Resource-Efficient and Resilient SOC/SOH Co-Monitoring of EV Batteries With Attack Detection

A co-monitoring problem of state of charge (SOC) and state of health (SOH) under resource-constrained and insecure communication is addressed in this paper. First, an SOC/SOH co-monitoring framework is established to account for battery SOC and SOH dynamics, unknown-but-bounded (UBB) process and mea...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on smart grid Vol. 16; no. 3; pp. 2529 - 2540
Main Authors Xiao, Shunyuan, Ding, Lei, Ye, Maojiao, Yue, Dong, Ge, Hui
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.05.2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A co-monitoring problem of state of charge (SOC) and state of health (SOH) under resource-constrained and insecure communication is addressed in this paper. First, an SOC/SOH co-monitoring framework is established to account for battery SOC and SOH dynamics, unknown-but-bounded (UBB) process and measurement noises, dual coupled monitors, and intermittent measurement updates at multi-time scales. Second, a resource-efficient communication mechanism is proposed for determining the measurement updates according to not only the measurement variations but also the realtime network conditions, realizing reasonable utilization of constrained and time-varying communication resources. Third, dual coupled monitors are developed based on state predictors and estimators for SOC/SOH co-monitoring, which provide prediction and estimation ellipsoids enclosing the true states of SOC/SOH dynamics at all times. Then, encountering potential attacks, attack detection strategies are derived by calculating the intersection over union (IOU) of the prediction and estimation ellipsoids. Upon occurrences of attacks, a compensation mechanism is presented to replace the contaminated measurement-based state estimates by the attack influence-free predicted states, suppressing the adverse effects of attacks. Finally, comparative case studies are carried out to verify the efficacy and merit of the proposed methods.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1949-3053
1949-3061
DOI:10.1109/TSG.2025.3525558