You are on page 1of 10

IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO.

5, SEPTEMBER 2020 3785

Resilient Networked AC Microgrids Under


Unbounded Cyber Attacks
Shan Zuo , Omar Ali Beg , Member, IEEE, Frank L. Lewis , Life Fellow, IEEE,
and Ali Davoudi , Senior Member, IEEE

Abstract—This paper considers a cooperative and adversar- better robustness (by removing the single point-of-failure) and
ial AC microgrid system consisting of cooperative leaders and solution scalability. These control techniques map inverters to
inverters, as well as adversarial attackers. The attackers aim to nodes on a sparse communication digraph, and assure that
destabilize the synchronization dynamics of the AC microgrid
by first intercepting the communication channels, penetrating all nodes reach an agreement on quantities of interests issued
the local state feedback, and pretending to be a cooperative by leader nodes (synchronization). In particular, consensus
neighbor, and then initiating malicious attacks by launching (synchronization with one leader) and containment (synchro-
unbounded injections. A fully distributed resilient control frame- nization with two leaders) control protocols are used to achieve
work is offered for the secondary frequency regulation and frequency regulation and voltage containment, respectively,
voltage containment to ensure system stability and preserve
bounded synchronization. In particular, a virtual resilient layer by using the local relative information exchanged among
with hidden networks is developed to integrate with the original neighboring inverters. However, their distributed nature could
cyber-physical layer. The proposed resilient control framework potentially make microgrids vulnerable to malicious attacks
is fully distributed without requiring any global information. A and infiltration, since each inverter only has access to its local
modified IEEE 34-bus test feeder benchmark system is emu- data and neighbors partial data, missing a global perspective.
lated in a controller/hardware-in-the-loop environment, where
the control objectives are met under different attack scenarios. There are generally two main approaches to address cyber
attacks in power grids. The first group of techniques [12]–[19],
Index Terms—AC microgrids, containment, inverters, synchro- first detect and identify the compromised agents, and then cor-
nization, resilient control, unbounded attacks.
rect or simply isolate them. Attack-correction methods usually
have strict restrictions on the number of misbehaving agents.
I. I NTRODUCTION For example, it is shown in [20], [21] that it is impractical
to restore the system state if more than half of the sensors
ICROGRIDS are evolving into cyber-physical systems
M with the large-volume adaptation of power electronic
devices, sophisticated software-intensive controllers, and com-
have been affected. On the other hand, simply isolating the
corrupted agents may potentially compromise the connectiv-
ity and performance of the sparse communication network.
munication networks. Analogous to the case of the legacy
Sufficient and necessary conditions for undetectable or uniden-
grid where embedded intelligence made it vulnerable to cyber
tifiable attacks are well discussed in the literature. It is shown
attacks, the presence of software-based controllers or com-
in [3], [22]–[24] that the attackers can take advantage of the
munication networks in microgrids makes them susceptible to
configuration of the power systems to launch malicious attacks
cyber compromises [1]–[7]. The impacts are more pronounced
to bypass the existing attack detection methods. The conditions
in inverter-based microgrids due to their lack of generational
for the existence of undetectable attacks and fundamental lim-
inertia, presence of a weak distribution grid, and often volatile
itations of various attack detection and identification monitors
and dynamic source and load profiles. Distributed coopera-
are analyzed in [25]. Distributed filters are proposed to detect
tive control of AC microgrids [8]–[11] have emerged as an
and identify attacks. However, these filters are computationally
alternative to centralized control paradigms since they offer
expensive and are difficult to implement. Moreover, one could
Manuscript received April 1, 2019; revised September 7, 2019 and January manipulate the good data to be inadvertently removed [26].
13, 2020; accepted March 17, 2020. Date of publication March 31, 2020; date Since one could not list and remove every potential threat, the
of current version August 21, 2020. This work was supported by the Office of
Naval Research under Grant N00014-17-1-2239. The work of Omar Ali Beg concept of attack-resilience is proposed. Hence, the second
was supported by the University of Texas at Arlington. Paper no. TSG-00486- solution category develops distributed attack-resilient con-
2019. (Corresponding author: Ali Davoudi.) trol protocols to enhance the resilience of the microgrids
Shan Zuo, Frank L. Lewis, and Ali Davoudi are with the
Electrical Engineering Department, University of Texas at Arlington, against potential noises/faults, without the need to detect, iden-
Arlington, TX 76019 USA (e-mail: shan.zuo@uta.edu; lewis@uta.edu; tify and correct/remove misbehaving agents [27], [28]. These
davoudi@uta.edu). unintentional noises/faults have been assumed to be bounded
Omar Ali Beg was with the University of Texas at Arlington, Arlington,
TX 76019 USA. He is now with the Electrical Engineering Department, signals, and have been collectively addressed in the context of
University of Texas Permian Basin, Odessa, TX 79762 USA (e-mail: conventional fault-tolerant control [29]. Direct adaptation to
beg_o@utpb.edu). adversarial attacks is not practical as such attacks are inten-
Color versions of one or more of the figures in this article are available
online at http://ieeexplore.ieee.org. tionally designed to maximize their damage and, hence, cannot
Digital Object Identifier 10.1109/TSG.2020.2984266 be assumed bounded [21]. Some approaches assume a certain
1949-3053 
c 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
3786 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 5, SEPTEMBER 2020

inverters and/or leaders, on the direct relative information


exchanged among inverters, and on the local state-feedback
of an inverter.
• resilient containment/consensus-based voltage/frequency
synchronization solutions are provided in the presence of
unbounded attacks to guarantee the UUB synchronization
performance and maintain the overall system stability, with-
out requiring any global information. In particular, a virtual
resilient control layer, with hidden networks, interconnects
with the original cyber-physical layer.
The rest of this paper is organized as follows: Section II
presents notations and the preliminaries of graph theory.
Section III reviews the standard cooperative control of AC
microgrids. Section IV incorporates the unbounded cyber
attacks and formulates the resilient synchronization prob-
lems of AC microgrids. Section V presents the fully dis-
tributed attack-resilient control framework for AC microgrids.
Fig. 1. A networked AC microgrid under different types of cyber attacks: The proposed method is studied in Section VI in a
(a) polluting the communication channels; (b) hijacking neighbor’s signals, or
pretending to be a cooperative neighbor; (c) distorting the local state-feedback controller/hardware-in-the-loop (CHIL) environment for the
of an inverter. attack scenarios illustrated in Fig. 1. Section VII concludes
the paper.

probabilistic model of an attack [30], which could be lim-


iting since attack nature and form might not be known a II. N OTATIONS AND P RELIMINARIES
priori. To the best of our knowledge, general unbounded cyber Notations: IN ∈ RN×N denotes the identity matrix. 1N ∈ RN
attacks on microgrids have neither been systematically studied represents a vector where all entries are one. The operator
nor have been addressed using a distributed resilient control diag{·} establishes a block-diagonal matrix using its elements.
framework. ⊗ denotes the Kronecker product. σmin (X) and σmax (X) are
We consider a networked multi-group AC microgrid con- the minimum and maximum singular values of matrix X.
sisting of cooperative leader nodes and inverters, as well as Preliminaries: A cooperative and adversarial islanded AC
adversarial attackers as illustrated in Fig. 1. In particular, we microgrid system is mapped on a time-invariant communica-
study three different attack categories. First, the attackers can tion digraph G , composed of N inverters, two leader nodes,
affect the signals on the communication channels among the and some adversarial nodes (attackers). Each inverter receives
leader nodes and the inverters. Second, the attackers can hijack direct relative information from inverters neighboring it on
the neighboring inverter or pretend to be a cooperative neigh- the communication digraph, including the cooperative invert-
bor and issue relative information/data to local inverter. Third, ers and leaders, as well as the adversarial attackers. The two
attackers can launch injections to the local state-feedback of leader nodes issue the upper and lower reference values to the
each inverter. These attack injections may be in any form, and inverters, and are called the upper and lower leaders, respec-
even unbounded. These could destabilize the synchronization tively. The sets of the inverters and the attackers are shown
mechanism, and demand a distributed attack-resilient control by F and A , respectively.
framework to assure that the uniformly ultimately bounded The connections among the local inverters are shown by
(UUB) voltage containment and frequency regulation of each G f = (W, E, A), where W shows the set of nodes, E ⊂
inverter is maintained. In that regard, the salient contributions W × W shows the set of edges, and A = [aij ] shows the
of this paper are: associated adjacency matrix. G f is a subgraph of G . An edge
• containment-based control approach is proposed to con- connecting node j to node i is shown by (wj , wi ), indicating
tain all voltage magnitudes in a prescribed range. In particular, the information flow from inverter j to inverter i. aij shows
we consider a sparse communication topology among invert- the edge weight (wj , wi ), and aij > 0 if (wj , wi ) ∈ E; other-
ers with two leader nodes with their references setting the wise, aij = 0. The in-degree matrix is D = diag(di ) ∈ RN×N ,
N
prescribed voltage boundaries. Identical frequency reference with di = j=1 aij . The Laplacian matrix is L = D − A.
is assigned to both leaders to achieve regulation on frequency {(wi , wk ), (wk , wl ), . . . , (wm , wj )} denotes a directed path from
terms. This is in contrast to the existing literature on cooper- inverter i to inverter j. gui and gli are pinning gains from the
ative control of AC microgrids, which mainly focuses on the upper and lower leaders to the ith inverter, respectively. gui > 0
voltage tracking strategy [9], [31] or regulating the average (respectively, gli > 0) if there exists a link from the upper
value of voltage magnitudes [32]–[34]. leader (respectively, lower leader) to the ith inverter; other-
• a cooperative and adversarial networked AC microgrid wise, gui = 0 (respectively, gli = 0). Gu = diag(gui ) and
is introduced with cooperative leaders and inverters, as well Gl = diag(gli ), ∀i ∈ F are diagonal matrices of pinning gains
as adversarial attackers. In particular, we consider different from the upper and lower leaders, respectively. hik is the pin-
types of unbounded attacks on the communication links among ning gain from the kth attacker to the ith inverter. hik > 0 if

Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
ZUO et al.: RESILIENT NETWORKED AC MICROGRIDS UNDER UNBOUNDED CYBER ATTACKS 3787

there exists a connection between the kth attacker and the ith information of the leader nodes, are
inverter; otherwise, one has hik = 0. ⎛
N
ufi = cfi ⎝ aij ωj − ωi + gui (ωref − ωi )
III. S TANDARD C OOPERATIVE S ECONDARY j=1 ⎞
C ONTROL OF AC M ICROGRIDS N
+ gli (ωref − ωi ) + aij mPj Pj − mPi Pi ⎠, (8)
One can adopt the nonlinear large-signal model of an
inverter [35] that ignores the switching artifacts and focuses on ⎛ j=1
N
its average-value model. Assuming inductive distribution lines,
uvi = cvi ⎝ aij vodj − vodi + gui vuref − vodi
the active and reactive powers delivered by the ith inverter at
the ith bus of the distribution network are
j=1 ⎞
⎧   N
⎨ Pi = vmag,i vbus,i sin(θi −βi ) , + gli vlref − vodi + aij nQj Qj − nQi Qi ⎠, (9)
Zi
2 (1) j=1
⎩ Qi = vmag,i vbus,i cos(θi −βi ) − vbus,i ,
Zi Zi
where cfi , cvi ∈ R > 0 are the coupling gains, ωref is the
where Zi shows the effective collective impedance of the frequency reference, and vuref and vlref are the bounds on voltage
inverter’s output filter and the connector between the inverter terms, respectively.
and the distribution network. Pi and Qi are the active and reac- It is worth noting that to regulate frequency, its reference
tive output powers of the ith inverter, respectively. vmag,i ∠θi is values for both the upper and lower leaders are set as ωref . On
the output voltage of the ith inverter and vbus,i ∠βi is the ith the other hand, to bound the voltage magnitudes to a prescribed
bus voltage. Relation (1) can be simplified to obtain droop range, the voltage references for the upper and lower lead-
mechanisms for (Pi , ωi ) and (Qi , vi ) and tune the inverter’s ers are set as vuref and vlref , respectively. That is, we try to
frequency and voltage achieve consensus-based and containment-based regulations
for frequency and voltage terms, respectively.
ωi = ωni − mPi Pi , (2) The droop set points, ωni and Vni , are then computed from
vmag,i = Vni − nQi Qi , (3) ufi and uvi as

where ωi is the angular frequency of the ith inverter. Tuning ωni = ufi d t, (10)

vmag,i is effectively the same as tuning the direct term of the
Vni = uvi d t. (11)
output voltage, vodi , after a proper reference frame transforma-
tion. ωni and Vni are the set points for the droop mechanism,
Based on (2) and (3), we reformulate (8) and (9) as
and are chosen at the secondary level. mPi and nQi are ⎛
droop coefficients chosen according to the power rating of N
the corresponding inverter. ufi = cfi ⎝ aij ωj + mPj Pj − ωi + mPi Pi
To coordinate inverters’ terminal frequency and voltage to j=1
their respective references, the secondary control provides ωni + gui ωref + mPi Pi − ωi + mPi Pi ⎞
and Vni locally by data exchange with its neighbors on a
communication digraph. Differentiating (2) and (3) yields + gli ωref + mPi Pi − ωi + mPi Pi ⎠

ω̇ni = ω̇i + mPi Ṗi = ufi , (4) N
V̇ni = v̇odi + nQi Q̇i = uvi , (5) = cfi ⎝ aij ωnj − ωni + gui ωn,ref − ωni
j=1 ⎞
where ufi and uvi are auxiliary control inputs.
The frequency and voltage control of N inverters can then + gli ωn,ref − ωni ⎠, (12)
be represented by synchronization problems for the following ⎛
linear and first-order multi-agent systems (MAS) N
⎧ uvi = cvi ⎝ aij vodj + nQj Qj − vodi + nQi Qi
⎨ ω̇1 + mP1 Ṗ1 = uf1 ,
⎪ j=1
.. (6) + gui vuref + nQi Qi − vodi + nQi Qi ⎞
⎪ .
⎩   
ω̇N + mPN ṖN = ufN ,
⎧ + gli vlref + nQi Qi − vodi + nQi Qi ⎠
⎨ v̇od1 + nQ1 Q̇1 = uv1 ,


.. (7)
⎪ . N
⎩ = cvi ⎝ aij Vnj − Vni + gui Vn,ref
u
− Vni
v̇odN + nQN Q̇N = uvN .
j=1 ⎞
Motivated by [36], with a slight modification of [37],  
the cooperative frequency and voltage control laws at + gli Vn,ref
l
− Vni ⎠, (13)
each inverter, based on the neighbors’ information and the

Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
3788 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 5, SEPTEMBER 2020

where ωn,ref = ωref + mPi Pi , Vn,refu = vuref + nQi Qi , and u , and V̄ l


systems. V̄i,j , V̄i,ref i,ref denote the corrupted transmitted
Vn,ref = vref + nQi Qi . While power sharing mechanisms are
l l measurements of Vj , Vref u , and V l at the ith inverter, respec-
ref
included in the control protocols (12) and (13), [9] shows that tively. V̄i,i denotes the corrupted feedback measurement of Vi .
the frequency and voltage of each inverter synchronize in the These potentially corrupted measurements can be expressed as
steady state, because of the relationship between the active ⎧

⎪ V̄i,j (t) = Vj (t) + σij (t),
power of each inverter (respectively, reactive power) and its ⎨ V̄ u (t) = V u (t) + σ u (t),
angular frequency (respectively, voltage magnitude). That is, to i,ref ref i ref (19)


l
V̄i,ref (t) = Vref l
(t) + σilref (t),
synchronize both ωi and mPi Pi (respectively, vodi and nQi Qi ), ⎩
we can directly synchronize ωni (respectively, Vni ). To this V̄i,i (t) = Vi (t) + σii (t),
end, combine (4) with (12) and (5) with (13) to obtain where σij (t), σiuref (t), σilref (t), and σii (t) denote injections

N launched by the attackers. It is seen that the attackers can
ω̇ni = cfi ⎝ aij ωnj − ωni + gui ωn,ref − ωni pretend to be cooperative neighbors and  issue direct relative
j=1 information to local inverters as shown in k∈A hik (Vk − V̄i,i )
⎞ in (18), intercept the communication channels among inverters
and leaders as shown in σij (t), σiuref (t), and σilref (t) in (19), and
+ gli ωn,ref − ωni ⎠, (14)
distort local feedback of an inverter as shown in σii (t) in (19).
⎛ Remark 1: In practice, AC microgrids may be compro-
N mised at the controller level, communication network, and the
V̇ni = cvi ⎝ aij Vnj − Vni + gui Vn,ref
u
− Vni physical power network. Given the existence of undetectable
j=1 attacks [3], this paper aims to develop fully distributed resilient

  control protocols to mitigate the adverse effects caused by
+ gli Vn,ref
l
− Vni ⎠. (15) the unbounded attack injections described in (18) and (19),
without any detection and elimination process.
Without loss of generality, we consider the following
IV. ATTACK M ODELING AND P ROBLEM F ORMULATION assumptions.
We first introduce unbounded cyber attacks, and then formu- Assumption 1: There exists a directed path from at least one
late the secondary resilient synchronization problems for net- voltage leader to each local inverter.
worked AC microgrids in the presence of unknown unbounded Assumption 2: V̇k , σ̇ij , σ̇iuref , σ̇ilref , and σ̇ii are bounded.
attacks. Remark 2: Assumption 1 is standard for cooperative control
of networked MAS to guarantee the network-level synchro-
A. Modeling of Unbounded Attacks nization performance. In a practical setting, the attackers may
have limited budgets to launch injections to the microgrid.
Herein, we only consider the attack modeling and stability
Hence, we suppose Assumption 2 holds. Yet, the attackers’
analysis of the secondary voltage control. This procedure can
injection values, Vk , σij , σiuref , and σilref can be unbounded.
be extended to the secondary frequency control.
This is in contrast to [27], [28] that consider bounded faults
The following definition is needed to introduce the
or noises.
unbounded attacks and to evaluate the convergence of the
resilient control protocols to be proposed.
B. Resilient Synchronization Problem Formulation
Definition 1: The signal x(t) is said to be
(i) bounded if ∃ ε > 0, such that We first analyze the vulnerability of the standard (con-
ventional) cooperative secondary control against unbounded
x(t) < ε, ∀t ≥ t0 ≥ 0. (16) attacks, and then formulate the resilient voltage synchroniza-
(ii) unbounded if it is not bounded. tion problem. Reformulate (18) as

(iii) ([38]) UUB with ultimate bound b if there exist positive N
constants b and c, independent of t0 ≥ 0, and for every a ∈ V̇i = cvi ⎝ aij V̄i,j − V̄i,i + gui V̄i,ref
u
− V̄i,i
(0, c), there is T = T(a, b) ≥ 0, independent of t0 , such that j=1

x(t0 ) ≤ a ⇒ x(t) ≤ b, ∀t ≥ t0 + T. (17)  
+ gli V̄i,ref
l
− V̄i,i + hik Vk − V̄i,i ⎠
For convenience, we use Vi to denote Vni . Then, (15) under k∈A
attacks becomes ⎛ ⎛ ⎞
⎛     N
N
= cvi ⎝ gui Vref
u
+ gli Vref
l
− ⎝ di + gui + gli Vi − aij Vj ⎠
V̇i = cvi ⎝ aij V̄i,j − V̄i,i + gui V̄i,ref
u
− V̄i,i j=1
j=1  
⎞ N
  + aij σij − di + gui + gli + hik σii
+ gli l
V̄i,ref − V̄i,i + hik Vk − V̄i,i ⎠. (18) j=1 l∈A
k∈A

 
where Vk is the state information of the kth attacker. Note + gui σiuref + gli σilref + hik (Vk − Vi )⎠. (20)
that the attackers can have any linear/nonlinear dynamical k∈A
Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
ZUO et al.: RESILIENT NETWORKED AC MICROGRIDS UNDER UNBOUNDED CYBER ATTACKS 3789

N
Denote the attack vector as δi = j=1 aij σij − Define the following global voltage synchronization error

(d + gu + gl + h )σ + (gu σ u + gl σ l ) + ⎛ ⎞−1
 i i i l∈A ik ii i i ref i i ref
h (V − V ). Then, (20) becomes γ
k∈A ik k i
ηv = V − ⎝ γ ⎠ γ 1N ⊗ Vref , (27)

  γ =u,l γ =u,l
V̇i = cvi ⎝ gui Vrefu
+ gli Vref
l
where ηv = [ηv1 T , . . . , ηT ]T . The following lemmas are
vN
⎛ ⎞ ⎞ required. 
  N Lemma 1 [40]: Given Assumption 1, γ =u,l γ is non-
− ⎝ di + gui + gli Vi − aij Vj ⎠ + δi ⎠. (21) singular and positive-definite.
j=1 Lemma 2 [40]: Given Assumption 1, the objective in (24)
is obtained if limt→∞ ηv (t) = 0.
Since Vk , σij , σiuref , and σilref can be unbounded, δi can be Next, we define the resilient voltage synchronization
unbounded. Therefore, the standard cooperative control (18) problem in the presence of unbounded attacks.
not only could not regulate the voltage terms, but also could Definition 3 (Resilient Voltage Synchronization Problem):
not guarantee the overall system stability. Under the unbounded attacks described in (18) and (19), the
Denote V = [V1T , . . . , VNT ]T , cv = diag(cvi ), and δ = resilient voltage synchronization problem designs a fully dis-
[δ1 , . . . , δNT ]T . Then, (21) has the following global form
T
tributed control protocols uvi in (5) for each inverter using only
   the local measurement such that, for all initial conditions, ηv
V̇ = cv Gu 1N ⊗ Vref u
+ Gl 1N ⊗ Vref
l
in (27) is UUB. That is, the voltage of each inverter converges
− (L + Gu + Gl )V + δ). (22) to a small neighborhood around the convex hull spanned by
the voltage references of the two leaders.
Next, we give some preliminaries on the synchronization of Note that the resilient frequency synchronization problem
MAS with multiple leaders. The distance from x ∈ Rn to the can be defined similarly, with a different control objective
set C ∈ Rn , in terms of the Euclidean norm, is defined by to make the each inverter’s frequency to converge to a small
neighborhood around the frequency reference.
dist (x, C) = inf x − y2 . (23)
y∈C
V. F ULLY D ISTRIBUTED R ESILIENT D ESIGN
Definition 2: The set C ⊆ Rn is convex when (1 − ε)x +
εy ∈ C, for any x, y ∈ C and any ε ∈ [0, 1] [39]. We present a fully distributed voltage containment frame-
Let VL = {Vref l , V u } be the bounds on the voltage ref- work resilient to unbounded attacks, by interconnecting the
ref
erence values. The convex hull of VL is defined as the original cyber-physical layer with a hidden resilient layer with
minimal convex set containing VL points, i.e., Co(VL ) = secure communication networks. The security of this hidden
l + εV u |ε ∈ [0, 1]}. Since V l and V u are both
{(1 − ε)Vref virtual layer is guaranteed by using the advanced Internet
ref ref ref
constant, Co(VL ) = {[Vref l , V u ]}. technology, e.g., software-defined networking [41], [42]. This
ref makes it difficult and expensive for attackers to compromise.
The secondary voltage control aims to converge the voltage
of each inverter into the convex hull spanned by the voltage Moreover, compared to the physical states of the local invert-
references issued by the two leaders, that is ers, the virtual states of the hidden resilient layer have no
physical meaning and, hence, are less observable.
lim dist(Vi (t), Co(VL (t))) = 0, ∀i ∈ F . (24) The states of the hidden resilient control later will be
t→∞ designed to stabilize the cooperative and adversarial AC
In the absence of an attack, V̄i,i = Vi , microgrids under unknown unbounded attacks. Let’s consider
V̄i,j = Vj , and hik = 0. Hence, V̇i = cvi the following overall system
 ⎛
( N j=1 aij (Vj − Vi ) + gi (Vref − Vi ) + gi (Vref − Vi )). Then, the
u u l l
N
synchronization with multiple leaders is guaranteed, i.e., (24) V̇i = cvi ⎝ aij V̄i,j − V̄i,i + gui V̄i,ref
u
− V̄i,i
holds for each inverter. Define j=1

1  
γ = L + Gγ , γ = u, l. (25)
2 + gli V̄i,ref
l
− V̄i,i + hik Vk − V̄i,i − δ̂i ⎠, (28)
γ γ k∈A
Note that L(1N ⊗ Vref ) = (D − A)(1N ⊗ Vref ) = 0, ∀γ = ⎛
u, l. Then, (22) can be rewritten as
N    
    V̂˙ i = cvi ⎝ aij V̂j − V̂i + gui Vref
u
− V̂i
1 1 j=1
V̇ = cv L + Gu 1N ⊗ Vref u
+ L + Gl ⎞
2 2  
  1  
1 + gli Vref
l
− V̂i + Ṽi ⎠, (29)
× 1N ⊗ Vrefl
− L + Gu + L + Gl V + δ
2 2
⎛ ⎞ ⎛ ⎞
N  
δ̂˙i = −cvi ⎝
γ
= cv ⎝ γ 1N ⊗ Vref − γ V + δ ⎠. (26) aij Ṽj − Ṽi − gui + gli Ṽi ⎠, (30)
γ =u,l γ =u,l j=1

Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
3790 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 5, SEPTEMBER 2020

Theorem 1: Consider the unbounded attacks described


in (18) and (19). Under Assumptions 1 and 2, and using
the cooperative system composed of (28), (29), and (30), the
global voltage synchronization error ηv in (27) is UUB. That
is, the resilient voltage synchronization problem is solved.
Proof: The global form of (28), (29), and (30) are
⎛ ⎞
γ
V̇ = cv ⎝− γ V + γ 1N ⊗ Vref + δ − δ̂ ⎠, (32)
γ =u,l γ =u,l
⎛ ⎞

V̂˙ = cv ⎝−
γ
γ V̂ + γ 1N ⊗ Vref + Ṽ ⎠, (33)
γ =u,l γ =u,l

δ̂˙ = cv γ Ṽ, (34)


γ =u,l

respectively, where δ̂ = [δ̂1T , . . . , δ̂NT ]T and Ṽ =


[Ṽ1T , . . . , ṼNT ]T . Define δ̃i = δi − δ̂i and the global form
δ̃ = [δ̃1T , . . . , δ̃NT ]T . Combing (32) and (33) yields
⎛ ⎞

Ṽ˙ = −cv ⎝ γ + IN ⎠Ṽ + cv δ̃. (35)


γ =u,l

From (34), we have


δ̃˙ = δ̇ − δ̂˙ = −cv γ Ṽ + δ̇. (36)
γ =u,l

Put (35) and (36) in the following compact from


        
Ṽ˙ −cv γ =u,l  γ + I N cv Ṽ 0
˙δ̃ =  + N . (37)
Fig. 2. Distributed resilient control framework in cooperative and adversarial
−cv γ =u,l γ 0N δ̃ δ̇
networked AC microgrids.
Denote χ = [ Ṽ T δ̃ T ]T and = [ 0N δ̇ T ]T . Then,
   
where V̂i is the local state of the hidden resilient layer, δ̂i is −cv γ =u,l  γ + I N cv
a compensational signal estimating the attack vector δi , and χ̇ =  χ+ . (38)
−cv γ =u,l γ 0N
Ṽi = Vi − V̂i . The virtual layer with secure hidden networks
computes the compensational signal δ̂i used in (28). By sub- Introducing ξ = Tχ with
 
tracting δ̂i from the cyber-physical layer, the adverse effects IN 0N
of the unknown unbounded attacks are compensated. T= . (39)
−IN IN
Figure 2 illustrates the proposed distributed resilient con-
trol framework for a networked AC microgrid. Each inverter Then, we have
   
has a DC source, a bridge, and internal control loops for −cv  γ + I cv
power, voltage, and current terms. On the secondary con- ξ̇ = T γ
 =u,l N
T−1 ξ + T
−cv γ =u,l γ 0N
trol level, a cyber layer is spanned among the inverters to   
exchange data/information using communication links. It is −cv γ =u,l γ cv
= ξ+
seen that the information flow on the cooperative and adversar- 0N −cv
ial cyber-physical layer may be attacked. The virtual resilient ≡ Uξ + . (40)
control layer is shielded from the attackers and has secure 
Given Assumption 1 and Lemma 1, γ =u,l γ is positive-
communication networks.
definite.  cv is also positive-definite,
 Since  we obtain that
Define the estimated global voltage synchronization error as −cv γ =u,l γ cv
⎛ ⎞−1 U = has eigenvalues with nega-
0N −cv
γ tive real parts, and hence is Hurwitz. Then, given any matrix
η̂v = V̂ − ⎝ γ ⎠ γ 1N ⊗ Vref , (31) Q = QT  0, there is a matrix P = PT  0, where
γ =u,l γ =u,l
PU + U T P = −Q. (41)
where η̂v = [η̂v1
T , . . . , η̂T ]T
and V̂ =
vN [V̂1T , . . . , V̂NT ]T .
Next,
Choosing the following Lyapunov function candidate
we analyze the resilience of these protocols against unbounded
attacks. V = ξ T Pξ, (42)

Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
ZUO et al.: RESILIENT NETWORKED AC MICROGRIDS UNDER UNBOUNDED CYBER ATTACKS 3791

and its time derivative is


V̇ = −ξ T Qξ + 2ξ T P
≤ −σmin (Q)ξ 2 + 2σmax (P)ξ  
2σmax (P) 
≤ 0, ∀ξ  ≥ . (43)
σmin (Q)
Given Assumption 2, it is straightforward to verify that
is bounded. Then, using the LaSalle’s invariance principle, we
(P) 
obtain that ξ is UUB with the ultimate bound of 2σmaxσmin (Q) .
Hence, χ is also UUB. That is, both Ṽ and δ̃ are UUB.
Next, we prove that the estimated global voltage syn-
chronization error η̂v in (31) is UUB. Using (31) and (33)
yields

η̂˙ v = V̂˙
⎛ ⎞
γ
= cv ⎝− γ V̂ + γ 1N ⊗ Vref + Ṽ ⎠
γ =u,l γ =u,l

= −cv γ η̂v + cv Ṽ. (44)


γ =u,l

Since − γ =u,l γ is Hurwitz and Ṽ is bounded, we sim- Fig. 3. Islanded IEEE 34-bus system augmented with four inverters and their
ilarly obtain that η̂v is UUB. Note that ηv = Ṽ + η̂v , we then communication networks under different attack scenarios.
finally obtain that ηv is UUB. This completes the proof.
Remark 3: As shown in Theorem 1, by integrating the inverters with identical component ratings (Rci = 0.03,
virtual resilient layer (29) and (30) with the original cyber- Lci = 0.35 mH, Rfi = 0.1, Lfi = 1.35 mH, and Cfi = 50 μF).
physical layer (28), we construct a stable system matrix for Inverters are interfaced with the distribution network via Y-Y,
the augmented estimation error dynamics with bounded dis- 480 V/24.9 kV, 400 kVA transformers. Each load is repre-
turbances. This guarantees the uniform ultimate boundedness sented by a balanced three-phase RL branch connected in a
of the overall system. star arrangement equivalent to 20 kW and 20 kVAr active and
Remark 4: The idea of a virtual system with a hidden reactive powers, respectively. The upper and lower reference
network, that interconnects with the original network, is given points, for the inverter’s voltage, are given as 340 V and 330 V,
in [43] to address leaderless consensus of undirected graphs respectively. The reference frequency is set to 60 Hz. Inverters
against attacks with linear dynamics. The extension of this and the distribution network are emulated in Typhoon HIL 604
idea in [44] addresses leader-follower consensus of directed units, distributed control routines are implemented in dSPACE
graphs under attacks with nonlinear dynamics. Note that these DS 1202 MicroLab Boxes (MLBX), and the communication
studies deal with bounded injections. among MLBX is achieved via a Netgear ProSAFE 24-port
Remark 5: Our method provides resiliency to unbounded Ethernet Smart Switch as shown in Fig. 4.
attacks without isolating the compromised agents. This is in
contrast to the existing defense mechanisms [12]–[19], where B. Controller Performance Assessment
an agent simply discards the corrupted data/information from
the neighbors. This could damage the network connectivity, As shown in Fig. 3, there are four inverters, two leaders,
and compromise the network-level consensus performance. On and one attacker. In the following case studies, we use agent
the other hand, the existing attack detection and correction 1, 2, 3 and 4 to represent the four inverters, and agent 5 to
method usually requires that at least half of the total number represent the attacker. Four types of malicious attacks are con-
of agents needs to be intact [20], [21]. Whereas, our resilient sidered: a) the injections to the communication links from the
control protocols do not have any restrictions on the number leaders, b) the direct relative information injected from the
of compromised agents. attackers, c) the injections to the communication links among
inverters, and d) the injections to the local state-feedback of an
inverter. All unbounded cyber attacks are initiated at t = 5s.
VI. E XPERIMENTAL E VALUATION
The parameters of the resilient control protocols (28) to (30)
A. AC Microgrid Testbed are set as cvi = 10, cfi = 20, aij = 1, gui = 1, and gli = 1.
The proposed distributed resilient control method is imple- Case A: The attack on the communication link from the
mented on an IEEE 34-bus balanced test feeder upgraded with upper reference leader to inverter 1 is modeled using (17).
four inverters [27], as illustrated in Fig. 3. This feeder is u (t) = V u (t) + σ v (t), where σ v (t) = 4t.
Therein, V̄1,ref ref 1 ref 1 ref
isolated from the legacy grid at bus 800. The inverters and dis- Correspondingly, the frequency injection is σ1ωref (t) = 0.1t.
tribution lines specifications are adopted from [37] and [45], Case B: Inverter 2 receives a direct injection from the
respectively, with slight modifications. This work employs attacker, where V5 = 2t and ωn5 = 0.05t, with the edge

Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
3792 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 5, SEPTEMBER 2020

Fig. 6. Inverters’ variables in Case B for the (a) conventional cooperative


control and the (b) proposed resilient cooperative control.

Fig. 4. Physical components like inverters, their interconnections, filters, and


the distribution bus are emulated on Typhoon HILs. Distributed controllers are
implemented on dSPACE systems. The communication network is realized
partly through a LAN switch.

Fig. 7. Inverters’ variables in Case C for the (a) conventional cooperative


control and the (b) proposed resilient cooperative control.

TABLE I
VALUES OF THE ATTACKS TO THE VOLTAGE AND F REQUENCY L OOPS

Fig. 5. Inverters’ variables in Case A for the (a) conventional cooperative


control and the (b) proposed resilient cooperative control.

weights hv25 = 1 and hω25 = 0.01 for voltage and frequency


control, respectively.
Case C: The attack on the communication channel from σ44
v (t) = −2t. Correspondingly, the frequency injection is set

inverter 2 to inverter 3 is modeled using (19). Therein, ω (t) = −0.05t.


as σ44
V̄3,2 (t) = V2 (t) + σ32
v (t), where σ v (t) = 4t. Correspondingly,
32 We have also listed the attack values in Table I.
the frequency injection is set as σ32 ω (t) = 0.1t. The proposed resilient controller composed of (28), (29),
Case D: The attack on the state feedback of inverter 4 is and (30) is compared with the conventional cooperative con-
modeled using (19). Therein, V̄4,4 (t) = V4 (t) + σ44 v (t), where troller (18) for the considered scenarios A, B, C, and D in

Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
ZUO et al.: RESILIENT NETWORKED AC MICROGRIDS UNDER UNBOUNDED CYBER ATTACKS 3793

[2] O. Kosut, L. Jia, R. J. Thomas, and L. Tong, “Malicious data attacks


on the smart grid,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645–658,
Dec. 2011.
[3] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against
state estimation in electric power grids,” in Proc. ACM Conf. Comput.
Commun. Security, 2009, pp. 21–32.
[4] X. Liu, M. Shahidehpour, Y. Cao, L. Wu, W. Wei, and X. Liu, “Microgrid
risk analysis considering the impact of cyber attacks on solar PV
and ESS control systems,” IEEE Trans. Smart Grid, vol. 8, no. 3,
pp. 1330–1339, May 2017.
[5] S. Sridhar, A. Hahn, and M. Govindarasu, “Cyber–physical system
security for the electric power grid,” Proc. IEEE, vol. 100, no. 1,
pp. 210–224, Jan. 2012.
[6] H. He and J. Yan, “Cyber-physical attacks and defences in the smart grid:
A survey,” IET Cyber Phys. Syst. Theory Appl., vol. 1, no. 1, pp. 13–27,
Dec. 2016.
[7] A. Mohsenian-Rad and A. Leon-Garcia, “Distributed Internet-based load
altering attacks against smart power grids,” IEEE Trans. Smart Grid,
vol. 2, no. 4, pp. 667–674, Dec. 2011.
[8] J. W. Simpson-Porco, F. Dörfler, and F. Bullo, “Synchronization and
power sharing for droop-controlled inverters in islanded microgrids,”
Fig. 8. Inverters’ variables in Case D for the (a) conventional cooperative Automatica, vol. 49, no. 9, pp. 2603–2611, Sep. 2013.
control and the (b) proposed resilient cooperative control. [9] A. Bidram, A. Davoudi, and F. L. Lewis, “A multiobjective distributed
control framework for islanded AC microgrids,” IEEE Trans. Ind.
Informat., vol. 10, no. 3, pp. 1785–1798, Aug. 2014.
[10] L. Che, M. Shahidehpour, A. Alabdulwahab, and Y. Al-Turki,
Fig. 5, Fig. 6, Fig. 7, and Fig. 8, respectively. The voltage con- “Hierarchical coordination of a community microgrid with AC and DC
microgrids,” IEEE Trans. Smart Grid, vol. 6, no. 6, pp. 3042–3051,
trol module acts on filtered measurements being shared among Nov. 2015.
the inverters, and the same voltages are used to produce the [11] S. Zuo, A. Davoudi, Y. Song, and F. L. Lewis, “Distributed finite-time
corresponding figures. One can see that, in the presence of voltage and frequency restoration in islanded AC microgrids,” IEEE
Trans. Ind. Electron., vol. 63, no. 10, pp. 5988–5997, Oct. 2016.
unbounded attacks for all four different scenarios, the con- [12] K. Manandhar, X. Cao, F. Hu, and Y. Liu, “Detection of faults and
ventional cooperative controller fails to maintain the overall attacks including false data injection attack in smart grid using Kalman
system stability, but the proposed resilient approach maintains filter,” IEEE Trans. Control Netw. Syst., vol. 1, no. 4, pp. 370–379,
Dec. 2014.
the magnitude of the bus voltage within the prescribed range [13] S. Sridhar and M. Govindarasu, “Model-based attack detection and miti-
and achieves UUB regulation on the frequency term. That gation for automatic generation control,” IEEE Trans. Smart Grid, vol. 5,
is, the resilient secondary voltage and frequency synchroniza- no. 2, pp. 580–591, Mar. 2014.
[14] Y. Huang, J. Tang, Y. Cheng, H. Li, K. A. Campbell, and Z. Han,
tion problems, for networked AC microgrids, are solved under “Real-time detection of false data injection in smart grid networks: An
unbounded cyber attacks. adaptive CUSUM method and analysis,” IEEE Syst. J., vol. 10, no. 2,
pp. 532–543, Jun. 2016.
[15] S. Bi and Y. J. Zhang, “Graphical methods for defense against false-data
VII. C ONCLUSION injection attacks on power system state estimation,” IEEE Trans. Smart
Grid, vol. 5, no. 3, pp. 1216–1227, May 2014.
We have introduced a networked AC microgrid that has [16] L. Liu, M. Esmalifalak, Q. Ding, V. A. Emesih, and Z. Han, “Detecting
cooperative and adversarial elements consisting of leaders, false data injection attacks on power grid by sparse optimization,” IEEE
inverters, and attackers. We have considered four types of Trans. Smart Grid, vol. 5, no. 2, pp. 612–621, Mar. 2014.
[17] L.-Y. Lu, H. J. Liu, and H. Zhu, “Distributed secondary control for
unbounded cyber attacks: injections to the communication isolated microgrids under malicious attacks,” in Proc. North Amer. Power
links from the leaders to local inverters, hijacking inverter Symp., 2016, pp. 1–6.
signals or pretending to be an inverter where there is none, [18] L. Che, X. Liu, and Z. Li, “Fast screening of high-risk lines under
false data injection attacks,” IEEE Trans. Smart Grid, vol. 10, no. 4,
injections to the communication links among inverters, and pp. 4003–4014, Jul. 2019.
distorting the local state-feedback of an individual inverter. [19] Z. Peng, R. Deng, and H. Liang, “False data injection attacks
We have proposed a fully distributed control framework against state estimation in multiphase and unbalanced smart distribu-
tion systems,” IEEE Trans. Smart Grid, vol. 10, no. 6, pp. 6000–6013,
consisting of the original cooperative and adversarial multi- Nov. 2019.
inverter physical systems and a virtual MAS with hidden [20] Z. Tang, M. Kuijper, M. S. Chong, I. Mareels, and C. Leckie, “Linear
and secure networks. The performance of this approach, in system security—Detection and correction of adversarial sensor attacks
in the noise-free case,” Automatica, vol. 101, pp. 53–59, Mar. 2019.
maintaining the overall system stability and attaining the [21] H. Fawzi, P. Tabuada, and P. Diggavi, “Secure estimation and control for
bounded frequency regulation and voltage containment, has cyber-physical systems under adversarial attacks,” IEEE Trans. Autom.
been verified in a CHIL environment. Control, vol. 59, no. 6, pp. 1454–1467, Jun. 2014.
[22] J. Kim and L. Tong, “On topology attack of a smart grid: Undetectable
attacks and countermeasures,” IEEE J. Sel. Areas Commun., vol. 31,
ACKNOWLEDGMENT no. 7, pp. 1294–1305, Jul. 2013.
[23] G. Hug and J. A. Giampapa, “Vulnerability assessment of AC state esti-
The authors thank Ajay P. Yadav for his help in initial HIL mation with respect to false data injection cyber-attacks,” IEEE Trans.
modeling efforts and graphics. Smart Grid, vol. 3, no. 3, pp. 1362–1370, Sep. 2012.
[24] G. Liang, J. Zhao, F. Luo, S. R. Weller, and Z. Y. Dong, “A review of
false data injection attacks against modern power systems,” IEEE Trans.
R EFERENCES Smart Grid, vol. 8, no. 4, pp. 1630–1638, Jul. 2017.
[25] F. Pasqualetti, F. Dorfler, and F. Bullo, “Attack detection and identifica-
[1] S. Gorman, “Electricity grid in us penetrated by spies,” Wall Street J., tion in cyber-physical systems,” IEEE Trans. Autom. Control, vol. 58,
vol. 8, p. A.1, Apr. 2009. no. 11, pp. 2715–2729, Nov. 2013.

Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
3794 IEEE TRANSACTIONS ON SMART GRID, VOL. 11, NO. 5, SEPTEMBER 2020

[26] J. Kim, L. Tong, and R. J. Thomas, “Data framing attack on state esti- Omar Ali Beg (Member, IEEE) received the Ph.D.
mation with unknown network parameters,” in Proc. Asilomar Conf. degree in electrical engineering from the University
Signals Syst. Comput., 2013, pp. 1388–1392. of Texas at Arlington, TX, USA, in 2017. He was a
[27] S. Abhinav, I. D. Schizas, F. L. Lewis, and A. Davoudi, “Distributed recipient of the U.S. Air Force Research Laboratory
noise-resilient networked synchrony of active distribution systems,” Summer Research Fellowship in 2015. He is also
IEEE Trans. Smart Grid, vol. 9, no. 2, pp. 836–846, Mar. 2018. the recipient of the Rising Science and Technology
[28] N. M. Dehkordi, H. R. Baghaee, N. Sadati, and J. M. Guerrero, Acquisition and Retentions grant by the UT System.
“Distributed noise-resilient secondary voltage and frequency control He is currently an Assistant Professor with the
for islanded microgrids,” IEEE Trans. Smart Grid, vol. 10, no. 4, Department of Electrical Engineering, College of
pp. 3780–3790, Jul. 2019. Engineering, University of Texas Permian Basin,
[29] M. Blanke, M. Kinnaert, J. Lunze, and M. Staroswiecki, Diagnosis and Odessa, TX, USA. His research interests include for-
Fault-Tolerant Control. New York, NY, USA: Springer-Verlag, 2006. mal verification and cyber-attack detection in cyber-physical power systems
[30] S. Liu, Z. Hu, X. Wang, and L. Wu, “Stochastic stability analysis and using formal methods.
control of secondary frequency regulation for islanded microgrids under
random denial of service attacks,” IEEE Trans. Ind. Informat., vol. 15,
no. 7, pp. 4066–4075, Jul. 2019.
[31] S. Qobad, J. M. Guerrero, and J. C. Vasquez, “Distributed secondary
control for islanded microgrids—A novel approach,” IEEE Trans. Power
Electron., vol. 29, no. 2, pp. 1018–1031, Feb. 2014.
[32] J. W. Simpson-Porco, Q. Shafiee, F. Dörfler, J. C. Vasquez,
J. M. Guerrero, and F. Bullo, “Secondary frequency and voltage con-
trol of islanded microgrids via distributed averaging,” IEEE Trans. Ind.
Electron., vol. 62, no. 11, pp. 7025–7038, Nov. 2015.
[33] L. Meng et al., “Distributed voltage unbalance compensation in islanded
microgrids by using a dynamic consensus algorithm,” IEEE Trans.
Frank L. Lewis (Life Fellow, IEEE) received the
Power Electron., vol. 31, no. 1, pp. 827–838, Jan. 2016.
bachelor’s degree in physics/EE and the M.S.E.E.
[34] V. Nasirian, Q. Shafiee, J. M. Guerrero, F. L. Lewis, and A. Davoudi,
degree from Rice University, the M.S. degree in
“Droop-free distributed control for AC microgrid,” IEEE Trans. Power
aeronautical engineering from the University of West
Electron., vol. 31, no. 2, pp. 1600–1617, Feb. 2016.
Florida, and the Ph.D. degree from the Georgia
[35] N. Pogaku, M. Prodanović, and T. C. Green, “Modeling, analysis and
Institute of Technology. He is a PE Texas, a
testing of autonomous operation of an inverter-based microgrid,” IEEE
U.K. Chartered Engineer, a UTA Distinguished
Trans. Power Electron., vol. 22, no. 2, pp. 613–625, Mar. 2007.
Scholar Professor, a UTA Distinguished Teaching
[36] R. Han, L. Meng, G. Ferrari-Trecate, E. A. A. Coelho, J. C. Vasquez,
Professor, and the Moncrief-O’Donnell Chair with
and J. M. Guerrero, “Containment and consensus-based distributed coor-
the University of Texas at Arlington Research
dination control to achieve bounded voltage and precise reactive power
Institute. He works in feedback control, intelli-
sharing in islanded AC microgrids,” IEEE Trans. Ind. Appl., vol. 53,
gent systems, cooperative control systems, and nonlinear systems. He has
no. 6, pp. 5187–5199, Nov./Dec. 2017.
authored 7 U.S. patents, numerous journal special issues, 420 journal papers,
[37] A. Bidram, F. L. Lewis, and A. Davoudi, “Distributed control systems
20 books, including the textbooks Optimal Control, Aircraft Control, Optimal
for small-scale power networks: Using multiagent cooperative control
Estimation, and Robot Manipulator Control. He received the Fulbright
theory,” IEEE Control Syst. Mag., vol. 34, no. 6, pp. 56–77, Dec. 2014.
Research Award, the NSF Research Initiation Grant, the ASEE Terman Award,
[38] H. K. Khalil, Nonlinear Systems, 3rd ed. Upper Saddle River, NJ, USA:
the International Neural Network Society Gabor Award, the U.K. Institute
Prentice Hall, 2002.
of Measurement & Control Honeywell Field Engineering Medal, the IEEE
[39] R. T. Rockafellar, Convex Analysis. Princeton, NJ, USA: Princeton Univ.
Computational Intelligence Society Neural Networks Pioneer Award, the
Press, 2015.
AIAA Intelligent Systems Award, and the AACC Ragazzini Award. He is
[40] S. Zuo, Y. Song, F. L. Lewis, and A. Davoudi, “Output contain-
a member of the National Academy of Inventors. He is a fellow of IFAC,
ment control of linear heterogeneous multi-agent systems using internal
AAAS, and the U.K. Institute of Measurement & Control.
model principle,” IEEE Trans. Cybern., vol. 47, no. 8, pp. 2099–2109,
Aug. 2017.
[41] D. Kreutz, F. M. V. Ramos, P. E. Veríssimo, C. E. Rothenberg,
S. Azodolmolky, and S. Uhlig, “Software-defined networking: A com-
prehensive survey,” Proc. IEEE, vol. 103, no. 1, pp. 14–76, Jan. 2015.
[42] D. Jin et al., “Toward a cyber resilient and secure microgrid using
software-defined networking,” IEEE Trans. Smart Grid, vol. 8, no. 5,
pp. 2494–2504, Sep. 2017.
[43] B. Gharesifard and T. Basar, “Resilience in consensus dynamics via
competitive interconnections,” in Proc. 3rd IFAC Workshop Estimation
Control Netw. Syst., Santa Barbara, CA, USA, 2012, pp. 234–239.
[44] A. Gusrialdi, Z. Qu, and M. A. Simaan, “Competitive interaction design
of cooperative systems against attacks,” IEEE Trans. Autom. Control, Ali Davoudi (Senior Member, IEEE) received
vol. 63, no. 9, pp. 3159–3166, Sep. 2018. the Ph.D. degree in electrical and computer engi-
[45] N. Mwakabuta and A. Sekar, “Comparative study of the IEEE 34 node neering from the University of Illinois, Urbana–
test feeder under practical simplifications,” in Proc. 39th North Amer. Champaign, IL, USA, in 2010. He is currently an
Power Symp., 2007, pp. 484–491. Associate Professor with the Electrical Engineering
Department, University of Texas at Arlington,
Arlington, TX, USA. He has received the Best Paper
Award from 2015 IEEE International Symposium on
Resilient Control Systems, the 2014 and 2015 Best
Shan Zuo received the B.S. and Ph.D. degrees Paper Award from the IEEE Transactions on Energy
in physical electronics and automation engineer- Conversion, the 2016 Prize Paper Award from the
ing from the University of Electronic Science and IEEE Power and Energy Society, the 2017 IEEE Richard M. Bass Outstanding
Technology of China, Chengdu, China, in 2012 Young Power Electronics Engineer Award, the 2017 and 2018 Best Paper
and 2018, respectively. She is currently pursuing Award from the IEEE T RANSACTIONS ON E NERGY C ONVERSION, and
the Ph.D. degree with the University of Texas at the 2019 and 2020 Faculty Fellow of Janet and Mike Greene Endowed
Arlington, TX, USA. Her research interests include Professorship. He is an Associate Editor for the IEEE T RANSACTIONS ON
distributed control theory, reinforcement learning, P OWER E LECTRONICS, the IEEE T RANSACTIONS ON T RANSPORTATION
AC/DC microgrids, autonomous systems, and cyber- E LECTRIFICATION, the IEEE T RANSACTIONS ON E NERGY C ONVERSION,
physical systems. and the IEEE P OWER L ETTERS.

Authorized licensed use limited to: M S RAMAIAH INSTITUTE OF TECHNOLOGY. Downloaded on October 20,2023 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.

You might also like