Issue
Sci. Tech. Energ. Transition
Volume 79, 2024
Decarbonizing Energy Systems: Smart Grid and Renewable Technologies
Article Number 64
Number of page(s) 10
DOI https://doi.org/10.2516/stet/2024067
Published online 13 September 2024

© The Author(s), published by EDP Sciences, 2024

Licence Creative CommonsThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

1 Introduction

The electricity system is an indispensable infrastructure in social development. Microgrids, as a clean power supply system, have attracted extensive attention and research [1]. Microgrids are small power generation and distribution systems consisting of distributed generators (DGs), loads, and energy storage equipment [2, 3]. Conventional power systems appear to be increasingly inadequate to meet the needs of contemporary society in the face of increasing power demand and environmental issues [4]. Because of their distributed, flexible, and controllable characteristics, microgrids are considered an innovative solution to energy problems and have been widely studied [5, 6]. In microgrids, the integration of distributed energy, energy storage technology, and smart grid systems into local areas is conducive to better power supply [7]. Microgrids usually adopt a hierarchical control structure, and the primary control mainly realizes stable output through droop control. Secondary control is used to accomplish frequency recovery and voltage amplitude recovery [8, 9]; Power scheduling is carried out by tertiary control for optimal operation control of the microgrid [10, 11].

However, microgrids are largely subject to cyber attacks during operations [1215]. False data injection (FDI) attack is a common cyber attack method used by attackers, which is more flexible and oriented than other forms of attacks [1618]. FDI attacks cause the output of microgrids to deviate from the expected value by modifying the internal parameters of the microgrids, which can cause damage to the power equipment [19]. Therefore, a series of anti-attack methods have been developed. Literature [20] proposed a resilient distributed secondary frequency control strategy for shipboard microgrids against FDI attacks. Literature [21] investigated the frequency and voltage regulation of AC microgrids under FDI attacks at the secondary control. Literature [22] proposed a network fault-tolerant resilient nonlinear frequency controller for microgrid testbed frequency regulation. A harmonic nonlinear perturbation observer is utilised for the initial identification and estimation of unknown object uncertainty and hidden FDI network attacks. Literature [23] proposed a real-time centralised monitoring scheme for detecting and mitigating FDI attacks. Literature [24] proposed a method to detect FDI attacks on microgrids using transient information. Literature [25] introduced the utilisation level of coordinated generators and evaluated their changes during FDI attacks with a particular injection strategy.

The existing literature has designed various controllers and observers to defend against FDI attacks. However, current research lacks a focus on expanding the structure of secondary control in microgrids to resist FDI attacks. From another perspective, if secondary control can correct frequency and voltage offsets caused by primary droop control, can it also correct deviations caused by FDI? Therefore, first, consider the premise that the likelihood of all DGs being attacked simultaneously is low and the redundancy characteristics of DGs within the microgrid. It is worth conducting in-depth research to determine whether the unattacked redundant DG and its secondary control can eliminate the impact of the attacked DGs. In this study, the above questions will be addressed to fully explore the defensive performance of the proposed redundant secondary control method. This control method is direct, practical, and quickly responds to FDI attacks without complex controllers. The main contributions of this study are as follows:

  1. Setting a comparator at the microgrid’s output, checks frequency and voltage amplitude against desired values. Anti-attack control activates when differences exceed a threshold, and deactivates when desired values are reached, ensuring normal operation and effective FDI attack resistance.

  2. In a microgrid composed of six DGs, a nested secondary control structure is designed, selecting the secondary control of DG5 and DG6 as the standard, Then, in case of FDI attacks frequency on DG1-DG4, the secondary control output of either DG5 or DG6 is added to the secondary control of the attacked DG to resist FDI attacks.

  3. A redundant secondary frequency controller is designed to control the secondary control of DG5 and DG6. When DG5 or DG6 is attacked by FDI, the redundant controller acts on it to resist FDI attacks. Redundant controllers are also designed for secondary voltage control to resist FDI attacks.

2 Structure of microgrids and false data injection attacks

The control structure of microgrids mainly adopts hierarchical control, and this study utilizes a hierarchical control framework with two control layers, as shown in Figure 1. The DG first passes through inverters and filters. Then the voltage and frequency are regulated by droop control in the primary control. The on-and-off time of the inverter in a period is controlled by pulse width modulation (PWM), which regulates the output of the microgrid. The secondary control first calculates the difference between the reference values of the frequency and voltage amplitude of the microgrid (i.e., ω * and E *) and its actual output values (i.e., ω and E), and then compensates the difference between them through the proportional-integral (PI) controllers. The secondary control’s output acts on the droop control ultimately modifies the PWM signal generator and adjusts the inverter of each DG unit within the microgrid to make it output the desired current and voltage.

thumbnail Fig. 1

Hierarchical control topology of microgrids.

2.1 Primary control

The primary control chiefly controls the power converter and mainly achieves a stable output of voltage and frequency. Droop control is typically used in primary control, and it simulates the principle of traditional generator primary frequency regulation. The control principle is that when the active power and reactive power of the microgrid changes the microgrid regulates the frequency and amplitude of the output voltage according to the P-ω and Q-E droop curves, and its regulation formula is as follows [2628]:(1) (2)where ωi and Ei represent the output frequency and voltage amplitude of DGi, correspondingly; ωri and Eri denote the rated frequency and rated voltage amplitude of the microgrid, respectively; mPi is the active droop control factor, nQi is the reactive droop control factor; Pi and Qi are the active and reactive power of the microgrid, respectively; Pri and Qri are the rated active and rated reactive power of the microgrid, respectively.

2.2 Secondary control

The secondary control serves to correct for the drop in the frequency and amplitude of the microgrid output voltage caused by the droop control. As shown in Figure 1, the secondary controller first receives the instantaneous voltage amplitude and frequency of the output voltage through the phase-locked loop and compares the measured values with the reference values, and their deviation is corrected by the PI controllers in the secondary control. In the end, the frequency and magnitude of the microgrid output voltage are approximated to the predetermined reference values [29]. The mathematical equations are [3032](3) (4)where δωi and δEi represent the regulated values of the frequency and voltage amplitude of the controller’s output, respectively, k and k represent the proportional and integral coefficients of the PI controller used for frequency correction within the secondary control [26]. Furthermore, kpE and kiE express the proportional and integral coefficients of the PI controller for voltage amplitude correction within the secondary control.

2.3 False data injection attacks

In microgrids with multiple DGs, frequency stabilisation at the desired value is critical for the system when the microgrid works in an island state [33]. The secondary control can coordinate all DGs to correct voltage amplitude and frequency offsets caused by droop control only through local communication. However, security issues are also considered significant for the microgrid’s secondary control. Due to the distributed dissemination of information, its control is vulnerable to FDI attacks, which cause its output to deviate from the desired value by modifying the fixed parameters set within the microgrid, which can cause damage to the electrical equipment, microgrid systems, etc. The attack on the American power grid in 2009 demonstrates how harmful cyberattacks can be to the power system.

And FDI can attack any position of the microgrid. Due to the secondary control being located in the outer loop of the entire control system, as soon as the microgrid’s secondary control is attacked, the main circuit and the droop control within the system will be affected. In addition, the secondary control system sets some important reference values, resulting in vulnerabilities and insufficient safety measures in the traditional secondary control. Moreover, secondary control is a critical part of the microgrid control system, which can affect the overall operation of the whole microgrid or even lead to the collapse of the microgrid system once it is attacked. As shown in Figure 2, when FDI attacks the frequency of the secondary control, the frequency set value 50 is modified or increase the amount of attack is based on 50, which will result in the frequency of the microgrid’s output voltage close to the modified value, which will have an impact on the system’s loads and stability.

thumbnail Fig. 2

Schematic of secondary control attacked by FDI.

The same is valid for voltage attacks in secondary control, FDI attacks tamper with the voltage reference value and in turn, play havoc with the output of the microgrid. The equations regarding the FDI attacks on frequency and voltage magnitude are as follows:(5) (6)where and are the frequency and voltage amplitude of the inputs to the controllers under FDI attacks, aωi and aEi are the FDI attacks on the ith DG controller, which are assumed to be constant in this research.

3 Redundant secondary control to resist FDI attacks

As mentioned before, while many defences against FDI attacks focus on controllers and observers, this study explores redundant secondary control in microgrids. We investigate whether secondary control, which corrects frequency and voltage deviations, can mitigate FDI-induced deviations. Assuming that redundancy prevents simultaneous attacks on all DGs, we examine whether unattacked DGs can lessen the impact of those that were attacked. In the following section, a practical solution that quickly responds to FDI attacks without relying on complex controllers will be detailed.

The secondary control structure designed in this study is shown in Figure 3, where DG5 and DG6 are selected as the reference object, and the secondary frequency control of this reference DG then controls the secondary frequency control of other DGs, i.e., the adjusted value of the output of the secondary frequency control of this DG will be applied to the secondary control of other DGs. The secondary control of each DG then outputs the regulation value to control the primary control.

thumbnail Fig. 3

The proposed redundant secondary control method.

However, the secondary control selected as the standard cannot act on other DGs at all times to avoid control disruption. To this end, a conditional function is designed to first compare the difference between the output value and the desired value of the frequency within each DG. When the difference exceeds the threshold value of 0.1 Hz, the secondary control output of the standard DG is activated. The expression of the designed function is as follows:(7)where δωFDIi is the output regulation of the secondary control of the reference DG (i.e., DG5 and DG6 in Fig. 3).

However, when the DG selected as the reference object in the above mechanism is attacked, its control structure cannot resist FDI attacks, which will cause the frequency of the microgrid system to be disturbed and deviate from the desired value. For this reason, a redundant controller is designed, which outputs the regulation to resist the FDI attacks when the secondary control is DG5 or DG6. Similarly, the model of (7) is also equipped inside the DG5 and DG6. In this way, when the redundant controller is attacked, it will not affect other DGs.

From the above structure and principle, we can obtain the following expression for the secondary frequency control of other DGs under this secondary control method:(8)where is the regulation value of the output of the secondary controllers in each DG when the redundant controller is triggered, δωr is the regulated value of the output of the redundant secondary frequency controller.

Different from the control method of resisting FDI frequency attacks, the principle of resisting FDI attacks in voltage is to set a redundant controller for the secondary voltage control of each DG. Following the same concept, if a DG secondary voltage control is identified as being attacked, the redundant controllers will activate to counter the FDI attack.(9)where δEFDIi is the output of the redundant secondary controller, and the threshold of voltage amplitude deviation is set to 0.2 V.

Similarly, we can obtain equation (10) for the secondary voltage control of other DGs under the proposed secondary control methods:(10)where is the regulation value of the output of the secondary controllers in each DG when the redundant controller is triggered, δEi is the regulated value of the output of the redundant secondary voltage controller.

4 Simulation results under multiple attack scenarios

To evaluate the performance of the proposed methodology to resist FDI attacks, the proposed microgrid redundant secondary control method is simulated in MATLAB/Simulink. The parameter settings of the system are shown in Table 1. The microgrid system contains six DGs whose output buses converge together to form a common bus. Each DG has an inverter and filter inside, and each DG carries a local load inside and a common load on the common bus. A primary and a secondary controller are included with each DG. In Table 1, i is 1, 2, …6.

Table 1

System setting and control parameters.

According to the parameters in Table 1, the microgrid model is constructed in MATLAB, and the output voltage of the DG1 at a certain moment is randomly intercepted. For example, Figure 4 is the fast Fourier transform (FFT) window in MATLAB, which shows the microgrid’s output voltage for two cycles after 4 s, which can be found to be standard sine. The Simulink microgrid model established in MATLAB is debugged for the parameters and eventually generates a microgrid model with a relatively good output of power quality.

thumbnail Fig. 4

The output voltage of DG1 of the microgrid from 4.000 s to 4.040 s.

In Figure 5, the frequency of the microgrid is set to 50 Hz, and the fundamental amplitude of its output voltage in the period from 4.000 to 4.040 s is 310.3 V. Figure 5 shows the total harmonic distortion (THD) rate of the voltage based on the waveform in Figure 4 from the Fourier transform, and the THD is 0.43%, and the vertical coordinate is the percentage of the harmonic to the fundamental waveform for different sampling frequencies. Finally, it can be concluded that the output of this microgrid model is very stable.

thumbnail Fig. 5

The total harmonic distortion of the output voltage of DG1 from 4.000 s to 4.040 s.

4.1 Case 1: Frequency regulation under traditional secondary control

In this case, the traditional secondary control was activated at the initial time, and the timing started after the system was stable. The frequency of the microgrid’s output voltage with traditional secondary control is illustrated in Figure 6. From 1 to 2 s, the reference value 50 of the secondary frequency control of DG1 tampers with 50.5; from 3 to 4 s, the reference value 50 of the secondary frequency control setting of DG2 tampers with 50.6; and from 5 to 6 s, the reference value 50 of the secondary frequency control setting of DG3 tampers with 50.7; from 7 to 8 s, the reference value 50 of the secondary frequency control setting of DG4 tampers with 50.8.

thumbnail Fig. 6

The frequency of each DG with traditional secondary control under FDI attacks: Frequency of (a) DG1, (b) DG2, (c) DG3, (d) DG4, (e) DG5 and (f) DG6.

It can be concluded from Figure 6 that when the frequency of the microgrid with conventional secondary control is attacked by FDI, its frequency will be disordered, which leads to a serious deviation from the desired frequency value and when the attack stops, the system is still not able to recover to the desired frequency.

4.2 Case 2: Frequency regulation under proposed redundant secondary control

In this scenario, the microgrid adopts the proposed redundant secondary control method, frequency variations of each DG in the microgrid attacked by FDI are shown in Figure 7. From 0 to 8 s, the FDI attack settings are the same as in Case 1. However, from 9 to 10 s, the reference value 50 of the secondary frequency control setting of DG5 is tampered with 51; and from 10 to 11 s, the reference value 50 of the redundant controller is tampered with 51.

thumbnail Fig. 7

The frequency of each DG with redundant secondary control under FDI attacks: Frequency of (a) DG1, (b) DG2, (c) DG3, (d) DG4, (e) DG5 and (f) DG6.

In Figure 7, the proposed secondary control method is utilized in the microgrid, when the frequency is attacked by FDI, its frequency will deviate from the desired frequency at the beginning of the attack, but it can be restored to the desired frequency of 50, immediately.

4.3 Case 3: Voltage regulation under traditional secondary control

In this scenario, the amplitude of the voltage measured by the secondary voltage control is different from that of the frequency. Here the amplitude of the voltage at the output of each DG is measured, not the voltage amplitude at the busbar. The traditional secondary control has been activated at the initial time, and the timing starts after the system is stable. The amplitude of the output voltage of the microgrid with traditional secondary control is shown in Figure 8.

thumbnail Fig. 8

The voltage of each DG with traditional secondary control under FDI attacks: Voltage amplitude of (a) DG1, (b) DG2, (c) DG3, (d) DG4, (e) DG5 and (f) DG6.

From 1 to 2 s, the reference value 311 of the secondary voltage control setting of DG1 is tampered with 312; from 3 to 4 s, the reference value 311 of the secondary voltage control setting of DG2 is tampered with 313; and from 5 to 6 s, the reference value of the secondary voltage control setting of DG3 is tampered with 313; from 7 to 8 s, the reference value of the secondary voltage control setting of DG4 is tampered with 313. The voltage references for DG5 and DG6 have never been attacked.

It can be concluded that when the microgrid adopts the conventional secondary control, when FDI attacks the voltage reference value of the secondary control of one of the DGs of the microgrid, it causes the output voltage to deviate from the desired value and follows the injected false data.

4.4 Case 4: Voltage regulation under proposed redundant secondary control

In this scenario, the microgrid adopts the proposed redundant secondary control. The settings of FDI attacks are the same as in Case 3, voltage variations of each DG in the microgrid attacked by FDI are illustrated in Figure 9. It can be concluded from Figure 9 that when the microgrid is controlled with redundant secondary voltage control, the voltage amplitude deviates from the desired value at the beginning of the attack by FDI, the scale of its change at the beginning is smaller than that of the conventional secondary control, and immediately returns to the desired value 311. So the proposed method is successful in resisting FDI attacking the voltage.

thumbnail Fig. 9

The voltage of each DG with redundant secondary control under FDI attacks: Voltage amplitude of (a) DG1, (b) DG2, (c) DG3, (d) DG4, (e) DG5 and (f) DG6.

5 FPGA-in-the-loop experiments

In this study, the hardware-in-the-loop simulation framework is used to verify the performance of the designed secondary control method in resisting FDI attacks. Hardware-in-the-loop is a semi-physical real-time simulation technique. With this principle, field programmable gate array (FPGA) and MATLAB are united, and the personal computer is physically connected to the FPGA. In this study, the joint test action group method is used to realize the communication between the FPGA and MATLAB on the personal computer side. The principle of this connection is similar to the Signaltap of Quartus II, which generates the module in the FPGA that takes charge of the transmission of information.

The principle of the experiment is shown in Figure 10. Firstly, the model connected to the FPGA is created in Simulink, through which the signal is generated and transmitted to the FPGA. Then the FPGA reads the signal and transfers it to Simulink for display. And the FPGA can be used to simulate the FDI attacks in this study, the false data is output through the “key” on the FPGA, which is transmitted to the computer side of the Simulink model, and then this false data is injected into the frequency reference and voltage reference of the secondary control of the microgrid for FDI attacks. Then the performance of the proposed method to resist FDI attacks is tested through the experimental results.

thumbnail Fig. 10

Hardware-in-the-loop experiment structure.

5.1 FPGA-in-the-loop experiments for FDI attacks frequency

The settings of the hardware-in-the-loop experiments are similar to the FDI attack settings simulated in Case 1. Figure 11 is the output of the FPGA, which will be used as FDI attacks on the secondary frequency control after being multiplied by the corresponding coefficients (0.5 and 0.6 in DG1 and DG2, respectively).

thumbnail Fig. 11

The output from FPGA to the secondary frequency control in MATLAB.

Figure 12 presents the frequency of the output voltage of DG1 and DG2 of the conventional secondary-controlled microgrid under FDI attacks. It can be summarized that once the microgrid is attacked by the false data outputted by FPGA, the frequency of the microgrid deviates from the desired value and becomes disordered. In Figure 13, the frequency of the microgrid with redundant secondary control is attacked by FDI. It can be summarized that when the microgrid is attacked by the false data output from FPGA, the frequency of the microgrid deviates from the desired value in the beginning period, but immediately returns to the desired value.

thumbnail Fig. 12

The frequency of the microgrid under the conventional secondary control attacked by the output of FPGA: Frequency of (a) DG1 and (b) DG2.

thumbnail Fig. 13

The frequency of the microgrid under the proposed secondary control attacked by the output of FPGA: Frequency of (a) DG1 and (b) DG2.

5.2 FPGA-in-the-loop experiments for FDI attacks voltage

The settings of the hardware-in-the-loop simulation are similar to the FDI attack settings simulated in Case 3. Figure 14 is the output of the FPGA, which will be used as the FDI attacks on the secondary voltage control. Figure 15 shows the amplitude of the output voltage of DG1 and DG2 after the microgrid is attacked by FDI. It can be concluded that once the voltage of the microgrid is attacked by the false data output from the FPGA, the voltage amplitude of the microgrid follows the reference value of the injected false voltage amplitude. Similarly, in Figure 16, when the voltage of the microgrid with redundant secondary control is attacked by the false data output from FPGA, the voltage of the microgrid deviates from the desired value during the initiation period, but promptly comes to the desired value.

thumbnail Fig. 14

The output from FPGA to the secondary voltage control in MATLAB.

thumbnail Fig. 15

The voltage amplitude of the microgrid under the conventional secondary control attacked by the output of FPGA: Voltage amplitude of (a) DG1 and (b) DG2.

thumbnail Fig. 16

The voltage amplitude of the microgrid under the proposed secondary control attacked by the output of FPGA: Voltage amplitude of (a) DG1 and (b) DG2.

6 Limitations of the study

To realize the stable operation of microgrids, this study proposes a redundant secondary control scheme to resist FDI attacks, but the study still has some defects and limitations as follows:

  1. This study only simulated FDI attacks on microgrids, there are a variety of attacks in practice, and our team will also study microgrids facing a variety of attack scenarios next.

  2. In this study, redundant secondary control is equipped for microgrids to resist FDI attacks, but the effect of the redundant modules on the economic operation of the microgrid, energy management, etc. is not considered.

  3. The scheme proposed in this study to resist FDI attacks is only validated by using FPGA, and it remains to be verified whether it can achieve the above effects in actual microgrid operation, and there is still a gap with practical applications.

7 Conclusion

In response to FDI attacks on microgrids, this study resists the FDI attacks on microgrids with voltage and frequency, respectively, through the proposed redundant control. We verify that the method can successfully resist FDI attacks by using the FPGA-in-the-loop experiments. The contributions of this study are as follows:

  1. A redundant secondary control method is proposed in this paper to address the problem of FDI attacking the frequency and voltage of AC microgrids.

  2. A comparator is set within each DG, so that when FDI attacks the frequency or voltage setpoint of its secondary control, i.e., the difference between the output frequency value of the microgrid and the desired value exceeds the set threshold value of 0.1 Hz, and the difference between the output voltage value of the microgrid and the desired value exceeds the set threshold value of 0.2 V, the output of the redundant controller is activated to respond to the frequency or voltage change caused by FDI attacks.

  3. Six DGs are tested for their frequency and voltage change after being attacked by FDI, and the results indicate that the proposed redundant secondary control method can resist FDI attacks on the frequency and voltage of AC microgrids.

Funding

This work was supported by the National Natural Science Foundation of China (62303107), Shanghai Sailing Program (21YF1400100) and Fundamental Research Funds for the Central Universities (2232021D-38, 2232022G-09).

References

All Tables

Table 1

System setting and control parameters.

All Figures

thumbnail Fig. 1

Hierarchical control topology of microgrids.

In the text
thumbnail Fig. 2

Schematic of secondary control attacked by FDI.

In the text
thumbnail Fig. 3

The proposed redundant secondary control method.

In the text
thumbnail Fig. 4

The output voltage of DG1 of the microgrid from 4.000 s to 4.040 s.

In the text
thumbnail Fig. 5

The total harmonic distortion of the output voltage of DG1 from 4.000 s to 4.040 s.

In the text
thumbnail Fig. 6

The frequency of each DG with traditional secondary control under FDI attacks: Frequency of (a) DG1, (b) DG2, (c) DG3, (d) DG4, (e) DG5 and (f) DG6.

In the text
thumbnail Fig. 7

The frequency of each DG with redundant secondary control under FDI attacks: Frequency of (a) DG1, (b) DG2, (c) DG3, (d) DG4, (e) DG5 and (f) DG6.

In the text
thumbnail Fig. 8

The voltage of each DG with traditional secondary control under FDI attacks: Voltage amplitude of (a) DG1, (b) DG2, (c) DG3, (d) DG4, (e) DG5 and (f) DG6.

In the text
thumbnail Fig. 9

The voltage of each DG with redundant secondary control under FDI attacks: Voltage amplitude of (a) DG1, (b) DG2, (c) DG3, (d) DG4, (e) DG5 and (f) DG6.

In the text
thumbnail Fig. 10

Hardware-in-the-loop experiment structure.

In the text
thumbnail Fig. 11

The output from FPGA to the secondary frequency control in MATLAB.

In the text
thumbnail Fig. 12

The frequency of the microgrid under the conventional secondary control attacked by the output of FPGA: Frequency of (a) DG1 and (b) DG2.

In the text
thumbnail Fig. 13

The frequency of the microgrid under the proposed secondary control attacked by the output of FPGA: Frequency of (a) DG1 and (b) DG2.

In the text
thumbnail Fig. 14

The output from FPGA to the secondary voltage control in MATLAB.

In the text
thumbnail Fig. 15

The voltage amplitude of the microgrid under the conventional secondary control attacked by the output of FPGA: Voltage amplitude of (a) DG1 and (b) DG2.

In the text
thumbnail Fig. 16

The voltage amplitude of the microgrid under the proposed secondary control attacked by the output of FPGA: Voltage amplitude of (a) DG1 and (b) DG2.

In the text

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.