Event-triggered memory sliding mode load frequency control of power system with BESSs against frequency-based deception attacks

  • Siwei Qiao
  • , Xinghua Liu
  • , Shiping Wen
  • , Gaoxi Xiao
  • , Badong Chen
  • , Shuzhi Sam Ge

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

An event-triggered memory sliding mode load frequency control (LFC) approach is proposed to address the cyber-security issue of multi-area power systems with battery energy storage systems (BESSs). To reveal the impact of cyber-attacks on the security and stability of multi-area power systems with BESSs, a frequency-based deception attack is considered as a contamination of the communication network. Attackers are assumed to determine the time of cyber-attacks by monitoring the operation status of the power systems with BESSs and designing the attack released condition with historical frequency. An event-triggered mechanism is investigated to reduce the communication pressure. In order to improve the triggering performance, a Lyapunov-based term is introduced in the triggering scheme. To ensure the stability of the power system under deception attacks, a memory sliding mode control (SMC) method is proposed in which the sliding mode surface is designed with a more effective structure. Based on integral inequality and Lyapunov's theorem, the stability conditions of the multi-area power systems with BESSs under historical frequency-based deception attacks are obtained by linear matrix inequality (LMI). The effectiveness of the proposed approach is discussed and confirmed by numerical simulations.

Original languageEnglish
Article number107644
JournalJournal of the Franklin Institute
Volume362
Issue number7
DOIs
StatePublished - 1 May 2025

Keywords

  • BESSs
  • Deception attacks
  • Event-trigger
  • LFC
  • Multi-area power systems
  • Sliding mode control

Fingerprint

Dive into the research topics of 'Event-triggered memory sliding mode load frequency control of power system with BESSs against frequency-based deception attacks'. Together they form a unique fingerprint.

Cite this