Mitigation of severe false data injection attacks (FDIAs) in marine current turbine (MCT) type 4 synchronous generator renewable energy using promoted backstepping method

RENEWABLE ENERGY(2024)

引用 0|浏览8
暂无评分
摘要
False data injection attack (FDIA) is kind of the most important and prevalent cyber attacks, influencing in power systems and renewable energy resources in microgrids (MGs). The destructive effects caused by FDIAs in the voltage components of synchronous generator with full converter in AC microgrid (ACMG) renewable energy production would seriously damage the DC link voltage, network frequency and also, the active power. The extracted voltage components in the d and q axes to control the grid side converter (GSC) as the main control section, are the important signals for power control process of the synchronous generator with wind or marine current turbine (MCT). In this regards and due to the nonlinear behavior caused by cyber attacks in the generator control process, the robust performance of modified nonlinear backstepping method would be an appropriate alternative, instead of the conventional linear control including PI controllers. Thus, a remedial action against various FDIAs caused in the voltage control commands of the GSC is proposed. Moreover, promotion of the backstepping control by combining with the switching terms, adopted from the higher order super twisting sliding mode control (HOSTSMC), the performance of the proposed method would be precisely robust. To verify the proposed method, severe FDIAs by injecting various constant values, periodic and also, noisy signals are our case studies which are simulated via MATLAB software in the weak grid connect and standalone operation modes.
更多
查看译文
关键词
False data injection attack (FDIA),Grid side converter (GSC),DC link voltage,Active power,Marine current turbine (MCT),Renewable energy,Power management system
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要