1. Introduction
Distributed renewable sources have become one of the most effective contributors for DC microgrids to reduce carbon emission and fossil energy consumption [
1,
2]. The battery energy storage system (BESS) has been widely studied to solve the power imbalance between distributed generators (DGs) and loads [
3]. However, loads in the BESS are always connected to the tightly controlled power electronic converters, and they are considered as constant power loads (CPLs), which have negative impedance characteristics [
4,
5]. This will cause the instability of the system. Meanwhile, the current among batteries should be shared based on the real time of state of charge (SoC) and the remaining capacity of battery for this system [
6]. According to the literature [
7], the multilevel control strategy including primary control and secondary control has been widely applied to solve current sharing control with CPLs.
Primary control has been widely applied to realize energy management in microgrids. Decentralized control strategies were proposed, which included the V-I droop controller and the current controller. Therein, battery inverters operated as voltage source converters (VSCs) and renewable energy source converters operated as current sources converters (CSCs) in this system [
8,
9]. To this end, CSCs could realize the maximum power point tracking (MPPT) in normal operating conditions [
8]. And the voltage regulation was realized in the V-I droop controller. However, the accurate current sharing control among batteries was not realized due to the line impedance differences, which reduced battery utilization and caused overcharge/overdischarge for some batteries. Furthermore, these problems resulted in reduced battery lifetime and even fires [
10].
In order to solve above problems, various secondary control strategies have been proposed, which can be separated into centralized control and distributed control. For centralized control, a quick communication system between the central controller and other controllers was required. The central controller collected the information from the entire system and sends control commands to other controllers, and it easily resulted in single-point failure and system errors with the increasing scale of power systems [
11]. In order to solve these problems, distributed control was proposed, which only required a sparse communication link. Furthermore, SoC balance among batteries in the islanded microgrid could be realized. A distributed control strategy was proposed to achieve the balance of the energy state for the specific batteries system [
12]. In [
13], the distributed control strategy was improved to protect the batteries based on the SoC measurements. The accurate current sharing control considering the SoC among batteries was realized in [
14]. However, the aforementioned studies all focused on the distributed control strategy under free communication. Cyber attacks on communication links among batteries were ignored, which resulted in the failure of control strategy. Thus, accurate current sharing control considering cyber attacks was necessary for the BESS in DC microgrids.
Cyber attacks on power systems include false data injection (FDI) attacks, denial of service (DoS) attacks, time-delay attacks, and resonance attacks [
15]. Therein, FDI and DoS attacks are two typical cyber attacks in microgrids. FDI attacks are a kind of deception attack that manipulate information by injecting the false information into controller/sensor, and DoS attacks are a kind of disruption attack that destroy data availability by blocking the communication link. These attacks can lead to the performance degradation of the system and even cause the instability of systems [
15]. Note that FDI attacks can be designed to target sensor, controller and energy markets [
16]. The focus of this paper is on current sharing among batteries in secondary control. Thus, the FDI attacks are designed to inject the secondary controller in this paper.
On issues related to FDI attacks, numerous studies have focused on the detection and mitigation for DC microgrids in the secondary control [
17,
18,
19,
20]. In the study [
17], a framework to carry out the detection by identifying a change in sets of inferred candidate invariant in DC microgrids was proposed. In order to solve the bi-level optimization problem, some new computationally efficient algorithms were proposed in the large-scale power systems [
16]. A game algorithm based on the socially rational multi-agent system and fictitious play was proposed [
21]. A method to signal temporal logic detection by monitoring the output voltages and currents of DC microgrids against the defined bounds was proposed [
18]. In the study [
19], a fully distributed control strategy based on detection strategy was proposed for DC microgrids in the presence of the two variants of false data injection into current sensor. Meanwhile, some scholars also designed resilient control strategies to eliminate the impact of FDI attacks on systems. In the study [
22], a trust-based cooperative controller which only required local and neighbor information was proposed to mitigate the effects of attacks on communication links and controller hijacking. According to [
23], a control strategy based on the neural network was proposed to compensate for a kind of unknown FDI attack signal. The event-driven resilient control based on a detection strategy was proposed to mitigate unknown boundary FDI attacks by designing a local authentication signal [
24]. The output consensus control for the linear heterogeneous multi-agent against continuous FDI attacks was proposed by designing an auxiliary controller in [
25].
Meanwhile, there were seldom works focused on the issues of DC microgrids related to DoS attacks [
26]. A control strategy with event-based sampling under DoS attacks was proposed for linear multi-agent systems in [
27]. Furthermore, a sample-data fully distributed consistency algorithm under DoS attacks was proposed in [
28]. Different from the study in [
27], it could be applied in linear heterogeneous multi-agent systems and the global information was not necessary. Furthermore, the event-trigged resilient control for DC microgrids under DoS attacks was proposed and the stability condition based on DoS frequency and DoS duration was established [
29]; However, the control strategy for the BESS considering DoS and continuous FDI attacks was rarely studied.
Meanwhile, although the burden of communication can be reduced, calculations will increase, which could increase the burden of the controller and even system faults.
To sum up, this paper proposes a distributed output consensus control for the BESS considering disturbance items, DGs, CPLs, DoS, and FDI attacks. In order to further reduce the burden of communication, a fuzzy logic controller (FLC) is introduced in this paper.
The detailed contributions of this paper are shown as follows:
The model of the BESS in DC microgrids embedded with disturbance items, DGs, CPLs and resistive loads, is built in this paper. And it can be further transformed into linear heterogeneous multi-agent systems, which lays the foundation for the following control strategy.
The model of DoS and FDI attacks are built for this system. Different from previous literatures, the FDI is a kind of continuous attack in this paper. Based on this, the state-space function model of the BESS considering DoS and FDI attacks is further proposed.
To further reduce the burden of communication among batteries, the FLC is applied in this system.
Based on the proposed system model and the FLC, a new distributed fuzzy output consensus control strategy is proposed to realize accurate current sharing control among batteries in the presence of DoS and FDI attacks, which can extend the lifetime of the batteries and eliminate security risks.
The rest of this paper is organized as follows. The model of the BESS in DC microgrids embedded with disturbance items, DGs, CPLs and resistive loads, is built in
Section 2. Furthermore, the models of DoS, FDI attacks, and the FLC are built in
Section 3. Based on these, a new distributed fuzzy output consensus control strategy is proposed to realize accurate current sharing control among batteries in the presence of DoS and FDI attacks. Meanwhile, the system under the proposed control in different cases is analyzed. Then numerical simulation examples are provided to verify the feasibility of the proposed control strategy in
Section 4. Meanwhile, the experiment results are described in
Section 5. Finally, this paper is concluded in
Section 6. The flowchat of the methodology is shown in
Figure 1.
2. The Model of Battery Energy Storage Systems in DC Microgrids
As shown in
Figure 2, the structure of the
ith battery in DC microgrids is given. There are many DGs and CPLs in microgrids, and they can cause the fluctuation of bus voltage and even instability of system [
30]. CPLs and DGs can be linearized at the voltage stable operation point
by the Taylor series expansion method [
31].
And they are shown as follows:
where
and
represent the equivalent constant current loads regarding the
and the
, respectively.
and
represent the equivalent resistances which can undermine the stability of the system. The constant power value for the
and the
are represented as
and
, respectively.
and
are the input voltages. And there is
. Note that the CPLs refer to the power electronic load under the tightly control in this paper. Meanwhile, the disturbances from DGs are considered in this paper. And these disturbances are denoted as
.
represents the common resistive load in this system. By applying Kirchhoff’s current law and voltage law, the model of the
ith battery is built and given by (
3).
where
and
are the output voltage and current of the
ith battery, respectively.
,
,
are the RLC filter of the
ith battery.
is the point voltage of the
ith battery. And
is the point voltage of the
jth battery.
is the power-line load between the
ith battery and the
jth battery.
represents the total resistive load in this system.
represents the equivalent current load in this system.
Then let
,
,
,
where
. Therein,
is the droop gain. In light of Equation (
3), the state-space function of the
ith battery in DC microgrids can be obtained as follows:
where
,
,
,
,
.
In order to provide stable output voltage and current, the plug and play (PnP) controller is applied as the zero controller, which is beneficial for the features of PnP regarding DGs and loads. And the detailed design of the PnP controller is shown as follows:
where
,
,
are the control parameters of the PnP controller, and
is the rate voltage. The system is asympototically stable, if the control parameters of the PnP controller meet the following conditions [
32]:
The V-I droop controller is applied as the primary controller to realize voltage regulation and preliminary current sharing among batteries, and it is shown as follows:
where
is the no-load voltage of the
ith battery in DC microgrids,
is the PI controller which is used to realize accurate current sharing among batteries in secondary control. The design of
is shown as follows:
where
and
are coefficients of this PI controller,
is the feedback controller to be designed in next section.
To sum up, the overall model of the BESS in DC microgrids can be obtained. In light of Equations (
5), (
9) and (
10), there are:
where
,
,
,
,
. Then set
. Combining Equation (
4), the overall space-state model of the BESS in DC microgrids is provided:
where
,
,
,
,
,
.
Meanwhile, the 0th battery is design as a leader for the secondary control. And the space-state function model of the 0th battery is provided as follows:
Note that the
can be set by the Equation (
16). And this equation have been described in detail in [
11]. In addition, the interaction
can be incorporated into disturbance items according to [
11]. Thus, the final space-state model of the BESS in DC microgrids is shown as follows:
Note that the Equation (
17) is a standard linear heterogeneous multi-agent system with disturbance. For the linear heterogeneous multi-agent system (
17), a common strategy is introduced, which lays the foundation for the following strategy [
33]. And the common strategy is shown as follows:
where
and
are the control gains in the system. And
is a compensator for
ith battery that mainly transforms the information among batteries.
is the output feedback controller, and there is
for this common strategy.
The communication among N batteries is represented by a directed graph . with represents N battery and 0th battery. with represents that there is a path from the ith battery to the jth battery. In the adjacency matrix for the graph, if , otherwise . represents the Laplace matrix and if there is , otherwise . The adjacency matrix between the leader and followers is defined as if the ith battery can receive information from the leader, otherwise. Finally, let .
From the above analysis, the accurate current sharing is realized if and only if , that is . Note that it has been transformed into the output consensus control. Thus, the purpose of the proposed control strategy is essentially to realize , . Before that, these conditions should be met in order to realize the output consensus control:
- (1)
The communication system has at least one directed spanning tree path from the leader to each follower;
- (2)
The following equations have at least one solution:
where
,
;
- (3)
The disturbances
,
should meet the following conditions:
3. Current Sharing Fuzzy Control Strategy Considering Multiple Network Attacks
In this section, the models of DoS and FDI attacks are introduced, respectively. Then the FLC is applied to further reduce the burden of communication among batteries. Based on these, the space-state function of the BESS considering DoS and FDI attacks is built. Furthermore, a distributed fuzzy control strategy considering multiple cyber attacks is proposed in this section. And the system under the proposed control law is analyzed in different cases.
3.1. The Model of FDI Attacks
FDI attacks are a kind of deception attack that inject false data into controllers and/or sensors to prevent realizing the control goal [
25,
34]. Meanwhile, these false data are injected continuously into controllers in this paper.
The model of controller considering FDI attacks is shown as follows:
where
is the injected data,
is the damaged controller for the
ith battery.
Note that the information is only changed in the corresponding controller. The output feedback controller is applied in this paper. Thus, the output of the system considering FDI attacks is given as:
where
is the injected data,
is the damaged output information for the
ith battery.
Meanwhile, the following assumptions should be met for FDI attacks:
- (a)
The injected false data are bounded.
- (b)
The FDI attacks are mainly compound attacks consisting of bias attacks and harmonic attacks.
Based on this, the space-state function of the BESS in DC microgrids under the DoS and FDI attacks is further built:
Remark 1. Actually, the attack emitters often operate with a limited supply of energy. Thus, the injected false data are bounded due to limited energy of attacks. Based on Equation (23), the bias attacks or the harmonic attacks could be regarded as disturbances because the space function of this system contains disturbance items. Therefore, the control goal could still be realized in the presence of this FDI attack. However, compound attacks could easily cause the failure of control goal according to [25]. For attackers, the compound attacks are the most effective means. Thus, the FDI attacks are mainly compound attacks. 3.2. Modeling of DoS Attacks
For this system, each battery exchanges information with its neighbors through the communication link so as to realize the control goal. However, the communication link is often attacked by certain cyber attacks due to the open setting [
34]. Therein, DoS attacks are a kind of prevalent attack in cyber attacks. DoS attacks mainly prevent the exchange information among batteries by blocking the communication link, and this causes the failure of the control strategy. Meanwhile, in order to ensure the universality of the model, DoS attacks are aperiodic in this paper.
And the attack moment and the duration of DoS attacks are represented as the
and
, respectively. Thus, the time period during DoS attacks is represented as
, and the next time period should meet
. The sum time of DoS attacks in
is
. Moreover, the successful probability of DoS attacks is given as follows [
35]:
where
.
is a detector of DoS attacks with
if
and with
if
. The communication time among batteries is
. The total number of DoS attacks is
M, and the frequency of DoS attacks can be defined as:
is the total length of DoS attacks, the attacks ratio in
can be defined as
Meanwhile, the following assumptions should be met for DoS attacks:
- (i)
The number of DoS attacks is limited, and the duration of each DoS has the upper limit.
- (ii)
The controllers and state values are no longer updated in the presence of DoS attacks.
- (iii)
Every DoS attack can be detected.
Remark 2. As a kind of cyber attack, DoS attacks need the carrier to provide the energy. Moreover, the carriers have the limit of this energy supply. Thus, the condition (i) is reasonable.
Remark 3. Although the ith battery has the ability to communicate during DoS attacks, the availability of data is violated [28]. Based on this, the controllers and state values are no longer updated in order to make data reliable. Remark 4. Note that the detection of DoS attacks have been widely studied [36]. Thus, condition (iii) is satisfied. 3.3. Design of the Fuzzy Logic Controller
Next, an FLC is designed to improve the dynamic performance and reduce the burden of communication among batteries by minimizing unnecessary information exchange.
The FLC transforms logic judgment strategies based on human rich experience into applicable control strategies to controllers. And since there is no need to know the detailed mathematical description of the system, it has been widely studied [
37]. Thus, the FLC is applied in this paper.
The processing of the FLC can be divided into three parts: fuzzification, regularization of logic inference, and defuzzification. In fuzzification, the main task is to collect and transform the input data into a fuzzy set by fuzzy linguistic terms and membership functions. A set of fuzzy rules for logical reasoning is introduced in second part, where the fuzzy rules can be described by simple IF–THEN. In the third part, the fuzzy output is mapped to a clear output by the membership function. And the common methods are the center of gravity method and maximum membership method. Herein, the center of gravity method is applied in this paper.
Based on above analysis, the FLC is introduced to reduce the burden of communication among batteries by judging whether the system needs to update or not based on the
and
d. Note that
represents the variation of output. Therein, there is
, where
is the upper limited. The FLC is shown in
Figure 3.
The FLC has three input membership functions for
: small (S), medium (M), big (B). For
d, there are two membership functions: small (S), big (B). The output has three membership functions: positive small (PS), positive medium (PM), positive big (PB). And the fuzzy rules are shown in
Table 1.
3.4. Current Sharing Fuzzy Control Strategy in the Presence of FDI and DoS Attacks
Next, a current sharing fuzzy control strategy considering FDI and DoS attacks is proposed in this section. And the system under the proposed control strategy is analyzed in different cases. Before that, the current sharing control without FLC is proposed:
where
,
,
. Therein,
is a proposed auxiliary controller which is designed to mitigate the impact of FDI attacks, and
is a given parameter.
Meanwhile, a reference model for each battery is introduced without FDI attacks. And it is shown as follows:
where
.
From the above descriptions, the rules for this system can be obtained as follows. Rule 1: if
is S then
is PS. Rule 2: if
is M, B, and
d is B then
is PB. Rule 3: if
is M, B, and
d is S then
is PM. Note that the output of the FLC is represented by
, whose value ranges between 0 and (1 +
). The control law is proposed as follows, and
can be incorporated into the control law (
27):
where
is the dividing value of the FLC between PS and PM,
sign
and
sign
. Note that sign
is the symbolic function. Finally, the current sharing fuzzy control strategy (
29) is proposed.
Based on this, the following cases could be defined: case 1 if the is negative, and case 2 if the is positive. Therein, case 1 includes Rule 1, and case 2 includes Rule 2 and Rule 3.
3.4.1. Case 1
In case 1, there are
and
. The control law (
29) is rewritten as:
The system is not updated in this case since is S. If the output of ith battery changes very little, it will not affect the output consensus of the system even if controllers is not updated. It is regarded as the unnecessary information in this case. Thus, the burden of communication is reduced by minimizing unnecessary information exchange.
3.4.2. Case 2
In this case,
,
, the control law (
29) is rewritten as:
If the
d is B, it represents the higher successful probability of DoS attacks, and it can be regarded that the DoS attack occurs in this situation. Thus,
should be reset to
if the
d is S, and
if the
d is B in this case. Meanwhile, the system needs to update so as to realize the current sharing control when
is M, B. In other words, the accurate current sharing control among batteries in this case is transformed into the current sharing control of the system (
23) considering FDI and DoS attacks under the control law (
31). Note that the continuous updating of information is also unnecessary if
is between PS and PM. And it can be solved by adjusting
. Then, the detail of choosing
and
is shown as follows.
The
can be chosen by the following algebraic Riccati equation [
25,
38]:
where
is the symmetric positive matrix,
,
> 0 and
> 0. Note that
and
= min(Re
H). Next, the solution of
is given. Meanwhile, it is proved that the BESS in DC microgrids could realized the output consensus under the control law (
31).
Before that, the current sharing among batteries is defined:
Definition 1. For the performance metric , if the system (23) meets the following conditions, it can be said that the system realizes the consensus, i.e., accurate current sharing control under the corresponding controller [33]: - (i)
If , ; then this is true for any initial valuecombine Equation (19), we can obtain - (ii)
If the initial values of the state variables for the leader, followers and compensators are 0, and the disturbance are limited, then the following holds:where
Theorem 1. The conditions for the system (23) to realize the output consensus under the control law (31) with , are shown as follows: Given some symmetric positive matrices and , and scalar > 0 satisfy the following conditions:where and . Proof. Let
. Then, combining Equations (
23), (
27) and (
28), there is
where
and
, and the
is rewritten as
where
. Define the Lyapunov function candidate
Combining
, Equations (
36) and (
37), the derivative of
is shown as follows:
From Equation (
35), there is
And, it can have
Then, using Young inequality, the following equality can be obtained:
Thus, according to [
25], there is
if
Hence, there is a small parameter
that makes
. And
could be chosen by adjusting
and
. According to [
28,
39], it can obtain that
and
. Furthermore, there are
and
, i.e.,
. Thus, the output consensus can be realized by adjusting
. Note that the (
35) can be solved by the LMI toobox in a MATLAB software environment.
This completes the proof. □
Remark 5. The control strategy considering DoS attacks has been widely studied [28,39]. Note that the system (23) is almost same as the system (17) by desiging the [25]. According to the [28], the state information of controllers among batteries is replaced with the most recent available data based on the common strategy (18). 4. Simulation
In order to verify the feasibility of the proposed strategy in the presence of DoS and FDI attacks, simulation examples are provided in MATLAB environment, where four batteries systems and one leader system are considered in the BESS.
And the relevant communication topology is shown in
Figure 4. The detailed parameters are shown as follows. The line parameters among batteries are selected:
,
,
,
,
,
,
,
,
,
. And the resistive loads are selected:
,
,
,
,
. For the parameters of the RLC filter, they are shown as follows:
The relevant parameters of the V-I droop controller are
and
. The capacities of the DGs and CPLs are
. The rated voltage of the DC microgrid is 50 V, and the disturbance from DGs can be selected 10% DC voltage fluctuation. At the beginning, the SoC of each battery is 90%, and the ratio of rated capacities of these five batteries included one leader and four batteries is chosen as 2:1:2:1:2. The parameters of the PnP controller are shown as follows:
Meanwhile, the Equation (
32) is a algebraic Riccati equation, it can be solved in the MATLAB. Thus, based on Equation (
32), the controller gain
= [−6.0,−6.0,−6.0,−6.0;−6.0, −6.0,−6.0,−6.0;−6.0,−6.0,−6.0,−6.0;−6.0,−6.0,−6.0,−6.0] can be obtained. Then the output feedback controller gain can be obtained from Equation (
35) by the LMI toolbox in MATLAB. Therein,
,
,
and
.
As for network attacks, there are = 1 s, 3 s, 5 s, = 20%, f = 0.2 Hz, = 0.5 s, 1 s, 1.5 s for DoS attacks. Meanwhile, FDI attacks are selected as follows: , , and . For the parameters of the auxiliary controller, there are , , and .
The output of the system under the control law (
18) in the idea environment is shown in
Figure 5. From it, it can be found that the system could realize the accurate current sharing control among batteries under the control law (
18) without cyber attacks. However, the outputs of the system in the presence of cyber attacks such as DoS attacks, FDI attacks, or a mixture of the two, are shown in
Figure 5b–d. It is clear that FDI attacks prevent the output consensus of 1st battery and 2nd battery. Therein, FDI attacks for 3rd battery are the harmonic attacks, and this system still can realize output consensus. For 1st and 2nd battery, FDI attacks are the compound attacks, and they cannot realize the output consensus. Meanwhile, it can be found that DoS attacks make the system no update. These are consistent with the assumptions of cyber attacks. Based on this, the auxiliary controller is introduced in equation (
27). The output of this system considering DoS and FDI attacks under the control law (
27) is shown in
Figure 6. As can be seen from the
Figure 6a,b, this system realizes the output consensus, i.e., accurate current sharing among batteries, even if there are multiple cyber attacks in this system. The feasibility of this control law (
27) is proved.
However, this control law (
27) does not take into account the burden of communication among batteries. In order to reduce the burden of communication among batteries, the FLC is applied in the BESS.
For the FLC, the parameters of membership functions are shown as follows. Note that the main task is to verify the feasibility, so the membership can be simply set in
Figure 7. Therein,
and
,
. Based on Equation (
24), the memberships of the
d could be set as triangular membership functions. For the membership function of
in PS, it can be considered as an unnecessary update if
. The influence of updates on the system becomes increasingly significant with increasing values of
. Based on this, the membership of
is set as a trapezoidal function. Similarly, the other membership functions can be set as trapezoidal functions.
The output of the system under the control law (
29) is shown in
Figure 8a. Meanwhile, the events are shown in
Figure 8b, which represent the update of the controller.
Furthermore, in order to highlight the advantages of the proposed control strategy (
29), the comparison simulation results are shown in
Table 2. Different from the common output consensus strategy in [
33], the proposed control strategy is a kind of resilient control against the cyber attacks. Meanwhile, compared with [
28] and [
25], this control strategy could realize the output consensus control for the system under DoS and FDI attacks. Moreover, the burden of communication among batteries is reduced by applying the FLC, which is beneficial to the increasing scale of the BESS. Meanwhile, compared with event-triggered control, the proposed control strategy only needs to set the FLC without complex arithmetic. To sum up, the feasibility of the proposed control strategy is proved.
5. Experiment Results
In this section, the controller hardware-in-the-loop (CHIL) experiment is carried out to further verify the accurate current sharing for the BESS under the proposed control strategy via the StarSim HIL real-time simulator. In this experiment, the control strategy for four inverters are considered in the DSP (TMS320F28335) controller when the other parts of the system are simulated in the StarSim HIL real-time simulator. This is shown in
Figure 9. The line parameters are selected as
. The resistive loads are shown as
. For the PnP controller, the relevant parameters are shown as
,
,
,
,
. The parameters of PI controller are shown as
. At the beginning, the SoC of each battery is 90%, and the ratio of rated capacities of these four batteries is chosen as 2:2:1:1. The droop gains of each agent are shown as
,
. And the other parameters are the same as the part of simulations in
Section 4.
Based on this, the experiment is texted via the StarSim HIL simulator. Meanwhile, in order to better show the performance of proposed strategy, the time of this system is selected as [0 s, 25 s]. And the control strategy in [
28] and proposed control strategy (
29) are applied, separately. Before
t = 10 s, this system applies the control strategy in [
28]. After that, the proposed control strategy is applied. The output current is shown in
Figure 10. Before 10 s, the output current sharing is not realized due to the cyber attacks. After that, the output current sharing is achieved by applying the proposed control strategy. Moreover, according to
where
, there is
when the outputs of each agent achieve the output consensus, i.e., the current sharing among batteries. Thus, the output current of each agent should meet
. As shown in
Figure 10, the output currents are
, and
, separately. The performance of the proposed strategy is verified.