Abstract
With the wide integration of various distributed communication and control techniques, the cyber-physical microgrids face critical challenges raised by the emerging cyberattacks. This paper proposes a three-stage defensive framework for distributed microgrids against denial of service (DoS) and false data injection (FDI) attacks, including resilient control, communication network reconfiguration, and switching of local control. The resilient control in the first stage is capable of tackling simultaneous DoS and FDI attacks when the connectivity of communication network could be maintained under cyberattacks. The communication network reconfiguration method in the second stage and the subsequent switching of local control in the third stage based on the software-defined network (SDN) layer aim to cope with the network partitions caused by cyberattacks. The proposed defensive framework could effectively mitigate the impacts of a wide range of simultaneous DoS and FDI attacks in microgrids without requiring the specific assumptions of attacks and prompt detections, which would not incorporate additional cyberattack risks. Extensive case studies using a 13-bus microgrid system are conducted to validate the effectiveness of the proposed three-stage defensive framework against the simultaneous DoS and FDI attacks.
MODERN power systems incorporate an increasing number of distributed energy resources (DERs). The utilization of DERs contributes significantly to the efficiency, reliability, resilience, and sustainability of power systems. Microgrids (MGs) provide a promising solution to accommodate and coordinate various DERs for delivering reliable power services to local customers by forming a small-scale self-controlled power system [
The dispatchable DERs in MGs are commonly inverter-based and furnished with battery storages, which could respond quickly to any disturbances. Droop control is extensively adopted for inverter-based DERs to achieve power sharing, but it leads to frequency and voltage deviations. To coordinate various inverter-based DERs and realize the frequency and voltage restoration, distributed secondary control is considered as an effective strategy due to its flexibility, scalability, and robustness, where the communication network plays a vital role in achieving the desirable functionalities. Thus, MG with distributed secondary control is regarded as a cyber-physical system, which faces potential cyber threats. Typical cyberattacks mainly include denial of service (DoS) attacks and false data injection (FDI) attacks. DoS and FDI attacks could lead to frequency and voltage instability of MGs and interrupt the proportional power sharing among DERs, resulting in compromised system efficiency and potential system security issues.
DoS attacks are widespread because the malicious adversaries could initiate DoS attacks easily without requiring any knowledge of the power system. Power systems all over the world have suffered huge losses due to DoS attacks [
FDI attacks are data deception or integrity attacks, where the attackers falsify data transmitted among DERs. There are also some research works related to distributed MG control under FDI attacks. Reference [
Although the existing research works could mitigate the deterioration by DoS and FDI attacks on dynamic performance of MG, there exist the following research gaps: ① prior information or specific assumptions of DoS attacks are mandatory for mitigating the impact, which could not always hold in practice; ② detections of falsified data are essential for mitigating the impact of FDI attacks. However, when malicious attackers hold the detailed structure and parameters of MGs, the intruded stealthy FDI attacks would be much difficult to be detected [
To address these issues, this paper proposes a three-stage defensive framework for distributed MG control under simultaneous DoS and FDI attacks. Compared with the existing research works, the proposed framework can mitigate the impacts of a wide range of simultaneous DoS and FDI attacks in MGs without requiring the specific assumptions of occurred attacks and prompt detections, which would not incorporate additional cyberattack risks. The contributions of this paper are summarized as follows.
1) A systematic three-stage defensive framework for distributed MG control against DoS and FDI attacks is proposed, mainly including the resilient control, communication network reconfiguration, and the switching of local control, where the three stages are activated according to the impacts of cyberattacks. The proposed framework effectively mitigates the performance deteriorations of MG caused by a wide range of simultaneous DoS and FDI attacks without requiring the specific assumptions of DoS attacks and detections of FDI attacks.
2) An H-infinity theory based resilient control strategy is proposed in the first stage, where a bilinear matrix inequality (BMI) is established to ensure the performance of resilience under simultaneous DoS and FDI attacks, and the homotopy method is adopted to solve the BMI problem. It is theoretically demonstrated that the proposed resilient control strategy is capable of mitigating the impacts of simultaneous DoS and FDI attacks when the connectivity of communication network is not interrupted.
3) Considering the potential communication network partitions caused by cyberattacks, the SDN layer based communication network reconfiguration method and the switching strategy of local control are designed in the second and third stages, respectively. Data exchanges between the control layer and the SDN layer are limited to the communication link status and control strategy switching, indicating that the communication burdens and the associated risks of cyberattacks are significantly reduced.
The rest of this paper is organized as follows. The dynamic model of distributed MG control under DoS and FDI attacks is presented in Section II. The three-stage defensive framework is presented in Section III. Simulation results using a 13-bus MG system are presented in Section IV. Section V concludes this paper.
An undirected graph, , is adopted to depict the undirected communication network in MG, where is the vertice set, and the subscript N is the number of DERs in the MG; is the edge set; and A is the adjacency matrix. The elements of A, , are presented as:
(1) |
The vertices denote the grid-forming DERs. The edges denote that there is communication between two connected DERs. The degree matrix D is a diagonal matrix, and the diagonal elements of D, , are stated as:
(2) |
The Laplacian matrix L is stated as:
(3) |
It is noted that L is positive-semidefinite and irreducible. In the distributed control framework, some DERs are selected as pinning DERs to receive the reference information and other unpinning DERs receive the information by using the communication network. Hence, the pinning matrix G is a diagonal matrix. The diagonal elements of G, , are stated as:
(4) |
where subscript i denotes the DER index; and is the pinning DER set.
The distributed MG control is illustrated in

Fig. 1 Illustrative diagram for distributed MG control.
The MG control strategy includes primary control and secondary control. The primary control is the droop control. are for secondary control where information exchange supported by the communication network is necessary. Then, the space vector pulse width modulation (SVPWM) is used to control the inverter. The analysis of frequency control and voltage control are usually decoupled in MG operation [
(5) |
where and are the frequency and frequency setpoint of DER i, respectively; and mi is the droop coefficient of DER i. The droop control achieves proportional active power sharing among participating DERs.
(6) |
However, the droop control results in frequency deviations after disturbances, e.g., load variations. The distributed MG control tends to achieve frequency consensus while maintaining the proportional active power sharing among participating DERs [
(7) |
The distributed secondary control is adopted to achieve (6) and (7). The distributed secondary control is stated as:
(8) |
(9) |
(10) |
where , , and are the differential operation of frequency setpoint, frequency, and active power control signals of DER i, respectively; c and c are the parameters of frequencies of DER i; and are the active power control signals of DERs i and j, respectively; and c is the parameter of active power control of DER i.
Cyberattacks mainly include DoS and FDI attacks. These two types of cyberattacks would be simultaneously mitigated by the proposed framework. Here, we focus on cyberattacks on communication links.
DoS attacks aim at jeopardizing the availability of communication resources and services by jamming communication channels or flooding packets in communication networks for affecting the timeliness of exchanged data [
(11) |
(12) |
where aij,k denotes the occurance of DoS attack.
(13) |
FDI attacks aim at deteriorating the system performance by injecting malicious signals in communication links. The frequency control and active power control under FDI are stated as:
(14) |
(15) |
where and are the falsified signals on communication link ij.
Let , and . The dynamic equations of state errors of frequency control and active power control under simultaneous DoS and FDI attacks are stated as:
(16) |
(17) |
where and are the error vectors of frequency and active power control, respectively; and are the parameter matrices of frequencies; is the parameter matrix of active power control; Lk, Gk, and Fk are Laplace matrix, pinning matrix, and incidence matrix under DoS attack k, respectively; and and are the falsified signal vectors of frequency and active power control, respectively.
This subsection would discuss the driving force of developing a three-stage defensive framework. DoS attacks disable communication links. Proactively disabling communication links could prevent FDI attacks with large deviations from causing a sharp deterioration of the system performance. Consequently, the communication network structure may undergo a variety of changes when cyberattacks occur. Reference [
The first stage is the resilient control. In this stage, cyberattacks do not partition the communication network. Although some communication links fail due to cyberattacks, the communication network is still a connected graph. Thus, it is possible to develop a resilient control using the connected communication network to resist cyberattacks, though the system may switch due to DoS attacks and false signals are used due to FDI attacks.
The second stage is the communication network reconfiguration. Since the changing communication network can be a countermeasure against cyberattacks [
The third stage is the switching of local control. When the communication network is partitioned due to cyberattacks, the distributed control contracts to the local control, where the information exchange is not required between DERs. In this stage, the primary control is adopted as the local control. Although the frequency would deviate from the reference frequency when adopting primary control, the active power sharing is satisfied and all cyberattacks on communication links no longer deteriorate the system. To realize the second and third stages, an SDN layer is adopted. The defensive layers for MGs against cyberattacks are shown in

Fig. 2 Illustrative defensive layers for MGs against cyberattacks.
In the first stage, a resilient control based on the H-infinity theory is proposed. The frequency signals are transmitted among participating DERs through the communication network and the MG frequency fluctuates in an allowable range.
When a DER receives frequency signals deviating dramatically from the frequency reference, the existence of FDI attacks is considered and the corresponding communication link is disabled to avoid serious performance deterioration. Thus, false signals with large deviations can be filtered out and these situations could be regarded as DoS attacks in (16) and (17). Hence, false signals in (16) and (17) satisfy , , where L2 denotes the 2-norm. We firstly discuss the frequency control in (16). According to the lemma in [
Lemma 1: for a positive scalar , system (16) is asymptotically stable with , if there exists a positive definite matrix satisfying the following inequality.
(18) |
where is the function of matrices C and P, which is expressed by ; and I is the identity matrix.
According to lemma 1, the frequency of MG is stabilized and the error is within a small range when a controller satisfying the (18) is used. Inequality (18) is a BMI. In classical H-infinity applications, it can be solved by converting it to linear matrix inequality (LMI) through linear transformations and substitutions. However, inequality (18) has an intrinsic bilinear nature, which cannot be directly converted to LMI through transformations and substitutions. The homotopy method offers a viable solution to solve BMI by alternately fixing partial variables in the iterations. Based on this idea, the homotopy method could solve BMIs by reducing them to LMIs in every iteration [
(19) |
(20) |
where is the scalar; and K is a constant matrix with the same size as C and is obtained by the method proposed in [
Accordingly, the solving procedures of (18) are presented as follows.
Step 1: solve D and P using the method proposed in [
Step 2: set , , and .
Step 3: set , . Solve . If it is not feasible, go to Step 4. If is feasible, let and solve . Let and go to Step 6.
Step 4: solve . If is not feasible, go to Step 5. If it is feasible, let and solve . Let and go to Step 6.
Step 5: let . If , the solution algorithm does not converge, otherwise, let , and , and go to Step 3.
Step 6: if , go to Step 3. If , CM and PM are the solutions of BMI (18).
Then, we discuss the active power sharing control in (17), which is different from the above frequency control. According to the lemma in [
Lemma 2 [
(21) |
There exists an orthogonal matrix U that satifies:
(22) |
where the column vectors of U are the eigenvectors of Λ. The following statements hold about matrix Ψ which satisfies and .
(23) |
Let and the system in (17) is converted as:
(24) |
where . According to lemma 2, the following system is obtained as:
(25) |
Thus, the reduced system of (17) is stated as:
(26) |
where the elements of matrices and are functions of
In the second stage, we propose a communication network reconfiguration method based on the SDN layer. The objective of the second stage is to maximize the resilient performance with fewer communication topological changes. The model is formulated as:
(27) |
(28) |
(29) |
(30) |
where is the status of communication link ij before reconfiguration.
The realization of the second stage is as follows. First, the control layer sends statuses of communication links to the SDN layer. Then, (27)-(30) are solved in the SDN layer in MGCC, and the MGCC sends statuses of the communication links to the control layer. Last, the communication network is reconfigured by the control layer.
In the first and second stages, the communication network maintains the connectivity originally or after manipulating, respectively. When the severe DoS attacks occur, even the communication network reconfiguration cannot guarantee the connectivity of communication network. It is divided into several sub-networks and some non-pinning DERs may not receive signals from the pinning DERs. In this situation, the objectives of (6) and (7) would deviate and the distributed control strategies would be difficult to effectively mitigate the impact of the cyberattacks [
To handle this problem, the local control in the third stage is activated based on SDN layer. The local control does not need information exchange among DERs. In this paper, the primary control is adopted as the local control. The realization of the third stage is as follows. When the MGCC finds that (29) cannot be met under cyberattacks, it sends the commands of switching control modes to the control layer. Then, the controller switches the distributed control mode to the local control mode. When the third stage is activated, the communication network is not used temporarily, so the cyberattacks on communication links no longer further deteriorate the system. When cyberattacks are removed, the MGCC recognizes that the connectivity of communication network is retained and then sends the commands of switching control modes to DERs. Then, the participating DERs would respond to the switching signals of received mode and switch back from local control mode to distributed control mode. The connectivity check of communication network can be conducted periodically by the MGCC and the functionality for control mode switching can be ensured.
The proposed defensive framework can resist a wide arrange of cyberattacks. A resilient control is proposed in the first stage which can resist simultaneous DoS and FDI attacks when the connectivity of communication network is not interrupted. According to lemma 1, the system is asymptotically stable under resilient control proposed in the first stage when cyberattacks do not occur, i.e., false signals and . Hence, the resilient control proposed in the first stage can work under the normal state, i.e., no cyberattacks, and does not need to be activated. To deal with DoS attacks resulting in communication partitions, the second and third stages are proposed in Sections III-C and III-D. These two stages are activated according to the extent of DoS attacks and performed by the MGCC through the SDN layer. The communication information transferred through the SDN only includes the status of the communication links and control strategy types rather than control signals, e.g., frequencies and active power sharing. So the SDN layer can be implemented by internal telephone or even manual means rather than using the control network without incorporating additional cyber risks. Hence, when the communication network is partitioned by cyberattacks, the functionalities of the second and third stages would not be affected. The following aspects further present the prominent features of the proposed defensive framework.
1) Unlike previous research works using specific expressions to model DoS attacks such as the Markov model [
2) In the existing resilient control of MG for mitigating FDI attacks, false data detection methods are considered [
3) The communication network reconfiguration also changes the Laplacian matrix L, hence the second stage can cooperate with the first stage. When the second stage is activated, the resilient control strategy proposed in the first stage still works.
4) In the existing SDN layer based method for resilient control of MG [
5) The proposed framework is flexible and extensible. Other proactive measures can be easily incorporated into the third stage such as cutting off DERs, load shedding, and system splitting.
To validate the effectiveness of the proposed framework, a 13-bus MG system is simulated on the PSCAD/EMTDC platform. Due to the universality of stability analysis and multi-stage cooperation, the proposed framework can also be effectively used in large-scale systems.

Fig. 3 13-bus MG system.
The DER1 and DER4 are pinning DERs and other DERs are unpinning ones.

Fig. 4 Communication network of 13-bus MG system.
The parameters of the system and DERs are presented in [
1) At s, cyberattack 1 occurs.
2) At s, a 15 kW load is added on bus 3.
3) At s, cyberattack 2 occurs.
4) At s, a 15 kW load is removed on bus 3.
5) At s, cyberattack 1 is removed.
6) At s, cyberattack 2 is removed.
It is noted that the cyberattacks 1 and 2 which are presented in detail in the following three scenarios are different.
In this scenario, the ability of the proposed framework to resist FDI attacks is verified. The FDI attack 1 occurs on communication links 1-2. The FDI attack 2 occurs on communication links 4-5.

Fig. 5 FDI attacks on 13-bus MG system. (a) FDI attack locations. (b) FDI attack signals.
False signal 1 is the sinusoidal signal and false signal 2 is the irregular slope signal. The FDI attack signals are added to the original signals. The unit of the FDI attack signals is Hz. The FDI attacks are formed as:
(31) |
(32) |

Fig. 6 MG performance under FDI attacks. (a) Frequency. (b) Active power sharing.

Fig. 7 MG performance with proposed defensive framework under FDI attacks. (a) Frequency. (b) Active power sharing.
In this scenario, the ability of the proposed framework to resist DoS attacks is verified. The DoS attack 1 occurs on communication links 1-5. The DoS attack 2 occurs on communication links 4-5.

Fig. 8 DoS attacks on 13-bus MG system.

Fig. 9 MG performance under DoS attacks. (a) Frequency. (b) Active power sharing.

Fig. 10 MG performance with proposed framework under DoS attacks. (a) Frequency. (b) Active power sharing.
As illustrated above, DoS attacks 1 and 2 occur at and , respectively. Load increment and curtailment occur at and , respectively. In
The second stage is activated at s because DoS attacks disconnect DER5 from the communications network. According to model (27)-(30), communication links 1-4 and 2-5 are connected to enhance resilient performance. In
In this scenario, the ability of the proposed framework to resist simultaneous DoS and FDI attacks and expanding attacks is verified. Cyberattack 1 includes the DoS attacks on communication links 1-5 and 4-5 and FDI attacks on communication links 3-4. The FDI attack is formed as (31).
Cyberattack 2 includes the DoS attack on communication links 1-2, 2-3, 2-4, and 2-5. Combined cyberattacks are illustrated in

Fig. 11 Combined cyberattacks on 13-bus MG system.

Fig. 12 MG performance under combined cyberattacks. (a) Frequency. (b) Active power sharing.

Fig. 13 MG performance with proposed framework under combined cyberattacks. (a) Frequency. (b) Active power sharing.
It is observed from
The three-stage defensive framework for distributed MG control under simultaneous DoS and FDI attacks is proposed in this paper. The first stage is resilient control. The second stage is the communication network reconfiguration. The third stage is to switch to local control. Each stage is triggered according to the extent of cyberattacks. Extensive case studies are conducted to validate the effectiveness of the proposed framework against a wide range of DoS attacks, FDI attacks, simultaneous DoS and FDI attacks without relying on timely detections of FDI attacks, specific assumptions of DoS attacks, and incorporating additional cyberattack risks.
The proposed framework is flexible and extensible. The future work will focus on incorporating other proactive measures into the defensive framework to further improve the MG performance in terms of cyber resiliency such as cutting off DERs, load shedding, and system splitting.
References
K. Ahmed, M. Seyedmahmoudian, S. Mekhilef et al., “A review on primary and secondary controls of inverter-interfaced microgrid,” Journal of Modern Power Systems and Clean Energy, vol. 9, no. 5, pp. 969-985, Sept. 2021. [Baidu Scholar]
Y. Liu, R. Fan, and V. Terzija, “Power system restoration: a literature review from 2006 to 2016,” Journal of Modern Power Systems and Clean Energy, vol. 4, no. 3, pp. 332-341, Jul. 2016. [Baidu Scholar]
E. Bompard, T. Huang, Y. Wu et al., “Classification and trend analysis of threats origins to the security of power systems,” International Journal of Electrical Power & Energy Systems, vol. 50, no. 1, pp. 50-64, Sept. 2013. [Baidu Scholar]
M. Ni, M. Li, J. Li et al., “Concept and research framework for coordinated situation awareness and active defense of cyber-physical power systems against cyber-attacks,” Journal of Modern Power Systems and Clean Energy, vol. 9, no. 3, pp. 477-484, May 2021. [Baidu Scholar]
J. Liu, X. Lu, and J. Wang, “Resilience analysis of DC microgrids under denial of service threats,” IEEE Transactions on Power Systems, vol. 34, no. 4, pp. 3199-3208, Jul. 2019. [Baidu Scholar]
J. Liu, Y. Du, S. Yim et al., “Steady-state analysis of microgrid distributed control under denial of service attacks,” IEEE Journal of Emerging and Selected Topics in Power Electronics, vol. 9, no. 5, pp. 5311-5325, Oct. 2021. [Baidu Scholar]
S. Hu, P. Yuan, D. Yue et al., “Attack-resilient event-triggered controller design of DC microgrids under DoS attacks,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 67, no. 2, pp. 699-710, Feb. 2020. [Baidu Scholar]
C. Deng, C. Wen, Y. Zou et al., “A hierarchical security control framework of nonlinear CPSs against DoS attacks with application to power sharing of AC microgrids,” IEEE Transactions on Cybernetics, doi: 10.1109/TCYB.2020.3029045 [Baidu Scholar]
S. Liu, Z. Hu, X. Wang et al., “Stochastic stability analysis and control of secondary frequency regulation for islanded microgrids under random denial of service attacks,” IEEE Transactions on Industrial Informatics, vol. 15, no. 7, pp. 4066-4075, Jul. 2019. [Baidu Scholar]
Z. Lian, F. Guo, C. Wen et al., “Distributed resilient optimal current sharing control for an islanded DC microgrid under DoS attacks,” IEEE Transactions on Smart Grid, vol. 12, no. 5, pp. 4494-4505, Sept. 2021. [Baidu Scholar]
L. Ding, Q. Han, B. Ning et al., “Distributed resilient finite-time secondary control for heterogeneous battery energy storage systems under denial-of-service attacks,” IEEE Transactions on Industrial Informatics, vol. 16, no. 7, pp. 4909-4919, Jul. 2020. [Baidu Scholar]
M. Chlela, D. Mascarella, G. Joós et al., “Fallback control for isochronous energy storage systems in autonomous microgrids under denial-of-service cyber-attacks,” IEEE Transactions on Smart Grid, vol. 9, no. 5, pp. 4702-4711, Sept. 2018. [Baidu Scholar]
P. Danzi, M. Angjelichinoski, Č. Stefanović et al., “Software-defined microgrid control for resilience against denial-of-service attacks,” IEEE Transactions on Smart Grid, vol. 10, no. 5, pp. 5258-5268, Sept. 2019. [Baidu Scholar]
A. S. Mohamed, M. F. M. Arani, A. A. Jahromi et al., “False data injection attacks against synchronization systems in microgrids,” IEEE Transactions on Smart Grid, vol. 12, no. 5, pp. 4471-4483, Sept. 2021. [Baidu Scholar]
B. P. Poudel, A. Mustafa, A. Bidram et al., “Detection and mitigation of cyber-threats in the DC microgrid distributed control system,” International Journal of Electrical Power & Energy Systems, vol. 120, p. 105968, Sept. 2020. [Baidu Scholar]
T. Sen, P. Xie, J. M. Guerrero et al., “Cyberattack detection for converter-based distributed DC microgrids: observer-based approaches,” IEEE Industrial Electronics Magazine, doi: 10.1109/MIE.2021.3059996 [Baidu Scholar]
X. Liu, C. Wen, Q. Xu et al., “Resilient control and analysis for DC microgrid system under DoS and Impulsive FDI Attacks,” IEEE Transactions on Smart Grid, vol. 12, no. 5, pp. 3742-3754, Sept. 2021. [Baidu Scholar]
W. Zhang, T. Qian, X. Chen et al., “Resilient economic control for distributed microgrids under false data injection attacks,” IEEE Transactions on Smart Grid, vol. 12, no. 5, pp. 4435-4446, Sept. 2021. [Baidu Scholar]
Y. Liu, Y. Li, Y. Wang et al., “Robust and resilient distributed optimal frequency control for microgrids against cyber attacks,” IEEE Transactions on Industrial Informatics, vol. 18, no. 1, pp. 375-386, Jan. 2022. [Baidu Scholar]
J. Zhang, S. Sahoo, J. Peng et al., “Mitigating concurrent false data injection attacks in cooperative dc microgrids,” IEEE Transactions on Power Electronics, vol. 36, no. 8, pp. 9637-9647, Aug. 2021. [Baidu Scholar]
S. Sahoo, T. Dragičević, and F. Blaabjerg, “Multilayer resilience paradigm against cyber attacks in DC microgrids,” IEEE Transactions on Power Electronics, vol. 36, no. 3, pp. 2522-2532, Mar. 2021. [Baidu Scholar]
S. Sahoo, Y. Yang, and F. Blaabjerg, “Resilient synchronization strategy for AC microgrids under cyber attacks,” IEEE Transactions on Power Electronics, vol. 36, no. 1, pp. 73-77, Jan. 2021. [Baidu Scholar]
S. Sahoo and J. Peng, “A localized event-driven resilient mechanism for cooperative microgrid against data integrity attacks,” IEEE Transactions on Cybernetics, vol. 51, no. 7, pp. 3687-3698, Jul. 2021. [Baidu Scholar]
C. Deng, Y. Wang, C. Wen et al., “Distributed resilient control for energy storage systems in cyber-physical microgrids,” IEEE Transactions on Industrial Informatics, vol. 17, no. 2, pp. 1331-1341, Feb. 2021. [Baidu Scholar]
A. Kavousi-Fard, W. Su, and T. Jin, “A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids,” IEEE Transactions on Industrial Informatics, vol. 17, no. 1, pp. 650-658, Jan. 2021. [Baidu Scholar]
M. Shi, X. Chen, M. Shahidehpour et al., “Observer-based resilient integrated distributed control against cyberattacks on sensors and actuators in islanded AC microgrids,” IEEE Transactions on Smart Grid, vol. 12, no. 3, pp. 1953-1963, May 2021. [Baidu Scholar]
J. Zhou, Y. Xu, L. Yang et al., “Attack-resilient distributed control for islanded single-/three-phase microgrids based on distributed adaptive observers,” Journal of Modern Power Systems and Clean Energy, vol. 10, no. 1, pp. 109-119, Jan. 2022. [Baidu Scholar]
M. R. Khalghani, J. Solanki, S. K. Solanki et al., “Resilient frequency control design for microgrids under false data injection,” IEEE Transactions on Industrial Informatics, vol. 68, no. 3, pp. 2151-2162, Mar. 2021. [Baidu Scholar]
Q. Zhou, M. Shahidehpour, A. Alabdulwahab et al., “A cyber-attack resilient distributed control strategy in islanded microgrids,” IEEE Transactions on Smart Grid, vol. 11, no. 5, pp. 3690-3701, Sept. 2020. [Baidu Scholar]
S. Sahoo, S. Mishra, J. C. Peng et al., “A stealth cyber-attack detection strategy for DC microgrids,” IEEE Transactions on Power Electronics, vol. 34, no. 8, pp. 8162-8174, Aug. 2019. [Baidu Scholar]
K. de Brabandere, B. Bolsens, J. van den Keybus et al., “A voltage and frequency droop control method for parallel inverters,” IEEE Transactions on Power Electronics, vol. 22, no. 4, pp. 1107-1115, Jul. 2007. [Baidu Scholar]
W. Huang, Z. Shuai, X. Shen et al., “Dynamical reconfigurable masterslave control architecture (DRMSCA) for voltage regulation in islanded microgrids,” IEEE Transactions on Power Electronics, vol. 37, no. 1, pp. 249-263, Jan. 2022. [Baidu Scholar]
J. M. Guerrero, J. C. Vasquez, J. Matas et al., “Hierarchical control of droop-controlled AC and DC microgrids – a general approach toward standardization,” IEEE Transactions on Industrial Electronics, vol. 58, no. 1, pp. 158-172, Jan. 2011. [Baidu Scholar]
R. Olfati-Saber and R. M. Murray, “Consensus problems in networks of agents with switching topology and time-delays,” IEEE Transactions on Automation Control, vol. 49, no. 9, pp. 1520-1533, Sept. 2004. [Baidu Scholar]
C. X. Rosero, M. Velasco, P. Martí et al., “Analysis of consensus-based islanded microgrids subject to unexpected electrical and communication partitions,” IEEE Transactions on Smart Grid, vol. 10, no. 5, pp. 5125-5135, Sept. 2019. [Baidu Scholar]
T. Tao, S. Roy, and S. Baldi, “Stable adaptation in multi-area load frequency control under dynamically-changing topologies,” IEEE Transactions on Power Systems, vol. 36, no. 4, pp. 2946-2956, Jul. 2021. [Baidu Scholar]
A. Patel, S. Roy, and S. Baldi, “Wide-area damping control resilience towards cyber-attacks: a dynamic loop approach,” IEEE Transactions on Smart Grid, vol. 12, no. 4, pp. 3438-3447, Jul. 2021. [Baidu Scholar]
P. Lin and Y. Jia, “Average consensus in networks of multi-agents with both switching topology and coupling time-delay,” Physica A: Statistical Mechanics and Its Applications, vol. 387, no. 1, pp. 303-313, Jan. 2008. [Baidu Scholar]
G. Zhai, M. Ikeda, and Y. Fujisaki, “Decentralized [Baidu Scholar]
controller design: a matrix inequality approach using a homotopy method,” Automatica, vol. 37, no. 4, pp. 565-572, Apr. 2001. [Baidu Scholar]
T. Iwasaki and R. E. Skelton, “All controllers for the general [Baidu Scholar]
control problem: LMI existence conditions and state space formulas,” Automatica, vol. 30, no. 8, pp. 1307-1317, Aug. 1994. [Baidu Scholar]
Y. Yu, C. Wang, and C. Zhong, “A reachability matrix based power flow tracing method for transmission loss allocation,” in Proceedings of 7th Asia Modelling Symposium, Hong Kong, China, Sept. 2013, pp. 258-263. [Baidu Scholar]
Z. Li and M. Shahidehpour, “Small-signal modeling and stability analysis of hybrid AC/DC microgrids,” IEEE Transactions on Smart Grid, vol. 10, no. 2, pp. 2080-2095, Mar. 2019. [Baidu Scholar]