Research Article  Open Access
Hao Wang, He Jiang, Yan Zhao, Huanxin Guan, Bo Hu, Shunjiang Wang, "HighOrder ObserverBased Sliding Mode Control for the Isolated Microgrid with Cyber Attacks and Physical Uncertainties", Complexity, vol. 2020, Article ID 6662638, 11 pages, 2020. https://doi.org/10.1155/2020/6662638
HighOrder ObserverBased Sliding Mode Control for the Isolated Microgrid with Cyber Attacks and Physical Uncertainties
Abstract
System security is essential for the operation of the island microgrid. However, the system security is generally threatened due to the presence of physical uncertainties and cyber attacks. In this article, a novel sliding mode load control strategy is proposed for the microgrid to mitigate cyber attacks and physical uncertainties. Firstly, a highorder disturbance observer (HODO) is designed to estimate the unmeasurable factors in the microgrid. Secondly, a HODObased sliding mode control (SMC) strategy is proposed where the estimated value observed by the HODO is applied to the sliding mode surface and control law. It can better guarantee the security of the isolated microgrid. Then, the stability of the HODObased SMC is demonstrated by Lyapunov stability theory. Finally, simulation results show that the proposed control strategy has excellent control performance.
1. Introduction
The power system is regarded as a critical factor for economic development. With the rapid development of communication equipment, power system application, and energy management system [1–3], power systems merging primary and secondary systems are promoted to transform into the cyberphysical system (CPS). Consequently, the security of the cyberphysical power system has received widespread attention.
CPS security includes the security of physical systems and cyber systems. Physical security is the security of the primary system, which can stabilize the system at scheduled operating point under physical uncertainties. Cyber security means the security of the secondary system which is vulnerable to cyber attacks [4–6]. The insecurity of the cyberphysical power system has a significant impact on the society. For example, in 2019, the primary system of Venezuelan power system became the target of an attack, resulting in a largescale blackout. In 2003, the secondary system, computer network at the power plant, was hacked in Davis–Besse, USA. On the contrary, the security of the power grid can improve the utilization rate of clean energy power generation and enhance the reliability of the power grid [7, 8].
Because of the integration of advanced measuring devices, application software, and renewable generations, the security of the power system is threatened by serious attacks [9–12]. Multitype intelligent analysis software relies on computers and communication networks, which make the system vulnerable to cyber attacks. Meanwhile, the parameters of physical equipment including generators, turbines, and transmission lines are uncertain. Currently, many critical techniques about cyber attacks, which are the major challenge in the CPS, were studied by scholars. There are some advanced resilient control technologies for cyber attacks [13–15], such as data intrusion attacks [16, 17], nontechnical loss fraud, timedelay attacks [18], and replay attacks. Liu and Li [19] proposed a load distribution attack model with the incomplete acquisition of power system information. In [20], a detection technique was studied for uncertain systems. When the power system was attacked, it can be detected and protected immediately. In [21], a control strategy to protect distributed timedelay power systems was proposed. The method of timedelay estimation was introduced to solve timedelay switch attacks. In recent years, the advanced SMC has been proposed to address the threat of cyber attacks and physical uncertainties [22–24]. In [25], SMC with the neural network observer was constructed, where the measured values were used for the control law, and it was proven to be superior in simulation. Mi et al. [26] proposed SMC based on the proportionalintegral sliding mode surface, and this method proved that the microgrid can be immune to the attacks.
In this paper, a control strategy is investigated. Firstly, a transformed dynamics system is established combining cyber attacks and physical uncertainties as a lumped attack. Secondly, the attack is measured by a highorder nonlinear observer where the attack and its derivatives are observed. Then, compared to the linear sliding surface, an improved sliding surface including the estimation value is proposed. By employing the estimation value, system states are forced to move to the sliding mode surface with the control law. Finally, simulation results on the isolated microgrid are carried out to verify the performance of the controller.
The main contributions of the article are as follows:(1)Considering the characteristic of the power system, the presented HODO can be used to measure the cyber attacks and physical uncertainties in the power system(2)We construct the sliding mode surface and the control law based on the output of the HODO in the corresponding state space of the microgrid(3)Using the proposed control strategy, the security of the microgrid will be significantly improved, especially the frequency index
This paper is organized as follows: in Section 2, the system structure of the microgrid and the dynamic equations are proposed. In Section 3, conventional SMC is illustrated. In Section 4, the control strategy is proposed. Firstly, HODObased SMC is designed. Secondly, the stability is theoretically proved for the proposed method. The experimental simulation results are demonstrated in Section 5, while the work of this paper is summarized in Section 6.
2. Model of the CyberPhysical Power System
In this paper, a typical cyberphysical system composed of the power system and controller is considered. The matrix form of the cyberphysical power system is expressed as follows:wherewhere is the system state vector; , and are system matrices; , and are the deviations of frequency, power output, and governor valve position, respectively; , , and are the time constants of the power system, turbine, and governor, respectively; denotes the power system, is speed drop; and and denote the control vector and the cyber attacks, respectively. The formulated cyberphysical power system is similar to that of the literature [25].
Considering the physical uncertainties of the system dynamic model, equation (1) is written aswhere , , and are the determined physical system and , , and denote the uncertainties of the physical system. Equation (4) is the detailed representation of system dynamics (3):where denotes physical uncertainties.
The system dynamic model with cyber attacks and physical uncertainties can be represented as follows:where
The matrix form of system dynamic model (5) iswhere , and .
Assumption 1. Pair is observable.
In order to design the observer conveniently, let us transform system dynamics (5) using the transformation matrix. The structure iswhere and .
The aforementioned system is represented aswhere , , , and .
For the transformed dynamic equation (9), the following assumption is necessary.
Assumption 2. The attacks are continuous, and their higherorder derivative with respect to time satisfieswhere is a positive number.
Remark 2. Using a linear nonsingular transformation, system dynamic model (5) can be transformed into system (9). It should be noted that system (9) facilitates the design of HODObased SMC. Meanwhile, is equivalent to in simulation analysis.
3. Conventional SMC Design
In the microgrid, the conventional SMC was proposed to ensure system security through secondary frequency regulation of the generator, which adjusts the system to the normal working range with the attacks.
The design of the SMC is composed of two processes: firstly, to design a sliding surface; secondly, to design the control law. The designed sliding surface drives system states to the desired equilibrium asymptotically and remain on it. The system state can be driven to the sliding surface by the designed control law after sufficient time.
3.1. Linear SMC
Based on system dynamic (8), the linear SMC is designed aswhere are constants, and . meets that the polynomial , which is Hurwitz, such that the eigenvalues of the polynomial are less than zero.
According to the literature [27], the reaching condition is chosen as . The equality reaching condition is selected as follows:where and are positive numbers and is the sign function.
The control law is designed based on (8), (11), and (12), which drives the system state to the sliding surface:
3.2. ProportionalIntegral SMC
The proportionalintegral SMC is presented in this section. The proportionalintegral sliding surface is selected aswhere matrix is designed as .
Similar to (12), we have
The control law is designed as follows:
However, there are two obvious drawbacks including large overshoot and the lack of estimation for the attack.
4. Methodology
4.1. HighOrder Observer for Cyber Attacks and Physical Uncertainties
In this section, an observer is proposed to estimate the attack [28]. In Figure 1, physical attacks appear in the governing system, turbine, and power system. Meanwhile, cyber attacks corrupt the power system. When the system is attacked, the boundaries of the undetectable attack will be directly used in SMC without the HODO. Thus, the control is conservative. The proposed control strategy where the HODO can accomplish the detection of unknown attacks compensates this shortcoming to make the controller output more accurate.
The HODO can estimate the attacks for system (9) as follows:where , , are constant matrices which are necessary to select for the stability of the HODO; and are estimations of and , respectively, and are auxiliary variables .
The estimation errors are defined aswhereand is the error in the estimation of . From (8), (17), and (18), it follows that
Obviously, . Subtracting both sides of equation (23) from yields
From (19) and (20), we can get
Differentiating (25) and using (26) give
Since is bounded as Assumption 2, the stability of estimation errors depends on the selection of matrices . The HODO error dynamics can be expressed in the matrix form aswhere
In equation (28), the estimation error vector is illuminated in (21). The derivatives of all vectors in the estimation error vector can be calculated from (25) and (26). From (28), obviously, we can choose appropriate matrix such that the eigenvalues of can be placed arbitrarily. Assume that are designed to guarantee the eigenvalues of less than zero. A positive symmetric matrix can be selected as follows:
Define a Lyapunov functional, and is the smallest eigenvalue; then,
Substituting (28) into the derivative of becomes
Consequently, for (8), (25), and (26), after sufficiently long time, the norm of the estimation error is ultimately bounded by
When the error state trajectory enters into the closed ball centered at with radius and the smallest eigenvalue , the Lyapunov function satisfies . It implies that the estimation error system is stable. The bound of the estimation error can be lowered by the appropriate choice of the parameter .
4.2. SMC Based on the HODO
When the system is attacked, SMC is an effective control strategy to guarantee the security of the system. However, the shortcoming is that the conventional SMC method would bring some adverse effects such as introducing overshoot. In this section, a HODObased SMC is presented. It should be noted that SMC and HODO are designed, respectively.
To be immune to attacks, a linear sliding surface based on the HODO is applied to improve the stability of the power system.
The sliding surface is selected as follows:
Theorem 1. Using HODO (17)–(20) and the designed controller law (35), all the states of (9) are ultimately bounded; therefore, the closedloop system is asymptotically stable around equilibrium with the following control law:whereand and are positive constants.
Proof. Construct a Lyapunov candidate function asIt obviously elicitsFrom (9) and (34), it follows thatInserting (35) into (39), we obtainAccording to (24), we haveThen, substituting (41) to (40), we haveSubstituting (42) into (38), it follows thatAccording to (21), is bounded as follows:This completes the proof.
It should be noted that is invertible. The control block diagram of the proposed HODObased SMC is shown in Figure 2.
Figure 2 briefly illuminates the steps of the HODObased SMC. Firstly, the system dynamics is obtained, and coordinate transformation is performed. Secondly, the transformed coordinate is applied in the HODO. Thirdly, the estimated values calculated by the HODO work on the sliding mode surface. Finally, the calculated control law obtained from the sliding mode surface has an effect on the power system and the HODO.
5. Simulation Results with SMC
In this section, the proposed control strategy is analyzed by several numerical simulations. As we all know, in the cyberphysical power system, frequency deviation is the most important security index. Consequently, the frequency deviation is mainly discussed in the simulation.
In order to verify the effectiveness of the studied control strategy for the CPS, comparative results between the HODObased SMC and the conventional SMC are simulated and analyzed. The system parameters for simulation are listed in Table 1 [23]. In this simulation, the second and the thirdorder observer are analyzed for the effect of this control strategy.

By using the HODO based on equations (17)–(20), the second and thirdorder disturbance observers are expressed as follows.
The secondorder disturbance observer:
The thirdorder disturbance observer:
The control parameters and the initial variables are selected as
5.1. Step Cyber Attack
In this case, a step cyber attack is applied without physical uncertainties. Cyber attack is executed to the microgrid, which is 0.1 pu. And the cyber attack is added at the initial time and ends at 5 s. The attack boundary is .
The values are considered as follows: Parameter 1 (P1): Parameter 2 (P2): Parameter 3 (P3): Parameter 4 (P4):
We can see that the proposed SMC can ensure system security (especially, frequency deviation). The simulation result is presented in Figure 3. Moreover, it has a small overshoot compared with the conventional SMC at the initial time.
An evaluation index based on frequency deviation is employed to demonstrate HODO’s control performance, which is
Table 2 shows the evaluation index of frequency deviation between the conventional SMC and the secondorder disturbance observer with different parameters. It can be concluded from Table 2 that the adjustment ability of the secondorder disturbance observer is superior to the conventional SMC. Furthermore, the selection of the parameter in the secondorder disturbance observer has an improvement on the overshoot.

5.2. Random Cyber Attacks
In this case, the designed SMC with the secondorder disturbance observer and thirdorder disturbance observer is tested in the microgrid. The random external attack is injected into the microgrid, which is and ends at 15 s. The parameters of the disturbance observer are as follows:(a)The secondorder disturbance observer:(b)The thirdorder disturbance observer: The plot of the estimation values is shown in Figure 4. The disturbance can be tracked in 8 s, while the estimated value accurately estimates the reference disturbance after 10 s. The frequency deviation with the HODObased SMC is presented in Figure 5. Using equation (48), we get where and represent the evaluation index of the second and thirdorder disturbance observer. It can be concluded that it quickly converges to 0 with the thirdorder disturbance observer, compared with the effect of the secondorder disturbance observer.
5.3. Physical Uncertainties with Cyber Attacks
The stochastic step attack is executed to the microgrid (see Figure 6). Adjust the uncertainty time constant , the governor time constant , and the speed drop to 0.38, 0.08, and 2.5 in 20 s, respectively. System uncertainties and cyber attacks occur simultaneously between 15 and 20 seconds. When physical uncertainties appear in the secondary system, the system variables of the microgrid are gradually stable within the limited time by using HODObased SMC, which are shown in Figure 7.
6. Conclusion
In this paper, a HODObased SMC is employed to guarantee the security of the cyberphysical power system. Firstly, HODO is applied to measure cyber attacks and physical uncertainties with matching and unmatching. Secondly, the SMC with the estimated value obtained by the HODO effectively stabilizes the system, furthermore, as compared with the conventional SMC and the proposed control strategy, and the advantage of the HODObased SMC is small overshoot. In future, further research will be extended to the powerinterconnected and timedelay system.
Data Availability
The data used in the research of this article are available from the corresponding author upon request.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
Acknowledgments
This work was supported by Liaoning Revitalization Talents Program (XLYC1907138), the Natural Science Foundation of Liaoning Province (2019MS239), the Doctoral Scientific Research Foundation of Liaoning Province (2020BS181), the Key R&D Program of Liaoning Province (2018220017), and the Technology Innovation Talent Fund of Shenyang (RC190360).
References
 S. Sridhar, A. Hahn, and M. Govindarasu, “Cyberphysical system security for the electric power grid,” Proceedings of the IEEE, vol. 100, no. 1, pp. 210–224, 2012. View at: Publisher Site  Google Scholar
 M. Govindarasu, A. Hann, and P. Sauer, “Cyberphysical systems security for smart grid,” in Future Grid Initiative White Paper, PSERC Arizona State University, Tempe, AZ, USA, 2012. View at: Google Scholar
 Q. Sun, Y. Zhang, H. He, D. Ma, and H. Zhang, “A novel energy functionbased stability evaluation and nonlinear control approach for energy internet,” IEEE Transactions on Smart Grid, vol. 8, no. 3, pp. 1195–1210, 2017. View at: Publisher Site  Google Scholar
 G. Liang, J. Zhao, F. Luo, S. R. Weller, and Z. Y. Dong, “A review of false data injection attacks against modern power systems,” IEEE Transactions on Smart Grid, vol. 8, no. 4, pp. 1630–1638, 2017. View at: Publisher Site  Google Scholar
 B. M. Horowitz and K. M. Pierce, “The integration of diversely redundant designs, dynamic system models, and state estimation technology to the cyber security of physical systems,” Systems Engineering, vol. 16, no. 4, pp. 401–412, 2013. View at: Publisher Site  Google Scholar
 Z. Qu, Y. Zhang, N. Qu, L. Wang, Y. Li, and Y. Dong, “Method for quantitative estimation of the risk propagation threshold in electric power CPS based on seepage probability,” IEEE Access, vol. 6, pp. 68813–68823, 2018. View at: Publisher Site  Google Scholar
 Q. Sun, R. Han, H. Zhang, J. Zhou, and J. M. Guerrero, “A multiagentbased consensus algorithm for distributed coordinated control of distributed generators in the energy internet,” IEEE Transactions on Smart Grid, vol. 6, no. 6, pp. 3006–3019, 2015. View at: Publisher Site  Google Scholar
 A. Giani, E. Bitar, M. Garcia, M. Mcqueen, P. Khargonekar, and K. Poolla, “Smart grid data integrity attacks,” IEEE Transactions on Smart Grid, vol. 4, no. 3, pp. 1244–1253, 2013. View at: Publisher Site  Google Scholar
 J. P. Lopes, N. Hatziargyriou, J. Mutale, P. Djapic, and N. Jenkins, “Integrating distributed generation into electric power systems: a review of drivers, challenges and opportunities,” Electric Power Systems Research, vol. 77, no. 5, pp. 1189–1203, 2007. View at: Publisher Site  Google Scholar
 Y. Li, H. Zhang, X. Liang, and B. Huang, “Eventtriggeredbased distributed cooperative energy management for multienergy systems,” IEEE Transactions on Industrial Informatics, vol. 15, no. 4, pp. 2008–2022, 2019. View at: Publisher Site  Google Scholar
 F. Blaabjerg, R. Teodorescu, M. Liserre, and A. V. Timbus, “Overview of control and grid synchronization for distributed power generation systems,” IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1398–1409, 2006. View at: Publisher Site  Google Scholar
 R. Wang, Q. Sun, D. Ma, and Z. Liu, “The smallsignal stability analysis of the droopcontrolled converter in electromagnetic timescale,” IEEE Transactions on Sustainable Energy, vol. 10, no. 3, pp. 1459–1469, 2019. View at: Publisher Site  Google Scholar
 L. An and G.H. Yang, “Improved adaptive resilient control against sensor and actuator attacks,” Information Sciences, vol. 423, pp. 145–156, 2018. View at: Publisher Site  Google Scholar
 W. Ao, Y. Song, and C. Wen, “Adaptive cyberphysical system attack detection and reconstruction with application to power systems,” IET Control Theory & Applications, vol. 10, no. 12, pp. 1458–1468, 2016. View at: Publisher Site  Google Scholar
 Y. Wu, Z. Wei, J. Weng, X. Li, and R. H. Deng, “Resonance attacks on load frequency control of smart grids,” IEEE Transactions on Smart Grid, vol. 9, no. 5, pp. 4490–4502, 2018. View at: Publisher Site  Google Scholar
 G. Liang, S. R. Weller, J. Zhao, F. Luo, and Z. Y. Dong, “The 2015 Ukraine blackout: implications for false data injection attacks,” IEEE Transactions on Power Systems, vol. 32, no. 4, pp. 33173318, 2017. View at: Publisher Site  Google Scholar
 Y. Chen, S. Huang, F. Liu, Z. Wang, and X. Sun, “Evaluation of reinforcement learningbased false data injection attack to automatic voltage control,” IEEE Transactions on Smart Grid, vol. 10, no. 2, pp. 2158–2169, 2019. View at: Publisher Site  Google Scholar
 A. Sargolzaei, K. K. Yen, and M. N. Abdelghani, “Control of nonlinear heartbeat models under timedelayswitched feedback using emotional learning control,” International Journal on Recent Trends in Engineering & Technology, vol. 10, no. 2, pp. 85–91, 2014. View at: Google Scholar
 X. Liu and Z. Li, “Local load redistribution attacks in power systems with incomplete network information,” IEEE Transactions on Smart Grid, vol. 5, no. 4, pp. 1665–1676, 2014. View at: Publisher Site  Google Scholar
 H. Wang, J. Ruan, B. Zhou et al., “Dynamic data injection attack detection of cyber physical power systems with uncertainties,” IEEE Transactions on Industrial Informatics, vol. 15, no. 10, pp. 5505–5518, 2019. View at: Publisher Site  Google Scholar
 A. Sargolzaei, K. K. Yen, and M. N. Abdelghani, “Preventing timedelay switch attack on load frequency control in distributed power systems,” IEEE Transactions on Smart Grid, vol. 7, no. 2, pp. 1176–1185, 2016. View at: Publisher Site  Google Scholar
 L. Jiang, W. Yao, Q. H. Wu, J. Y. Wen, and S. J. Cheng, “Delaydependent stability for load frequency control with constant and timevarying delays,” IEEE Transactions on Power Systems, vol. 27, no. 2, pp. 932–941, 2012. View at: Publisher Site  Google Scholar
 A. Y. Siaramakrishna, M. V. Hariharam, and M. C. Srisailam, “Design of variable structure loadfrequency controller using pole assignment technique,” International Journal of Control, vol. 40, no. 3, pp. 487–498, 1984. View at: Publisher Site  Google Scholar
 C.T. Pan and C.M. Liaw, “An adaptive controller for power system loadfrequency control,” IEEE Transactions on Power Systems, vol. 4, no. 1, pp. 122–128, 1989. View at: Publisher Site  Google Scholar
 C. Mu, W. Liu, W. Xu, and M. Rabiul Islam, “Observerbased load frequency control for island microgrid with photovoltaic power,” International Journal of Photoenergy, vol. 2017, Article ID 2851436, 11 pages, 2017. View at: Publisher Site  Google Scholar
 Y. Mi, Y. Fu, C. Wang, and P. Wang, “Decentralized sliding mode load frequency control for multiarea power systems,” IEEE Transactions on Power Systems, vol. 28, no. 4, pp. 4301–4309, 2013. View at: Publisher Site  Google Scholar
 V. I. Utkin, Sliding Modes in Control Optimization, Springer, Berlin, Germany, 1992.
 D. Ginoya, P. D. Shendge, and S. B. Phadke, “Sliding mode control for mismatched uncertain systems using an extended disturbance observer,” IEEE Transactions on Industrial Electronics, vol. 61, no. 4, pp. 1983–1992, 2014. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2020 Hao Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.