Stabilization of DC Microgrids Under Cyber Attacks: Optimal Design and Sensitivity Analysis

Minrui Leng, Subham Sahoo*, Frede Blaabjerg

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

1 Citation (Scopus)
110 Downloads (Pure)

Abstract

Due to increased efforts on digitizing the modern power electronic systems and microgrids, their operational reliability and stability are prone to the risk of cyber attacks. In this paper, we inspect the overlooked stability issues caused by cyber-attacks, and present an overall design insight for stabilization of microgrids under cyber attacks. Firstly, we shed light on the optimal design policy and sensitivity aspects of the solution for microgrids under cyber-attacks. These results are based on a describing function-based modeling method to map the stability region. Secondly, the sensitivity impact due to system parameter variations and stabilization gains on stability is theoretically investigated. In addition, the range of sensitivity of parameter variations with respect to cyber attacks are calculated. Based on different design requirements, optimal values are theoretically obtained and then tested on microgrids having different parameters in a simulation environment, which justifies the ruggedness of the proposed design approach. We provide a generalized philosophy, which can be easily extended to the overall design, stability and parameter sensitivity of cyber-physical energy systems.
Original languageEnglish
Article number10130073
JournalI E E E Transactions on Smart Grid
Volume15
Issue number1
Pages (from-to)113 - 123
Number of pages11
ISSN1949-3053
DOIs
Publication statusPublished - Jan 2024

Keywords

  • Cyber Attacks
  • Cybersecurity
  • Describing Function
  • Microgrids
  • Optimal Design
  • Power Electronics
  • Power Systems
  • Sensitivity Analysis
  • Stability
  • Stealth Attacks

Fingerprint

Dive into the research topics of 'Stabilization of DC Microgrids Under Cyber Attacks: Optimal Design and Sensitivity Analysis'. Together they form a unique fingerprint.

Cite this