Mostrar el registro sencillo del ítem
dc.contributor.author | Burgos-Mellado, C | |
dc.contributor.author | Donoso, F | |
dc.contributor.author | Dragicevic, T | |
dc.contributor.author | Cardenas-Dobson, R | |
dc.contributor.author | Wheeler, P | |
dc.contributor.author | Clare, J | |
dc.contributor.author | Watson, A | |
dc.date.accessioned | 2024-01-17T15:54:14Z | |
dc.date.available | 2024-01-17T15:54:14Z | |
dc.date.issued | 2022 | |
dc.identifier.uri | https://repositorio.uoh.cl/handle/611/418 | |
dc.description.abstract | Distributed control of modular multilevel converter (MMC) submodules (SMs) offers several potential benefits such as flexibility, scalability, and modularity. In this approach, low-level control tasks, such as capacitor voltage balancing, can be distributed amongst controllers placed in the SMs. This decreases the computational burden for the central control system that performs high-level control tasks; also, a single point of failure is avoided. Distributed control architecture requires a cyber-physical network (CFN) through which local controllers share all the information necessary to perform their respective control loops. To date, none of the reported works in this field have paid attention to potential imperfections in the CFN. Indeed, previous works are based on the assumption that the network always provides correct information to the local controllers. However, erroneous measurements in the CFN may degrade the distributed control scheme operation, leading to suboptimal or even unstable operation. These events can occur in the presence of cyberattacks, for example, which can be created through illegitimate data intrusion into the distributed control architectures. This article is the first to investigate the impacts of cyberattacks on distributed control schemes used in MMCs. The effects of a specific cyberattack, named false data injection attack (FDIA), on a consensus-based distributed control strategy are studied in this article. Additionally, a method for detecting FDIAs is proposed, along with a countermeasure strategy, to ensure the safe operation of the MMC, while the attack is cleared. The proposals reported in this article are validated using simulation and experimental results. | |
dc.description.sponsorship | Agencia Nacional de Investigacion y Desarrollo (ANID) | |
dc.description.sponsorship | ANIDBasal Project | |
dc.relation.uri | http://dx.doi.org/10.1109/TPEL.2022.3147466 | |
dc.subject | Decentralized control | |
dc.subject | Capacitors | |
dc.subject | Voltage control | |
dc.subject | Pulse width modulation | |
dc.subject | Topology | |
dc.subject | Task analysis | |
dc.subject | Multilevel converters | |
dc.subject | Consensus theory | |
dc.subject | cyberattacks | |
dc.subject | distributed control | |
dc.subject | false data injection attack (FDIA) | |
dc.subject | Kalman filter | |
dc.subject | modular multilevel converters (MMCs) | |
dc.title | Cyber-Attacks in Modular Multilevel Converters | |
dc.type | Artículo | |
uoh.revista | IEEE TRANSACTIONS ON POWER ELECTRONICS | |
dc.identifier.doi | 10.1109/TPEL.2022.3147466 | |
dc.citation.volume | 37 | |
dc.citation.issue | 7 | |
dc.identifier.orcid | Clare, Jon C/0000-0001-8243-4280 | |
dc.identifier.orcid | Burgos-Mellado, Claudio/0000-0003-1990-0191 | |
dc.identifier.orcid | Cardenas, Roberto/0000-0003-3853-7703 | |
dc.identifier.orcid | Wheeler, Patrick/0000-0003-0307-581X | |
dc.identifier.orcid | Watson, Alan/0000-0001-6763-5535 | |
uoh.indizacion | Web of Science |
Ficheros | Tamaño | Formato | Ver |
---|---|---|---|
No hay ficheros asociados a este ítem. |
El Repositorio Académico de la Universidad de O'Higgins es una plataforma de difusión documental que recopila, respalda y difunde la producción científica y académica de nuestra casa de estudios. En su interfaz, se integran diferentes tipos de documentos, tales como, libros, artículos académicos, investigaciones, videos, entre otros, los cuales pueden ser difundidos y utilizados con fines académicos y de investigación.
Los recursos contenidos en el repositorio son de libre acceso en texto completo, a excepción de aquellos que por restricciones propias del Derecho de Autor o por petición expresa de la autoría principal, no pueden ser difundidos en la condición mencionada.