Covert Attack Detection for LFC Systems of Electric Vehicles: A Dual Time-Varying Coding Method

In recent years, electric vehicles (EVs) have been widely used due to their remarkable decrease in carbon emissions and gasoline consumption. When the EVs are incorporated into the load frequency control (LFC) system, which can be seen as both the power supply and load of the power systems. However,...

Full description

Saved in:
Bibliographic Details
Published inIEEE/ASME transactions on mechatronics Vol. 28; no. 2; pp. 1 - 11
Main Authors Wu, Zhihua, Tian, Engang, Chen, Hongtian
Format Journal Article
LanguageEnglish
Published New York IEEE 01.04.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In recent years, electric vehicles (EVs) have been widely used due to their remarkable decrease in carbon emissions and gasoline consumption. When the EVs are incorporated into the load frequency control (LFC) system, which can be seen as both the power supply and load of the power systems. However, the LFC system with EVs is vulnerable to the covert attacks and consequently the reliable operation performance and security of the power system will be affected. To solve this security issue, the real-time monitoring and detection problems are investigated in this article. First, a networked LFC system with EVs is well established, which takes load disturbances, measurement noises, and covert attacks into account so as to truly reflect the operation process of the power system. Then, an <inline-formula><tex-math notation="LaTeX">{\mathcal {H}}_{\infty }</tex-math></inline-formula> sliding mode observer (SMO) is proposed to accurately estimate the internally physical state of the LFC system with EVs. In order to detect and disclose the covert attacker, a dual time-varying coding detection scheme is proposed, wherein both the control and measurement signals are encrypted before transmitting to the communication network. Subsequently, a dual time-varying coding-based detection algorithm is established, which ensures that the covert attacks can be detected without significant delay. Finally, one simulation is presented to provide tangible evidence of the effectiveness of the proposed real-time monitoring and detection methodology.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1083-4435
1941-014X
DOI:10.1109/TMECH.2022.3201875