scispace - formally typeset
Search or ask a question
JournalISSN: 2325-5870

IEEE Transactions on Control of Network Systems 

Institute of Electrical and Electronics Engineers
About: IEEE Transactions on Control of Network Systems is an academic journal published by Institute of Electrical and Electronics Engineers. The journal publishes majorly in the area(s): Computer science & Control theory (sociology). It has an ISSN identifier of 2325-5870. Over the lifetime, 1080 publications have been published receiving 27883 citations.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: This tutorial summarizes recent advances in the convex relaxation of the optimal power flow (OPF) problem, focusing on structural properties rather than algorithms.
Abstract: This tutorial summarizes recent advances in the convex relaxation of the optimal power flow (OPF) problem, focusing on structural properties rather than algorithms. Part I presents two power flow models, formulates OPF and their relaxations in each model, and proves equivalence relationships among them. Part II presents sufficient conditions under which the convex relaxations are exact.

796 citations

Journal ArticleDOI
TL;DR: It is proved that the Euclidean detector can effectively detect such a sophisticated injection attack as DoS attack, short-term, and long-term random attacks.
Abstract: By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of smart-grid systems, with techniques such as denial-of-service (DoS) attack, random attack, and data-injection attack. In this paper, we present a mathematical model of the system to study these pitfalls and propose a robust security framework for the smart grid. Our framework adopts the Kalman filter to estimate the variables of a wide range of state processes in the model. The estimates from the Kalman filter and the system readings are then fed into the $\chi^{2}$ -detector or the proposed Euclidean detector. The $\chi^{2}$ -detector is a proven effective exploratory method used with the Kalman filter for the measurement of the relationship between dependent variables and a series of predictor variables. The $\chi^{2}$ -detector can detect system faults/attacks, such as DoS attack, short-term, and long-term random attacks. However, the studies show that the $\chi^{2}$ -detector is unable to detect the statistically derived false data-injection attack. To overcome this limitation, we prove that the Euclidean detector can effectively detect such a sophisticated injection attack.

556 citations

Journal ArticleDOI
TL;DR: A metric is proposed to quantify the difficulty of the control problem as a function of the required control energy, bounds are derived based on the system dynamics to characterize the tradeoff between the control energy and the number of control nodes, and an open-loop control strategy with performance guarantees is proposed.
Abstract: This paper studies the problem of controlling complex networks, i.e., the joint problem of selecting a set of control nodes and of designing a control input to steer a network to a target state. For this problem, 1) we propose a metric to quantify the difficulty of the control problem as a function of the required control energy, 2) we derive bounds based on the system dynamics (network topology and weights) to characterize the tradeoff between the control energy and the number of control nodes, and 3) we propose an open-loop control strategy with performance guarantees. In our strategy, we select control nodes by relying on network partitioning, and we design the control input by leveraging optimal and distributed control techniques. Our findings show several control limitations and properties. For instance, for Schur stable and symmetric networks: 1) if the number of control nodes is constant, then the control energy increases exponentially with the number of network nodes; 2) if the number of control nodes is a fixed fraction of the network nodes, then certain networks can be controlled with constant energy independently of the network dimension; and 3) clustered networks may be easier to control because, for sufficiently many control nodes, the control energy depends only on the controllability properties of the clusters and on their coupling strength. We validate our results with examples from power networks, social networks and epidemics spreading.

544 citations

Journal ArticleDOI
TL;DR: This paper builds from a first-principle analysis of decentralized primary droop control on centralized, decentralized, and distributed architectures for secondary frequency regulation and finds that averaging-based distributed controllers using communication among the generation units offer the best combination of flexibility and performance.
Abstract: Modeled after the hierarchical control architecture of power transmission systems, a layering of primary, secondary, and tertiary control has become the standard operation paradigm for islanded microgrids. Despite this superficial similarity, the control objectives in microgrids across these three layers are varied and ambitious, and they must be achieved while allowing for robust plug-and-play operation and maximal flexibility, without hierarchical decision making and time-scale separations. In this paper, we explore control strategies for these three layers and illuminate some possibly unexpected connections and dependencies among them. Building from a first-principle analysis of decentralized primary droop control, we study centralized, decentralized, and distributed architectures for secondary frequency regulation. We find that averaging-based distributed controllers using communication among the generation units offer the best combination of flexibility and performance. We further leverage these results to study constrained ac economic dispatch in a tertiary control layer. Surprisingly, we show that the minimizers of the economic dispatch problem are in one-to-one correspondence with the set of steady states reachable by droop control. In other words, the adoption of droop control is necessary and sufficient to achieve economic optimization. This equivalence results in simple guidelines to select the droop coefficients, which include the known criteria for power sharing. We illustrate the performance and robustness of our designs through simulations.

508 citations

Journal ArticleDOI
TL;DR: In this article, the authors show that several important classes of metrics based on the controllability and observability Gramians have a strong structural property that allows for either efficient global optimization or an approximation guarantee by using a simple greedy heuristic for their maximization.
Abstract: Controllability and observability have long been recognized as fundamental structural properties of dynamical systems, but have recently seen renewed interest in the context of large, complex networks of dynamical systems. A basic problem is sensor and actuator placement: choose a subset from a finite set of possible placements to optimize some real-valued controllability and observability metrics of the network. Surprisingly little is known about the structure of such combinatorial optimization problems. In this paper, we show that several important classes of metrics based on the controllability and observability Gramians have a strong structural property that allows for either efficient global optimization or an approximation guarantee by using a simple greedy heuristic for their maximization. In particular, the mapping from possible placements to several scalar functions of the associated Gramian is either a modular or submodular set function . The results are illustrated on randomly generated systems and on a problem of power-electronic actuator placement in a model of the European power grid.

468 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
2023268
2022265
2021166
2020171
2019127
2018180