Article, 2024

Modified backstepping control for cyber security enhancement of a wind farm based DFIG against false data injection, hijack and denial of service cyber attacks

Electric Power Systems Research, ISSN 0378-7796, Volume 231, 10.1016/j.epsr.2024.110357

Contributors

Mahvash H. [1] Taher S.A. 0000-0002-3998-5332 (Corresponding author) [1] Guerrero J.M. 0000-0002-5505-3252 [2] [3]

Affiliations

  1. [1] University of Kashan
  2. [NORA names: Iran; Asia, Middle East];
  3. [2] Aalborg University
  4. [NORA names: AAU Aalborg University; University; Denmark; Europe, EU; Nordic; OECD];
  5. [3] Universitat Politècnica de Catalunya
  6. [NORA names: Spain; Europe, EU; OECD]

Abstract

The importance of cyber security against cyber attacks in AC microgrids (ACMGs) is undeniable. In this regard, the new detection, tracking and mitigation approaches for an ACMG composed of WT topology connected to the doubly fed induction generators (DFIGs) are proposed in this paper. The detection method is based on defining the instantaneous energy functions in the rotor side converter (RSC) of the DFIG. The mitigation method is realized by applying the modified backstepping approach combined by the switching terms applied in the higher order sliding mode control (HOSMC) to enhance the active/reactive power, frequency and voltage profiles, reaching power management system of the MG. This control scheme as a robust procedure is suggested to extract the reference values of the current and voltage components in the d and q axes. Furthermore, the tracking approach is presented to diagnose the occurrence of cyber attacks in the cyber layers of the RSC. This tracking scheme is a suitable benchmark to define which of backstepping control loops designed for the cyber layers of the RSC must be activated during the occurrence of cyber attacks. The important cyber attacks including false data injection attack (FDIA), hijack attack (HjA) and denial of service (DoS) as the malfunction of integrity, confidentiality and availability are considered to validate the proposed method in different scenarios using MATLAB/Simulink.

Keywords

Denial of service (DoS), Doubly fed induction generator (DFIG), False data injection attack (FDIA), Hijack attack (HjA), Modified backstepping, Rotor side converter (RSC)

Data Provider: Elsevier