Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Mais filtros











Base de dados
Intervalo de ano de publicação
1.
ISA Trans ; 143: 440-457, 2023 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-37867022

RESUMO

This paper proposes a cooperative load frequency control (LFC) strategy based on a multi-agent deep reinforcement learning (MADRL) framework for the multi-area power system in the presence of voltage source converters (VSCs) and electric vehicle (EV) aggregators under cyber-attacks. Different from the existing LFC model, a novel transfer function of VSCs is first improved by the space-vector technique and integrated with EV aggregators to develop a multi-area training environment. By installing the agent in different control areas and interacting state transition information between agents and the new environment, the MADRL-based control strategy is achieved for centralized training and decentralized execution. Thus, the proposed MADRL method can coordinate thermal turbines, VSCs, as well as EV aggregators in the different control areas. Furthermore, a suitable cyber-attack model that can circumvent bad data detection (BDD) is reconstructed according to the perspective of adversaries for the LFC system. Then the double critic networks and parameter updating policy are designed to eliminate and mitigate the fluctuations caused by cyber-attacks. The comparative simulation with other control strategies on a three-area test power system demonstrates the superior performance of the proposed MADRL-based approach.

2.
ISA Trans ; 143: 492-502, 2023 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-37827907

RESUMO

With the increasing penetration of renewable resources, more power electronic devices that need communication with control centers may bring a novel risk of cyber attacks. This paper investigates the vulnerability of the hierarchical control and proposes a false data injection attack (FDIA) constructing algorithm against voltage source converters. The attack can be accomplished via a physical attack generator or falsification via attacking supervisory control and data acquisition system. By developing the FDIA model against state estimation, the proposed attack model can circumvent bad data detection in the secondary control loop. The tests are carried out on a single converter infinite bus benchmark and an IEEE 34-bus system. The results show that the proposed attack model can mislead the system to produce threatening oscillation.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA