Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2021 Oct 24;21(21):7047. doi: 10.3390/s21217047

Resilient Adaptive Event-Triggered Load Frequency Control of Network-Based Power Systems against Deception Attacks

Xiao Zhang 1, Fan Yang 1,*, Xiang Sun 1
Editor: Yang Yue1
PMCID: PMC8588060  PMID: 34770354

Abstract

This paper investigates the problem of networked load frequency control (LFC) of power systems (PSs) against deception attacks. To lighten the load of the communication network, a new adaptive event-triggered scheme (ETS) is developed on the premise of maintaining a certain control performance of LFC systems. Compared with the existing ETSs, the proposed adaptive ETS can adjust the number of triggering packets, along with the state changes in the presence of deception attacks, which can reduce the average data-releasing rate. In addition, sufficient conditions can be derived, providing a trade-off between the limited network communication resources and the desired control performance of PSs. Finally, an application case is presented for the PSs to demonstrate the advantages of the proposed approach.

Keywords: load frequency control (LFC), deception attacks, adaptive event-triggered scheme (ETS), power systems (PSs)

1. Introduction

It is known that load frequency control (LFC) is a core component of PSs, which governs the system frequency and power exchange between regions in an optimally scheduled way [1,2,3]. Proportional-integral (PI) control has been widely utilized as a common control strategy in LFC [4,5,6]. For example, the authors in [6] studied the area LFC problem using fuzzy gain scheduling with a PI controller. With the development of the PSs, control signals are transmitted via a special power channel and an networked communication infrastructure, which brings new challenges to the PI controller design of LFC. Recently, a lot of the published literature [7,8,9,10,11] has concerned networked LFC. For instance, in [8], an active interference suppression control method was proposed for interconnected LFC systems.

Since the control signals of PSs are transmitted through the communication network, the potential risks of LFC systems increases, such as cyber attacks [12,13,14,15,16,17]. Cyber-attacks have receieved great attention in recent years [1,2]. Usually, cyber-attacks discussed in the literature include denial of service (DoS) attacks and deception attacks. The deception attackers launch a attack by destroying data integrity, such as tampering or replacing transmitted data. In [18], a new control method was proposed in distributed networks subject to deception attacks. The DoS attacks prevent data transmission by occupying the shared network channel, thereby degrading the system performance. A resilient ETS was well-designed in [19] for LFC systems under DoS attacks. In [14], the event-triggered control was studied for multi-agent systems under DoS attacks.

In NCS, the time-triggered scheme (TTS) is widely used to obtain the system information through the sampler, under which a fixed sampling interval can guarantee the desired performance even if there are uncertainties, time-delays, external disturbances, etc. [20,21]. However, too many “unnecessary” sampling signals are transmitted via the network, which leads to a waste of resources [22,23]. To deal with these shortcomings, an event-triggered scheme (ETS) has been widely applied to ease the network burden in recent decades. Compared to the TTS, the sampling data packets are released only when an event generated by some elaborate condition occurs, which can effectively improve resource utilization while ensuring a satisfied system performance [24,25,26,27]. However, due to the complexity of the system and the contradiction between better system performance and a lower data transmission rate, it is usually difficult to design the threshold of event-triggered conditions in the practical application system. Therefore, some state-of-the-art ETSs have been proposed, such as memory-based ETS and adaptive ETS. The authors in [28] proposed a memory-based ETS for T-S fuzzy systems, wherein some historical triggered data were utilized in the ETS so that the control performance can be ensured. The authors in [29,30] proposed an adaptive ETS for nonlinear systems, wherein the threshold can be adjusted with the system states. However, the problem of H-based LFC for network-based PSs under deception attacks by adopting adaptive ETS has not yet been reported, which prompted this study.

In sum, the goal of this work is to design an adaptive event-triggered controller for LFC systems subject to deception attacks. Differing from the existing ETS with a preset threshold, the improved adaptive ETS can adjust the number of triggering packets along with the state changes, under which the transmission rate can be cut down while maintaining the desired frequency performance of LFC systems under deception attacks.

2. Problem Formulation

Figure 1 displays a block diagram of a single-area LFC power system, where the area control error is presumed to be transmitted to the PI controller via a shared communication network.

Figure 1.

Figure 1

Structure of the LFC system with adaptive ETS.

2.1. Description of the LFC Systems

As shown in Figure 1, the model of the LFC systems can be indicated as follows [31]

Δa(s)=1sM+EΔHm(s)ΔHd(s),ΔHm(s)=11+sTchΔHv(s),ΔHv(s)=11+sTgu(s)1JΔa(s),ACE(s)=μΔa(s), (1)

where the symbols of the LFC system are listed in Table 1 [2].

Table 1.

Meanings of the symbols for the LFC system.

Symbol Meaning
Tg Time constant of governor
ΔHm(s) Mechanical output of the generator
ΔHd(s) External interference
u(s) Control output
ACE(s) Area control error
E Generator damping coefficient
M Moment of inertia of the generator
Δa(s) Frequency deviation
μ Frequency bias factor
J Speed drop
Tch Time constant of turbine
ΔHv(s) Position deviation of the valve

By applying the inverse Laplace transform to (1), it can be obtained that

Δa˙(t)=1M(ΔHm(t)ΔHd(t)EΔa(t)),ΔH˙m(t)=1Tch(ΔHv(t)ΔHm(t)),ΔH˙v(t)=1Tgu(t)1JΔa(t)ΔHv(t). (2)

Similar to [10], we can obtain the state-space representation for LFC systems, as follows

x^˙(t)=Ax^(t)+Bu(t)+Fω(t),y^(t)=Cx^(t), (3)

where x^(t)=[Δa(t)ΔHm(t)ΔHv(t)]T, ω(t)=ΔHd(t),y^(t)=ACE(t), and

A=EM1M001Tch1Tch1JTg01Tg,B=[001Tg]T,C=μ00,F=[1M00]T.

2.2. Adaptive ETS Controller Design

Simular to [10], the PI control strategy of the LFC systems is designed as

u(t)=KPACE(t)KI0tACE(s)ds, (4)

where KP denotes proportional gain and KI stands for integral gain.

For convenience of obtaining the controller gains, we transform the above PI control form into the output feedback problem. Then, we redefine the output variables

y(t)=[ACE(t)0tACE(s)ds]T.

Define K=[KPKI], and we can rewrite (4) as

u(t)=Ky(t). (5)

However, the sampled signal of ACE(t) of networked LFC systems will only be released to the PI controller via the network when the preset condition is satisfied [20]. To adjust the number of triggering packets in the LFC system, along with the state changes under deception attacks, an improved adaptive ETS is put forward, as follows:

tk+1h=tkh+minlN{lh|ϰT(ilh)ϕϰ(ilh)>σ(t)xT(tkh)ϕx(tkh)}, (6)

where h is the sampling period, ϕ is a positive symmetric matrix to be designed, tkh is the data-releasing instant, ϰ(ilh)=y(ilh)y(tkh), ilh=lh+tkh,lN,ilh(tkh,tk+1h],{t0,t1,t2,}{0,1,2,}, and

σ(t)=α12πarctanιy(ilh), (7)

wherein α(0,1) is the upper bound of σ(t), ι and α are given positive constants.

Remark 1.

It can be seen from (7) that σ(t) can adaptively adjusted to the system states by a arctangent function, which is different from the existing ETS with a constant threshold. When the system states fluctuate, σ(t) will be adaptively adjusted to a lower value, by which more packets with the system information can be released to the controller. When the system is stable, σ(t) will be automatically adjusted to a larger value to decrease the release rate of sampled packets.

Based on the condition (6), one can obtain that

y(tkh)=y(ilh)ϰ(ilh). (8)

Since the communication network is vulnerable to cyber attacks, the transmission signal can be written as

y^(t)=φ(t)ð(t)+(1φ(t))y(tkh), (9)

where the Bernoulli variable φ(t){0,1} is introduced to characterize the behavior of random deception attacks, E{φ(t)}=φ¯, E{(φ(t)φ¯)2}=ρ2 and the nonlinear attack signal ð(t) satisfies

ð(t)2Gy(t)2, (10)

where G is a known matrix with appropriate dimension.

Remark 2.

Cyber-attack has receieved great attention in recent years since it is one of the major threats to system stability [1,2,19]. Usually, cyber-attacks discussed in the literature include DoS attacks and deception attacks. The DoS attacks prevent data transmission by occupying the shared network channel, thereby degrading system performance. The deception attackers launch an attack by destroying data integrity, such as tampering with or replacing transmitted data. In this paper, we consider a kind of deception attack when investigating the LFC problem of PSs.

Remark 3.

When φ(t)=1, the true measurement data are replaced with the data of deception attacks. Otherwise, the true measurement data can be transmitted to the controller.

Considering the deception attacks, the output of the controller in (5) can be rewritten as

u(t)=Ky^(t). (11)

2.3. Closed-Loop Control of LFC Systems

According to the adaptive ETS in (6), the current signal is maintained by the zero-order holder (ZOH) until the next packet is transmitted. Therefore, we need to divide the interval Π = [m¯,n¯) into +1 pieces, where m¯=tkh+λtk, n¯=tk+1h+λtk+1. The network-induced delay at instant tkh is denoted by λtk and the holding interval Π can be divided into

Π=l=0Πl, (12)

where

Πl=[tkh+lh+ϑ,tk+1h+(l+1)h+ϑ),ϑ=λtk,l=0,1,,1,λtk+1,l=,+1=tk+1tk.

Define

λ(t)=tilh,

where ilh=tkh+lh, 0λtkλ(t)λM=λ¯, λM=h+max{λtk}. Then, y^(t) can be represented by

y^(t)=φ(t)ð(t)+(1φ(t)(y(tλ(t))ϰ(tλ(t))), (13)

for tΠl.

Redefining new variables x(t)=[Δa(t)ΔHm(t)ΔHv(t)0tACE(s)ds]T. Combine (4)–(13), the LFC systems (3) with an adaptive event-triggered PI controller against deception attacks can be formulated as

x˙(t)=Ax(t)(1φ(t))BKCx(tλ(t))+(1φ(t))BKϰ(tλ(t))+Fω(t)BKφ(t)ð(t),y(t)=Cx(t),tΠl. (14)

where

A=EM1M0001Tch1Tch01RTg01Tg0μ000,B=001Tg0,C=μ0000001,F=1M000.

The purpose of this article is to design the adaptive event-triggered PI controller subject to deception attacks, while ensuring that E{y(t)}E{γω(t)} holds with zero initial state conditions when ω(t)0, and the LFC system (14) could achieve stability with ω(t)=0.

3. Main Results

In this section, we use the Lyapunov–Krasovskii function method to derive the stability criteria of the LFC system. Then, the weight matrix of adaptive ETS and the controller gain will be calculated by LMIs. The statement of sufficient conditions for the LFC system are shown in the following.

Theorem 1.

For given scalars λ¯>0, α(0,1),φ¯(0,1),ρ, H norm bound γ, and matrix K, the system (14) is asymptotically stable, if there exist matrices P>0,P2>0,R>0,Q>0W>0 and a matrix U such that

R*UR>0, (15)
Ξ=Ξ11***Ξ21φ¯P2**Ξ31Ξ32(R+W)*Ξ41Ξ420(R+W)<0, (16)

where

Ξ11=Ψ11****Ψ21Ψ22***URUQR**(1φ¯)KTBTPαϕC0ϕ+αϕ*FTP000γ2I,Ψ11=ATP+PA+QRπ24W+CTC+φ¯CTGTP2GC,Ψ21=(φ¯1)CTKTBTP+RU+π24W,Ψ22=U+UT2Rπ24W+αCTϕC,Ξ21=[φ¯KTBTP0000],Ξ31=λ¯(R+W)Υ1,Ξ32=λ¯φ¯(R+W)BK,Ξ41=λ¯ρ(R+W)Υ2,Ξ42=λ¯ρ(R+W)BK,Υ1=A(φ¯1)BKC0(1φ¯)BKF,Υ2=0BKC0BK0.

Proof. 

Construct a Lyapunov–Krasovskii function in [31] for the system (14) as

V(t)=xT(t)Px(t)+tλ¯txT(s)Qx(s)ds+λ¯tλ¯tstx˙T(v)Rx˙(v)dvds+λ¯2ilhtx˙T(s)Wx˙(s)dsπ24ilhtx(s)x(ilh)TWx(s)x(ilh)ds. (17)

Define ϝ(t)=λ¯2x˙T(t)Rx˙(t)+λ¯2x˙T(t)Wx˙(t); then, the following results can be derived from (17),

E{V˙(t)}=2xT(t)PΛ1(t)+xT(t)Qx(t)xT(tλ¯)Qx(tλ¯)λ¯tλ¯tx˙T(s)Rx˙(s)dsπ24x(t)x(ilh)TWx(t)x(ilh)+E{ϝ(t)}, (18)

where

E{ϝ(t)}=λ¯2Λ1T(t)(R+W)Λ1(t)+λ¯2ρ2Λ2T(t)(R+W)Λ2(t),Λ1(t)=Ax(t)(1φ¯)BKCxtλ(t)+(1φ¯)BKϰ(tλ(t))+Fω(t)φ¯BKð(t),Λ2(t)=BKϰ(tλ(t))BKCx(tλ(t))+BKð(t).

From the adaptive ETS (6), one can obtain

σ(t)[y(ilh)ϰ(ilh)]Tϕ[y(ilh)ϰ(ilh)]ϰ(ilh)Tϕϰ(ilh)0. (19)

According to inequality (10), it has

φ¯yT(t)GTP2Gy(t)φ¯ðT(t)P2ð(t)0, (20)

where P2 is a positive symmetric matrix.

Define Ω(t)=γ2ωT(t)ω(t)yT(t)y(t); then, combining (15)–(20), and using Schur complement lemma and the method in [31] follows:

E{V˙(t)}E{ΨT(t)ΞΨ(t)}+E{Ω(t)}, (21)

where

ΨT(t)=[xT(t)xT(tλ(t))xT(tλ¯)ϰT(tλ(t))ωT(t)ðT(t)].

According to (15) and (16), we can conclude that E{ΨT(t)ΞΨ(t)}0, which means that

E{V˙(t)}<E{Ω(t)}. (22)

Taking the integration on both sides for (22) from 0 to +, we have

E{V(+)V(0)}<E{0+Ω(t)dt}. (23)

The LFC systems (14) are asymptotically stable with zero initial conditions when ω(t)=0, and E{y(t)}E{γω(t)} when ω(t)0. The proof is complete. □

Theorem 2.

For given scalars λ¯>0, α(0,1),φ¯(0,1),ρ, H norm bound γ, the system (14) is asymptotically stable, if there are symmetric and positive definite matrices L, X,Q˜,W˜,R˜, matrices U˜ and N with appropriate dimensions, such that the following linear matrix inequalities hold:

CX=LC, (24)
R˜*U˜R˜>0, (25)
Ξ˜=Θ˜11**Θ˜21Θ˜22*Θ˜310Θ˜33<0, (26)

where

Θ˜11=Ξ˜11*****Ξ˜21Ξ˜22****U˜R˜U˜Q˜R˜***(1φ¯)NTBTαϕ˜C0ϕ˜+αϕ˜**Ξ˜51000γ2I*φ¯NTBT0000φ¯L,Ξ˜11=XAT+AX+Q˜R˜π24W˜,Ξ˜21=(φ¯1)CTNTBT+R˜U˜+π24W˜,Ξ˜22=2R˜+U˜+U˜Tπ24W˜+αCTϕ˜C,Ξ˜51=FT,Θ˜21=λ¯AXλ¯(1φ¯)BNC0λ¯(1φ¯)BNλ¯Fλ¯φ¯BN0λ¯ρBNC0λ¯ρBN0λ¯ρBN,Θ˜22=diag2ζ0X+ζ02(R+W),2ζ1X+ζ12(R+W),Θ˜31=LC00000φ¯GLC00000,Θ˜33=diag{I,L}.

Then, the controller gain is derived by K=NL1.

Proof. 

Define Q˜=XQX,KL=N,X=P1,W˜=XWX>0,R˜=XRX,U˜=XUX, appropriate dimension matrix L=P21,ϕ˜=LϕL.

Using pre- and post-multiplying (15) with H1 and pre- and post-multiplying (16) with H2, one can see that (25) and (27) hold, where H1 = diag {X,X}, H2 = diag {X,X,X,L,I,L,(R+W)1,(R+W)1}.

Ξ=Θ11**Θ21Θ22*Θ310Θ33<0, (27)

where

Θ11=Ξ11*****Ξ21Ξ22****U˜R˜U˜Q˜R˜***(1φ¯)LKTBTαLϕCX0ϕ˜+αϕ˜**Ξ51000γ2I*φ¯LKTBT0000φ¯L,Ξ11=XAT+AX+Q˜R˜π24W˜,Ξ21=(φ¯1)XCTKTBT+R˜U˜+π24W˜,Ξ22=2R˜+U˜+U˜Tπ24W˜+αXCTϕCX,Ξ51=FT,Θ21=λ¯AXλ¯(1φ¯)BKCX0λ¯(1φ¯)BKLλ¯Fλ¯φ¯BKL0λ¯ρBKCX0λ¯ρBKL0λ¯ρBKL,Θ22=diag(R+W)1(R+W)1,Θ31=CX00000φ¯GCX00000,Θ33=diag{I,L}.

Noting that (ζRP)R1(ζRP)0, ζ>0, it is easy to see that PR1Pζ2R2ζP. Define H3=diag{I,I,I,I,I,I,P,P,I,I} and H4=diag{I,I,I,I,I,I,X,X,I,I}. By using CX and N instead of LC and KL, and pre- and post-multiplying (27) with H3 and H4, respectively, one can obtain that the inequality (26) holds. This ends the proof. □

To solve the problem of equality (24) in Theorem 2, we use the optimization algorithm in [32], which can be expressed as

κI(LCCX)T(LCCX)I<0,κ0, (28)

where κ>0 is a small enough constant. Furthermore, the controller gain could be calculated by (25), (26) and (28).

4. Simulation Examples

An application example of LFC systems in [33,34] is given to verify the efficacy of the method, whose nominal values are listed in Table 2.

Table 2.

System parameters utilized in simulintion section.

Physical Quantity M (kg·m2) J (Hz p.u. MW1) Tg (s) Tch (s) μ E
Values 0.1667 2.4 0.08 0.3 0.425 0.0083

Select the attack function ð(t) = −tanh Gy(t)[2] and G = diag{0.8,0.1}. The mathematic expectation of the deception attack is given as φ¯=0.5. The disturbance is chosen as

ω(t)=0.5cos(0.1t),15t200,otherwise.

Next, two cases are utilized to manifest the proposed method for LFC systems.

Case 1: The impact of deception attacks is not considered in the controller design in this case. Give the parameters ζ0=ζ1=0.01,κ=0.1. Choose the adaptive law parameters α=0.8, ι=80, sampling period h=0.05, the upper bound of network-induced delay λ¯=0.001, and H performance index γ=15. Then, the controller gain and weighting matrix can be figured out by Theorem 2 as follows

K=0.06270.2561,ϕ=0.36540.42980.42982.1692.

It is assumed that the initial condition of system is x(0)=[1.510.20]T. The results are obtained in Figure 2, Figure 3, Figure 4 and Figure 5. The state responses of the LFC system in Case 1 are shown in Figure 2, which indicates that the LFC system is stable after 60 s. Figure 3 illustrates the responses of control input. The adaptive law σ(t) is shown in Figure 4, where the curve finally converges to the upper bound α=0.8, which indicates that the amount of transmitted signals is greatly reduced when the system is stable. Figure 5 illustrates the deception attack signals of simulation.

Figure 2.

Figure 2

State responses of the LFC system in Case 1.

Figure 3.

Figure 3

Control input of LFC systems in Case 1.

Figure 4.

Figure 4

The threshold σ(t) of the LFC system with the adaptive ETS in Case 1.

Figure 5.

Figure 5

Deception attacks with φ¯=0.5.

Case 2: The impact of deception attacks in the design process of the controller is considered, and the mathematic expectation of the deception attack is given as φ¯=0.5. The other parameters are the same as those in Case 1. Then, we can obtain the controller gain and weighting matrix by Theorem 2 as follows

K=0.03740.5270,ϕ=0.27620.30040.30044.3447.

The simulated results of Case 2 are shown in Figure 6, Figure 7 and Figure 8. Figure 6 depicts the system state trajectories, from which one can see that the state response curves of the turbine output power ΔHm and frequency deviation Δa of the closed-loop system subjected to changes in load demand. Compared to Figure 2 in Case 1, the turbine output power ΔHm and the system frequency deviation Δa approach zero in a shorter time, which indicates the use of controller in Case 2 can better mitigate the impact of deception attacks and suppress the fluctuations in system frequency and restore the stability of the system. The control input of the LFC system based on adaptive ETS are displayed in Figure 7.

Figure 6.

Figure 6

State responses of the LFC system based on the adaptive ETS in Case 2.

Figure 7.

Figure 7

Control input of the LFC system based on the adaptive ETS in Case 2.

Figure 8.

Figure 8

The threshold σ(t) of the system with the adaptive ETS in Case 2.

Figure 8 exhibits the threshold σ(t) of the system with adaptive ETS, where the triggering threshold is automatically adjusted even if the system suffers from the disturbance. When the system is stable, the adaptive threshold converges to a constant.

To reflect the merits of the proposed method in saving the network bandwidth, we compare the adaptive ETS with the conventional ETS as follows:

  • (i)

    Consider σ(t) in adaptive ETS (6) with the parameters α=0.8,ι=1.

  • (ii)
    The ETS in (6) with a fixed threshold σ¯ is considered, which is reduced to a conventional ETS. Without loss of generality, the threshold is selected to be an average value that can be calculated by
    σ¯=ν=0NDSσνNDS, (29)
    where νN, σν denotes the ν-th the triggering threshold in adaptive ETS (6) at the ν-th sampling instant, and NDS is the number of data samplings.

Using LMIs, one can obtain the controller gains of two ETSs, which are listed in Table 3. The event-triggered constant σ¯=0.7 is calculated by (29) within 60 s.

Table 3.

Controller gains of two ETSs.

Schemes Controller Gains K
General ETS with fixed threshold (σ¯ = 0.7) [0.0393 0.5584]
This work [0.0374 0.5270]

Figure 9 and Figure 10 plot the triggering and releasing intervals of the discussed system under two schemes, in which fewer sampling packets are released over the network under the adaptive ETS. For better analysis, the statistical results of the NDS, and the packet-releasing (NPR) and data-releasing rate (DRR) for two ETSs are written in Table 4, wherein DRR=NPRNDS.

Figure 9.

Figure 9

Release instants and release intervals with σ¯ = 0.7.

Figure 10.

Figure 10

Release instants and release intervals with the adaptive ETS.

Table 4.

The number of packets transmitted in 60 s with sampling period h=0.05.

Schemes NDS NPR DRR
General ETS with fixed threshold (σ¯ = 0.7) 1200 43 3.58%
This work 1200 31 2.58%

As shown in Table 4, the number of sampling data is 1200 within 60 s. Under the adaptive ETS (6) proposed in this paper, the number of released packets is 31, and the DRR is 2.58%. Compared to the DRR = 3.58% of the conventional ETS, the proposed adaptive ETS can significantly reduce the transmission of unnecessary packets. This indicates that more communication resources can be saved by utilizing our developed adaptive ETS.

5. Conclusions

The problem of H LFC has been addressed for LFC systems under deception attacks by applying the developed adaptive ETS in this paper. To solve the issues of limited communication resources and deception attacks, a new adaptive ETS has been proposed, by which the thresholds for event-triggered conditions could be adapted to the changes in the system state under deception attacks. Based on the adaptive ETS, the average data released are lower than under the conventional ETS, and the perfomance of LFC systems subject to deception attacks can be guaranteed. Finally, the simulation results demonstrate the reliability of our proposed scheme. In future research, actuator saturation for LFC systems under cyber attacks will be worth consideration under the proposed adaptive ETS.

Author Contributions

All of the authors contributed substantially to this work: Conceptualization, X.Z. and X.S.; Methodology, F.Y. and X.Z.; Software, X.Z. and X.S.; Formal Analysis, X.Z.; Investigation, F.Y. and X.S.; Resources, F.Y.; Data Curation, X.Z.; Writing-Original Draft Preparation, Review and Editing, X.Z., F.Y. and X.S.; Project Administration, F.Y.; Funding Acquisition, F.Y. and X.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by National Natural Science Foundation of China Grant No. 52005266, No. 62103193 and Postgraduate Research & Practice Innovation Program of Jiangsu Province Grant No. KYCX20_0855.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Hossain M.M., Chen P. Observer-based event triggering H∞ LFC for multi-area power systems under DoS attacks. Inf. Sci. 2021;543:437–453. doi: 10.1016/j.ins.2020.07.042. [DOI] [Google Scholar]
  • 2.Liu J., Gu Y., Zha L., Liu Y., Cao J. Event-triggered H∞ load frequency control for multiarea power systems under hybrid cyber attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019;49:1665–1678. doi: 10.1109/TSMC.2019.2895060. [DOI] [Google Scholar]
  • 3.Zhang C.K., Jiang L., Wu Q., He Y., Wu M. Delay-dependent robust load frequency control for time delay power systems. IEEE Trans. Power Syst. 2013;28:2192–2201. doi: 10.1109/TPWRS.2012.2228281. [DOI] [Google Scholar]
  • 4.Pappachen A., Fathima A.P. Critical research areas on load frequency control issues in a deregulated power system: A state-of-the-art-of-review. Renew. Sustain. Energy Rev. 2017;72:163–177. doi: 10.1016/j.rser.2017.01.053. [DOI] [Google Scholar]
  • 5.Tang Y., He H., Wen J., Liu J. Power system stability control for a wind farm based on adaptive dynamic programming. IEEE Trans. Smart Grid. 2017;6:166–177. doi: 10.1109/TSG.2014.2346740. [DOI] [Google Scholar]
  • 6.Chang C., Fu W. Area load frequency control using fuzzy gain scheduling of PI controllers. Electr. Power Syst. Res. 1997;42:145–152. doi: 10.1016/S0378-7796(96)01199-6. [DOI] [Google Scholar]
  • 7.Liao K., Xu Y. A robust load frequency control scheme for power systems based on second-order sliding mode and extended disturbance observer. IEEE Trans. Ind. Inf. 2017;14:3076–3086. doi: 10.1109/TII.2017.2771487. [DOI] [Google Scholar]
  • 8.Liu F., Li Y., Cao Y., She J., Wu M. A two-layer active disturbance rejection controller design for load frequency control of interconnected power system. IEEE Trans. Power Syst. 2015;31:3320–3321. doi: 10.1109/TPWRS.2015.2480005. [DOI] [Google Scholar]
  • 9.Liu X., Su X., Yang R. Event-triggered sliding-mode control for multi-area power systems. IEEE Trans. Ind. Electron. 2017;64:6732–6741. [Google Scholar]
  • 10.Wen S., Yu X., Zeng Z., Wang J. Event-triggering load frequency control for multiarea power systems with communication delays. IEEE Trans. Ind. Electron. 2016;63:1308–1317. doi: 10.1109/TIE.2015.2399394. [DOI] [Google Scholar]
  • 11.Liu S., Liu P.X. Distributed model-based control and scheduling for load frequency regulation of smart grids over limited bandwidth networks. IEEE Trans. Ind. Inf. 2017;14:1814–1823. doi: 10.1109/TII.2017.2766666. [DOI] [Google Scholar]
  • 12.Basomingera R., Choi Y.J. Learning from routing information for detecting routing misbehavior in ad hoc networks. Sensors. 2020;20:6275. doi: 10.3390/s20216275. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 13.Gu Z., Park J.H., Yue D., Wu Z.G., Xie X.P. Event-triggered security output feedback control for networked interconnected systems subject to cyber-attacks. IEEE Trans. Syst. Man Cybern. Syst. 2020 doi: 10.1109/TSMC.2019.2960115. [DOI] [Google Scholar]
  • 14.Peng C., Yue D., Tian E., Gu Z. Observer-based fault detection for networked control systems with network quality of services. Appl. Math. Modell. 2010;34:1653–1661. doi: 10.1016/j.apm.2009.09.014. [DOI] [Google Scholar]
  • 15.Junior L., Cristino W., Moraes D., Coreixas C. A triggering mechanism for cyber-attacks in naval sensors and systems. Sensors. 2021;21:3195. doi: 10.3390/s21093195. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 16.Fantacci R., Nizzi F., Pecorella T., Pierucci L., Roveri M. False data detection for fog and internet of things networks. Sensors. 2019;19:4235. doi: 10.3390/s19194235. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 17.Yan S., Gu Z., Park J.H. Memory-event-triggered H∞ load frequency control of multi-area power systems with cyber-attacks and communication delays. IEEE Trans. Netw. Sci. Eng. 2021;8:1571–1583. doi: 10.1109/TNSE.2021.3064933. [DOI] [Google Scholar]
  • 18.Gu Z., Sun X., Lam H.K., Yue D., Xie X. Event-based secure control of T–S fuzzy based 5-DOF active semi-vehicle suspension systems subject to DoS attacks. IEEE Trans. Fuzzy Syst. 2021 doi: 10.1109/TFUZZ.2021.3073264. [DOI] [Google Scholar]
  • 19.Peng C., Li J., Fei M. Resilient event-triggering H∞ load frequency control for multi-area power systems with energy-limited DoS attacks. IEEE Trans. Power Syst. 2017;32:4110–4118. doi: 10.1109/TPWRS.2016.2634122. [DOI] [Google Scholar]
  • 20.Yue D., Tian E., Han Q.L. A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control. 2013;58:475–481. doi: 10.1109/TAC.2012.2206694. [DOI] [Google Scholar]
  • 21.Gu Z., Yue D., Tian E. On designing of an adaptive event-triggered communication scheme for nonlinear networked interconnected control systems. Inf. Sci. 2018;422:257–270. doi: 10.1016/j.ins.2017.09.005. [DOI] [Google Scholar]
  • 22.Yan S., Gu Z., Nguang S.K. Memory-event-triggered H∞ output control of neural networks with mixed delays. IEEE Trans. Neural Netw. Learn. Syst. 2021 doi: 10.1109/TNNLS.2021.3083898. [DOI] [PubMed] [Google Scholar]
  • 23.Zhang C., Feng G., Qiu J., Shen Y. Control synthesis for a class of linear network-based systems with communication constraints. IEEE Trans. Ind. Electron. 2013;60:3339–3348. doi: 10.1109/TIE.2012.2200226. [DOI] [Google Scholar]
  • 24.Bemani A., Björsell N. Distributed event triggering algorithm for multi-agent system over a packet dropping network. Sensors. 2021;21:4835. doi: 10.3390/s21144835. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 25.Hu S., Yue D., Yin X., Xie X., Ma Y. Adaptive event-triggered control for nonlinear discrete-time systems. Int. J. Robust Nonlinear Control. 2016;26:4104–4125. doi: 10.1002/rnc.3550. [DOI] [Google Scholar]
  • 26.Yan S., Shen M., Nguang S.K., Zhang G. Event-triggered H∞ control of networked control systems with distributed transmission delay. IEEE Trans. Autom. Control. 2019;65:4295–4301. doi: 10.1109/TAC.2019.2953460. [DOI] [Google Scholar]
  • 27.Liu Y., Chen Y., Li M. Dynamic event-based model predictive load frequency control for power systems under cyber attacks. IEEE Trans. Smart Grid. 2020;12:715–725. doi: 10.1109/TSG.2020.3022094. [DOI] [Google Scholar]
  • 28.Gu Z., Shi P., Yue D., Yan S., Xie X. Memory-based continuous event-triggered control for networked T–S fuzzy systems against cyber-attacks. IEEE Trans. Fuzzy Syst. 2020;29:3118–3129. doi: 10.1109/TFUZZ.2020.3012771. [DOI] [Google Scholar]
  • 29.Gu Z., Shi P., Yue D., Ding Z. Decentralized adaptive event-triggered H∞ filtering for a class of networked nonlinear interconnected system. IEEE Trans. Cybern. 2018;49:1570–1579. doi: 10.1109/TCYB.2018.2802044. [DOI] [PubMed] [Google Scholar]
  • 30.Gu Z., Shi P., Yue D. An adaptive event-triggering scheme for networked interconnected control system with stochastic uncertainty. Int. J. Robust Nonlinear Control. 2017;27:236–251. doi: 10.1002/rnc.3570. [DOI] [Google Scholar]
  • 31.Peng C., Zhang J., Yan H. Adaptive event-triggering H∞ load frequency control for network-based power systems. IEEE Trans. Ind. Electron. 2017;65:1685–1694. doi: 10.1109/TIE.2017.2726965. [DOI] [Google Scholar]
  • 32.Gu Z., Fei S.M., Zhao Y.Q., Tian E.G. Robust control of automotive active seat-suspension system subject to actuator saturation. J. Dyn. Syst. Meas. Control. 2014;136:041022. doi: 10.1115/1.4026833. [DOI] [Google Scholar]
  • 33.Pham T.N., Nahavandi S., Trinh H. Static output feedback frequency stabilization of time-delay power systems with coordinated electric vehicles state of charge control. IEEE Trans. Power Syst. 2016;32:3862–3874. doi: 10.1109/TPWRS.2016.2633540. [DOI] [Google Scholar]
  • 34.Tian E., Peng C. Memory-based event-triggering H∞ load frequency control for power systems under deception attacks. IEEE Trans. Cybern. 2020;50:4610–4618. doi: 10.1109/TCYB.2020.2972384. [DOI] [PubMed] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Not applicable.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES