2,677 research outputs found
Secure Distributed Dynamic State Estimation in Wide-Area Smart Grids
Smart grid is a large complex network with a myriad of vulnerabilities,
usually operated in adversarial settings and regulated based on estimated
system states. In this study, we propose a novel highly secure distributed
dynamic state estimation mechanism for wide-area (multi-area) smart grids,
composed of geographically separated subregions, each supervised by a local
control center. We firstly propose a distributed state estimator assuming
regular system operation, that achieves near-optimal performance based on the
local Kalman filters and with the exchange of necessary information between
local centers. To enhance the security, we further propose to (i) protect the
network database and the network communication channels against attacks and
data manipulations via a blockchain (BC)-based system design, where the BC
operates on the peer-to-peer network of local centers, (ii) locally detect the
measurement anomalies in real-time to eliminate their effects on the state
estimation process, and (iii) detect misbehaving (hacked/faulty) local centers
in real-time via a distributed trust management scheme over the network. We
provide theoretical guarantees regarding the false alarm rates of the proposed
detection schemes, where the false alarms can be easily controlled. Numerical
studies illustrate that the proposed mechanism offers reliable state estimation
under regular system operation, timely and accurate detection of anomalies, and
good state recovery performance in case of anomalies
Bad Data Injection Attack and Defense in Electricity Market using Game Theory Study
Applications of cyber technologies improve the quality of monitoring and
decision making in smart grid. These cyber technologies are vulnerable to
malicious attacks, and compromising them can have serious technical and
economical problems. This paper specifies the effect of compromising each
measurement on the price of electricity, so that the attacker is able to change
the prices in the desired direction (increasing or decreasing). Attacking and
defending all measurements are impossible for the attacker and defender,
respectively. This situation is modeled as a zero sum game between the attacker
and defender. The game defines the proportion of times that the attacker and
defender like to attack and defend different measurements, respectively. From
the simulation results based on the PJM 5 Bus test system, we can show the
effectiveness and properties of the studied game.Comment: To appear in IEEE Transactions on Smart Grid, Special Issue on Cyber,
Physical, and System Security for Smart Gri
Comparing Kalman Filters and Observers for Power System Dynamic State Estimation with Model Uncertainty and Malicious Cyber Attacks
Kalman filters and observers are two main classes of dynamic state estimation
(DSE) routines. Power system DSE has been implemented by various Kalman
filters, such as the extended Kalman filter (EKF) and the unscented Kalman
filter (UKF). In this paper, we discuss two challenges for an effective power
system DSE: (a) model uncertainty and (b) potential cyber attacks. To address
this, the cubature Kalman filter (CKF) and a nonlinear observer are introduced
and implemented. Various Kalman filters and the observer are then tested on the
16-machine, 68-bus system given realistic scenarios under model uncertainty and
different types of cyber attacks against synchrophasor measurements. It is
shown that CKF and the observer are more robust to model uncertainty and cyber
attacks than their counterparts. Based on the tests, a thorough qualitative
comparison is also performed for Kalman filter routines and observers.Comment: arXiv admin note: text overlap with arXiv:1508.0725
False Data Injection Attacks in Smart Grids: State of the Art and Way Forward
In the recent years cyberattacks to smart grids are becoming more frequent
Among the many malicious activities that can be launched against smart grids
False Data Injection FDI attacks have raised significant concerns from both
academia and industry FDI attacks can affect the internal state estimation
processcritical for smart grid monitoring and controlthus being able to bypass
conventional Bad Data Detection BDD methods Hence prompt detection and precise
localization of FDI attacks is becomming of paramount importance to ensure
smart grids security and safety Several papers recently started to study and
analyze this topic from different perspectives and address existing challenges
Datadriven techniques and mathematical modelings are the major ingredients of
the proposed approaches The primary objective of this work is to provide a
systematic review and insights into FDI attacks joint detection and
localization approaches considering that other surveys mainly concentrated on
the detection aspects without detailed coverage of localization aspects For
this purpose we select and inspect more than forty major research contributions
while conducting a detailed analysis of their methodology and objectives in
relation to the FDI attacks detection and localization We provide our key
findings of the identified papers according to different criteria such as
employed FDI attacks localization techniques utilized evaluation scenarios
investigated FDI attack types application scenarios adopted methodologies and
the use of additional data Finally we discuss open issues and future research
direction
Assessing and augmenting SCADA cyber security: a survey of techniques
SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability
Smart Grid Technologies in Europe: An Overview
The old electricity network infrastructure has proven to be inadequate, with respect to modern challenges such as alternative energy sources, electricity demand and energy saving policies. Moreover, Information and Communication Technologies (ICT) seem to have reached an adequate level of reliability and flexibility in order to support a new concept of electricity networkāthe smart grid. In this work, we will analyse the state-of-the-art of smart grids, in their technical, management, security, and optimization aspects. We will also provide a brief overview of the regulatory aspects involved in the development of a smart grid, mainly from the viewpoint of the European Unio
- ā¦