Mateo D. Roig Greidanus, S. Mazumder, Nanditha Gajanur
{"title":"Identification of a Delay Attack in the Secondary Control of Grid-Tied Inverter Systems","authors":"Mateo D. Roig Greidanus, S. Mazumder, Nanditha Gajanur","doi":"10.1109/PEDG51384.2021.9494253","DOIUrl":null,"url":null,"abstract":"This work is developed for the identification of a denial-of-service cyberattack on the secondary controller of inverter systems which is connected to the power grid. The identification is made through the dynamic response of the reactive power (Q) of the system under attack. By observing the dynamic characteristic of Q, it is possible to correlate the attack with the nominal response of the hierarchical controller. The article shows that the occurrence of the attack can be identified through a supervisory control that runs a model in parallel. The article argues that after an early identification of the attack, a local controller can take action to mitigate its effects on the system’s response.","PeriodicalId":374979,"journal":{"name":"2021 IEEE 12th International Symposium on Power Electronics for Distributed Generation Systems (PEDG)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 12th International Symposium on Power Electronics for Distributed Generation Systems (PEDG)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PEDG51384.2021.9494253","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This work is developed for the identification of a denial-of-service cyberattack on the secondary controller of inverter systems which is connected to the power grid. The identification is made through the dynamic response of the reactive power (Q) of the system under attack. By observing the dynamic characteristic of Q, it is possible to correlate the attack with the nominal response of the hierarchical controller. The article shows that the occurrence of the attack can be identified through a supervisory control that runs a model in parallel. The article argues that after an early identification of the attack, a local controller can take action to mitigate its effects on the system’s response.