Next Article in Journal
Modeling of Induction Motors and Variable Speed Drives for Multi-Domain System Simulations Using Modelica and the OpenIPSL Library
Previous Article in Journal
Modified Rime-Ice Growth Optimizer with Polynomial Differential Learning Operator for Single- and Double-Diode PV Parameter Estimation Problem
Previous Article in Special Issue
Bad Data Repair for New Energy Stations in Power System Based on Multi-Model Parallel Integration Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Fusion Adaptive Cubature Kalman Filter Approach for False Data Injection Attack Detection of DC Microgrids

1
State Grid Henan Electric Power Research Institute, Zhengzhou 450052, China
2
School of Electrical and Information Engineering, Zhengzhou University, Zhengzhou 450001, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(9), 1612; https://doi.org/10.3390/electronics13091612
Submission received: 13 March 2024 / Revised: 16 April 2024 / Accepted: 20 April 2024 / Published: 23 April 2024

Abstract

:
With the widespread application of information technology in microgrids, microgrids are evolving into a class of power cyber–physical systems (CPSs) that are deeply integrated with physical and information systems. Due to the high dependence of microgrids’ distributed cooperative control on real-time communication and system state information, they are increasingly susceptible to false data injection attacks (FDIAs). To deal with this issue, in this paper, a novel false data injection attack detection method for direct-current microgrids (DC MGs) was proposed, based on fusion adaptive cubature Kalman filter (FACKF) approach. Firstly, a DC MG model with false data injection attack is established, and the system under attack is analyzed. Subsequently, an FACKF approach is proposed to detect attacks, capable of accurately identifying the attacks on the DC MG and determining the measurement units injected with false data. Finally, simulation validations were conducted under various DC MG model conditions. The extensive simulation results demonstrate that the proposed method surpasses traditional CKF detection methods in accuracy and effectiveness across different conditions.

1. Introduction

With new energy technologies rapidly advancing and energy policies gradually adapting, the integration of distributed energy resources and the construction of the energy internet have become significant trends in global energy development. Direct-current microgrids (DC MGs), with their efficiency, flexibility, and reliability, play a crucial role in facilitating the access to distributed energy and accelerating the development of the energy internet [1,2,3,4,5]. However, as typical examples of cyber–physical systems (CPSs), the open, distributed, and networked characteristics of nonlinear DC-MG systems require extensive data exchange and information processing in communication and collaboration processes, leading to increased security risks such as data tampering and attacks [6,7,8,9]. These attacks can compromise the accurate estimation of the DC MG’s state, and inaccurate state assessments can lead to incorrect monitoring decisions. Therefore, in-depth research into the secure operation of DC MGs to ensure their stability and reliability is of significant importance for promoting the development of distributed energy systems and the construction of the energy internet.
In general, a false data injection attack (FDIA) is a prevalent attack that disrupts the normal operation of a system by tampering with its data. This can cause the system to crash or malfunction. In the case of DC MGs, FDIAs can result in voltage fluctuations, load imbalances, and other issues that significantly impact the system’s stability and reliability. Therefore, detecting and preventing FDIAs effectively is one of the crucial issues in the field of DC MG research [10,11,12,13,14]. Currently, FDIA detection methods are mainly classified into two categories: model-based and data-based detection methods [15,16,17]. Model-based detection methods determine whether it contains false data attack injection by calculating the residual difference between the actual output of the process and the output predicted based on the mathematical model. References [18,19] have received attention for their robustness to model uncertainties and disturbances due to the unknown input observer (UIO) approach to decouple FDIA and perturbation for attack detection. In addition, reference [20] proposed a false attack detection algorithm based on the cubature Kalman filter for detecting attack injections in nonlinear systems. Reference [21] proposed a square root maximum correlation entropy volume Kalman filter with adaptive kernel width for estimating continuous discrete nonlinear dynamic systems with non-Gaussian non-zero mean noise. In references [22,23], the detection problem was treated as an augmented and generalized state space system. The cubature Kalman filter (CKF) and unscented Kalman filter (UKF) were employed to estimate the sensor states. The main drawback of detection schemes based on system models is the requirement for system parameters and models. These parameters are not constant and can be subject to slight uncertainties and fluctuations, which can impact the effectiveness of the detection.
In comparison, the advantage of data-driven detection schemes is their independence from system parameters. These schemes only require the design of a model and training the model using historical data, thereby avoiding the negative impact caused by minor fluctuations in system parameters. Reference [24] employed multilayer perceptron (MLP) neural networks for fault detection and learning vector quantization (LVQ) classification for fault diagnosis. References [25,26] used long short-term memory (LSTM) neural networks and deep convolutional neural network (DCNN) deep learning techniques to improve detection efficiency. Reference [27] proposed a data-driven state estimation method based on data fusion techniques to obtain the optimal estimate, which significantly improved detection accuracy. The drawback of these data-driven fault detection methods is the requirement for a large amount of data, and during the training process, overfitting may occur, making them unsuitable for online implementation.
Although the aforementioned literature provides some effective attack detection strategies, there are still certain limitations. The literature [18,19,20,21,22,23,24,25,26,27] primarily focuses on studying whether the system contains false data injection, rather than considering the specific unit of attack injection [28]. This lack of consideration makes it difficult to achieve accurate detection of false data attacks. To address this issue, a false data injection attack detection method based on a fusion adaptive cubature Kalman filter is proposed. The method consists of multiple local units and an information fusion module, which detects attacks by evaluating the estimation results of each local unit. It not only achieves accurate detection of false data injection attacks but also identifies the specific units targeted by the attack through the magnitude of local residuals, enabling the isolation of faulty units. During the information fusion process, after detecting and isolating the corresponding measurements and estimates, the method is able to obtain the correct system estimation. The proposed method is more accurate and effective than the traditional cubature Kalman filter detection method under different working conditions.
The rest of this paper is organized as follows: Section 2 introduces the DC MG models. Section 3 discusses the FACKF algorithm in detail. Section 4 presents simulations to evaluate the proposed algorithm. Finally, Section 5 provides concluding remarks and future perspectives.

2. DC MG Model

2.1. DC MG Structure

Microgrids are classified into three main categories based on the distribution method: DC, AC, and AC-DC hybrid. Among them, the DC microgrid is a small power system that uses DC current for energy transmission and distribution. It mainly consists of DC sources, DC loads, DC centralized controllers, DC grids, and energy storage devices. Figure 1 shows a detailed and simplified diagram of the DC microgrid system structure.
Figure 1a shows an islanded DC microgrid comprising an energy storage system (ESS), a DC source (consisting of a generator and power electronics), and nonlinear loads. Typically, DC and AC loads are connected to the microgrid via tightly regulated converters and inverters. If the loads are connected to the microgrid using multiple power converters and inverters to maintain constant power, they are considered constant power loads (CPLs).

2.2. DC MG Model

To simplify the analysis, Figure 1b presents a simplified model of the DC MG. It is evident that the structure can be decoupled into multiple CPLs and an ESS. Assuming a coordinated variation near the operating point and letting the energy storage current serve as the control input, the nonlinear equation of state of the whole DC MG is shown below:
x ˙ t = A x t + D H x t + B e s i ~ e s t + B s U d c
where x t indicates the state quantity of the system. x t = x 1 T t x n T t x s T t T ; x n t = i L , n U C , n T . i L , n and U C , n denote the inductor current and capacitor voltage in the n-th CPL, respectively. x s t = i L , s U C , s T ; i L , s and U C , s are the inductor current and capacitor voltage in the ESS. x ˙ t represents the integral of x t with respect to the time; D H is the transfer matrix of the perturbation caused by the current fluctuation of the n-th CPL; U d c means the voltage of the storage power supply; B s is the coupling matrix between U d c and the system; i ~ e s t is the injected power, which can stabilize the DC MG and improve the robustness of the closed-loop system to disturbances and temporary faults; B e s is the coupling matrix. In general, the DC MG model can be expressed as
x k + 1 = f x k , u k + w k y k = h x k , u k + v k
where x k + 1 represents the state vector at moment k + 1 ; y k indicates the measurement output vector at moment k ; f x k , u k and h x k , u k are the nonlinear functions; u k means the control input matrix; w k and v k are the system and measurement noise, respectively, both of which are Gaussian white noise.

2.3. DC MG Model with FDIA

FDIA is a type of cyber attack that involves injecting false data into real information. This attack typically occurs when the attacker lacks knowledge of system parameters or previous data. A sophisticated FDIA can cause system instability, posing a serious threat to network security. Therefore, real-time and accurate detection of false data is essential to maintain system stability.
The DC MG model in Equation (2) states that the injection of FDIA into the system will cause interference and alter the measurement information. Therefore, the DC MG measurement equation model with false data injection can be expressed by
y k = h x k , u k + v k + f k , φ γ
f k , φ = 1 ,             k φ 0 ,             k < φ
where γ is the type and extent of the false data attack; k denotes the moment of system operation; f k , φ and φ are the location of the fault and the moment of the fault, respectively.

3. FDIA Detection Based on an FACKF

3.1. Fusion Adaptive CKF Approach

To implement an effective detection of false data injection in sensors, this section proposes a nonlinear detection method based on the FACKF algorithm. The method comprises local filters and an information fusion module. The local filters perform adaptive cubature estimation on individual parts of the overall unit, and the information fusion module combines the state estimates of all the local filters to obtain a global estimate. Attacks are detected during the information fusion process based on the residuals of the local units, and the sensors injected by the attacks are localized. The computational burden is distributed across various local filters in this structure, rather than the main filter. This approach can enhance the accuracy and reliability of the decision while also reducing the impact of noise by combining the local filters and sharing information. Figure 2 illustrates the FACKF framework.
Figure 2 illustrates the three main stages of the FACKF. Firstly, M sensors are grouped into N local units, each containing M − 1 sensor values. Secondly, each local unit performs adaptive CKF estimation to obtain a local estimate, x ^ i , k , and performs information fusion to obtain the global estimate, x m , k . Finally, the global estimate is sent back to the local filters and each local filter is updated. The global state estimates, x m , k and P m , k , are determined by information fusion and sent to the local units for updating. The information distribution factor ( β i ) of the i-th local filter is used to weight the localization. If all local filters have the same weight, 1/N is the number of localization. The nonlinear equations in fusion adaptive CKF describe the localized sensor system.
x k + 1 = f x k , u k + w k y i , k = h i x k , u k + v i , k
Q k = E w k w k T R i , k = E v i , k v i , k T
where x k + 1 represents the state vector and y i , k indicates the measurement output vector of the i-th local sensor; f x k , u k and h i x k , u k are the system function and measurement function, respectively; w k is the system noise at the time instant, k ; v i , k represents the measurement noise at moment k , and both are Gaussian white noise; Q k and R i , k are the corresponding covariance matrices, respectively.
The implementation steps for the FACKF method are as follows:
Step 1: Firstly, initialize the initial values of the parameter states and the initial covariance matrix.
Step 2: Generate 2 n + 2 cubature points:
x i , j , k 1 = P i , k 1 ζ i + x ^ i , k 1 ,   i = 1 , , 2 n + 2
where x i , j , k 1 is the i-th cubature point at moment k − 1 calculated for the j-th local unit, x ^ i , k 1 is the estimated value at moment k − 1 for the local unit, ζ i is the matrix of cubature points, and P i , k 1 is the estimated covariance at moment k − 1 for the i-th local unit.
Step 3: The local CKF is updated in time and measurements, and the estimated state of the CKF for the first local unit is
x ^ i , k | k 1 = 1 2 n j = 0 2 n + 2 f x i , j , k 1 , u i , k 1
P i , x i k | k 1 = 1 2 n j = 0 2 n + 2 x i , j , k | k 1 x ^ i , k | k 1 × x i , j , k | k 1 x ^ i , k | k 1 T + Q i , k 1
y ^ i , j , k | k 1 = 1 2 n j = 0 2 n + 2 h x i , j , k 1 , u i , k 1
where x i , j , k 1 , u i , k 1 are, respectively, the cubature points of the generated state and control variables; x ^ i , k | k 1 and P i , x i k | k 1 are the a priori estimates of the state quantities and the a priori covariance matrices of the state quantities at the k-th moment in the i-th local unit, which are obtained by averaging over the individual 2 n + 2 cubature points; y ^ i , j , k | k 1 is the estimate of the a priori quantities at the k-th moment of the i-th local unit.
Step 4: Construct adaptive factors and perform correction of the covariance matrix.
To improve the adaptivity and robustness of the CKF algorithm, its filtering performance is enhanced by correcting the covariance matrix online through the construction of an adaptive factor. The main steps can be expressed as
e k = y i , k y ^ i , j , k | k 1
e = e k e k T
η k = 1 t r ( e ) t r ( P i , y i , k ) t r ( P i , y i , k ) t r ( e )           t r ( e ) > t r ( P i , y i , k )
where e k represents the innovation vector, e denotes the innovation vector matrix, and η k is the adaptive factor.
Based on the constructed adaptive factor, the self-covariance matrix and cross-covariance matrix are dynamically adjusted through online correction.
Self-covariance matrix correction:
P i , y i , k = η k [ 1 2 n j = 0 2 n ( y i , j , k | k 1 y ^ i , j , k | k 1 ) × ( y i , j , k | k 1 y ^ i , j , k | k 1 ) T ] + R i , k
Cross-covariance matrix correction:
P i , x i , k , y i , k = η k [ 1 2 n j = 0 2 n ( x i , j , k | k 1 x ^ i , k | k 1 ) × ( y i , j , k | k 1 y ^ i , j , k | k 1 ) T ]
The local cubature Kalman filter gain ( K i , k ) at the current moment is then calculated to obtain the a posteriori estimate, x ^ i , k :
K i , k = P i , x i , k , y i , k P i , y i , k 1
x ^ i , k = x ^ i , k | k 1 + K i , k y i , k y ^ i , j , k | k 1
P i , k = P i , x i k | k 1 K i , k P i , y i , k K i , k T
where P i , x i , k , y i , k and P i , y i , k are, respectively, the self-covariance matrix and the mutual covariance matrix at moment k of the i-th local unit; K i , k and x ^ i , k are the Kalman gain and a posteriori estimates of the i-th local unit, respectively; and P i , x i , k is the updated estimated covariance matrix.
Step 5: The estimates of all local state vectors ( x ^ i , k ), the state error covariance ( P i , k ), and the process noise covariance ( Q i , k ) of the local CKF are integrated into the information fusion to obtain the global estimate:
P m , k = i = 1 N P i , k 1 1 Q m , k = i = 1 N Q i , k 1 1 x m , k = P m , k × i = 1 N P i , k 1 x ^ i , k  
where P m , k and Q m , k are the overall state error covariance and process noise covariance obtained by fusing the N local unit estimates, respectively; x m , k is the overall estimate.
Step 6: The global estimates from Step 4 are assigned to each local unit, and the local units use them as previous information in the next step, returning state estimates, state error covariance, and process noise for the first local filter CKF.
Q i , k = β i 1 Q m , k   P i , k = β i 1 P m , k   x i , k = x m , k    
where Q i , k and P i , k are the process noise and state error covariances returned to each local estimator; x i , k is the state estimate returned as the current estimate of the local unit; β i is the information distribution factor of the i-th local filter and i = 1 N β i 1 = 1 .

3.2. False Data Injection Attack Detection Based on FACKF

Traditional false data injection detection is based on a single residual size judgement, which is unable to effectively detect the unit of false data injection. When false data are injected, they will quickly spread to other locations and affect the overall system, and the estimated values of other parameters will be affected and deviate from the true values over time, resulting in the final estimation results deviating from the true values. In order to accurately detect the attack and determine the attack injection unit to achieve accurate and reliable state estimation, the state variance ( V k ) and local state residual ( r i , k ) are defined:
V k = y k h x m , k , u k T y k h x m , k , u k 1 2
r i , k = x ^ i , k x m , k T x ^ i , k x m , k 1 2
The state variance, V k , determines whether a sensor experiences FDIA, while the residual, r i , k , identifies the specific measurement unit in which attack injection occurs in FDIA detection. In the absence of FDIA, the locally estimated states of the local adaptive CKF are close to their true values, with V k and r i , k approaching 0. When false attack injection occurs in a measurement unit, only one local unit is correct. In this case, the state estimate, x m , k , is inaccurate and close to the fault estimate. Based on the maximum value of r i , k , it is possible to diagnose which local unit is correct, while the measurements from the excluded sensors originating from that local unit are considered incorrect. The steps of the FACKF are summarized in Algorithm 1.
Algorithm 1: Fusion Adaptive Cubature Kalman Filter
1: Generate local measurements.
2: Initialize the parameters X 0 , P 0 of each local.
3: Calculate cubature points:
x i , j , k 1 = P i , k 1 ζ i + x ^ i , k 1 ;
4: Perform time and measurement updates for each local CKF:
P i , y i , k = η k [ 1 2 n j = 0 2 n y i , j , k k 1 y ^ i , j , k k 1 × y i , j , k k 1 y ^ i , j , k k 1 T ] + R i , k
P i , x i , k , y i , k = η k [ 1 2 n j = 0 2 n x i , j , k k 1 x ^ i , k k 1 × y i , j , k k 1 y ^ i , j , k k 1 T ]
x ^ i , k = x ^ i , k k 1 + K i , k y i , k y ^ i , j , k k 1
5: Calculate global estimation:
Q m , k = i = 1 N Q i , k 1 1 , P m , k = i = 1 N P i , k 1 1 ;
x m , k = P m , k × i = 1 N P i , k 1 x ^ i , k ;
6: Calculate state variance and residual of locals:
V j , k = 1 N i = 1 N x ^ i , k ( j ) 1 N i = 1 N x ^ i , k ( j ) ;
r i , k = x ^ i , k x m , k T x ^ i , k x m , k 1 2 ;
7: Compare state variance with threshold. If it is larger than the threshold, go to 9 and alarm a faulty situation. Otherwise, go to 11.
8: Evaluate the residual value and determine the faulty sensor based on correct locals.
9: Eliminate faulty locals and calculate the global estimates based on healthy locals.
10: Assign global estimates to locals, update them, and come back to 3.
Q i , k = β i 1 Q m , k , P i , k = β i 1 P m , k , x i , k = x m , k

4. Simulation Results

In order to prove the validity of the proposed FACKF method, a DC microgrid system is set up under different working conditions, and the estimation performance of a DC microgrid under normal operating conditions and the detection and robustness estimation ability of a fake data attack injection scenario are, respectively, compared and analyzed. Through this series of comparative experiments, not only can the FACKF method demonstrate high estimation accuracy under normal operating conditions, but it can also validate its excellent detection efficiency and robustness when faced with security threats. This fully proves the practical value and effectiveness of the method in ensuring the stable operation and security protection of DC microgrids.

4.1. Test Systems

Case 1: A CPL source and a DC source are set up in the DC microgrid. In the absence of network attacks, the CKF and FACKF are, respectively, used for state estimation to evaluate the estimation accuracy of the two algorithms in the presence of noise.
Case 2: On the basis of Case 1, the case of false data injection attack is considered; the traditional residual detection method and the FACKF method proposed in this paper are used to detect the false data injection attack.
Case 3: The DC grid unit is extended to 2 CPL, and the false data injection attack is set to test the validity of the detection algorithm considering multiple CPL.
Case 4: The computational efficiency of the conventional CKF and the proposed FACKF is investigated.
In order to accurately simulate the field measurements measured by the PMUs, additional noise is added to the simulated data. It is worth pointing out that all the discussed methods were executed in MATLAB R2021b on a PC with Intel Core CPU E5-11400H, 4.5 GHz, and 16 GB memory.
Furthermore, for the purpose of conducting a quantitative analysis and comparison of various methods’ performance, the performance metric known as root mean square deviation (RMSD) is used to comprehensively assess the effectiveness of the CKF and FACKF. It is defined as follows:
R M S D = k = 1 n ( x ^ k x k ) 2 n
where k represents the time instant, x denotes the state variable, n represents the number of time steps, x ^ k represents the estimated value of the state variable, and x k signifies the true value.

4.2. Case 1: Comparison of Estimation Accuracy

To compare the estimated performance of the two in the absence of an attack, consider a CPL and a source. The system variables are X = [ i L 1 , v c 1 , i L s , v c s ] , the system parameters are given in Table 1, and the initial conditions of the DC microgrid are chosen as follows: X 0 = [ 1.5 , 200 , 1.5 , 200 ] . The initial conditions of the Kalman filter are as follows: x ^ 0 | 0 = [ 1 , 200 , 1 , 200 ] . The initial covariance is 10 6 I 2 × 2 ; the standard deviation of the system and measurement noise is 10 8 I 2 × 2 .
In order to study the performance of the proposed FACKF algorithm for the attack-free injection case, we assume that all state measurements are available. Therefore, we consider four local variables (M = 4), each consisting of measurements from three sensors, as follows:
y 1 = [ v c 1 , i L s , v c s ] ,   y 2 = [ i L 1 , i L s , v c s ]   y 3 = [ v c 1 , i L 1 , v c s ]   y 4 = [ v c 1 , i L s , i L 1 ]
The CKF and the FACKF proposed in this paper are applied to estimate the system state for comparison, respectively, and the estimation results are shown in Figure 3.
From the test results, it can be seen that without FDIA, both the traditional CKF method and the FACKF method proposed in this paper can accurately track the operating state of the DC microgrid system with good dynamic performance, and the state estimation accuracy of the two methods can satisfy the system monitoring requirements.
The results of the root mean square error (RMSE), root mean square deviation (RMSD), and constant norm-2 error ( E n 2 ) calculated for both the traditional CKF method and the FACKF method are shown in Table 2. From the results in Table 2, it can be seen that the RMSEs of both the traditional CKF method and the FACKF method are smaller, which is consistent with the results presented in Figure 3; i.e., both the CKF method and the proposed method have higher tracking accuracy without spurious data injection. It can also be found that the RMSE, RMSD, and E n 2 of each state component of the proposed partitioned FACKF method are slightly smaller than that of the traditional CKF method, compared to the traditional CKF method, and this result indicates that the proposed FACKF method has a higher state estimation accuracy, which is attributed to its use of the distributed estimation strategy.

4.3. Case 2: Single CPL DC MG System

In the case of a single attack, in order to verify the detection and localization ability of the fusion CKF method proposed in this paper for false data attacks, an attack is set up on v c 1 based on case 1. The traditional residual detection method and the partitioned fusion CKF method proposed in this paper are used to detect the system false data injection attack, respectively.
As can be seen from Figure 4, under the false attack injection, the residual difference increases significantly. Although the system can be detected by FDIA at this time, the specific location of FDIA injection cannot be determined. The results of the system using the conventional residual method are shown in Figure 5, where the residual values are the normalized data with no units.
It can be seen from Figure 5 that the state variance amplitude of the proposed FACKF method increases significantly when 0.3   s t 0.5 s, and FDIA can be judged to exist in the DC microgrid. When the voltage state is attacked, it has a larger value than other local residuals, because there is no measurement information containing attacks in the second local unit. In conclusion, the FACKF method proposed in this paper can not only achieve accurate detection of false data injection, but also locate the injected specific measurement unit.

4.4. Case 3: Effectiveness of the FACKF under Multiple CPLs

To validate the effectiveness of the FACKF method under multiple CPL scenarios, the model is extended to include 2 CPLs, and false data injection is employed to detect the system. Setting P i , 0 as 10 6 I 6 × 6 , Q i , k as 10 6 I 5 × 5 , and R i , k as 10 6 I 5 × 5 , an attack is initiated by injecting false data into v c 1 , starting at 0.4. In the attack scenario, we compare the state estimation results of the proposed method in this paper and the CKF.
From Figure 6, it can be seen that under attack conditions, the system state estimation of the traditional CKF starts to deviate and gradually moves away from the true values. This is primarily due to erroneous data progressively influencing the system’s state. However, the method proposed in this paper is capable of accurately detecting FDIA and identifying the affected measurement units. Upon detecting FDIA, this method isolates the injected unit and uses correct estimates from unaffected local units for overall estimation. As a result, this approach not only precisely tracks the operating state of the DC microgrid system but also demonstrates excellent dynamic performance.
Table 3 shows the comparison of various estimation metrics in the case of an attack. It can be clearly seen that once a network attack occurs, the RMSE, RAMD, and E n 2 of the CKF are significantly larger than those of the FACKF, which is due to the fact that the traditional CKF design framework does not take into account the effect of attacks. Therefore, once an attack occurs, the estimation results of the CKF will be disturbed and seriously deviate from the real value or even regress. Compared with the traditional CKF, the proposed FACKF method can isolate the attack-induced bias and thus obtain better estimation performance. These results validate the effectiveness and excellent performance of the proposed FACKF method.

4.5. Case 4: Computational Efficiency Test

In order to meet the requirements of various real-time applications in energy management systems (EMSs), dynamic estimation in DC microgrids needs to be not only accurate but also computationally efficient. This section aims to validate the feasibility of the proposed FACKF method for adapting to the sampling rate of 30–60 samples per second from PMUs, ensuring its suitability for real-time applications. By conducting tests on the computation time of the FACKF method and the traditional CKF method under different conditions, the computation times of both algorithms are shown in Figure 7.
The results demonstrate that although the FACKF method has a slightly longer computation time compared to the traditional CKF method, this difference is primarily due to the introduction of more complex formulas in the state estimation process of the FACKF. However, it is worth noting that the average computation time for both methods is significantly lower than the PMU sampling rate. This indicates that the FACKF method can meet the real-time requirements while maintaining accurate synchronous estimation capabilities. Furthermore, despite involving more complex computational steps, the additional computation time of the FACKF method has minimal impact on performance in practical applications, effectively meeting the real-time processing requirements of the EMS in DC microgrids. Therefore, the proposed FACKF method not only demonstrates superior estimation accuracy but also confirms its practicality and efficiency in fast, dynamic environments. It provides a reliable technical solution for energy management in DC microgrids.

5. Conclusions

In the safe operation of a DC microgrid, real-time and accurate state estimation is crucial. To address this requirement, this paper introduces a novel method using fusion adaptive cubature Kalman filter (FACKF) technology, aiming to effectively detect and precisely locate the source of false data injection attacks. Through the analysis of experimental results, several conclusions can be drawn:
(1)
The FACKF method proposed in this study can effectively detect false data injection attacks and accurately identify the attacked injection units, enhancing the system’s protection against malicious attacks.
(2)
After applying this research method, once an attack is identified, isolating the attacked unit and replacing the overall estimate with the correct local estimate can significantly enhance the robustness of the estimation process, thereby improving the stability and reliability of the system.
(3)
The method proposed in this study exhibits low computational complexity. It not only effectively detects and locates attacks but also accurately estimates the system state under attack conditions, further ensuring the safe operation of the DC microgrid.
Although the FACKF method significantly enhances the system’s protection against fake data injection attacks, its performance will vary with different attack modes and intensification. For the future work, we put forward the following suggestions: (1) adjust the algorithm to improve the adaptability to various attack scenarios and system configurations and (2) consider introducing advanced data analysis and machine learning techniques to improve the sensitivity of attack detection.

Author Contributions

P.W. and J.Z. (Jiangnan Zhang) were responsible for methodology, simulation, and validation. P.W. conducted the analysis and wrote the paper. Conceptualization was handled by S.L. and J.Z. (Jiangnan Zhang); resource management by S.L. and Y.S.; data curation by P.W. and Y.S.; original draft preparation by S.L. and J.Z. (Jiawei Zhang); review and editing by Y.W.; visualization by J.Z. (Jiangnan Zhang) and J.Z. (Jiawei Zhang); supervision by Y.W.; project management by J.Z. (Jiangnan Zhang); and funding acquisition by Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Science and Technology Project of State Grid Henan Electric Power Company under Grant 521702230004, the National Natural Science Foundation of China under Grant 62203395, in part by the China Postdoctoral Science Foundation under Grant 2023TQ0306, and in part by the Postdoctoral Research Project of Henan Province under Grant 202101011.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ansari, S.; Zhang, J.; Singh, R.E. A review of stabilization methods for DCMG with CPL, the role of bandwidth limits and droop control. Prot. Control Mod. Power Syst. 2022, 7, 12–19. [Google Scholar] [CrossRef]
  2. Liu, B.; Li, H.; Zhang, H.; Han, M. A reactive power injection algorithm for improving the microgrid operational reliability. Electronics 2023, 12, 2932. [Google Scholar] [CrossRef]
  3. Jiang, X.; Liu, W.; Yan, G.; Shao, H.; Zhang, L.; Wen, Y. Research on load carrying capacity evaluation of main grid with multiple DC feeds. J. Electr. Power Sci. Technol. 2023, 38, 216–225. [Google Scholar]
  4. Liu, J.; Zhang, L.; Zhao, B.; Li, X. Online dynamic black start strategy for multi-power microgrid with energy storage. Distrib. Util. 2023, 40, 13–20. [Google Scholar]
  5. Jasim, A.M.; Jasim, B.H.; Neagu, B.-C.; Alhasnawi, B.N. Coordination vontrol of a hybrid AC/DC smart microgrid with online fault detection, diagnostics, and localization using artificial neural networks. Electronics 2023, 12, 187. [Google Scholar] [CrossRef]
  6. Fu, Y.; Zhang, Y.; Tian, S.; Shen, J.; Li, H.; Geng, F. State estimation method of active distribution network resisting multi-point false data attack. Smart Power 2023, 51, 69–76+83. [Google Scholar]
  7. Xie, W.; Han, M.; Cao, W.; Guerrero, J.M.; Vasquez, J.C. Virtual resistance trade off design for DCMG grid-forming converters considering static-and large-signal dynamic constraints. IEEE Trans. Power Electron. 2020, 36, 5582–5593. [Google Scholar] [CrossRef]
  8. Zhang, J.; Wu, Z.; Lu, X.; Wang, C. Research on coordinated control strategy of “optical storage direct and flexible” system considering DC power spring. Distrib. Util. 2023, 40, 82–92. [Google Scholar]
  9. Yi, R. Research on the defense mechanism based on FDIA in smart grid. Front. Comput. Intell. Syst. 2022, 2, 84–88. [Google Scholar] [CrossRef]
  10. Madichetty, S.; Mishra, S. Cyber attack detection and correction mechanisms in a distributed DC microgrid. IEEE Trans. Power Electron. 2021, 37, 1476–1485. [Google Scholar]
  11. Dehghani, M.; Niknam, T.; Ghiasi, M.; Bayati, N.; Savaghebi, M. Cyber-attack detection in DC microgrids based on deep machine learning and wavelet singular values approach. Electronics 2021, 10, 1914. [Google Scholar] [CrossRef]
  12. Huang, C.; Hong, M.; Fu, S. Distributed state estimation of active distribution network considering false data injection attack. Electr. Power Eng. Technol. 2022, 41, 22–31. [Google Scholar]
  13. Xie, Y.; Yan, X.; Sang, Z.; Yang, X.; Ying, M.; Zhou, Y. Fake data injection attack method for hybrid AC-DC systems. Electr. Power Eng. Technol. 2022, 41, 165–172. [Google Scholar]
  14. Xia, Y.S.; Wang, Y.; Zhou, L.; Fan, R.S. False data injection attack detection method based on improved generative adversarial network. Electr. Power Constr. 2022, 43, 58–65. [Google Scholar]
  15. Wang, B.; Peng, X.; Jiang, M.; Liu, D. Real-time fault detection for UAV based on model acceleration engine. IEEE Trans. Instrum. Meas. 2020, 69, 9505–9516. [Google Scholar] [CrossRef]
  16. Bhandari, G.; Lyth, A.; Shalaginov, A.; Grønli, T.-M. Distributed deep neural-network-based middleware for cyber-attacks detection in smart IoT ecosystem: A novel framework and performance evaluation approach. Electronics 2023, 12, 298. [Google Scholar] [CrossRef]
  17. Musleh, A.S.; Chen, G.; Dong, Z.Y. A survey on the detection algorithms for false data injection attacks in smart grids. IEEE Trans. Smart Grid 2019, 11, 2218–2234. [Google Scholar] [CrossRef]
  18. Yang, J.; Zhu, F.; Wang, X.; Bu, X. Robust sliding-mode observer-based sensor fault estimation, actuator fault detection and isolation for uncertain nonlinear systems. Int. J. Control Autom. Syst. 2015, 13, 1037–1046. [Google Scholar] [CrossRef]
  19. Liu, M.; Zhao, C.; Deng, R.; Cheng, P.; Chen, J. False data injection attacks and the distributed countermeasure in DC microgrids. IEEE Trans. Control Netw. Syst. 2022, 9, 1962–1974. [Google Scholar] [CrossRef]
  20. Yan, L.; Zhang, Y.; Xiao, B.; Xia, Y.; Fu, M. Fault detection for nonlinear systems with unreliable measurements based on hierarchy cubature Kalman filter. Can. J. Chem. Eng. 2018, 96, 497–506. [Google Scholar] [CrossRef]
  21. Wang, Y.; Liu, D. Maximum correntropy cubature Kalman filter and smoother for continuous-discrete nonlinear systems with non-Gaussian noises. ISA Trans. 2023, 137, 436–445. [Google Scholar] [CrossRef] [PubMed]
  22. El Sayed, W.; Abd El Geliel, M.; Lotfy, A. Fault diagnosis of PMSG stator inter-turn fault using extended Kalman filter and unscented Kalman filter. Energies 2020, 13, 2972. [Google Scholar] [CrossRef]
  23. Wang, S.; Zhang, W.; Sun, Y.; Trivedi, A.; Chung, C.; Srinivasan, D. Wind Power Forecasting in the presence of data scarcity: A very short-term conditional probabilistic modeling framework. Energy 2024, 291, 130305. [Google Scholar] [CrossRef]
  24. Tang, H.; Tang, Y.; Su, Y.; Feng, W.; Wang, B.; Chen, P.; Zuo, D. Feature extraction of multi-sensors for early bearing fault diagnosis using deep learning based on minimum unscented kalman filter. Eng. Appl. Artif. Intell. 2024, 127, 107138. [Google Scholar] [CrossRef]
  25. Yang, J.; Guo, Y.; Zhao, W. Long short-term memory neural network based fault detection and isolation for electro-mechanical actuators. Neurocomputing 2019, 360, 85–96. [Google Scholar] [CrossRef]
  26. Ma, Y.; Li, C.; Cao, Z.; Pan, L.; Yang, C.; Yang, Z. Robust dynamic state estimation method of power system based on data fusion technology. Smart Power 2023, 51, 78–84. [Google Scholar]
  27. Vafamand, A.; Moshiri, B.; Vafamand, N. Fusing unscented Kalman filter to detect and isolate sensor faults in DC microgrids with CPLs. IEEE Trans. Instrum. Meas. 2021, 71, 1–8. [Google Scholar] [CrossRef]
  28. Shao, S.; Yan, R.; Lu, Y.; Wang, P.; Gao, R.X. DCNN-based multi-signal induction motor fault diagnosis. IEEE Trans. Instrum. Meas. 2019, 69, 2658–2669. [Google Scholar] [CrossRef]
Figure 1. DC MG system structure diagram. (a) Detailed system structure of DC MG. (b) Simplified system structure of DC MG.
Figure 1. DC MG system structure diagram. (a) Detailed system structure of DC MG. (b) Simplified system structure of DC MG.
Electronics 13 01612 g001
Figure 2. The framework of the FACKF.
Figure 2. The framework of the FACKF.
Electronics 13 01612 g002
Figure 3. Estimated results of the two algorithms in the no-attack case. (a) Estimation results of two methods for the state variable i L 1 . (b) Estimation results of two methods for the state variable v c 1 . (c) Estimation results of two methods for the state variable i L   1 . (d) Estimation results of two methods for the state variable v c s .
Figure 3. Estimated results of the two algorithms in the no-attack case. (a) Estimation results of two methods for the state variable i L 1 . (b) Estimation results of two methods for the state variable v c 1 . (c) Estimation results of two methods for the state variable i L   1 . (d) Estimation results of two methods for the state variable v c s .
Electronics 13 01612 g003aElectronics 13 01612 g003b
Figure 4. Traditional residual method detects the system.
Figure 4. Traditional residual method detects the system.
Electronics 13 01612 g004
Figure 5. Based on fusion CKF residual detection.
Figure 5. Based on fusion CKF residual detection.
Electronics 13 01612 g005
Figure 6. Comparison of state estimation results for FACKF and CKF under attack. (a) Comparison of estimation results for i L 1 . (b) Comparison of estimation results for V c 1 . (c) Comparison of estimation results for i L s . (d) Comparison of estimation results for V c s .
Figure 6. Comparison of state estimation results for FACKF and CKF under attack. (a) Comparison of estimation results for i L 1 . (b) Comparison of estimation results for V c 1 . (c) Comparison of estimation results for i L s . (d) Comparison of estimation results for V c s .
Electronics 13 01612 g006aElectronics 13 01612 g006b
Figure 7. The comparison of computation times.
Figure 7. The comparison of computation times.
Electronics 13 01612 g007
Table 1. The parameters of DC MG system with a CPL.
Table 1. The parameters of DC MG system with a CPL.
r L , 1 = 1.1   Ω L 1 = 39.5   mH C 1 = 500   μ F P 1 = 300   W
r s = 1   Ω L s = 17   mH C S = 550   μ F V d c = 200   V
Table 2. Comparison between different methods.
Table 2. Comparison between different methods.
StateMethodRMSERMSD E n 2
i L 1 CKF0.00990.07410.0357
Proposed method0.01080.07120.0302
v c 1 CKF0.01420.06240.0421
Proposed method0.01200.05840.0367
i L s CKF0.01420.07250.0483
Proposed method0.00970.06760.0321
v c s CKF0.01290.08630.0546
Proposed method0.00990.08250.0474
Table 3. Comparison between different methods under attack.
Table 3. Comparison between different methods under attack.
StateMethodRMSERMSD E n 2
i L 1 CKF0.14370.35240.2417
Proposed method0.01120.06930.0321
V c 1 CKF0.11200.43510.3442
Proposed method0.01050.05420.0402
i L s CKF0.14060.33460.3157
Proposed method0.01200.04430.0297
V c s CKF0.25980.48870.4021
Proposed method0.01390.06320.0214
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, P.; Zhang, J.; Luo, S.; Song, Y.; Zhang, J.; Wang, Y. A Fusion Adaptive Cubature Kalman Filter Approach for False Data Injection Attack Detection of DC Microgrids. Electronics 2024, 13, 1612. https://doi.org/10.3390/electronics13091612

AMA Style

Wu P, Zhang J, Luo S, Song Y, Zhang J, Wang Y. A Fusion Adaptive Cubature Kalman Filter Approach for False Data Injection Attack Detection of DC Microgrids. Electronics. 2024; 13(9):1612. https://doi.org/10.3390/electronics13091612

Chicago/Turabian Style

Wu, Po, Jiangnan Zhang, Shengyao Luo, Yanlou Song, Jiawei Zhang, and Yi Wang. 2024. "A Fusion Adaptive Cubature Kalman Filter Approach for False Data Injection Attack Detection of DC Microgrids" Electronics 13, no. 9: 1612. https://doi.org/10.3390/electronics13091612

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop