AG

A.J. Gallo

8 records found

Wind turbines degrade over time, resulting in varying structural, aeroelastic, and aerodynamic properties. In contrast, the turbine controller calibrations generally remain constant, leading to suboptimal performance and potential stability issues. The calibration of wind turbine ...
Multiplicative watermarking (MWM) is an active diagnosis technique for the detection of highly sophisticated attacks, but is vulnerable to malicious agents that use eaves-dropped data to identify and then remove or replicate the watermark. In this work, we propose a scheme to pro ...
The current trend in the evolution of wind turbines is to increase their rotor size in order to capture more power. This leads to taller, slender and more flexible towers, which thus experience higher dynamical loads due to the turbine rotation and environmental factors. It is he ...
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system stability. However, cyber- ...
In this paper we present a hierarchical scheme to detect cyber-attacks in a hierarchical control architecture for large-scale interconnected systems (LSS). We consider the LSS as a network of physically coupled subsystems, equipped with a two-layer controller: on the local level, ...
In this paper we present a novel switching function for multiplicative watermarking systems. The switching function is based on the algebraic structure of elliptic curves over finite fields. The resulting function allows for both watermarking generator and remover to define appro ...
This work addresses the problem of cyber-attack isolation within a distributed diagnosis architecture for large-scale interconnected systems. Considering a distributed control architecture, malicious agents are capable of compromising the data exchanged between distributed contro ...
This paper addresses the design of an active cyberattack detection architecture based on multiplicative watermarking, allowing for detection of covert attacks. We propose an optimal design problem, relying on the so-called output-to-output ℓ 2 -gain, which characterizes the maxim ...