-
Graph Neural Network Framework for Security Assessment Informed by Topological Measures
Authors:
Mojtaba Dezvarei,
Kevin Tomsovic,
Jinyuan Stella Sun,
Seddik M. Djouadi
Abstract:
In the power system, security assessment (SA) plays a pivotal role in determining the safe operation in a normal situation and some contingencies scenarios. Electrical variables as input variables of the model are mainly considered to indicate the power system operation as secure or insecure, according to the reliability criteria for contingency scenarios. In this approach, the features are in gri…
▽ More
In the power system, security assessment (SA) plays a pivotal role in determining the safe operation in a normal situation and some contingencies scenarios. Electrical variables as input variables of the model are mainly considered to indicate the power system operation as secure or insecure, according to the reliability criteria for contingency scenarios. In this approach, the features are in grid format data, where the relation between features and any knowledge of network topology is absent. Moreover, the traditional and common models, such as neural networks (NN), are not applicable if the input variables are in the graph format structure. Therefore, this paper examines the security analysis in the graph neural network (GNN) framework such that the GNN model incorporates the network connection and node's neighbors' influence for the assessment. Here the input features are separated graphs representing different network conditions in electrical and structural statuses. Topological characteristics defined by network centrality measures are added in the feature vector representing the structural properties of the network. The proposed model is simulated in the IEEE 118-Bus system for the voltage static security assessment (SSA). The performance indices validate the efficiency of the GNN-based model compared to the traditional NN model denoting that the information enclosed in graph data boosts the classifier performance since the GNN model benefits the neighbors' features. Moreover, outperforming of GNN-based model is determined when robustness and sensitivity analyzes are carried out. The proposed method is not limited to a specific task and can be extended for other security assessments with different critical variables, such as dynamic analysis and frequency criteria, respectively.
△ Less
Submitted 30 January, 2023;
originally announced January 2023.
-
A Novel Framework for Decentralized Dynamic Resource Allocation Using Voronoi Tessellations
Authors:
Bhagyashri Telsang,
Seddik Djouadi
Abstract:
In this work, we approach the problem of resource allocation in a team of agents through the framework of Centroidal Voronoi Tessellations. CVTs provide a natural way to embed a desired global trend in the team through probability distributions, and in one-dimensional spaces, CVTs offer an inherent line structure allowing for a simple communication graph and scalability. We first consider the amou…
▽ More
In this work, we approach the problem of resource allocation in a team of agents through the framework of Centroidal Voronoi Tessellations. CVTs provide a natural way to embed a desired global trend in the team through probability distributions, and in one-dimensional spaces, CVTs offer an inherent line structure allowing for a simple communication graph and scalability. We first consider the amount of resource to be allocated to be a constant and provide an analytical solution to such static resource allocation problem by embedding the allocation constraint within the distribution through a system of nonlinear equations. Using the solution of such a constrained CVT minimization problem as an initialization step, we propose a decentralized dynamic resource allocation solution that employs a one-step update when the desired distribution is Gaussian. We introduce a "civility model" for negotiations between the agents to allow for flexibility in local preferences and maintaining robustness against local disturbances. We demonstrate the effectiveness of the proposed method by considering the application of demand-response in smart grids through the problem of power allocation in a group of building thermal loads.
△ Less
Submitted 30 November, 2022;
originally announced December 2022.
-
Exploring Physical-Based Constraints in Short-Term Load Forecasting: A Defense Mechanism Against Cyberattack
Authors:
Mojtaba Dezvarei,
Kevin Tomsovic,
Jinyuan Stella Sun,
Seddik M. Djouadi
Abstract:
Short-term load forecasting is an essential task that supports utilities to schedule generating sufficient power for balancing supply and demand, and can become an attractive target for cyber attacks. It has been shown that the power system state estimation is vulnerable to false data injection attacks. Similarly, false data injection on input variables can result in large forecast errors. The loa…
▽ More
Short-term load forecasting is an essential task that supports utilities to schedule generating sufficient power for balancing supply and demand, and can become an attractive target for cyber attacks. It has been shown that the power system state estimation is vulnerable to false data injection attacks. Similarly, false data injection on input variables can result in large forecast errors. The load forecasting system should have a protective mechanism to mitigate such attacks. One approach is to model physical system constraints that would identify anomalies. This study investigates possible constraints associated with a load forecasting application. Looking at regional forecasted loads, we analyze the relation between each zone through similarity measures used in time series in order to identify constraints. Comprehensive results for historical ERCOT load data indicate variation in the measures recognizing the existence of malicious action. Still, these static measures can not be considered an efficient index across different scenarios.
△ Less
Submitted 7 March, 2022;
originally announced March 2022.
-
Toward simple "in silico" experiments for drugs administration in some cancer treatments
Authors:
Michel Fliess,
Cédric Join,
Kaouther Moussa,
Seddik M. Djouadi,
Mohamed W. Alsager
Abstract:
We present some "in silico" experiments to design combined chemo- and immunotherapy treatment schedules. We introduce a new framework by combining flatness-based control, which is a model-based setting, along with model-free control. The flatness property of the used mathematical model yields straightforward reference trajectories. They provide us with the nominal open-loop control inputs. Closing…
▽ More
We present some "in silico" experiments to design combined chemo- and immunotherapy treatment schedules. We introduce a new framework by combining flatness-based control, which is a model-based setting, along with model-free control. The flatness property of the used mathematical model yields straightforward reference trajectories. They provide us with the nominal open-loop control inputs. Closing the loop via model-free control allows to deal with the uncertainties on the injected drug doses. Several numerical simulations illustrating different case studies are displayed. We show in particular that the considered health indicators are driven to the safe region, even for critical initial conditions. Furthermore, in some specific cases there is no need to inject chemotherapeutic agents.
△ Less
Submitted 6 August, 2021; v1 submitted 27 July, 2021;
originally announced July 2021.
-
Numerical Evaluation of Exact Person-by-Person Optimal Nonlinear Control Strategies of the Witsenhausen Counterexample
Authors:
Bhagyashri Telsang,
Seddik Djouadi,
Charalambos D. Charalambous
Abstract:
Witsenhausen's 1968 counterexmaple is a simple two-stage decentralized stochastic control problem that highlighted the difficulties of sequential decision problems with non-classical information structures. Despite extensive prior efforts, what is known currently, is the exact Person-by-Person (PbP) optimal nonlinear strategies, which satisfy two nonlinear integral equations, announced in 2014, an…
▽ More
Witsenhausen's 1968 counterexmaple is a simple two-stage decentralized stochastic control problem that highlighted the difficulties of sequential decision problems with non-classical information structures. Despite extensive prior efforts, what is known currently, is the exact Person-by-Person (PbP) optimal nonlinear strategies, which satisfy two nonlinear integral equations, announced in 2014, and obtained using Girsanov's change of measure transformations. In this paper, we provide numerical solutions to the two exact nonlinear PbP optimal control strategies, using the Gauss Hermite Quadrature to approximate the integrals and then solve a system of non-linear equations to compute the signaling levels. Further, we analyse and compare our numerical results to existing results previously reported in the literature.
△ Less
Submitted 28 September, 2020;
originally announced September 2020.
-
Review on Set-Theoretic Methods for Safety Verification and Control of Power System
Authors:
Yichen Zhang,
Yan Li,
Kevin Tomsovic,
Seddik Djouadi,
Meng Yue
Abstract:
Increasing penetration of renewable energy introduces significant uncertainty into power systems. Traditional simulation-based verification methods may not be applicable due to the unknown-but-bounded feature of the uncertainty sets. Emerging set-theoretic methods have been intensively investigated to tackle this challenge. The paper comprehensively reviews these methods categorized by underlying…
▽ More
Increasing penetration of renewable energy introduces significant uncertainty into power systems. Traditional simulation-based verification methods may not be applicable due to the unknown-but-bounded feature of the uncertainty sets. Emerging set-theoretic methods have been intensively investigated to tackle this challenge. The paper comprehensively reviews these methods categorized by underlying mathematical principles, that is, set operation-based methods and passivity-based methods. Set operation-based methods are more computationally efficient, while passivity-based methods provide semi-analytical expression of reachable sets, which can be readily employed for control. Other features between different methods are also discussed and illustrated by numerical examples. A benchmark example is presented and solved by different methods to verify consistency.
△ Less
Submitted 21 February, 2020; v1 submitted 31 December, 2019;
originally announced January 2020.
-
Privacy-Preserving Aggregation of Controllable Loads to Compensate Fluctuations in Solar Power
Authors:
Jin Dong,
Teja Kuruganti,
Seddik Djouadi,
Mohammed Olama,
Yaosuo Xue
Abstract:
Cybersecurity and privacy are of the utmost importance for safe, reliable operation of the electric grid. It is well known that the increased connectivity/interoperability between all stakeholders (e.g., utilities, suppliers, and consumers) will enable personal information collection. Significant advanced metering infrastructure (AMI) deployment and demand response (DR) programs across the country…
▽ More
Cybersecurity and privacy are of the utmost importance for safe, reliable operation of the electric grid. It is well known that the increased connectivity/interoperability between all stakeholders (e.g., utilities, suppliers, and consumers) will enable personal information collection. Significant advanced metering infrastructure (AMI) deployment and demand response (DR) programs across the country, while enable enhanced automation, also generate energy data on individual consumers that can potentially be used for exploiting privacy. Inspired by existing works which consider DR, battery-based perturbation, and differential privacy noise adding, we novelly consider the aggregator (cluster) level privacy issue in the DR framework of solar photovoltaic (PV) generation following. Different from most of the existing works which mainly rely on the charging/discharging scheduling of rechargeable batteries, we utilize controllable building loads to serve as virtual storage devices to absorb a large portion of the PV generation while delicately keeping desired noisy terms to satisfy the differential privacy for the raw load profiles at the aggregator level. This not only ensures differential privacy, but also improves the DR efficiency in load following since part of the noisy signal in solar PV generation has been filtered out. In particular, a mixed integer quadratic optimization problem is formulated to optimally dispatch a population of on/off controllable loads to achieve this privacy preserving DR service.
△ Less
Submitted 28 November, 2018;
originally announced November 2018.
-
Regions of Attraction Approximation Using Individual Invariance
Authors:
Surour Alaraifi,
Seddik Djouadi,
Mohamed El-Moursi
Abstract:
Approximating regions of attraction in nonlinear systems require extensive computational and analytical efforts. In this paper, nonlinear vector fields are recasted as sum of vectors where each individual vector is used to construct an artificial system. The theoretical foundation is provided for a theorem in individual invariance to relate regions of attraction of artificial systems to the origin…
▽ More
Approximating regions of attraction in nonlinear systems require extensive computational and analytical efforts. In this paper, nonlinear vector fields are recasted as sum of vectors where each individual vector is used to construct an artificial system. The theoretical foundation is provided for a theorem in individual invariance to relate regions of attraction of artificial systems to the original vector field's region of attraction which leads to significant simplification in approximating regions of attraction. Several second order examples are used to demonstrate the effectiveness of this theorem. It is also proposed to use this theorem for the transient stability problem in power systems where an algorithm is presented to identify the critical clearing time through sequences of function evaluations. The algorithm is successfully applied on the 3-machine 9-bus system as well as the IEEE 39-bus New England system giving accurate and realistic estimations of the critical clearing time.
△ Less
Submitted 11 June, 2018;
originally announced June 2018.
-
Synthesizing Distributed Energy Resources in Microgrids with Temporal Logic Specifications
Authors:
Yichen Zhang,
Mohammed Olama,
Alexander Melin,
Yaosuo Xue,
Seddik Djouadi,
Kevin Tomsovic
Abstract:
Grid supportive (GS) modes integrated within distributed energy resources (DERs) can improve the frequency response. However, synthesis of GS modes for guaranteed performance is challenging. Moreover, a tool is needed to handle sophisticated specifications from grid codes and protection relays. This paper proposes a model predictive control (MPC)-based mode synthesis methodology, which can accommo…
▽ More
Grid supportive (GS) modes integrated within distributed energy resources (DERs) can improve the frequency response. However, synthesis of GS modes for guaranteed performance is challenging. Moreover, a tool is needed to handle sophisticated specifications from grid codes and protection relays. This paper proposes a model predictive control (MPC)-based mode synthesis methodology, which can accommodate the temporal logic specifications (TLSs). The TLSs allow richer descriptions of control specifications addressing both magnitude and time at the same time. The proposed controller will compute a series of Boolean control signals to synthesize the GS mode of DERs by solving the MPC problem under the normal condition, where the frequency response predicted by a reduced-order model satisfies the defined specifications. Once a sizable disturbance is detected, the pre-calculated signals are applied to the DERs. The proposed synthesis methodology is verified on the full nonlinear model in Simulink. A robust factor is imposed on the specifications to compensate the response mismatch between the reduce-order model and nonlinear model so that the nonlinear response satisfies the required TLS.
△ Less
Submitted 22 April, 2018;
originally announced April 2018.
-
Provision for Guaranteed Inertial Response in Diesel-Wind Systems via Model Reference Control
Authors:
Yichen Zhang,
Alexander M. Melin,
Seddik M. Djouadi,
Mohammed M. Olama,
Kevin Tomsovic
Abstract:
Frequency performance has been a crucial issue for islanded microgrids. On the one hand, most distributed energy resources (DER) are converter-interfaced and do not inherently respond to frequency variations. On the other hand, current inertia emulation approach cannot provide guaranteed response. In this paper, a model reference control based inertia emulation strategy is proposed for diesel-wind…
▽ More
Frequency performance has been a crucial issue for islanded microgrids. On the one hand, most distributed energy resources (DER) are converter-interfaced and do not inherently respond to frequency variations. On the other hand, current inertia emulation approach cannot provide guaranteed response. In this paper, a model reference control based inertia emulation strategy is proposed for diesel-wind systems. Desired inertia can be precisely emulated through the proposed strategy. A typical frequency response model with parametric inertia is set to be the reference model. A measurement at a specific location delivers the information about the disturbance acting on the diesel-wind system to the reference model. The objective is for the speed of the diesel generator to track the reference so that the desired inertial response is realized. In addition, polytopic parameter uncertainty will be considered. The control strategy is configured in different ways according to different operating points. The parameters of the reference model are scheduled to ensure adequate frequency response under a pre-defined worst case. The controller is implemented in a nonlinear three-phase diesel-wind system fed microgrid using the Simulink software platform. The results show that exact synthetic inertia can be emulated and adequate frequency response is achieved.
△ Less
Submitted 11 September, 2018; v1 submitted 12 April, 2018;
originally announced April 2018.
-
Optimal $H_2$ Decentralized Control of Cone Causal Spatially Invariant Systems
Authors:
M. Ehsan Raoufat,
Seddik M. Djouadi
Abstract:
This paper presents an explicit solution to decentralized control of a class of spatially invariant systems. The problem of optimal $H_2$ decentralized control for cone causal systems is formulated. Using Parseval's identity, the optimal $H_2$ decentralized control problem is transformed into an infinite number of model matching problems with a specific structure that can be solved efficiently. In…
▽ More
This paper presents an explicit solution to decentralized control of a class of spatially invariant systems. The problem of optimal $H_2$ decentralized control for cone causal systems is formulated. Using Parseval's identity, the optimal $H_2$ decentralized control problem is transformed into an infinite number of model matching problems with a specific structure that can be solved efficiently. In addition, the closed-form expression (explicit formula) of the decentralized controller is derived for the first time. In particular, it is shown that the optimal decentralized controller is given by a specific positive feedback scheme. A constructive procedure to obtain the state-space representation of the decentralized controller is provided. A numerical example is given and compared with previous works which demonstrate the effectiveness of the proposed method.
△ Less
Submitted 12 March, 2018;
originally announced March 2018.
-
Set Theory-Based Safety Supervisory Control for Wind Turbines to Ensure Adequate Frequency Response
Authors:
Yichen Zhang,
M. Ehsan Raoufat,
Kevin Tomsovic,
Seddik M. Djouadi
Abstract:
Inadequate frequency response can arise due to a high penetration of wind turbine generators (WTGs) and requires a frequency support function to be integrated in the WTG. The appropriate design for these controllers to ensure adequate response has not been investigated thoroughly. In this paper, a safety supervisory control (SSC) is proposed to synthesize the supportive modes in WTGs to guarantee…
▽ More
Inadequate frequency response can arise due to a high penetration of wind turbine generators (WTGs) and requires a frequency support function to be integrated in the WTG. The appropriate design for these controllers to ensure adequate response has not been investigated thoroughly. In this paper, a safety supervisory control (SSC) is proposed to synthesize the supportive modes in WTGs to guarantee performance. The concept, region of safety (ROS), is stated for safe switching synthesis. An optimization formula is proposed to calculate the largest ROS. By assuming a polynomial structure, the problem can be solved by a sum of squares program. A feasible result will generate a polynomial, the zero sublevel set of which represents the ROS and is employed as the safety supervisor. A decentralized communication architecture is proposed for small-scale systems. Moreover, a scheduling loop is suggested so that the supervisor updates its boundary with respect to the renewable penetration level to be robust with respect to variations in system inertia. The proposed controller is first verified on a single-machine three-phase nonlinear microgrid, and then implemented on the IEEE 39-bus system. Both results indicate that the proposed framework and control configuration can guarantee adequate response without excessive conservativeness.
△ Less
Submitted 27 August, 2018; v1 submitted 9 March, 2018;
originally announced March 2018.
-
Battery Energy Storage Scheduling for Optimal Load Variance Minimization
Authors:
Yichen Zhang,
Alexander Melin,
Mohammed Olama,
Seddik Djouadi,
Jin Dong,
Kevin Tomsovic
Abstract:
Generation portfolio can be significantly altered due to the deployment of distributed energy resources (DER) in distribution networks and the concept of microgrid. Generally, distribution networks can operate in a more resilient and economic fashion through proper coordination of DER. However, due to the partially uncontrollable and stochastic nature of some DER, the variance of net load of distr…
▽ More
Generation portfolio can be significantly altered due to the deployment of distributed energy resources (DER) in distribution networks and the concept of microgrid. Generally, distribution networks can operate in a more resilient and economic fashion through proper coordination of DER. However, due to the partially uncontrollable and stochastic nature of some DER, the variance of net load of distribution systems increases, which raises the operational cost and complicates operation for transmission companies. This motivates peak shaving and valley filling using energy storage units deployed in distribution systems. This paper aims at theoretical formulation of optimal load variance minimization, where the infinity norm of net load is minimized. Then, the problem is reformulated equivalently as a linear program. A case study is performed with capacity-limited battery energy storage model and the simplified power flow model of a radial distribution network. The influence of capacity limit and deployment location are studied.
△ Less
Submitted 15 February, 2018; v1 submitted 9 February, 2018;
originally announced February 2018.
-
Hybrid Controller for Wind Turbine Generators to Ensure Adequate Frequency Response in Power Networks
Authors:
Yichen Zhang,
Kevin Tomsovic,
Seddik M. Djouadi,
Hector Pulgar-Painemal
Abstract:
Converter-interfaced power sources (CIPS) are hybrid control systems as they may switch between multiple operating modes. Due to increasing penetration, the hybrid behavior of CIPS, such as, wind turbine generators (WTG), may have significant impact on power system dynamics. In this paper, the frequency dynamics under inertia emulation and primary support from WTG is studied. A mode switching for…
▽ More
Converter-interfaced power sources (CIPS) are hybrid control systems as they may switch between multiple operating modes. Due to increasing penetration, the hybrid behavior of CIPS, such as, wind turbine generators (WTG), may have significant impact on power system dynamics. In this paper, the frequency dynamics under inertia emulation and primary support from WTG is studied. A mode switching for WTG to ensure adequate frequency response is proposed. The switching instants are determined by our proposed concept of a region of safety (ROS), which is the initial set of safe trajectories. The barrier certificate methodology is employed to derive a new algorithm to obtain and enlarge the ROS for the given desired safe limits and the worst-case disturbance scenarios. Then critical switching instants and a safe recovery procedure are found. In addition, the emulated inertia and load-damping effect is derived in the time frame of inertia and primary frequency response, respectively. The theoretical results under critical cases are consistent with simulations and can be used as guidance for practical control design.
△ Less
Submitted 9 February, 2018;
originally announced February 2018.
-
Estimation and Control over Cognitive Radio Channels with Distributed and Dynamic Spectral Activity
Authors:
Xiao Ma,
Seddik M. Djouadi,
Husheng Li,
Teja Kuruganti
Abstract:
Since its first inception by Joseph Mitola III in 1998 cognitive radio (CR) systems have seen an explosion of papers in the communication community. However, the interaction of CR and control has remained vastly unexplored. In fact, when combined with control theory CR may pave the way for new and exciting control and communication applications. In this paper, the control and estimation problem vi…
▽ More
Since its first inception by Joseph Mitola III in 1998 cognitive radio (CR) systems have seen an explosion of papers in the communication community. However, the interaction of CR and control has remained vastly unexplored. In fact, when combined with control theory CR may pave the way for new and exciting control and communication applications. In this paper, the control and estimation problem via the well known two switch model which represents a CR link is considered. In particular, The optimal linear estimator subject to a CR link between the sensor and the estimator is derived. Furthermore, it is shown that in the Linear Quadratic Gaussian (LQG) Control law for a closed-loop system over double CR links is not linear in the state estimate. Consequently, the separation principle is shown to be violated. Several conditions of stochastic stability are also discussed. Illustrative numerical examples are provided to show the effectiveness of the results.
△ Less
Submitted 28 October, 2017;
originally announced October 2017.
-
Performance Guaranteed Inertia Emulation for Diesel-Wind System Feed Microgrid via Model Reference Control
Authors:
Yichen Zhang,
Alexander Melin,
Seddik Djouadi,
Mohammed Olama
Abstract:
In this paper, a model reference control based inertia emulation strategy is proposed. Desired inertia can be precisely emulated through this control strategy so that guaranteed performance is ensured. A typical frequency response model with parametrical inertia is set to be the reference model. A measurement at a specific location delivers the information of disturbance acting on the diesel-wind…
▽ More
In this paper, a model reference control based inertia emulation strategy is proposed. Desired inertia can be precisely emulated through this control strategy so that guaranteed performance is ensured. A typical frequency response model with parametrical inertia is set to be the reference model. A measurement at a specific location delivers the information of disturbance acting on the diesel-wind system to the reference model. The objective is for the speed of the diesel-wind system to track the reference model. Since active power variation is dominantly governed by mechanical dynamics and modes, only mechanical dynamics and states, i.e., a swing-engine-governor system plus a reduced-order wind turbine generator, are involved in the feedback control design. The controller is implemented in a three-phase diesel-wind system feed microgrid. The results show exact synthetic inertia is emulated, leading to guaranteed performance and safety bounds.
△ Less
Submitted 9 February, 2018; v1 submitted 16 October, 2017;
originally announced October 2017.
-
Power System Supplementary Damping Controllers in the Presence of Saturation
Authors:
M. Ehsan Raoufat,
Kevin Tomsovic,
Seddik M. Djouadi
Abstract:
This paper presents the analysis and a method to design supplementary damping controllers (SDCs) for synchronous generators considering the effects of saturation limits. Usually such saturations of control signals are imposed in order to enforce practical limitations such as component ratings. However, to guarantee the stability in the presence of saturation limits, the state trajectories must rem…
▽ More
This paper presents the analysis and a method to design supplementary damping controllers (SDCs) for synchronous generators considering the effects of saturation limits. Usually such saturations of control signals are imposed in order to enforce practical limitations such as component ratings. However, to guarantee the stability in the presence of saturation limits, the state trajectories must remain inside the domain of attraction (DA). In this paper, the domain of attraction of a single-machine infinite-bus (SMIB) power system with saturation nonlinearity is estimated and compared with the exact description of the null controllable region. Then, state-feedback controllers are designed to enlarge the DA. Our analysis shows that nonlinear effects of saturation should be considered to guarantee stability and satisfactory performance. Simulation results on a detailed nonlinear model of a synchronous generator indicate that the DA enlarges with the proposed controller. The results also indicate that Critical Clearing Time (CCT) and damping of the system with saturation can be improved by the proposed method.
△ Less
Submitted 27 May, 2017;
originally announced May 2017.
-
Control Allocation for Wide Area Coordinated Damping
Authors:
M. Ehsan Raoufat,
Kevin Tomsovic,
Seddik M. Djouadi
Abstract:
In this work, a modal-based sparse control allocation (CA) is proposed for coordinated and fault-tolerant wide-area damping controllers (WADCs). In our proposed method, the supervisory CA only communicates with necessary actuators to achieve the required damping performance and in case of actuator failures (e.g., due to loss of communication or scheduling), capabilities of the remaining actuators…
▽ More
In this work, a modal-based sparse control allocation (CA) is proposed for coordinated and fault-tolerant wide-area damping controllers (WADCs). In our proposed method, the supervisory CA only communicates with necessary actuators to achieve the required damping performance and in case of actuator failures (e.g., due to loss of communication or scheduling), capabilities of the remaining actuators are fully used before the nominal performance is degraded. This method offers the advantages of modular design where WADC is initially designed to achieve satisfactory damping without the detailed knowledge of actuators. In the next step, CA is designed to manage actuator failures and limitations without the need to redesign the nominal WADC. The proposed approach is applied to a modified $286$-bus Western Electricity Coordinating Council (WECC) system to verify the feasibility on a complex power system. Simulation results indicate the effectiveness of the proposed method in coordinating multiple actuators and building resiliency.
△ Less
Submitted 25 January, 2017;
originally announced January 2017.
-
Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation
Authors:
Husheng Li,
Lifeng Lai,
Seddik M. Djouadi
Abstract:
Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in a large area blackout. In this paper, a trustiness system is introduced to the controller, who computes the trustiness of different sensors by com…
▽ More
Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in a large area blackout. In this paper, a trustiness system is introduced to the controller, who computes the trustiness of different sensors by comparing its prediction, obtained from Kalman filtering, on the system state with the reports from sensor. The trustiness mechanism is discussed and analyzed for the Linear Quadratic Regulation (LQR) controller. Numerical simulations show that the trustiness system can effectively combat the cyber attacks to smart grid.
△ Less
Submitted 19 October, 2010;
originally announced October 2010.