DC microgrids often present a hierarchical control architecture, requiring integration of communication layers. This leads to the possibility of malicious attackers disrupting the overall system. Motivated by this application, in this article, we present a distributed monitoring scheme to provide attack-detection capabilities for linear large-scale systems. The proposed architecture relies on a Luenberger observer together with a bank of unknown-input observers at each subsystem, providing attack detection capabilities. We describe the architecture and analyze conditions under which attacks are guaranteed to be detected, and, conversely, when they are stealthy. Our analysis shows that some classes of attacks cannot be detected using either ...
Modern low-voltage microgrid systems rely on distributed and cooperative control approaches to guara...
Modern low-voltage microgrid systems rely on distributed and cooperative control approaches to guara...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
5siDC microgrids often present a hierarchical control architecture, requiring integration of commun...
DC microgrids often present a hierarchical control architecture, requiring integration of communicat...
DC microgrids often present a hierarchical control architecture, requiring integration of communicat...
The paper considers the problem of detecting cyber-attacks occurring in communication networks typic...
© 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
The rapid development and implementation of distributed control algorithms for dc microgrids has inc...
© 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. S...
As a cyber-physical system (CPD), a microgrid (MG) is threatened by various cyber-attacks. To ensure...
4siDistributed detection of covert attacks for linear large-scale interconnected systems is address...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
DC microgrid has attracted a lot of attention in recent years due to its ability to integrate vari...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
Modern low-voltage microgrid systems rely on distributed and cooperative control approaches to guara...
Modern low-voltage microgrid systems rely on distributed and cooperative control approaches to guara...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
5siDC microgrids often present a hierarchical control architecture, requiring integration of commun...
DC microgrids often present a hierarchical control architecture, requiring integration of communicat...
DC microgrids often present a hierarchical control architecture, requiring integration of communicat...
The paper considers the problem of detecting cyber-attacks occurring in communication networks typic...
© 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
The rapid development and implementation of distributed control algorithms for dc microgrids has inc...
© 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. S...
As a cyber-physical system (CPD), a microgrid (MG) is threatened by various cyber-attacks. To ensure...
4siDistributed detection of covert attacks for linear large-scale interconnected systems is address...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
DC microgrid has attracted a lot of attention in recent years due to its ability to integrate vari...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
Modern low-voltage microgrid systems rely on distributed and cooperative control approaches to guara...
Modern low-voltage microgrid systems rely on distributed and cooperative control approaches to guara...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...