Resource-Efficient and Resilient SOC/SOH Co-Monitoring of EV Batteries With Attack Detection
A co-monitoring problem of state of charge (SOC) and state of health (SOH) under resource-constrained and insecure communication is addressed in this paper. First, an SOC/SOH co-monitoring framework is established to account for battery SOC and SOH dynamics, unknown-but-bounded (UBB) process and mea...
Saved in:
Published in | IEEE transactions on smart grid Vol. 16; no. 3; pp. 2529 - 2540 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.05.2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A co-monitoring problem of state of charge (SOC) and state of health (SOH) under resource-constrained and insecure communication is addressed in this paper. First, an SOC/SOH co-monitoring framework is established to account for battery SOC and SOH dynamics, unknown-but-bounded (UBB) process and measurement noises, dual coupled monitors, and intermittent measurement updates at multi-time scales. Second, a resource-efficient communication mechanism is proposed for determining the measurement updates according to not only the measurement variations but also the realtime network conditions, realizing reasonable utilization of constrained and time-varying communication resources. Third, dual coupled monitors are developed based on state predictors and estimators for SOC/SOH co-monitoring, which provide prediction and estimation ellipsoids enclosing the true states of SOC/SOH dynamics at all times. Then, encountering potential attacks, attack detection strategies are derived by calculating the intersection over union (IOU) of the prediction and estimation ellipsoids. Upon occurrences of attacks, a compensation mechanism is presented to replace the contaminated measurement-based state estimates by the attack influence-free predicted states, suppressing the adverse effects of attacks. Finally, comparative case studies are carried out to verify the efficacy and merit of the proposed methods. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 1949-3053 1949-3061 |
DOI: | 10.1109/TSG.2025.3525558 |