Abstract
This paper addresses the asynchronous control problem for power systems subject to abrupt variations and cyber-attacks. In the sequel, the transient faults of circuit breakers can be described as the Markov process. In light of these situations, the power systems are transmitted to discrete-time Markov switching systems. Meanwhile, the deception attacks with time-varying delays in dispatchers are regulated by a Markov process. The controller and dispatcher are mode-dependent and their modes are nonsynchronous with those of power systems, which are modeled by the hidden Markov models. On the basis of the deception attacks, sufficient conditions are presented to guarantee the stochastic mean-square stability of the closed-loop dynamic. Finally, the proposed control design strategy is testified via a simulation result.
1. Introduction
As a type of complex nonlinear system, power systems have gained considerable interest due to their spontaneous oscillation characters and high penetration [1–3]. Over the past decades, many significant methods have been devoted to power systems, such as state estimation [4–8]. For the purpose of stabilizing interconnected power systems, many efforts have been devoted to exploring the mismatch between load demand and total power generation. Following this character, many techniques are forwarded to maintain the frequency balance including the load frequency control, state feedback control [9–11]. Therefore, how to keep the frequency deviation of power systems within a certain range remains a hot topic. For instance, to overcome the low/zero inertia, stability has been studied for power systems with fluctuation and intermittency in [12]. In [13], the load frequency control technique has been utilized to balance the power exchanges among different areas. In [14], the network-induced time delay has been considered in supplying high-quality electric energy. In [15], the fuzzy-dependent power system stabilizer with uncertain factors has been investigated.
In reality, owing to many unexpected factors such as component faults, external disturbances, and unknown attacks, the power systems always experience random variations in parameters/structures, which lead to the resulting operation changes and performance degeneration [16, 17]. Markov switching is identified as an effective tool in modeling the aforementioned conditions [18]. Note that Markov switching is ubiquitous, which has been applied in many physical situations, such as tunnel-diode-circuit-model and complex networks [18–20]. However, to our knowledge, little attention has been given to Markov switching power systems (MSPSs) except for [21–23]. In [21], the random switching of power systems can be modeled as MSPSs. Lately, the continuous-time interconnected multiarea MSPSs with load frequency control are considered in [22]. In [23], the discrete-time MSPSs are studied with a hidden Markov model. Nevertheless, in contrast with the fruitful achievements of power systems, MSPSs have not gained suitable attention.
On the other hand, many valuable results have been reported on the networked power systems subjected to many network-induced factors, such as communication delays, packet losses, quantization effects, and event-triggered protocols [24–26]. By comparison, potential cyber-attacks may destroy the stability of power systems via a shared communication network. In light of the different attack ways, cyber-attacks can be summarized into three categories: denial-of-service [27], repeat attack [28, 29], and deception attacks [30–33]. In more detail, the former aims at destroying the channel of signal exchange, and repeat attacks inject historic data into the network affect the performance, while deception attacks attempt to inject false data into the communication network to destroy the data trustworthiness. On the basis of these cyber-attacks, the conventional control law becomes untrusted. It is of significance to be concerned with cyber-attacks. Among these cyber-attacks, deception attacks are common in practice. For instance, in [34], the unified power systems against random-occurring deception attacks have been studied. In [35], on the basis of credibility, the multiarea power systems with deception attacks have been well concerned. Nevertheless, the security issues of power systems with regard to cyber-attacks have not been adequately explored, such as random occurring deception attacks with time-varying delays, not to mention power systems against Markov switching.
Through expounds of the above discussion, this work shall consider the nonsynchronous controller design issue for MSPSs with cyber-attacks. The main contributions are listed below: (1) a generalized MSPS is established, which covers asynchronous dispatcher, asynchronous controller, and deception attacks, simultaneously. (2) Deception attacks with time-varying delays are taken into consideration. The probability of each time-varying delay is different, and random-occurring deception attacks are described by a sequence of stochastic variables induced by a new Markov process. (3) A more general scenario is that the asynchronous phenomena among system mode, controller mode, and dispatcher mode are well revealed and the hidden Markov model technique is applied. Finally, the effectiveness of the gained methodology is verified via an illustrated example.
Notations: the notations in this paper is standard. symbols the set of all non-negative integers. means a block-diagonal matrix. . implies the Euclidean norm of a vector. signifies the dimensional real space. represents the mathematical expectation. describes the symmetric term.
2. Problem Formulations
As sketched in Figure 1, a type of single-machine infinite bus (SMIB) through tie line is explored in the current study. From the SMIB, we can observe the dynamic behavior of large interconnected power systems. Following this trend, the basic components of SMIB power systems (SMIBPSs) are expressed in Figure 2. Accordingly, the following formula can be established:where , , , and refer to the generator angle, generator speed, -axis voltage, and generator voltage, respectively. Meanwhile, other physical meanings are summarized in Table 1.


In view of the aforementioned observation, the fourth-order state-space model of SMIBPS is formulated aswhere
Similar to the work of [10], and , respectively, represent the reactive and real power loading, whose functions are presented by the parameters . More specifically, the values of parameters in Table 1 are given by , , , , , , , , , and .
By resorting to a discretization period , the discrete-time SMIBPS (2) can be established aswhere and .
In light of the unreliability of the network medium, the abrupt variations of SMIBPS cannot be avoided. To model the variation of SMIBPS in a suitable way, a stochastic variable takes values within a space , is presented to depict the Markov switching SMIBPSs as follows:where refers to a Markov chain, whose transition probability matrix (TPM) is inferred aswhere and for all .
Notice that the data are transmitted to controllers via an unencrypted communication network, which is always being attacked on the sensor-to-controller channels. It is well-known that deception attacks are commonly encountered, which launch some deception signals to destroy the information authenticity of . Thus, as depicted in Figure 1, we consider the random occurring deception attacks in power systems, which damage/destroy the performance to the data integrity. Therefore, the real system information is modeled aswhere . stand for the jump-mode-dependent time-varying delay of deception attacks, and . and are two constants, which satisfies . being the nonlinear function of deception attacks subject to random occurring time-varying delays. implies the Bernoulli variable, in which and signify the transmission channel with and without attack. It yields
In particularly, is a Markov process having values over a set , whose TPM withwhere and for any and .
Accordingly, the actual system information can be reformulated as
Remark 1. In contrast to the reporting literature with mode-independent deception attacks [30–33], the deception attacks have the Markov behavior, and the attack indication scalar is presented to describe the dynamic behavior. Meanwhile, in the current study, time-varying delays against Markov behavior are considered in the deception attacks, which covers the existing deception attacks as special cases [30–33].
Assumption 1. (see [36]). The embedded function , which is adopted to restrain deception attacks with random occurring time-varying delays, satisfies the following condition:where indicates a known matrix implying an upper bound of embedded function .
It is noteworthy that the resulting mode information determines the controller design and effects the performance. With respect to the mode information that cannot be observed when an attack occurs, in the current study, an asynchronous controller was developed as follows:where being the controller gains. Stochastic variable implies a Markov chain having values in a space , whose TPM withwhere and for any and .
Let , , and , combining (5), (10), and (12), we havewhere .
Remark 2. Actually, the mode information of the SMIBPSs is difficult to achieve due to many factors, including higher costs and time-wasting. In order to describe the dynamic behavior of random occurring deception attacks and control laws, the hidden Markov models are adopted to model these asynchronous phenomena. More specifically, we get the two-independent conditional probabilities as follows:
For the convenience of presentation, the following definition is recalled:
Definition 1. (see [37]). The closed-loop dynamic (14) is stochastically mean-square stable (SMSS), if under any initial condition , , and , such that
3. Main Results
In the current section, the SMSS criteria for the closed-loop dynamic (14) and controller design method will be established in Theorem 1 and Theorem 2, respectively.
Theorem 1. For given scalars, and, and gain matrix, the closed-loop dynamic (14) is SMSS, if there exist matrices,, such that for any,where
Proof. Let us construct the following Lyapunov functional:whereCalculating the derivation of along the trajectories (14), yieldsRecalling Assumption 1, the following formula can be acquired:If follows from (20)–(25), it can be obtained thatwhere , .
In light of condition (17), the above inequality equivalents towhere . Obviously, it yielded , which meansBased on Definition 1, the closed-loop dynamic (14) achieves SMSS, which completes the proof.
Theorem 2. For given scalars, and, and gain matrix, the closed-loop dynamic (14) is SMSS, if there exist matrices,,, and matrixsuch that for any,whereFurthermore, the controller gains are achieved as
Proof. Firstly, premultiplying and postmultiplying the condition (29) by term and its transpose, we can get thatwhere
According to Schur complement, one can derive (33) is equivalent to (17).
Next, by means of Schur complement, it can be easily obtained from (17)as follows:where
Premultiplying and postmultiplying (35) by and its transpose, respectively. It yieldswhere
On the other hand, with respect to , it can be derived thatwhich equivalents to
Similarly, in light of , one can also obtain
Substituting (40) and (41) into (37) and utilizing Schur complement, (30) can be guaranteed. This completes the proof.
4. Numerical Examples
In the current section, to evaluate the efficiency of the attained methodology, the off-on jumping of circuit breakers subject to Markov switching that is associated with two modes, similar to [9, 11], the parameters are listed as follows:
For Mode
For Mode
As stated in [11], a Markov chain is adopted to describe the fault switching in power lines, the transition probabilities are illustrated in Table 2. From which, it is clear that .
Furthermore, the condition TPM with two modes and condition TPM with three modes are selected as
Meanwhile, choosing , , , and . The embedded function of deception attacks is chosen aswith , , , and . From which, we get the upper bound . On the basis of conditions in Theorem 2, the controller gains can be computed as
The simulations are plotted in Figure 3, which presents the uncontrolled curves of . The evolution of system mode , dispatcher mode , and controller mode are depicted in Figure 4. The random occurring deception attacks and evolution of time-varying delays are described in Figures 5 and 6, respectively. Under the aforementioned control gains, the state trajectories of the closed-loop dynamic (14) is displayed in Figure 7, and the control input is exhibited in Figure 8. It can be seen from Figure 8 that the developed methodology works well.






Meanwhile, when and TPMs , the asynchronous controller degrades into the synchronous case. Similarly, the controller gains can be acquired as
On the basis of the abovementioned controller gains, the state trajectories of closed-loop dynamic (14) are plotted in Figure 9 and the control input is shown in Figure 10. Clearly, it can be seen from Figures 9 and 10 that the ideal control situation (synchronous control) can achieve better performance.


On the other hand, to further verify the impact of the deception attacks, let , which signifies no deception attacks occur. Similarly, by solving the conditions of Theorem 2, the corresponding gains can be calculated as
Under the aforementioned control gains, the state trajectories of the closed-loop dynamic (14) are displayed in Figure 11 and the control input is exhibited in Figure 12. From the figures, it is clear that a better performance can be achieved without considering the deception attacks. From which, one concludes that deception attacks degrade the dynamic performance to a certain extent.


5. Conclusion
The problem of power systems being subject to abrupt variations and cyber-attacks has been addressed in the current study. Two hidden Markov models are expressed to characterize the asynchronous phenomena among system mode, dispatcher mode, and controller mode. Furthermore, unlike the existing cyber-attacks, the deception attacks with time-varying delays are regulated by a Markov process. Based on the Lyapunov theory, sufficient conditions are presented to guarantee the stochastic mean-square stability of the closed-loop dynamic. Finally, the proposed control design strategy is testified via a simulation result.
Data Availability
All the data are included within this manuscript.
Conflicts of Interest
The authors declare that they have no conflicts of interest.