure 2: Information flow due to interaction network (βA\beta A) between control (Σ\Sigma) and auxiliary (Π\Pi) layers.

Since the layer Σ\Sigma is vulnerable to attacks injected by the attacker as compared to the secured and hidden layer Π\Pi, one can exploit the layer Π\Pi to check the authenticity of the information shared between two nodes in the layer Σ\Sigma. As shown in Fig. 1, the layer Π\Pi contains a set of (virtual) nodes, directly associated with individual (actual) nodes in the layer Σ\Sigma. Consequently, the ithi^{\text{th}} node in Σ\Sigma has state information ziz_{i} of the associated node in Π\Pi and similarly the ithi^{\text{th}} node in Π\Pi has information ωi\omega_{i} of the associated node in Σ\Sigma. Further, both the layers are connected to each other via interconnection matrices βA\beta A. With respect to the ithi^{\text{th}} node, (6) can be rewritten, by segregating terms on the basis of the contributions by the ithi^{\text{th}} node itself and the neighboring nodes in both Σ\Sigma and Π\Pi layers, as follows [30]:

ω˙i\displaystyle\dot{\omega}_{i} =A[i]ωβ(|𝒩i|+gi)zi+j𝒩iβzj+giω+L[i]dω\displaystyle=A_{[i]}\omega-\beta(|\mathcal{N}_{i}|+g_{i})z_{i}+\sum_{j\in\mathcal{N}_{i}}\beta z_{j}+g_{i}{\omega}^{*}+L_{[i]}d_{\omega} (27a)
z˙i\displaystyle\dot{z}_{i} =(|𝒩i|+gi)zi+β(|𝒩i|+gi)ωi+j𝒩i(zjβωj)\displaystyle=-(|\mathcal{N}_{i}|+g_{i})z_{i}+\beta(|\mathcal{N}_{i}|+g_{i})\omega_{i}+\sum_{j\in\mathcal{N}_{i}}(z_{j}-\beta{\omega}_{j})
βgiω,\displaystyle\qquad-\beta g_{i}{\omega}^{*}, (27b)

where A[i],L[i]A_{[i]},L_{[i]} denote the ithi^{\text{th}} row of matrices AA and LL, respectively. Further, gi=1g_{i}=1 if the node ii is the leader, else gi=0g_{i}=0. The following observations are straightforward toward practical implementation of (27):

  • In (27a), the ithi^{\text{th}} node in Σ\Sigma has access to the information βzj\beta z_{j} of the neighboring nodes in Π\Pi via its corresponding ithi^{\text{th}} node in Π\Pi, shared through the interaction network between Σ\Sigma and Π\Pi, as shown in Fig. 2(a). The implementation of remaining terms in (27a) is straightforward.

  • Analogously, in (27b), the ithi^{\text{th}} node in Π\Pi has information zjβωjz_{j}-\beta\omega_{j} from the neighboring nodes in Π\Pi itself where the information βωj-\beta\omega_{j} is shared through the interaction between the two layers, as shown Fig. 2(b). Again, the implementation of the remaining terms in (27b) is straightforward.

From the above discussion, it is clear that the ithi^{\text{th}} node in Σ\Sigma has access to the following two pieces of additional information due to the interaction between Σ\Sigma and Π\Pi:

z¯ij=βzj,ω¯ij=zjβωj,\displaystyle\bar{z}_{ij}=\beta z_{j},\qquad\bar{\omega}_{ij}=z_{j}-\beta{\omega}_{j}, (28)

where notations ω¯ij\bar{\omega}_{ij} and z¯ij\bar{z}_{ij} are used to emphasize that these signals contain information about the neighboring nodes jj in Π\Pi. According to (28), the ithi^{\text{th}} node estimates the frequency received from the jthj^{\text{th}} node in Π\Pi as:

ω^ij=1β[z¯ijβω¯ij],\hat{\omega}_{ij}=\frac{1}{\beta}\left[\frac{\bar{z}_{ij}}{\beta}-\bar{\omega}_{ij}\right], (29)

which can be compared with the actual frequency signal ωˇij\check{\omega}_{ij} in (3) received at the ithi^{\text{th}} node to testify whether the communication link (i,j)(i,j)\in\mathcal{E} in Σ\Sigma is under attack or not. Consequently, if ω^ijωˇij\hat{\omega}_{ij}\neq\check{\omega}_{ij}, the corresponding (i,j)th(i,j)^{\text{th}} link is declared to be under attack. Once the corrupted communication link is identified, it can be isolated (provided the remaining network contains a spanning tree) from the rest of the control layer till the time attack remains prevalent in the network.

Remark 2.

It is essential to emphasize that the attack detection approach described above is a byproduct of the interaction between Σ\Sigma and Π\Pi. It can be employed if there is a specific need to isolate any corrupted link, thereby enhancing the accuracy of the steady-state behavior. However, it’s crucial to note that the isolation of any link is not mandatory for the proper functioning of the proposed resilient controllers (6) and (16) for some finite ϵω\epsilon_{\omega} and ϵP\epsilon_{P}. Moreover, the isolation between the layers Σ\Sigma and Π\Pi can be ensured using contemporary communication network slicing approaches, such as cloud computing management and software-defined networking [31, 32]. These advanced techniques provide effective mechanisms for segregating communication channels and ensuring the secure operation of the system.

Refer to caption
Figure 3: The test islanded AC microgrid under consideration.
TABLE I: System Parameters
Parameter Value
Droop gain (mP1,mP2m_{P_{1}},m_{P_{2}}) 2×1032\times 10^{-3}
Droop gain (mP3,mP4m_{P_{3}},m_{P_{4}}) 3×1033\times 10^{-3}
Filter inductance (LfL_{f}) 1.351.35 mH
Filter capacitance (CfC_{f}) 5050μ\muF
Coupling inductance (LcL_{c}) 0.350.35 mH
Line impedance (Z1,Z2\rm{Z_{1}},\rm{Z_{2}}) R=1.2ΩR=1.2\Omega, L=L=12mH
Line impedance (Z3,Z4\rm{Z_{3}},\rm{Z_{4}}) R=1ΩR=1\Omega, L=L=10mH
Line impedance (Z5,Z6\rm{Z_{5}},\rm{Z_{6}}) R=0.8ΩR=0.8\Omega, L=L=8mH
Line impedance (Z7,Z8\rm{Z_{7}},\rm{Z_{8}}) R=0.5ΩR=0.5\Omega, L=L=5mH
Loads (L1,L3,L5\rm{L_{1},L_{3},L_{5}}) P=7P=7 kW, Q=4Q=4 kVar
Loads (L2,L4\rm{L_{2},L_{4}}) P=10P=10 kW, Q=5Q=5 kVar

VI Simulation Case Studies

Consider a 3-phase, 415 V islanded AC microgrid as shown in Fig. 3, which comprises 44 DGs, connected through 88 transmission lines and 55 loads, whose values are as listed in Table I. The DGs are connected as per the undirected and connected communication topology, as shown in Fig. 3, which has the following Laplacian:

L=[2101121001211012].L=\begin{bmatrix}2&-1&0&-1\\ -1&2&-1&0\\ 0&-1&2&-1\\ -1&0&-1&2\end{bmatrix}.

Assume that DG 11 acts as the leader and has access to reference frequency ω=314\omega^{*}=314 rad/s (f=ω/2π=50f^{*}=\omega^{*}/2\pi=50 Hz), with all the remaining DGs acting as fully connected followers. Therefore, the pinning gain g1=1g_{1}=1 and gi=0g_{i}=0 for i=2,3,4i=2,3,4. Associated with each DG, there exist control and auxiliary nodes in the layers Σ\Sigma and Π\Pi, respectively. Consequently, the matrices A,B,CA,B,C in (6) can be obtained as

A=[3101121001211012],B=[1000],C=A𝟏n=[1000].A=\begin{bmatrix}-3&1&0&1\\ 1&-2&1&0\\ 0&1&-2&1\\ 1&0&1&-2\end{bmatrix},\ B=\begin{bmatrix}1\\ 0\\ 0\\ 0\end{bmatrix},\ C=A\boldsymbol{1}_{n}=\begin{bmatrix}-1\\ 0\\ 0\\ 0\end{bmatrix}.

According to Lemma 5 and Lemma 7, one can easily verify that, in the absence of any attack, the frequencies of all the DGs converge to 314314 rad/s, while DGs 1, 2 and DGs 3, 4 share equal active power as per their equal droop coefficients. We now analyze protocols (6) and (16) in case of an attack as discussed below.

Refer to caption
Figure 4: DG frequency under attack and absence of Π\Pi layer.
Refer to caption
Figure 5: DG active power under attack and absence of Π\Pi layer.
Refer to caption
Figure 6: DG frequency under attack and presence of Π\Pi layer.
Refer to caption
Figure 7: DG active power under attack and presence of Π\Pi layer.

VI-A Controller performance under attacked condition

According to Assumption 1, we consider that the frequency and power attacks are governed by the dynamics:

d˙ω=Fωdω+Gωω,\dot{d}_{\omega}=F_{\omega}d_{\omega}+G_{\omega}\omega, (30)

where

Fω=[5000030000500003],F_{\omega}=\begin{bmatrix}-5&0&0&0\\ 0&-3&0&0\\ 0&0&-5&0\\ 0&0&0&-3\end{bmatrix},
Gω=[0.0010.0020.0030.0040.0030.0010.0040.0020.0040.0030.0020.0010.0020.0040.0010.003].G_{\omega}=\begin{bmatrix}-0.001&-0.002&-0.003&-0.004\\ -0.003&-0.001&-0.004&-0.002\\ 0.004&0.003&0.002&0.001\\ 0.002&0.004&0.001&0.003\end{bmatrix}.

and

d˙P=FpdP+GP(mPP),\dot{d}_{P}=F_{p}d_{P}+G_{P}(m_{P}P), (31)

where

FP=[2.50000300002.500003],F_{P}=\begin{bmatrix}-2.5&0&0&0\\ 0&-3&0&0\\ 0&0&-2.5&0\\ 0&0&0&-3\end{bmatrix},
GP=[0.0350.0360.0370.0380.0880.0850.0860.0870.0370.0380.0350.0360.0860.0870.0880.085].G_{P}=\begin{bmatrix}-0.035&-0.036&-0.037&-0.038\\ -0.088&-0.085&-0.086&-0.087\\ 0.037&0.038&0.035&0.036\\ 0.086&0.087&0.088&0.085\end{bmatrix}.

Please note that these frequency and power attacks (30) and (31) are completely unknown to the controller and are initialized in the system as injections by the attacker at a given time. To emphasize the importance of introducing an auxiliary layer in the distributed control framework, we now discuss the performance of proposed controllers in the absence and presence of Π\Pi, followed by the effect of load perturbations.

Refer to caption
Figure 8: DG frequency under attack and load perturbation.
Refer to caption
Figure 9: DG active power under attack and load perturbation.
Refer to caption
Figure 10: Plot of frequency attack dωd_{\omega} components with time.
Refer to caption
Figure 11: Plot of power attack dPd_{P} components with time.

VI-A1 Absence of auxiliary layer

We first illustrate the test system in the presence of cyber-attacks and the absence of an auxiliary layer (and hence, the auxiliary nodes) from the frequency and power controllers (6) and (16), respectively.

Initially, in the absence of an attack, the microgrid is operating normally under controllers (6a) and (16a), at 314314 rad/s with DGs 1, 2 and 3, 4 delivering equal power at 6.76.7 kW and 4.54.5 kW, respectively, as shown in Figs. 4 and 5 for the initial 10 s. The frequency and power attacks in (30) and (31) are initialized at t=10t=10 s and t=30t=30 s, causing the frequency of all the DGs to deviate by about 1919 rad/s from the nominal value at 10 s and settle down to a common steady-state value of 295295 rad/s due to the distributed action of nodes in the control layer, which is further shifted to 298298 rad/s post introduction of power attack at t=30t=30 s. Similarly, the active power-sharing is also adversely affected, as depicted by Fig. 5.

VI-A2 Presence of auxiliary layer

We now simulate the test microgrid in the presence of auxiliary layer in (6) and (16), where the initial states z(0)z(0) of the auxiliary nodes are randomly chosen and gain β=2\beta=2. As shown in Fig. 6, frequencies are restored in the neighborhood of 314314 rad/s in about 55 s, post attacks (30) and (31), introduced at t=10t=10 s and t=30t=30 s, respectively. Similarly, Fig. 7 shows that power-sharing is also maintained for DGs 1, 2 and 3, 4 in the neighborhood of their nominal values, after a slight deviation at t=10t=10 s and t=30t=30 s, which lasts approximately about 1.51.5 s.

VI-A3 Effect of load perturbations

In addition to the resiliency against frequency and power attacks, we also verify the robustness of proposed controllers (6) and (16) against abrupt load deviations. For illustration, we consider here that the frequency and power attacks are initiated at t=10t=10 s and t=50t=50 s with different (initial) values for each communication link, given by, dω(t=10s)=[4.5,2.5,4,2]Td_{\omega}(t=10~{}{\rm s})=[4.5,2.5,-4,-2]^{T} and dP(t=50s)=[4,2.5,3,1.5]Td_{P}(t=50~{}{\rm s})=[-4,-2.5,3,1.5]^{T}, respectively. Further, the loads L2,L4\rm{L_{2},L_{4}} are increased by 0.50.5 times their initial magnitude at t=30t=30 s and then decreased by the same amount at t=70t=70 s, respectively. Fig. 8 depicts that the proposed resilient control scheme restores the DG frequencies to their nominal value within a span of 1010 s. Similarly, Fig. 9 illustrates accurate power-sharing post load perturbation, with DGs 1, 2 now sharing 88 kW and DGs 3, 4 sharing 5.45.4 kW, respectively. The plots for dωd_{\omega} and dPd_{P} are shown in Figs. 10 and 11, respectively, where the attacks converge to different steady-state values. Note that the term GωωG_{\omega}\omega in (30) is of the order of 10310^{-3} and is dominated by the first term FωdωF_{\omega}d_{\omega}, the plot for dωd_{\omega} does not show noticeable fluctuations with load perturbations, as compared to dPd_{P}.

VI-B Attack Detection

Refer to caption
(a) During attack
Refer to caption
(b) After attack
Figure 12: Communication topology before and after attack isolation. Topology (b) also contains a spanning tree.
Refer to caption
Figure 13: Plot of dω4d_{\omega_{4}} with time.
Refer to caption
Figure 14: Attack detection at t=10t=10 s as ωˇ14ω^14\check{\omega}_{14}\neq\hat{\omega}_{14}.
Refer to caption
Figure 15: DG frequency with topology in Fig. 12(a).
Refer to caption
Figure 16: DG active power with topology in Fig. 12(b).

To illustrate this, we consider the following scenario wherein the communication link between DG 1 and DG 4 is under attack dω4d_{\omega_{4}}\in\mathbb{R} as shown in Fig. 12(a), which is initialized at t=10t=10 s with an initial magnitude of 2-2 rad/s as shown in Fig. 13, with all the other attack components being 0. Due to this, a corrupted frequency signal ωˇ14=ω4+dω4\check{\omega}_{14}=\omega_{4}+d_{\omega_{4}} (please refer to (3)) is sent from node 44 to node 11 in the control layer Σ\Sigma. However, DGs 11 and 44 share an additional information through the auxiliary layer Π\Pi according to (28), and is given by z¯14=βz4,ω¯14=z4βω4\bar{z}_{14}=\beta z_{4},\ \bar{\omega}_{14}=z_{4}-\beta{\omega}_{4}, using which, the estimated frequency signal at node 1, due to an attack on node 4, can be calculated using (29) as ω^14=1β(z¯14βω¯14)\hat{\omega}_{14}=\frac{1}{\beta}(\frac{\bar{z}_{14}}{\beta}-\bar{\omega}_{14}).

Fig. 14 shows the plot of actual ωˇ14\check{\omega}_{14} and estimated frequency signal ω^14\hat{\omega}_{14} with time. Clearly, ωˇ14ω^14\check{\omega}_{14}\neq\hat{\omega}_{14} after t=10t=10 s, and hence, an attack is detected on the communication link connecting nodes 1 and 4. This attack can be isolated by removing the edge (1,4)(1,4)\in\mathcal{E} provided the remaining network is connected, that is, the isolated network contains at least one spanning tree. As shown in Fig. 12(b), since the microgrid system remains connected even after isolation of the corrupted communication link, it operates normally likewise in subsection VI-A; please refer to Figs. 15 and 16 for frequency restoration and power-sharing in this situation. Here, the load perturbations are introduced with the same magnitude and at similar time instants as in the previous subsection.

VII Conclusion

Relying on an auxiliary layer-based design, we investigated an attack-resilient distributed control mechanism for achieving frequency regulation and active power-sharing in an islanded AC microgrid network. One of the main features of our approach is that it not only guarantees the resiliency against simultaneous frequency and power attacks but also, devises an attack detection mechanism as a byproduct, leveraging the interaction between the control and auxiliary layers. The frequency and power controllers were formulated as leader-follower and leaderless multi-agent systems, respectively, accompanied by suitable auxiliary-state dynamics. Under (standard) assumptions on frequency and power attacks, it was shown that the proposed approach assures the frequency restoration and active power-sharing in the small neighborhood of their steady-state values in the presence of any attack. It was proved that these bounds depend on the underlying network topology, the magnitude of the attack signal, and the pinning and control gains decided by the designer. Extensive simulation results were provided to illustrate and verify the theoretical developments in the paper, followed by a simulation demonstrating attack detection and isolation provided the resulting network is connected.

It would be interesting in future work to extend the analysis to a resilient finite-time distributed framework as the power systems are expected to respond in a certain time to avoid any serious damage.

References

  • [1] Q. Zhou, M. Shahidehpour, A. Paaso, S. Bahramirad, A. Alabdulwahab, and A. Abusorrah, “Distributed control and communication strategies in networked microgrids,” IEEE Communications Surveys & Tutorials, vol. 22, no. 4, pp. 2586–2633, 2020.
  • [2] C. Peng, H. Sun, M. Yang, and Y.-L. Wang, “A survey on security communication and control for smart grids under malicious cyber attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 8, pp. 1554–1569, 2019.
  • [3] H. T. Reda, A. Anwar, and A. Mahmood, “Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts,” Renewable and Sustainable Energy Reviews, vol. 163, p. 112423, 2022.
  • [4] R. Lu, J. Wang, and Z. Wang, “Distributed observer-based finite-time control of ac microgrid under attack,” IEEE Transactions on Smart Grid, vol. 12, no. 1, pp. 157–168, 2020.
  • [5] Y. Wang, S. Mondal, C. Deng, K. Satpathi, Y. Xu, and S. Dasgupta, “Cyber-resilient cooperative control of bidirectional interlinking converters in networked ac/dc microgrids,” IEEE Transactions on Industrial Electronics, vol. 68, no. 10, pp. 9707–9718, 2020.
  • [6] M. S. Sadabadi, S. Sahoo, and F. Blaabjerg, “A fully resilient cyber-secure synchronization strategy for ac microgrids,” IEEE Transactions on Power Electronics, vol. 36, no. 12, pp. 13 372–13 378, 2021.
  • [7] J. Xiao, L. Wang, Z. Qin, and P. Bauer, “A resilience enhanced secondary control for ac micro-grids,” IEEE Transactions on Smart Grid, 2023.
  • [8] A. Intriago, F. Liberati, N. D. Hatziargyriou, and C. Konstantinou, “Residual-based detection of attacks in cyber-physical inverter-based microgrids,” IEEE Transactions on Power Systems, 2023.
  • [9] S. Madichetty and S. Mishra, “Cyber attack detection and correction mechanisms in a distributed dc microgrid,” IEEE Transactions on Power Electronics, vol. 37, no. 2, pp. 1476–1485, 2021.
  • [10] M. Liu, C. Zhao, J. Xia, R. Deng, P. Cheng, and J. Chen, “Pddl: Proactive distributed detection and localization against stealthy deception attacks in dc microgrids,” IEEE Transactions on Smart Grid, vol. 14, no. 1, pp. 714–731, 2022.
  • [11] Y. Wan and T. Dragičević, “Data-driven cyber-attack detection of intelligent attacks in islanded dc microgrids,” IEEE Transactions on Industrial Electronics, vol. 70, no. 4, pp. 4293–4299, 2022.
  • [12] A. Takiddin, S. Rath, M. Ismail, and S. Sahoo, “Data-driven detection of stealth cyber-attacks in dc microgrids,” IEEE Systems Journal, vol. 16, no. 4, pp. 6097–6106, 2022.
  • [13] K. Zhang, C. Keliris, T. Parisini, and M. M. Polycarpou, “Stealthy integrity attacks for a class of nonlinear cyber-physical systems,” IEEE Transactions on Automatic Control, vol. 67, no. 12, pp. 6723–6730, 2021.
  • [14] L.-Y. Lu, J.-H. Liu, S.-W. Lin, and C.-C. Chu, “Concurrent cyber deception attack detection of consensus control in isolated ac microgrids,” IEEE Transactions on Industry Applications, 2023.
  • [15] A. Mustafa and H. Modares, “Attack analysis and resilient control design for discrete-time distributed multi-agent systems,” IEEE Robotics and Automation Letters, vol. 5, no. 2, pp. 369–376, 2019.
  • [16] A. Gusrialdi, Z. Qu, and M. A. Simaan, “Competitive interaction design of cooperative systems against attacks,” IEEE Transactions on Automatic Control, vol. 63, no. 9, pp. 3159–3166, 2018.
  • [17] Y. Chen, D. Qi, H. Dong, C. Li, Z. Li, and J. Zhang, “A fdi attack-resilient distributed secondary control strategy for islanded microgrids,” IEEE Transactions on Smart Grid, vol. 12, no. 3, pp. 1929–1938, 2020.
  • [18] Q. Zhou, M. Shahidehpour, A. Alabdulwahab, A. Abusorrah, L. Che, and X. Liu, “Cross-layer distributed control strategy for cyber resilient microgrids,” IEEE Transactions on Smart Grid, vol. 12, no. 5, pp. 3705–3717, 2021.
  • [19] Y. Liu, Y. Li, Y. Wang, X. Zhang, H. B. Gooi, and H. Xin, “Robust and resilient distributed optimal frequency control for microgrids against cyber attacks,” IEEE Transactions on Industrial Informatics, vol. 18, no. 1, pp. 375–386, 2021.
  • [20] M. Jamali, M. S. Sadabadi, M. Davari, S. Sahoo, and F. Blaabjerg, “Resilient cooperative secondary control of islanded ac microgrids utilizing inverter-based resources against state-dependent false data injection attacks,” IEEE Transactions on Industrial Electronics, 2023.
  • [21] J. M. Guerrero, J. C. Vasquez, J. Matas, L. G. De Vicuña, and M. Castilla, “Hierarchical control of droop-controlled AC and DC microgrids—a general approach toward standardization,” IEEE Transactions on industrial electronics, vol. 58, no. 1, pp. 158–172, 2010.
  • [22] L. Wang and F. Xiao, “Finite-time consensus problems for networks of dynamic agents,” IEEE Transactions on Automatic Control, vol. 55, no. 4, pp. 950–955, 2010.
  • [23] V. Vaishnav, D. Sharma, and A. Jain, “Quadratic-droop-based distributed secondary control of microgrid with detail-balanced communication topology,” IEEE Systems Journal, 2023.
  • [24] H. Dong, C. Li, and Y. Zhang, “Resilient consensus of multi-agent systems against malicious data injections,” Journal of the Franklin Institute, vol. 357, no. 4, pp. 2217–2231, 2020.
  • [25] J. Guerrero, L. G. de Vicuna, J. Matas, M. Castilla, and J. Miret, “Output impedance design of parallel-connected ups inverters with wireless load-sharing control,” IEEE Transactions on Industrial Electronics, vol. 52, no. 4, pp. 1126–1135, 2005.
  • [26] R. A. Horn and C. R. Johnson, Topics in matrix analysis.   Cambridge university press, 1991.
  • [27] P. Lancaster and H. K. C. R. Farahat, “Norms on direct sums and tensor products,” mathematics of computation, vol. 26, no. 118, pp. 401–414, 1972.
  • [28] R. A. Horn and C. R. Johnson, Matrix analysis.   Cambridge university press, 2012.
  • [29] H. K. Khalil, “Nonlinear systems third edition,” Patience Hall, vol. 115, 2002.
  • [30] A. Gusrialdi and Z. Qu, “Cooperative systems in presence of cyber-attacks: a unified framework for resilient control and attack identification,” in 2022 American Control Conference (ACC).   IEEE, 2022, pp. 330–335.
  • [31] P. Danzi, M. Angjelichinoski, C. Stefanovic, T. Dragicevic, and P. Popovski, “Software-defined microgrid control for resilience against denial-of-service attacks,” IEEE Transactions on Smart Grid, vol. 10, no. 5, pp. 5258–5268, 2019.
  • [32] S. Zhang, “An overview of network slicing for 5g,” IEEE Wireless Communications, vol. 26, no. 3, pp. 111–117, 2019.