Issue
Security and Safety
Volume 4, 2025
Security and Safety for Next Generation Industrial Systems
Article Number 2025007
Number of page(s) 16
Section Industrial Control
DOI https://doi.org/10.1051/sands/2025007
Published online 25 October 2025

© The Author(s) 2025. Published by EDP Sciences and China Science Publishing & Media Ltd.

Licence Creative CommonsThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

1. Introduction

The evolution of industrial cyber-physical system (ICPS) marks a paradigm shift in engineering infrastructure, propelled by the synergistic integration of computational intelligence, control theory, and advanced communication paradigms [1]. Architecturally, these systems are hierarchically organized into three functional layers: the physical layer, encompassing operational entities ranging from power generation facilities to autonomous maritime systems; the application layer, which includes cyber systems such as supervisory control and data acquisition systems for information processing and decision-making; and the communication layer, which orchestrates the bidirectional flow of operational data and control directives. This interconnected architecture establishes a robust framework for seamless interaction between physical processes and cyber-based decision-making mechanisms. As a class of advanced systems, ICPS embodies structural complexity that necessitates interdisciplinary knowledge fusion across heterogeneous domains [2].

The integration of cutting-edge communication technologies has substantially increased the capabilities of cyber systems in achieving accurate data collection and optimizing decision-making processes, thus markedly increasing the operational efficiency of ICPS. Owing to their profound benefits, ICPS is increasingly recognized as a fundamental cornerstone in advancing critical infrastructure, fostering smart manufacturing initiatives, and driving the transition toward a green economy, among other pivotal applications. In summary, ICPS represents a key technological cornerstone of Industry 5.0, serving as an essential enabler to realize its overarching vision [3]. To date, ICPS has demonstrated extensive applicability across diverse domains, including healthcare and medical technologies, smart grid infrastructure, and intelligent transportation networks. These implementations have not only significantly enhanced quality of life but have also generated substantial economic value across multiple sectors. Among these applications, cyber-physical microgrids, as a paradigmatic example of ICPS, have garnered significant attention from both industrial and academic communities due to their capability to flexibly integrate various renewable energy sources, thereby substantially reducing carbon emissions [4].

The widespread implementation of open communication architectures in cyber-physical microgrid systems has been predominantly motivated by their operational efficiency and cost-effectiveness. Nevertheless, despite offering substantial economic benefits and enhanced deployment scalability, these public networks fundamentally expose critical infrastructure to advanced cyber vulnerabilities. Contemporary research [57] has documented a significant surge in cyber-security incidents targeting ICPS, with particular emphasis on cyber-physical DC microgrid, raising substantial concerns regarding societal resilience and infrastructure security [4]. When compared to their AC counterparts, DC microgrids demonstrate superior performance in power transmission efficiency while requiring lower investment in metering infrastructure and control units. This emerging threat landscape has been vividly illustrated through numerous critical infrastructure compromises of notable significance. In 2015, a sophisticated coordinated attack compromised Ukraine’s power grid, causing widespread blackouts and substantial infrastructure damage [8]. The following year witnessed the successful infiltration of a 200 MW generation facility in Kiev, resulting in its complete operational disruption [9]. More recently, in 2020, Venezuela’s national grid experienced a targeted assault on 765 trunk lines, affecting power supply across multiple regions. These consecutive security breaches highlight the imperative for implementing a defense strategy to ensure the operational continuity of cyber-physical microgrids.

Denial-of-Service (DoS) attacks primarily degrade network performance by drastically diminishing packet acceptance rates [10]. In contrast, false data injection (FDI) attacks pose a more intricate threat to data integrity through advanced manipulation techniques [11], rendering them inherently more difficult to detect. Building upon existing classical attack strategies, a variety of intelligent attack schemes have been successively proposed. For instance, in [12], an optimal DoS attack scheduling was designed to maximize the disruption of remote estimator performance. In [13], a critical data-based attack strategy combined with a stochastic energy allocation scheme was developed to degrade system performance. Beyond DoS attacks, more covert FDI attacks have also been constructed. For example, in [6], a dynamic feedback-based method was employed to design an optimal FDI attack aimed at maximizing output error. In [14], a zero-trace stealth attack was devised to compromise the operation of DC microgrids.

Currently, detection methodologies for FDI attacks can be fundamentally classified into two paradigms: analytical model-dependent solutions and data-driven learning methodologies. For instance, Euclidean distance was employed as a metric to quantify the variation in voltage signals and combined with pre-designed thresholds to detect attacks [15]. In [16], an interval observer was tailored for smart grid, capable of generating both upper and lower bounds for state estimation, and then determining whether an attack occurs based on whether the true state is within these bounds. In [17], a summation-based detector was proposed to identify FDI attacks, leveraging historical information to significantly enhance detection accuracy. Unlike the aforementioned model-based detection schemes, which rely on precise system models, the core concept of data-driven learning approaches lies in leveraging collected data to uncover underlying patterns and construct a detection model capable of distinguishing between normal and anomalous data. Specifically, in [18], a distributed support vector machine was implemented to detect stealthy FDI attacks in smart grids, employing principal component analysis for dimensionality reduction to mitigate computational complexity. In [19], a semi-supervised learning algorithm rooted in generative adversarial networks was utilized to train the model and infer the data distribution from samples, thereby distinguishing between attacked and normal states in the smart grid. Based on the aforementioned analysis, existing detection strategies may fail when confronted with coordinated attack tactics and struggle to adapt to the dynamic insertion or removal of subsystems.

This paper aims to construct an effective detection framework targeting collusive stealthy attacks in cyber-physical microgrids, with the following key contributions: (1) an ℒ unknown input observer (UIO) is established at the control center to monitor DGU communication links relying solely on local data; (2) systematic analysis of UIO vulnerability enables the design of collusive stealthy attacks that disrupt microgrid operations while evading detection by the ℒ UIO-based detection mechanism. Unlike conventional unobservable attacks [20], the proposed attack strategy conceals the attack signal as an unknown input and implements it in a collaborative manner; (3) dynamic encoding embedded within DGUs communication channels are proposed to expose the collusive stealthy attack, with geometric control theory deriving feasibility conditions for the encoding matrix.

Thumbnail: Figure 1. Refer to the following caption and surrounding text. Figure 1.

The overall architecture diagram of cyber-physical microgrid

2. Model of cyber-physical microgrids

This article investigates a cyber-physical microgrid encompassing M interconnected distributed generation units (DGUs), as shown in Figure 1. Each DGU is equipped with a DC voltage source, an RLC filter, a local controller, a load, and a buck converter. The physical power network of microgrids can be represented as a weighted undirected connected graph 𝒢p = (𝒱p, ℰp, 𝒲p). In this graph, the vertex set 𝒱p = {1, 2, …, M} stands for DGUs. The edge set ℰp ⊆ 𝒱p × 𝒱p signifies the distribution lines that connect neighboring DGUs. The adjacency matrix W p = [ w ij p ] M × M Mathematical equation: $ {\mathscr{W}^{p}}=[w^{p}_{ij}]_{M\times M} $ has nonnegative elements w ij p Mathematical equation: $ w^{p}_{ij} $ (∀(i, j)∈ℰp). Let 𝒩i p = {j ∈ 𝒱p|(i, j)∈ℰp} denote the set of coupled neighboring units for DGU i. Moreover, the communication topology of the cyber layer, denoted as 𝒢c = (𝒱c, ℰc, 𝒲c), shares identical structural configuration and edge weight assignments with graph 𝒢p.

The dynamic behavior of DGU i is governed by the following differential equations derived through the systematic application of Kirchhoff’s voltage and current laws:

d V i ( t ) dt = 1 C ti I ti ( t ) + j N i p 1 C ti I ij ( t ) 1 C ti I Li ( t ) , d I ti ( t ) dt = 1 L ti V ti ( t ) 1 L ti V i ( t ) R ti L ti I ti ( t ) , Mathematical equation: $$ \begin{aligned} \begin{aligned} \frac{d{V}_i(t)}{dt}&= \frac{1}{C_{ti}}I_{ti}(t) +\sum _{j \in \fancyscript {N}_i^{p}}\frac{1}{C_{ti}}I_{ij}(t) - \frac{1}{C_{ti}}I_{Li}(t), \\ \frac{dI_{ti}(t)}{dt}&= \frac{1}{L_{ti}}V_{ti}(t)-\frac{1}{L_{ti}}V_{i}(t)-\frac{R_{ti}}{L_{ti}}I_{ti}(t),\\ \end{aligned} \end{aligned} $$(1)

where I ti(t), L ti, C ti, and R ti denote the current, inductance, capacitance, and resistance, respectively. V i(t) and V ti(t) correspond to the voltage at the ith point of common coupling (PCC) and the output voltage of the ith buck converter. As for the current flowing through the distribution line ij, modeled as an RL network, it is represented by I ij(t) and satisfies:

d I ij ( t ) dt = R ij L ij I ij ( t ) + 1 L ij V j ( t ) 1 L ij V i ( t ) , Mathematical equation: $$ \begin{aligned} \frac{dI_{ij}(t)}{dt}= -\frac{R_{ij}}{L_{ij}}I_{ij}(t)+\frac{1}{L_{ij}}V_{j}(t)-\frac{1}{L_{ij}}V_{i}(t), \end{aligned} $$(2)

where L ij and R ij respectively indicate the distribution line ij’s inductance and resistance. In Equation (2), the current I ij(t) can be approximately regarded as V j ( t ) V i ( t ) R ij Mathematical equation: $ \frac{V_j(t)-V_i(t)}{R_{ij}} $ when assuming the quasi-static linear approximation, with V j(t) denoting the voltage of the jth PCC.

Figure 1 depicts that each DGU is equipped with a local primary controller, ensuring the voltage V i(t) at the PCC follows the desired reference voltage V i re ( t ) Mathematical equation: $ V_{i}^{re}(t) $. To enhance voltage tracking precision, an integral compensation component is embedded in the DGU architecture, expressed mathematically as:

v ˙ i ( t ) = e i v ( t ) = V i re ( t ) u ¯ i ( t ) V i ( t ) , Mathematical equation: $$ \begin{aligned} \dot{v}_i(t)=e_{i}^{v}(t)=V_{i}^{re}(t)-\bar{u}_{i}(t)-V_i(t), \end{aligned} $$(3)

where e i v ( t ) Mathematical equation: $ e_{i}^{v}(t) $ denotes the voltage tracking error, v i(t) corresponds to its integral term, and u ¯ i ( t ) Mathematical equation: $ \bar{u}_{i}(t) $ defines the secondary control input, aimed at achieving voltage balancing and current sharing. Thus, the augmented dynamical model for DGU i is formulated as:

{ x ˙ i ( t ) = A ii x i ( t ) + B ~ i u ~ i ( t ) + B ¯ i u ¯ i ( t ) + B i u i ( t ) + j N i p A ij ( x j ( t ) x i ( t ) ) + ξ i 1 ( t ) , y i ( t ) = C i x i ( t ) + ξ i 2 ( t ) , Mathematical equation: $$ \begin{aligned} \left\{ \begin{aligned} \dot{x}_{i}(t)&= A_{ii}x_{i}(t)+\tilde{B}_{i}\tilde{u}_{i}(t)+\bar{B}_{i}\bar{u}_{i}(t)+\vec{B}_{i}\vec{u}_{i}(t)+\sum _{j \in \fancyscript {N}_i^{p}}A_{ij}(x_{j}(t)-x_{i}(t))+\xi _{i}^{1}(t),\\ y_{i}(t)&= C_{i}x_{i}(t)+\xi _{i}^{2}(t), \end{aligned}\right. \end{aligned} $$(4)

where x i(t)=[V i(t),I ti(t),v i(t)]T ∈ ℝ3 stands for the state, y i(t)∈ℝ3 represents the measurement output, C i ∈ ℝ3 × 3 is identity matrix, other associated matrices are derived as follows:

A ii = [ 0 1 C ti 0 [ 4 p t ] 1 L ti R ti L ti 0 1 0 0 ] , A ij = [ 1 C ti R ij 0 0 0 0 0 0 0 0 ] , B ~ i = [ 0 1 L ti 0 ] , B ¯ i = [ 0 0 1 ] , B i = [ 1 C ti 0 0 0 0 1 ] . Mathematical equation: $$ \begin{aligned} \begin{aligned} A_{ii} =\left[ \begin{array}{ccc} 0&\frac{1}{C_{ti}}&0 \\ [4pt] -\frac{1}{L_{ti}}&-\frac{R_{ti}}{L_{ti}}&0 \\ -1&0&0 \\ \end{array} \right], A_{ij} =\left[ \begin{array}{ccc} \frac{1}{C_{ti}R_{ij}}&0&0\\ 0&0&0 \\ 0&0&0 \end{array} \right], \tilde{B}_{i} =\left[ \begin{array}{c} 0 \\ \frac{1}{L_{ti}} \\ 0 \\ \end{array} \right], \bar{B}_{i} =\left[ \begin{array}{c} 0 \\ 0 \\ 1 \\ \end{array} \right], \vec{B}_{i} =\left[ \begin{array}{cc} - \frac{1}{C_{ti}}&0\\ 0&0\\ 0&1\\ \end{array} \right]. \end{aligned} \end{aligned} $$

Furthermore, u i ( t ) = [ I li ( t ) , V i re ( t ) ] T R 2 Mathematical equation: $ \vec{u}_{i}(t)=[I_{li}(t),V_{i}^{re}(t)]^T \in \mathbb{R}^{2} $ represents the exogenous input, while u ~ i ( t ) = V ti ( t ) = K i T y i ( t ) R Mathematical equation: $ \tilde{u}_{i}(t)=V_{ti}(t)=K_i^{T}y_{i}(t) \in \mathbb{R} $ is the primary control input with K i ∈ ℝ3 denoting the vector of primary control gains. A consensus-based coordination protocol is implemented to synthesize the secondary control signal u ¯ i ( t ) Mathematical equation: $ \bar{u}_{i}(t) $, governed by

u ¯ ˙ i ( t ) = [ 0 , k i , 0 ] j N i c w ij c ( y i ( t ) I ti s y i , j ( t ) I tj s ) , Mathematical equation: $$ \begin{aligned} \dot{\bar{u}}_{i}(t) = [0,k_i,0]\sum _{j \in \fancyscript {N}_i^{c}}{w_{ij}^c\left(\frac{y_{i}(t)}{I_{ti}^{s}}-\frac{y_{i,j}(t)}{I_{tj}^{s}}\right)}, \end{aligned} $$(5)

where k i >  0 represents weight parameter, I ti s > 0 Mathematical equation: $ I_{ti}^{s} > 0 $ and I tj s > 0 Mathematical equation: $ I_{tj}^{s} > 0 $ represent current proportional parameters for DGU i and DGU j, y i, j(t) represents the output of DGU j transmitted to DGU i. Without loss of generality, assume that the disturbance ξ i 1 ( t ) Mathematical equation: $ \xi_{i}^{1}(t) $, measurement noise ξ i 2 ( t ) Mathematical equation: $ \xi_{i}^{2}(t) $, and ξ ˙ i 2 ( t ) Mathematical equation: $ \dot{\xi}_{i}^{2}(t) $ are amplitude bounded, i.e., | | ξ i 1 ( t ) | | = sup t R | | ξ i 1 ( t ) | | < Mathematical equation: $ ||\xi_{i}^{1}(t)||_{\infty}=\sup_{t \in \mathbb{R}}||\xi_{i}^{1}(t)|| < \infty $, | | ξ i 2 ( t ) | | = sup t R | | ξ i 2 ( t ) | | < Mathematical equation: $ ||\xi_{i}^{2}(t)||_{\infty}=\sup_{t \in \mathbb{R}}||\xi_{i}^{2}(t)|| < \infty $, and | | ξ ˙ i 2 ( t ) | | = sup t R | | ξ ˙ i 2 ( t ) | | < Mathematical equation: $ ||\dot{\xi}_{i}^{2}(t)||_{\infty}=\sup_{t \in \mathbb{R}}||\dot{\xi}_{i}^{2}(t)|| < \infty $, where ||⋆|| and ||⋆|| represents the ℒ norm and Euclidean norm, respectively.

3. Collusive stealthy attack mechanism

In light of the vulnerabilities, large-scale characteristics, and inherent uncertainties of cyber-physical microgrids, this section presents a detection scheme based on the ℒ UIO for identifying communication link risks between DGUs. Additionally, a novel of collusive stealthy attack is proposed to bypass current defense mechanisms.

3.1. ℒ UIO-based countermeasure

As illustrated in Figure 1 and the consensus scheme Equation (5), the secondary control of DGU i requires the measured outputs transmitted from neighboring DGU j. Malicious adversaries could exploit inherent vulnerabilities in communication channels to execute cyber intrusions, deliberately falsifying transmitted data and compromising information integrity. This adversarial manipulation directly impacts secondary control inputs, ultimately undermining system performance. In general, such attacks mainly disrupt the integrity of data through the replacement or modification of critical parameters [4]. The FDI attack between the communication link of DGU i and DGU j can be modeled as:

y i , j re ( t ) = y j ( t ) + χ j ( t t j s ) y i , j a ( t ) , Mathematical equation: $$ \begin{aligned} y_{i,j}^{re}(t)=y_j(t)+\chi _{j}(t-t_{j}^{s})y_{i,j}^{a}(t), \end{aligned} $$(6)

where y i , j re ( t ) Mathematical equation: $ y_{i,j}^{re}(t) $, t j s Mathematical equation: $ t_{j}^{s} $, χ i(⋅), and y i , j a ( t ) Mathematical equation: $ y_{i,j}^{a}(t) $, denotes the actual measurement received by DGU i, the attack initiation time instant, time-delayed step function characterized by t j s Mathematical equation: $ t_{j}^{s} $, and attack signals, respectively.

The implementation of a distributed detection framework is essential for addressing the vulnerability of microgrids to cascading failures induced by cyber-attack propagation. This architecture facilitates concurrent monitoring of DGUs, ensuring prompt identification and containment of compromised components. Cyber-physical microgrids inherently comprise interconnected subsystems characterized by dual-layer coupling: physical layer interactions governed by power flow dynamics and cyber layer communications mediated through network protocols and control architectures [14]. To establish independent state estimation without relying on global system data, a dedicated ℒ UIO is deployed for each communication channel, effectively treating inter-subsystem connections and secondary control inputs as unknown inputs. The observer embedded in DGU i produces the state estimation x ̂ i , j o ( t ) Mathematical equation: $ \hat{x}_{i,j}^{o}\left( t \right) $ of DGU j, formally expressed as:

{ z ˙ i , j o ( t ) = F j o z i , j o ( t ) + T j o B j u i , j re ( t ) + K j o y i , j re ( t ) , x ̂ i , j o ( t ) = z i , j o ( t ) + H j o y i , j re ( t ) , Mathematical equation: $$ \begin{aligned} \left\{ \begin{aligned} \dot{z}_{i,j}^{o}(t)&= F_{j}^{o}z_{i,j}^{o}(t)+T_{j}^{o}\vec{B}_{j}\vec{u}_{i,j}^{re}(t)+K_{j}^{o}y_{i,j}^{re}(t),\\ \hat{x}_{i,j}^{o}(t)&= z_{i,j}^{o}(t)+H_{j}^{o}y_{i,j}^{re}(t), \end{aligned}\right. \end{aligned} $$(7)

where F j o R 3 × 3 Mathematical equation: $ F_{j}^{o} \in \mathbb{R}^ {3\times3} $, T j o R 3 × 3 Mathematical equation: $ T_{j}^{o}\in \mathbb{R}^ {3\times3} $, K j o R 3 × 3 Mathematical equation: $ K_{j}^{o}\in \mathbb{R}^ {3\times3} $, and H j o R 3 × 3 Mathematical equation: $ H_{j}^{o}\in \mathbb{R}^ {3\times3} $ are the UIOi, j gain matrices, z i , j o ( t ) R 3 Mathematical equation: $ z_{i,j}^{o}(t) \in \mathbb{R}^3 $ is the state of UIOi, j, u i , j ( t ) Mathematical equation: $ \vec{u}_{i,j}(t) $ represents the input of DGU j transmitted to DGU i. The asymptotic convergence of x ̂ i , j o ( t ) Mathematical equation: $ \hat{x}_{i,j}^{o}(t) $ toward x j(t) is guaranteed under the dual conditions [21].

(1) rank( C j F j o Mathematical equation: $ C_{j}\mathbb{F}_{j}^{o} $) = rank( F j o Mathematical equation: $ \mathbb{F}_{j}^{o} $), where F j o d ¯ j ( t ) = B ¯ j u ¯ j ( t ) + k N j e A jk ( x k ( t ) x j ( t ) ) Mathematical equation: $ \mathbb{F}_{j}^{o}\bar{d}_{j}(t)=\bar{B}_{j}\bar{u}_{j}(t)+\sum_{k \in \mathscr {N}_j^{e}}A_{jk}(x_{k}(t)-x_{j}(t)) $, and d ¯ j ( t ) Mathematical equation: $ \bar{d}_{j}(t) $ denotes the unknown inputs of the UIOi, j.

(2) The pair ( C j , A jj o Mathematical equation: $ C_{j},A_{jj}^{o} $) is detectable, where A jj o = A ¯ jj H j o C j A ¯ jj Mathematical equation: $ A_{jj}^{o} = \bar{A}_{jj}-H_{j}^{o}C_{j}\bar{A}_{jj} $ and A ¯ jj = A jj + B ~ j K j T C j Mathematical equation: $ \bar{A}_{jj} =A_{jj}+\tilde{B}_{j}K_j^{T}C_j $.

Then, decompose K j o Mathematical equation: $ K_{j}^{o} $ into K j o = K ~ j o + K ˇ j o Mathematical equation: $ K_{j}^{o} = \tilde{K}_{j}^{o} + \check{K}_{j}^{o} $ and determine the UIOi, j gain matrices F j o Mathematical equation: $ F_{j}^{o} $, T j o Mathematical equation: $ T_{j}^{o} $, K j o Mathematical equation: $ K_{j}^{o} $, and H j o Mathematical equation: $ H_{j}^{o} $ based on the following conditions:

0 = H j o C j F j o F j o , Mathematical equation: $$ \begin{aligned}&0= H_{j}^{o}C_{j}\mathbb{F} _{j}^{o}-\mathbb{F} _{j}^{o},\end{aligned} $$(8a)

T j o = I j H j o C j , Mathematical equation: $$ \begin{aligned}&T_{j}^{o}= I_{j}-H_{j}^{o}C_{j},\end{aligned} $$(8b)

F j o = A jj o K ~ j o C j ( Hurwitz ) , Mathematical equation: $$ \begin{aligned}&F_{j}^{o}= A_{jj}^{o}-\tilde{K}_{j}^{o}C_{j} ~(\text{ Hurwitz}),\end{aligned} $$(8c)

K ˇ j o = F j o H j o . Mathematical equation: $$ \begin{aligned}&\check{K}_{j}^{o}= F_{j}^{o}H_{j}^{o}. \end{aligned} $$(8d)

where I j ∈ ℝ3 × 3 is the identity matrix. The estimation error of UIOi, j is defined as e ij o ( t ) = x j ( t ) x ̂ i , j o ( t ) Mathematical equation: $ e^o_{ij}(t)=x_j(t)-\hat{x}_{i,j}^{o}(t) $. Combining Equations (4), (7), and (8a)–(8d), yields its dynamics:

e ˙ i , j o ( t ) = F j o e i , j o ( t ) + T j o ξ j 1 ( t ) H j o ξ ˙ j 2 ( t ) K ¯ j o ξ j 2 ( t ) . Mathematical equation: $$ \begin{aligned} \dot{e}_{i,j}^{o}(t)=F_{j}^{o}e_{i,j}^{o}(t)+T_{j}^{o}\xi _{j}^{1}(t)-H_{j}^{o}\dot{\xi }_{j}^{2}(t)-\bar{K}_{j}^{o}\xi _{j}^{2}(t). \end{aligned} $$(9)

It is evident that the estimation error e i , j o ( t ) Mathematical equation: $ e_{i,j}^{o}(t) $ is independent of neighboring states; however, its complete decoupling from the disturbance ξ i 1 ( t ) Mathematical equation: $ \xi_{i}^{1}(t) $ and measurement noise ξ i 2 ( t ) Mathematical equation: $ \xi_{i}^{2}(t) $ has not yet been achieved. To improve the robustness of the UIOi, j, a performance output associated with e i , j o ( t ) Mathematical equation: $ e_{i,j}^{o}(t) $ is defined as z i , j o ( t ) = C j e i , j o ( t ) Mathematical equation: $ z_{i,j}^{o}(t)=C_je_{i,j}^{o}(t) $. The designed observer gain is expected to ensure that the error system described by Equation (9), with performance output z i , j o ( t ) Mathematical equation: $ z_{i,j}^{o}(t) $, achieves global uniform ℒ stability with a performance index γ j, satisfying the following conditions [22].

(1) The zero-input dynamics of the system Equation (9) (with ξ j 1 ( t ) ξ j 2 ( t ) ξ ˙ j 2 ( t ) 0 Mathematical equation: $ \xi_{j}^{1}(t)\equiv\xi_{j}^{2}(t)\equiv\dot{\xi}_{j}^{2}(t)\equiv0 $) exhibits global uniform exponential stability concerning the origin.

(2) Given an arbitrary initial condition e i , j o ( t 0 ) = e i , j o 0 Mathematical equation: $ e_{i,j}^{o}(t_0)={e_{i,j}^{o}}_0 $ and bounded exogenous input ξ j 1 ( t ) Mathematical equation: $ \xi_{j}^{1}(t) $, ξ j 2 ( t ) Mathematical equation: $ \xi_{j}^{2}(t) $, and ξ ˙ j 2 ( t ) Mathematical equation: $ \dot{\xi}_{j}^{2}(t) $, a finite bound δ j ( e i , j o 0 , | | T j o ξ j 1 ( · ) | | , | | ξ j 2 ( · ) | | , | | H j o ξ ˙ j 2 ( t ) | | ) Mathematical equation: $ \delta_j({e_{i,j}^{o}}_0, ||T_{j}^{o}\xi_{j}^{1}(\cdot)||_{\infty}, ||\xi_{j}^{2}(\cdot)||_{\infty}, ||H_{j}^{o}\dot{\xi}_{j}^{2}(t)||_{\infty}) $ can be determined such that

| | e i , j o ( t ) | | δ j ( e i , j o 0 , | | T j o ξ j 1 ( · ) | | , | | ξ j 2 ( · ) | | , | | H j o ξ ˙ j 2 ( t ) | | ) , t t 0 . Mathematical equation: $$ \begin{aligned} ||e_{i,j}^{o}(t)||\le \delta _j({e_{i,j}^{o}}_0, ||T_{j}^{o}\xi _{j}^{1}(\cdot )||_{\infty }, ||\xi _{j}^{2}(\cdot )||_{\infty }, ||H_{j}^{o}\dot{\xi }_{j}^{2}(t)||_{\infty }), \forall t\ge t_0. \end{aligned} $$(10)

(3) Given zero initial condition e i , j o ( t 0 ) = 0 Mathematical equation: $ e_{i,j}^{o}(t_0)=0 $ and bounded exogenous input ξ j 1 ( t ) Mathematical equation: $ \xi_{j}^{1}(t) $, ξ j 2 ( t ) Mathematical equation: $ \xi_{j}^{2}(t) $, and ξ ˙ j 2 ( t ) Mathematical equation: $ \dot{\xi}_{j}^{2}(t) $, the following holds:

| | z i , j o ( t ) | | γ j ( | | T j o ξ j 1 ( · ) | | + | | ξ j 2 ( · ) | | + | | H j o ξ ˙ j 2 ( t ) | | ) , t t 0 . Mathematical equation: $$ \begin{aligned} ||z_{i,j}^{o}(t)||\le \gamma _j(||T_{j}^{o}\xi _{j}^{1}(\cdot )||_{\infty }+ ||\xi _{j}^{2}(\cdot )||_{\infty }+||H_{j}^{o}\dot{\xi }_{j}^{2}(t)||_{\infty }), \forall t\ge t_0. \end{aligned} $$(11)

(4) Given an arbitrary initial condition e i , j o ( t 0 ) = e i , j o 0 Mathematical equation: $ e_{i,j}^{o}(t_0)={e_{i,j}^{o}}_0 $ and bounded exogenous input ξ j 1 ( t ) Mathematical equation: $ \xi_{j}^{1}(t) $, ξ j 2 ( t ) Mathematical equation: $ \xi_{j}^{2}(t) $, and ξ ˙ j 2 ( t ) Mathematical equation: $ \dot{\xi}_{j}^{2}(t) $, the following holds:

lim sup t | | z i , j o ( t ) | | γ j ( | | T j o ξ j 1 ( · ) | | + | | ξ j 2 ( · ) | | + | | H j o ξ ˙ j 2 ( t ) | | ) . Mathematical equation: $$ \begin{aligned} \limsup _{t\rightarrow \infty }||z_{i,j}^{o}(t)||\le \gamma _j(||T_{j}^{o}\xi _{j}^{1}(\cdot )||_{\infty }+ ||\xi _{j}^{2}(\cdot )||_{\infty }+||H_{j}^{o}\dot{\xi }_{j}^{2}(t)||_{\infty }). \end{aligned} $$(12)

To ensure that the UIOi, j achieves the desired ℒ performance, the following theorem presents the conditions that its gain needs to satisfy, along with the method for solving the observer gain.

Theorem 1

For the monitoring center of DGU i with UIOi, j Equation (7), providing observer gains F j o Mathematical equation: $ F_{j}^{o} $, T j o Mathematical equation: $ T_{j}^{o} $, K j o Mathematical equation: $ K_{j}^{o} $, and H j o Mathematical equation: $ H_{j}^{o} $ satisfy conditions Equations (8a)–(8d), and there exist matrix S j o R 3 × 3 Mathematical equation: $ S_{j}^{o}\in \mathbb{R}^ {3\times3} $, P j o R 3 × 3 Mathematical equation: $ P_{j}^{o}\in \mathbb{R}^ {3\times3} $ and P j o = P j o T > 0 Mathematical equation: $ P_{j}^{o} =P_{j}^{{o}^{T}} > 0 $, positive scalar α j o >  0, ν j 1 >  0, and ν j 2 >  0 such that the following inequality holds:

Υ j o = [ Υ ¯ j o P j o S j o P j o 2 α j o ν j 1 I j 0 0 2 α j o ν j 1 I j 0 2 α j o ν j 1 I j ] 0 , Mathematical equation: $$ \begin{aligned} \Upsilon _{j}^{o}&= \left[ \begin{array}{cccc} \bar{\Upsilon }_{j}^{o}&P_{j}^{o}&-S_{j}^{o}&P_{j}^{o}\\ *&-2\alpha _j^o\nu _j^1I_{j}&0&0\\ *&*&-2\alpha _j^o\nu _j^1I_{j}&0\\ *&*&*&-2\alpha _j^o\nu _j^1I_{j} \end{array} \right] \le 0, \end{aligned} $$(13)

Ψ j 0 = [ P j o C j T ν j 2 I j ] 0 , Mathematical equation: $$ \begin{aligned} \Psi _{j}^{0}&= \left[ \begin{array}{cc} P_{j}^{o}&C_{j}^T\\ *&\nu _j^2I_{j} \end{array} \right] \ge 0, \end{aligned} $$(14)

where Υ ¯ j o = 2 α j o P j o + P j o A jj o + A jj o T P j o S j o C j C j T S j o T Mathematical equation: $ \bar{\Upsilon}_{j}^{o}=2\alpha_j^oP_{j}^{o}+P_{j}^{o}A_{jj}^{o}+{A_{jj}^{o}}^TP_{j}^{o}-S_{j}^{o}C_{j}-C_{j}^T{S_{j}^{o}}^T $, then the estimation error dynamics Equation (9) of the UIOi, j is globally uniformly ℒ stable with a performance index γ j = ν j 1 ν j 2 Mathematical equation: $ \gamma_j=\sqrt{\nu_j^1\nu_j^2} $ and observer gain K ~ j o = P j o 1 S j o Mathematical equation: $ \tilde{K}_{j}^{o}={P_{j}^{o}}^{-1}S_{j}^{o} $.

Proof:

Define a Lyapunov function as follows:

V j o ( t ) = e i , j o ( t ) T P j o e i , j o ( t ) . Mathematical equation: $$ \begin{aligned} V^{o}_j(t)=e_{i,j}^{o}(t)^TP_{j}^{o}e_{i,j}^{o}(t). \end{aligned} $$(15)

Let λ max ( P j o ) Mathematical equation: $ \lambda_{\mathrm{max}}(P_{j}^{o}) $ and λ min ( P j o ) Mathematical equation: $ \lambda_{\mathrm{min}}(P_{j}^{o}) $ denote the maximum and minimum eigenvalues of P j o Mathematical equation: $ P_{j}^{o} $, respectively. Then, from Equation (15), we have

λ min ( P j o ) | | e i , j o ( t ) | | V j o ( t ) λ max ( P j o ) | | e i , j o ( t ) | | . Mathematical equation: $$ \begin{aligned} \lambda _{\mathrm{min}}(P_{j}^{o}) ||e_{i,j}^{o}(t)|| \le V^{o}_j(t)\le \lambda _{\mathrm{max}}(P_{j}^{o})||e_{i,j}^{o}(t)||. \end{aligned} $$(16)

The time derivative of V j o(t) is given by

V ˙ j o ( t ) = 2 e i , j o ( t ) T P j o ( A jj o e i , j o ( t ) K ~ j o C j + T j o ξ j 1 ( t ) H j o ξ ˙ j 2 ( t ) K ¯ j o ξ j 2 ( t ) ) . Mathematical equation: $$ \begin{aligned} \dot{V}^{o}_j(t)=2e_{i,j}^{o}(t)^TP_{j}^{o}(A_{jj}^{o}e_{i,j}^{o}(t)-\tilde{K}_{j}^{o}C_{j}+T_{j}^{o}\xi _{j}^{1}(t)-H_{j}^{o}\dot{\xi }_{j}^{2}(t)-\bar{K}_{j}^{o}\xi _{j}^{2}(t)). \end{aligned} $$(17)

Define η j o ( t ) = [ e i , j o ( t ) T , ξ j 1 ( t ) T T j o T , ξ j 2 ( t ) T , ξ ˙ j 2 ( t ) T H j o T ] Mathematical equation: $ \eta_j^o(t)=[e_{i,j}^{o}(t)^T, \xi_{j}^{1}(t)^T{T_{j}^{o}}^T, \xi_{j}^{2}(t)^T, -\dot{\xi}_{j}^{2}(t)^T{H_{j}^{o}}^T] $, one obtains

V ˙ j o ( t ) + 2 α j o V j o ( t ) 2 α j o ν j 1 | | T j o ξ j 1 ( t ) | | 2 2 α j o ν j 1 | | ξ j 2 ( t ) | | 2 2 α j o ν j 1 | | H j o ξ ˙ j 2 ( t ) | | 2 = η j o ( t ) T Ω j o η j o ( t ) , Mathematical equation: $$ \begin{aligned} \dot{V}^{o}_j(t)+2\alpha _j^oV^{o}_j(t)-2\alpha _j^o\nu _j^1||T_{j}^{o}\xi _{j}^{1}(t)||^2-2\alpha _j^o\nu _j^1||\xi _{j}^{2}(t)||^2-2\alpha _j^o\nu _j^1||H_{j}^{o}\dot{\xi }_{j}^{2}(t)||^2=\eta _j^o(t)^T\Omega _{j}^{o}\eta _j^o(t), \end{aligned} $$(18)

where

Ω j o = [ Ω ¯ j o P j o P j o K ~ j o P j o 2 α j o ν j 1 I j 0 0 2 α j o ν j 1 I j 0 2 α j o ν j 1 I j ] , Mathematical equation: $$ \begin{aligned} \Omega _{j}^{o} = \left[ \begin{array}{cccc} \bar{\Omega }_{j}^{o}&P_{j}^{o}&-P_{j}^{o}\tilde{K}_{j}^{o}&P_{j}^{o}\\ *&-2\alpha _j^o\nu _j^1I_{j}&0&0\\ *&*&-2\alpha _j^o\nu _j^1I_{j}&0\\ *&*&*&-2\alpha _j^o\nu _j^1I_{j} \end{array} \right], \end{aligned} $$(19)

and Ω ¯ j o = 2 α j o P j o + P j o A jj o + A jj o T P j o P j o K ~ j o C j C j T K ~ j o T P j o Mathematical equation: $ \bar{\Omega}_{j}^{o}=2\alpha_j^oP_{j}^{o}+P_{j}^{o}A_{jj}^{o}+A_{jj}^{{o^T}}P_{j}^{o}-P_{j}^{o}\tilde{K}_{j}^{o}C_{j}-C_{j}^T\tilde{K}_{j}^{{o^T}}P_{j}^{o} $. Then, setting P j o K ~ j o = S j o Mathematical equation: $ P_{j}^{o}\tilde{K}_{j}^{o}=S_{j}^{o} $ and substituting it into Equations (18) and (19), one obtains

V ˙ j o ( t ) + 2 α j o V j o ( t ) 2 α j o ν j 1 | | T j o ξ j 1 ( t ) | | 2 2 α j o ν j 1 | | ξ j 2 ( t ) | | 2 2 α j o ν j 1 | | H j o ξ ˙ j 2 ( t ) | | 2 = η j o ( t ) T Υ j o η j o ( t ) . Mathematical equation: $$ \begin{aligned} \dot{V}^{o}_j(t)+2\alpha _j^oV^{o}_j(t)-2\alpha _j^o\nu _j^1||T_{j}^{o}\xi _{j}^{1}(t)||^2-2\alpha _j^o\nu _j^1||\xi _{j}^{2}(t)||^2-2\alpha _j^o\nu _j^1||H_{j}^{o}\dot{\xi }_{j}^{2}(t)||^2=\eta _j^o(t)^T\Upsilon _{j}^{o}\eta _j^o(t). \end{aligned} $$(20)

Thus, the establishment of Equation (13) can ensure Equation (20) ≤ 0, one obtains

V ˙ j o ( t ) 2 α j o ( V j o ( t ) ν j 1 | | T j o ξ j 1 ( t ) | | 2 ν j 1 | | ξ j 2 ( t ) | | 2 ν j 1 | | H j o ξ ˙ j 2 ( t ) | | 2 ) , Mathematical equation: $$ \begin{aligned} \dot{V}^{o}_j(t) \le -2\alpha _j^o(V^{o}_j(t)-\nu _j^1||T_{j}^{o}\xi _{j}^{1}(t)||^2-\nu _j^1||\xi _{j}^{2}(t)||^2-\nu _j^1||H_{j}^{o}\dot{\xi }_{j}^{2}(t)||^2), \end{aligned} $$(21)

which implies

V j o ( t ) e 2 α j o ( t t o ) V j o ( t o ) + ν j 1 ( | | T j o ξ j 1 ( t ) | | 2 + | | ξ j 2 ( t ) | | 2 + | | H j o ξ ˙ j 2 ( t ) | | 2 ) . Mathematical equation: $$ \begin{aligned} V^{o}_j(t) \le e^{-2\alpha _j^o(t-t_o)}V^{o}_j(t_o) + \nu _j^1(||T_{j}^{o}\xi _{j}^{1}(t)||^2_{\infty }+||\xi _{j}^{2}(t)||^2_{\infty }+||H_{j}^{o}\dot{\xi }_{j}^{2}(t)||^2_{\infty }). \end{aligned} $$(22)

By combining inequalities Equations (16) and (22), it can be derived that

| | e i , j o ( t ) | | λ max ( P j o ) λ min ( P j o ) e α j o ( t t o ) | | e i , j o ( t o ) | | + ν j 1 λ min ( P j o ) ( | | T j o ξ j 1 ( t ) | | + | | ξ j 2 ( t ) | | + | | H j o ξ ˙ j 2 ( t ) | | ) . Mathematical equation: $$ \begin{aligned} ||e_{i,j}^{o}(t)|| \le \sqrt{\frac{\lambda _{\mathrm{max}}(P_{j}^{o})}{\lambda _{\mathrm{min}}(P_{j}^{o})}}e^{-\alpha _j^o(t-t_o)}||e_{i,j}^{o}(t_o)||+\sqrt{\frac{\nu _j^1}{\lambda _{\mathrm{min}}(P_{j}^{o})}}(||T_{j}^{o}\xi _{j}^{1}(t)||_{\infty }+||\xi _{j}^{2}(t)||_{\infty }+||H_{j}^{o}\dot{\xi }_{j}^{2}(t)||_{\infty }). \end{aligned} $$(23)

Thus, the zero-input dynamics of the system Equation (9) (with ξ j 1 ( t ) ξ j 2 ( t ) ξ ˙ j 2 ( t ) 0 Mathematical equation: $ \xi_{j}^{1}(t)\equiv\xi_{j}^{2}(t)\equiv\dot{\xi}_{j}^{2}(t)\equiv0 $) is global uniform exponential stability concerning the origin and condition Equation (10) is satisfied. Then, defining the following matrix

Ψ j 0 = [ P j o C j T ν j 2 I j ] Mathematical equation: $$ \begin{aligned} \Psi _{j}^{0} = \left[ \begin{array}{cc} P_{j}^{o}&C_{j}^T\\ *&\nu _j^2I_{j} \end{array} \right] \end{aligned} $$(24)

and inequality Equation (14) is satisfied. By the Schur complement lemma, it can be concluded that

P j o ν j 2 1 C j T C j 0 . Mathematical equation: $$ \begin{aligned} P_{j}^{o}- \nu _j^{2^{-1}}C_{j}^TC_{j} \ge 0. \end{aligned} $$(25)

By multiplying both the left and right sides of Equation (25) by e i , j o ( t ) T Mathematical equation: $ e_{i,j}^{o}(t)^T $ and its transpose, respectively, we obtain

e i , j o ( t ) T P j o e i , j o ( t ) ν j 2 1 e i , j o ( t ) T C j T C j e i , j o ( t ) 0 , Mathematical equation: $$ \begin{aligned} e_{i,j}^{o}(t)^TP_{j}^{o}e_{i,j}^{o}(t)- \nu _j^{2^{-1}}e_{i,j}^{o}(t)^TC_{j}^TC_{j}e_{i,j}^{o}(t) \ge 0, \end{aligned} $$(26)

which implies | | z i , j o ( t ) | | 2 ν j 2 V j o ( t ) Mathematical equation: $ ||z_{i,j}^{o}(t)||^2 \leq \nu_j^2 V_j^o(t) $, Combined with Equation (22), we obtain

| | z i , j o ( t ) | | ν j 2 V j o ( t o ) e α j o ( t t o ) + ν j 1 ν j 2 ( | | T j o ξ j 1 ( t ) | | + | | ξ j 2 ( t ) | | + | | H j o ξ ˙ j 2 ( t ) | | ) . Mathematical equation: $$ \begin{aligned} ||z_{i,j}^{o}(t)|| \le \sqrt{\nu _j^2V_j^o(t_o)}e^{-\alpha _j^o(t-t_o)}+\sqrt{\nu _j^1\nu _j^2}(||T_{j}^{o}\xi _{j}^{1}(t)||_{\infty }+||\xi _{j}^{2}(t)||_{\infty }+||H_{j}^{o}\dot{\xi }_{j}^{2}(t)||_{\infty }). \end{aligned} $$(27)

Thus, condition Equations (11) and (12) are satisfied. This completes the proof. ■

Remark 1

Based on Equations (8a)–(8d) and Theorem 1, it is evident that the gain of UIOi, j implemented in DGU i can be determined solely using local information, independent of global system data. This local computation capability ensures the scalability of our proposed monitoring framework. Notably, the designed observer maintains its functionality without requiring global redesign when a compromised DGU is removed or a new DGU is integrated into the microgrid system.

Under the aforementioned design structure, the detection residual is crafted as r i , j o ( t ) = y i , j re y ̂ i , j o ( t ) Mathematical equation: $ r_{i,j}^{o}(t) =y_{i,j}^{re}-\hat{y}_{i,j}^{o}(t) $, where y ̂ i , j o ( t ) = C j x ̂ i , j o ( t ) Mathematical equation: $ \hat{y}_{i,j}^{o}(t)=C_j\hat{x}_{i,j}^{o}(t) $. The evaluation standard is determined by the Euclidean norm of residual r i , j o ( t ) Mathematical equation: $ r_{i,j}^{o}(t) $. The detection mechanism functions according to the subsequent principle [5]:

{ | | r i , j o ( t ) | | r ¯ i , j o ( t ) No alarm , | | r i , j o ( t ) | | > r ¯ i , j o ( t ) Alarm for attacks . Mathematical equation: $$ \begin{aligned} \left\{ \begin{aligned} ||r_{i,j}^{o}(t)||\le&\bar{r}_{i,j}^{o}(t)\Rightarrow \text{ No} \text{ alarm},\\ ||r_{i,j}^{o}(t)||>&\bar{r}_{i,j}^{o}(t)\Rightarrow \text{ Alarm} \text{ for} \text{ attacks}. \end{aligned}\right. \end{aligned} $$(28)

The detection mechanism in the control center of DGU i activates an alarm signal upon violation of the predetermined threshold boundary, indicating potential anomalies in communication link ij; conversely, the communication link ij is considered to be functioning normally. Notably, the threshold r ¯ i , j o ( t ) Mathematical equation: $ \bar{r}_{i,j}^{o}(t) $ is typically defined as r ¯ i , j o ( t ) = r ¯ i , j o 1 ( t ) + r ¯ i , j o 2 ( t ) Mathematical equation: $ \bar{r}_{i,j}^{o}(t)=\bar{r}_{i,j}^{o1}(t)+\bar{r}_{i,j}^{o2}(t) $, where r ¯ i , j o 1 ( t ) Mathematical equation: $ \bar{r}_{i,j}^{o1}(t) $ is a small constant introduced to reduce false alarms, and r ¯ i , j o 2 ( t ) Mathematical equation: $ \bar{r}_{i,j}^{o2}(t) $ represents the supremum of residuals under attack-free conditions. While r ¯ i , j o 2 ( t ) = 0 Mathematical equation: $ \bar{r}_{i,j}^{o2}(t)=0 $ holds when the microgrid experiences no external disturbances and observer initialization matches the system’s initial state, these idealized assumptions rarely apply in practice. Thus, Monte Carlo simulations are conducted considering both measurement noise, load perturbations, and randomized initial conditions to statistically determine the residual supremum r ¯ i , j o 2 ( t ) Mathematical equation: $ \bar{r}_{i,j}^{o2}(t) $.

3.2. Implementation and analysis of collusive stealth attack

Considering the potential scenario where adversaries possess comprehensive knowledge of DGU models, they can design sophisticated attack signals to disrupt cyber-physical microgrid operations while evading detection. This section presents a systematic framework for constructing collusive stealth attacks, where the attacker simulates system dynamics to generate malicious signals. These signals are subsequently injected into the communication channel ij, concurrently compromising both the measurement y j(t) and control input u j ( t ) Mathematical equation: $ \vec{u}_{j}(t) $. The measurement signal y i , j re ( t ) Mathematical equation: $ y_{i,j}^{re}(t) $ received by the control center of DGU i is expressed as in Equation (6), while the actual input signal u i , j re ( t ) Mathematical equation: $ \vec{u}_{i,j}^{re}(t) $ is given by u i , j re ( t ) = u j ( t ) + χ j ( t t j s ) u i , j a ( t ) Mathematical equation: $ \vec{u}_{i,j}^{re}(t)=\vec{u}_{j}(t)+\chi_{j}(t-t_{j}^{s})\vec{u}_{i,j}^{a}(t) $, where y i , j a ( t ) Mathematical equation: $ y_{i,j}^{a}(t) $ is dynamically generated as follows:

{ x ˙ i , j a ( t ) = A ¯ jj x i , j a ( t ) + B j u i , j a ( t ) + F j o d ¯ i , j a ( t ) , y i , j a ( t ) = C j x i , j a ( t ) , Mathematical equation: $$ \begin{aligned} \left\{ \begin{aligned} \dot{x}_{i,j}^a(t)&= \bar{A}_{jj}x_{i,j}^a(t)+\vec{B}_{j}\vec{u}_{i,j}^{a}(t)+\mathbb{F} _{j}^{o}\bar{d}_{i,j}^a(t),\\ y_{i,j}^a(t)&= C_{j}x_{i,j}^a(t), \end{aligned}\right. \end{aligned} $$(29)

where u i , j a ( t ) = ( B j T B j ) 1 B j T F j o d i , j a ( t ) Mathematical equation: $ \vec{u}_{i,j}^{a}(t)=(\vec{B}_{j}^T\vec{B}_{j})^{-1}\vec{B}_{j}^T\mathbb{F}_{j}^{o}\vec{d}_{i,j}^a(t) $ represents the injected attack signal, d ¯ i , j a ( t ) Mathematical equation: $ \bar{d}_{i,j}^a(t) $ and d i , j a ( t ) Mathematical equation: $ \vec{d}_{i,j}^a(t) $ are arbitrary non-zero false data. For simplicity, we denote E j o = ( B j T B j ) 1 B j T F j o Mathematical equation: $ E_{j}^{o}=(\vec{B}_{j}^T\vec{B}_{j})^{-1}\vec{B}_{j}^T\mathbb{F}_{j}^{o} $. The following theorem demonstrates the stealthiness of the collusion attack strategy designed for communication link ij.

Theorem 2.

For the DC microgrids Equation (4) incorporating ℒ UIO-based detection mechanisms Equations (7) and (28), the communication link ij is injected with u i , j a ( t ) Mathematical equation: $ \vec{u}_{i,j}^{a}(t) $ and y i, j a(t), where u i , j a ( t ) = ( B j T B j ) 1 B j T F j o d i , j a ( t ) Mathematical equation: $ \vec{u}_{i,j}^{a}(t)=(\vec{B}_{j}^T\vec{B}_{j})^{-1}\vec{B}_{j}^T\mathbb{F}_{j}^{o}\vec{d}_{i,j}^a(t) $ and y i, j a(t) are generated by Equation (29). This manipulation does not prompt an alert from the monitoring center, indicating that the collusion attack strategy is stealthy.

Proof:

Considering t < t j s Mathematical equation: $ t < t_{j}^{s} $, the cyber-physical microgrid is free from malicious attacks and operates normally, the estimation error dynamics of the UIOi, j in the DGU i monitoring center is given by Equation (9). Considering t t j s Mathematical equation: $ t \geq t_{j}^{s} $, the communication link ij is subjected to the aforementioned collusion attack, the dynamics of the ℒ UIOi, j can be expressed as follows:

{ z ˘ ˙ i , j o ( t ) = F j o z ˘ i , j o ( t ) + T j o ( u j ( t ) + u i , j a ( t ) ) + K j o ( y j ( t ) + y i , j a ( t ) ) , x ˘ ̂ i , j o ( t ) = z ˘ i , j o ( t ) + H j o ( y j ( t ) + y i , j a ( t ) ) . Mathematical equation: $$ \begin{aligned} \left\{ \begin{aligned} \dot{\breve{z}}_{i,j}^{o}(t)&= F_{j}^{o}\breve{z}_{i,j}^{o}(t)+T_{j}^{o}(\vec{u}_{j}(t)+\vec{u}_{i,j}^{a}(t))+K_{j}^{o}(y_j(t)+y_{i,j}^{a}(t)),\\ \hat{\breve{x}}_{i,j}^{o}(t)&= \breve{z}_{i,j}^{o}(t)+H_{j}^{o}(y_j(t)+y_{i,j}^{a}(t)). \end{aligned}\right. \end{aligned} $$(30)

At this point, the detection residual can be expressed as: r ˘ i , j o ( t ) = y j ( t ) + y i , j a ( t ) y ̂ i , j o ( t ) = C j e ˘ i , j o ( t ) + ξ i 2 ( t ) Mathematical equation: $ \breve{r}_{i,j}^{o}(t) =y_j(t)+y_{i,j}^{a}(t)-\hat{y}_{i,j}^{o}(t)=C_j\breve{e}_{i,j}^{o}(t)+\xi_{i}^{2}(t) $, where e ˘ i , j o ( t ) = x j ( t ) + x i , j a ( t ) x ˘ ̂ i , j o ( t ) Mathematical equation: $ \breve{e}_{i,j}^{o}(t)=x_{j}(t)+x_{i,j}^a(t)-\hat{\breve{x}}_{i,j}^{o}(t) $. By integrating Equations (4), (8a)–(8d), (29), and (30), the dynamics of the estimation error can be derived:

e ˘ ˙ i , j o ( t ) = x ˙ j ( t ) + x ˙ i , j a ( t ) x ˘ ̂ ˙ i , j o ( t ) = A ¯ jj x j ( t ) + B j ( u j ( t ) + u i , j a ( t ) ) + F j o d ¯ j ( t ) + ξ i 1 ( t ) + A ¯ jj x i , j a ( t ) + B j u i , j a ( t ) + F j o d ¯ i , j a ( t ) F j o z ˘ i , j o ( t ) T j o ( u j ( t ) + u i , j a ( t ) ) K j o ( y j ( t ) + y i , j a ( t ) ) H j o C j ( A ¯ jj x i , j a ( t ) + B j ( u j ( t ) + u i , j a ( t ) ) + F j o d ¯ j ( t ) + ξ i 1 ( t ) ) H j o C j ( A ¯ jj x i , j a ( t ) + B j u i , j a ( t ) + F j o d ¯ i , j a ( t ) ) = A ¯ jj x j ( t ) + ξ i 1 ( t ) + A ¯ jj x i , j a ( t ) + F j o d ¯ i , j a ( t ) F j o ( x ˘ ̂ i , j o ( t ) H j o ( C j x j ( t ) + C j x i , j a ( t ) ) ) K j o ( y j ( t ) + y i , j a ( t ) ) H j o C j ( A ¯ jj x i , j a ( t ) + ξ i 1 ( t ) ) H j o C j ( A ¯ jj x i , j a ( t ) + F j o d ¯ i , j a ( t ) ) = F j o e ˘ i , j o ( t ) + T j o ξ j 1 ( t ) H j o ξ ˙ j 2 ( t ) K ¯ j o ξ j 2 ( t ) . Mathematical equation: $$ \begin{aligned} \dot{\breve{e}}_{i,j}^{o}(t)&= \dot{x}_{j}(t)+\dot{x}_{i,j}^a(t)-\dot{\hat{\breve{x}}}_{i,j}^{o}(t)\nonumber \\&= \bar{A}_{jj}x_{j}(t)+\vec{B}_{j}(\vec{u}_{j}(t)+\vec{u}_{i,j}^{a}(t))+\mathbb{F} _{j}^{o}\bar{d}_{j}(t)+\xi _{i}^{1}(t)+ \bar{A}_{jj}x_{i,j}^a(t)+\vec{B}_{j}\vec{u}_{i,j}^{a}(t)+\mathbb{F} _{j}^{o}\bar{d}_{i,j}^a(t)-F_{j}^{o}\breve{z}_{i,j}^{o}(t)\nonumber \\&\quad -T_{j}^{o}(\vec{u}_{j}(t)+\vec{u}_{i,j}^{a}(t))-K_{j}^{o}(y_j(t)+y_{i,j}^{a}(t))-H_{j}^{o}C_j(\bar{A}_{jj}x_{i,j}^a(t)+\vec{B}_{j}(\vec{u}_{j}(t)+\vec{u}_{i,j}^{a}(t))+\mathbb{F} _{j}^{o}\bar{d}_{j}(t)\nonumber \\&\quad +\xi _{i}^{1}(t))-H_{j}^{o}C_j(\bar{A}_{jj}x_{i,j}^a(t)+\vec{B}_{j}\vec{u}_{i,j}^{a}(t)+\mathbb{F} _{j}^{o}\bar{d}_{i,j}^a(t))\nonumber \\&= \bar{A}_{jj}x_{j}(t)+\xi _{i}^{1}(t)+ \bar{A}_{jj}x_{i,j}^a(t)+\mathbb{F} _{j}^{o}\bar{d}_{i,j}^a(t)-F_{j}^{o}(\hat{\breve{x}}_{i,j}^{o}(t)-H_{j}^{o}(C_jx_j(t)+C_jx_{i,j}^{a}(t)))-K_{j}^{o}(y_j(t)\nonumber \\&\quad +y_{i,j}^{a}(t))-H_{j}^{o}C_j(\bar{A}_{jj}x_{i,j}^a(t)+\xi _{i}^{1}(t))-H_{j}^{o}C_j(\bar{A}_{jj}x_{i,j}^a(t)+\mathbb{F} _{j}^{o}\bar{d}_{i,j}^a(t))\nonumber \\&= F_{j}^{o}\breve{e}_{i,j}^{o}(t)+T_{j}^{o}\xi _{j}^{1}(t)-H_{j}^{o}\dot{\xi }_{j}^{2}(t)-\bar{K}_{j}^{o}\xi _{j}^{2}(t). \end{aligned} $$(31)

Evidently, the estimation error dynamics Equation (9) of the ℒ UIOi, j in the absence of attacks are equivalent to those Equation (31) under the collusion attack, implying that the attack does not affect the detection residuals r i , j o ( t ) Mathematical equation: $ r_{i,j}^{o}(t) $, thereby maintaining stealthy. The proof is concluded. ■

Remark 2

The proposed collusive attack strategy simultaneously compromises the integrity of both y j(t) and u j ( t ) Mathematical equation: $ \vec{u}_{j}(t) $. As evidenced by Equation (5), the corrupted measurement y i , j re ( t ) Mathematical equation: $ y_{i,j}^{re}(t) $ directly affects the secondary control input, consequently degrading system performance. Furthermore, Theorem 2 demonstrates that the error system dynamics remain consistent before and after the attack, indicating that the collusive attack does not induce residual anomalies. Consequently, this attack strategy can effectively disrupt system performance without triggering any alarm signals.

Compared to classical FDI attacks, the proposed collusion attack strategy exhibits enhanced destructiveness and stealthiness. Consequently, to ensure the continuous and stable operation of cyber-physical microgrids, it is imperative to devise corresponding countermeasures for timely detection of such malicious attacks.

4. Dynamic encoding detection scheme

In Theorem 2, it has been demonstrated that the proposed collusive attack is stealthy and can evade detection by the ℒ UIO-based detection module. This section will present the design of a dynamic coding-based scheme to detect the aforementioned collusive stealthy attack. The core strategy involves integrating an encoder-decoder pair into the communication link ij to limit the adversary’s ability to disclose information. This ensures that the attacker cannot neutralize the system’s response through the injected signals u i , j a ( t ) Mathematical equation: $ \vec{u}_{i,j}^{a}(t) $ and y i, j a(t). As a consequence, the compromised measurement outputs y i , j re ( t ) Mathematical equation: $ y_{i,j}^{re}(t) $ become discernible from the normal outputs y j(t), causing the residual r i , j o ( t ) Mathematical equation: $ r_{i,j}^{o}(t) $ in the detection module to surpass the threshold r ¯ i , j o ( t ) Mathematical equation: $ \bar{r}_{i,j}^{o}(t) $ significantly, thereby activating an alarm.

Actually, the control center of DGU i not only utilizes y i , j re ( t ) Mathematical equation: $ y_{i,j}^{re}(t) $ to generate the secondary control input u ¯ i ( t ) Mathematical equation: $ \bar{u}_{i}(t) $ but also employs u i , j a ( t ) Mathematical equation: $ \vec{u}_{i,j}^{a}(t) $ to estimate x j(t), thereby monitoring anomalies in the communication link ij. As depicted in Figure 1, a pair of dynamic encoder and decoder is deployed in the communication link ij, where the input u j ( t ) Mathematical equation: $ \vec{u}_{j}(t) $ is encoded into U j ( t ) Mathematical equation: $ \vec{U}_{j}(t) $ before being transmitted over the communication network, with U j ( t ) Mathematical equation: $ \vec{U}_{j}(t) $ defined as follows:

U j ( t ) = e cos ( t ) Φ j u j ( t ) , Mathematical equation: $$ \begin{aligned} \vec{U}_{j}(t)=e^{\cos {(t)}}\Phi _j\vec{u}_{j}(t), \end{aligned} $$(32)

where Φ j is an invertible matrix of appropriate dimension. Actually, the time-varying nature of e cos(t) Φ j renders it inherently challenging for the attacker to accurately discern the coding matrix. Consequently, when a malicious adversary initiates the injection of attack signals u i , j a ( t ) Mathematical equation: $ \vec{u}_{i,j}^{a}(t) $, unaware of the dynamic encoding scheme, the compromised signal is altered as follows:

U j ( t ) = e cos ( t ) Φ j u j ( t ) + u i , j a ( t ) . Mathematical equation: $$ \begin{aligned} \vec{U}_{j}(t)=e^{\cos {(t)}}\Phi _j\vec{u}_{j}(t)+\vec{u}_{i,j}^{a}(t). \end{aligned} $$(33)

Before the input signal being transmitted into the control center, U j ( t ) Mathematical equation: $ \vec{U}_{j}(t) $ undergoes decoding as follows:

u i , j re ( t ) = e cos ( t ) Φ j 1 U j ( t ) = u j ( t ) + e cos ( t ) Φ j 1 u i , j a ( t ) . Mathematical equation: $$ \begin{aligned} \vec{u}_{i,j}^{re}(t)=e^{-\cos {(t)}}\Phi _j^{-1}\vec{U}_{j}(t)=\vec{u}_{j}(t)+e^{-\cos {(t)}}\Phi _j^{-1}\vec{u}_{i,j}^{a}(t). \end{aligned} $$(34)

Evidently, the control signal of DGU i operates independently of u i , j re ( t ) Mathematical equation: $ \vec{u}_{i,j}^{re}(t) $, ensuring that the aforementioned dynamic encoding mechanism does not interfere with the operation of the cyber-physical microgrid, thereby avoiding any degradation in system performance. On the other hand, in the absence of an attack scenario where u i , j a ( t ) 0 Mathematical equation: $ \vec{u}_{i,j}^{a}(t)\equiv 0 $, the input signal is restored to

u i , j re ( t ) = u j ( t ) + e cos ( t ) Φ j 1 u i , j a ( t ) u j ( t ) . Mathematical equation: $$ \begin{aligned} \vec{u}_{i,j}^{re}(t)=\vec{u}_{j}(t)+e^{-\cos {(t)}}\Phi _j^{-1}\vec{u}_{i,j}^{a}(t)\equiv \vec{u}_{j}(t). \end{aligned} $$(35)

Consequently, the aforementioned dynamic encoding mechanism does not induce false alarms even in the attack-free scenario. The following theorem presents the estimation error dynamics of the UIOi, j in an attack scenario when the system employs the dynamic encoding mechanism.

Theorem 3.

In the DC microgrid Equation (4) equipped with the detection framework based on ℒ UIO and dynamic encoding mechanism, the estimation error dynamics of UIOi, j when the collusive stealthy attack is injected into communication link ij can be represented as:

e ~ ˙ i , j o ( t ) = F j o e ~ i , j o ( t ) e cos ( t ) T j o B j Φ j 1 E j o d i , j a ( t ) + T j o ξ j 1 ( t ) H j o ξ ˙ j 2 ( t ) K ¯ j o ξ j 2 ( t ) . Mathematical equation: $$ \begin{aligned} \begin{aligned} \dot{\tilde{e}}_{i,j}^{o}(t)&= F_{j}^{o}\tilde{e}_{i,j}^{o}(t)-e^{-\cos {(t)}}T_{j}^{o}{\vec{B}_{j}}\Phi _j^{-1}E_{j}^{o}\vec{d}_{i,j}^a(t)+T_{j}^{o}\xi _{j}^{1}(t)-H_{j}^{o}\dot{\xi }_{j}^{2}(t)-\bar{K}_{j}^{o}\xi _{j}^{2}(t). \end{aligned} \end{aligned} $$(36)

That is, with the assistance of the dynamic encoding mechanism, the dynamics of the estimation error under collusive attacks differ from those under normal conditions, as described in Equation (36). By selecting appropriate dynamic encoding matrices, the detection residual r i , j o ( t ) Mathematical equation: $ r_{i,j}^{o}(t) $ can be sufficiently amplified to exceed the predefined threshold r ¯ i , j o ( t ) Mathematical equation: $ \bar{r}_{i,j}^{o}(t) $, thereby triggering an alarm.

Proof:

By combining Equations (4), (8a)–(8d), (29), (30), (34), and differentiating with respect to e ~ i , j o ( t ) = x j ( t ) + x i , j a ( t ) x ˘ ̂ i , j o ( t ) Mathematical equation: $ \tilde{e}_{i,j}^{o}(t)=x_{j}(t)+x_{i,j}^a(t)-\hat{\breve{x}}_{i,j}^{o}(t) $, we obtain

e ~ ˙ i , j o ( t ) = x ˙ j ( t ) + x ˙ i , j a ( t ) x ˘ ̂ ˙ i , j o ( t ) = A ¯ jj x j ( t ) + B j ( u j ( t ) + u i , j a ( t ) ) + F j o d ¯ j ( t ) + ξ i 1 ( t ) + A ¯ jj x i , j a ( t ) + B j u i , j a ( t ) + F j o d ¯ i , j a ( t ) F j o z ˘ i , j o ( t ) T j o B j ( u j ( t ) + e cos ( t ) Φ j 1 u i , j a ( t ) ) K j o ( y j ( t ) + y i , j a ( t ) ) H j o C j ( A ¯ jj x i , j a ( t ) + B j ( u j ( t ) + u i , j a ( t ) ) + F j o d ¯ j ( t ) + ξ i 1 ( t ) ) H j o C j ( A ¯ jj x i , j a ( t ) + B j u i , j a ( t ) + F j o d ¯ i , j a ( t ) ) = A ¯ jj x j ( t ) + ξ i 1 ( t ) + A ¯ jj x i , j a ( t ) + F j o d ¯ i , j a ( t ) F j o ( x ˘ ̂ i , j o ( t ) H j o ( C j x j ( t ) + C j x i , j a ( t ) ) ) K j o ( y j ( t ) + y i , j a ( t ) ) H j o C j ( A ¯ jj x i , j a ( t ) + ξ i 1 ( t ) ) e cos ( t ) T j o B j Φ j 1 E j o d i , j a ( t ) H j o C j ( A ¯ jj x i , j a ( t ) + F j o d ¯ i , j a ( t ) ) = F j o e ~ i , j o ( t ) e cos ( t ) T j o B j Φ j 1 E j o d i , j a ( t ) + T j o ξ j 1 ( t ) H j o ξ ˙ j 2 ( t ) K ¯ j o ξ j 2 ( t ) . Mathematical equation: $$ \begin{aligned} \dot{\tilde{e}}_{i,j}^{o}(t)&= \dot{x}_{j}(t)+\dot{x}_{i,j}^a(t)-\dot{\hat{\breve{x}}}_{i,j}^{o}(t)\nonumber \\&= \bar{A}_{jj}x_{j}(t)+\vec{B}_{j}(\vec{u}_{j}(t)+\vec{u}_{i,j}^{a}(t))+\mathbb{F} _{j}^{o}\bar{d}_{j}(t)+\xi _{i}^{1}(t)+ \bar{A}_{jj}x_{i,j}^a(t)+\vec{B}_{j}\vec{u}_{i,j}^{a}(t)+\mathbb{F} _{j}^{o}\bar{d}_{i,j}^a(t)-F_{j}^{o}\breve{z}_{i,j}^{o}(t)\nonumber \\&\quad -T_{j}^{o}{\vec{B}_{j}}(\vec{u}_{j}(t)+e^{-\cos {(t)}}\Phi _j^{-1}\vec{u}_{i,j}^{a}(t))-K_{j}^{o}(y_j(t)+y_{i,j}^{a}(t))-H_{j}^{o}C_j(\bar{A}_{jj}x_{i,j}^a(t)+\vec{B}_{j}(\vec{u}_{j}(t)\nonumber \\&\quad +\vec{u}_{i,j}^{a}(t))+\mathbb{F} _{j}^{o}\bar{d}_{j}(t)+\xi _{i}^{1}(t))-H_{j}^{o}C_j(\bar{A}_{jj}x_{i,j}^a(t)+\vec{B}_{j}\vec{u}_{i,j}^{a}(t)+\mathbb{F} _{j}^{o}\bar{d}_{i,j}^a(t))\nonumber \\&= \bar{A}_{jj}x_{j}(t)+\xi _{i}^{1}(t)+ \bar{A}_{jj}x_{i,j}^a(t)+\mathbb{F} _{j}^{o}\bar{d}_{i,j}^a(t)-F_{j}^{o}(\hat{\breve{x}}_{i,j}^{o}(t)-H_{j}^{o}(C_jx_j(t)+C_jx_{i,j}^{a}(t)))-K_{j}^{o}(y_j(t)+\nonumber \\&\quad y_{i,j}^{a}(t))-H_{j}^{o}C_j(\bar{A}_{jj}x_{i,j}^a(t)+\xi _{i}^{1}(t))-e^{-\cos {(t)}}T_{j}^{o}{\vec{B}_{j}}\Phi _j^{-1}E_{j}^{o}\vec{d}_{i,j}^a(t)-H_{j}^{o}C_j(\bar{A}_{jj}x_{i,j}^a(t)+\mathbb{F} _{j}^{o}\bar{d}_{i,j}^a(t))\nonumber \\&= F_{j}^{o}\tilde{e}_{i,j}^{o}(t)-e^{-\cos {(t)}}T_{j}^{o}{\vec{B}_{j}}\Phi _j^{-1}E_{j}^{o}\vec{d}_{i,j}^a(t)+T_{j}^{o}\xi _{j}^{1}(t)-H_{j}^{o}\dot{\xi }_{j}^{2}(t)-\bar{K}_{j}^{o}\xi _{j}^{2}(t). \end{aligned} $$(37)

It is noteworthy that Equation (37) exhibits distinct characteristics compared to Equations (9) and (31). Specifically, the implementation of the dynamic encoding scheme alters the estimation error dynamics in the presence of collusive attacks. Given the relationship r ~ i , j o ( t ) = C j e ~ i , j o ( t ) + ξ i 2 ( t ) Mathematical equation: $ \tilde{r}_{i,j}^{o}(t)=C_j\tilde{e}_{i,j}^{o}(t)+\xi_{i}^{2}(t) $, the residual undergoes corresponding variations, thereby depriving the collusive attack of its concealment. ■

Based on the above analysis, it is evident that when the system is not under attack, the dynamic encoding mechanism does not alter the normal control signals, unlike additive watermarking schemes, which modify control signals and consequently lead to system performance degradation. However, when the system is under attack, the collusive stealth attack loses its stealthiness due to the dynamic encoding mechanism, thereby triggering an alarm. To ensure the impact of the attack signal manifests in the residual signal r ~ i , j o ( t ) Mathematical equation: $ \tilde{r}_{i,j}^{o}(t) $, the following theorem presents the feasibility conditions for the dynamic encoding matrix.

Theorem 4

Based on the deployed ℒ UIOi, j Equation (7) and dynamic encoding mechanism, the collusive stealthy attack Equation (29) can influence the detection residual r ~ i , j o ( t ) Mathematical equation: $ \tilde{r}_{i,j}^{o}(t) $ provided that the matrix M i , j o ( s ) Mathematical equation: $ \mathbb{M}_{i,j}^{o}(s) $ possesses no non-minimum phase zero dynamics and r a n k ( C j T j o B j Φ j 1 E j o ) = r a n k ( T j o B j Φ j 1 E j o ) Mathematical equation: $ rank(C_jT_{j}^{o}{\vec{B}_{j}}\Phi_j^{-1}E_{j}^{o})=rank(T_{j}^{o}\vec{B}_{j}\Phi_j^{-1}E_{j}^{o}) $, where

M i , j o ( s ) = [ s I j F j o T j o B j Φ j 1 E j o C j 0 ] . Mathematical equation: $$ \begin{aligned} \mathbb{M} _{i,j}^{o}(s) = \left[ \begin{array}{cc} sI_j-F_j^o&T_{j}^{o}\vec{B}_{j}\Phi _j^{-1}E_{j}^{o}\\ C_j&0 \end{array} \right]. \end{aligned} $$(38)

Proof:

Based on the analysis mentioned above, it can be concluded that after the implementation of the dynamic encoding mechanism, the error dynamics and detection residuals of UIOi, j are as follows:

{ e ~ ˙ i , j o ( t ) = F j o e ~ i , j o ( t ) e cos ( t ) T j o B j Φ j 1 E j o d i , j a ( t ) + T j o ξ j 1 ( t ) H j o ξ ˙ j 2 ( t ) K ¯ j o ξ j 2 ( t ) , r ~ i , j o ( t ) = C j e ~ i , j o ( t ) + ξ i 2 ( t ) . Mathematical equation: $$ \begin{aligned} \left\{ \begin{aligned} \dot{\tilde{e}}_{i,j}^{o}(t)&= F_{j}^{o}\tilde{e}_{i,j}^{o}(t)-e^{-\cos {(t)}}T_{j}^{o}\vec{B}_{j}\Phi _j^{-1}E_{j}^{o}\vec{d}_{i,j}^a(t)+T_{j}^{o}\xi _{j}^{1}(t)-H_{j}^{o}\dot{\xi }_{j}^{2}(t)-\bar{K}_{j}^{o}\xi _{j}^{2}(t),\\ \tilde{r}_{i,j}^{o}(t)&= C_j\tilde{e}_{i,j}^{o}(t)+\xi _{i}^{2}(t). \end{aligned}\right. \end{aligned} $$(39)

To ensure that the influence of any non-zero d i , j a ( t ) Mathematical equation: $ \vec{d}_{i,j}^a(t) $ on e ~ i , j o ( t ) Mathematical equation: $ \tilde{e}_{i,j}^{o}(t) $ is reflected in r ~ i , j o ( t ) Mathematical equation: $ \tilde{r}_{i,j}^{o}(t) $, it is necessary to select an appropriate encoding matrix such that the Rosenbrock system matrix M ~ i , j o ( s ) Mathematical equation: $ \tilde{\mathbb{M}}_{i,j}^{o}(s) $ possesses no non-minimum phase zero dynamics and is left-invertible, where

M ~ i , j o ( s ) = [ s I j F j o e cos ( t ) T j o B j Φ j 1 E j o C j 0 ] . Mathematical equation: $$ \begin{aligned} \tilde{\mathbb{M} }_{i,j}^{o}(s) = \left[ \begin{array}{cc} sI_j-F_j^o&e^{-\cos {(t)}}T_{j}^{o}\vec{B}_{j}\Phi _j^{-1}E_{j}^{o}\\ C_j&0 \end{array} \right]. \end{aligned} $$(40)

Moreover, since rank ( M ~ i , j o ( s ) ) = rank ( M i , j o ( s ) ) Mathematical equation: $ \mathrm{rank}(\tilde{\mathbb{M}}_{i,j}^{o}(s))=\mathrm{rank}(\mathbb{M}_{i,j}^{o}(s)) $, this condition is equivalent to require that the matrix M i , j o ( s ) Mathematical equation: $ \mathbb{M}_{i,j}^{o}(s) $ possesses no non-minimum phase zero dynamics and is left-invertible. The left invertibility of the matrix M i , j o ( s ) Mathematical equation: $ \mathbb{M}_{i,j}^{o}(s) $ is equivalent to the condition that the largest controllability subspace of system Σ i , j o : ( C j , F j o , T j o B j Φ j 1 E j o ) Mathematical equation: $ \Sigma_{i,j}^o:(C_j, F_{j}^{o},T_{j}^{o}\vec{B}_{j}\Phi_j^{-1}E_{j}^{o}) $ is contained within Ker(C j), with M i , j ( Σ i , j o ) Mathematical equation: $ \mathbb{M}^{\star}_{i,j}(\Sigma_{i,j}^o) $ defined as zero. Furthermore, M i , j ( Σ i , j o ) Mathematical equation: $ \mathbb{M}^{\star}_{i,j}(\Sigma_{i,j}^o) $ can be expressed as:

M i , j ( Σ i , j o ) = W i , j ( Σ i , j o ) V i , j ( Σ i , j o ) , Mathematical equation: $$ \begin{aligned} \mathbb{M} ^{\star }_{i,j}(\Sigma _{i,j}^o) = \mathbb{W} ^{\star }_{i,j}(\Sigma _{i,j}^o) \cap \mathbb{V} ^{\star }_{i,j}(\Sigma _{i,j}^o), \end{aligned} $$(41)

where W i , j ( Σ i , j o ) Mathematical equation: $ \mathbb{W}^{\star}_{i,j}(\Sigma_{i,j}^o) $ represents the smallest conditioned invariant subspace encompassing I m ( T j o B j Φ j 1 E j o ) Mathematical equation: $ Im(T_{j}^{o}{\vec{B}_{j}}\Phi_j^{-1}E_{j}^{o}) $, and V i , j ( Σ i , j o ) Mathematical equation: $ \mathbb{V}^{\star}_{i,j}(\Sigma_{i,j}^o) $ denotes the largest weakly unobservable subspace. The computational procedure for determining these subspaces is outlined as follows [23, 24]:

W i , j ( Σ i , j o ) 0 = I m ( T j o B j Φ j 1 E j o ) , W i , j ( Σ i , j o ) k = W i , j ( Σ i , j o ) 0 + F j o ( W i , j ( Σ i , j o ) k 1 K e r ( C j ) ) , Mathematical equation: $$ \begin{aligned} \mathbb{W} ^{\star }_{i,j}(\Sigma _{i,j}^o)_0&=Im(T_{j}^{o}{\vec{B}_{j}}\Phi _j^{-1}E_{j}^{o}), ~~~ \mathbb{W} ^{\star }_{i,j}(\Sigma _{i,j}^o)_k=\mathbb{W} ^{\star }_{i,j}(\Sigma _{i,j}^o)_0 +F_j^o(\mathbb{W} ^{\star }_{i,j}(\Sigma _{i,j}^o)_{k-1}\cap Ker(C_j)),\end{aligned} $$(42)

V i , j ( Σ i , j o ) 0 = K e r ( C j ) , V i , j ( Σ i , j o ) k = V i , j ( Σ i , j o ) 0 F j o 1 ( V i , j ( Σ i , j o ) k 1 + I m ( T j o B j Φ j 1 E j o ) ) , Mathematical equation: $$ \begin{aligned} \mathbb{V} ^{\star }_{i,j}(\Sigma _{i,j}^o)_0&=Ker(C_{j}), ~~~ \mathbb{V} ^{\star }_{i,j}(\Sigma _{i,j}^o)_k=\mathbb{V} ^{\star }_{i,j}(\Sigma _{i,j}^o)_0 \cap F_j^{{o}^{-1}}(\mathbb{V} ^{\star }_{i,j}(\Sigma _{i,j}^o)_{k-1}+Im(T_{j}^{o}{\vec{B}_{j}}\Phi _j^{-1}E_{j}^{o})), \end{aligned} $$(43)

where W i , j ( Σ i , j o ) k Mathematical equation: $ \mathbb{W}^{\star}_{i,j}(\Sigma_{i,j}^o)_k $ and V i , j ( Σ i , j o ) k Mathematical equation: $ \mathbb{V}^{\star}_{i,j}(\Sigma_{i,j}^o)_k $ converge to W i , j ( Σ i , j o ) Mathematical equation: $ \mathbb{W}^{\star}_{i,j}(\Sigma_{i,j}^o) $ and V i , j ( Σ i , j o ) Mathematical equation: $ \mathbb{V}^{\star}_{i,j}(\Sigma_{i,j}^o) $, respectively. Therefore, combining Equations (41)–(43), it can be concluded that when W i , j ( Σ i , j o ) 0 V i , j ( Σ i , j o ) 0 = 0 Mathematical equation: $ \mathbb{W}^{\star}_{i,j}(\Sigma_{i,j}^o)_0\cap \mathbb{V}^{\star}_{i,j}(\Sigma_{i,j}^o)_0=0 $, then M i , j ( Σ i , j o ) = 0 Mathematical equation: $ \mathbb{M}^{\star}_{i,j}(\Sigma_{i,j}^o)=0 $. This merely requires that I m ( T j o B j Φ j 1 E j o ) Mathematical equation: $ Im(T_{j}^{o}\vec{B}_{j}\Phi_j^{-1}E_{j}^{o}) $ does not lie in the null space of C j, i.e., r a n k ( C j T j o B j Φ j 1 E j o ) = r a n k ( T j o B j Φ j 1 E j o ) Mathematical equation: $ rank(C_jT_{j}^{o}\vec{B}_{j}\Phi_j^{-1}E_{j}^{o})=rank(T_{j}^{o}\vec{B}_{j}\Phi_j^{-1}E_{j}^{o}) $. The proof is thus completed. ■

Thumbnail: Figure 2. Refer to the following caption and surrounding text. Figure 2.

Simulation results under normal operating conditions. (a) and (b) correspond to the voltage at the PCC and the output current of the DGUs, respectively.

Thumbnail: Figure 3. Refer to the following caption and surrounding text. Figure 3.

Simulation results under the scenario of the cyber-physical microgrid being subjected to the collusive stealthy attack. (a) and (b) correspond to the voltage at the PCC and the output current of the DGUs, respectively.

5. Simulation results

To validate both the concealment and disruptive potential of the proposed coordinated attack strategy, along with the efficacy of the dynamic encryption-based detection mechanism, we implement a comprehensive simulation environment using the SimPowerSystems platform. The experimental setup encompasses a six DGUs microgrid configuration, with detailed electrical specifications and network topology referenced from [25].

Thumbnail: Figure 4. Refer to the following caption and surrounding text. Figure 4.

The detection threshold and detection residuals in the ℒ UIO-based detection module. (a), (b) and (c) present the experimental results corresponding to UIO4, 2, UIO4, 3, and UIO4, 5, respectively

Thumbnail: Figure 5. Refer to the following caption and surrounding text. Figure 5.

The detection threshold and detection residuals in the ℒ UIO-based detection module with the deployment of the dynamic encoding mechanism. (a), (b) and (c) present the experimental results corresponding to UIO4, 2, UIO4, 3, and UIO4, 5, respectively

Case 1: In this case, a simulation period of 20 s is considered, during which the cyber-physical microgrid operates without being subjected to any attacks. Initially, the six DGUs operate independently, with only the primary controller in effect. As shown in Figure 2a, the PCC voltages V i rapidly track and stabilize at the reference values. At t = 2 s, the DGUs are interconnected via power lines, and the secondary controller is activated with current proportional parameter I ti s = 1, ∀i ∈ 𝒱p. As illustrated in Figure 2b, after a certain period of secondary controller operation, I ti I ti s = I tj I tj s Mathematical equation: $ \frac{I_{ti}}{I_{ti}^s}=\frac{I_{tj}}{I_{tj}^s} $ is achieved, demonstrating that current sharing is realized in the cyber-physical microgrid under a reliable network environment.

Case 2: In this case, the simulation period is set to 5 s. Similarly, for the first 2 s, the DGUs are considered to operate independently, and they begin to interconnect at t = 2 s. At t = 3 s, the communication link among DGUs 2–4 is subjected to the collusive stealthy attack, where d 4 , 3 a ( t ) = [ 0 ; 0.1 ] Mathematical equation: $ \vec{d}_{4,3}^a(t)=[0;0.1] $ and y 4, 3 a(t) is generated by Equation (29). As shown in Figure 3, after the attack occurs, the voltage at the PCC fails to track the reference value and diverges. The current also exhibits significant oscillations, and I ti I ti s I tj I tj s Mathematical equation: $ \frac{I_{ti}}{I_{ti}^s}\neq\frac{I_{tj}}{I_{tj}^s} $. This indicates that the negative impact of an attack on a single communication link rapidly propagates throughout the entire grid, affecting the overall system performance. Additionally, the monitoring results of UIO4, 2, UIO4, 3, and UIO4, 5 deployed in the DGU 4 are presented in Figure 4. After the attack, none of the detection residuals show noticeable anomalies, all remaining below the threshold. This demonstrates that the collusive attack successfully evades detection while degrading system performance, posing a significant threat to the microgrid.

Case 3: In this case, similar to Case 2, the communication network is subjected to the collusive stealthy attack. However, the dynamic encoding mechanism proposed in this paper is deployed in the communication network, and Φ 3 = [0.001, 0.05; 0, 0.001] is selected based on Theorem 4. The monitoring results of UIO4, 2, UIO4, 3, and UIO4, 5 in DGU 4 are shown in Figure 5. Before the attack occurs, all detection residuals remain below the threshold and exhibit no anomalies, indicating that the deployment of the dynamic encoding mechanism does not trigger false alarms. After the communication link among DGUs 2–4 is subjected to the collusive stealthy attack, the detection residual generated by UIO4, 3 exhibits an abnormal increase and quickly exceeds the threshold, while other detection residuals remain unaffected. This demonstrates that the proposed detection mechanism can accurately identify the attack and precisely locate the compromised link. At t = 3.5 s, DGU 3 is proactively disconnected to prevent further propagation of the attack effects. The remaining detection modules require no redesign and continue to monitor the microgrid effectively, highlighting the scalability of the proposed detection framework.

6. Conclusion

This paper has proposed a dynamic encoding-based detection framework to combat collusive stealthy attacks in cyber-physical microgrids. An ℒ UIO was established at the control center to track communication link ij. The observer shows strong robustness, and its gain is calculated without needing information from neighboring DGUs. Subsequently, a collusive stealthy attack strategy has been proposed, which simultaneously compromises the integrity of input and output data, thereby disrupting grid performance, such as voltage regulation and current sharing. To counter the threat of the collusive stealthy attack, a dynamic encoding-based detection scheme has been introduced. This scheme does not degrade system performance in the absence of attacks but assists the ℒ UIO in generating anomalous detection residuals in the presence of attacks. Additionally, the feasibility conditions for the encoding matrix have been rigorously analyzed. Finally, the destructiveness of the attack and the effectiveness of the detection framework have been validated through MATLAB-based microgrid simulations. Future research could extend the proposed detection framework to cyber-physical microgrids with nonlinear loads, along with the development of data-driven detection strategies based solely on system measurements.

Acknowledgments

We would like to thank all editors and reviewers who helped to improve the paper.

Funding

This work was supported in part by the Foundation for Innovative Research Groups of the National Natural Science Foundation of China (Grant No. 62421004), and in part by the National Natural Science Foundation of China (Grant Nos. 62173218 and 62103254).

Conflicts of interest

The authors declare no conflicts of interest.

Data availability statement

The original data are available from corresponding authors upon reasonable request.

Author contribution statement

Zhihua Wu: Conceptualization, Methodology, Formal analysis, Software, Validation, Writing-review & editing. Chen Peng: Data curation, Writing-original draft, Conceptualization, Methodology, Software, Supervision. Engang Tian: Visualization, Investigation, Methodology, Supervision. Yajian Zhang: Validation, Methodology, Formal analysis, Supervision.

References

  1. Zhang K, Shi Y, Karnouskos S, et al. Advancements in industrial cyber-physical systems: An overview and perspectives. IEEE Trans Ind Inform 2023; 19: 716–29. [Google Scholar]
  2. Chae J, Lee S, Jang J, et al. A survey and perspective on industrial cyber-physical systems (ICPS): From ICPS to AI-augmented ICPS. IEEE Trans Ind Cyber-Phys Syst 2023; 1: 257–72. [Google Scholar]
  3. Leng J, Sha W, Wang B, et al. Industry 5.0: Prospect and retrospect. J Manuf Syst 2022; 65: 279–95. [CrossRef] [Google Scholar]
  4. Peng C, Sun H, Yang M, et al. A survey on security communication and control for smart grids under malicious cyber attacks. IEEE Trans Syst Man Cybern: Syst 2019; 49: 1554–569. [Google Scholar]
  5. Ding SX. A note on diagnosis and performance degradation detection in automatic control systems towards functional safety and cyber security. Secur Saf 2022; 1: 2022004. [Google Scholar]
  6. Gao S, Zhang H, Wang Z, et al. Optimal injection attack strategy for cyber-physical systems: A dynamic feedback approach. Secur Saf 2022; 1: 2022005. [Google Scholar]
  7. Zhu K, Wang Z, Ding D, et al. Privacy-preserving control for 2-D systems with guaranteed probability. IEEE Trans Syst Man Cybern: Syst 2024; 54: 4999–5011. [Google Scholar]
  8. Liang G, Weller SR, Zhao J, et al. The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Trans Power Syst 2017; 32: 3317–318. [CrossRef] [Google Scholar]
  9. Condliffe J. Ukraine’s power grid gets hacked again, a worrying sign for infrastructure attacks. MIT Technology Review, 2016. [Google Scholar]
  10. Yang H, Yu Z, Zhang Y. Event-triggered resilient consensus control of multiple unmanned systems against periodic DoS attacks based on state predictor. Secur Saf 2023; 2: 2023017. [Google Scholar]
  11. Zhang Y, Mei D, Xu Y, et al. Adaptive cooperative secure control of networked multiple unmanned systems under FDI attacks. Secur Saf 2023; 2: 2023029. [Google Scholar]
  12. Qin J, Li M, Shi L, et al. Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Trans Automat Control 2018; 63: 1648–663. [Google Scholar]
  13. Tian E, Fan M, Ma L, et al. Stochastic important-data-based attack power allocation against remote state estimation in sensor networks. IEEE Trans Automat Control 2025; 70: 2012–019. [Google Scholar]
  14. Liu MX, Zhao CC, Deng RL, et al. False data injection attacks and the distributed countermeasure in DC microgrids. IEEE Trans Control Network Syst 2022; 9: 1962–974. [Google Scholar]
  15. Manandhar K, Cao X, Hu F, et al. Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans Control Network Syst 2014; 1: 370–79. [Google Scholar]
  16. Wang X, Luo X, Zhang M, et al. Detection and isolation of false data injection attacks in smart grid via unknown input interval observer. IEEE Internet Things J 2020; 7: 3214–229. [Google Scholar]
  17. Ye D, Zhang TY. Summation detector for false data-injection attack in cyber-physical systems. IEEE Trans Cybern 2020; 50: 2338–345. [Google Scholar]
  18. Esmalifalak M, Liu L, Nguyen N, et al. Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst J 2017; 11: 1644–652. [Google Scholar]
  19. Farajzadeh-Zanjani M, Hallaji E, Razavi-Far R, et al. Adversarial semi-supervised learning for diagnosing faults and attacks in power grids. IEEE Trans Smart Grid 2021; 12: 3468–478. [Google Scholar]
  20. Wang X, Luo X, Zhang M, et al. Detection and isolation of false data injection attacks in smart grid via unknown input interval observer. IEEE Internet Things J 2020; 7: 3214–229. [Google Scholar]
  21. Gallo AJ, Turan MS, Boem F, et al. A distributed cyber-attack detection scheme with application to DC microgrids. IEEE Trans Automat Control 2020; 65: 3800–815. [Google Scholar]
  22. Xu B, Peng C, Zhang Y, et al. Distributed plug-and-play robust ℒ voltage control for islanded microgrids. IEEE Trans Smart Grid 2024; 16: 1790–800. [Google Scholar]
  23. Trentelman HL, Stoorvogel AA, Hautus M, et al. Control theory for linear systems. London: Springer, 2012. [Google Scholar]
  24. Taheri M, Khorasani K, Shames I, et al. Cyberattack and machine-induced fault detection and isolation methodologies for cyber-physical systems. IEEE Trans Control Syst Technol 2023; 32: 502–17. [Google Scholar]
  25. Tucci M, Meng L, Guerrero JM, et al. Stable current sharing and voltage balancing in DC microgrids: A consensus-based secondary control layer. Automatica 2018; 95: 1–13. [CrossRef] [Google Scholar]
Zhihua Wu

Zhihua Wu received the M.Sc. degree in operations research and cybernetics from the University of Shanghai for Science and Technology, Shanghai, China, in 2023. He is currently pursuing his Ph.D. degree in Control Science and Engineering at Shanghai University, Shanghai, China. His research interests include distributed control systems and smart grids.

Chen Peng

Chen Peng (Senior Member, IEEE) received the B.Sc. and M.Sc. degrees in coal preparation and the Ph.D. degree in control theory and control engineering from the Chinese University of Mining Technology, Xuzhou, China, in 1996, 1999, and 2002, respectively. From November 2004 to January 2005, he was a Research Associate with the University of Hong Kong. From July 2006 to August 2007, he was a Visiting Scholar with the Queensland University of Technology, Brisbane, QLD, Australia. From July 2011 to August 2012, he was a Postdoctoral Research Fellow with Central Queensland University, Rockhampton, QLD, Australia. In 2012, he was appointed as an Eastern Scholar with the Municipal Commission of Education, Shanghai, China, and joined Shanghai University, Shanghai. His current research interests include networked control systems, distributed control systems, smart grids, and intelligent control systems.

Engang Tian

Engang Tian (Senior Member, IEEE) received the B.Sc. degree in mathematics from Shandong Normal University, Jinan, China, in 2002, the M.Sc. degree in operations research and cybernetics from Nanjing Normal University, Nanjing, China, in 2005, and the Ph.D. degree in control theory and control engineering from Donghua University, Shanghai, China, in 2008. From 2011 to 2012, he was a Postdoctoral Research Fellow with the Hong Kong Polytechnic University. From 2015 to 2016, he was a Visiting Scholar with the Department of Information Systems and Computing, Brunel University London, Uxbridge, U.K. From 2008 to 2018, he was an associate professor and then a professor with the School of Electrical and Automation Engineering, Nanjing Normal University. In 2018, he was appointed as an Eastern Scholar by the Municipal Commission of Education, Shanghai, China, and joined the University of Shanghai for Science and Technology, Shanghai, China. He is currently a professor with the School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai. His research interests include networked control systems, as well as nonlinear stochastic control and filtering.

Yajian Zhang

Yajian Zhang received the B.Sc. and M.Sc. degrees in electrical engineering from the China University of Mining and Technology in 2013 and 2016, respectively, and the Ph.D. degree in electrical engineering from Tianjin University, Tianjin, China, in 2021. He was a Postdoctoral Research Fellow in control theory and engineering with Shanghai University, Shanghai, China. Since 2024, he has been an associate professor at Shanghai University. His current research interests include secure networked control systems, power systems, cyber-physical systems, and power grid security control.

All Figures

Thumbnail: Figure 1. Refer to the following caption and surrounding text. Figure 1.

The overall architecture diagram of cyber-physical microgrid

In the text
Thumbnail: Figure 2. Refer to the following caption and surrounding text. Figure 2.

Simulation results under normal operating conditions. (a) and (b) correspond to the voltage at the PCC and the output current of the DGUs, respectively.

In the text
Thumbnail: Figure 3. Refer to the following caption and surrounding text. Figure 3.

Simulation results under the scenario of the cyber-physical microgrid being subjected to the collusive stealthy attack. (a) and (b) correspond to the voltage at the PCC and the output current of the DGUs, respectively.

In the text
Thumbnail: Figure 4. Refer to the following caption and surrounding text. Figure 4.

The detection threshold and detection residuals in the ℒ UIO-based detection module. (a), (b) and (c) present the experimental results corresponding to UIO4, 2, UIO4, 3, and UIO4, 5, respectively

In the text
Thumbnail: Figure 5. Refer to the following caption and surrounding text. Figure 5.

The detection threshold and detection residuals in the ℒ UIO-based detection module with the deployment of the dynamic encoding mechanism. (a), (b) and (c) present the experimental results corresponding to UIO4, 2, UIO4, 3, and UIO4, 5, respectively

In the text

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.