Real-Time Estimation and Defense of PV Inverter Sensor Attacks With Hardware Implementation

Kaikai Pan*, Zhiyun Wang, Jingwei Dong, Peter Palensky, Wenyuan Xu

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

2 Citations (SciVal)
22 Downloads (Pure)

Abstract

Sensor attacks on grid-tie photovoltaic (PV) inverters can cause severe damage. Considering uncertain environments and unknown model mismatches, real-time estimation and defense for sensor attacks on actual PV inverters are challenging. In this article, we propose an optimization-driven robust estimator within the attack frequency range using the H index, while the model mismatch effect on estimation is also minimized. To improve the real-time response under varying environments, an analytical solution from a convex quadratic programming reformulation is constructed. Guided by the estimation, we further develop a closed-loop compensation strategy with a tracking controller and a low-pass filter. Through code porting, our proposed defense strategy has been implemented in a microcommercial PV inverter. Hardware implementations show that our defense approach can effectively mitigate sensor attacks and maintain stable inverter operation.

Original languageEnglish
Pages (from-to)3228-3232
Number of pages5
JournalIEEE Transactions on Industrial Electronics
Volume72 (2025)
Issue number3
DOIs
Publication statusPublished - 2024

Bibliographical note

Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • Hardware implementation
  • photovoltaic (PV) inverter
  • real-time robust estimation
  • sensor attacks
  • time-varying

Fingerprint

Dive into the research topics of 'Real-Time Estimation and Defense of PV Inverter Sensor Attacks With Hardware Implementation'. Together they form a unique fingerprint.

Cite this