Privacy Policy Disclaimer
  Advanced SearchBrowse




Journal Article

Distributed Event-Based Resilient Secondary Control for AC Microgrids: A Trust-Reputation Approach


Wan,  Y.
External Organizations;

Wen ,  G.
External Organizations;

Yu,  X.
External Organizations;


Kurths,  Jürgen
Potsdam Institute for Climate Impact Research;

External Ressource
No external resources are shared
Fulltext (public)
There are no public fulltexts stored in PIKpublic
Supplementary Material (public)
There is no public supplementary material available

Wan, Y., Wen, G., Yu, X., Kurths, J. (2024): Distributed Event-Based Resilient Secondary Control for AC Microgrids: A Trust-Reputation Approach. - IEEE Transactions on Smart Grid, 15, 2, 2116-2128.

Cite as: https://publications.pik-potsdam.de/pubman/item/item_29464
A new resilient distributed secondary control for AC microgrids is studied based on event-triggered mechanisms and trust-reputation evaluation methods. When distributed generators (DGs) in a microgrid are subject to attacks, their transmitted state information would be tampered and thus affect the dynamics of normal generators. In order to isolate possible attacks, two types of trust evaluation metrics with different attack indices and time scales are designed, by which the performance of neighboring DGs can be assessed for specific practical demands. Based on the trust values of each neighbor, a reputation-propagation method is introduced at triggered time instants to determine whether a DG is under attack by comprehensively incorporating the opinion of mutual neighbors. The dynamic updating law of the communication edge weights is utilized with the derived reputation values. Based on this, a distributed Zeno-free event-triggered control protocols for voltage/frequency restoration and active power sharing are proposed. Sufficient conditions for picking proper control parameters are given in the main theorem. Lastly, the simulations are conducted in MATLAB/SimPowerSystems for several scenarios to validate the effectiveness of the proposed algorithms.