TechRxiv
J_IOT_Attack_identificatio_Preprint.pdf (2.42 MB)
Download file

A Novel Attack Identification Mechanism in IoT-Based Converter-Composed DC Grids

Download (2.42 MB)
preprint
posted on 2022-11-14, 03:13 authored by Sicheng GongSicheng Gong, Tomislav DragicevicTomislav Dragicevic, Nenad MijatovicNenad Mijatovic, Zhe Zhang

This paper proposes a novel attack identification mechanism for internet-of-things-based (IoT-based) converter-composed DC grids, where each agent collects its own and neighbours' measurement data for output regulation to meet a preceding power-sharing consensus. Independent from model-free or average-model-based attack detection theories, this mechanism is mainly inspired by converter stitching behavior analysis. Correspondingly, when facing latent signal substitution or agent instigation attacks, through comparing estimated signals with received ones for signal source authentication, both self-sensors and neighbours will be inspected. Eventually, not only can such attacks be detected, but also will respective attack sources be identified. A simulation case of 4-agent 800V IoT-based DC grid on Simulink and a hardware case of 3-agent 90V IoT-based DC grid on dSpace testing platform were investigated. Experimental results revealed that the estimation ratio error kept lower than 3.9% and all attacks were successfully identified, verifying the effectiveness of the proposed mechanism. 

Funding

NEON (New Energy and mobility Outlook for the Netherlands)

History

Email Address of Submitting Author

s.gong@tue.nl

ORCID of Submitting Author

0000-0002-1490-0582

Submitting Author's Institution

Eindhoven University of Technology

Submitting Author's Country

  • Netherlands

Usage metrics

    Exports