2022
DOI: 10.1109/tsg.2022.3159582
|View full text |Cite
|
Sign up to set email alerts
|

Secure Sampled-Data Observer-Based Control for Wind Turbine Oscillation Under Cyber Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 41 publications
0
5
0
Order By: Relevance
“…Wind-based energy units were once considered immune to cyber-attacks, but in March 2019, a wind power facility in Salt Lake City, USA, fell victim to an attack that disrupted control over 500 megawatts of wind turbines. This incident highlighted the need for robust cyber security measures in the wind energy sector, leading the U.S. Department of Energy to prioritise strategies for protecting wind units against cyber threats [50]. Denial of service (DoS) and deception attacks, such as false data injection, are common types of adversarial actions targeting power and networked control systems.…”
Section: Data Security and Privacy Concernsmentioning
confidence: 99%
See 2 more Smart Citations
“…Wind-based energy units were once considered immune to cyber-attacks, but in March 2019, a wind power facility in Salt Lake City, USA, fell victim to an attack that disrupted control over 500 megawatts of wind turbines. This incident highlighted the need for robust cyber security measures in the wind energy sector, leading the U.S. Department of Energy to prioritise strategies for protecting wind units against cyber threats [50]. Denial of service (DoS) and deception attacks, such as false data injection, are common types of adversarial actions targeting power and networked control systems.…”
Section: Data Security and Privacy Concernsmentioning
confidence: 99%
“…When DFIG-based wind power plants are connected to series compensated transmission systems, a phenomenon known as sub-synchronous interaction (SSI) can occur, posing security risks to wind turbines. However, there are several challenges related to SSI damping [50]:…”
Section: Data Security and Privacy Concernsmentioning
confidence: 99%
See 1 more Smart Citation
“…The event-triggered controller has the role of decreasing occupation of the communication channel when attacks happen. Another paper on the use of observers to detect cyber attacks on wind energy systems is [74]. Reference [75] presents an observer designed for a wind-battery energy storage hybrid system.…”
Section: Observers For Wind Turbine Energy Systemsmentioning
confidence: 99%
“…These cooperative tasks mainly include formation control, leader-following, containment, and consensus. Consensus has attracted overwhelming attention due to its vast applications in many areas such as estimation in sensor networks (Meng and Chen, 2014), attitude alignment for spacecrafts (Ren, 2007), and control of microgrids Amini et al, 2022a), to name a few. This article studies the consensus problem for general linear MASs under a class of distributed cyber attacks, namely denial of service, and an advanced class of event-based control scheme referred to as the dynamic event-triggering control.…”
Section: Introductionmentioning
confidence: 99%