TY - JOUR
T1 - Watermarking-Based Defense Mechanism in LFC of Electricity Grids Compromised by Covert Attacks
AU - Oshnoei, Soroush
AU - Aghamohammadi, Mohammad Reza
AU - Heidary, Jalal
AU - Khooban, Mohammad Hassan
PY - 2024
Y1 - 2024
N2 - This brief focuses on improving the load frequency control (LFC) performance of a multi-area power system compromised by covert attacks. In this regard, a novel detection technique based on the multiplicative watermarking and Luenberger observer is developed to identify covert attacks applied to the system. In the presented detection strategy, a special watermark generator filter produces a dummy signal on the original signal transmitted through the insecure communication channels. In addition, there is a watermark equalization filter at the end of the communication channel, which cancels out the impact of the watermark signal, resulting in the recovery of the original signal. A PI controller tuned by the deep reinforcement learning algorithm and dependent on the Luenberger observer is utilized as the secondary frequency control strategy to mitigate the impacts of the convert attacks. The OPAL-RT real-time emulator-based results show the proposed defense strategy successfully detects and mitigates the covert attacks imposed on the system.
AB - This brief focuses on improving the load frequency control (LFC) performance of a multi-area power system compromised by covert attacks. In this regard, a novel detection technique based on the multiplicative watermarking and Luenberger observer is developed to identify covert attacks applied to the system. In the presented detection strategy, a special watermark generator filter produces a dummy signal on the original signal transmitted through the insecure communication channels. In addition, there is a watermark equalization filter at the end of the communication channel, which cancels out the impact of the watermark signal, resulting in the recovery of the original signal. A PI controller tuned by the deep reinforcement learning algorithm and dependent on the Luenberger observer is utilized as the secondary frequency control strategy to mitigate the impacts of the convert attacks. The OPAL-RT real-time emulator-based results show the proposed defense strategy successfully detects and mitigates the covert attacks imposed on the system.
KW - Computer crime
KW - Frequency control
KW - Generators
KW - Load frequency control
KW - Luenberger observer
KW - Observers
KW - Power system stability
KW - Vectors
KW - Watermarking
KW - covert attacks
KW - deep reinforcement learning
KW - multi-area power system
KW - multiplicative watermarking
UR - https://www.scopus.com/pages/publications/85192168950
U2 - 10.1109/TCSII.2024.3396734
DO - 10.1109/TCSII.2024.3396734
M3 - Journal article
SN - 1549-7747
VL - 71
SP - 4576
EP - 4580
JO - IEEE Transactions on Circuits and Systems II: Express Briefs
JF - IEEE Transactions on Circuits and Systems II: Express Briefs
IS - 10
ER -