HTML conversions sometimes display errors due to content that did not convert correctly from the source. This paper uses the following packages that are not yet supported by the HTML conversion tool. Feedback on these issues are not necessary; they are known and are being worked on.

  • failed: steinmetz
  • failed: cuted

Authors: achieve the best HTML results from your LaTeX submissions by following these best practices.

License: CC BY 4.0
arXiv:2402.13586v2 [eess.SY] 22 Feb 2024

This paper has been accepted for publication in IEEE Transactions on Smart Grid

doi: 10.1109/TSG.2023.3339707

Content is final as presented here, with the exception of pagination.

IEEE Copyright Notice:
©2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Delay-Aware Semantic Sampling in Power Electronic Systems
thanks: This work is supported by the Nordic Energy Research programme via Next-uGrid project n. 117766. Kirti Gupta and Bijaya Ketan Panigrahi are with the Department of Electrical Engineering, Indian Institute of Technology Delhi, New Delhi 110016, India (e-mail: {Kirti.Gupta, Bijaya.Ketan.Panigrahi}@ee.iitd.ac.in). thanks: Subham Sahoo is with the Department of Energy, Aalborg University, 9220 Aalborg, Denmark (e-mail: [email protected]).

Kirti Gupta, Subham Sahoo, , and Bijaya Ketan Panigrahi
Abstract

In power electronic systems (PES), attacks on data availability such as latency attacks, data dropouts, and time-synchronization attacks (TSAs) continue to pose significant threats to both the communication network and the control system performance. As per the conventional norms of communication engineering, PES still rely on time synchronized sampling, which translates every received message with equal importance. In this paper, we go beyond event-triggered sampling/estimation to integrate semantic principles into the sampling process for each distributed energy resource (DER), which not only compensates for delayed communicated signals by reconstruction of a new signal from the inner control layer dynamics, but also evaluates the reconstruction stage using key semantic requirements, namely Freshness, Relevance and Priority for good dynamic performance. As a result, the sparsity provided by event-driven sampling of internal control loop dynamics translates as semantics in PES. The proposed scheme has been extensively tested and validated on a modified IEEE 37-bus AC distribution system, under many operating conditions and noisy environment in OPAL-RT environment to establish its robustness, model-free design ability and adaptive behavior to dynamic cyber graph topologies.

Index Terms:
Data dropout, delay-aware semantic sampling, distributed control, inner control loop dynamics, latency attack, power electronic systems (PES), time synchronization attack (TSA).

I Introduction

Power electronic systems (PES) play a crucial role in enhancing efficiency, promoting sustainability and enabling flexibility. Achieving these objectives necessitates resilient control integrated with communication within PES, thus transforming PES into sophisticated cyber-physical system. The control framework of PES in this work, involves primary and secondary controllers. The conventional centralized secondary controllers (SCs) have limitations such as, high communication bandwidth, vulnerability to single-point failures and high computational complexity. To address these drawbacks, a highly reliable and scalable distributed secondary control (DSC) architecture is widely accepted, which only requires information from neighboring agents [1]. This complex network requires time-synchronized measurements. Global navigation satellite signals (GNSSs), such as GPS, GLONASS, BeiDou and Galileo, are the primary sources of time synchronization due to their worldwide coverage and high accuracy [2]. Intelligent electronic devices (IEDs) and merging units depend on GNSS for time transfer, using methods such as precision time protocol (PTP), inter-range instrumentation group time code B (IRIG-B), or one pulse per second (1PPS) [3]. However, integrating communication network exposes them to various constraints, like delays, data loss, and uncertain links [4]. These can cause delayed exchange of measurement/control signals among distributed energy resources (DERs), affecting system performance.

The cyber-physical system further create opportunities for malicious attackers to launch coordinated cyber attacks. Among several cyber attacks [5, 6], this paper focuses on time delay-based cyber attacks, which can be strategically introduced into the control system by an adversary [7]. The time-synchronization attacks (TSAs) are a new kind of attack, which can manipulate the timing signals by corrupting the GNSS signals. Attackers can use a receiver-spoofer mechanism [8], where the spoofer itself is a GPS receiver. Both space-based time synchronization (SBTS) and network-based time synchronization (NBTS) mechanisms [9] lack integrated security controls and have been accounted as highly vulnerable to TSAs [10]. This leads to false measurements and inaccurate time stamps, severely affecting the stability of the system.

The massive importance of time synchronized real-time measurements in cyber-physical networks makes it a valuable target to adversaries. Moreover, since PES have low system inertia and high response speed, the impact of these attacks are more significant than in bulk power systems. Therefore, making it crucial to design controllers that can withstand such cyber attacks within real-time operational constraints. In prior works, such as [11] and [12], optimization-based methods were proposed for enhancing microgrid dynamic performance under communication delays. Nevertheless, these techniques come with notable computational overhead, especially in complex networks, and can be sensitive to initial conditions, potentially yielding suboptimal results. Another approach, as seen in [13], employs predictive control theory, demanding a substantial amount of modeling knowledge. The requirement of observer/estimator in this scheme, increases the complexity further. Moreover, these schemes often struggle to establish resilience to unknown dynamics, risking performance degradation or instability. Furthermore, [14] introduces an anomaly-based scheme to detect the presence of TSAs and other attacks. However, this scheme necessitates a training phase, potentially entailing high memory and critical data requirements. Data-driven methods like these may require hyperparameter tuning and might encounter overfitting issues. While TSA detection schemes have been investigated in [15] and [16], they lack a mitigation strategy to ensure stable PES operation during delays. Therefore, the existence of numerous distinct strategies to individually address data availability attacks, which often entail complex modeling or training approaches, motivated our proposal of a unified approach, capable of effectively mitigating all forms of such attacks. For this, we exploit the science of semantics to decipher a novel delay-aware semantic sampling scheme in this paper. Semantic principles have gained traction in various domains, including communication systems [17] and networked intelligent systems [18]. In speech recognition, semantics improves accuracy and efficiency in transforming spoken language into text [19]. The post-5G era sees semantics sha** the future of wireless networks [20]. For comprehensive insights into semantic communication and its applications, interested readers are encouraged to refer [21].

Real-time systems, such as smart grids and networked systems, rely on an automated sense-compute-actuate cycle for decision-making. The effectiveness of the connectivity in these systems hinges on the provision of right information to the right place at the right time. During data availability attacks, our proposed delay-aware semantic sampling scheme addresses the challenge of real-time control operation and stability due to missing samples by employing semantic communication & sampling. The proposed scheme furnishes delay-compensation signals to the controller locally by rectifying the above mentioned missing samples through a semantic reconstruction process. This approach harnesses semantic attributes, namely value, freshness, and relevance, which are governed by factors like prioritization of the most significant signal for estimation, age of information (AoI), and reconstruction error, respectively. These semantics attributes tune the reconstruction process by extraction of significant information from the dynamics of inner control loops through semantic sampling. These reconstructed signals are subsequently provided at a local level to SCs, effectively mitigating delays introduced by adversaries through data availability attacks. This distributed learning approach enhances the reliability and timeliness of information flow within real-time systems, enhancing the overall performance and resilience of PES.

In particular, the main contributions and benefits of this work are highlighted as:

  • The proposed delay-aware semantic sampling scheme, exploits significant information extracted from the inner control loop dynamics to provide reconstructed signals to local SC, facilitating delay compensation. This strategic approach minimizes redundant data transmissions.

  • The proposed scheme in this work, is robust against latency attacks, data dropouts and TSAs. It also guarantees the SC objectives are met under such attack scenarios.

  • The proposed delay-aware semantic sampling scheme embraces distributed approach, in contrast to complex centralized methods requiring intricate coordination between numerous components. Here, individual DERs independently handle local delay compensation, streamlining operations and enhancing manageability.

  • The proposed scheme in this work, is model-agnostic. This simplifies implementation by eliminating the need for numerous device-specific models.

  • Unlike training-based approaches that demand substantial computational resources, extensive datasets, and meticulous hyperparameter tuning, our approach operates without the need for training. It also does not have any additional hardware requirements.

The remainder of this paper is organized as: the science and relevance of semantics is explained in Section II. A brief description on modeling of cyber-physical PES is provided in Section III. The description, challenges and modeling of data availability attacks are illustrated in Section IV. The novel delay-aware semantic sampling approach is presented in Section V. The real-time simulation testbed setup and the performance evaluation of the proposed delay-aware semantic sampling scheme, is presented in Section VI. Finally, Section VII encapsulates the concluding remarks and future work.

II Science and Relevance of Semantics

The term “semantics” originated from the ancient Greek word “semantikos”, meaning significant, and has evolved to refer to “meaning” in the context of languages. However, in this work, the term “semantics” is used in its original sense of “significance” with regards to information. This approach recognizes that the relevance of information can vary depending on the application.

Refer to caption
Figure 1: Semantic information exchange and estimation in PES – sparse event-driven sampling from local error measurements steer the estimation and reconstruction process during latency attack/data dropout/TSAs.

In semantic sampling, the three attributes of evaluating the criticality/significance of information are freshness, value, and relevance. Their definitions are as follows:

  • Freshness refers to sending new updates at the right time. It is defined as the time for the newest sample of information to reach from the source to the destination. Considering u(t)ut\mathrm{u(t)}roman_u ( roman_t ) to be the timestamp of the latest packet received at destination by time tt\mathrm{t}roman_t, freshness is expressed as F(t)=tu(t)Fttut\mathrm{F}(\mathrm{t})=\mathrm{t}-\mathrm{u(t)}roman_F ( roman_t ) = roman_t - roman_u ( roman_t ).

  • Value refers to providing timely and right piece of information to the right point of computation, particularly in cyber-physical and hierarchical control systems. It defines Priority of information.

  • Relevance involves generating the right piece of information by sampling. It measures the extent of change in a process since the last recorded sample.

Based on the semantic requirements described above, we exploit it in the sampling and reconstruction process of new signals for each DER locally in PES, as shown in Fig. 1. As a result, the key focus is on steering the accuracy of estimation amid latency attacks, data dropouts and TSAs. Additionally, the semantic attributes i.e, relevance, freshness and priority are governed by reconstruction error, dynamic variation and prioritization of the most significant local signal to be used for estimation, respectively. Therefore, the semantic models pave way towards a standardized mechanism to represent and interpret from the relevant data collected from various devices and sensors across the network.

Refer to caption
Figure 2: (a) The modified IEEE 37-bus islanded AC distribution system powered by seven DERs is shown. (b) The block diagram of cyber-physical DER with primary and DSC architecture is presented. The DSC receives local measurements (σjsubscript𝜎𝑗\mathrm{\sigma}_{j}italic_σ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT) and neighbouring measurements (σmsubscript𝜎𝑚\mathrm{\sigma}_{m}italic_σ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT) as input to generate frequency and voltage correction terms (ΔωΔ𝜔\Delta\omegaroman_Δ italic_ω and ΔVΔV\Delta\mathrm{V}roman_Δ roman_V). Note that the merging units (MUs) receive the timing information from GPS satellite. These time-stamped measurements are then used by the controllers for generating control signals, which can directly affect the control operation of the system.

III Modeling Preliminaries

III-A Physical Framework

To demonstrate the modeling and control framework of a PES, the modified IEEE 37-bus system is presented in Fig. 2(a), with distributed loads powered by seven DERs. In the considered system, each DER can be represented by a DC source (denoting an energy storage system), DC/AC converter, LC filter (rfsuperscriptrf\mathrm{r^{f}}roman_r start_POSTSUPERSCRIPT roman_f end_POSTSUPERSCRIPT, LfsuperscriptLf\mathrm{L^{f}}roman_L start_POSTSUPERSCRIPT roman_f end_POSTSUPERSCRIPT, CfsuperscriptCf\mathrm{C^{f}}roman_C start_POSTSUPERSCRIPT roman_f end_POSTSUPERSCRIPT) and RL output impedance (rosuperscriptro\mathrm{r^{o}}roman_r start_POSTSUPERSCRIPT roman_o end_POSTSUPERSCRIPT, LosuperscriptLo\mathrm{L^{o}}roman_L start_POSTSUPERSCRIPT roman_o end_POSTSUPERSCRIPT). The dq𝑑𝑞d-qitalic_d - italic_q axis control framework comprises of inner control loops (voltage control (VC) and current control (CC)), cascaded with the primary droop control (DC) loop, as shown in Fig. 2(b). The merging units transmit the time-synchronized measurements (facilitated by GPS) to these controllers for the controller operation. As shown in Fig. 2(b), the GPS clock offers synchronized measurements of time by IRIG-B, PTP or 1PPS. The adopted frequency and voltage droop are:

ωj*(t)=ωnommjpPj(t)superscriptsubscript𝜔𝑗𝑡subscript𝜔nomsubscriptsuperscriptmp𝑗subscriptP𝑗t{{\omega}_{j}^{*}}(t)=\omega_{\mathrm{nom}}-\mathrm{m}^{\mathrm{p}}_{j}{% \mathrm{P}_{j}}\mathrm{(t)}italic_ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT ( italic_t ) = italic_ω start_POSTSUBSCRIPT roman_nom end_POSTSUBSCRIPT - roman_m start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT roman_P start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) (1)
Vjd*(t)=VnomnjqQj(t),Vjq*(t)=0formulae-sequencesubscriptsuperscriptVd𝑗tsubscriptVnomsubscriptsuperscriptnq𝑗subscriptQ𝑗tsubscriptsuperscriptVq𝑗t0\mathrm{V}^{\mathrm{d*}}_{j}\mathrm{(t)}=\mathrm{V_{nom}}-\mathrm{n}^{\mathrm{% q}}_{j}{\mathrm{Q}_{j}}\mathrm{(t)}\hskip 5.69046pt,\hskip 5.69046pt\mathrm{V}% ^{\mathrm{q*}}_{j}\mathrm{(t)}=0roman_V start_POSTSUPERSCRIPT roman_d * end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) = roman_V start_POSTSUBSCRIPT roman_nom end_POSTSUBSCRIPT - roman_n start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT roman_Q start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) , roman_V start_POSTSUPERSCRIPT roman_q * end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) = 0 (2)

where, the subscript ‘j𝑗jitalic_j’ represents the parameters associated to jthsuperscript𝑗𝑡j^{th}italic_j start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT DER. The terms ωnomsubscript𝜔nom\omega_{\mathrm{nom}}italic_ω start_POSTSUBSCRIPT roman_nom end_POSTSUBSCRIPT and VnomsubscriptVnom\mathrm{V}_{\mathrm{nom}}roman_V start_POSTSUBSCRIPT roman_nom end_POSTSUBSCRIPT are the nominal frequency and voltage of the AC system, respectively. The local reference frequency and voltage of a DER are ωj*superscriptsubscript𝜔𝑗{{\omega}_{j}^{*}}italic_ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT and Vjdq*subscriptsuperscriptVdq𝑗\mathrm{V}^{\mathrm{dq*}}_{j}roman_V start_POSTSUPERSCRIPT roman_dq * end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT. Here, Vjdq*(t)=[Vjd*(t)Vjq*(t)]TsubscriptsuperscriptVdq𝑗tsuperscriptdelimited-[]subscriptsuperscriptVd𝑗tsubscriptsuperscriptVq𝑗tT\mathrm{V}^{\mathrm{dq*}}_{j}\mathrm{(t)}=[\mathrm{V}^{\mathrm{d*}}_{j}\mathrm% {(t)}\hskip 5.69046pt\mathrm{V}^{\mathrm{q*}}_{j}\mathrm{(t)}]^{\mathrm{T}}roman_V start_POSTSUPERSCRIPT roman_dq * end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) = [ roman_V start_POSTSUPERSCRIPT roman_d * end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) roman_V start_POSTSUPERSCRIPT roman_q * end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT. The active and reactive power droop coefficient are mpsuperscriptmp\mathrm{m}^{\mathrm{p}}roman_m start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT and nqsuperscriptnq\mathrm{n}^{\mathrm{q}}roman_n start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT, respectively. More information about its control layer modeling can be referred from [22]. Since primary control inherently results in non-zero steady-state error, the DSC scheme is integrated, as in Fig. 2(b), described in the next subsection.

III-B Cyber Framework

Let us consider PES with M𝑀Mitalic_M power electronic-interfaced DERs in a sparsely-connected DSC based communication network. These DERs are termed as agents/nodes in cyber layer and are represented as 𝐱={x1,x2,,xM}𝐱subscriptx1subscriptx2subscriptx𝑀\textbf{x}=\{\mathrm{x}_{1},\mathrm{x}_{2},…,\mathrm{x}_{M}\}x = { roman_x start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , roman_x start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , roman_x start_POSTSUBSCRIPT italic_M end_POSTSUBSCRIPT }. These agents are linked to their neighbouring agents by edges 𝐄𝐄\mathbf{E}bold_E via an associated adjacency matrix, 𝐀G=[ajm]𝐑N×Nsubscript𝐀Gdelimited-[]subscripta𝑗𝑚superscript𝐑𝑁𝑁{\mathbf{A}_{\text{G}}}=[\mathrm{a}_{jm}]\in{\textbf{R}^{N\times{N}}}bold_A start_POSTSUBSCRIPT G end_POSTSUBSCRIPT = [ roman_a start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT ] ∈ R start_POSTSUPERSCRIPT italic_N × italic_N end_POSTSUPERSCRIPT. The neighbours to jthsuperscript𝑗𝑡j^{th}italic_j start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT agent is represented as, Nj={m|(xm,xj)𝐄}subscriptN𝑗conditional-set𝑚subscriptx𝑚subscriptx𝑗𝐄\mathrm{N}_{j}=\{{m}\ |\ (\mathrm{x}_{m},\mathrm{x}_{j})\in\mathbf{E}\}roman_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = { italic_m | ( roman_x start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT , roman_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ∈ bold_E }. Here, the communication weight ajmsubscripta𝑗𝑚\mathrm{a}_{jm}roman_a start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT (from agent m𝑚mitalic_m to agent j𝑗jitalic_j) is modeled as: ajm>subscripta𝑗𝑚absent\mathrm{a}_{jm}>roman_a start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT > 0, if (xjsubscriptx𝑗\mathrm{x}_{j}roman_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT, xmsubscriptx𝑚\mathrm{x}_{m}roman_x start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT) \in 𝐄𝐄\mathbf{E}bold_E. If there is no cyber link between xjsubscriptx𝑗\mathrm{x}_{j}roman_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT and xmsubscriptx𝑚\mathrm{x}_{m}roman_x start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT, then ajmsubscripta𝑗𝑚\mathrm{a}_{jm}roman_a start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT = 0. Any agent sends/receives the information from the neighbouring agent(s) i.e, σm=[ωmmmpPnmqQ]Tsubscript𝜎𝑚superscriptdelimited-[]subscript𝜔𝑚superscriptsubscriptm𝑚pPsuperscriptsubscriptn𝑚qQT\mathrm{\sigma}_{m}=[\mathrm{\omega}_{m}\hskip 5.69046pt\mathrm{m}_{m}^{% \mathrm{p}}\mathrm{P}\hskip 5.69046pt\mathrm{n}_{m}^{\mathrm{q}}\mathrm{Q}]^{% \mathrm{T}}italic_σ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT = [ italic_ω start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT roman_m start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT roman_P roman_n start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT roman_Q ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT. The matrix representing incoming information can be given as, 𝐃in=𝚍𝚒𝚊𝚐{djin}subscript𝐃in𝚍𝚒𝚊𝚐superscriptsubscriptd𝑗in\mathbf{D}_{\text{in}}=\texttt{diag}\{\mathrm{d}_{j}^{\mathrm{in}}\}bold_D start_POSTSUBSCRIPT in end_POSTSUBSCRIPT = diag { roman_d start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_in end_POSTSUPERSCRIPT }, where djin=mNjajmsuperscriptsubscriptd𝑗insubscript𝑚subscriptN𝑗subscripta𝑗𝑚\mathrm{d}_{j}^{\mathrm{in}}=\sum_{m\in\mathrm{N}_{j}}\mathrm{a}_{jm}roman_d start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_in end_POSTSUPERSCRIPT = ∑ start_POSTSUBSCRIPT italic_m ∈ roman_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT roman_a start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT. Combining the sending and receiving end information into a single matrix, we obtain Laplacian matrix 𝐋𝐋\mathbf{L}bold_L = [ljmsubscriptl𝑗𝑚\mathrm{l}_{jm}roman_l start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT], where ljmsubscriptl𝑗𝑚\mathrm{l}_{jm}roman_l start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT are its elements defined such that, 𝐋𝐋\mathbf{L}bold_L = 𝐃in𝐀Gsubscript𝐃insubscript𝐀G{\mathbf{D}_{\text{in}}}–{\mathbf{A}_{\text{G}}}bold_D start_POSTSUBSCRIPT in end_POSTSUBSCRIPT – bold_A start_POSTSUBSCRIPT G end_POSTSUBSCRIPT. According to [22], local reference frequency and voltage of DER, as expressed in (1) and (2), are re-defined as:

ωj*(t)=ωnommjpPj(t)+Δωcj(t)superscriptsubscript𝜔𝑗tsubscript𝜔nomsubscriptsuperscriptmp𝑗subscriptP𝑗tΔ𝜔subscriptc𝑗t{{\omega}_{j}^{*}}\mathrm{(t)}=\omega_{\mathrm{nom}}-\mathrm{m}^{\mathrm{p}}_{% j}{\mathrm{P}_{j}}\mathrm{(t)}+\Delta{\omega\mathrm{c}}_{j}\mathrm{(t)}italic_ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT * end_POSTSUPERSCRIPT ( roman_t ) = italic_ω start_POSTSUBSCRIPT roman_nom end_POSTSUBSCRIPT - roman_m start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT roman_P start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) + roman_Δ italic_ω roman_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) (3)
Vjd*(t)=VnomnjqQj(t)+ΔVcj(t)superscriptsubscriptV𝑗dtsubscriptVnomsubscriptsuperscriptnq𝑗subscriptQ𝑗tΔsubscriptVc𝑗t\mathrm{V}_{j}^{\mathrm{d*}}\mathrm{(t)}=\mathrm{V}_{\mathrm{nom}}-\mathrm{n}^% {\mathrm{q}}_{j}{\mathrm{Q}_{j}}\mathrm{(t)}+\Delta\mathrm{Vc}_{j}\mathrm{(t)}% \hskip 5.69046ptroman_V start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_d * end_POSTSUPERSCRIPT ( roman_t ) = roman_V start_POSTSUBSCRIPT roman_nom end_POSTSUBSCRIPT - roman_n start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT roman_Q start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) + roman_Δ roman_Vc start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) (4)

where, ΔωcΔ𝜔c\Delta{\mathrm{\omega}\mathrm{c}}roman_Δ italic_ω roman_c and ΔVcΔVc\Delta{\mathrm{Vc}}roman_Δ roman_Vc are the frequency and voltage correction terms from the SC, expressed as:

Δωcj(t)=Δ𝜔subscriptc𝑗tabsent\displaystyle\Delta{\omega\mathrm{c}}_{j}\mathrm{(t)}=roman_Δ italic_ω roman_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) = H1(s)[ωnomωj(t)+\displaystyle-\mathrm{H}_{1}(s)[\mathrm{\omega_{nom}}-\omega_{j}\mathrm{(t)}+- roman_H start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ( italic_s ) [ italic_ω start_POSTSUBSCRIPT roman_nom end_POSTSUBSCRIPT - italic_ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) + (5)
gjmNjajm(ωm(t)ωj(t))+limit-fromsubscriptg𝑗subscript𝑚subscriptN𝑗subscripta𝑗𝑚subscript𝜔𝑚tsubscript𝜔𝑗t\displaystyle\mathrm{g}_{j}\sum\limits_{m\in{\mathrm{N}_{j}}}{{\mathrm{a}_{jm}% }\left(\mathrm{\omega}_{m}\mathrm{(t)}-\mathrm{\omega}_{j}\mathrm{(t)}\right)}+roman_g start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_m ∈ roman_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT roman_a start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT ( italic_ω start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( roman_t ) - italic_ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) ) +
gjmNjajm(mmpPm(t)mjpPj(t))]\displaystyle\mathrm{g}_{j}\sum\limits_{m\in{\mathrm{N}_{j}}}{{\mathrm{a}_{jm}% }\left(\mathrm{m}_{m}^{\mathrm{p}}\mathrm{P}_{m}\mathrm{(t)}-\mathrm{m}_{j}^{% \mathrm{p}}\mathrm{P}_{j}\mathrm{(t)}\right)}]roman_g start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_m ∈ roman_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT roman_a start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT ( roman_m start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT roman_P start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( roman_t ) - roman_m start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT roman_P start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) ) ]

Similarly,

ΔVcj(t)=H2(s)[gjmNjajm(nmqQm(t)njqQj(t))]ΔsubscriptVc𝑗tsubscriptH2sdelimited-[]subscriptg𝑗subscript𝑚subscriptN𝑗subscripta𝑗𝑚superscriptsubscriptn𝑚qsubscriptQ𝑚tsuperscriptsubscriptn𝑗qsubscriptQ𝑗t\Delta\mathrm{Vc}_{j}\mathrm{(t)}=-\mathrm{H_{2}(s)}[\mathrm{g}_{j}\sum\limits% _{m\in{\mathrm{N}_{j}}}{{\mathrm{a}_{jm}}\left(\mathrm{n}_{m}^{\mathrm{q}}% \mathrm{Q}_{m}\mathrm{(t)}-\mathrm{n}_{j}^{\mathrm{q}}\mathrm{Q}_{j}\mathrm{(t% )}\right)}]roman_Δ roman_Vc start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) = - roman_H start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( roman_s ) [ roman_g start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_m ∈ roman_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT roman_a start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT ( roman_n start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT roman_Q start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( roman_t ) - roman_n start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT roman_Q start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) ) ] (6)

where, H1(s)subscriptH1s\mathrm{H_{1}(s)}roman_H start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ( roman_s ) and H2(s)subscriptH2s\mathrm{H_{2}(s)}roman_H start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( roman_s ) are PI controllers for frequency restoration along with proportional active power sharing; and proportional reactive power sharing, respectively. The local control input of SC can be given by:

𝐮j(t)=gjmNjajm(𝝈m(t)𝝈j(t))𝐞jm(t)subscript𝐮𝑗tsubscriptg𝑗subscript𝑚subscriptN𝑗subscriptsubscripta𝑗𝑚subscript𝝈𝑚tsubscript𝝈𝑗tsubscript𝐞𝑗𝑚t\textbf{u}_{j}\mathrm{(t)}=\mathrm{g}_{j}\sum\limits_{m\in{\mathrm{N}_{j}}}% \underbrace{{{\mathrm{a}_{jm}}\left(\bm{\sigma}_{m}\mathrm{(t)}-\bm{\sigma}_{j% }\mathrm{(t)}\right)}}_{\textbf{e}_{jm}\mathrm{(t)}}u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) = roman_g start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_m ∈ roman_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT under⏟ start_ARG roman_a start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT ( bold_italic_σ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( roman_t ) - bold_italic_σ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) ) end_ARG start_POSTSUBSCRIPT e start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT ( roman_t ) end_POSTSUBSCRIPT (7)

where, 𝐮j=[ujpujq]Tsubscript𝐮𝑗superscriptdelimited-[]superscriptsubscriptu𝑗psuperscriptsubscriptu𝑗qT\textbf{u}_{j}=[\mathrm{u}_{j}^{\mathrm{p}}\hskip 5.69046pt\mathrm{u}_{j}^{% \mathrm{q}}]^{\mathrm{T}}u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = [ roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT, 𝐞jm=[ejmpejmq]Tsubscript𝐞𝑗𝑚superscriptdelimited-[]superscriptsubscripte𝑗𝑚psuperscriptsubscripte𝑗𝑚qT\textbf{e}_{jm}=[\mathrm{e}_{jm}^{\mathrm{p}}\hskip 5.69046pt\mathrm{e}_{jm}^{% \mathrm{q}}]^{\mathrm{T}}e start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT = [ roman_e start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT roman_e start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT, depending on the elements in 𝝈𝝈\bm{\sigma}bold_italic_σ; and gjsubscriptg𝑗\mathrm{g}_{j}roman_g start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT is the convergence parameter.

These information exchanges can be limited by data availability cyber-attacks, which then aggravates the system monitoring and controllability due to missing information, as explained in the next section.

IV Overview of Data Availability Attacks

IV-A Latency Attacks and Data Dropouts

Description and challenges: Communication time-delays are an inherent part of any communication system encompassing four primary components: propagation delay, transmission delay, processing delay, and queuing delay [24]. In the DSC architecture, real-time periodic communication is essential for efficient operation. However, data congestion can introduce unpredictable delays, influenced by factors like cyber sampling rate, data volume, and cyber graph connection. These delays, ranging from milliseconds to seconds, can disrupt system operation if they exceed SC operational time limits [25]. Preventive measures are crucial to avoid missed updates that could lead to oscillatory instability or system failure.

Furthermore, cyber attackers can exacerbate issues by intentionally adding time delays to critical messages, known as latency attacks (as shown in Fig. 3(a)). This can severely impact time-critical information transfer between SCs. Network congestion can also cause frequent data dropouts (as shown in Fig. 3(a)), further compromising dynamic performance.
Attack model: The DSC fundamentally relies on the accurate transmission of data from neighboring agents. Latency attacks, which introduce falsifications in timing signals, pose a substantial threat to the operational stability of the system. These attacks can exert a profound influence on the control laws that govern the behavior of cyber-physical PES, potentially leading to significant deviations from desired performance.

In this context, considering the neighbors of the jthsuperscript𝑗𝑡j^{th}italic_j start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT agent be denoted as Nj=m|(xm,xj)𝐄subscriptN𝑗conditional𝑚subscriptx𝑚subscriptx𝑗𝐄\mathrm{N}_{j}={{m}\ |\ (\mathrm{x}_{m},\mathrm{x}_{j})\in\mathbf{E}}roman_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = italic_m | ( roman_x start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT , roman_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ∈ bold_E. The local control input of the SC, when subjected to latency attack is:

𝐮jL(t)=gjmNjajm(𝝈m(tτm)𝝈j(tτj))superscriptsubscript𝐮𝑗L𝑡subscriptg𝑗subscript𝑚subscriptN𝑗subscripta𝑗𝑚subscript𝝈𝑚tsubscript𝜏𝑚subscript𝝈𝑗tsubscript𝜏𝑗\textbf{u}_{j}^{\mathrm{L}}(t)=\mathrm{g}_{j}\sum\limits_{m\in{\mathrm{N}_{j}}% }{{\mathrm{a}_{jm}}\left(\bm{\sigma}_{m}(\mathrm{t}-\mathrm{\tau}_{m})-\bm{% \sigma}_{j}(\mathrm{t}-\mathrm{\tau}_{j})\right)}u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_L end_POSTSUPERSCRIPT ( italic_t ) = roman_g start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_m ∈ roman_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT roman_a start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT ( bold_italic_σ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( roman_t - italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ) - bold_italic_σ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t - italic_τ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ) (8)

where, τjsubscript𝜏𝑗\mathrm{\tau}_{j}italic_τ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT and τmsubscript𝜏𝑚\mathrm{\tau}_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT are the delays from the local and neighbouring agents. By Leibnitz formula, the delayed parameter can be expressed as, σ(tτ)=σ(t)tτtσ˙(s)ds𝜎t𝜏𝜎tsuperscriptsubscriptt𝜏t˙𝜎sds\mathrm{\sigma(t-\tau)=\sigma(t)-\int_{t-\tau}^{t}\dot{\sigma}(s)ds}italic_σ ( roman_t - italic_τ ) = italic_σ ( roman_t ) - ∫ start_POSTSUBSCRIPT roman_t - italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_t end_POSTSUPERSCRIPT over˙ start_ARG italic_σ end_ARG ( roman_s ) roman_ds. For a delay of τmsubscript𝜏𝑚\mathrm{\tau}_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT, substituting this in (8), we obtain, σ˙(t)=𝐋σ(t)𝐀tτmtσ˙(s)ds˙𝜎t𝐋𝜎t𝐀superscriptsubscripttsubscript𝜏mt˙𝜎sds\mathrm{\dot{\sigma}(t)=-\textbf{L}\sigma(t)-\textbf{A}\int_{t-\tau_{m}}^{t}% \dot{\sigma}(s)ds}over˙ start_ARG italic_σ end_ARG ( roman_t ) = - L italic_σ ( roman_t ) - A ∫ start_POSTSUBSCRIPT roman_t - italic_τ start_POSTSUBSCRIPT roman_m end_POSTSUBSCRIPT end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_t end_POSTSUPERSCRIPT over˙ start_ARG italic_σ end_ARG ( roman_s ) roman_ds. Similarly, the expression for local delay can also be obtained. For a fixed, undirected and connected cyber graph, the equilibrium is reached, if and only if, 0<τ<π2λmax𝐋0𝜏𝜋2subscript𝜆max𝐋0<\mathrm{\tau}<\mathrm{\frac{\pi}{2\lambda_{max}\mathbf{L}}}0 < italic_τ < divide start_ARG italic_π end_ARG start_ARG 2 italic_λ start_POSTSUBSCRIPT roman_max end_POSTSUBSCRIPT bold_L end_ARG, with λmaxsubscript𝜆𝑚𝑎𝑥\lambda_{max}italic_λ start_POSTSUBSCRIPT italic_m italic_a italic_x end_POSTSUBSCRIPT being the largest eigenvalue of 𝐋𝐋\mathbf{L}bold_L. Thus, the communication delay (τ𝜏\mathrm{\tau}italic_τ) must be bounded inside these limits to obtain σ˙(t)=0˙𝜎t0\mathrm{\dot{\sigma}(t)=0}over˙ start_ARG italic_σ end_ARG ( roman_t ) = 0.

Refer to caption
Figure 3: (a) Latency attack and data dropout; and (b) TSA.
Refer to caption
Figure 4: Spoofing procedure for TSA. (a) Aligning TSA code phase with authentic one; (b) initiating attack by increasing TSA signal power; and (c) gradual alteration of the victim’s code to introduce timing error.
Refer to caption
Figure 5: (a) Proposed delay-aware semantic sampling scheme. (b) Deployment of the proposed scheme in real-time simulation testbed. The testbed is interfaced with Ethernet to facilitate establishment of IEC 61850 sampled values protocol.

IV-B Time Synchronization Attacks (TSAs)

Recently, there has been a significant upsurge in TSAs, which is becoming a growing concern across various sectors. This concern arises from the susceptibility of GPS signals to compromise by unintentional sources like radio frequency (RF) interference and space weather events such as solar flares. Such interference can result in timing errors or even complete signal loss, posing critical risks to time-sensitive applications.

Beyond unintentional disruptions, GPS receivers in devices like substation clocks or merging units face vulnerability to deliberate attacks by malicious actors. For instance, GNSS signals, transmitted by satellite constellations in medium earth orbit (MEO), exhibit low power levels, with a power density of fW/m2superscriptm2\mathrm{m}^{2}roman_m start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT (1015superscript101510^{-15}10 start_POSTSUPERSCRIPT - 15 end_POSTSUPERSCRIPT W/m2superscriptm2\mathrm{m}^{2}roman_m start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT) upon reaching the Earth’s surface [26]. To illustrate, this is akin to observing a 25 W light bulb from a distance of 10,000 miles. Consequently, these signals become susceptible to blocking or jamming over extensive areas through low-power terrestrial transmitters, effectively saturating the GNSS signal spectrum with noise or an unmodulated carrier.

While the blocking/jamming attack is relatively straightforward to detect due to a complete time loss, spoofing of GNSS signals presents a more challenging threat. Spoofing entails the broadcast of fraudulent GPS signals or the rebroadcasting of GPS signals captured at a different time-step at the target receiver (as shown in Fig. 3(b)). This deceptive manipulation can lead to time synchronization loss, diminishing network synchronization performance and, consequently, reducing the stability and reliability of the PES.

Attack model: GNSS timing relies on phase of pseudo-random noise (PRN) codes within received signals [15]. To manipulate timing results, TSA signals must alter these values, as shown in Fig. 4. Initially, the attacker aligns TSA signal code phases with authentic ones, maintaining a relatively low signal power, as shown in Fig. 4(a). Once alignment is achieved, the attack can be initiated at any time by increasing TSA signal power while slowly shifting code phases away, as shown in Fig. 4(b). Tracking loops will then lock onto TSA correlation peaks due to their higher power, enabling TSA signals to dominate all tracking loops without causing them to lose lock on signals. Simultaneously, the victim’s code undergo gradual alteration, introducing errors into the timing results, as shown in Fig. 4(c). More details regarding TSA modelling can be referred from [10].

In such events the time-stamped data of the victim node, 𝝈m(t)subscript𝝈𝑚t\bm{\sigma}_{m}\mathrm{(t)}bold_italic_σ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( roman_t ) is manipulated by an offset of nTssubscriptnTs\mathrm{nT_{s}}roman_nT start_POSTSUBSCRIPT roman_s end_POSTSUBSCRIPT samples, the resultant attacked information can be expressed as:

σmT(t)=σm(t±nTs)superscriptsubscript𝜎𝑚Ttsubscript𝜎𝑚plus-or-minustsubscriptnTs\sigma_{m}^{\mathrm{T}}\mathrm{(t)}=\sigma_{m}\mathrm{(t\pm nT_{s})}italic_σ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT ( roman_t ) = italic_σ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( roman_t ± roman_nT start_POSTSUBSCRIPT roman_s end_POSTSUBSCRIPT ) (9)

Whether the adversary chooses to add or subtract these nTssubscriptnTs\mathrm{nT_{s}}roman_nT start_POSTSUBSCRIPT roman_s end_POSTSUBSCRIPT samples, the timing information is compromised, which can lead to time synchronization loss. Consequently, inaccurate time stamps which reverberate through the entire system, exerts a detrimental influence on the precise coordinated operation of DERs within the PES. Within the SC, the integrator accumulates error based on the latest available data. The gradual accumulation of error over time can be substantial which can steer the control system away from its intended setpoint. The control system may exhibit undesirable behaviors such as oscillations, overshooting, etc. As the error accumulates and amplifies, it has the potential to induce instability.

In PES, the above-mentioned cyber attacks can result in a host of problems ranging from sub-optimal operating conditions to outright instability of the system. This instability may even cause inadvertent disconnection of sources/ loads, leading to partial/full shutdown of the system, thereby jeopardizing the security of electrical supply. To address these challenges, it is crucial to implement a robust control system to handle unpredictable delays. Therefore, efforts are accumulated to work in this direction, presented in the next section.

V Proposed Delay-Aware Semantic Sampling

As previously mentioned, the term semantics refers to the significance of information. By incorporating the concept of information semantics, this paper aims to provide a more nuanced and comprehensive understanding of the role of information in decision-making during delays in networked PES. The contextual representation of semantics in PES refers to capturing the attributes of inner control loop signals, such as timeliness and value, to reconstruct significant information necessary for delay compensation in scenarios involving random delay attacks. In distributed control of AC distribution systems, timely consensus negotiation among agents is crucial for global frequency regulation and proportional active/reactive power sharing. Semantic-aware transmission, which respects the time-dependent value of signals, is essential to ensure achieving the SC objectives.

Inputs: Error signals provided to VC (𝐞j𝐝𝐪𝐕𝐂(t)superscriptsubscript𝐞𝑗𝐝𝐪𝐕𝐂t\textbf{e}_{j}^{\textbf{dqVC}}\mathrm{(t)}e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT dqVC end_POSTSUPERSCRIPT ( roman_t )), length of window (W), downsampling factor (D), local control inputs to SC (𝐮j𝐩𝐪(t)superscriptsubscript𝐮𝑗𝐩𝐪t\textbf{u}_{j}^{\textbf{pq}}\mathrm{(t)}u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT pq end_POSTSUPERSCRIPT ( roman_t )), tunable parameter (α𝛼\alphaitalic_α), controller time constant of H1(s)subscriptH1s\mathrm{H_{1}(s)}roman_H start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ( roman_s ) and H2(s)subscriptH2s\mathrm{H_{2}(s)}roman_H start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( roman_s ) PI control loops (T=Kp/KiTsubscriptKpsubscriptKi\mathrm{T=K_{p}/K_{i}}roman_T = roman_K start_POSTSUBSCRIPT roman_p end_POSTSUBSCRIPT / roman_K start_POSTSUBSCRIPT roman_i end_POSTSUBSCRIPT), triggering moment (tasubscriptt𝑎\mathrm{t}_{a}roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT), tunable gains (k1subscriptk1\mathrm{k_{1}}roman_k start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT and k2subscriptk2\mathrm{k_{2}}roman_k start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT)
Signals: impulse response (δ[w]𝛿delimited-[]𝑤\delta[w]italic_δ [ italic_w ]), downsampled signal (𝐞j𝐝𝐪𝐃(t)superscriptsubscript𝐞𝑗𝐝𝐪𝐃t\textbf{e}_{j}^{\textbf{dqD}}\mathrm{(t)}e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT dqD end_POSTSUPERSCRIPT ( roman_t )), error fed to prediction policy (𝐞j(ta)subscript𝐞𝑗subscriptt𝑎\textbf{e}_{j}(\mathrm{t}_{a})e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT )), reconstructed signals (𝐞j𝐑(ta)superscriptsubscript𝐞𝑗𝐑subscriptt𝑎\textbf{e}_{j}^{\textbf{R}}(\mathrm{t}_{a})e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT R end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT )), final predictive inputs to SC (𝐮j𝐩𝐪𝐟(t)superscriptsubscript𝐮𝑗𝐩𝐪𝐟t\textbf{u}_{j}^{\textbf{pqf}}\mathrm{(t)}u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT pqf end_POSTSUPERSCRIPT ( roman_t )), freshness (F(t)Ft\mathrm{F}\mathrm{(t)}roman_F ( roman_t )), relevance (R(t)Rt\mathrm{R(t)}roman_R ( roman_t )), u(t)ut\mathrm{u(t)}roman_u ( roman_t ) is the timestamp of the latest packet received at destination by time tt\mathrm{t}roman_t.
Note: 𝐞j𝐝𝐪𝐕𝐂(t)=[ejdVC(t)ejqVC(t)]Tsuperscriptsubscript𝐞𝑗𝐝𝐪𝐕𝐂tsuperscriptdelimited-[]superscriptsubscripte𝑗dVCtsuperscriptsubscripte𝑗qVCtT\textbf{e}_{j}^{\textbf{dqVC}}\mathrm{(t)}=[\mathrm{e}_{j}^{\mathrm{dVC}}% \mathrm{(t)}\hskip 5.69046pt\mathrm{e}_{j}^{\mathrm{qVC}}\mathrm{(t)}]^{% \mathrm{T}}e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT dqVC end_POSTSUPERSCRIPT ( roman_t ) = [ roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dVC end_POSTSUPERSCRIPT ( roman_t ) roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qVC end_POSTSUPERSCRIPT ( roman_t ) ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT, 𝐞j𝐝𝐪𝐃(t)=[ejdD(t)ejqD(t)]Tsuperscriptsubscript𝐞𝑗𝐝𝐪𝐃tsuperscriptdelimited-[]superscriptsubscripte𝑗dD𝑡superscriptsubscripte𝑗qD𝑡T\textbf{e}_{j}^{\textbf{dqD}}\mathrm{(t)}=[\mathrm{e}_{j}^{\mathrm{dD}}(t)% \hskip 5.69046pt\mathrm{e}_{j}^{\mathrm{qD}}(t)]^{\mathrm{T}}e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT dqD end_POSTSUPERSCRIPT ( roman_t ) = [ roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dD end_POSTSUPERSCRIPT ( italic_t ) roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qD end_POSTSUPERSCRIPT ( italic_t ) ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT, 𝐮j(t)=[ujp(t)ujq(t)]Tsubscript𝐮𝑗tsuperscriptdelimited-[]superscriptsubscriptu𝑗ptsuperscriptsubscriptu𝑗qtT\textbf{u}_{j}\mathrm{(t)}=[\mathrm{u}_{j}^{\mathrm{p}}\mathrm{(t)}\hskip 5.69% 046pt\mathrm{u}_{j}^{\mathrm{q}}\mathrm{(t)}]^{\mathrm{T}}u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t ) = [ roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT ( roman_t ) roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT ( roman_t ) ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT, 𝐞j(ta)=[ejp(ta)ejq(ta)]Tsubscript𝐞𝑗subscriptt𝑎superscriptdelimited-[]superscriptsubscripte𝑗psubscriptt𝑎superscriptsubscripte𝑗qsubscriptt𝑎T\textbf{e}_{j}(\mathrm{t}_{a})=[{\mathrm{e}_{j}^{\mathrm{p}}(\mathrm{t}_{a})% \hskip 5.69046pt\mathrm{e}_{j}^{\mathrm{q}}(\mathrm{t}_{a})}]^{\mathrm{T}}e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) = [ roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT, 𝐞j𝐑(ta)=[ejRp(ta)ejRq(ta)]Tsuperscriptsubscript𝐞𝑗𝐑subscriptt𝑎superscriptdelimited-[]superscriptsubscripte𝑗Rpsubscriptt𝑎superscriptsubscripte𝑗Rqsubscriptt𝑎T\textbf{e}_{j}^{\textbf{R}}(\mathrm{t}_{a})=[\mathrm{e}_{j}^{\mathrm{Rp}}(% \mathrm{t}_{a})\hskip 5.69046pt\mathrm{e}_{j}^{\mathrm{Rq}}(\mathrm{t}_{a})]^{% \mathrm{T}}e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT R end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) = [ roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_Rp end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_Rq end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT, 𝐮j𝐩𝐪𝐟(t)=[ujpf(t)ujqf(t)]Tsuperscriptsubscript𝐮𝑗𝐩𝐪𝐟tsuperscriptdelimited-[]superscriptsubscriptu𝑗pftsuperscriptsubscriptu𝑗qftT\textbf{u}_{j}^{\textbf{pqf}}\mathrm{(t)}=[\mathrm{u}_{j}^{\mathrm{pf}}\mathrm% {(t)}\hskip 5.69046pt\mathrm{u}_{j}^{\mathrm{qf}}\mathrm{(t)}]^{\mathrm{T}}u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT pqf end_POSTSUPERSCRIPT ( roman_t ) = [ roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_pf end_POSTSUPERSCRIPT ( roman_t ) roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qf end_POSTSUPERSCRIPT ( roman_t ) ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT
Data: i0𝑖0i\geq 0italic_i ≥ 0
Ii𝐼𝑖I\leftarrow iitalic_I ← italic_i;
// Initialize: F(t)=0Ft0\mathrm{F}(\mathrm{t})=0roman_F ( roman_t ) = 0, R(t)0Rt0\mathrm{R(t)}\neq 0roman_R ( roman_t ) ≠ 0
while I0𝐼0I\neq 0italic_I ≠ 0 do
       if (F(t)=0&&R(t)0\mathrm{F}(\mathrm{t})=0\hskip 5.69046pt\&\&\hskip 5.69046pt\mathrm{R(t)}\neq 0roman_F ( roman_t ) = 0 & & roman_R ( roman_t ) ≠ 0) then
             // Compute freshness (14): F(t)=tu(t)Fttut\mathrm{F}(\mathrm{t})=\mathrm{t}-\mathrm{u(t)}roman_F ( roman_t ) = roman_t - roman_u ( roman_t )
             // Process-aware sparse sampling (10), (11) ejdD=w=0W1ejdVC[nDw].δ[w]formulae-sequencesuperscriptsubscripte𝑗dDsuperscriptsubscript𝑤0W1superscriptsubscripte𝑗dVCdelimited-[]nD𝑤𝛿delimited-[]𝑤\mathrm{e}_{j}^{\mathrm{dD}}=\sum_{w=0}^{\mathrm{W-1}}\mathrm{e}_{j}^{\mathrm{% dVC}}[\mathrm{nD}-w].\delta[w]roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dD end_POSTSUPERSCRIPT = ∑ start_POSTSUBSCRIPT italic_w = 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_W - 1 end_POSTSUPERSCRIPT roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dVC end_POSTSUPERSCRIPT [ roman_nD - italic_w ] . italic_δ [ italic_w ]
             ejqD=w=0W1ejqVC[nDw].δ[w]formulae-sequencesuperscriptsubscripte𝑗qDsuperscriptsubscript𝑤0W1superscriptsubscripte𝑗qVCdelimited-[]nD𝑤𝛿delimited-[]𝑤\mathrm{e}_{j}^{\mathrm{qD}}=\sum_{w=0}^{\mathrm{W-1}}\mathrm{e}_{j}^{\mathrm{% qVC}}[\mathrm{nD}-w].\delta[w]roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qD end_POSTSUPERSCRIPT = ∑ start_POSTSUBSCRIPT italic_w = 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_W - 1 end_POSTSUPERSCRIPT roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qVC end_POSTSUPERSCRIPT [ roman_nD - italic_w ] . italic_δ [ italic_w ]
             // Error generated for prediction policy (12)
             𝐞j(ta)=[ejdD(ta)ejqD(ta)]𝐮jsubscript𝐞𝑗subscriptt𝑎delimited-[]superscriptsubscripte𝑗dDsubscriptt𝑎superscriptsubscripte𝑗qDsubscriptt𝑎subscript𝐮𝑗\textbf{e}_{j}(\mathrm{t}_{a})=[{\mathrm{e}_{j}^{\mathrm{dD}}(\mathrm{t}_{a})% \hskip 2.84544pt\mathrm{e}_{j}^{\mathrm{qD}}(\mathrm{t}_{a})}]-\textbf{u}_{j}e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) = [ roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dD end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qD end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) ] - u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT
             // Triggers generation with the prediction policy condition (13)
             if (||ej(ta)||>α||et/T.[ejdVCejqVC]||||\textbf{e}_{j}(\mathrm{t}_{a})||>\alpha||e^{-\mathrm{t/T}}.[\mathrm{e}_{j}^{% \mathrm{dVC}}\hskip 2.84544pt\mathrm{e}_{j}^{\mathrm{qVC}}]||| | e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) | | > italic_α | | italic_e start_POSTSUPERSCRIPT - roman_t / roman_T end_POSTSUPERSCRIPT . [ roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dVC end_POSTSUPERSCRIPT roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qVC end_POSTSUPERSCRIPT ] | |) then
                   // Reconstruction of signals
                   𝐞j𝐑(rta+Γ)superscriptsubscript𝐞𝑗𝐑𝑟subscriptt𝑎Γ\textbf{e}_{j}^{\textbf{R}}(r\mathrm{t}_{a}+\Gamma)e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT R end_POSTSUPERSCRIPT ( italic_r roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT + roman_Γ )=𝐞j(rta)subscript𝐞𝑗𝑟subscriptt𝑎\textbf{e}_{j}(r\mathrm{t}_{a})e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( italic_r roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ); 0Γ<taabsentΓsubscriptt𝑎\leq\Gamma<\mathrm{t}_{a}≤ roman_Γ < roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT and r=0,1,2,…
                   // Reconstructed signals fed back to SC with tunable gains (15)
                   ejpφ(ta)=k1ejRp(ta)superscriptsubscripte𝑗p𝜑subscriptt𝑎subscriptk1superscriptsubscripte𝑗Rpsubscriptt𝑎\mathrm{e}_{j}^{\mathrm{p}\varphi}(\mathrm{t}_{a})=\mathrm{k_{1}}\mathrm{e}_{j% }^{\mathrm{Rp}}(\mathrm{t}_{a})\hskip 2.84544ptroman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p italic_φ end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) = roman_k start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_Rp end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT )
                   ejqφ(ta)=k2ejRq(ta)superscriptsubscripte𝑗q𝜑subscriptt𝑎subscriptk2superscriptsubscripte𝑗Rqsubscriptt𝑎\mathrm{e}_{j}^{\mathrm{q}\varphi}(\mathrm{t}_{a})=\mathrm{k_{2}}\mathrm{e}_{j% }^{\mathrm{Rq}}(\mathrm{t}_{a})roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q italic_φ end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) = roman_k start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_Rq end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT )
                   // Final predictive inputs fed to the SC for delay compensation (16)
                   ujpf(t)=ujp(t)+ejpφ(ta)superscriptsubscriptu𝑗pftsuperscriptsubscriptu𝑗ptsuperscriptsubscripte𝑗p𝜑subscriptt𝑎\mathrm{u}_{j}^{\mathrm{pf}}\mathrm{(t)}=\mathrm{u}_{j}^{\mathrm{p}}\mathrm{(t% )}+\mathrm{e}_{j}^{\mathrm{p}\varphi}(\mathrm{t}_{a})\hskip 2.84544ptroman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_pf end_POSTSUPERSCRIPT ( roman_t ) = roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT ( roman_t ) + roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p italic_φ end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT )
                   ujqf(t)=ujq(t)+ejqφ(ta)superscriptsubscriptu𝑗qftsuperscriptsubscriptu𝑗qtsuperscriptsubscripte𝑗q𝜑subscriptt𝑎\mathrm{u}_{j}^{\mathrm{qf}}\mathrm{(t)}=\mathrm{u}_{j}^{\mathrm{q}}\mathrm{(t% )}+\mathrm{e}_{j}^{\mathrm{q}\varphi}(\mathrm{t}_{a})roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qf end_POSTSUPERSCRIPT ( roman_t ) = roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT ( roman_t ) + roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q italic_φ end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT )
                   // Compute relevance (14): R(t)=𝐞j𝐞j𝐑Rtsubscript𝐞𝑗superscriptsubscript𝐞𝑗𝐑\mathrm{R(t)}=\textbf{e}_{j}-\textbf{e}_{j}^{\textbf{R}}roman_R ( roman_t ) = e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT R end_POSTSUPERSCRIPT
                  
            else
                  // No reconstruction: R(t)=0Rt0\mathrm{R(t)=0}roman_R ( roman_t ) = 0
                  
             end if
            
      else
            // Compute freshness (14): F(t)=tu(t)Fttut\mathrm{F}(\mathrm{t})=\mathrm{t}-\mathrm{u(t)}roman_F ( roman_t ) = roman_t - roman_u ( roman_t )
            
       end if
      
end while
Algorithm 1 Proposed delay-aware semantic sampling scheme at jthsuperscript𝑗𝑡j^{th}italic_j start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT DER

Time-critical applications like smart grids and networked control require a restructured message transfer system due to the huge amount of data involved. Hence, this paper proposes a semantic sampling architecture as shown in Fig. 5, that generates and transmits the right amount of data to the right place at the right time. This includes following steps:

  1. i.

    Delay-aware semantics: To comprehend the proposed approach, it is crucial to apply the PI consensusability law [27] to anticipate the physical layer semantics using the response of each control loop under disturbances. This proposed scheme is local to each SC and firstly extracts significant information from the error signal corresponding to the VC (𝐞j𝐝𝐪𝐕𝐂(t)superscriptsubscript𝐞𝑗𝐝𝐪𝐕𝐂t\textbf{e}_{j}^{\textbf{dqVC}}\mathrm{(t)}e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT dqVC end_POSTSUPERSCRIPT ( roman_t )). Here, 𝐞j𝐝𝐪𝐕𝐂(t)=[ejdVC(t)ejqVC(t)]Tsuperscriptsubscript𝐞𝑗𝐝𝐪𝐕𝐂tsuperscriptdelimited-[]superscriptsubscripte𝑗dVCtsuperscriptsubscripte𝑗qVCtT\textbf{e}_{j}^{\textbf{dqVC}}\mathrm{(t)}=[\mathrm{e}_{j}^{\mathrm{dVC}}% \mathrm{(t)}\hskip 5.69046pt\mathrm{e}_{j}^{\mathrm{qVC}}\mathrm{(t)}]^{% \mathrm{T}}e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT dqVC end_POSTSUPERSCRIPT ( roman_t ) = [ roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dVC end_POSTSUPERSCRIPT ( roman_t ) roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qVC end_POSTSUPERSCRIPT ( roman_t ) ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT.

  2. ii.

    Process-aware sparse sampling [28], [29]: The signal 𝐞j𝐝𝐪𝐕𝐂(t)superscriptsubscript𝐞𝑗𝐝𝐪𝐕𝐂t\textbf{e}_{j}^{\textbf{dqVC}}\mathrm{(t)}e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT dqVC end_POSTSUPERSCRIPT ( roman_t ), is then downsampled (shown in Fig. 5(a)), as:

    ejdD=w=0W1ejdVC[nDw].δ[w]formulae-sequencesuperscriptsubscripte𝑗dDsuperscriptsubscript𝑤0W1superscriptsubscripte𝑗dVCdelimited-[]nD𝑤𝛿delimited-[]𝑤\mathrm{e}_{j}^{\mathrm{dD}}=\sum_{w=0}^{\mathrm{W-1}}\mathrm{e}_{j}^{\mathrm{% dVC}}[\mathrm{nD}-w].\delta[w]roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dD end_POSTSUPERSCRIPT = ∑ start_POSTSUBSCRIPT italic_w = 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_W - 1 end_POSTSUPERSCRIPT roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dVC end_POSTSUPERSCRIPT [ roman_nD - italic_w ] . italic_δ [ italic_w ] (10)
    ejqD=w=0W1ejqVC[nDw].δ[w]formulae-sequencesuperscriptsubscripte𝑗qDsuperscriptsubscript𝑤0W1superscriptsubscripte𝑗qVCdelimited-[]nD𝑤𝛿delimited-[]𝑤\mathrm{e}_{j}^{\mathrm{qD}}=\sum_{w=0}^{\mathrm{W-1}}\mathrm{e}_{j}^{\mathrm{% qVC}}[\mathrm{nD}-w].\delta[w]roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qD end_POSTSUPERSCRIPT = ∑ start_POSTSUBSCRIPT italic_w = 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_W - 1 end_POSTSUPERSCRIPT roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qVC end_POSTSUPERSCRIPT [ roman_nD - italic_w ] . italic_δ [ italic_w ] (11)

    where, δ[w]𝛿delimited-[]𝑤\delta[w]italic_δ [ italic_w ] is an impulse response, W is the length of window, D is the downsampling factor. Downsampling is a resampling technique that decreases the resolution of the incoming signal, typically used to minimize memory usage. However, in this study, it is performed to align the dynamic performance of error quantities fed to VC (i.e, ejdVC(t)superscriptsubscripte𝑗dVCt\mathrm{e}_{j}^{\mathrm{dVC}}\mathrm{(t)}roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dVC end_POSTSUPERSCRIPT ( roman_t ) and ejqVC(t)superscriptsubscripte𝑗qVCt\mathrm{e}_{j}^{\mathrm{qVC}}\mathrm{(t)}roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qVC end_POSTSUPERSCRIPT ( roman_t )) and error fed to SC (i.e, 𝐮j(t)subscript𝐮𝑗t\textbf{u}_{j}\mathrm{(t)}u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t )). This crucial step aids in the synchronization of the multi-time scale error signals. This approach significantly lowers device energy consumption. This effect is rooted in the definition of energy consumption, which is the product of power consumption and processing time for each sample [30]. Downsampling, by reducing the number of samples based on the D, decreases energy consumption as D increases. This is crucial particularly for low-power/energy-harvesting sensors, while also enabling efficient bandwidth utilization.

  3. iii.

    Effective decision making: The generated downsampled signals (ejdD(t)superscriptsubscripte𝑗dDt\mathrm{e}_{j}^{\mathrm{dD}}\mathrm{(t)}roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dD end_POSTSUPERSCRIPT ( roman_t ) and ejqD(t)superscriptsubscripte𝑗qDt\mathrm{e}_{j}^{\mathrm{qD}}\mathrm{(t)}roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qD end_POSTSUPERSCRIPT ( roman_t )) are compared with the local control inputs from the SC (i.e, ujp(t)superscriptsubscriptu𝑗pt\mathrm{u}_{j}^{\mathrm{p}}\mathrm{(t)}roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT ( roman_t ) and ujq(t)superscriptsubscriptu𝑗qt\mathrm{u}_{j}^{\mathrm{q}}\mathrm{(t)}roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT ( roman_t )), as shown in Fig. 5(a). The semantic prediction policy subsequently rebuilds the signals used for delay compensation (i.e, 𝐞j(ta)=[ejp(ta)ejq(ta)]Tsubscript𝐞𝑗subscriptt𝑎superscriptdelimited-[]superscriptsubscripte𝑗psubscriptt𝑎superscriptsubscripte𝑗qsubscriptt𝑎T\textbf{e}_{j}(\mathrm{t}_{a})=[{\mathrm{e}_{j}^{\mathrm{p}}(\mathrm{t}_{a})% \hskip 5.69046pt\mathrm{e}_{j}^{\mathrm{q}}(\mathrm{t}_{a})}]^{\mathrm{T}}e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) = [ roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT) as:

    𝐞j(ta)=[ejdD(ta)ejqD(ta)]𝐮jsubscript𝐞𝑗subscriptt𝑎delimited-[]superscriptsubscripte𝑗dDsubscriptt𝑎superscriptsubscripte𝑗qDsubscriptt𝑎subscript𝐮𝑗\textbf{e}_{j}(\mathrm{t}_{a})=[{\mathrm{e}_{j}^{\mathrm{dD}}(\mathrm{t}_{a})% \hskip 5.69046pt\mathrm{e}_{j}^{\mathrm{qD}}(\mathrm{t}_{a})}]-\textbf{u}_{j}e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) = [ roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dD end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qD end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) ] - u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT (12)

    Additionally, the error is fed into the prediction policy stage to generate a signal that compensates for significant delays. The prediction policy condition is expressed as:

    ||𝐞j(ta)||>α||et/T.[ejdVCejqVC]||||\textbf{e}_{j}(\mathrm{t}_{a})||>\alpha||e^{-\mathrm{t/T}}.[\mathrm{e}_{j}^{% \mathrm{dVC}}\hskip 5.69046pt\mathrm{e}_{j}^{\mathrm{qVC}}]||| | e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) | | > italic_α | | italic_e start_POSTSUPERSCRIPT - roman_t / roman_T end_POSTSUPERSCRIPT . [ roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dVC end_POSTSUPERSCRIPT roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qVC end_POSTSUPERSCRIPT ] | | (13)

    where, α𝛼\alphaitalic_α is a tunable parameter, T=Kp/KiTsubscriptKpsubscriptKi\mathrm{T=K_{p}/K_{i}}roman_T = roman_K start_POSTSUBSCRIPT roman_p end_POSTSUBSCRIPT / roman_K start_POSTSUBSCRIPT roman_i end_POSTSUBSCRIPT is the controller time constant of H1(s)subscriptH1s\mathrm{H_{1}(s)}roman_H start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ( roman_s ) and H2(s)subscriptH2s\mathrm{H_{2}(s)}roman_H start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT ( roman_s ) PI control loops. If the condition expressed in (13) is met, triggers are produced. These triggers are utilized to reconstruct 𝐞j𝐑(ta)superscriptsubscript𝐞𝑗𝐑subscriptt𝑎\textbf{e}_{j}^{\textbf{R}}(\mathrm{t}_{a})e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT R end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) using a sample-and-hold circuitry, with tasubscriptt𝑎\mathrm{t}_{a}roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT being the triggering instant. This is followed by evaluation of semantic attributes i.e, freshness (F(t)Ft\mathrm{F}\mathrm{(t)}roman_F ( roman_t )), value and relevance (R(t)Rt\mathrm{R(t)}roman_R ( roman_t )) defined as:

    F(t)=tu(t),R(t)=𝐞j(t)𝐞j𝐑(t)formulae-sequenceFttutRtsubscript𝐞𝑗𝑡superscriptsubscript𝐞𝑗𝐑𝑡\mathrm{F}\mathrm{(t)}=\mathrm{t}-\mathrm{u(t)}\hskip 5.69046pt,\hskip 5.69046% pt\mathrm{R(t)}=\textbf{e}_{j}(t)-\textbf{e}_{j}^{\textbf{R}}(t)roman_F ( roman_t ) = roman_t - roman_u ( roman_t ) , roman_R ( roman_t ) = e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( italic_t ) - e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT R end_POSTSUPERSCRIPT ( italic_t ) (14)

    where, u(t)ut\mathrm{u(t)}roman_u ( roman_t ) is the timestamp of the latest packet received at destination by time tt\mathrm{t}roman_t.

  4. iv.

    Feedback generation: The resulting reconstructed signals are subsequently fed back to SC, with their tunable gains, k1subscriptk1\mathrm{k_{1}}roman_k start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT and k2subscriptk2\mathrm{k_{2}}roman_k start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT, represented as:

    ejpφ(ta)=k1ejRp(ta),ejqφ(ta)=k2ejRq(ta)formulae-sequencesuperscriptsubscripte𝑗p𝜑subscriptt𝑎subscriptk1superscriptsubscripte𝑗Rpsubscriptt𝑎superscriptsubscripte𝑗q𝜑subscriptt𝑎subscriptk2superscriptsubscripte𝑗Rqsubscriptt𝑎\mathrm{e}_{j}^{\mathrm{p}\varphi}(\mathrm{t}_{a})=\mathrm{k_{1}}\mathrm{e}_{j% }^{\mathrm{Rp}}(\mathrm{t}_{a})\hskip 5.69046pt,\hskip 5.69046pt\mathrm{e}_{j}% ^{\mathrm{q}\varphi}(\mathrm{t}_{a})=\mathrm{k_{2}}\mathrm{e}_{j}^{\mathrm{Rq}% }(\mathrm{t}_{a})roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p italic_φ end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) = roman_k start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_Rp end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) , roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q italic_φ end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) = roman_k start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_Rq end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) (15)

    where, 𝐞j𝐑(ta)=[ejRp(ta)ejRq(ta)]Tsuperscriptsubscript𝐞𝑗𝐑subscriptt𝑎superscriptdelimited-[]superscriptsubscripte𝑗Rpsubscriptt𝑎superscriptsubscripte𝑗Rqsubscriptt𝑎T\textbf{e}_{j}^{\textbf{R}}(\mathrm{t}_{a})=[\mathrm{e}_{j}^{\mathrm{Rp}}(% \mathrm{t}_{a})\hskip 5.69046pt\mathrm{e}_{j}^{\mathrm{Rq}}(\mathrm{t}_{a})]^{% \mathrm{T}}e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT R end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) = [ roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_Rp end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_Rq end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) ] start_POSTSUPERSCRIPT roman_T end_POSTSUPERSCRIPT. Finally these inputs are added to the control inputs of SC as:

    ujpf(t)=ujp(t)+ejpφ(ta),ujqf(t)=ujq(t)+ejqφ(ta)formulae-sequencesuperscriptsubscriptu𝑗pftsuperscriptsubscriptu𝑗ptsuperscriptsubscripte𝑗p𝜑subscriptt𝑎superscriptsubscriptu𝑗qftsuperscriptsubscriptu𝑗qtsuperscriptsubscripte𝑗q𝜑subscriptt𝑎\mathrm{u}_{j}^{\mathrm{pf}}\mathrm{(t)}=\mathrm{u}_{j}^{\mathrm{p}}\mathrm{(t% )}+\mathrm{e}_{j}^{\mathrm{p}\varphi}(\mathrm{t}_{a})\hskip 5.69046pt,\hskip 5% .69046pt\mathrm{u}_{j}^{\mathrm{qf}}\mathrm{(t)}=\mathrm{u}_{j}^{\mathrm{q}}% \mathrm{(t)}+\mathrm{e}_{j}^{\mathrm{q}\varphi}(\mathrm{t}_{a})roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_pf end_POSTSUPERSCRIPT ( roman_t ) = roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT ( roman_t ) + roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p italic_φ end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) , roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qf end_POSTSUPERSCRIPT ( roman_t ) = roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT ( roman_t ) + roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q italic_φ end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) (16)

    where, ujpfsuperscriptsubscriptu𝑗pf\mathrm{u}_{j}^{\mathrm{pf}}roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_pf end_POSTSUPERSCRIPT and ujqfsuperscriptsubscriptu𝑗qf\mathrm{u}_{j}^{\mathrm{qf}}roman_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qf end_POSTSUPERSCRIPT are the final predictive inputs to the SC to compensate the delays.

The control objectives of the proposed delay-aware semantic sampling scheme, may be summarized as:

  1. (i)

    To address delayed communication signals resulting from latency attacks, data dropouts, or TSAs by incorporating semantic principles into the sampling process for each DER. This integration enables the generation of reconstruction signals (fed back to local SC), based on the inner control layer dynamics.

  2. (ii)

    To evaluate the reconstruction phase by filtering significant events caused during data availability attacks. Considering dynamic variation, prioritization of signals and computation of reconstruction error, reconstruction signals are tuned to generate delay compensation signals.

Thus, the scheme targets optimal information gathering, dissemination, and decision-making policies in cooperative networks, achieving jointly optimal performance. The convergence analysis of the proposed scheme is discussed further.

V-A Convergence Analysis of the Proposed Scheme

Let 𝚘(ta)𝚘subscriptt𝑎\texttt{o}(\mathrm{t}_{a})o ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) denotes the triggered samples of the respective signals when triggering condition is met during data availability attacks. The proposed delay-aware semantic sampling scheme’s convergence analysis is theoretically discussed and validated. Let the reconstructed signals (𝐞j𝐑(ta)superscriptsubscript𝐞𝑗𝐑subscriptt𝑎\textbf{e}_{j}^{\textbf{R}}(\mathrm{t}_{a})e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT R end_POSTSUPERSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT )) produce the triggered voltage correction term (ΔVc(ta)ΔVcsubscriptt𝑎\Delta{\mathrm{Vc}}(\mathrm{t}_{a})roman_Δ roman_Vc ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT )) and frequency correction term (Δωc(ta)Δ𝜔csubscriptt𝑎\Delta{\omega\mathrm{c}}(\mathrm{t}_{a})roman_Δ italic_ω roman_c ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT )) from the SC. Taking into account the triggered sampled measurements as:

Υ^j(k)=Υj(ta)subscript^Υ𝑗𝑘subscriptΥ𝑗subscriptt𝑎\hat{\Upsilon}_{j}(k)=\Upsilon_{j}(\mathrm{t}_{a})over^ start_ARG roman_Υ end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( italic_k ) = roman_Υ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) (17)

where, k[ta,ta+1]𝑘subscriptt𝑎subscriptt𝑎1k\in[\mathrm{t}_{a},\mathrm{t}_{a+1}]italic_k ∈ [ roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT , roman_t start_POSTSUBSCRIPT italic_a + 1 end_POSTSUBSCRIPT ] and Υj={ΔVcj,Δωcj}subscriptΥ𝑗Δ𝑉subscript𝑐𝑗Δ𝜔subscriptc𝑗\Upsilon_{j}=\{\Delta Vc_{j},\Delta\omega\mathrm{c}_{j}\}roman_Υ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = { roman_Δ italic_V italic_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , roman_Δ italic_ω roman_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT }. Let us define

yj(ta)=Υ^j(ta)1NjmNjΥjT(t)jMsubscript𝑦𝑗subscriptt𝑎subscript^Υ𝑗subscriptt𝑎1subscript𝑁𝑗subscript𝑚subscript𝑁𝑗superscriptsubscriptΥ𝑗𝑇𝑡for-all𝑗𝑀y_{j}(\mathrm{t}_{a})=\hat{\Upsilon}_{j}(\mathrm{t}_{a})-\frac{1}{N_{j}}\sum_{% m\in N_{j}}\Upsilon_{j}^{T}(t)\forall j\in Mitalic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) = over^ start_ARG roman_Υ end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT ) - divide start_ARG 1 end_ARG start_ARG italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG ∑ start_POSTSUBSCRIPT italic_m ∈ italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT roman_Υ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT ( italic_t ) ∀ italic_j ∈ italic_M (18)

Let taj,a=1,2,formulae-sequencesuperscriptsubscriptt𝑎𝑗for-all𝑎12\mathrm{t}_{a}^{j},\forall a=1,2,...roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_j end_POSTSUPERSCRIPT , ∀ italic_a = 1 , 2 , … represent the triggering instants in the jthsuperscript𝑗𝑡j^{th}italic_j start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT agent. M𝑀Mitalic_M is the total number of DERs in a network and Njsubscript𝑁𝑗N_{j}italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT is the neighbouring agents to jthsuperscript𝑗𝑡j^{th}italic_j start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT agent. Consequently, the sampled control input becomes a piece-wise constant function, where u^j(k)=uj(taNj)subscript^𝑢𝑗𝑘subscript𝑢𝑗superscriptsubscriptt𝑎subscript𝑁𝑗\hat{u}_{j}(k)=u_{j}(\mathrm{t}_{a}^{N_{j}})over^ start_ARG italic_u end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( italic_k ) = italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUPERSCRIPT ) for k[taNj,ta+1Nj)𝑘superscriptsubscriptt𝑎subscript𝑁𝑗superscriptsubscriptt𝑎1subscript𝑁𝑗k\in[\mathrm{t}_{a}^{N_{j}},\mathrm{t}_{a+1}^{N_{j}})italic_k ∈ [ roman_t start_POSTSUBSCRIPT italic_a end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUPERSCRIPT , roman_t start_POSTSUBSCRIPT italic_a + 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUPERSCRIPT ). Considering the initial condition Υ(0)Υ0\Upsilon(0)roman_Υ ( 0 ), the iteration within the proposed delay-aware semantic sampling scheme for the jthsuperscript𝑗𝑡j^{th}italic_j start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT agent is:

Υj(k+1)=Υj(k)+βjuj(k)subscriptΥ𝑗𝑘1subscriptΥ𝑗𝑘subscript𝛽𝑗subscript𝑢𝑗𝑘\Upsilon_{j}(k+1)=\Upsilon_{j}(k)+\beta_{j}u_{j}(k)roman_Υ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( italic_k + 1 ) = roman_Υ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( italic_k ) + italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( italic_k ) (19)

Here, βjsubscript𝛽𝑗\beta_{j}italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT represents the step length. Employing a Lyapunov candidate function, denoted as V(Υ(k))=f(Υ(k))f(Υ^(k))𝑉Υ𝑘𝑓Υ𝑘𝑓^Υ𝑘V(\Upsilon(k))=f(\Upsilon(k))-f(\hat{\Upsilon}(k))italic_V ( roman_Υ ( italic_k ) ) = italic_f ( roman_Υ ( italic_k ) ) - italic_f ( over^ start_ARG roman_Υ end_ARG ( italic_k ) ) for the system in (19), it is trivial to deduce from (18) to (19) that ΔV(Υ)=Δf(Υ)Δ𝑉ΥΔ𝑓Υ\Delta V(\Upsilon)=\Delta f(\Upsilon)roman_Δ italic_V ( roman_Υ ) = roman_Δ italic_f ( roman_Υ ). For all k0𝑘0k\geq 0italic_k ≥ 0,

ΔVj=1M{βjuj[mNi(ΥmΥ^j)uj]+M2βj2uj2}Δ𝑉superscriptsubscript𝑗1𝑀subscript𝛽𝑗subscript𝑢𝑗delimited-[]subscript𝑚subscript𝑁𝑖subscriptΥ𝑚subscript^Υ𝑗subscript𝑢𝑗𝑀2superscriptsubscript𝛽𝑗2superscriptsubscript𝑢𝑗2\Delta V\leq\sum_{j=1}^{M}\left\{\beta_{j}u_{j}\left[\sum_{m\in N_{i}}(% \Upsilon_{m}-\hat{\Upsilon}_{j})-u_{j}\right]+\frac{M}{2}\beta_{j}^{2}u_{j}^{2% }\right\}roman_Δ italic_V ≤ ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT { italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT [ ∑ start_POSTSUBSCRIPT italic_m ∈ italic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( roman_Υ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT - over^ start_ARG roman_Υ end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) - italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ] + divide start_ARG italic_M end_ARG start_ARG 2 end_ARG italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT } (20)

Utilizing Young’s inequality, given as xy<x22ξ+ξy22𝑥𝑦superscript𝑥22𝜉𝜉superscript𝑦22xy<\frac{x^{2}}{2\xi}+\frac{\xi y^{2}}{2}italic_x italic_y < divide start_ARG italic_x start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG 2 italic_ξ end_ARG + divide start_ARG italic_ξ italic_y start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG 2 end_ARG, where ξ𝜉\xiitalic_ξ represents an infinitesimal value, we obtain

ΔVj=1M{βj(1ξj2M2βj)uj2+βj2ξj[mNi(ΥmΥ^j)]2}Δ𝑉superscriptsubscript𝑗1𝑀subscript𝛽𝑗1subscript𝜉𝑗2𝑀2subscript𝛽𝑗superscriptsubscript𝑢𝑗2subscript𝛽𝑗2subscript𝜉𝑗superscriptdelimited-[]subscript𝑚subscript𝑁𝑖subscriptΥ𝑚subscript^Υ𝑗2\small{\Delta V\leq\sum_{j=1}^{M}\left\{-\beta_{j}(1-\frac{\xi_{j}}{2}-\frac{M% }{2}\beta_{j})u_{j}^{2}+\frac{\beta_{j}}{2\xi_{j}}\left[\sum_{m\in N_{i}}(% \Upsilon_{m}-\hat{\Upsilon}_{j})\right]^{2}\right\}}roman_Δ italic_V ≤ ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT { - italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( 1 - divide start_ARG italic_ξ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG 2 end_ARG - divide start_ARG italic_M end_ARG start_ARG 2 end_ARG italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + divide start_ARG italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG 2 italic_ξ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG [ ∑ start_POSTSUBSCRIPT italic_m ∈ italic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( roman_Υ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT - over^ start_ARG roman_Υ end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ] start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT } (21)

With Njsubscript𝑁𝑗N_{j}italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT terms in mNj(ΥmΥ^j)subscript𝑚subscript𝑁𝑗subscriptΥ𝑚subscript^Υ𝑗\sum_{m\in N_{j}}(\Upsilon_{m}-\hat{\Upsilon}_{j})∑ start_POSTSUBSCRIPT italic_m ∈ italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( roman_Υ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT - over^ start_ARG roman_Υ end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) and using the sum of squares inequality, we get

[mNi(ΥmΥ^j)]2|Mj|mNj(ΥmΥ^j)2superscriptdelimited-[]subscript𝑚subscript𝑁𝑖subscriptΥ𝑚subscript^Υ𝑗2subscript𝑀𝑗subscript𝑚subscript𝑁𝑗superscriptsubscriptΥ𝑚subscript^Υ𝑗2\left[\sum_{m\in N_{i}}(\Upsilon_{m}-\hat{\Upsilon}_{j})\right]^{2}\leq|M_{j}|% \sum_{m\in N_{j}}(\Upsilon_{m}-\hat{\Upsilon}_{j})^{2}[ ∑ start_POSTSUBSCRIPT italic_m ∈ italic_N start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( roman_Υ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT - over^ start_ARG roman_Υ end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ] start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ≤ | italic_M start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | ∑ start_POSTSUBSCRIPT italic_m ∈ italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( roman_Υ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT - over^ start_ARG roman_Υ end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT (22)

Substituting (22) in (21), we obtain

ΔVj=1M{βj(1ξj2M2βj)uj2+βj|Nj|2ξjmNj(ΥmΥ^j)2}Δ𝑉superscriptsubscript𝑗1𝑀subscript𝛽𝑗1subscript𝜉𝑗2𝑀2subscript𝛽𝑗superscriptsubscript𝑢𝑗2subscript𝛽𝑗subscript𝑁𝑗2subscript𝜉𝑗subscript𝑚subscript𝑁𝑗superscriptsubscriptΥ𝑚subscript^Υ𝑗2\small{\Delta V\leq\sum_{j=1}^{M}\left\{-\beta_{j}(1-\frac{\xi_{j}}{2}-\frac{M% }{2}\beta_{j})u_{j}^{2}+\frac{\beta_{j}|N_{j}|}{2\xi_{j}}\sum_{m\in N_{j}}(% \Upsilon_{m}-\hat{\Upsilon}_{j})^{2}\right\}}roman_Δ italic_V ≤ ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT { - italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( 1 - divide start_ARG italic_ξ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG 2 end_ARG - divide start_ARG italic_M end_ARG start_ARG 2 end_ARG italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + divide start_ARG italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | end_ARG start_ARG 2 italic_ξ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG ∑ start_POSTSUBSCRIPT italic_m ∈ italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( roman_Υ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT - over^ start_ARG roman_Υ end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT } (23)

Since the triggering instants in jthsuperscript𝑗𝑡j^{th}italic_j start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT agent during data availability attacks are evaluated by

uj2(k)=γiuj2^(k)superscriptsubscript𝑢𝑗2𝑘subscript𝛾𝑖^superscriptsubscript𝑢𝑗2𝑘u_{j}^{2}(k)=\gamma_{i}\hat{u_{j}^{2}}(k)italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_k ) = italic_γ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT over^ start_ARG italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG ( italic_k ) (24)
(Υm(k)Υj(k)^)2j=1MγjβjNj(1ξj2M2βj)u^j2j=1MβjNj2ξjsuperscriptsubscriptΥ𝑚𝑘^subscriptΥ𝑗𝑘2superscriptsubscript𝑗1𝑀subscript𝛾𝑗subscript𝛽𝑗subscript𝑁𝑗1subscript𝜉𝑗2𝑀2subscript𝛽𝑗superscriptsubscript^𝑢𝑗2superscriptsubscript𝑗1𝑀subscript𝛽𝑗subscript𝑁𝑗2subscript𝜉𝑗(\Upsilon_{m}(k)-\hat{\Upsilon_{j}(k)})^{2}\leq\frac{\sum_{j=1}^{M}\frac{% \gamma_{j}\beta_{j}}{N_{j}}(1-\frac{\xi_{j}}{2}-\frac{M}{2}\beta_{j})\hat{u}_{% j}^{2}}{\sum_{j=1}^{M}\frac{\beta_{j}N_{j}}{2\xi_{j}}}( roman_Υ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT ( italic_k ) - over^ start_ARG roman_Υ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( italic_k ) end_ARG ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ≤ divide start_ARG ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT divide start_ARG italic_γ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG ( 1 - divide start_ARG italic_ξ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG 2 end_ARG - divide start_ARG italic_M end_ARG start_ARG 2 end_ARG italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) over^ start_ARG italic_u end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT divide start_ARG italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG 2 italic_ξ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG end_ARG (25)

Adding and subtracting γjβj(1ξj2M2βj)u^j2subscript𝛾𝑗subscript𝛽𝑗1subscript𝜉𝑗2𝑀2subscript𝛽𝑗superscriptsubscript^𝑢𝑗2\gamma_{j}\beta_{j}(1-\frac{\xi_{j}}{2}-\frac{M}{2}\beta_{j})\hat{u}_{j}^{2}italic_γ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( 1 - divide start_ARG italic_ξ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG 2 end_ARG - divide start_ARG italic_M end_ARG start_ARG 2 end_ARG italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) over^ start_ARG italic_u end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT in (23),

ΔVΔ𝑉absent\displaystyle\Delta V\leqroman_Δ italic_V ≤ j=1Mβj(1ξj2M2βj)(uj2γjuj^2)+limit-fromsuperscriptsubscript𝑗1𝑀subscript𝛽𝑗1subscript𝜉𝑗2𝑀2subscript𝛽𝑗superscriptsubscript𝑢𝑗2subscript𝛾𝑗superscript^subscript𝑢𝑗2\displaystyle-\sum_{j=1}^{M}\beta_{j}(1-\frac{\xi_{j}}{2}-\frac{M}{2}\beta_{j}% )(u_{j}^{2}-\gamma_{j}\hat{u_{j}}^{2})+- ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ( 1 - divide start_ARG italic_ξ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG 2 end_ARG - divide start_ARG italic_M end_ARG start_ARG 2 end_ARG italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ( italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT - italic_γ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT over^ start_ARG italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ) + (26)
j=1M[βj|Nj|2ξj(1ξj2Mβj2)u^j2mNj(ΥmΥ^j)2]superscriptsubscript𝑗1𝑀delimited-[]subscript𝛽𝑗subscript𝑁𝑗2subscript𝜉𝑗1subscript𝜉𝑗2𝑀subscript𝛽𝑗2superscriptsubscript^𝑢𝑗2subscript𝑚subscript𝑁𝑗superscriptsubscriptΥ𝑚subscript^Υ𝑗2\displaystyle\sum_{j=1}^{M}\left[\frac{\beta_{j}|N_{j}|}{2\xi_{j}}\left(1-% \frac{\xi_{j}}{2}-\frac{M\beta_{j}}{2}\right)\hat{u}_{j}^{2}\sum_{m\in N_{j}}(% \Upsilon_{m}-\hat{\Upsilon}_{j})^{2}\right]∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_M end_POSTSUPERSCRIPT [ divide start_ARG italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | end_ARG start_ARG 2 italic_ξ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG ( 1 - divide start_ARG italic_ξ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG 2 end_ARG - divide start_ARG italic_M italic_β start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG 2 end_ARG ) over^ start_ARG italic_u end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ∑ start_POSTSUBSCRIPT italic_m ∈ italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT ( roman_Υ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT - over^ start_ARG roman_Υ end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ]

Theorem 1: ΔV(Υ)0Δ𝑉Υ0\Delta V(\Upsilon)\leq 0roman_Δ italic_V ( roman_Υ ) ≤ 0 is guaranteed for all k𝑘kitalic_k using equations 24, 25 and 26 for any jM𝑗𝑀j\in Mitalic_j ∈ italic_M and mNj𝑚subscript𝑁𝑗m\in N_{j}italic_m ∈ italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT. The only scenario where ΔV=0Δ𝑉0\Delta V=0roman_Δ italic_V = 0 can happen when

{uj=u^j=0jMΥj=Υ^j=0mNj\left\{\begin{matrix}u_{j}=\hat{u}_{j}=0\hskip 14.22636pt\forall j\in M\\ \Upsilon_{j}=\hat{\Upsilon}_{j}=0\hskip 14.22636pt\forall m\in N_{j}\end{% matrix}\right.{ start_ARG start_ROW start_CELL italic_u start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = over^ start_ARG italic_u end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = 0 ∀ italic_j ∈ italic_M end_CELL end_ROW start_ROW start_CELL roman_Υ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = over^ start_ARG roman_Υ end_ARG start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = 0 ∀ italic_m ∈ italic_N start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_CELL end_ROW end_ARG (27)

Theorem 2: Using (27), it is proved that Υ^(k)^Υ𝑘\hat{\Upsilon}(k)over^ start_ARG roman_Υ end_ARG ( italic_k ) is asymptotically stable and converges to the semantic sampling signals.

VI Performance Evaluation

A real-time simulation testbed setup [22], used to test the feasibility of the proposed delay-aware semantic sampling scheme is shown in Fig. 5(b). It comprises of OP-5700

TABLE I: Test System Parameters
Parameters for DERs
Parameter Symbol Rating
Power rating PP\mathrm{P}roman_P 32 kW
Nominal V and ω𝜔\omegaitalic_ω VnomsubscriptVnom\mathrm{V_{nom}}roman_V start_POSTSUBSCRIPT roman_nom end_POSTSUBSCRIPT, ωnomsubscript𝜔nom\mathrm{\omega_{nom}}italic_ω start_POSTSUBSCRIPT roman_nom end_POSTSUBSCRIPT 22022\sqrt{2}square-root start_ARG 2 end_ARG V, 314.15 rad/s
Filter parameters LfsuperscriptLf\mathrm{L^{f}}roman_L start_POSTSUPERSCRIPT roman_f end_POSTSUPERSCRIPT, rfsuperscriptrf\mathrm{r^{f}}roman_r start_POSTSUPERSCRIPT roman_f end_POSTSUPERSCRIPT, CfsuperscriptCf\mathrm{C^{f}}roman_C start_POSTSUPERSCRIPT roman_f end_POSTSUPERSCRIPT 3 mH, 1 mΩΩ\Omegaroman_Ω, 12.1 mF
Output impedance LosuperscriptLo\mathrm{L^{o}}roman_L start_POSTSUPERSCRIPT roman_o end_POSTSUPERSCRIPT, rosuperscriptro\mathrm{r^{o}}roman_r start_POSTSUPERSCRIPT roman_o end_POSTSUPERSCRIPT 1 mH, 0.121 ΩΩ\Omegaroman_Ω
P droop coefficient mpsuperscriptmp\mathrm{m^{p}}roman_m start_POSTSUPERSCRIPT roman_p end_POSTSUPERSCRIPT 9.4×\times×1055{}^{-5}start_FLOATSUPERSCRIPT - 5 end_FLOATSUPERSCRIPT rad/(W.s)
Q droop coefficient nqsuperscriptnq\mathrm{n^{q}}roman_n start_POSTSUPERSCRIPT roman_q end_POSTSUPERSCRIPT 1.3×\times×1033{}^{-3}start_FLOATSUPERSCRIPT - 3 end_FLOATSUPERSCRIPTV/VAr
Proportional gain (CC, VC) KpisuperscriptsubscriptKpi\mathrm{K_{p}^{i}}roman_K start_POSTSUBSCRIPT roman_p end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_i end_POSTSUPERSCRIPT, KpVsuperscriptsubscriptKpV\mathrm{K_{p}^{V}}roman_K start_POSTSUBSCRIPT roman_p end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_V end_POSTSUPERSCRIPT 0.2, 50
Integral gain (CC, VC) KiisuperscriptsubscriptKii\mathrm{K_{i}^{i}}roman_K start_POSTSUBSCRIPT roman_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_i end_POSTSUPERSCRIPT, KiVsuperscriptsubscriptKiV\mathrm{K_{i}^{V}}roman_K start_POSTSUBSCRIPT roman_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_V end_POSTSUPERSCRIPT 1, 100
Secondary control (SC) parameters
Communication weight ajmsubscripta𝑗𝑚\mathrm{a}_{jm}roman_a start_POSTSUBSCRIPT italic_j italic_m end_POSTSUBSCRIPT 1
Convergence parameter gjsubscriptg𝑗\mathrm{g}_{j}roman_g start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT 1
Proportional gain KpSωsuperscriptsubscriptKpS𝜔\mathrm{K_{p}^{S\omega}}roman_K start_POSTSUBSCRIPT roman_p end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_S italic_ω end_POSTSUPERSCRIPT, KpSVsuperscriptsubscriptKpSV\mathrm{K_{p}^{SV}}roman_K start_POSTSUBSCRIPT roman_p end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_SV end_POSTSUPERSCRIPT 0.1, 0.1
Integral gain KiSωsuperscriptsubscriptKiS𝜔\mathrm{K_{i}^{S\omega}}roman_K start_POSTSUBSCRIPT roman_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_S italic_ω end_POSTSUPERSCRIPT, KiSVsuperscriptsubscriptKiSV\mathrm{K_{i}^{SV}}roman_K start_POSTSUBSCRIPT roman_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_SV end_POSTSUPERSCRIPT 42, 1.5
Network and load parameters
of modified IEEE 37-bus AC distribution system ([31])
Alpha α𝛼\alphaitalic_α 0.3

(real-time simulator), which is integrated with HYPERSIM software (on the host PC) to model the required test system. The PC and OP-5700 simulator are seamlessly linked via an Ethernet interface, facilitating the establishment of IEC 61850 sampled values protocol for efficient communication and data exchange. The standard IEEE 37-bus system is modified by adding seven inverters at buses B 15, B 18, B 22, B 24, B 29, B 33, and B 34 as shown in Fig. 2(a). This modified test system is considered to validate the proposed delay-aware semantic sampling approach. The design and control parameters of DERs is provided in Table I. The evaluation of this proposed scheme for various test conditions of latency attacks, data dropouts, TSAs is presented further.

VI-A System under latency attacks

A latency attack was carried out on the considered system with the time delay, τmsubscript𝜏𝑚\tau_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT = 0.05 s. It was then followed by load variation at 5 s. Although the voltage remains within acceptable bounds, as shown in Fig. 6(a), but the SC objectives are not accomplished. It can be observed from the time-domain plots of frequency, active and reactive power sharing (as in Fig. 6(b), 6(c), and 6(d), respectively) that the consensus convergence time is increased due to delay.

Refer to caption
Figure 6: Time-domain signals during latency attack (τmsubscript𝜏𝑚\tau_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT=0.05 s), without the proposed scheme for (a) phase voltage of DER 1; (b) frequency; (c) active power sharing; and (d) reactive power sharing for all DERs.
Refer to caption
Figure 7: Time-domain signals during latency attack (τmsubscript𝜏𝑚\tau_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT=0.05 s), with the proposed scheme for (a) phase voltage of DER 1; (b) frequency; (c) active power sharing; and (d) reactive power sharing for all DERs.

However, with the inclusion of the proposed scheme, resulting reconstructed signals (ejpφsuperscriptsubscripte𝑗p𝜑\mathrm{e}_{j}^{\mathrm{p}\varphi}roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p italic_φ end_POSTSUPERSCRIPT and ejqφsuperscriptsubscripte𝑗q𝜑\mathrm{e}_{j}^{\mathrm{q}\varphi}roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q italic_φ end_POSTSUPERSCRIPT) as shown in Fig. 7(c) and 7(d) compensates for delay. It can be seen from time-domain plots of frequency, active and reactive power sharing (as in Fig. 7(b), 7(c), and 7(d), respectively), that convergence is much faster, with steady-state settling time within 0.45 s.

VI-B System under latency attacks and data dropouts

Considering a latency attack (τmsubscript𝜏𝑚\tau_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT = 0.05 s) with 10% data dropout and load variation at 5 s, it can seen in Fig. 8(a), 8(b), and 8(c), that time required to attain SC objectives is further increased as compared to initiation of only latency attack as in case A. Further, with proposed scheme SC objectives are attained at much faster rate as seen in Fig. 8(d), 8(e), and 8(f) for frequency, active and reactive power sharing, respectively. This can be attributed to reconstructed signal from the local controller that drives the control process during such attacks.

Refer to caption
Figure 8: The time-domain signals during latency attack (τmsubscript𝜏𝑚\tau_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT=0.05 s) and 10% data dropout for (a) frequency; (b) active power sharing; (c) reactive power sharing, without the proposed scheme are shown. Further, the time-domain signals for (d) frequency; (e) active power sharing; (f) reactive power sharing, with the proposed scheme are shown.

VI-C System under TSAs

Similarly, the time-domain simulation for the system under TSA attack (considering load variation at 5 s) without the proposed scheme is shown in Fig. 9(a), 9(b), and 9(c).

Refer to caption
Figure 9: The time-domain signals during TSA for (a) frequency; (b) active power sharing; (c) reactive power sharing, without the proposed scheme are shown. Further, the time-domain signals for (d) frequency; (e) active power sharing; (f) reactive power sharing, with the proposed scheme are shown.

It can be observed that with the deployment of the proposed scheme, the dynamic performance is increased because of the reconstructed signals (ejpφsuperscriptsubscripte𝑗p𝜑\mathrm{e}_{j}^{\mathrm{p}\varphi}roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p italic_φ end_POSTSUPERSCRIPT and ejqφsuperscriptsubscripte𝑗q𝜑\mathrm{e}_{j}^{\mathrm{q}\varphi}roman_e start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q italic_φ end_POSTSUPERSCRIPT), as shown in Fig. 9(e) and 9(f). It can be seen in Fig. 9(d), 9(e), and 9(f), that the convergence time to attain SC of frequency restoration, proportional active and reactive power sharing decreases.

VI-D Cyber graph variations

The system is tested for two cyber graphs (G) under latency attack (τmsubscript𝜏𝑚\tau_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT = 0.05 s). These graphs are G1 and G2 representing fully-connected graph and ring-connected graph, respectively. Initially, the system is connected in G1 configuration and later switched to G2 configuration at 5 s. It can be observed from 10(a), 10(b) and Fig. 10(c), that the system tends towards instability under latency attack

Refer to caption
Figure 10: The time-domain signals during latency attack (τmsubscript𝜏𝑚\tau_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT=0.05 s) with cyber graph variations for (a) frequency; (b) active power sharing; (c) reactive power sharing, without the proposed scheme are shown. Further, the time-domain signals for (d) frequency; (e) active power sharing; (f) reactive power sharing, with the proposed scheme are shown.

followed with dynamic cyber graph variations. This instability can be attributed to both the resulting sparse network and the additional delay to the signals, due to which the agents were not able to update their states continuously thereby slowing down the convergence. However, delay-aware semantic sampling actively synchronizes the error signals at primary and secondary controllers to generate reconstructed signals, thereby making this proposed scheme robust to dynamic cyber graph variations along with the latency attack as shown in Fig. 10(d), 10(e) and Fig. 10(f).

Let us consider that different attacks are represented as: a) I: latency attack; b) II: latency attack and data dropout; and c) III: TSA. The convergence time (TcsubscriptTc\mathrm{T_{c}}roman_T start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT) plots for the system under these attacks are depicted in Fig. 11.

Refer to caption
Figure 11: Plots of time of convergence (TcsubscriptTc\mathrm{T_{c}}roman_T start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT) for (a) O1; and (b) O2, without and with the deployment of the proposed scheme.

Let O1 and O2 are defined as the objectives of SC. Here, O1 is attaining frequency restoration and proportional active power sharing; and O2 is attaining proportional reactive power sharing. It is evident from Fig. 11(a) and 11(b), that cases without the proposed delay-aware semantic sampling scheme, particularly those subjected to latency attacks with τmsubscript𝜏𝑚\tau_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT=0.05 s and 10% data dropout, exhibit longer convergence times compared to instances featuring only latency attacks with τmsubscript𝜏𝑚\tau_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT=0.05 s. In contrast, the deployment of our proposed delay-aware semantic sampling scheme substantially reduces convergence times across all attack scenarios (as shown in Fig. 11(a) and 11(b)), thereby enhancing overall system performance.

TABLE II: Comparative Analysis of the Proposed Delay-Aware Semantics Scheme for PES.
Sl. no. Features

[11]

[13]

[14]

Proposed scheme
1. Computational complexity Medium Medium High Low
2. Distributed concept
3. Resilient to latency attacks Not tested
4. Resilient to TSAs Not tested Not tested Only detection
5. Resilient to data dropouts Not tested Not tested Not tested
6. Robust to loading variations
7. Model-agnostic
8. Supports dynamic cyber graphs Not tested Not tested

Additionally, the steady-state error is assessed for the aforementioned attack scenarios to achieve SC objectives O1 and O2. Specifically, we define the absolute value of the steady-state error as

Refer to caption
Figure 12: Plots of steady-state error with different attack cases for (a) O1; and (b) O2, without the proposed scheme.
Refer to caption
Figure 13: Plots of steady-state error with different attack cases for (a) O1; and (b) O2, with the proposed scheme.

|O1O1ss|O1subscriptO1ss|\mathrm{O1}-\mathrm{O1_{ss}}|| O1 - O1 start_POSTSUBSCRIPT roman_ss end_POSTSUBSCRIPT | and |O2O2ss|O2subscriptO2ss|\mathrm{O2}-\mathrm{O2_{ss}}|| O2 - O2 start_POSTSUBSCRIPT roman_ss end_POSTSUBSCRIPT | for O1 and O2, respectively. Here O1O1\mathrm{O1}O1 and O2O2\mathrm{O2}O2 represent the instantaneous values, and O1sssubscriptO1ss\mathrm{O1_{ss}}O1 start_POSTSUBSCRIPT roman_ss end_POSTSUBSCRIPT and O2sssubscriptO2ss\mathrm{O2_{ss}}O2 start_POSTSUBSCRIPT roman_ss end_POSTSUBSCRIPT denote the steady-state values, according to SC objectives. Fig. 12(a) and 12(b) illustrate the steady-state error for achieving O1 and O2, respectively, in the system without the proposed scheme. Conversely, Fig. 13(a) and 13(b) reveal significantly reduced steady-state errors to attain O1 and O2 with the deployment of our proposed scheme, thereby improving system performance.

Further, the various error signals for latency attack (τmsubscript𝜏𝑚\tau_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT=0.05 s) with cyber graph variations,

Refer to caption
Figure 14: The time-domain signals during latency attack (τmsubscript𝜏𝑚\tau_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT=0.05 s) with cyber graph variations for (a) d𝑑ditalic_d-axis error signals input to VC, e1dVCsuperscriptsubscripte1dVC\mathrm{e}_{1}^{\mathrm{dVC}}roman_e start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dVC end_POSTSUPERSCRIPT; (b) process-aware sparsely sampled d𝑑ditalic_d-axis error signals input to VC, e1dDsuperscriptsubscripte1dD\mathrm{e}_{1}^{\mathrm{dD}}roman_e start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dD end_POSTSUPERSCRIPT; (c) reconstructed signal input to SC, e1pφsuperscriptsubscripte1p𝜑\mathrm{e}_{1}^{\mathrm{p}\varphi}roman_e start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_p italic_φ end_POSTSUPERSCRIPT; (d) q𝑞qitalic_q-axis error signals input to VC, e1qVCsuperscriptsubscripte1qVC\mathrm{e}_{1}^{\mathrm{qVC}}roman_e start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qVC end_POSTSUPERSCRIPT; (e) process-aware sparsely sampled q𝑞qitalic_q-axis error signals input to VC, e1qDsuperscriptsubscripte1qD\mathrm{e}_{1}^{\mathrm{qD}}roman_e start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qD end_POSTSUPERSCRIPT; and (f) reconstructed signal input to SC, e1qφsuperscriptsubscripte1q𝜑\mathrm{e}_{1}^{\mathrm{q}\varphi}roman_e start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_q italic_φ end_POSTSUPERSCRIPT.

at DER 1 are investigated. The error signals provided by VC (e1dVCsuperscriptsubscripte1dVC\mathrm{e}_{1}^{\mathrm{dVC}}roman_e start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_dVC end_POSTSUPERSCRIPT, e1qVCsuperscriptsubscripte1qVC\mathrm{e}_{1}^{\mathrm{qVC}}roman_e start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_qVC end_POSTSUPERSCRIPT) are shown in Fig. 14(a) and Fig. 14(d), respectively. The process-aware sparse sampling of these signals are carried out as shown in Fig. 14(b) and Fig. 14(e), respectively. The resulting reconstructed signals which are fed to the SC for delay compensation are shown in Fig. 14(c) and Fig. 14(f), respectively.

The system’s performance was evaluated by varying the downsampling factor (DD\mathrm{D}roman_D), as shown in Fig. 15(a).

Refer to caption
Figure 15: Plots for variation in TcsubscriptTc\mathrm{T_{c}}roman_T start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT for attaining O1 and O2 with variations in (a) downsampling factor (D); and (b) amount of delay (τmsubscript𝜏𝑚\tau_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT).

The results indicate a non-linear relationship between DD\mathrm{D}roman_D and TcsubscriptTc\mathrm{T_{c}}roman_T start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT to achieve the SC objectives. As expected, TcsubscriptTc\mathrm{T_{c}}roman_T start_POSTSUBSCRIPT roman_c end_POSTSUBSCRIPT increases with increasing DD\mathrm{D}roman_D. Therefore, selecting the appropriate value of DD\mathrm{D}roman_D involves a trade-off between low-cost operation versus fast efficient performance. In this study, a value of 10 was chosen for DD\mathrm{D}roman_D, which offers a good balance of low-cost and fast efficient operation. The proposed delay-aware semantic sampling scheme was also tested for system performance under different levels of delay (τmsubscript𝜏𝑚\tau_{m}italic_τ start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT), as shown in 15(b), demonstrating its robustness to large random delayed-measurements.

Additionally, the cyber layer of a PES (comprising of two DERs) was developed over IEC 61850 sampled values protocol through Ethernet interface. This communication model is based on a publish-subscribe architecture [22].

Refer to caption
Figure 16: The time-domain signals during data loss of 10 packets for (a) frequency; (b) active power sharing; and (c) reactive power sharing, with the proposed scheme are shown. Further, the time-domain signals showing data loss of 10 packets in the communicated signals i.e, (d) frequency; (e) active power; and (f) reactive power, over IEC 61850 sampled values protocol are presented.

The data loss attack (of 10 packets) at 1 s (followed by load change at 1 s), was further tested on this system with the deployment of the proposed scheme. It can be observed from Fig. 16(a), 16(b) and 16(c) that all objectives of SC are achieved. Moreover, the signals being published over the established protocol are indicated as “Pub” and the signals being subscribed are indicated as “Sub”, as shown in Fig. 16(d), 16(e) and 16(f). Whenever data loss occurs, the subscribers hold on to the last received sample until the next packet arrives as shown in Fig. 16(d), 16(e) and 16(f). The details of the packet over IEC 61850 sampled values protocol are mentioned in Fig. 17.

Refer to caption
Figure 17: Details of IEC 61850 sampled values packet comprising of svID, values of communicated signals etc., obtained from wireshark application.

A comparative evaluation of our delay-aware semantic sampling scheme against existing methodologies is presented in Table II. The proposed scheme in this work, distinguishes itself as a computationally efficient solution, incorporating distributed concept that enhance its resilience against data availability attacks. Moreover, it demonstrates notable robustness when confronted with load variations, highlighting its practical adaptability. The model-agnostic nature of this approach further streamlines its implementation. Additionally, it supports dynamic cyber graphs, underscoring its practicality and flexibility. As a result, the delay-aware nodal semantic intelligence presented by our approach emerges as a highly promising and commercially viable solution, well-poised to address the intricate challenges within the realm of PES.

VII Conclusions and Future Scope of Work

In the landscape of PES, data availability challenges underscore the critical need for an innovative approach to mitigate the impact of random communication delays. Motivated by this imperative, our proposed delay-aware semantic methodology harnesses the inherent dynamics of the inner control loops within DERs to generate localized delay compensation signals. This approach not only yields robust performance and precise predictions by transmitting only the significant information but also obviates the need for intricate models and training that often accompany in prevailing methods. Real-time simulations on the OPAL-RT platform convincingly affirm the efficacy of our approach. While this study addresses the immediate challenges, several others loom ahead, such as understanding the limits of maximum communication delay tolerance and scalability in larger, complex systems. In future investigations, system stability under semantic sampling concerning the maximum communication delay it can handle will be explored and scalability in more extensive systems will be assessed.

In the evolving domain of demand response, diverse resources, such as electric vehicles, adaptable residential loads, and energy storage systems, are ready for integration. However, real-time data exchange among them necessitates varied communication protocols, posing a challenge for semantic interoperability. Our upcoming research aims to overcome this hurdle by develo** a semantic framework to predict, activate, and manage heterogeneous resources efficiently. This research direction, not only promises to advance the field but also address the complexities of the PES energy market. Furthermore, semantic-based quantum communication will be explored to enhance fault detection and localization, reducing response times and downtime during disturbances, fortifying system resiliency.

References

  • [1] A. Singhal, T. L. Vu and W. Du, “Consensus Control for Coordinating Grid-Forming and Grid-Following Inverters in Microgrids,” IEEE Trans. Smart Grid, vol. 13, no. 5, pp. 4123-4133, Sept. 2022, doi: 10.1109/TSG.2022.3158254.
  • [2] S. Patel, S. Chakraborty, B. Lundstrom, S. M. Salapaka and M. V. Salapaka, “Isochronous Architecture-Based Voltage-Active Power Droop for Multi-Inverter Systems,” IEEE Trans. Smart Grid, vol. 12, no. 2, pp. 1088-1103, March 2021, doi: 10.1109/TSG.2020.3037159.
  • [3] D. C. Mazur, R. D. Quint and V. A. Centeno, “Time Synchronization of Automation Controllers for Power Applications,” IEEE Trans. Ind. Appl., vol. 50, no. 1, pp. 25-32, Jan.-Feb. 2014, doi: 10.1109/TIA.2013.2267710.
  • [4] Y. Han, K. Zhang, H. Li, E. A. A. Coelho and J. M. Guerrero, “MAS-Based Distributed Coordinated Control and Optimization in Microgrid and Microgrid Clusters: A Comprehensive Overview,” IEEE Trans. Power Electron., vol. 33, no. 8, pp. 6488-6508, Aug. 2018, doi: 10.1109/TPEL.2017.2761438.
  • [5] S. Rath, L. D. Nguyen, S. Sahoo and P. Popovski, “Self-Healing Secure Blockchain Framework in Microgrids,” IEEE Trans. Smart Grid, vol. 14, no. 6, pp. 4729-4740, Nov. 2023.
  • [6] S. Sahoo, F. Blaabjerg, and T. Dragicevic, Cyber Security for Microgrids. IET, 2022, doi: 10.1049/PBPO196E.
  • [7] R. Kateb, P. Akaber, M. H. K. Tushar, A. Albarakati, M. Debbabi and C. Assi, “Enhancing WAMS Communication Network Against Delay Attacks,” IEEE Trans. Smart Grid, vol. 10, no. 3, pp. 2738-2751, May 2019, doi: 10.1109/TSG.2018.2809958.
  • [8] X. Jiang, J. Zhang, B. J. Harding, J. J. Makela and A. D. Domı´nguez-Garcı´a, “Spoofing GPS Receiver Clock Offset of Phasor Measurement Units,” IEEE Trans. Power Sys., vol. 28, no. 3, pp. 3253-3262, Aug. 2013, doi: 10.1109/TPWRS.2013.2240706.
  • [9] E. Shereen, R. Ramakrishna and G. Dán, “Detection and Localization of PMU Time Synchronization Attacks via Graph Signal Processing,” IEEE Trans. Smart Grid, vol. 13, no. 4, pp. 3241-3254, July 2022, doi: 10.1109/TSG.2022.3150954.
  • [10] Z. Zhang, S. Gong, A. D. Dimitrovski and H. Li, “Time Synchronization Attack in Smart Grid: Impact and Analysis,” in IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 87-98, March 2013, doi: 10.1109/TSG.2012.2227342.
  • [11] L. Sheng, G. Lou, W. Gu, S. Lu, S. Ding and Z. Ye, “Optimal Communication Network Design of Microgrids Considering Cyber-Attacks and Time-Delays,” IEEE Trans. Smart Grid, vol. 13, no. 5, pp. 3774-3785, Sept. 2022, doi: 10.1109/TSG.2022.3169343.
  • [12] M. Kumar, “Resilient PIDA Control Design Based Frequency Regulation of Interconnected Time-Delayed Microgrid Under Cyber-Attacks,” IEEE Trans. Ind. Appl., vol. 59, no. 1, pp. 492-502, Jan.-Feb. 2023, doi: 10.1109/TIA.2022.3205280.
  • [13] T. Yang, Y. He and G. -P. Liu, “Distributed Voltage Restoration of AC Microgrids Under Communication Delays: A Predictive Control Perspective,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 69, no. 6, pp. 2614-2624, June 2022, doi: 10.1109/TCSI.2022.3163204.
  • [14] A. Mohammad Saber, A. Youssef, D. Svetinovic, H. H. Zeineldin and E. F. El-Saadany, “Anomaly-Based Detection of Cyberattacks on Line Current Differential Relays,” IEEE Trans. Smart Grid, vol. 13, no. 6, pp. 4787-4800, Nov. 2022, doi: 10.1109/TSG.2022.3185764.
  • [15] W. Gao, H. Li, M. Zhong and M. Lu, “An Underestimated Cybersecurity Problem: Quick-Impact Time Synchronization Attacks and A Fast-Triggered Detection Method,” IEEE Trans. Smart Grid, doi: 10.1109/TSG.2023.3258963.
  • [16] W. Gao, H. Li, M. Zhong and M. Lu, “The Separate Clock Drift Matched Filter to Detect Time Synchronization Attacks Toward Global Navigation Satellite Systems,” IEEE Transactions Ind. Electron., vol. 70, no. 6, pp. 6305-6315, June 2023, doi: 10.1109/TIE.2022.3194578.
  • [17] H. Xie, Z. Qin, G. Y. Li and B. -H. Juang, “Deep Learning Enabled Semantic Communication Systems,” IEEE Trans. Signal Process., vol. 69, pp. 2663-2675, 2021, doi: 10.1109/TSP.2021.3071210.
  • [18] M. Kountouris and N. Pappas, “Semantics-Empowered Communication for Networked Intelligent Systems,” IEEE Commun. Mag., vol. 59, no. 6, pp. 96-102, June 2021, doi: 10.1109/MCOM.001.2000604.
  • [19] T. Han, Q. Yang, Z. Shi, S. He and Z. Zhang, “Semantic-Preserved Communication System for Highly Efficient Speech Transmission,” IEEE J. Sel. Areas Commun., vol. 41, no. 1, pp. 245-259, Jan. 2023, doi: 10.1109/JSAC.2022.3221952.
  • [20] P. Popovski, O. Simeone, F. Boccardi, D. Gunduz, and O. Sahin, “Semantic-effectiveness filtering and control for post-5G wireless connectivity,” J. Indian Inst. Sci., vol. 100, no. 2, pp. 435–443, Apr. 2020.
  • [21] X. Luo, H. -H. Chen and Q. Guo, “Semantic Communications: Overview, Open Issues, and Future Research Directions,” IEEE Wireless Commun., vol. 29, no. 1, pp. 210-219, February 2022, doi: 10.1109/MWC.101.2100269.
  • [22] K. Gupta, S. Sahoo, R. Mohanty, B. K. Panigrahi and F. Blaabjerg, “Distinguishing Between Cyber Attacks and Faults in Power Electronic Systems—A Non-invasive Approach,” IEEE J. Emerg. Sel. Topics Power Electron., vol. 11, no. 2, pp. 1578-1588, April 2023, doi: 10.1109/JESTPE.2022.3221867.
  • [23] K. Gupta, S. Sahoo, R. Mohanty, B. K. Panigrahi and F. Blaabjerg, “Decentralized Anomaly Characterization Certificates in Cyber-Physical Power Electronics Based Power Systems,” 2021 IEEE 22nd Workshop on Control and Modelling of Power Electronics (COMPEL), Cartagena, Colombia, pp. 1-6, 2021.
  • [24] J. S. Choi, S. Lee and S. J. Chun, “A Queuing Network Analysis of a Hierarchical Communication Architecture for Advanced Metering Infrastructure,” IEEE Trans. Smart Grid, vol. 12, no. 5, pp. 4318-4326, Sept. 2021, doi: 10.1109/TSG.2021.3088879.
  • [25] M. Elsayed, M. Erol-Kantarci, B. Kantarci, L. Wu and J. Li, “Low-Latency Communications for Community Resilience Microgrids: A Reinforcement Learning Approach,” IEEE Trans. Smart Grid, vol. 11, no. 2, pp. 1091-1099, March 2020, doi: 10.1109/TSG.2019.2931753.
  • [26] J. S. Warner and R. G. Johnston, “GPS spoofing countermeasures,” Los Alamos Nat. Lab., Los Alamos, NM, USA, Rep. LAUR-03-6163, 2003. [Online]. Available: http://lewisperdue.com/DieByWire/GPS-Vulnerability-LosAlamos.pdf (accessed April 28, 2023).
  • [27] M. Leng, S. Sahoo and F. Blaabjerg, “Stabilization of DC Microgrids Under Cyber Attacks – Optimal Design and Sensitivity Analysis,” IEEE Trans. Smart Grid, doi: 10.1109/TSG.2023.3278094.
  • [28] S. Sahoo and F. Blaabjerg, “A Model-Free Predictive Controller for Networked Microgrids with Random Communication Delays,” 2021 IEEE Appl. Power Electron. Conf. and Expo. (APEC), Phoenix, AZ, USA, pp. 2667-2672, 2021.
  • [29] M. D. Roig Greidanus, S. Sahoo, S. Mazumder and F. Blaabjerg, “Novel control solutions for DoS attack delay mitigation in grid-connected and standalone inverters,” 2021 IEEE 12th International Symposium on Power Electronics for Distributed Generation Systems (PEDG), Chicago, IL, pp. 1-7, 2021.
  • [30] M. H. Najafi and D. J. Lilja, “High Quality Down-Sampling for Deterministic Approaches to Stochastic Computing,” IEEE Trans. Emerg. Topics Comput., vol. 9, no. 1, pp. 7-14, 1 Jan.-March 2021, doi: 10.1109/TETC.2017.2789243.
  • [31] L. Luo and S. V. Dhople, “Spatiotemporal model reduction of inverterbased islanded microgrids,” IEEE Trans. Energy Convers., vol. 29, no. 4, pp. 823–832, Dec. 2014.