401 research outputs found

    Improved fault-tolerant PMU placement using algebraic connectivity of graphs

    Get PDF
    Due to perpetual and innovative technological advancements, the need for reliable and stable power generation and transmission has been increasing dramatically over the years. Smart grids use advanced technologies to provide self-monitoring, self-checking and self-healing power networks, including smart metering devices capable of providing accurate measurements of the network’s power components. Among the most important metering devices in this context are “Phasor Measurement Units (PMUs)â€. PMUs are metering devices that provide synchronized measurements of voltage, current and phase angle differences using signals from the GPS satellites. However, due to the high cost of such advanced metering devices, studies were performed to determine the minimum number of PMUs required and their strategic placements in the power networks to provide full system observability. In this thesis, we consider fault-tolerant PMU placement aiming to minimize the number of PMUs while maintaining system observability under various contingencies. Conventionally, the optimal number of PMUs in a system is determined based on the system’s connectivity matrix under no contingency. This thesis considers fault- tolerant PMU placement under single and double branch failures. We propose algebraic connectivity, or Fiedler value, to identify the worst- case branch failures in terms of connectivity degradation. The proposed PMU placement accounts for this worst-case and covers a large percentage of other single and double branch failures. Furthermore, we propose the usage of Fiedler vector to provide a PMU placement that would ensure that the system remains fully observable during system partitioning into separate sub-systems. The resulting placements are compared with those obtained without considering connectivity degradation or system partitioning in terms of the percentages of observable systems during any single and double branch failures. The proposed PMU placements have increased percentages of fully observable systems in the event of any single or double branch failures compared to non—contingency based placement, with a reasonable increase in number of PMUs, and for some placement approaches no increase in PMUs is needed for providing a higher percentage of fully observable systems

    Improved fault-tolerant PMU placement using algebraic connectivity of graphs

    Get PDF
    Due to perpetual and innovative technological advancements, the need for reliable and stable power generation and transmission has been increasing dramatically over the years. Smart grids use advanced technologies to provide self-monitoring, self-checking and self-healing power networks, including smart metering devices capable of providing accurate measurements of the network\u27s power components. Among the most important metering devices in this context are Phasor Measurement Units (PMUs) . PMUs are metering devices that provide synchronized measurements of voltage, current and phase angle differences using signals from the GPS satellites. However, due to the high cost of such advanced metering devices, studies were performed to determine the minimum number of PMUs required and their strategic placements in the power networks to provide full system observability. In this thesis, we consider fault-tolerant PMU placement aiming to minimize the number of PMUs while maintaining system observability under various contingencies. Conventionally, the optimal number of PMUs in a system is determined based on the system\u27s connectivity matrix under no contingency. This thesis considers fault- tolerant PMU placement under single and double branch failures. We propose algebraic connectivity, or Fiedler value, to identify the worst- case branch failures in terms of connectivity degradation. The proposed PMU placement accounts for this worst-case and covers a large percentage of other single and double branch failures. Furthermore, we propose the usage of Fiedler vector to provide a PMU placement that would ensure that the system remains fully observable during system partitioning into separate sub-systems. The resulting placements are compared with those obtained without considering connectivity degradation or system partitioning in terms of the percentages of observable systems during any single and double branch failures. The proposed PMU placements have increased percentages of fully observable systems in the event of any single or double branch failures compared to non—contingency based placement, with a reasonable increase in number of PMUs, and for some placement approaches no increase in PMUs is needed for providing a higher percentage of fully observable systems

    Approximating maximum edge 2-coloring in simple graphs via local improvement

    Get PDF
    AbstractWe present a polynomial-time approximation algorithm for legally coloring as many edges of a given simple graph as possible using two colors. It achieves an approximation ratio of 2429≈0.828

    CPS Attacks Mitigation Approaches on Power Electronic Systems with Security Challenges for Smart Grid Applications: A Review

    Get PDF
    This paper presents an inclusive review of the cyber-physical (CP) attacks, vulnerabilities, mitigation approaches on the power electronics and the security challenges for the smart grid applications. With the rapid evolution of the physical systems in the power electronics applications for interfacing renewable energy sources that incorporate with cyber frameworks, the cyber threats have a critical impact on the smart grid performance. Due to the existence of electronic devices in the smart grid applications, which are interconnected through communication networks, these networks may be subjected to severe cyber-attacks by hackers. If this occurs, the digital controllers can be physically isolated from the control loop. Therefore, the cyber-physical systems (CPSs) in the power electronic systems employed in the smart grid need special treatment and security. In this paper, an overview of the power electronics systems security on the networked smart grid from the CP perception, as well as then emphases on prominent CP attack patterns with substantial influence on the power electronics components operation along with analogous defense solutions. Furthermore, appraisal of the CPS threats attacks mitigation approaches, and encounters along the smart grid applications are discussed. Finally, the paper concludes with upcoming trends and challenges in CP security in the smart grid applications

    Run for Cover: Dominating Set via Mobile Agents

    Full text link
    Research involving computing with mobile agents is a fast-growing field, given the advancement of technology in automated systems, e.g., robots, drones, self-driving cars, etc. Therefore, it is pressing to focus on solving classical network problems using mobile agents. In this paper, we study one such problem -- finding small dominating sets of a graph GG using mobile agents. Dominating set is interesting in the field of mobile agents as it opens up a way for solving various robotic problems, e.g., guarding, covering, facility location, transport routing, etc. In this paper, we first present two algorithms for computing a {\em minimal dominating set}: (i) an O(m)O(m) time algorithm if the robots start from a single node (i.e., gathered initially), (ii) an O(Δlog(λ)+n+m)O(\ell\Delta\log(\lambda)+n\ell+m) time algorithm, if the robots start from multiple nodes (i.e., positioned arbitrarily), where mm is the number of edges and Δ\Delta is the maximum degree of GG, \ell is the number of clusters of the robot initially and λ\lambda is the maximum ID-length of the robots. Then we present a ln(Δ)\ln (\Delta) approximation algorithm for the {\em minimum} dominating set which takes O(nΔlog(λ))O(n\Delta\log (\lambda)) rounds

    Modeling and control of a dynamic information flow tracking system

    Get PDF
    This thesis introduces and details the effort of modeling and control design of an information tracking system for computer security purposes. It is called Dynamic Information Flow Tracking (DIFT) system. The DIFT system is developed at the Computer Science Department at the University of New Mexico, works by tagging data and tracking it to measure the information flow throughout the system. DIFT can be used for several security applications such as securing sensor networks and honeypot - which is a trap set to detect, deflect, or counteract attempts at unauthorized use of information systems. Existing DIFT systems cannot track address and control dependencies, therefore, their applicability is currently very limited because important information flow dependencies are not tracked for stability reasons. A new approach is taken, aimed at stabilizing DIFT systems and enabling it to detect control dependencies at the assembly-level, through control theory. Modern control has been used to model several cyber-physical, computing, networking, economical... systems. In an effort to model a computing system using control theory, this thesis introduces a general hybrid systems framework to model the flow of information in DIFT when control dependencies are encountered. Information flow in DIFT is represented by a numeric vector called taint vector . The model suggested benefits from the characteristics of hybrid systems and its ability to represent continuous variables and discrete events occurring. The system is stabilized by making sure that the taint vectors represent the true information flow in control dependencies. This problem is solved by designing a PID and model predictive controller which guarantee that system does not over taint, while allowing information to flow properly. The modeling framework is validated by comparing simulations of the hybrid models against. This research provides a new approach to solve the DIFT over-tainting problems through modeling it as a hybrid system and forcing the constraints to be obeyed by the taint values.\u2

    Securing industrial control system environments: the missing piece

    Get PDF
    Cyberattacks on industrial control systems (ICSs) are no longer matters of anticipation. These systems are continually subject to malicious attacks without much resistance. Network breaches, data theft, denial of service, and command and control functions are examples of common attacks on ICSs. Despite available security solutions, safety, security, resilience, and performance require both private public sectors to step-up strategies to address increasing security concerns on ICSs. This paper reviews the ICS security risk landscape, including current security solution strategies in order to determine the gaps and limitations for effective mitigation. Notable issues point to a greater emphasis on technology security while discounting people and processes attributes. This is clearly incongruent with; emerging security risk trends, the biased security strategy of focusing more on supervisory control and data acquisition systems, and the emergence of more sector-specific solutions as against generic security solutions. Better solutions need to include approaches that follow similar patterns as the problem trend. These include security measures that are evolutionary by design in response to security risk dynamics. Solutions that recognize and include; people, process and technology security enhancement into asingle system, and addressing all three-entity vulnerabilities can provide a better solution for ICS environments
    corecore