@article{zeng_zhang_chow_2017, title={Resilient Distributed Energy Management Subject to Unexpected Misbehaving Generation Units}, volume={13}, ISSN={["1941-0050"]}, DOI={10.1109/tii.2015.2496228}, abstractNote={Distributed energy management algorithms are being developed for the smart grid to efficiently and economically allocate electric power among connected distributed generation units and loads. The use of such algorithms provides flexibility, robustness, and scalability, while it also increases the vulnerability of smart grid to unexpected faults and adversaries. The potential consequences of compromising the power system can be devastating to public safety and economy. Thus, it is important to maintain the acceptable performance of distributed energy management algorithms in a smart grid environment under malicious cyber-attacks. In this paper, a neighborhood-watch-based distributed energy management algorithm is proposed to guarantee the accurate control computation in solving the economic dispatch problem in the presence of compromised generation units. The proposed method achieves the system resilience by performing a reliable distributed control without a central coordinator and allowing all the well-behaving generation units to reach the optimal operating point asymptotically. The effectiveness of the proposed method is demonstrated through case studies under several different adversary scenarios.}, number={1}, journal={IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS}, author={Zeng, Wente and Zhang, Yuan and Chow, Mo-Yuen}, year={2017}, month={Feb}, pages={208–216} } @inproceedings{duan_zeng_chow_2016, title={An attack-resilient distributed DC optimal power flow algorithm via neighborhood monitoring}, DOI={10.1109/pesgm.2016.7741286}, abstractNote={Distributed DC optimal power flow (DC-OPF) is vulnerable to malicious cyber attacks due to the absence of a control center. In our previous work, we demonstrated a data integrity attack can manipulate the power dispatch result of distributed DC-OPF by compromising the distributed controller on a bus and modifying the information being sent to the neighboring buses. This vulnerability, in turn, could be exploited by attackers for financial arbitrage in a distributed electricity market. Thus, there is a growing need for attack-resilient control techniques that can fit into the distributed power system framework to ensure the global optimality of the power dispatch result in the presence of unexpected adversaries. In this paper, we proposed a resilient distributed DC-OPF algorithm against data integrity attacks by using a neighborhood monitoring scheme. On one hand, the resilient distributed DC-OPF algorithm is an efficient approach to deal with significant increasing amount of distributed energy resources (DERs) thanks to its flexibility and scalability. On the other hand, its neighborhood monitoring scheme enables its built-in defense to identify the misbehaving distributed controllers relying on each bus's local information and recover the optimal power dispatch from the malicious impact of data integrity attacks.}, booktitle={2016 ieee power and energy society general meeting (pesgm)}, author={Duan, J. and Zeng, W. T. and Chow, M. Y.}, year={2016} } @inproceedings{duan_zeng_chow_2016, title={Attack detection and mitigation for resilient distributed DC optimal power flow in the IoT environment}, DOI={10.1109/isie.2016.7744958}, abstractNote={The internet of things (IoT) is an attractive networking paradigm with machine-to-machine communication. Several distributed approaches have been proposed to solve the DC optimal power flow (DC-OPF) problem in the IoT environment. The nature of distributed computation provides scalability, robustness and privacy protection, while it also poses more vulnerabilities to unexpected cyber faults and adversaries. One important concern in the distributed DC-OPF algorithm is to maintain the optimal power dispatch result in the face of compromised nodes which are exchanging false information. In this paper, we deal with the data integrity attack and develop an attack detection and mitigation method that could fit into the IoT environment to secure the distributed DC-OPF algorithm. It is a fully distributed mechanism that enables each bus to perform the following major functions based on two-hop neighbors' information: 1) verifying the correctness of the exchanged information without infringing neighbor's privacy; 2) identifying the malicious attacker and recovering the optimal power dispatch from the malicious impact. The effectiveness of the proposed mechanism is illustrated by the standard IEEE 14-bus system.}, booktitle={Proceedings of the ieee international symposium on industrial}, author={Duan, J. and Zeng, W. T. and Chow, M. Y.}, year={2016}, pages={606–611} } @inproceedings{duan_zeng_chow_2016, title={Resilient cooperative distributed energy scheduling against data integrity attacks}, DOI={10.1109/iecon.2016.7793846}, abstractNote={Distributed energy management algorithms eliminate the control center from the conventional energy management systems and calculate the optimal schedule for all devices through iterative coordination among neighbors. Most of the existing distributed approaches are developed under the assumption that all devices are secure and willing to achieve an optimal system performance together in a “collaborative” environment. However, unexpected faults and adversaries may emerge in the network and disrupt the convergence of those distributed approaches. In this paper, we extend the cooperative distributed energy scheduling (CoDES) algorithm to improve its resilience against data integrity attacks. Two types of data integrity attacks are considered in this paper - faulty attacks and random attacks. A distributed attack detection algorithm is developed to verify the state of neighboring devices without infringing their private information. A reputation-based mitigation algorithm is introduced to identify the compromised device and act accordingly to maintain the optimal energy scheduling result. The effectiveness of the proposed resilient distributed energy scheduling algorithm is evaluated in the Future Renewable Electric Energy Delivery and Management (FREEDM) microgrid system.}, booktitle={Proceedings of the iecon 2016 - 42nd annual conference of the ieee industrial electronics society}, author={Duan, J. and Zeng, W. T. and Chow, M. Y.}, year={2016}, pages={4941–4946} } @inproceedings{zeng_zhang_chow_2015, title={A resilient distributed energy management algorithm for economic dispatch in the presence of misbehaving generation units}, booktitle={2015 Resilience Week (RSW)}, author={Zeng, W. T. and Zhang, Y. and Chow, M. Y.}, year={2015}, pages={12–16} } @inproceedings{zeng_gibeau_chow_2015, title={Economic benefits of plug-in electric vehicles using V2G for grid performance-based regulation service}, DOI={10.1109/iecon.2015.7392772}, abstractNote={With advancement of the vehicle-to-grid (V2G) technologies, plug-in electric vehicles (PEVs) are able to connect to the electric grid and participate in the grid regulation markets. Thus the large-scale PEV penetration into transportation systems will play an essential role for the grid support in the future. In this paper, a comprehensive daily economic benefit model for the PEV is formulated to analyze its costs and revenues of adopting unidirectional and bidirectional V2G technologies to provide grid performance-based regulation (PBR) services. Case studies considering three different types of PEVs with different charging rates and V2G capabilities are discussed. The simulation results quantitatively demonstrate the economic profit of PEVs to participate in the grid regulation service market. The sensitivities of the profit to battery sizes and charging rates are also analyzed.}, booktitle={Iecon 2015 - 41st annual conference of the ieee industrial electronics society}, author={Zeng, W. and Gibeau, J. and Chow, M. Y.}, year={2015}, pages={4322–4327} } @inproceedings{duan_zeng_chow_2015, title={Economic impact of data integrity attacks on distributed DC optimal power flow algorithm}, DOI={10.1109/naps.2015.7335167}, abstractNote={A variety of distributed energy management algorithms are being developed for DC optimal power flow (DCOPF) application owing to their flexibility and scalability in the presence of high distributed Energy Resources (DERs) penetration. However, these algorithms are vulnerable to malicious cyber attacks due to the absence of control centers. In this paper, we study and analyze the economic impact of the data integrity attack to distributed DC-OPF algorithms. In particular, we demonstrate how a malicious generator could gain more economic profit by compromising the distributed controller of its bus, modifying the information sent to neighboring buses and manipulating the power dispatch commands. To our best knowledge, this is the first paper to show the economic impact of malicious attacks in distributed DC-OPF. By revealing such potential financial risks, this paper conveys the message that besides the efforts of designing novel distributed energy management algorithms to address the DERs integration challenges, it is equally important to protect the distributed energy management algorithms from possible malicious attacks to avoid potential economic loss. The economic impact of the data integrity attack is illustrated in the Future Renewable Electric Energy Delivery and Management (FREEDM) system.}, booktitle={2015 north american power symposium (naps)}, author={Duan, J. and Zeng, W. T. and Chow, M. Y.}, year={2015} } @inproceedings{becerra_zeng_chow_rodriiuez-andina_2015, title={Green city: A low-cost testbed for distributed control algorithms in smart grid}, DOI={10.1109/iecon.2015.7392385}, abstractNote={As a type of Cyber-Physical Systems (CPSs), Smart Grid has been adding more communication and control capabilities to improve power efficiency and availability. Especially, more and more distributed control algorithms have been developed for Smart Grids because of their flexibility and robustness. In order to deploy them in real electric power systems, distributed control algorithms must be tested, not only in theoretical simulations, but also in testbeds subject to real world constraints that can provide feedback to make the algorithm robust. Implementations of these algorithms in a Smart Grid environment are facing many cyber-physical challenges such as possible communication failures or imperfections, noisy signals, etc. These challenges can lead to increasing economical expenditure or cause failure of the power system. There exist different approaches for testing distributed control algorithms, from using state-of-the-art facilities to software or hardware-in-the-loop simulations. To better emulate real-world electric grid operation scenarios with low capital investment, in this paper the Green City (GC) testbed is proposed as a suitable platform for both control theory researchers in Smart Grid, and for engineering education, allowing students to learn through hands-on experiences. GC has been conceived as a multi-agent networked CPS with the following main features: 1- Smart Grid environment emulation with low-cost physical elements; 2- Fast prototyping capability of distributed control algorithms for Smart Grid.}, booktitle={Iecon 2015 - 41st annual conference of the ieee industrial electronics society}, author={Becerra, A. C. and Zeng, W. T. and Chow, M. Y. and Rodriiuez-Andina, J. J.}, year={2015}, pages={1948–1953} } @article{zeng_chow_2014, title={A Reputation-Based Secure Distributed Control Methodology in D-NCS}, volume={61}, ISSN={["1557-9948"]}, DOI={10.1109/tie.2014.2311405}, abstractNote={Distributed networked control systems (D-NCSs) are more vulnerable to malicious attacks with the adoption of distributed control strategies. The misbehaving agents in the D-NCS can disrupt the distributed control algorithms and gradually compromise the entire system. In this paper, a multirobot system using the linear consensus algorithm for formation control is studied where parts of the robots are compromised. A reputation-based secure distributed control methodology with built-in defense is proposed to achieve accurate consensus computation in the presence of misbehaving robots. It embeds four phases (i.e., detection, mitigation, identification, and update) into the distributed control process. The effectiveness of the proposed method is illustrated through simulation analysis and experimental results.}, number={11}, journal={IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS}, author={Zeng, Wente and Chow, Mo-Yuen}, year={2014}, month={Nov}, pages={6294–6303} } @article{zeng_chow_2014, title={Resilient Distributed Control in the Presence of Misbehaving Agents in Networked Control Systems}, volume={44}, ISSN={["2168-2275"]}, DOI={10.1109/tcyb.2014.2301434}, abstractNote={In this paper, we study the problem of reaching a consensus among all the agents in the networked control systems (NCS) in the presence of misbehaving agents. A reputation-based resilient distributed control algorithm is first proposed for the leader-follower consensus network. The proposed algorithm embeds a resilience mechanism that includes four phases (detection, mitigation, identification, and update), into the control process in a distributed manner. At each phase, every agent only uses local and one-hop neighbors' information to identify and isolate the misbehaving agents, and even compensate their effect on the system. We then extend the proposed algorithm to the leaderless consensus network by introducing and adding two recovery schemes (rollback and excitation recovery) into the current framework to guarantee the accurate convergence of the well-behaving agents in NCS. The effectiveness of the proposed method is demonstrated through case studies in multirobot formation control and wireless sensor networks.}, number={11}, journal={IEEE TRANSACTIONS ON CYBERNETICS}, author={Zeng, Wente and Chow, Mo-Yuen}, year={2014}, month={Nov}, pages={2038–2049} } @inproceedings{zeng_chow_2013, title={Convergence and recovery analysis of the secure distributed control methodology for D-NCS}, DOI={10.1109/isie.2013.6563743}, abstractNote={Distributed control algorithms (e.g., consensus algorithms) are vulnerable to the misbehaving agent compromised by cyber attacks in the Distributed Networked Control Systems (D-NCS). In this paper we continue our work on a proposed secure distributed control methodology that is capable of performing a secure consensus computation in D-NCS in the presence of misbehaving agents. The methodology is introduced first and proven to be effective through convergence analysis. Then, we extend our secure distributed control methodology to the leaderless consensus network by introducing and adding two recovery schemes into the current secure distributed control framework to guarantee accurate convergence in the presence of misbehaving agents. All phases of our method are distributed. That is, at each step of the detection, mitigation, identification, update, and recovery, each agent only uses local and one-hop neighbors' information. The simulation results are presented to demonstrate the effectiveness of the proposed methods.}, booktitle={2013 IEEE International Symposium on Industrial Electronics (ISIE)}, author={Zeng, W. T. and Chow, M. Y.}, year={2013} } @article{zeng_chow_2013, title={Modeling and Optimizing the Performance-Security Tradeoff on D-NCS Using the Coevolutionary Paradigm}, volume={9}, ISSN={["1941-0050"]}, DOI={10.1109/tii.2012.2209662}, abstractNote={Distributed networked control systems (D-NCS) are vulnerable to various network attacks when the network is not secured; thus, D-NCS must be well protected with security mechanisms (e.g., cryptography), which may adversely affect the dynamic performance of the D-NCS because of limited system resources. This paper addresses the tradeoff between D-NCS security and its real-time performance and uses the Intelligent Space (iSpace) for illustration. A tradeoff model for a system's dynamic performance and its security is presented. This model can be used to allocate system resources to provide sufficient protection and to satisfy the D-NCS's real-time dynamic performance requirements simultaneously. Then, the paper proposes a paradigm of the performance-security tradeoff optimization based on the coevolutionary genetic algorithm (CGA) for D-NCS. A Simulink-based test-bed is implemented to illustrate the effectiveness of this paradigm. The results of the simulation show that the CGA can efficiently find the optimal values in a performance-security tradeoff model for D-NCS.}, number={1}, journal={IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS}, author={Zeng, Wente and Chow, Mo-Yuen}, year={2013}, month={Feb}, pages={394–402} } @article{su_rahimi-eichi_zeng_chow_2012, title={A Survey on the Electrification of Transportation in a Smart Grid Environment}, volume={8}, ISSN={["1941-0050"]}, DOI={10.1109/tii.2011.2172454}, abstractNote={Economics and environmental incentives, as well as advances in technology, are reshaping the traditional view of industrial systems. The anticipation of a large penetration of plug-in hybrid electric vehicles (PHEVs) and plug-in electric vehicles (PEVs) into the market brings up many technical problems that are highly related to industrial information technologies within the next ten years. There is a need for an in-depth understanding of the electrification of transportation in the industrial environment. It is important to consolidate the practical and the conceptual knowledge of industrial informatics in order to support the emerging electric vehicle (EV) technologies. This paper presents a comprehensive overview of the electrification of transportation in an industrial environment. In addition, it provides a comprehensive survey of the EVs in the field of industrial informatics systems, namely: 1) charging infrastructure and PHEV/PEV batteries; 2) intelligent energy management; 3) vehicle-to-grid; and 4) communication requirements. Moreover, this paper presents a future perspective of industrial information technologies to accelerate the market introduction and penetration of advanced electric drive vehicles.}, number={1}, journal={IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS}, author={Su, Wencong and Rahimi-Eichi, Habiballah and Zeng, Wente and Chow, Mo-Yuen}, year={2012}, month={Feb}, pages={1–10} } @inproceedings{zeng_chow_2012, title={CGA based performance-security trade-off optimization in a networked DC motor system}, DOI={10.1109/isie.2012.6237371}, abstractNote={There are increasing concerns about the protection of the Networked Control Systems (NCS) security because of the growing threats of cyber attacks. However, security requirements often conflict with other performance requirements, like realtime dynamic performance due to limited system resources. We investigate the problem of the trade-off between NCS security and the NCS real-time performance in this paper. We first present a trade-off model for performance and security on NCS using a networked DC Motor system as an example. Then, a framework of performance-security trade-off optimization based on Coevolutionary Genetic Algorithm (CGA) for this networked DC motor system is proposed. Finally, simulation results show that the proposed CGA framework is an effective approach for performance-security trade-off analysis and optimization on NCS.}, booktitle={2012 IEEE International Symposium on Industrial Electronics (ISIE)}, author={Zeng, W. T. and Chow, M. Y.}, year={2012}, pages={1834–1839} } @inproceedings{zeng_chow_ning_2012, title={Secure distributed control in unreliable D-NCS}, DOI={10.1109/isie.2012.6237375}, abstractNote={Distributed Networked Control Systems (D-NCS), such as the electric power system, the transportation system, or almost any large-scale network, are vulnerable to cyber attacks. The compromised nodes in the D-NCS can affect it and cause the distributed control algorithms (e.g., consensus algorithm) to fail. This paper is concerned with the problem of designing a secure distributed control methodology that is capable of performing a secure consensus computation in a D-NCS in the presence of misbehaving nodes. We consider the case of formation control in a multi-robot system using the linear consensus algorithm, and we model the malicious attack as an exogenous input that compromises the behavior of a single robot in this multi-robot system. The proposed secure distributed control methodology includes four phases: (1) Detect the neighbors' misbehaviors relying only on each robot's local observations; (2) Adjust the consensus computation weights according to the neighbors' reputation values; (3) Identify and isolate the compromised robot; and (4) Update the reference state using the adjusted consensus computation weights to ensure the convergence of well-behaving robots. A Simulink-based testbed for multi-robot formation control is used to illustrate the effectiveness of the proposed method.}, booktitle={2012 IEEE International Symposium on Industrial Electronics (ISIE)}, author={Zeng, W. T. and Chow, M. Y. and Ning, P.}, year={2012}, pages={1858–1863} } @inproceedings{zeng_chow_2011, title={A trade-off model for performance and security in secured networked control systems}, DOI={10.1109/isie.2011.5984466}, abstractNote={Networked Control Systems (NCS) is a fast growing technology that integrates distributed sensors, actuators, and computing processors over a communication network for a vast amount of applications. However, the NCS can be vulnerable to various network attacks when the network used is insecure (e.g., Internet). Thus, secure NCS need to have embedded security mechanism to ensure its security operating requirements, which may sacrifice its performance due to limited system resources. This paper addresses the trade-off between NCS security and its real-time performance and use a secured networked DC motor system for illustration. This paper will present a trade-off model for system dynamic performance and system security. This model can be used to adapt security configurations to provide sufficient protection and satisfy real-time dynamic performance requirements of the NCS simultaneously. The construction of this model includes the development of a set of metrics to quantitatively measure the performance and security levels of NCS and the development of a trade-off objective function incorporating performance and security. A Simulink based test-bed implemented to control the speed of the DC motor is used to illustrate the effectiveness of this model.}, booktitle={2011 IEEE International Symposium on Industrial Electronics (ISIE)}, author={Zeng, W. T. and Chow, M. Y.}, year={2011} }