2021
DOI: 10.1109/tnse.2021.3064933
|View full text |Cite
|
Sign up to set email alerts
|

Memory-Event-Triggered $H_{\infty }$ Load Frequency Control of Multi-Area Power Systems With Cyber-Attacks and Communication Delays

Abstract: This article focuses on H∞ load frequency control (LFC) of multi-area power systems with cyber-attacks and communication delays by a memory-event-triggered mechanism (METM). The dynamics of power system components, such as governor, turbine and power generator, are imitated by some circuit systems. To save the precious network bandwidth, a METM is constructed to decide which measured data should be transmitted as the control signal. In contrast to some memoryless ETMs, the proposed METM uses historic data over… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
21
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 55 publications
(21 citation statements)
references
References 34 publications
0
21
0
Order By: Relevance
“…O VER the past few years, the cooperative control of multiagent systems (MASs) has become one of the important research directions in the control field due to their speedy developments in many areas, such as intelligent transportation, multiple robot systems, unmanned marine vehicles, and many industrial facilities [1][2][3][4]. However, with the increase in the amount of information transmitted by agents and the open network environment, MASs are seriously threatened by cyber attacks, which destroy the integrity and authenticity of information [5]. As a result, the performance of MAS is deteriorating or even becoming unstable.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…O VER the past few years, the cooperative control of multiagent systems (MASs) has become one of the important research directions in the control field due to their speedy developments in many areas, such as intelligent transportation, multiple robot systems, unmanned marine vehicles, and many industrial facilities [1][2][3][4]. However, with the increase in the amount of information transmitted by agents and the open network environment, MASs are seriously threatened by cyber attacks, which destroy the integrity and authenticity of information [5]. As a result, the performance of MAS is deteriorating or even becoming unstable.…”
Section: Introductionmentioning
confidence: 99%
“…To overcome this difficulty, the event-triggered strategy has received widespread attention [21][22][23]. However, there are relatively few research results that consider the use of event-triggered strategy to solve the security problems of MAS under FDIA [5,16,17]. Furthermore, it is noteworthy that most of these results are based on undirected communication topology and do not take into account the impact of disturbance.…”
Section: Introductionmentioning
confidence: 99%
“…Different from DoS attack by blocking the connections of nets, deception attack aims to change the real value of control signal by injecting a false data, which makes it more deceptive. Considering multi-area NPSs with time-varying communication delay and deception attack, a resilient LFC approach is addressed in [25], in which the deception attack is described as a time-varying delay-dependent function. Reference [26] studies the H ∞ LFC issue of multi-area NPSs with DoS attack and deception attack, which is also modeled as a time-varying delay-dependent function.…”
Section: Introductionmentioning
confidence: 99%
“…As is well known, due to the limitation of communication and control resources, it is unrealistic that continuous update of the controller and continuous communication between UAVs are required in practical engineering. In order to address this issue, eventtriggered scheme (ETS) in multiple-UAV systems has attracted wide attention [13][14][15][16][17][18][19]. Considering the influence of input saturation on a multi-UAV system, the work in [20] probed into the problem of implementing predefined configuration in a distributed finitetime ETS.…”
Section: Introductionmentioning
confidence: 99%