Preprint
Article

This version is not peer-reviewed.

Time-Delay Resilient Cooperative Filters for Cyber-Physical Systems

Submitted:

09 July 2025

Posted:

10 July 2025

You are already at the latest version

Abstract
Reliable real-time and uninterrupted data tele-communication between subsystems in a Cyber Physical System (CPS) is at the core of secure operation of the CPS. Time-delay and Denial-of-Service (DoS) cyberattacks are among CPS cyber threats that could impair normal functioning in the CPS, through intentional latency in the data tele-communication systems by infliction of data congestion, routing issues, parasitic electro-magnetic interference, etc. Load Frequency Control (LFC) in smart grids are among critical CPS controllers where certain time-delays in the transmission of remote system parameters could cause instability and pervasive havocs within seconds, if not detected and contained promptly. This paper considers a general interconnected CPS of heterogenous subsystems where information is randomly delayed from one subsystem to another. The paper circumvents time-delays caused at the tele-communication layer by augmenting a Multi-Agent System (MAS) of cooperative filters that restore random information delays with negligible and controllable time-delays. Consequently, real-time information would be accessible by the subsystem controllers at all times, regardless of the delays inflicted in the tele-communication layer. The LFC problem has been considered as an example of a challenging CPS that is highly vulnerable to time-delay cyberattacks, and the proposed cooperative filters were used to validate the theoretical results through numerical simulations.
Keywords: 
;  ;  ;  ;  ;  

1. Introduction

Cyber-Physical Systems (CPS) are usually networked systems composed of a number of heterogeneous systems characterized by independent system dynamics, coupled through a set of signals that are transmitted to other systems, where information is exchanged between the systems to enable computation of control commands, in order to regulate or track desired outputs in the systems with reference to an overall control objective in the CPS. In cases where large number of interconnecting nodes are involved it is often advantageous to administer exchange of information merely among adjacent neighbours (i.e., distributed control), rather than deploying a central control architecture that communicates with all the individual nodes. This is particularly important in order to ensure security and reliability, since in this case communication signals can be kept covert and contained in a local fashion. The dispersed nature of CPS often requires public tele-communication infrastructures to be employed for information exchange, rather than dedicated (i.e., leased) communication lines (due to cost and operating expenses). This especially poses threat to the CPS in the form of cyberattacks, and may encounter highly unwanted consequences [1,2]. Therefore, the security of the CPS has to be considered and addressed properly in the CPS design phase. A CPS with a distributed control philosophy in which the systems take part in a cooperative control network to achieve a common goal is referred to a Multi-Agent System (MAS), and the systems are referred to as the agents. Specifically, power generating stations in the LFC problem are subsystems (or agents) of the power system (i.e., the CPS) where system states are collected from remote locations and tele-metered to the controllers through a communication system, in order to regulate the frequency of the grid, and exact the desirable amount of electric power to be traded between the power areas.
Cyberattacks are broadly categorized in the literature into deception, and time-delay or DoS attacks [4]. In deception attacks an adversary attempts to maliciously alter the information packets that are transmitted among the agents in order to cause an intended consequence in the CPS, while time-delays and DoS attacks are obstructive means conducted by adversaries to delay or interrupt in the normal flow of information. The authors in [3,4] have considered the cooperative output regulation problem for heterogeneous linear multi-agent systems in the presence of communication constraints. Cooperative output regulation is a generalization of the leader-follower consensus problem in MAS. Load sharing in power systems as explained in [5] can be formulated from a MAS point of view, in which the area power systems are considered as agents, and limited information are exchanged among the agents to achieve a secondary coordinated control in a decentralized fashion. In [6] the authors have presented a distributed secondary control scheme for power allocation and voltage restoration in islanded DC micro-grids employing MAS consensus control techniques. As far as the LFC problem is concerned, the authors in [24] have performed a thorough literature review with respect to the inadequacies in the literature with regard to LFC with time-delays and packet dropouts. According to their studies "existing works have incorporated either DoS cyberattacks, or time-delays in the control loops", where time-delay resiliency methods in the literature either aim at major modifications in the existing communication systems and controllers (such as in [26]), or suggest gain re-adjustments in PLC controllers [24], or complicated LMI equations that require precise knowledge of system models [25,27,28].

2. Contributions

The contribution of this paper is in the transformation of a "time-delayed CPS" (i.e., a system of systems in which certain information are transmitted from one subsystem to another subsystem through tele-communication channels with random and unknown time-delays) into a "delay-resilient" CPS (that is a CPS with negligible and controllable time-delays in all tele-communication channels), and (importantly) without any modification to any of the existing physical systems, nor with any required knowledge of the constituting subsystems. This is particularly important in industrial CPS where state owned and privately owned systems are involved and intertwined, and where the dynamic models of physical systems are unknown to others (either due to security reasons, or due to the nature of the CPS). Certain examples include the LFC problem in a smart grid, where there are privately owned power generating units with certain security constraints, or in Advanced Air Mobility where anonymous aerial vehicles randomly join and disconnect from the air traffic system. In these cases, various system dynamics with unknown characteristics are involved and it is impractical to modify subsystem’s internal controllers (due to certification, privacy, security issues, etc.). Hence, it is fundamental to involve delay-resilient methodologies at the tele-communication system layer, in a way that is independent of the internal dynamics of the physical subsystems. The authors of this paper strongly believe that such solutions are unprecedented state-of-the-art, and not available in the literature as of this date.

3. Related Works

The conditions for "consensusability" in linear homogenous MASs has been presented in [7,8], where output feedback consensus protocols were given and the closed-loop MAS was shown to be achieving asymptotic consensus if the topology had a spanning tree. Output consensus for heterogeneous MAS with Markovian switching network topologies has been discussed in [9] and can be used as the basis for studying MAS under DoS cyberattacks assuming that DoS attacks can be represented as switching topologies. Unfortunately, [9] does not address communication time-delays and instability issues that can be caused due to information reception delays. The authors in [11] have also attempted to solve the output consensus problem in a leader-follower heterogenous MAS under DoS attack. Unfortunately, the solution proposed in [11] can neither be applicable in real-world, since leader’s dynamic is unknown to the follower agents in most scenarios (especially, in a MAS where the leader is randomly switched from time to time, such as in a MAS of UAVs where the leader may have to be switched randomly from one agent to another for the system to be robust against the leader’s internal faults and outages).
The subject of distributed consensus of heterogenous MAS subject to switching topologies and communication time-delays has been a recent research problem in the literature (as in [10]) with a focus on power systems. This article provides a comprehensive solution for stability and control of heterogenous MAS systems considering a switching controller that alters the controller gain based on the knowledge that a time-delay attack has taken place. The authors in [3] have investigated cooperative resilient output regulation problem with time-delay constraints for a specific class of heterogenous MAS with uniform exogenous inputs (following a LTI dynamics with pure imaginary eigenvalues). Unfortunately, the authors have assumed an exogenous signal that has a predetermined dynamics, which violates a fully arbitrary output trajectory condition for the leaders (as we discussed earlier), due to the fact that the followers are assuming a consensus law that is based on some predefined system parameters. The authors in [4] have recently addressed the same subject for a class of CPS systems with non-uniform but bounded communication delays under denial-of-service (DoS) attacks, where a switching resilient control approach is proposed. However, the proposed controller is only functional for DoS attacks (where agents are assumed to understand "missing" information from neighbour agents) but does not address time-delay attacks.
The authors in [12] have studied consensus in a homogenous MAS, where the agents are expected to follow a given reference command under intrinsic and communication time-delays and disturbances. The authors in [13] have considered consensus problem for discrete-time homogenous multi-agent systems over an undirected, fixed network communication graph, focusing on the robustness of consensus with respect to communication delay. The authors in [15,16] have discussed the problem of output synchronization in a multi-agent system subject to time-delays, with linear right-invertible agents that is subject to arbitrary time-delays. The authors in [17] have addressed adaptive consensus tracking for a class of nonlinear multi-agent systems under time varying actuator faults. Several other recent publications have also paid attention to time-delayed nonlinear MAS output regulation using data-driven consensus [18]. The authors in [19] have discussed consensus problem in a discrete-time nonlinear MAS using sliding mode control laws. The authors in [20] have investigated the consensus problem of MAS with time-varying delays subject to switching topologies with less conservative consensus conditions. The authors in [21] have very recently investigated the group consensus problem for heterogeneous MAS with time-delays via pinning control in the frequency domain. For the LFC problem subject to time-delays which nowadays continues as an ongoing and challenging problem in the literature, the authors in [23] have addressed cybersecurity using linear feedback control employing a set of LMIs. The authors in [24] have used a filtered PID controller that is tuned in the LFC using the particle swarm optimization (PSO) algorithm to solve the problem. More recent research works on the same topic include [26]-[28] to name a few.

4. Definitions and Assumptions

Let us consider an interconnected CPS S , and its N constituent subsystems S i S , i { 1 , 2 , , N } , hereinafter referred to as "subsystems". Generally, subsystems in a CPS may (or may) not involve states that are shared with other subsystems.
 Definition 1.
We define an "exogenous state" as a shared state between dynamically coupled subsystems whose value is transmitted from one subsystem to another subsystem through a tele-communication channel. On the other hand "endogenous states" are defined as subsystem states when the coupling between the subsystems are removed. Therefore, one may assume that exogenous states are prone to cyberattacks, and endogenous states are immune against cyberattacks.
  • Exogenous states are distinct from exogenous signals in a sense that time-delays in exogenous states can cause instability in the systems. The dynamic couplings between the subsystems can be physical (such as in interconnected power systems) or non-physical (such as in automated air traffic systems in advanced air mobility).
 Definition 2.
Let x j ( ) R denote the t h state of S j , and x j ( ) , i R denote the value of x j ( ) after transmission to S i , and x j , i denote the exogenous state vector of S i that is transmitted from S j to S i . In a delayed communication system x j ( ) , i ( t ) = x j ( ) ( t τ j , i ) and x j , i ( t ) = x j ( t τ j , i ) , where τ j , i R + is a random time-delay of the communication link from S j S i . Therefore, x i + S j x j , i represents the full state vector of S i which is the sum of the endogenous (i.e., x i ) and exogenous states S j x j , i .
  • When the subsystems in a CPS are dynamically coupled, in order to model subsystem dynamics the state of other subsystems involve. One can imagine a very heavy load that is chained and transported by multiple helicopters, or a power system that involves interconnected power areas, which are examples of physically and dynamically coupled subsystems. Autonomous air traffic control in urban air mobility is another example where the coupling between subsystems are non-physical.
 Remark 1.
It is generally problematic to model a dynamically coupled CPS in which randomly time-delayed exogenous states are involved, and where the dynamic model of the subsystems are unavailable to other subsystems.
In this article we consider a multi-agent system framework in order to facilitate time-delay recovery in the CPS. Therefore, we consider an undirected graph G = ( N , E , A ) where N is the set of nodes representing N number of subsystems (or agents), E N × N as the set of edges (or communication links between the subsystems), and A = [ a i j ] N × N , a i j { 0 , 1 } , representing the adjacency matrix. The elements of A are defined such that a i j = 1 , if ( i , j ) E , and a i j = 0 , if ( i , j ) E . Let N i denote the neighbour set of agent i (where, a i j = 1 ). The Laplacian matrix L : = D A = [ i j ] R n × n , associated to G is defined such that,
i i = j = 1 n a i j , i j = a i j , for i j ,
where D = [ i i ] is the diagonal in-degree matrix. Generally, a heterogeneous linear subsystem S i S with a time-delay tele-communication system can be defined by the equations,
x ˙ i ( t ) = A i x i ( t ) + B i u i ( t ) + D i w i ( t ) + j N i E j , i x j , i ( t ) , y i ( t ) = C i x i ( t ) + j N i C j , i x j , i ( t ) ,
where x j , i ( t ) R N x i denotes the exogenous states of S i according to Definition 2. Furthermore, x i R N x i denotes the endogenous state vector of S i , u i R N u i denotes the local control command vector, and w i R N w i denotes a vector of bounded unknown disturbances, and finally y i R N y i denotes the output vector of S i , where matrices A i , B i , D i , E j , i and C j , i have appropriate dimensions. System matrices are such that when there is no time-delay present in the tele-communication system Equation (2) could be represented as,
x ˙ i ( t ) = ( A i + j N i E j , i ) ( x i ( t ) + x j , i ( t ) ) + B i u i ( t ) + D i w i ( t ) ,
as later exemplified in Remark 5 (in Section 8).
 Definition 3.
Time-delay resiliency in a CPS is defined as a condition where | x j ( ) , i ( t ) x j ( ) ( t ) | < ϵ , i , j N , { 1 , 2 , , N x i } , and for all t > τ j , i > 0 , where ϵ R + is an arbitrarily small number, where from Definition 2 we had x j ( ) , i ( t ) = x j ( ) ( t τ j , i ) .
 Assumption A1.
We assume that the network G is a connected network with N agents, where all subsystems are stable when there in no time-delay in the tele-communication channels. In other words, the endogenous states x i ( ) are continuous Lipchitz functions of time, and there exists a small ϵ R + , such that | x i ( ) ( t ) x i ( ) ( t T s ) | < ϵ , for an arbitrarily small T s R + .
 Assumption A2.
Let us assume that ( A i + j N i E j , i , B i ) constitute a controllable pair, and ( A i + j N i E j , i , C i + j N i C j , i ) constitute an observable pair, for all S i S .
 Assumption A3.
We assume that a Denial of Service (DoS) attack on agent i from j is equivalent to the condition a i j = 0 , j N i in a finite duration in time. This is due to the fact that a i j = 0 is equivalent to the edge ( i , j ) being removed from E , implying no communication service from j to i, hence DoS on i from j.

5. The Load Frequency Control (LFC) Example

The LFC example clarifies the definitions raised in the previous section, and explains the complexities behind modelling of a CPS. The literature [5] models the states of a generating station S i as x i = [ Δ f i , Δ P m i , Δ P v i , Λ i , Δ P i j ] T R 5 denoting the fluctuations and variations in the area frequency, the mechanical power of the prime mover, the governor valve position, the integrated Area Control Error (ACE) of the equivalent generating units, where ACE = K i B i Δ f i + K i Δ P i j , and the interconnecting tie-line power, respectively, as in Figure 1, where,
Λ i ( t ) = s = 0 t K i B i Δ f i ( s ) + K i Δ P i j ( s ) d s ,
Δ P i j ( t ) = 2 π T i j s = 0 t [ Δ f i ( s ) Δ f j ( s ) ] d s ,
where K i , B i , T i j R + are positive constants, and where Λ i is a control variable calculated by the Central Control Station (CCS) and transmitted to S i as shown in Figure 1. Δ P d i in the figure denotes variations in the power of the area transmission lines and intermittent renewable energies, and is considered as a random variable. The objective of the LFC as the name implies is to control the area frequency with respect to changes in Δ P d i , while maintaining the preset amount of energy exchange between the areas (i.e., P i j ). In other words, the objective of the LFC is that,
lim t | Δ f i ( t ) | 2 + | Δ P i j ( t ) | 2 0 , Δ P d i ( t ) .
This is due to the fact that P i j ( t ) is often a time-varying contracted variable between two areas and is set by the main input u i ( t ) in Figure 1, where one area commits to supply a regulated amount of energy to the other area, irrespective of the variations in area load. Λ i and Δ P i j are exogenous states for S i , and the first three entries of x i are endogenous states for S i .
A time-delay cyberattack on the tele-communication channels of S i causes the actual Λ i ( t ) to be observed by the controller in S i as Λ i ( t τ Λ i ) , where τ Λ i R + is an unknown random time-delay. Similarly, let P i j denote the desirable power to be traded between S i and its adjacent power area S j . The sensor collecting the instantaneous power P i j + Δ P i j ( t ) is often remote from the controller in S i . Therefore, the practice is to install Remote Terminal Units (RTUs) inside the power substations (controlling circuit breakers, disconnector switches, and other electric apparatus associated with transmission lines) to continuously read P i j + Δ P i j ( t ) and transmit the value to the CCS through a tele-communication line for the computation of Λ i ( t ) . However, the tele-communication time-delays result in P i j + Δ P i j ( t τ P i j ) , and f i + Δ f i ( t τ f i ) being observed in the CCS. Therefore, time-delays τ P i j , τ f i R + affect the computed value Λ i ( t ) , and Λ i ( t ) is further delayed by τ Λ i to finally affect x i ( t ) . In the LFC example of Figure 2, Λ ’s are the only exogenous states that are actually required by the generating areas for the operation. However, the CCS requires the tie-line power values (i.e., Δ P i j ’s) and the area frequencies Δ f ’s to compute the Λ ’s. Figure 2 depicts the interconnection of the area generating stations in an LFC through power transmission lines and the flow of information, as an example of a CPS.

6. Problem Statement

Before we formally state the problem let us note from the definitions and the assumptions that x j ( ) ( t ) ϵ x j ( ) , i ( t ) x j ( ) ( t ) + ϵ , j , , resulting x j ( t ) ϵ 1 N x i x j , i ( t ) x j ( t ) + ϵ 1 N x i , j , where 1 N x i R N x i is a vector of ones. Through substitution in Equation (2) it follows that,
x ˙ i ( t ) = A i x i ( t ) + B i u i ( t ) + j N i E j , i x j ( t ) ± j N i E j , i μ 1 N x i + D i w i ( t ) ,
where μ R + , μ ϵ , and due to the controllability condition in Assumption A2 one would be able to design a feedback control law such as u i ( t ) = K i x i ( t ) + j N i K j , i x j , i ( t ) using H methods, so that lim t | | y i ( t ) | | 2 < ϵ y i 2 , i , and for an arbitrarily small ϵ y i 2 > 0 , ensuring stability of the CPS in a Lyapunov sense. This would be always possible since j N i E j , i μ 1 N x i could be considered as a small disturbance similar to D i w i ( t ) and rejected through an appropriate state feedback. Therefore,
 Remark 2.
A time-delay resilient CPS as in Definition 3 guarantees stability of the CPS under all random time-delays t > τ j , i > 0 , including the objective in Equation (5).
Let G denote a connected graph of a CPS S = S o S i S j with random communication delays between the constituent subsystems o , i , j , . Let x o ( ) ( t ) S o S be an endogenous state of S o to be transmitted to all other subsystems S i , S j , , and let x o ( ) , i ( t ) , x o ( ) , j ( t ) , denote the delayed value of x o ( ) ( t ) at S i , S j , , respectively, where x o ( ) , i ( t ) = x o ( ) ( t τ o , i ) , x o ( ) , j ( t ) = x o ( ) ( t τ o , j ) , .
The problem is to recover the real-time value of x o ( ) ( t ) x o ( ) ( t T s ) at all recipient subsystems S i , S j , , with an arbitrarily negligible time-delay T s , by cooperative-filtering of the delayed signals. In particular, the objective is to find an LTI filter with impulse response h ( t ) so that,
x o ( ) ( t T s ) = α i x o ( ) , i ( t ) + Σ j N i α j x o ( ) , j ( t τ j , i ) * h ( t ) ,
for all S i S , where α ’s are real constant coefficients, T s > 0 is an arbitrarily small transient time for the filter h ( t ) , and where x o ( ) , i ( t ) = x o ( ) ( t τ o , i ) is the input of the filter, and x o ( ) , j ( t ) = x o ( ) , j ( t τ o , j ) , j N i are auxiliary inputs from the neighbouring subsystems of S i .
 Definition 4.
A CPS that incorporates the exchange of information among constituent subsystems in order to achieve a common goal (i.e., time-delay resiliency) in a distributed system framework is referred to as a Multi Agent System (MAS), and the processing component (e.g., the filter) in each subsystem that involves the exchange of information is referred to as an "agent". Therefore, the cooperative filter proposed in Equation (6) is a MAS.

7. Main Results

The multi-agent filtering structure in Figure 3 guarantees time-delay resiliency in the CPS despite of the random time-delay cyberattacks on the communication channels, and the objective is to attain the real-time value of a state x o ( ) ( t ) S o in agent S i .
The filters h ( t ) are identical in all agents and are located immediately after the data receivers. The internal block diagram of the filter h ( t ) is as shown in the box for S i where the input x o ( ) , i ( t ) can be x o ( ) ( t τ o , i ) if there is a direct communication link between S o S i , or any arbitrary conjecture available to S i . The output of the filter is x o ( ) , i ( t + Δ t ) where Δ t is a controllable transient time for the filter that can be arbitrarily adjusted through the filter gain γ , and is fed to the internal controller in S i and simultaneously shared with the neighbouring agents. The interesting and important characteristic of the multi-agent filtering scheme is that the outputs of all filters will become identical after lapse of the filter transients and within a negligible settling time T s > 0 . In particular, for any arbitrary set of inputs x o ( ) , 1 ( t ) , x o ( ) , 2 ( t ) , , x o ( ) , N ( t ) one will have,
lim Δ t T s x o ( ) , i ( t + Δ t ) = x o ( ) , j ( t + Δ t ) , i , j { 1 , , N } ,
regardless of the time delays in the tele-communication channels. Consequently, if any single agent such as S o temporarily maintains its output at x o ( ) ( t + Δ t ) = x o ( ) ( t ) , T s Δ t 0 , then it follows that,
lim Δ t T s x o ( ) , i ( t + Δ t ) = x o ( ) ( t ) , i N ,
which satisfies the objective in Equation (6). This implies that any single agent in the MAS such as S o where its output follows its input for a time period T s Δ t 0 will act as the leader in the MAS and all other agents in S will follow and track the output x o ( ) ( t ) . More specifically,
 Remark 3.
The connected MAS shown in Figure 3 will achieve consensus as in Equation (7) regardless of the time-delays in the tele-communication links, and the consensus value will be equal to the output of the leader only if there is a single leader such as S o available in the MAS, and where the leader is characterized by the equation x ˙ o ( ) ( t + Δ t ) = 0 , T s Δ t 0 .
 Remark 4.
Clearly, realization of time-delay resiliency through the cooperative filters h ( t ) does not involve dynamic models of the subsystems (as it is evident from Figure 3). Furthermore, T s can be arbitrarily reduced to improve the error ϵ in Definition 3 by increasing the filter gain γ (refer to [30] Theorem-2). Finally, cooperative filters are components that can be added to existing communication systems without necessary modifications to the existing subsystems.These characteristics are unique advantages that would make the presented technique an ideal solution for CPS time-delay security.
However, in case there are multiple leaders in the MAS the consensus output will be the centroid of the leaders outputs. In what follows the statement in Remark 3 will be justified mathematically, which constitutes firstly, proof of the stability of the MAS filter scheme in the presence of time-delays, and secondly, the output consensus of the MAS under all random time-delays. The following equations can be derived from the schematics of h ( t ) in Figure 3.
x o ( ) , i ( t + Δ t ) = x o ( ) , i ( t ) + γ t t + Δ t Σ j N i x o ( ) , j ( s τ j , i ) x o ( ) , i ( s ) d s ,
or,
x ˙ o ( ) , i ( t + Δ t ) x ˙ o ( ) , i ( t ) = γ Σ j N i x o ( ) , j ( t + Δ t τ j , i ) x o ( ) , i ( t + Δ t )
γ Σ j N i x o ( ) , j ( t τ j , i ) x o ( ) , i ( t )
which follows that,
x ˙ o ( ) , i ( t ) = γ Σ j N i x o ( ) , j ( t τ j , i ) x o ( ) , i ( t ) , t > 0 , i N ,
In order to simplify the notations let η i x o ( ) , i , i o N and η o x o ( ) . With this simplification, the input/output equation of the MAS in Figure 3 reduces in a compact form to,
η ˙ ( t ) = γ D η ( t ) + γ i = 1 N j N i A j i η ( t τ j , i ) ,
where D is the diagonal in-degree matrix as defined earlier, η = [ η 1 , , η N ] T , and A j i is the adjacency matrix of the nodes with time delay τ j , i , where A = i = 1 N j N i A j i . Note that in case of no time delay, the input-output relation of Figure 3 could be simply represented as η ˙ ( t ) = γ L η ( t ) , where the laplacian matrix would be L = D i = 1 N j N i A j i .
 Lemma 1.
For a connected MAS S with no time-delays, the cooperative filter in Figure 3 with a sufficiently large gain γ > 0 ensures that | η i η o | < ϵ , as Δ t T s , S i S , if x o ( ) S o S is not filtered, while all other agents S i , S j , S use h ( t ) to filter their inputs as depicted in the figure.
  • The proof is straightforward and can be found in standard MAS textbooks. The implication of Lemma 1 is that the schematics in Figure 3 guarantees that the agents filter outputs simultaneously converges to x o ( ) ( t ) if all the agents except S o use h ( t ) to filter their inputs, and if the output of S o is simply connected to the input of S o , when there is no time-delay in the system. Theorem 1 and Theorem 3 below will prove that this would be the case even if there is a time-delay in the communication channels, and this would prove time-delay resiliency of the MAS in Figure 3. The condition lim Δ t T s | | η ( t + Δ t ) η ( t ) | | < N ϵ would be equivalent to lim t | | η ( t ) η ( 0 ) | | < N ϵ for an arbitrarily small T s and a sufficiently large γ .
 Theorem 1.
Given the connected MAS S in Figure 3, the time-delayed system in Equation (9) is marginally stable (i.e., | | η i ( t ) | | 2 remains bounded, for all i N , as t ) for all finite time-delays, and all γ > 0 .
 Proof. 
Assume the Lyapunov candidate function,
V ( η ) = | | η ( t ) | | 2 + γ i = 1 N j N i t τ j i t | | η ( ξ ) | | 2 d ξ .
  • In order to prove the theorem it would be sufficient to show that V ˙ ( η ) 0 , since in this case V ( t ) V ( 0 ) , t > 0 , or | | η ( t ) | | 2 | | η ( 0 ) | | 2 , t > 0 , or i = 1 N η i 2 ( t ) | | η ( 0 ) | | 2 , t > 0 , implying boundedness of η i ( t ) , i N . However, from Equation (10) it follows that,
    V ˙ ( η ) = 2 γ η T ( t ) D η ( t ) + γ i = 1 N j N i η T ( t ) A j i η ( t τ j , i ) + γ i = 1 N j N i η T ( t τ j , i ) A j i T η ( t )
    + γ i = 1 N j N i | | η ( t ) | | 2 γ i = 1 N j N i | | η ( t τ j , i ) | | 2 ,
    which can be written in a compact form as,
    V ˙ ( η ) = γ [ η T ( t ) η T ( t τ 1 ) η T ( t τ N ) ]
    2 D i = 1 N Γ i A 1 A N A 1 T + Γ 1 0 N × N A N T 0 N × N + Γ N η ( t ) η ( t τ 1 ) η ( t τ N )
    where, η ( t τ i ) = [ η T ( t τ 1 , i ) , , η T ( t τ N , i ) ] T , excluding η T ( t τ i , i ) , and A i = [ A 1 i , , A N i ] , excluding A i i , and Γ i = Diag ( Γ 1 i , , Γ N i ) , excluding Γ i i , where Γ j i = Diag ( 0 , , a i j , , 0 ) is a diagonal matrix with all entries being zeros except [ Γ j i ] j j = a i j . Therefore, one can write,
    V ˙ ( η ) = γ [ η T ( t ) η T ( t τ 1 ) η T ( t τ N ) ]
    L ˇ τ [ η T ( t ) η T ( t τ 1 ) η T ( t τ N ) ] T
    where it is denoted that,
    L ˇ τ 2 D i = 1 N Γ i A 1 A N A 1 T + Γ 1 0 N × N A N T 0 N × N + Γ N
    and the sufficient condition for marginal stability is to have L ˇ τ 0 . We use the Gershgorin disk theorem to evaluate the eigenvalues of L ˇ τ , which states that "if M = [ m i j ] is an m × m real matrix, then all the eigenvalues of M are located in the union of the following sets",
    i { z C | | z m i i | j = 1 , , m j i | m i j | } .
  • Figure 4 is an illustration of the spectrum of L ˇ τ according to the Gershgorin disk theorem, where each disk corresponds to one row in L ˇ τ , and encloses an eigenvalue of L ˇ τ . Therefore, the eigenvalues of L ˇ τ are encapsulated by the union of the disks illustrated in Figure 4.
  • Consequently, the condition L ˇ τ 0 is equivalent to satisfying the following conditions simultaneously,
    1 ) 2 | i i | i = 1 N [ Γ i ] i i | i i | , i N , 2 ) | [ Γ j i ] j j | a i j , i j N ,
    or,
    L ˇ τ 0 1 ) | i i | i = 1 N [ Γ i ] i i , i N , 2 ) | [ Γ j i ] j j | a i j , i j N ,
    where the second condition always hold since | [ Γ j i ] j j | = a i j . On the other hand i = 1 N [ Γ i ] i i = i = 1 N [ Diag ( Γ 1 i , Γ 2 i , , Γ N i ) ] i i = j N i a i j , where j N i a i j = i i , validating the first condition for all i. In conclusion, for all finite t > τ j i > 0 one may assume L ˇ τ 0 , which completes the proof of the theorem. □
Figure 4. Spectrum of L ˇ τ with reference to the Gershgorin disk theorem, is the union of several disks where each disk corresponds to a row in L ˇ τ . The bigger circle represents the first N rows, referred to as the first block row, where the center of the disk is on the real axis and at 2 i i i = 1 N [ Γ i ] i i to the right, with a radius i i . The smaller disk represents the set of other block rows where each row is represented by a disk with its center on the real axis at | [ Γ j i ] j j | and a radius a i j , and a set of null disks located at the origin.
Figure 4. Spectrum of L ˇ τ with reference to the Gershgorin disk theorem, is the union of several disks where each disk corresponds to a row in L ˇ τ . The bigger circle represents the first N rows, referred to as the first block row, where the center of the disk is on the real axis and at 2 i i i = 1 N [ Γ i ] i i to the right, with a radius i i . The smaller disk represents the set of other block rows where each row is represented by a disk with its center on the real axis at | [ Γ j i ] j j | and a radius a i j , and a set of null disks located at the origin.
Preprints 167355 g004
  • Theorem 2 below will examine consensus in a delayed cyber-system that is governed by the control protocol in Theorem 1.
 Theorem 2.
The connected MAS with finite time-delays in Theorem 1 achieves consensus. In other words, there exists some κ R , such that η ( t τ ) κ 1 , t > τ > 0 , as t , where 1 is a column vector with all unit entries.
 Proof. 
One can prove consensus if η = [ η T ( t ) η T ( t τ 1 ) η T ( t τ N ) ] T = κ 1 at V ˙ = 0 (i.e., the equilibrium), and if equilibrium point is at η = κ 1 . Therefore, consensusability would be equivalent to the condition, where firstly, the sum of all the entries in every row of L ˇ τ is zero, and secondly, if η κ 1 V ˙ 0 .
In Theorem 1, it was specified that A i = [ A 1 i , A 2 i , , A N i ] , and Γ i = Diag ( Γ 1 i , Γ 2 i , , Γ N i ) , [ Γ j i ] j j = a i j (with every other entry being zero), and [ A j i ] j i = a i j (with every other entry being zero). This implies that 1 T ( Γ j i A j i ) = 0 and ( Γ j i A j i ) 1 = 0 , or 1 T ( Γ i A i ) = 0 , and ( Γ i A i ) 1 = 0 , i N . On the other hand, since ( D i = 1 N A i ) 1 = 0 , and D = i = 1 N Γ i , it follows that, ( 2 D i = 1 N Γ i i = 1 N A i ) 1 = 0 , and finally, 1 T L ˇ τ = 0 and L ˇ τ 1 = 0 , which proves that κ 1 is an equilibrium for V. On the other hand, since η = 1 is the only solution for ( 2 D i = 1 N Γ i i = 1 N A i ) η = 0 , it follows that κ 1 is the only equilibrium, which completes the proof of the theorem. □
 Theorem 3.
A time-delayed connected MAS with the cooperative filter scheme in Figure 3 is time-delay resilient with respect to x o ( ) ( t ) S o S against all bounded time-delay attacks, if x o ( ) ( t ) is the output of S o . In other words lim Δ t T s x o ( ) , i ( t + Δ t ) = x o ( ) ( t ) , i N .
We omit the proof of this lemma due to space constraints. However, one can have a non-rigorous proof to this theorem from the implication of Theorem 2, which states that the output of all the agents in Figure 3 at t + T s is necessarily equal regardless of their inputs at time t, and since the output of S o is x o ( ) ( t ) for all t including t + T s , it follows that the output of all the filters at t + T s is x o ( ) ( t ) , which proves the theorem.
As discussed in the Assumptions, a DoS cyberattack from agent i to j can be represented by the assumption a i j = 0 . Therefore, a DoS cyberattack on a random set of edges E ˜ k E (where E ˜ k represents the k t h attack on some edges) in the time duration T ˜ k would result a random subgraph G ˜ k G and a new Laplacian matrix L ˜ k where, eig ( L ˜ k ) 0 .
 Theorem 4.
The cooperative filter scheme in Figure 3 achieves asymptotic consensus under arbitrarily random DoS cyberattacks, if there is no infinite DoS attack that disconnects the graph.
 Proof. 
Let us denote that δ i = η i η o , and δ = [ δ 1 , , δ N ] T . Let us also denote the Laplacian matrix of the MAS comprising the leader S o and the followers S i , i N as L ˜ . We have seen from Theorem 1 that for a non switching topology η i and therefore δ i are asymptotically stable for all i N . However, in case of random DoS attacks (refer to [14]) we assume that there are N σ possible topologies that an adversary may inflict in the network as a result of DoS attack on one or more communication channels, including disconnections in the grid among the followers as well as the leader. Let us consider N σ Laplacian matrices corresponding to each scenario, denoted by L ˜ 1 , L ˜ 2 , , L ˜ N σ where L ˜ i 0 (where Rank ( L ˜ i ) = 0 implies disconnections in the network). Corresponding to each scenario L ˜ i let us consider a symmetric positive definite matrix P i with the same dimension (i.e., N × N ), and let us additionally consider a Lyapunov function V δ ( t ) = δ T ( t ) P i δ ( t ) .
We will further assume that a random switching scenario σ k takes place for t [ t k , t k + 1 ) where T k = t k + 1 t k is finite for all σ k . In order to prove Theorem 4 it would be sufficient to prove that for an arbitrary σ k and an arbitrary topology (denoted by L ˜ i and P i ), one could find a P j up to the next switching scenario σ k + 1 (with topology L ˜ j ) such that V δ ( t k + 2 ) < V δ ( t k + 1 ) . For this, one could simply derive V δ ( t k + 1 ) and V δ ( t k + 2 ) as,
V δ ( t k + 1 ) = δ T ( t k ) e L ˜ i T T k P i e L ˜ i T k δ ( t k )
and,
V δ ( t k + 2 ) = δ T ( t k + 1 ) e L ˜ j T T k + 1 P j e L ˜ j T k + 1 δ ( t k + 1 ) .
Substituting δ ( t k + 1 ) = e L ˜ i T k δ ( t k ) in Equation (13), one could obtain,
V δ ( t k + 2 ) = δ T ( t k ) e L ˜ i T T k e L ˜ j T T k + 1 P j e L ˜ j T k + 1 e L ˜ i T k δ ( t k ) .
However, if
e L ˜ j T T k + 1 P j e L ˜ j T k + 1 < P i
or equivalently,
P j < e L ˜ j T T k + 1 P i e L ˜ j T k + 1
then V δ ( t k + 2 ) < V δ ( t k + 1 ) , or simply V ( t k + 2 ) < V ( t k + 1 ) , for all t k + 2 > t k + 1 , implying that V ˙ ( t ) < 0 , t > 0 , which further implies that δ ( t ) 0 , as t , or η i ( t ) η 0 , i N , as t .
This could always be possible even if L ˜ i = 0 or L ˜ j = 0 , which proves that there always exists positive symmetric matrices P 1 , P 2 , for all T 1 , T 2 , such that the Lyapunov function uniformly decays for all scenarios σ k , under the condition that a disconnection does not last infinitely, which completes the proof of the theorem. □

8. Simulations and Case Studies

The results derived in Section 7 can be validated by examining the LFC problem discussed in Figure 2, when the CPS is under time-delay attacks and multiple tele-metered variables such as Δ P i j , Λ i , Δ f j are simultaneously attacked by different random time-delays, and when Δ P d i is a random non-predictable bounded disturbance in the area load. To the best of the knowledge of this authors the above problem is yet a state-of-the-art open problem constituting an open challenge in the literature. The objective is to guarantee that | Δ P i j | 2 + | Δ f i | 2 0 for all bounded load variations Δ P d i , regardless of the time-delay cyberattacks. The time-delayed LFC equation for area S i can be represented by,
x ˙ i ( t ) = A i x i ( t ) + B i u i ( t ) + E CCS , i x CCS , i ( t τ CCS , i ) + D i w i ( t )
where x i = [ Δ f i , Δ P m i , Δ P v i , 0 , Δ P i j ] T is the state vector of the endogenous states in S i , x CCS , i = [ 0 , 0 , 0 , Λ i , 0 ] T is the vector of the exogenous states in S i from S CCS (i.e., the central control station CCS) as in Figure 1, and where,
A i = 1 / τ p i k p i / τ p i 0 0 k p i / τ p i 0 1 / τ c h i 1 / τ c h i 0 0 1 / R i τ g i 0 1 / τ g i 0 0 K i B i 0 0 0 K i 2 π T 1 0 0 0 2 π T 1 , E CCS , i = 0 0 0 0 0 0 0 0 0 0 0 0 0 1 τ g i 0 0 0 0 0 0 0 0 0 0 0 , B i = 0 0 1 / τ g i 0 0 , D i = k p i / τ p i 0 0 0 0 ,
and where w i = Δ P d i is a disturbance in the LFC representing the variations in the area load, and the renewable energies that contribute to the area power generation.
 Remark 5.
Clearly, in a real-time LFC without time-delays x i + x CCS , i is the state vector for S i as explained in outset of Section 5, and A i + E CCS , i is the state matrix of the LTI system.
  • Refer to the explanations provided prior to Definition 3 for details.
In the simulation results below, a relatively significant and sudden load change in Δ P d i ( ± 10 % of the nominal area load at time 0.1 s e c . and 0.8 s e c . , as per the dashed line Figure 6) that triggers swings in the power system which has to be contained automatically. Time-delay attacks (if present) are capable of inducing severe instability in the power system if not appropriately circumvented as shown by the thinner line in Figure 5, which depicts the variations in the area frequency Δ f i when resilient filters are not present.
The solid curve in Figure 5 illustrates the simulation results in the presence of cooperative filters (outlined in Figure 3), where all tele-metered signals were conditioned by h ( t ) before they were applied to the agents S o , S i . Corresponding to each exogenous state variable (i.e., Δ f i , Δ f j , Δ P i j , and Λ i ) a cooperative filter is deployed to recover time-delays in the signals. As a result, the instability in the power system can be maintained and the swings in the frequency in result to load variations are rapidly contained.
The thick line in Figure 6 depicts the ACE Λ i in response to a 10 % load variations Δ P d i ( t ) (the dashed line). The ACE is the control parameter telemetered by the CCS S o to all individual power generating units participating in the LFC. In the absence of a resilient filter mechanism, time-delay attacks on tele-communication links cause delayed inputs to CCS and delayed commands transmitted to the generating units.
This inflicts uncontrollable swings in the area power system that disseminates to the entire power system S as exemplified in 5. For the purpose of comparison, the time-delayed ACE signal Λ i ( t τ Λ i ) without deploying delay-resilient cooperative filters would be as in Figure 7. It is important to note that the CCS requires Δ P i j to be transmitted from S RTU S CCS (as explained in Figure 2), as well as Δ f i to be transmitted from S i S CCS , in order to compute Λ i according to Equation (3). Without employment of a time-delay resilient methodology, the delayed information Δ P i j ( t τ RTU , CCS ) and Δ f i ( t τ f i , CCS ) would cause instability in the CCS controlled which will be disseminated to S i , which indeed is the phenomenon taking place in our case studies. Clearly, being at S i it appears to be heuristically impossible to recover the real-time signal Λ i ( t ) from Λ i ( t τ Λ i ) , since the instability observed in S i stems from a delayed signal transmitted from S RTU S CCS . Consequently, recovery of Λ i ( t τ Λ i ) (while being at S i ) requires information that is clearly beyond the reach of S i . The significance of the proposed methodology in this paper would now become clear, as it has been possible to restore normality in the entire CPS without requirement of subsystem’s information, and only through the filtering of available signals at the subsystems.
Figure 8 depicts the electric signal to the governor servo-valve of the generator in S i in response to the disturbance Δ P d i in the area load. It is evident that the ± 10 % load change triggers a ± 10 % command to the servo-valve in order to compensate for the load, ensuring complete balance in the supply-demand, which expectedly guarantees that Δ f i 0 and Δ P i j 0 .
However, satisfactory functioning of the time-delay resilient LFC control scheme proposed in this paper strictly depends on the bandwidth of the tele-communication system and the speed of data transported between the system controllers, in comparison to the natural frequency of the system states. Figure 9 illustrates the importance of the tele-communication system bandwidth by comparing two scenarios. In the first scenario (thick line) a high bandwidth system is deployed, and in another attempt low bandwidth communication channels were being used. It is evident that inadequate bandwidth gives rise to instability in the power system (as depicted by the thin line in Figure 9).
Finally, Figure 10 is a general schematic of a part of an interconnected CPS with a random topology. It is assumed that the subsystems are transmitting equivalent reference signals to others, where each signal is subject to a random time-delay.
Figure 11 is the simulation result of the cooperative filters for five interconnected subsystems in a discrete-time framework. It is evident that the filters can track the real-time reference signal despite of the unknown time-delays within a time-duration T s .

9. Conclusion

Resiliency against time-delay and DoS cyberattacks on CPS, and in particular, the LFC problem in smart grids have been investigated in this paper. It has been shown that augmentation of the tele-communication receivers with certain cooperative filters that exchange their outputs with neighbouring filters (in a multi-agent system framework) can circumvent time-delay sabotage, without any modification to the systems internal controllers. In essence, the cooperative filters receive the time-delayed outputs of their neighbouring filters and augment this information with a locally derived conjecture of the real-time value of some exogenous state that is under time-delay cyberattack, to derive the true real-time value of the attacked state under question. The paper has also shown that finite-time denial of service (DoS) cyberattacks cannot distract the convergence of the cooperative filters and invalidate the results. Theoretical results of the proposed methodology has been examined through a case study in a simulation platform that involves a load frequency control problem in a multi-area power system. Complicated control problems such as random time-delays in the transportation of data packets in the LFC that normally elevate instability issues and severe frequency swings had been successfully contained through the proposed cooperative filtering scheme as a result of the simulation.

References

  1. Feng, G. Wen, and G. Hu, Distributed Secure Coordinated Control for Multiagent Systems under Strategic Attacks, IEEE Trans. Cybern., Vol. 47, No. 5, Pages 1273-1284, May 2017. [CrossRef]
  2. D. R. Ding, Z. D. Wang, D. W. C. Ho, and G. L. Wei, Observer Based Event-Triggering Consensus Control for Multiagent Systems with Lossy Sensors and Cyber-Attacks, IEEE Trans. Cybern., Vol. 47, No. 8, Pages 1936-1947, Aug. 2017. [CrossRef]
  3. A. Abdessameud, A. Tayebi, Cooperative Output Regulation of Linear Multi-Agent Systems with Communication Constraints, IEEE 55th Conference on Decision and Control (CDC), Las Vegas, USA, December 12-14, 2016.
  4. C. Deng, C. Wen, MAS Based Distributed Resilient Control for a Class of Cyber-Physical Systems With Communication Delays Under DoS Attacks, IEEE Transactions on Cybernetics, Early Access, March 2020. [CrossRef]
  5. S. Shahkar, K. Khorasani, A Resilient Control Against Time-Delay Switch and Denial of Service Cyber Attacks on Load Frequency Control of Distributed Power Systems, 4th IEEE Conference on Control Technology and Applications (CCTA 2020), Montréal, Canada, August 24-26, 2020.
  6. F. Guo, Q. Xu, C. Wen, L. Wang, P. Wang, Distributed Secondary Control for Power Allocation and Voltage Restoration in Islanded DC Micro-grids, IEEE Trans. Sustain. Energy, Vol. 9, No. 4, Pages 1857-1869, Oct. 2018. [CrossRef]
  7. S. E. Tuna, LQR-Based Coupling Gain for Synchronization of Linear Systems [Online]. Available: http://arxiv.org/abs/0801.3390.
  8. C. Ma, J. Zhang, Necessary and Sufficient Conditions for Consensusability of Linear Multi-Agent Systems, IEEE Transactions on Automatic Control, Vol. 55, No. 5, May 2010.
  9. M. Meng, L. Liu, G. Feng, Output Consensus for Heterogeneous Multiagent Systems with Markovian Switching Network Topologies, International Journal of Robust and Nonlinear Control, DOI: 10.1002/rnc.3918, Feb. 2018. [CrossRef]
  10. M. Meng, G. Xiao, C. Zhai, G. Li, Z. Wang, Distributed Consensus of Heterogeneous Multi-Agent Systems Subject to Switching Topologies and Delays, Journal of the Franklin Institute 357, 6899-6917, 2020. [CrossRef]
  11. D. Zhang, G. Feng, A New Switched System Approach to Leader-Follower Consensus of Heterogeneous Linear Multiagent Systems With DoS Attack, IEEE Transactions on Systems, Man, and Cybernetics: Systems, February 2019. [CrossRef]
  12. Z. Ahmed, M.M. Khan, M.A. Saeed, W. Zhang, Consensus Control of Multi-Agent Systems with Input and Communication Delay: A Frequency Domain Perspective, ISA Transactions 101, Pages 69-77, 2020. [CrossRef]
  13. T. Qi, L. Qiu, J. Chen, Fellow, MAS Consensus and Delay Limits Under Delayed Output Feedback, IEEE Transactions on Automatic Control, Vol. 62, No. 9, Sep. 2017. [CrossRef]
  14. J. C. Geromel, P. Colaneri, Stability and Stabilization of Continuous-Time Switched Linear Systems, SIAM J. Control Optimization, Vol. 45, No. 5, Pages 1915-1930, 2006. [CrossRef]
  15. M. Zhanga, A. Saberia, A. A. Stoorvogel, Synchronization in the Presence of Unknown, Nonuniform and Arbitrarily Large Communication Delay, European Journal of Control 38, Pages 63-72, 2017. [CrossRef]
  16. Z. Liu, D. Nojavanzadeh, A. Saberi, A. A. Stoorvogel, Scale-Free Collaborative Protocol Design for Output Synchronization of Heterogeneous Multi-Agent Systems With Nonuniform Communication Delays, IEEE Transactions on Network Science and Engineering, Vol. 9, No. 4, August 2022. [CrossRef]
  17. C. Wang, C. Wen, L. Guo, Adaptive Consensus Control for Nonlinear Multiagent Systems With Unknown Control Directions and Time-Varying Actuator Faults, IEEE Transactions on Automatic Control, Vol. 66, No. 9, September 2021. [CrossRef]
  18. S. Xiong, Z. Hou, L. Fan, Consensus Control of Unknown Nonlinear Discrete-Time Multi-Agent Systems with Nonuniform Time-Delays, IEEE 12th Data Driven Control and Learning Systems Conference, Xiangtan, China, May 12-14, 2023.
  19. L. Yuan, J. Li, Consensus of Discrete-Time Nonlinear Multiagent Systems Using Sliding Mode Control Based on Optimal Control, IEEE Access, Vol.10, 2022. [CrossRef]
  20. X. J. Peng, Y. He, Consensus of Multi-Agent Systems With Time-Varying Delays and Switching Topologies Based on Delay-Product-Type Functionals, IEEE Transactions on Cybernetics, Digital Object Identifier, 2022. [CrossRef]
  21. F. Sun, X. Wu, J. Kurths, W. Zhu, Group Consensus for Heterogeneous Multi-Agent Systems With Time Delays Based on Frequency Domain Approach, IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 53, No. 5, May 2023. [CrossRef]
  22. L. Solyman, A. Elbadawy, A. Meroth, Single Model Scheme Based Smith Predictor for the Mitigation of the Effects of Network Imperfections in Consensus Control of Multi Agent Systems, 10th International Conference on Control, Decision and Information Technologies (CoDIT), 2024.
  23. Z. Cheng, D. Yue, S. Hu, X. Xie, C. Huang, Detection-Based Weighted H-Infinity LFC for Multi-Area Power Systems under DoS Attacks, IET Control Theory Applications, Vol. 13, Issue 12, Pages 1909-1919, 2019.
  24. D.K. Panda, S. Das, S. Townley, Towards a More Renewable Energy Based LFC under Random Packet Transmissions and Delays with Stochastic Generation and Demand, IEEE Transactions on Automation Science and Engineering, http://hdl.handle.net/10871/124292, 2021.
  25. X. Zhao, Z. Ma, S. Li and S. Zou, Robust LFC of Power Systems With Wind Power Under Packet Losses and Communication Delays, in IEEE Journal on Emerging and Selected Topics in Circuits and Systems, Vol. 12, No. 1, Pages 135-148, March 2022. [CrossRef]
  26. X. C. Shangguan, C.K. Zhang, Y. Zhao, Resilient Load Frequency Control of Power Systems to Compensate Random Time Delays and Time-Delay Attacks, IEEE Transactions on Industrial Electronics, Vol. 70, No. 5, Pages 5115-5128, May 2023. [CrossRef]
  27. J. Yang, Q. Zhong, K. Shi, S. Zhong, Distributed Coordination LFC Approach for Interconnected Power Systems Under Detection and Compensation Mechanism Targeting DoS Attacks, IEEE Transactions on Industrial Informatics, Vol. 19, No. 11, Pages 11008-11018, Nov. 2023. [CrossRef]
  28. Y. Wang, Z. Wang, J. Gan, H. Zhang and R. Wang, Switched Observer-Based Adaptive Event-Triggered Load Frequency Control for Networked Power Systems Under Aperiodic DoS Attacks, IEEE Transactions on Smart Grid, Vol. 14, No. 6, Pages 4816-4826, Nov. 2023. [CrossRef]
  29. K. Karoui, F.B. Ftima, H.B. Ghezala, A Multi-Agent Framework for Anomalies Detection on Distributed Firewalls Using Data Mining Techniques, In: Cao, L. (eds) Data Mining and Multi-agent Integration, Springer, Boston, MA, 2009. [CrossRef]
  30. S. Shahkar, Cooperative Localization of Multi-Agent Autonomous Aerial Vehicle (AAV) Networks in Intelligent Transportation Systems, IEEE Open Journal of Intelligent Transportation Systems (OJITS), Digital Object Identifier, 2025. [CrossRef]
Figure 1. Block diagram of a frequency control mechanism for a generating station S i contributing the LFC in a multi-area power system. The solid lines are hard-wired measurements/commands that are presumably immune from cyberattacks (as they are confined in S i ), where the dashed lines represent tele-metered data that are subject to TDS/DoS cyberattacks. Borrowed from [5].
Figure 1. Block diagram of a frequency control mechanism for a generating station S i contributing the LFC in a multi-area power system. The solid lines are hard-wired measurements/commands that are presumably immune from cyberattacks (as they are confined in S i ), where the dashed lines represent tele-metered data that are subject to TDS/DoS cyberattacks. Borrowed from [5].
Preprints 167355 g001
Figure 2. Schematics of a LFC power system with three area generating stations S i , S j , S k and the Centralized Control Station S o . The CPS S in this figure can be represented as S = { S i S j S k S o S S S i j S S S j k } where S S S i j , S S S j k denote the two substations, each also considered as a subsystem of the CPS. The tele-communication system can be further regarded as a subsystem in a more comprehensive model. However, this is not considered in this paper. The CCS S o and the tele-communication system comprise the cyber part of the system that is responsible for the data collection and processing, and the power system comprises the physical part of the CPS. The Front-End Processors (FEPs) are electronic apparatus inside the CCS that transmit/receive tele-communication signals and demodulate the state variables. The Remote Terminal Unit (RTU) is a micro-scale FEP with a similar function located in every substation. Δ P i j is a system state whose sensor (i.e., current and voltage power transformers) is located in a substation, and whose instantaneous value is transmitted to the CCS through an RTU. The CCS receives all Δ P , Δ f , and computes Λ for individual generating stations.
Figure 2. Schematics of a LFC power system with three area generating stations S i , S j , S k and the Centralized Control Station S o . The CPS S in this figure can be represented as S = { S i S j S k S o S S S i j S S S j k } where S S S i j , S S S j k denote the two substations, each also considered as a subsystem of the CPS. The tele-communication system can be further regarded as a subsystem in a more comprehensive model. However, this is not considered in this paper. The CCS S o and the tele-communication system comprise the cyber part of the system that is responsible for the data collection and processing, and the power system comprises the physical part of the CPS. The Front-End Processors (FEPs) are electronic apparatus inside the CCS that transmit/receive tele-communication signals and demodulate the state variables. The Remote Terminal Unit (RTU) is a micro-scale FEP with a similar function located in every substation. Δ P i j is a system state whose sensor (i.e., current and voltage power transformers) is located in a substation, and whose instantaneous value is transmitted to the CCS through an RTU. The CCS receives all Δ P , Δ f , and computes Λ for individual generating stations.
Preprints 167355 g002
Figure 3. Schematics of a MAS time-delay resilient CPS, and the schematics of the cooperative filter h ( t ) . The agents in the MAS exchange information in order to recover a time-delayed state x o ( ) ( t ) S o . x o ( ) , i ( t ) = x o ( ) ( t τ o , i ) is the input of the filter in S i (if o N i , or can be any other conjecture available to S i which needs not be a correct estimate), and the output of the filter is x o ( ) , i ( t + Δ t ) , where Δ t > 0 is a small response time. It will be shown that lim Δ t T s x o ( ) , i ( t + Δ t ) = x o ( ) ( t ) , where T s is a negligible arbitrary settling time for the filter that will be controlled by the filter gain γ R + .
Figure 3. Schematics of a MAS time-delay resilient CPS, and the schematics of the cooperative filter h ( t ) . The agents in the MAS exchange information in order to recover a time-delayed state x o ( ) ( t ) S o . x o ( ) , i ( t ) = x o ( ) ( t τ o , i ) is the input of the filter in S i (if o N i , or can be any other conjecture available to S i which needs not be a correct estimate), and the output of the filter is x o ( ) , i ( t + Δ t ) , where Δ t > 0 is a small response time. It will be shown that lim Δ t T s x o ( ) , i ( t + Δ t ) = x o ( ) ( t ) , where T s is a negligible arbitrary settling time for the filter that will be controlled by the filter gain γ R + .
Preprints 167355 g003
Figure 5. Performance of the time-delay resilient filter. The thin line represents Δ f i in response to a + 10 % load variation in Δ P d i , at 0.1 s e c . and back to 0 at 0.8 s e c . , for the case where a conventional LFC is in operation. Perilous swings in the system frequency are clear when the telemetered data are attacked by sufficiently long time-delays, resulting in pervasive instability in the power system (thinner line). The same scenario is repeated when resilient cooperative filters are deployed (solid thicker line) which demonstrates stability and a satisfactory LFC control.
Figure 5. Performance of the time-delay resilient filter. The thin line represents Δ f i in response to a + 10 % load variation in Δ P d i , at 0.1 s e c . and back to 0 at 0.8 s e c . , for the case where a conventional LFC is in operation. Perilous swings in the system frequency are clear when the telemetered data are attacked by sufficiently long time-delays, resulting in pervasive instability in the power system (thinner line). The same scenario is repeated when resilient cooperative filters are deployed (solid thicker line) which demonstrates stability and a satisfactory LFC control.
Preprints 167355 g005
Figure 6. Variations in Λ i as a result of Δ P d i ( t ) .
Figure 6. Variations in Λ i as a result of Δ P d i ( t ) .
Preprints 167355 g006
Figure 7. Time-Delayed ACE signal Λ i transmitted from S CCO without the employment of a delay-resilient cooperative filter system, and as a result of a 10% load disturbance Δ P d i .
Figure 7. Time-Delayed ACE signal Λ i transmitted from S CCO without the employment of a delay-resilient cooperative filter system, and as a result of a 10% load disturbance Δ P d i .
Preprints 167355 g007
Figure 8. Adjustment of the servo-valve electric signal in response to the area load variations depicted in Figure 5.
Figure 8. Adjustment of the servo-valve electric signal in response to the area load variations depicted in Figure 5.
Preprints 167355 g008
Figure 9. Affect of the tele-communication bandwidth. Inadequate bandwidth in tele-communication channels result in marginal instability as depicted by the thin line.
Figure 9. Affect of the tele-communication bandwidth. Inadequate bandwidth in tele-communication channels result in marginal instability as depicted by the thin line.
Preprints 167355 g009
Figure 10. General architecture of a CPS, subject to adversarial time-delay cyberattacks. The exogenous states of the systems ( x i , x j , x k ) are transmitted to adjacent subsystems with unknown time-delay and the output of h ( t ) filters in each subsystem transmits the conditioned signal back to the source, hence, cooperative filters. The architecture shown in this figure results in time-delay resiliency in the CPS as demonstrated in Figure 11.
Figure 10. General architecture of a CPS, subject to adversarial time-delay cyberattacks. The exogenous states of the systems ( x i , x j , x k ) are transmitted to adjacent subsystems with unknown time-delay and the output of h ( t ) filters in each subsystem transmits the conditioned signal back to the source, hence, cooperative filters. The architecture shown in this figure results in time-delay resiliency in the CPS as demonstrated in Figure 11.
Preprints 167355 g010
Figure 11. A discrete-time network of five interconnected agents transmitting equivalent reference signals (shown by the asterisks) to adjacent subsystems. The tele-communication channels are randomly delayed and the output of the cooperative filters are shown by thinner lines for each subsystem. It is evident that the delayed signals follow the real-time reference signal in a time-duration T s that is dependent of the filter gain and the topology of the network.
Figure 11. A discrete-time network of five interconnected agents transmitting equivalent reference signals (shown by the asterisks) to adjacent subsystems. The tele-communication channels are randomly delayed and the output of the cooperative filters are shown by thinner lines for each subsystem. It is evident that the delayed signals follow the real-time reference signal in a time-duration T s that is dependent of the filter gain and the topology of the network.
Preprints 167355 g011
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated