10.57647/j.spre.2025.0903.17

A Hybrid Defense Framework for Multi-Area AGC Systems Integrating RBPF-UKF, Noise-Adaptive DRL, and Lightweight Blockchain with Post-Quantum Cryptography

  1. Department of Electrical Engineering, Islamic Azad University, CT.C. (Central Tehran Branch), Tehran, Iran
  2. ICT Research Institute, Tehran, Iran

Received: 2025-05-30

Revised: 2025-07-07

Accepted: 2025-07-26

Published in Issue 2025-09-30

How to Cite

Rashtian, N., Yari, A., Ardalani, N., Rabbanifar, P., & Mirabedini, S. J. (2025). A Hybrid Defense Framework for Multi-Area AGC Systems Integrating RBPF-UKF, Noise-Adaptive DRL, and Lightweight Blockchain with Post-Quantum Cryptography. Signal Processing and Renewable Energy (SPRE), 9(3 (September 2025). https://doi.org/10.57647/j.spre.2025.0903.17

PDF views: 66

Abstract

 Modern smart grids are facing increasing cyber threats, including False Data Injection (FDI), delays, and combined attacks, which can destabilize multi-area Automatic Generation Control (AGC) systems and lead to cascading blackouts. This study proposes a hybrid defense framework that integrates three advanced components: a Rao-Blackwellized Particle Filter with Unscented Kalman Filter (RBPF-UKF) for precise nonlinear state estimation under non-Gaussian noise, reducing frequency deviation to below 15 MHz within 2.5–4 seconds; a noise-adaptive Deep Reinforcement Learning (DRL) module utilizing a lightweight two-layer MLP, achieving 99% accuracy in detecting FDI, 97% for delays, and 98.5% for combined attacks; and a lightweight Practical Byzantine Fault Tolerance (PBFT) blockchain secured with CRYSTALS-Kyber/Dilithium post-quantum cryptography, ensuring data integrity with a 0.3-second consensus latency. Tested on a five-area IEEE 39-bus system, the framework surpasses traditional methods like LSTMs, DDPG, and Hyperledger Fabric, reducing estimation errors by 60% and meeting standards such as IEC 62443-4-2 and NIST SP 800-208. Its modular design allows seamless integration with legacy SCADA systems. Additionally, FPGA-based acceleration and energy-efficient variants of McEliece cryptography enhance scalability and sustainability in IoT and distributed grid environments. While effective under extreme conditions (0.5–4 seconds latency, 20% packet loss), scaling to ultra-large networks with over 100 nodes remains challenging, which encourages future research into alternative consensus mechanisms, such as DPoS and ABFT.

Keywords

  • False Data Injection,
  • Rao-Blackwellized Particle Filter,
  • Unscented Kalman Filter,
  • Noise-Adaptive Deep Reinforcement Learning,
  • Post-Quantum Cryptography

References

  1. Roy SD, Debbarma S. Detection and Mitigation of Cyber-Attacks on AGC Systems of Low Inertia Power Grid. IEEE Systems Journal. 2020;14(2):2023-31.https://doi.org/10.1109/JSYST.2019.2943921.
  2. Mohan AM, Meskin N, Mehrjerdi H. A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems. Energies [Internet]. 2020; 13(15).https://doi.org/10.3390/en13153860.
  3. Ameli A, Hooshyar A, El-Saadany EF, Youssef AM. Attack Detection and Identification for Automatic Generation Control Systems. IEEE Transactions on Power Systems. 2018;33(5):4760-74.https://doi.org/10.1109/TPWRS.2018.2810161.
  4. Liang G, Zhao J, Luo F, Weller SR, Dong ZY. A Review of False Data Injection Attacks Against Modern Power Systems. IEEE Transactions on Smart Grid. 2017;8(4):1630-8.https://doi.org/10.1109/TSG.2015.2495133.
  5. Jafari M, Rahman MA, Paudyal S. Optimal False Data Injection Attacks Against Power System Frequency Stability. IEEE Transactions on Smart Grid. 2023;14(2):1276-88.https://doi.org/10.1109/TSG.2022.3206717.
  6. Lou X, Tran C, Tan R, Yau DKY, Kalbarczyk ZT, Banerjee AK, et al. Assessing and Mitigating the Impact of Time Delay Attack: Case Studies for Power Grid Controls. IEEE Journal on Selected Areas in Communications. 2020;38(1):141-55.https://doi.org/10.1109/JSAC.2019.2951982.
  7. Manandhar K, Cao X, Hu F, Liu Y. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter. IEEE Transactions on Control of Network Systems. 2014;1(4):370-9.https://doi.org/10.1109/TCNS.2014.2357531.
  8. Niu H, Bhowmick C, Jagannathan S, editors. A Linear Matrix Inequality-Based Attack Detection Approach for Networked Control Systems. 2018 IEEE Conference on Decision and Control (CDC); 2018 17-19 Dec. 2018.https://doi.org/10.1109/CDC.2018.8619138.
  9. Duo W, Zhou M, Abusorrah A. A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges. IEEE/CAA Journal of Automatica Sinica. 2022;9(5):784-800.https://doi.org/10.1109/JAS.2022.105548.
  10. Wood AJ, Wollenberg BF, Sheblé GB. Power generation, operation, and control. 3rd ed. John Wiley & Sons; 2013.
  11. Khalaf M, Youssef A, El-Saadany E. Joint Detection and Mitigation of False Data Injection Attacks in AGC Systems. IEEE Transactions on Smart Grid. 2019;10(5):4985-95.https://doi.org/10.1109/TSG.2018.2872120.
  12. YW, Alpcan T, Palaniswami M. Security Games for Risk Minimization in Automatic Generation Control. IEEE Transactions on Power Systems. 2015;30(1):223-32.https://doi.org/10.1109/TPWRS.2014.2326403.
  13. Sridhar S, Govindarasu M. Model-Based Attack Detection and Mitigation for Automatic Generation Control. IEEE Transactions on Smart Grid. 2014;5(2):580-91.https://doi.org/10.1109/TSG.2014.2298195.
  14. Das SK, Rahman M, Paul SK, Armin M, Roy PN, Paul N. High-Performance Robust Controller Design of Plug-In Hybrid Electric Vehicle for Frequency Regulation of Smart Grid Using Linear Matrix Inequality Approach. IEEE Access. 2019; 7:116911-24.https://doi.org/10.1109/ACCESS.2019.2936400.
  15. Jin H, and Sun S. Distributed Kalman filtering for sensor networks with random sensor activation, delays, and packet dropouts. International Journal of Systems Science. 2022;53(3):575-92.https://doi.org/10.1080/00207721.2021.1963502.
  16. Akhlaghi S, Zhou N, Huang Z. A Multi-Step Adaptive Interpolation Approach to Mitigating the Impact of Nonlinearity on Dynamic State Estimation. IEEE Transactions on Smart Grid. 2018;9(4):3102-11.https://doi.org/10.1109/TSG.2016.2627339.
  17. Ayad A, Khalaf M, Salama M, El-Saadany EF. Mitigation of false data injection attacks on automatic generation control considering nonlinearities. Electric Power Systems Research. 2022; 209:107958.https://doi.org/10.1016/j.epsr.2022.107958.
  18. Bai CZ, Gupta V, Pasqualetti F. On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds. IEEE Transactions on Automatic Control. 2017;62(12):6641-8.https://doi.org/10.1109/TAC.2017.2714903.
  19. Raman Mr G, Somu N, Mathur AP. A multilayer perceptron model for anomaly detection in water treatment plants. International Journal of Critical Infrastructure Protection. 2020; 31:100393.https://doi.org/10.1016/j.ijcip.2020.100393.
  20. Abbaspour A, Sargolzaei A, Forouzannezhad P, Yen KK, Sarwat AI. Resilient Control Design for Load Frequency Control System Under False Data Injection Attacks. IEEE Transactions on Industrial Electronics. 2020;67(9):7951-62.https://doi.org/10.1109/TIE.2019.2944091.
  21. Tan R, Nguyen HH, Foo EYS, Yau DKY, Kalbarczyk Z, Iyer RK, et al. Modeling and Mitigating the Impact of False Data Injection Attacks on Automatic Generation Control. IEEE Transactions on Information Forensics and Security. 2017;12(7):1609-24.https://doi.org/10.1109/TIFS.2017.2676721.
  22. Lou X, Tran C, Tan R, Yau DKY, Kalbarczyk ZT, Banerjee AK, et al. Assessing and Mitigating the Impact of Time Delay Attack: Case Studies for Power Grid Controls. IEEE Journal on Selected Areas in Communications. 2020;38(1):141-55.https://doi.org/10.1109/JSAC.2019.2951982.
  23. Yan Z, Xu Y. Data-Driven Load Frequency Control for Stochastic Power Systems: A Deep Reinforcement Learning Method with Continuous Action Search. IEEE Transactions on Power Systems. 2019;34(2):1653-6.https://doi.org/10.1109/TPWRS.2018.2881359.
  24. Manikandan S, Kokil P. Stability Analysis of Load Frequency Control System with Constant Communication Delays. IFAC-PapersOnLine. 2020;53(1):338-43.https://doi.org/10.1016/j.ifacol.2020.06.057.
  25. Ko KS, Sung DK. The Effect of EV Aggregators with Time-Varying Delays on the Stability of a Load Frequency Control System. IEEE Transactions on Power Systems. 2018;33(1):669-80.https://doi.org/10.1109/TPWRS.2017.2690915.
  26. Shangguan XC, He Y, Zhang CK, Yao W, Zhao Y, Jiang L, et al. Resilient Load Frequency Control of Power Systems to Compensate Random Time Delays and Time-Delay Attacks. IEEE Transactions on Industrial Electronics.
  27. ;70(5):5115-28., https://doi.org/10.1109/TIE.2022.3186335.
  28. A. Sargolzaei, F. M. Zegers, A. Abbaspour, C. D. Crane, and W. E. Dixon, "Secure Control Design for Networked Control Systems With Nonlinear Dynamics Under Time-Delay-Switch Attacks," IEEE Transactions on Automatic Control, vol. 68, no. 2, pp. 798-811, 2023, https://doi.org/10.1109/TAC.2022.3154354.
  29. Xiahou KS, Liu Y, Wu QH. Robust Load Frequency Control of Power Systems Against Random Time-Delay Attacks. IEEE Transactions on Smart Grid. 2021;12(1):909-11.https://doi.org/10.1109/TSG.2020.3018635.
  30. Zhao X, Ma Z, Li S, Zou S. Robust LFC of Power Systems With Wind Power Under Packet Losses and Communication Delays. IEEE Journal on Emerging and Selected Topics in Circuits and Systems. 2022;12(1):135-48.https://doi.org/10.1109/JETCAS.2022.3141108.
  31. Shahkar S, Khorasani K, editors. A Resilient Control Against Time-Delay Switch and Denial of Service Cyber Attacks on Load Frequency Control of Distributed Power Systems. 2020 IEEE Conference on Control Technology and Applications (CCTA); 2020 24-26 Aug. 2020.https://doi.org/10.1109/CCTA41146.2020.9206282.
  32. Ruan J, Liang G, Zhao J, Zhao H, Qiu J, Wen F, et al. Deep learning for cybersecurity in smart grids: Review and perspectives. Energy Conversion and Economics. 2023;4(4):233-51.https://doi.org/10.1049/enc2.12091.
  33. Sarker IH. Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective. SN Computer Science. 2021;2(3): 154. https://doi.org/10.1007/s42979-021-00535-6.
  34. National Institute of Standards and Technology. NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 4.0. NIST Special Publication 1108r4. Gaithersburg (MD): National Institute of Standards and Technology; 2021 Feb, https://doi.org/10.6028/NIST.SP.1108r4.
  35. Li Y, Yu C, Shahidehpour M, Yang T, Zeng Z, Chai T. Deep Reinforcement Learning for Smart Grid Operations: Algorithms, Applications, and Prospects. Proceedings of the IEEE. 2023;111(9):1055-96. https://doi.org/10.1109/JPROC.2023.3303358.
  36. Ferrag MA, Shu L, Yang X, Derhab A, Maglaras L. Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges. IEEE Access. 2020; 8:32031-۵3.https://doi.org/10.1109/ACCESS.2020.2973178.
  37. Kong PY. A Review of Quantum Key Distribution Protocols from the Smart Grid Communication Security Perspective. IEEE Systems Journal. 2022;16(1):41-54., https://doi.org/10.1109/JSYST.2020.3024956.
  38. Kalman RE. A New Approach to Linear Filtering and Prediction Problems. Journal of Basic Engineering. 1960;82(1):35-45. https://doi.org/10.1115/1.3662552.
  39. Wang F, Zhang J, Lin B, Li X. Two Stage Particle Filter for Nonlinear Bayesian Estimation. IEEE Access. 2018; 6:13803-9. https://doi.org/10.1109/ACCESS.2018.2808922.
  40. Schiffer J, Zonetti D, Ortega R, Stanković AM, Sezi T, Raisch J. A survey on modeling of microgrids—From fundamental physics to phasors and voltage sources. Automatica. 2016; 74:135-50.https://doi.org/10.1016/j.automatica.2016.07.036.
  41. Gunduz MZ, Das R. Cyber-security on smart grid: Threats and potential solutions. Computer Networks. 2020; 169:107094.https://doi.org/10.1109/TSG.2022.3224567.
  42. P. Kundur, Power System Stability and Control, 2nd ed. New York, NY, USA: McGraw-Hill, 2022.
  43. Grewal M, Andrews A. Kalman Filtering: Theory and Practice with MATLAB. 4th ed. Hoboken, NJ: Wiley; 2015.https://ieeexplore.ieee.org/servlet/opac?bknumber=7022514.
  44. Gupta DS. PiLike: Post-Quantum Identity-Based Lightweight Authenticated Key Exchange Protocol for IIoT Environments. IEEE Systems Journal. 2024;18(1):15–23. https://doi.org/10.1109/JSYST.2023.3335217.
  45. Fernández-Caramés TM, Fraga-Lamas P. A Review on the Use of Blockchain for the Internet of Things. IEEE Access. 2018; 6:32979–3001. https://doi.org/10.1109/ACCESS.2018.2842685.