Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Detection and Mitigation of False Data Injection Attacks Against Wind Farm Active Power Controllers in Power Grids
Date
2026-01-01
Author
Ansari, Mostafa
Ghafouri, Mohsen
Ameli, Amir
Karaağaç, Ulaş
Kocar, Ilhan
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
31
views
0
downloads
Cite This
The recent growing integration of wind farms (WFs), particularly variable speed wind turbines (WTs), results in several operational challenges to power grids integrated with WFs, such as low grid inertia and the reduced performance of measurement-based fast frequency response. To deal with such challenges, grid operators use WF active power controllers (WFAPCs) to enhance frequency control support from WTs and improve the frequency stability of the grid. However, the operation of WFAPC relies on measurements received through communication networks and cyber layers of WFs, which consequently makes them prone to cyber threats, e.g., false data injection (FDI). On this basis, firstly, this paper analyzes the cybersecurity vulnerabilities of WFAPCs and the possible impacts of exploiting cybersecurity vulnerabilities on the frequency response of WF and frequency stability of the grid. Then, based on the knowledge of intruders, two attacks, i.e., white-box and black-box FDI attacks, are developed against WFAPCs. After-ward, to detect these attacks, a novel bi-level detection and mitigation technique based on support vector machine (SVM)-based technique and long short-term memory (LSTM) -based technique is developed, which is implemented at the control center of the WF (primary detector) and at the dispatch center of the power grid (secondary detector), respectively. These detectors classify real-time measurements into attack and normal operation. Additionally, a hierarichical mitigation technique is proposed to counter the developed cyber attacks by replacing the active power reference signal of WF with new values obtained based on the droop control theory. The impacts of the attacks and the effectiveness of the proposed bi-level technique are evaluated using the modified 39-bus benchmark.
Subject Keywords
active power controller
,
attack detection
,
attack mitigation
,
cybersecurity
,
false data injection (FDI)
,
frequency stability
,
machine learning
,
wind farm (WF)
,
Wind turbine (WT)
URI
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=105029777011&origin=inward
https://hdl.handle.net/11511/118555
Journal
Journal of Modern Power Systems and Clean Energy
DOI
https://doi.org/10.35833/mpce.2024.001368
Collections
Department of Electrical and Electronics Engineering, Article
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
M. Ansari, M. Ghafouri, A. Ameli, U. Karaağaç, and I. Kocar, “Detection and Mitigation of False Data Injection Attacks Against Wind Farm Active Power Controllers in Power Grids,”
Journal of Modern Power Systems and Clean Energy
, vol. 14, no. 1, pp. 158–173, 2026, Accessed: 00, 2026. [Online]. Available: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=105029777011&origin=inward.