Integrated Intelligent Energy ›› 2022, Vol. 44 ›› Issue (12): 1-10.doi: 10.3969/j.issn.2097-0706.2022.12.001
• Digitalization of Power Industry • Next Articles
LI Xin(), CHENG Kaijie(
), ZHU Liangkuan(
)
Received:
2022-06-01
Revised:
2022-08-20
Published:
2022-12-25
CLC Number:
LI Xin, CHENG Kaijie, ZHU Liangkuan. Recursive state estimation for digitalized power grids subject to cyber attacks under Round-Robin protocol[J]. Integrated Intelligent Energy, 2022, 44(12): 1-10.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.hdpower.net/EN/10.3969/j.issn.2097-0706.2022.12.001
[1] | 李向荣, 郝悍勇, 樊涛, 等. 构筑数字化电网建设信息化企业[J]. 电力系统自动化, 2007(17):1-5,44. |
LI Xiangrong, HAO Hanyong, FAN Tao, et al. Constructing digital grid and informatized enterprise[J]. Automation of Electric Power Systems, 2007(17):1-5,44 | |
[2] | 江秀臣, 许永鹏, 李曜丞, 等. 新型电力系统背景下的输变电数字化转型[J]. 高电压技术, 2022, 48(1):1-10. |
JIANG Xiuchen, XU Yongpeng, LI Yaocheng, et al. Digitalization transformation of power transmission and transformation under the background of new power system[J]. High Voltage Engineering, 2022, 48(1):1-10. | |
[3] | 严兴煜, 高赐威, 陈涛, 等. 数字孪生虚拟电厂系统框架设计及其实践展望[J/OL]. 中国电机工程学报:1-17.(2021-11-15)[2022-06-17].https://doi.org/10.13334/j.0258-8013.pcsee.212378. |
YAN Xingyu, GAO Ciwei, CHEN Tao, et al. Framework design and application prospect for digital twin virtual power plant system[J/OL]. Proceedings of CSEE:1-17.(2021-11-15)[2022-06-17].https://doi.org/10.13334/j.0258-8013.pcsee.212378. | |
[4] | 张乾. 基于电力系统的物联网系统构成及其协议[J]. 信息系统工程, 2019(10):21-22. |
ZHANG Qian. The composition and protocol of Internet of things system based on power system[J]. China CIO News, 2019(10):21-22. | |
[5] |
ELNASHAIE S S E H, GRACE J R. Complexity,bifurcation and chaos in natural and man-made lumped and distributed systems[J]. Chemical Engineering Science, 2007, 62(13):3295-3325.
doi: 10.1016/j.ces.2007.02.047 |
[6] |
DING D, WANG Z, SHEN B, et al. H∞ state estimation for discrete-time complex networks with randomly occurring sensor saturations and randomly varying sensor delays[J]. IEEE Transactions on Neural Networks and Learning Systems, 2012, 23(5):725-736.
doi: 10.1109/TNNLS.2012.2187926 |
[7] |
LIU H, WANG Z, SHEN B, et al. Event-triggered H∞ state estimation for delayed stochastic memristive neural networks with missing measurements:The discrete time case[J]. IEEE Transactions on Neural Networks and Learning Systems, 2017, 29(8):3726-3737.
doi: 10.1109/TNNLS.2017.2728639 |
[8] |
YANG F, HAN Q L, LIU Y. Distributed H∞ state estimation over a filtering network with time-varying and switching topology and partial information exchange[J]. IEEE Transactions on Cybernetics, 2018, 49(3):870-882.
doi: 10.1109/TCYB.2017.2789212 |
[9] |
DHAHRI S, SELLAMI A, HMIDA F B. Robust H∞ sliding mode observer design for fault estimation in a class of uncertain nonlinear systems with LMI optimization approach[J]. International Journal of Control,Automation and Systems, 2012, 10(5):1032-1041.
doi: 10.1007/s12555-012-0521-3 |
[10] |
LI X, WEI G, DING D. Interval observer design under stealthy attacks and improved event-triggered protocols[J]. IEEE Transactions on Signal and Information Processing over Networks, 2020, 6:570-579.
doi: 10.1109/TSIPN.2020.3012254 |
[11] |
HOU N, DONG H, WANG Z, et al. Non-fragile state estimation for discrete Markovian jumping neural networks[J]. Neurocomputing, 2016, 179:238-245.
doi: 10.1016/j.neucom.2015.11.089 |
[12] |
YANG F, DONG H, WANG Z, et al. A new approach to non-fragile state estimation for continuous neural networks with time-delays[J]. Neurocomputing, 2016, 197:205-211.
doi: 10.1016/j.neucom.2016.02.062 |
[13] |
ZHANG J, WEI G, LIU S, et al. PD-type ℓ2-ℓ∞ intermittent pinning synchronization control of discrete time-delay nonlinear dynamical networks[J]. International Journal of Control,Automation and Systems, 2020, 18(8):2027-2037.
doi: 10.1007/s12555-019-0766-1 |
[14] |
ZHANG Z H, LI S, YAN H. Interval observer-based output feedback control for a class of interconnected systems with uncertain interconnections[J]. International Journal of Control,Automation and Systems, 2019, 17(4):957-965.
doi: 10.1007/s12555-018-0652-2 |
[15] |
ZOU L, WANG Z, GAO H, et al. State estimation for discrete-time dynamical networks with time-varying delays and stochastic disturbances under the Round-Robin protocol[J]. IEEE Transactions on Neural Networks and Learning Systems, 2016, 28(5):1139-1151.
doi: 10.1109/TNNLS.2016.2524621 |
[16] |
WU Z G, XU Z, SHI P, et al. Nonfragile state estimation of quantized complex networks with switching topologies[J]. IEEE Transactions on Neural Networks and Learning Systems, 2018, 29(10):5111-5121.
doi: 10.1109/TNNLS.2018.2790982 |
[17] |
LI X, ZHU F, ZHANG J. State estimation and simultaneous unknown input and measurement noise reconstruction based on adaptive H∞ observer[J]. International Journal of Control,Automation and Systems, 2016, 14(3):647-654.
doi: 10.1007/s12555-015-0006-2 |
[18] |
DE PERSIS C, TESI P. Input-to-state stabilizing control under denial-of-service[J]. IEEE Transactions on Automatic Control, 2015, 60(11):2930-2944.
doi: 10.1109/TAC.2015.2416924 |
[19] |
LONG M, WU C H, HUNG J Y. Denial of service attacks on network-based control systems:Impact and mitigation[J]. IEEE Transactions on Industrial Informatics, 2005, 1(2):85-96.
doi: 10.1109/TII.2005.844422 |
[20] |
WANG X, PARK J H, LIU H, et al. Cooperative output-feedback secure control of distributed linear cyber-physical systems resist intermittent DoS attacks[J]. IEEE Transactions on Cybernetics, 2020, 51(10):4924-4933.
doi: 10.1109/TCYB.2020.3034374 |
[21] | 余鹏, 王勇. DTU与主站通信系统的DoS攻击研究[J]. 华电技术, 2021, 43(2): 34-39. |
YU Peng, WANG Yong. Research on DoS attack to the communication system between DTU and master station[J]. Huadian Technology, 2021, 43(2): 34-39. | |
[22] | 卢官宇, 田秀霞, 张悦. 结合KNN和优化特征工程的AMI通信入侵检测研究[J]. 华电技术, 2021, 43(2): 1-8. |
LU Guanyu, TIAN Xiuxia, ZHANG Yue. Research on AMI communication intrusion detection combining KNN and optimized feature engineering[J]. Huadian Technology, 2021, 43(2): 1-8. | |
[23] |
李惠军, 陆建强, 周霞, 等. 面向智慧园区系统的网络攻击关联分析与防护策略研究[J]. 综合智慧能源, 2022, 44(7): 1-9.
doi: 10.3969/j.issn.2097-0706.2022.07.001 |
LI Huijun, LU Jianqiang, ZHOU Xia, et al. Network attack association analysis and attack protection strategy for smart park systems[J]. Integrated Intelligent Energy, 2022, 44(7): 1-9.
doi: 10.3969/j.issn.2097-0706.2022.07.001 |
|
[24] |
DING D, WANG Z, HAN Q L, et al. Security control for discrete-time stochastic nonlinear systems subject to deception attacks[J]. IEEE Transactions on Systems,Man,and Cybernetics:Systems, 2016, 48(5):779-789.
doi: 10.1109/TSMC.2016.2616544 |
[25] |
ZHU M, MARTINEZ S. On the performance analysis of resilient networked control systems under replay attacks[J]. IEEE Transactions on Automatic Control, 2013, 59(3):804-808.
doi: 10.1109/TAC.2013.2279896 |
[26] |
DING D, WANG Z, WEI G, et al. Event‐based security control for discrete‐time stochastic systems[J]. IET Control Theory & Applications, 2016, 10(15):1808-1815.
doi: 10.1049/iet-cta.2016.0135 |
[27] |
LIU D, DING D, SUN Y, et al. Nonlinear filtering under stochastic communication protocol with unknown scheduling probability[J]. International Journal of Control,Automation and Systems, 2021, 19(10):3343-3353.
doi: 10.1007/s12555-020-0337-5 |
[28] |
BAUER N W, DONKERS M C F, VAN DE WOUW N, et al. Decentralized observer-based control via networked communication[J]. Automatica, 2013, 49(7):2074-2086.
doi: 10.1016/j.automatica.2013.04.019 |
[29] |
UGRINOVSKII V, FRIDMAN E. A Round-Robin type protocol for distributed estimation with H∞ consensus[J]. Systems & Control Letters, 2014, 69:103-110.
doi: 10.1016/j.sysconle.2014.05.001 |
[30] |
XIE L, SOH Y C. Robust Kalman filtering for uncertain systems[J]. Systems & Control Letters, 1994, 22(2):123-129.
doi: 10.1016/0167-6911(94)90106-6 |
[31] |
REIF K, GUNTHER S, YAZ E, et al. Stochastic stability of the discrete-time extended Kalman filter[J]. IEEE Transactions on Automatic control, 1999, 44(4):714-728.
doi: 10.1109/9.754809 |
[1] | LI Yinuo, LIU Wei, WEI Xingshen, WANG Qi. Research on vulnerability of distribution networks with distributed photovoltaic under cyber attacks [J]. Integrated Intelligent Energy, 2024, 46(5): 50-57. |
[2] | YU Sheng, ZHOU Xia, SHEN Xicheng, DAI Jianfeng, LIU Zengji. Risk analysis on the source-grid-load-storage system affected by cyber attacks [J]. Integrated Intelligent Energy, 2024, 46(5): 41-49. |
[3] | LIANG Jiyun;KANG Jitao. Application of modulation theory in harmonic analysis of AC/DC transmission system [J]. Huadian Technology, 2011, 33(11): 52-53. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||