2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)最新文献

筛选
英文 中文
WiP Abstract: Multiple Security Domain Nondeducibility for Point-of-Care Diagnostic Technology 摘要:多点医疗诊断技术的多安全域不可抵免性
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS) Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479127
Fred Love, B. McMillin, Sivanesan Tulasidas, W. Balachandran
{"title":"WiP Abstract: Multiple Security Domain Nondeducibility for Point-of-Care Diagnostic Technology","authors":"Fred Love, B. McMillin, Sivanesan Tulasidas, W. Balachandran","doi":"10.1109/ICCPS.2016.7479127","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479127","url":null,"abstract":"Microfluidics is an interdisciplinary science focusing on the development of devices and systems that process low volumes of fluid for applications such as high throughput DNA sequencing, immunoassays, and entire Labs-on- Chip platforms. Microfluidic diagnostic technology enables these advances by facilitating the miniaturization and integration of complex biochemical processing through a microfluidic biochip [1]. This approach tightly couples the biochemical operations, sensing system, control algorithm, and droplet-based biochip. During the process the status of a droplet is monitored in real- time to detect operational errors. If an error has occurred, the control algorithm dynamically reconfigures to allow recovery and rescheduling of on-chip operations. During this recovery procedure the droplet that is the source of the error is discarded to prevent the propagation of the error and the operation is repeated. Threats to the operation of the microfluidics biochip include (1) integrity: an attack can modify control electrodes to corrupt the diagnosis, and (2) privacy: what can a user/operator deduce about the diagnosis? It is challenging to describe both these aspects using existing models; as Figure 1 depicts there are multiple security domains, Unidirectional information flows shown in black indicate undesirable flows, the bidirectional black arrows indicate desirable, but possibly corrupted, information flows, and the unidirectional red arrows indicate undesirable information flows. As with Stuxnet, a bi- directional, deducible information flow is needed between the monitoring security domain and internal security domain (biochip) [2]. Simultaneously, the attacker and the operators should receive a nondeducible information flow. Likewise, the red attack arrows should be deducible to the internal domain. Our current security research direction uses the novel approach of Multiple Security Domain Nondeducibility [2] to explore the vulnerabilities of exploiting this error recovery process through information flow leakages and leads to protection of the system through desirable information flows.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"44 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89308642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-Physical-Security Framework for Building Energy Management System 建筑能源管理系统的网络物理安全框架
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS) Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479072
K. Paridari, A. Mady, Isidoro S. La Porta, Rohan Chabukswar, Jacobo Blanco, André M. H. Teixeira, H. Sandberg, M. Boubekeur
{"title":"Cyber-Physical-Security Framework for Building Energy Management System","authors":"K. Paridari, A. Mady, Isidoro S. La Porta, Rohan Chabukswar, Jacobo Blanco, André M. H. Teixeira, H. Sandberg, M. Boubekeur","doi":"10.1109/ICCPS.2016.7479072","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479072","url":null,"abstract":"Energy management systems (EMS) are used to control energy usage in buildings and campuses, by employing technologies such as supervisory control and data acquisition (SCADA) and building management systems (BMS), in order to provide reliable energy supply and maximise user comfort while minimising energy usage. Historically, EMS systems were installed when potential security threats were only physical. Nowadays, EMS systems are connected to the building network and as a result directly to the outside world. This extends the attack surface to potential sophisticated cyber-attacks, which adversely impact EMS operation, resulting in service interruption and downstream financial implications. Currently, the security systems that detect attacks operate independently to those which deploy resiliency policies and use very basic methods. We propose a novel EMS cyber-physical-security framework that executes a resilient policy whenever an attack is detected using security analytics. In this framework, both the resilient policy and the security analytics are driven by EMS data, where the physical correlations between the data-points are identified to detect outliers and then the control loop is closed using an estimated value in place of the outlier. The framework has been tested using a reduced order model of a real EMS site.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"14 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90866889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Real-Time Distribution Grid State Estimation with Limited Sensors and Load Forecasting 基于有限传感器的实时配电网状态估计与负荷预测
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS) Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479117
Roel Dobbe, D. Arnold, Stephan Liu, Duncan S. Callaway, C. Tomlin
{"title":"Real-Time Distribution Grid State Estimation with Limited Sensors and Load Forecasting","authors":"Roel Dobbe, D. Arnold, Stephan Liu, Duncan S. Callaway, C. Tomlin","doi":"10.1109/ICCPS.2016.7479117","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479117","url":null,"abstract":"High penetration levels of distributed generation (DG) and electric vehicles (EVs) diversify power flow and bring uncertainty to distribution networks, making planning and control more involved for distribution system operators (DSOs). The increased risk of constraint violation triggers the need to augment forecasts with real- time state estimation. This is economically and technically challenging since it requires investing in a large number of sensors and these have to communicate with often older and slower supervisory control and data acquisition (SCADA) systems. We address distribution grid state estimation via combining only a limited set of sensors with load forecast information. It revisits open problems in a recent paper that proposes a Bayesian estimation scheme. We derive the estimator for balanced power networks via rigorous modeling. An off-line analysis of load aggregation, forecast accuracy and number of sensors provides concrete engineering trade-offs to determine the optimal number of sensors for a desired accuracy. This estimation procedure can be used in real time as an observer for control problems or off-line for planning purposes to asses the effect of DG or EVs on specific network components.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"107 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83428517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Poster Abstract: Unifying Modeling Substrate for Irrigation Cyber-Physical Systems 海报摘要:灌溉信息物理系统的统一建模基质
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS) Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479116
Davit Hovhannisyan, F. Kurdahi, A. Eltawil, A. Aghakouchak, M. A. Faruque
{"title":"Poster Abstract: Unifying Modeling Substrate for Irrigation Cyber-Physical Systems","authors":"Davit Hovhannisyan, F. Kurdahi, A. Eltawil, A. Aghakouchak, M. A. Faruque","doi":"10.1109/ICCPS.2016.7479116","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479116","url":null,"abstract":"CPS's multi-domain nature is difficult to capture using existing modeling approaches, which produce compartmentalized and complex system simulation models. Unifying models of multi-domain physical phenomena and processes, and man-made artifacts into a single modeling substrate will enable enhanced design of intelligent control algorithms and analytics. Moreover, with use of known modeling abstractions, which describe the physical ordinary differential equation (ODE) relationships by introducing model components, such as those found in Electronic Design Automation (EDA) tools, models of the physical world, e.g. irrigation systems, integrated with models of cyber world, e.g. electrical circuits, can be analyzed using existing tools. This can be done by using analogies between hydraulic, electrical, mechanical, etc. For example, we developed soil moisture transient electrical circuit model for the next generation of Irrigation CPS. The most important component in smart irrigation system design are the knowledge of water transport in the soil, or percolation, and water uptake by plants or transpiration and evaporation, or combined evapotranspiration (ET). Main analytical ODEs that describe water transport in soil are Richard's Equation: ∂θ/∂t =(∂θ/∂z) [K(θ)(( ∂ψ/∂z) + 1)] and Darcy's Law: q = K(ψ)∇ψ, where θ is water content, K is the hydraulic conductivity, z is the elevation, t is time, ψ is the pressure head or water potential, q is the flux or the discharge per square area. However, these equations do not have closed form solutions, thus, we chose to model and simulate the phenomena using electrical circuit components. To expose the underlying soil physics, we modeled vertical segment of soil by layers of water storage, or capacitive, and transport, or resistive, components. Starting with a single layer of storage, model is tuned and evolved. At each successful stage of evolution, a storage component is divided into two storage elements and connected by a transport component. Meanwhile, model parameters are tuned by quadratic optimization with respect to experimental data split into training and validation segments, which were gathered from outdoor soil moisture sensor in a 16 day duration with 15 min sampling period. Finally, experimental results show that model order 3 has the best fit of experimental data with R2 = 0.923. Thus, this ODE based simulation methodology describes transient behavior of vertical moisture transport in soil, and enables CPS model- based design and control.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"19 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90684562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Rate Control and Demand Balancing for Electric Vehicle Charging 电动汽车充电的智能费率控制与需求平衡
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS) Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479118
Fanxin Kong, Xue Liu, Zhonghao Sun, Qinglong Wang
{"title":"Smart Rate Control and Demand Balancing for Electric Vehicle Charging","authors":"Fanxin Kong, Xue Liu, Zhonghao Sun, Qinglong Wang","doi":"10.1109/ICCPS.2016.7479118","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479118","url":null,"abstract":"The anticipated high electric vehicle (EV) penetration motivates many research efforts to alleviate the potential associated grid impact. However, few works discuss the crucial issue: quality of service (QoS) degradation caused by competing for charging resources. This issue arises due to the limitation on power supply and charging space that charging stations can usually provide. Our work studies this issue and proposes an operational scheme that optimizes QoS for EV users while satisfying the stability of the power grid. The scheme consists of two levels. The lower level deals with charging rate control, for which we propose an efficient algorithm with provable QoS-optimal allocation of power supply to EVs. The upper level handles charging demand balancing, for which we design two approximation algorithms that schedule EVs to multiple charging stations. One algorithm is a 3-approximation with polynomial complexity; while the other is a (2+ε)-approximation using a fully polynomial time approximation scheme. Through extensive simulations based on realistic data traces and simulations tools, we demonstrate the efficiency and efficacy of our operational scheme and further provide interesting findings from in-depth analysis of the experimental results.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"17 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80176212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
WiP Abstract: Distributed Reactive Control Synthesis for Aircraft Electric Power Systems via SAT Solving 摘要:基于SAT求解的飞机电力系统分布式无功控制综合
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS) Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479125
Yunus Emre Sahin, N. Ozay
{"title":"WiP Abstract: Distributed Reactive Control Synthesis for Aircraft Electric Power Systems via SAT Solving","authors":"Yunus Emre Sahin, N. Ozay","doi":"10.1109/ICCPS.2016.7479125","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479125","url":null,"abstract":"In this work, we consider a simplified version of the distributed control synthesis problem where the system is modeled as a Boolean network and specifications are given as propositional formulae on environment and system variables. In this relatively static Boolean setting, (centralized) reactive control synthesis problem reduces to a quantified Boolean satisfiability problem which can be solved by off-the-shelf SAT solvers. For the distributed control synthesis, we propose a recursive algorithm that starts from a global assume-guarantee specification and maps it to local assume-guarantee specifications for individual subsystems. Finding these local assume- guarantee specifications leads to a modular design framework. For instance, local controllers for subsystems can be synthesized independently via SAT or a local subsystem can be replaced with another subsystem that satisfies the same local assume-guarantee specifications. We also investigate how the interconnection structure of the network affects the performance of this algorithm. In particular, we show that if the interconnection structure is a multi-tree and the global assumptions and guarantees satisfy certain independence conditions, the algorithm is complete.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"94 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80385024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Poster Abstract: Thermal Side-Channel Forensics in Additive Manufacturing Systems 海报摘要:增材制造系统中的热侧通道取证
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS) Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479115
Sujit Rokka Chhetri, Sina Faezi, A. Canedo, M. A. Faruque
{"title":"Poster Abstract: Thermal Side-Channel Forensics in Additive Manufacturing Systems","authors":"Sujit Rokka Chhetri, Sina Faezi, A. Canedo, M. A. Faruque","doi":"10.1109/ICCPS.2016.7479115","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479115","url":null,"abstract":"Additive manufacturing systems leak cyber-related information (such as G-code, M-code, etc.) from the side-channels (such as acoustic, power, thermal, etc.). In our work, we have successfully demonstrated the vulnerability of additive manufacturing to thermal side-channel attacks, where confidentiality can be breached to steal the Intellectual Property (IP) in the form of 3D design and printing parameters. We introduce a novel methodology to reverse engineer the thermal images acquired from the thermal side-channel to extract specific information (such as speed, temperature, axis of movement, etc.) present in the cyber-domain. To the best of our knowledge, this kind of forensics has not yet been explored in additive manufacturing systems.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72782997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks 传感器攻击下基于smt的网络物理系统观测器设计
Yasser Shoukry, Michelle S. Chong, M. Wakaiki, P. Nuzzo, A. Sangiovanni-Vincentelli, S. Seshia, J. Hespanha, P. Tabuada
{"title":"SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks","authors":"Yasser Shoukry, Michelle S. Chong, M. Wakaiki, P. Nuzzo, A. Sangiovanni-Vincentelli, S. Seshia, J. Hespanha, P. Tabuada","doi":"10.1145/3078621","DOIUrl":"https://doi.org/10.1145/3078621","url":null,"abstract":"We introduce a scalable observer architecture to estimate the states of a discrete-time linear-time-invariant (LTI) system whose sensors can be manipulated by an attacker. Given the maximum number of attacked sensors, we build on previous results on necessary and sufficient conditions for state estimation, and propose a novel multi-modal Luenberger (MML) observer based on efficient Satisfiability Modulo Theory (SMT) solving. We present two techniques to reduce the complexity of the estimation problem. As a first strategy, instead of a bank of distinct observers, we use a family of filters sharing a single dynamical equation for the states, but different output equations, to generate estimates corresponding to different subsets of sensors. Such an architecture can reduce the memory usage of the observer from an exponential to a linear function of the number of sensors. We then develop an efficient SMT-based decision procedure that is able to reason about the estimates of the MML observer to detect at runtime which sets of sensors are attack-free, and use them to obtain a correct state estimate. We provide proofs of convergence for our algorithm and report simulation results to compare its runtime performance with alternative techniques. Our algorithm scales well for large systems (including up to 5000 sensors) for which many previously proposed algorithms are not implementable due to excessive memory and time requirements. Finally, we illustrate the effectiveness of our algorithm on the design of resilient power distribution systems.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"10 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87334198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Optimal False Data Injection Attack against Automatic Generation Control in Power Grids 针对电网自动发电控制的最优假数据注入攻击
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS) Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479109
Rui Tan, H. Nguyen, Y. Foo, Xinshu Dong, David K. Y. Yau, Z. Kalbarczyk, R. Iyer, H. Gooi
{"title":"Optimal False Data Injection Attack against Automatic Generation Control in Power Grids","authors":"Rui Tan, H. Nguyen, Y. Foo, Xinshu Dong, David K. Y. Yau, Z. Kalbarczyk, R. Iyer, H. Gooi","doi":"10.1109/ICCPS.2016.7479109","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479109","url":null,"abstract":"This paper studies false data injection attacks against automatic generation control (AGC), a fundamental control system used in all power grids to maintain the grid frequency at a nominal value. Attacks on the sensor measurements for AGC can cause frequency excursion that triggers remedial actions such as disconnecting customer loads or generators, leading to blackouts and potentially costly equipment damage. We derive an attack impact model and analyze an optimal attack, consisting of a series of false data injections, that minimizes the remaining time until the onset of remedial actions, leaving the shortest time for the grid to counteract. We show that, based on eavesdropped sensor data and a few feasible-to-obtain system constants, the attacker can learn the attack impact model and achieve the optimal attack in practice. This paper provides essential understanding on the limits of physical impact of false data injections on power grids, and provides an analysis framework to guide the protection of sensor data links. Our analysis and algorithms are validated by experiments on a physical 16-bus power system testbed and extensive simulations based on a 37-bus power system model.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82862745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Poster Abstract: A Unified Distributed Control Framework for Inverter-Based Islanded Microgrid 摘要:基于逆变器的孤岛微电网统一分布式控制框架
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS) Pub Date : 2016-04-11 DOI: 10.1109/ICCPS.2016.7479112
Chin-Yao Chang, Wei Zhang, Jianming Lian
{"title":"Poster Abstract: A Unified Distributed Control Framework for Inverter-Based Islanded Microgrid","authors":"Chin-Yao Chang, Wei Zhang, Jianming Lian","doi":"10.1109/ICCPS.2016.7479112","DOIUrl":"https://doi.org/10.1109/ICCPS.2016.7479112","url":null,"abstract":"Control of microgrid has received considerable research attention in recent years. Various distributed control methods have been proposed in the literature to achieve power sharing, frequency synchronization, and other control objectives for AC islanded microgrids. This poster will present a general control design framework that unifies many of the existing methods in the literature. We will also show that such a unified structure will enable us to identify common fundamental challenges of microgrid control problems and allow us to recover the existing control results in a unified way with many interesting extensions.","PeriodicalId":6619,"journal":{"name":"2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)","volume":"17 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85160733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信