Hamidreza Shafei,Majid Farhangi,Subrata K Sarker,Li Li,Ricardo P Aguilera,Hassan Haes Alhelou
{"title":"A Distributed Projection Operator-Based Unknown Input Observer for Attack Estimation and Mitigation on DC Microgrids.","authors":"Hamidreza Shafei,Majid Farhangi,Subrata K Sarker,Li Li,Ricardo P Aguilera,Hassan Haes Alhelou","doi":"10.1109/tcyb.2025.3599202","DOIUrl":null,"url":null,"abstract":"Cyberattacks on transmitted signals are the most critical threats to modern microgrid (MG) systems and should be accurately addressed to ensure safe and reliable operation. This article investigates the cybersecurity of dc MGs against FDI attacks and develops a novel model-based observer system. The proposed projection operator (PO)-based UIO is uniquely designed to detect attacks on the transmitted data from other distributed generation units. For this purpose, a bank of PO observers is developed in each distributed generation unit to estimate all neighbor units' dynamic states. Cyberattack reconstruction compares the remotely observed state values with the measured ones. Afterwards, the detected attack signal values are utilized to restore the integrity of the compromised signals, effectively mitigating the harmful effects of cyberattacks. The most important feature of this scheme, which distinguishes it from similar methods, is that there is no need for a secure channel or additional information transfer in this method. Extensive real-time numerical simulations are performed to assess the practicality and efficiency of the proposed approach when subjected to various attack scenarios, demonstrating its advantages over other methods.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"128 1","pages":""},"PeriodicalIF":10.5000,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/tcyb.2025.3599202","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Cyberattacks on transmitted signals are the most critical threats to modern microgrid (MG) systems and should be accurately addressed to ensure safe and reliable operation. This article investigates the cybersecurity of dc MGs against FDI attacks and develops a novel model-based observer system. The proposed projection operator (PO)-based UIO is uniquely designed to detect attacks on the transmitted data from other distributed generation units. For this purpose, a bank of PO observers is developed in each distributed generation unit to estimate all neighbor units' dynamic states. Cyberattack reconstruction compares the remotely observed state values with the measured ones. Afterwards, the detected attack signal values are utilized to restore the integrity of the compromised signals, effectively mitigating the harmful effects of cyberattacks. The most important feature of this scheme, which distinguishes it from similar methods, is that there is no need for a secure channel or additional information transfer in this method. Extensive real-time numerical simulations are performed to assess the practicality and efficiency of the proposed approach when subjected to various attack scenarios, demonstrating its advantages over other methods.
期刊介绍:
The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.