Gabriella Fiore, A. Iovine, E. D. Santis, M. D. Benedetto
{"title":"直流微电网控制的安全状态估计","authors":"Gabriella Fiore, A. Iovine, E. D. Santis, M. D. Benedetto","doi":"10.1109/COASE.2017.8256334","DOIUrl":null,"url":null,"abstract":"DC MicroGrids are presently considered as the best solution for renewable energy diffusion since they represent the most effective way for interconnecting renewables and storages with modern loads such as electric vehicles. Hierarchical control composed by different levels is usually adopted and communication among the controllers is used to ensure grid stability. The exchanged information is assumed to be shared by means of a (wireless) communication network, which can be compromised by a malicious attacker. In this paper, the attack is not represented by a specific model, but is assumed to be unbounded and influencing only a small subset of sensors (which is fixed over time). For obtaining a secure exchange of data, a secure state estimation is performed.","PeriodicalId":445441,"journal":{"name":"2017 13th IEEE Conference on Automation Science and Engineering (CASE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Secure state estimation for DC microgrids control\",\"authors\":\"Gabriella Fiore, A. Iovine, E. D. Santis, M. D. Benedetto\",\"doi\":\"10.1109/COASE.2017.8256334\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"DC MicroGrids are presently considered as the best solution for renewable energy diffusion since they represent the most effective way for interconnecting renewables and storages with modern loads such as electric vehicles. Hierarchical control composed by different levels is usually adopted and communication among the controllers is used to ensure grid stability. The exchanged information is assumed to be shared by means of a (wireless) communication network, which can be compromised by a malicious attacker. In this paper, the attack is not represented by a specific model, but is assumed to be unbounded and influencing only a small subset of sensors (which is fixed over time). For obtaining a secure exchange of data, a secure state estimation is performed.\",\"PeriodicalId\":445441,\"journal\":{\"name\":\"2017 13th IEEE Conference on Automation Science and Engineering (CASE)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 13th IEEE Conference on Automation Science and Engineering (CASE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COASE.2017.8256334\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 13th IEEE Conference on Automation Science and Engineering (CASE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COASE.2017.8256334","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
DC MicroGrids are presently considered as the best solution for renewable energy diffusion since they represent the most effective way for interconnecting renewables and storages with modern loads such as electric vehicles. Hierarchical control composed by different levels is usually adopted and communication among the controllers is used to ensure grid stability. The exchanged information is assumed to be shared by means of a (wireless) communication network, which can be compromised by a malicious attacker. In this paper, the attack is not represented by a specific model, but is assumed to be unbounded and influencing only a small subset of sensors (which is fixed over time). For obtaining a secure exchange of data, a secure state estimation is performed.