2017
DOI: 10.1109/jetcas.2017.2700947
|View full text |Cite
|
Sign up to set email alerts
|

Agent-Based Distributed Control Schemes for Distributed Energy Storage Systems Under Cyber Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
25
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 32 publications
(27 citation statements)
references
References 24 publications
0
25
0
Order By: Relevance
“…Noncompliance of some agents in a network that applies a distributed approach has been discussed in some papers. 10,11 For instance, a secure dual-decomposition-based DMPC, in which each agent should monitor two neighbors that provide extreme control input values and disregard these extreme values, has been proposed. 10 Furthermore, a cyber-attack problem of a consensus-based distributed control scheme for distributed energy storage systems has also been addressed, 11 where the approach involves a fuzzy-logic-based detection and a consensus-based leader-follower distributed control scheme.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Noncompliance of some agents in a network that applies a distributed approach has been discussed in some papers. 10,11 For instance, a secure dual-decomposition-based DMPC, in which each agent should monitor two neighbors that provide extreme control input values and disregard these extreme values, has been proposed. 10 Furthermore, a cyber-attack problem of a consensus-based distributed control scheme for distributed energy storage systems has also been addressed, 11 where the approach involves a fuzzy-logic-based detection and a consensus-based leader-follower distributed control scheme.…”
Section: Introductionmentioning
confidence: 99%
“…10,11 For instance, a secure dual-decomposition-based DMPC, in which each agent should monitor two neighbors that provide extreme control input values and disregard these extreme values, has been proposed. 10 Furthermore, a cyber-attack problem of a consensus-based distributed control scheme for distributed energy storage systems has also been addressed, 11 where the approach involves a fuzzy-logic-based detection and a consensus-based leader-follower distributed control scheme. Related to the cyber-security issue of cyber-physical systems, the work of Pasqualetti et al 12 provides a mathematical framework for attack detection and monitoring, particularly for deterministic systems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, [8] addresses a cyber-attack problem of a consensus-based distributed control scheme for distributed energy storage systems. The proposed approach in [8] includes a fuzzy-logic-based detection and a consensus based leader-follower distributed control scheme. Related to the cyber-security issue of cyber physical systems, in particular power systems, the work of [9] provides a mathematical framework for attack detection and monitoring.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, we also provide a decentralized sub-optimality certificate of our proposed approach. Differently from [8], we consider a DMPC scheme to act as an energy management. Thus, our work is more related to [7] than the approaches discussed in [8], [10]- [12].…”
Section: Introductionmentioning
confidence: 99%