AUTHOR=Cao Ge , Jia Rong , Dang Jian TITLE=Distributed Resilient Mitigation Strategy for False Data Injection Attack in Cyber-Physical Microgrids JOURNAL=Frontiers in Energy Research VOLUME=Volume 10 - 2022 YEAR=2022 URL=https://www.frontiersin.org/journals/energy-research/articles/10.3389/fenrg.2022.845341 DOI=10.3389/fenrg.2022.845341 ISSN=2296-598X ABSTRACT=The stable and reliable operation of microgrids depends on the immediate communication and accurate operation information in cyber systems. The cyber security in cyber-physical microgrids has drawn more attention in smart grids. With the flexible electrical topology and the distributed control strategy based on public communication network and end-to-end neighbor communication, the application and effect of cyber security technologies (firewall and encryption) in traditional cyber systems are limited. Among lots of cyber attacks, false data injection attack (FDIA) that replaces the measurement and transmission data with the state variables containing the attack signal, is the prominent attack in microgrids. Therefore, the countermeasures against FDIA are introduced in the control process to enhance the cyber security of microgrids. Considering the control failure and even system results from cyber attack on the cooperative control of microgrids, this paper investigates the synchronous mitigation framework based on local detection where the reactive power cooperative control targets of microgrids with and without FDIA are compatible by the resilient control method. The credibility is utilized to measure the reliability of local and neighbor data in the proposed method. The consensus communication coupling gain is weighted corrected by adaptive update strategy of credibility to delete attack signal. Moreover, the proposed method directly improves the conventional distributed secondary controller that reduces the complexity of controller design. Simulations validate the effectiveness and practicability of the proposed distributed resilient consensus cooperative control method under conditions of deception and disruption attacks.