Abstract
False data injection attacks (FDIAs) against the load frequency control (LFC) system can lead to unstable operation of power systems. In this paper, the problems of detecting and estimating the FDIAs for the LFC system in the presence of external disturbances are investigated. First, the LFC system model with FDIAs against frequency and tie-line power measurements is established. Then, a design procedure for the unknown input observer (UIO) is presented and the residual signal is generated to detect the FDIAs. The UIO is designed to decouple the effect of the unknown external disturbance on the residual signal. After that, an attack estimation method based on a robust adaptive observer (RAO) is proposed to estimate the state and the FDIAs simultaneously. In order to improve the performance of attack estimation, the technique is employed to minimize the effect of external disturbance on estimation errors, and the uniform boundedness of the state and attack estimation errors is proven using Lyapunov stability theory. Finally, a two-area interconnected power system is simulated to demonstrate the effectiveness of the proposed attack detection and estimation algorithms.
MAINTAINING the balance between the electricity supply and demand is one of the most important issues in power systems. The power imbalance will lead to the deviation of the grid frequency from its nominal value, which might affect the power system stability and security [
However, due to the heavy reliance on communication networks, the power system is vulnerable to cyber attacks [
False data injection attack (FDIA) is one of most severe types of cyber attacks on smart grids. A malicious attacker can compromise the communication networks and inject false data into the LFC system, which may cause huge damage to the power system [
There have been several detection techniques for FDIAs on LFC systems. For instance, in [
After the attack is detected, the next step is attack estimation. The estimation of the attack vector is very worthwhile to discover the attackers’ strategies and helps the decision maker take further actions. In recent years, various types of estimation methods have been proposed. In [
Although some achievements have been made on the detection and estimation of FDIAs in power systems, some issues still remain to be addressed. ① To detect and estimate the attacks, the system model under FDIAs must be obtained. Thus, how to establish the model of the LFC system with the attacks of frequency and tie-line power measurement needs an explicit investigation. ② Both the abrupt load fluctuation and FDIAs will lead to the abnormal operation of power systems. The above-mentioned methods cannot distinguish the FDIAs from the load variation. The wrong distinction may lead to wrong decisions. ③ The accurate estimation of the FDIAs when the attacks and the load disturbance are mixed together is challenging and has rarely been addressed.
To resolve these shortcomings, this paper focuses on the problems of the detection and estimation of FDIAs for the LFC system. An unknown input observer (UIO) is then developed to detect the FDIAs for the LFC system. Furthermore, inspired by the composite hierarchical anti-disturbance control theory [
The main contributions of this paper are listed and discussed as follows.
1) A new model for describing the attacked LFC system is proposed. This model can be used for analyzing the system during the attacks of frequency and tie-line power measurements. Different from the existing research works [
2) A UIO-based attack detection method against FDIAs is designed for the LFC system. The load fluctuation is modeled as an unknown input and can be completely decoupled from the residual signal. Thus, the residual signal is sensitive to the attacks and robust to the disturbance. FDIAs are then detected by comparing the residual signal and the prescribed threshold.
3) An RAO is developed to estimate the state and the attack signal simultaneously for the LFC system. In order to improve the accuracy of attack estimation, the technique is applied and the disturbance attenuation level is minimized by employing the linear matrix inequality (LMI) based optimization approach. The stability of the proposed RAO is proven by using Lyapunov stability theory. Compared with the traditional adaptive observer [
Throughout the paper, the vector norm is defined as and the matrix norm is defined as , where is the maximum singular value; is the L2-norm defined as ; and I is an identity matrix of appropriate dimension. For a matrix Y, .
The rest of this paper is organized as follows. Section II presents the modeling and analysis of LFC system subject to FDIAs. Section III presents the UIO-based attack detection. Section IV presents the RAO-based attack estimation. In Section V, simulation results of a two-area power system are presented to illustrate the effectiveness of the proposed UIO-based attack detection and RAO-based attack estimation method. Finally, Section VI concludes this paper.
Large power systems usually consist of several power areas connected together by tie-lines. The LFC system is a large-scale networked control system which regulates the power flow between different power areas while keeping the desired frequency and power interchanges at the desired level. The mathematical model of the LFC system under FDIAs can be represented by an equivalent linear model [

Fig. 1 Mathematical model of LFC system under FDIAs.
According the transfer function given in
(1) |
where i is the area number; , , , , and are the generator power deviation, frequency deviation, turbine valve position, load deviation, and tie-line power deviation, respectively; , , ,, and are the moment of inertia of generator, speed-drop coefficient, damping coefficient, time constant of the governor, and time constant of the turbine for the power area, respectively; is the control input; and is the stiffness constant between the and power areas.
Furthermore, the LFC center receives the ACE signal, which is a linear combination of the frequency deviation and tie-line power deviation. Then, the LFC center sends the LFC command to the plants, which can mitigate the power imbalance in power areas, thus achieving the stability of frequency and tie-line power. The ACE signal under attack-free conditions can be defined as:
(2) |
where is the frequency bias factor. Using the ACE signal as a corresponding control input of load frequency controller, a proportional-integral (PI) controller is designed as:
(3) |
where and are the proportional and integral gains, respectively.
Combining the above analyses, the state-space equation of the LFC power area under attack-free conditions can be described as:
(4) |
where , , , and are the state variable vector, input vector, disturbance vector, and output vector, respectively; and are the state variable matrix and output matrix, respectively; and A, B, C, and E are the state, input, output, and disturbance matrices, respectively. These matrices can be determined as:
(5) |
(6) |
(7) |
(8) |
The power areas are connected to the centralized LFC system. The LFC system sends control signals to the plants and receives signals through sensor measurements. As depicted in
(9) |
where and are the compromised and true ACE signals, respectively; and and are the false signals added to the frequency and tie-line power measurements, respectively.
According to the above analyses, the state-space equation of the power area during attacks can be modified as:
(10) |
where F is the attack matrix; and denotes the FDIAs, which can be expressed as:
(11) |
(12) |
Remark 1: since the ACE signal is the control input of the LFC system and it is a linear combination of the frequency deviation and tie-line power deviation. Either the attack on the frequency measurement or on the tie-line power measurement will be reflected in the ACE signal. Therefore, a lumped attack term is adopted to represent the combined effect of the attacks of frequency and tie-line power measurements.
In this paper, three types of attack modes are considered and listed as follows.
1) Attack mode 1: bias attack on the tie-line power measurement.
In this mode, attackers add certain bias vector on tie-line power measurement. Then, the compromised ACE signal , which is used to generate frequency control commands in LFC center of area i, can be expressed as a linear combination of the true measurement and an attack term :
(13) |
The attack model can be described as:
(14) |
2) Attack mode 2: harmonic attack on the frequency measurement.
In this mode, attackers add harmonic vector on the frequency measurement. The harmonic attack can be expressed as:
(15) |
where , , and are the amplitude, frequency, and phase of the harmonic attack, respectively.
The attack model can be expressed as:
(16) |
Since the system frequency of the power system usually fluctuates periodically due to load fluctuation, the harmonic attack on the frequency measurement is difficult to detect by the system operator.
3) Attack mode 3: simultaneous attacks on the frequency measurement and tie-line power measurement.
In this mode, attackers inject the bias attack on tie-line power measurement and the harmonic attack on frequency measurement simultaneously. The attack model can be expressed as:
(17) |
The impacts of FDIAs on power systems are shown in
Remark 2: there exist other types of FDIAs such as scaling attack and ramp attack. In this paper, we only focus on the bias attack and harmonic attack. The modeling and analysis of the FDIAs can lay a good foundation for the attack detection and estimation.
A UIO-based attack detection method is proposed to decouple the external disturbance and detect the FDIAs. The dynamic model of the UIO for the system in (10) can be represented as:
(18) |
where is the state vector of the UIO system; is the estimated state vector of ; and F, T, H, and K are the gain matrices, which should be designed to achieve unknown input decoupling.

Fig. 2 Block diagram of UIO for LFC system under FDIAs.
In order to select proper gain matrices for designing the UIO, the state estimation error dynamics can be expanded as:
(19) |
where . The parametric matrices of the UIO can be obtained by solving:
(20) |
If the above conditions are satisfied, then the state estimation error dynamics will be:
(21) |
It is clear from (21) that the estimation error is decoupled from the unknown input d(t). If the matrix F is Hurwitz and the system is attack-free, the estimation error of the designed UIO will approach zero asymptotically.
It is proven in [
(22) |
A flow chart that describes the design procedure of the UIO is depicted in
(23) |
(24) |

Fig. 3 Flow chart of design procedure of UIO.
where n1 is the rank of the observability matrix for the pair in which the pair is observable. The unobservable modes are combined in the eigenvalues of A22. More details about the observable canonical decomposition method can be found in [
In order to use the UIO for attack detection purposes, a residual signal is needed. In this paper, the difference between the measured output and estimated output is considered as a residual signal.
(25) |
where and are the residual and estimated output vectors, respectively. It can be seen from (21) and (25) that the residual signal will converge to zero with the state estimation error approaching zero in the absence of FDIAs. When FDIAs occur, the residual signal will deviate from zero if the gain matrix H is designed such that . Then, the detection logic under FDIAs can be expressed as:
(26) |
where means the FDIAs have been injected into the LFC system and otherwise; and is the detection threshold, which set to be zero under ideal conditions. However, due to the existence of estimation errors and measurement noises, the threshold should be set to a small value to avoid false positive alarms.
Remark 3: the threshold selection is very important since a high threshold would result in high false negative rates and a low threshold would result in high false positive rates (FPR). The detection threshold can be set either by minimizing false attack detection rate under attack-free conditions, or by using hypothesis testing methods such as -test [
Step 1: define a maximum acceptable FPR.
Step 2: generate measurement noises based on the noise distribution.
Step 3: increase the detection threshold from zero until the FPR meets the desired FPR, e.g., 1%. This step is done to fine tune the detection thresholds for a low FPR.
Step 4: perform the above process (Steps 2 and 3) for a large number of trials due to the random nature of measurements noises.
Step 5: obtain the mean values of the detection thresholds for the trials.
Step 6: select the mean value of the detection thresholds as the final detection threshold.
Note that the system model could contain uncertainties, e.g., the parameter uncertainty. The uncertainties would influence the detection accuracy of the UIO. One method to deal with the uncertainties is to obtain a priori knowledge of the upper and lower bounds of the uncertainties. Then, the detection threshold can be adaptively adjusted according to the upper and lower bounds. For example, the adaptive threshold can be obtained by using the L2-norm method [
For system (10), a robust adaptive attack observer can be designed as:
(27) |
where is the attack estimate vector; is the output error vector; is a positive learning ratio; is the observer gain matrix; is the matrix to be determined; and is the positive scalar.
The state estimate error , output estimate error , and attack estimate error can be defined as:
(28) |
Then, the error dynamics is described by:
(29) |
Before the main results are presented, three assumptions and a lemma are given.
Assumption 1: pair (A, C) is observable and .
Assumption 2: the load disturbance is bounded, i.e., , where is an unknown constant.
Assumption 3: the derivative of with respect to time is norm bounded, i.e.,
(30) |
where is an unknown constant. It is evident that the aforementioned three types of FDIAs satisfy this assumption.
Lemma 1 [
(31) |
Theorem 1: consider system (10). Under Assumptions 1-3 and given scalars , if there exist positive definite symmetric matrices , , and other matrices and , such that the following conditions hold:
(32) |
(33) |
where represents the symmetric elements in a symmetric matrix, then the proposed robust adaptive observer (27) with can ensure that the state estimate error and the attack estimate error are uniformly bounded and output estimate error for the external disturbance satisfies the performance .
Proof: consider the following Lyapunov function as:
(34) |
The derivative of the Lyapunov candidate with respect to time can be derived as:
(35) |
According to (33), we can obtain:
(36) |
Substituting (36) into (35) yields:
(37) |
From Lemma 1 and Assumption 3, we can obtain:
(38) |
Substituting (38) into (37), we can further obtain:
(39) |
To guarantee that the proposed adaptive observer is robust to the external unknown disturbance , an performance index function is introduced as:
(40) |
Under the zero initial conditions, we have and , which leads to:
(41) |
It follows from (41) that:
(42) |
If conditions (32) and (33) hold, we can obtain:
(43) |
where . Then , which indicates for :
(44) |
Note that Theorem 1 is deduced from the three assumptions and Lemma 1. Specially, Assumption 1 provides a sufficient condition for the existence of the robust adaptive observer. Assumption 2 is used to illustrate the existence of the H∞ performance index in Theorem 1. Assumption 3 and Lemma 1 are used to deduce (38).
Therefore, both the state estimate error and the attack estimate error converge to a small set while the output estimate error for the external disturbance satisfies the performance . This completes the proof.
Remark 4: as illustrated in Theorem 1, compared with the traditional adaptive observer [
Remark 5: the effect of the disturbance on the output estimate error is bounded by the value of . The accuracy of state and attack estimations increases with a decrease in the value of . Therefore, the robustness of the proposed adaptive observer can be enhanced by minimizing . The minimum can be obtained by solving the following optimization problem:
(45) |
Remark 6: in Theorem 1, the condition (32) can be solved by using standard LMI toolbox. However, it is difficult to solve (32) and (33) simultaneously. To solve this problem, we can transform (33) into the following LMI-based convex optimization problem:
(46) |
With this method, a sufficiently small positive scalar can be selected such that matrices and can be computed to make approximately equal to with satisfactory accuracy.
Using (46), we can transform (45) into the following optimization problem:
(47) |
where is a constant that is large enough to guarantee that the optimal value of is a sufficiently small positive scalar. This optimization problem seeks two objectives. The first one is to find proper matrices , , , and such that the proposed adaptive observer can ensure that the state estimate error and the attack estimate error are uniformly bounded. The other objective is to boost the robustness of the observer against the external disturbance by minimizing the disturbance attenuation level while satisfying the relevant constraints.
In this section, the effectiveness of the proposed detection and estimation methods is illustrated with a two-area interconnected power system. The classical LFC model in
(48) |
Several simulation scenarios have been carried out for the three aforementioned attack modes. The bias attack on the tie-line power measurement is considered as:
(49) |
The harmonic attack on the frequency measurement is considered as:
(50) |
In this subsection, the performance of the proposed UIO-based attack detection scheme is investigated. Firstly, the existence of the UIO has been checked by validating the rank condition, . Then, the residual used for designing the attack detector in the LFC system is chosen as the error between the measured ACE signal and the estimated ones. The simulation results for the three attack modes are shown in

Fig. 4 Simulation results for three attack modes. (a) Bias attack. (b) Harmonic attack. (c) Composite attack.
The threshold is chosen to be higher than the maximum value of these residuals in case of no attacks. As shown in
In order to assess the robustness of the proposed approach against the measurement noises, a Gaussian white noise with zero mean and covariance matrix is added to the measurement vector. The maximum acceptable FPR is set to be 0.5%. By using the proposed threshold selection method, the threshold is set to be 0.19×1

Fig. 5 Detection results for three types of FDIA.
In this subsection, the accuracy of the proposed RAO-based attack estimation scheme is studied. For the RAO (27), the parameters are chosen such that ,, . Using Theorem 1 and solving (47), we can obtain:
(51) |
The simulation results shown in Figs.

Fig. 6 Bias attack and its estimate with RAO, traditional AO, and ASMO.

Fig. 7 Harmonic attack and its estimate with RAO, traditional AO, and ASMO.

Fig. 8 Composite attack and its estimate with RAO, traditional AO, and ASMO
Furthermore, to demonstrate the effectiveness of the proposed method more quantitatively, the root mean squared error (RMSE) is utilized as a measure to evaluate the accuracy of the observers. The RMSE for the attack signals is calculated using the following formula:
(52) |
where m is the total number of sample points. A Gaussian white noise with zero mean and covariance matrix is also added to the measurement vector. The RMSEs for the three types of estimated attack signals using the RAO and traditional adaptive observer are shown in
In this paper, the problem of cyber attacks on the LFC system is studied. Firstly, the dynamic model of the LFC system subject to external disturbance and FDIAs is established and three attack modes are modeled and analyzed considering the FDIAs on frequency measurements and tie-line power measurements. Then, an attack detection and an attack estimation algorithm are proposed for the LFC system in the presence of FDIAs. Based on the UIO, a design procedure for the residual generation to detect the attack is presented. By designing the parameters in the observer, the unknown external disturbance is decoupled from the residual signal. An RAO-based attack estimation method is proposed to estimate the state and the attack signal simultaneously. In order to improve the robustness against the external disturbance, the technique is introduced by minimizing the disturbance attenuation level. Finally, three attack modes are simulated with a two-area power system. The simulation results show that the proposed detection method is able to effectively detect the attacks and the estimation method can accurately estimate the attacks for the LFC system in the presence of the external unknown disturbance. How to mitigate the impact of FDIAs on the LFC system will become our next consideration.
References
K. Liao and Y. Xu, “A robust load frequency control scheme for power systems based on second-order sliding mode and extended disturbance observer,” IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3076-3086, Jul. 2018. [Baidu Scholar]
K. Lu, G. Zeng, X. Luo et al., “An adaptive resilient load frequency controller for smart grids with DoS attacks,” IEEE Transactions on Vehicular Technology, vol. 69, no. 5, pp. 4689-4699, May 2020. [Baidu Scholar]
T. N. Pham, H. Trinh, and L. V. Hien, “Load frequency control of power systems with electric vehicles and diverse transmission links using distributed functional observers,” IEEE Transactions on Smart Grid, vol. 7, no. 1, pp. 238-252, Jun. 2016. [Baidu Scholar]
S. Wen, X. Yu, Z. Zeng et al., “Event-triggering load frequency control for multiarea power systems with communication delays,”IEEE Transactions on Industrial Electronics, vol. 63, no. 2, pp. 1308-1317, Feb. 2016. [Baidu Scholar]
R. Patel, L. Meegahapola, L. Wang et al., “Automatic generation control of multi-area power system with network constraints and communication delays,” Journal of Modern Power Systems and Clean Energy, vol. 8, no. 3, pp. 454-463, May 2020. [Baidu Scholar]
C. Zhou, B. Hu, Y. Shi et al., “A unified architectural approach for cyberattack-resilient industrial control systems,” Proceedings of the IEEE, vol. 109, no. 4, pp. 1-25, Nov. 2020. [Baidu Scholar]
E. Kontouras, A. Tzes, and L. Dritsas, “Set-theoretic detection of data corruption attacks on cyber physical power systems,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 872-886, Sept. 2018. [Baidu Scholar]
G. Liang, S. R. Weller, J. Zhao et al., “The 2015 Ukraine blackout: implications for false data injection attacks,” IEEE Transactions on Power Systems, vol. 32, no. 4, pp. 3317-3318, Jul. 2017. [Baidu Scholar]
S. Sridhar and M. Govindarasu, “Model-based attack detection and mitigation for automatic generation control,” IEEE Transactions on Smart Grid, vol. 5, no. 2, pp. 580-591, Mar. 2014. [Baidu Scholar]
C. Peng, J. Li, and M. Fei, “Resilient event-triggering H∞ load frequency control for multi-area power systems with energy-limited DoS attacks,” IEEE Transactions on Power Systems, vol. 32, no. 5, pp. 4110-4118, Sept. 2017. [Baidu Scholar]
X. Luo, Q. Yao, X. Wang et al., “Observer-based cyber attack detection and isolation in smart grids,” International Journal of Electrical Power & Energy Systems, vol. 101, pp. 127-138, Oct. 2018. [Baidu Scholar]
X. Luo, X. Wang, M. Zhang et al., “Distributed detection and isolation of bias injection attack in smart energy grid via interval observer,” Applied Energy, vol. 256, p. 113703, Dec. 2019. [Baidu Scholar]
X. Wang, X. Luo, X. Pan et al., “Detection and location of bias load injection attack in smart grid via robust adaptive observer,” IEEE Systems Journal, vol. 14, no. 3, pp. 4454-4465, Sept. 2020. [Baidu Scholar]
R. Tan, H. H. Nguyen, Y. S. Foo et al., “Modeling and mitigating impact of false data injection attacks on automatic generation control,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 7, pp. 1609-1624, Jul. 2017. [Baidu Scholar]
C. Chen, K. Zhang, K. Yuan et al., “Novel detection scheme design considering cyber attacks on load frequency control,” IEEE Transactions on Industrial Informatics, vol. 14, no. 5, pp. 1932-1941, May 2018. [Baidu Scholar]
W. Bi, K. Zhang, Y. Li et al., “Detection scheme against cyber-physical attacks on load frequency control based on dynamic characteristics analysis,” IEEE Systems Journal, vol. 13, no. 3, pp. 2859-2868, Sept. 2019. [Baidu Scholar]
S. D. Roy and S. Debbarma, “Detection and mitigation of cyber-attacks on AGC systems of low inertia power grid,” IEEE Systems Journal, vol. 14, no. 2, pp. 2023-2031, Jun. 2020. [Baidu Scholar]
A. Abbaspour, A. Sargolzaei, P. Forouzannezhad et al., “Resilient control design for load frequency control system under false data injection attacks,” IEEE Transactions on Industrial Electronics, vol. 67, no. 9, pp. 7951-7962, Sept. 2020. [Baidu Scholar]
A. F. Taha, J. Qi, J. Wang et al., “Risk mitigation for dynamic state estimation against cyber attacks and unknown inputs,” IEEE Transactions on Smart Grid, vol. 9, no. 2, pp. 886-899, Mar. 2018. [Baidu Scholar]
W. Ao, Y. Song, and C. Wen, “Adaptive cyber-physical system attack detection and reconstruction with application to power systems,” IET Control Theory & Applications, vol. 10, no. 12, pp. 1458-1468, Aug. 2016. [Baidu Scholar]
H. H. Alhelou, M. E. H. Golshan, and N. D. Hatziargyriou, “A decentralized functional observer based optimal LFC considering unknown inputs, uncertainties, and cyber-attacks,” IEEE Transactions on Power Systems, vol. 34, no. 6, pp. 4408-4417, Nov. 2019. [Baidu Scholar]
M. Khalaf, A. Youssef, and E. El-Saadany, “Joint detection and mitigation of false data injection attacks in AGC systems,” IEEE Transactions on Smart Grid, vol. 10, no. 5, pp. 4985-4995, Sept. 2019. [Baidu Scholar]
Z. Kazemi, A. A. Safavi, F. Naseri et al., “A secure hybrid dynamic-state estimation approach for power systems under false data injection attacks,” IEEE Transactions on Industrial Informatics, vol. 16, no. 12, pp. 7275-7286, Dec. 2020. [Baidu Scholar]
C. Chen, M. Cui, X. Fang et al., “Load altering attack-tolerant defense strategy for load frequency control system,” Applied Energy, vol. 280, p. 116015, Oct. 2020. [Baidu Scholar]
B. Jiang, J. Wang, and Y. C. Soh, “An adaptive technique for robust diagnosis of faults with independent effects on system outputs,” International Journal of Control, vol. 75, no. 11, pp. 792-802, Oct. 2002. [Baidu Scholar]
J. Zhang, A. K. Swain, and S. K. Nguang, “Robust H∞ adaptive descriptor observer design for fault estimation of uncertain nonlinear systems,” Journal of the Franklin Institute, vol. 351, no. 11, pp. 5162-5181, Sept. 2014. [Baidu Scholar]
L. Guo and W. Chen, “Disturbance attenuation and rejection for systems with nonlinearity via DOBC approach,” International Journal of Robust and Nonlinear Control, vol. 15, no. 3, pp. 109-125, Dec. 2005. [Baidu Scholar]
L. Guo and S. Cao, “Anti-disturbance control theory for systems with multiple disturbances: a survey,” ISA Transactions, vol. 53, no. 4, pp. 846-849, Jan. 2014. [Baidu Scholar]
W. Chen, J. Yang, L. Guo et al., “Disturbance-observer-based control and related methods–an overview,” IEEE Transactions on Industrial Electronics, vol. 63, no. 2, pp. 1083-1095, Sept. 2016. [Baidu Scholar]
Q. Jia, W. Chen, Y. Zhang et al., “Robust fault reconstruction via learning observers in linear parameter-varying systems subject to loss of actuator effectiveness,” IET Control Theory & Applications, vol. 8, no. 1, pp. 42-50, Sept. 2014. [Baidu Scholar]
Q. Jia, W. Chen, Y. Zhang et al., “Fault reconstruction and accommodation in linear parameter-varying systems via learning unknown-input observers,” Journal of Dynamic Systems, Measurement, and Control, vol. 137, no. 6, pp. 1-9, Jan. 2015. [Baidu Scholar]
Z. Ke, B. Jiang, and C. Vincent, “Adaptive observer-based fast fault estimation,” International Journal of Control, Automation, and Systems, vol. 6, no. 3, pp. 320-326, Jun. 2008. [Baidu Scholar]
J. Liu, Y. Gu, L. Zha et al., “Event-triggered H∞ load frequency control for multiarea power systems under hybrid cyber attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 8, pp. 1665-1678, Aug. 2019. [Baidu Scholar]
J. Chen and R. J. Patton, Robust Model-based Fault Diagnosis for Dynamic Systems. New York: Springer Science & Business Media, 1999. [Baidu Scholar]
H. H. Alhelou, M. E. H. Golshan, and J. Askari-Marnani, “Robust sensor fault detection and isolation scheme for interconnected smart power systems in presence of RER and EVs using unknown input observer,” International Journal of Electrical Power & Energy Systems, vol. 99, pp. 682-694, Jul. 2018. [Baidu Scholar]
Y. Mo, R. Chabukswar, and B. Sinopoli, “Detecting integrity attacks on SCADA systems,” IEEE Transactions on Control Systems Technology, vol. 22, no. 4, pp. 1396-1407, Jul. 2014. [Baidu Scholar]
A. Ashok, M. Govindarasu, and V. Ajjarapu, “Online detection of stealthy false data injection attacks in power system state estimation,” IEEE Transactions on Smart Grid, vol. 9, no. 3, pp. 1636-1646, Jul. 2016. [Baidu Scholar]
A. Taherkhani and F. Bayat, “Wind turbines robust fault reconstruction using adaptive sliding mode observer,” IET Generation, Transmission & Distribution, vol. 13, no. 14, pp. 3096-3104, Jul. 2019. [Baidu Scholar]