11,792 research outputs found

    Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems

    Full text link
    The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/local control centers, one intelligent way of coordinated cyberattacks is to execute a series of disruptive switching executions on multiple substations using compromised supervisory control and data acquisition (SCADA) systems. These actions can cause significant impacts to an interconnected power grid. Unlike the previous power blackouts, such high-impact initiating events can aggravate operating conditions, initiating instability that may lead to system-wide cascading failure. A systemic evaluation of "nightmare" scenarios is highly desirable for asset owners to manage and prioritize the maintenance and investment in protecting their cyberinfrastructure. This survey paper is a conceptual expansion of real-time monitoring, anomaly detection, impact analyses, and mitigation (RAIM) framework that emphasizes on the resulting impacts, both on steady-state and dynamic aspects of power system stability. Hypothetically, we associate the combinatorial analyses of steady state on substations/components outages and dynamics of the sequential switching orders as part of the permutation. The expanded framework includes (1) critical/noncritical combination verification, (2) cascade confirmation, and (3) combination re-evaluation. This paper ends with a discussion of the open issues for metrics and future design pertaining the impact quantification of cyber-related contingencies

    Smart Grid for the Smart City

    Get PDF
    Modern cities are embracing cutting-edge technologies to improve the services they offer to the citizens from traffic control to the reduction of greenhouse gases and energy provisioning. In this chapter, we look at the energy sector advocating how Information and Communication Technologies (ICT) and signal processing techniques can be integrated into next generation power grids for an increased effectiveness in terms of: electrical stability, distribution, improved communication security, energy production, and utilization. In particular, we deliberate about the use of these techniques within new demand response paradigms, where communities of prosumers (e.g., households, generating part of their electricity consumption) contribute to the satisfaction of the energy demand through load balancing and peak shaving. Our discussion also covers the use of big data analytics for demand response and serious games as a tool to promote energy-efficient behaviors from end users

    Analysis, filtering, and control for Takagi-Sugeno fuzzy models in networked systems

    Get PDF
    Copyright © 2015 Sunjie Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.The fuzzy logic theory has been proven to be effective in dealing with various nonlinear systems and has a great success in industry applications. Among different kinds of models for fuzzy systems, the so-called Takagi-Sugeno (T-S) fuzzy model has been quite popular due to its convenient and simple dynamic structure as well as its capability of approximating any smooth nonlinear function to any specified accuracy within any compact set. In terms of such a model, the performance analysis and the design of controllers and filters play important roles in the research of fuzzy systems. In this paper, we aim to survey some recent advances on the T-S fuzzy control and filtering problems with various network-induced phenomena. The network-induced phenomena under consideration mainly include communication delays, packet dropouts, signal quantization, and randomly occurring uncertainties (ROUs). With such network-induced phenomena, the developments on T-S fuzzy control and filtering issues are reviewed in detail. In addition, some latest results on this topic are highlighted. In the end, conclusions are drawn and some possible future research directions are pointed out.This work was supported in part by the National Natural Science Foundation of China under Grants 61134009, 61329301, 11301118 and 61174136, the Natural Science Foundation of Jiangsu Province of China under Grant BK20130017, the Fundamental Research Funds for the Central Universities of China under Grant CUSF-DH-D-2013061, the Royal Society of the U.K., and the Alexander von Humboldt Foundation of Germany

    Measurement Differences, Faults and Instabilities in Intelligent Energy Systems – Part 2: Fault and Instability Prediction in Overhead High-Voltage Broadband over Power Lines Networks by Applying Fault and Instability Identification Methodology (FIIM)

    Get PDF
    This companion paper of [1] focuses on the prediction of various faults and instabilities that may occur during the operation of the transmission power grid when overhead high-voltage broadband over power lines (OV HV BPL) networks are deployed across it. Having already been identified the theoretical OV HV BPL transfer function for a given OV HV BPL network [1], the faults and instabilities of the transmission power grid are first differentiated from the measurement differences, which can occur during the determination of an OV HV BPL transfer function, and, then, are identified by applying the best L1 Piecewise Monotonic data Approximation (best L1PMA) to the measured OV HV BPL transfer function. When faults and instabilities are detected, a warning is issued.The contribution of this paper is triple. First, the Topology Identification Methodology (TIM) of [1] is here extended to the proposed Fault and Instability Identification Methodology (FIIM) so that faults and instabilities across the transmission power grid can be identified. Also, the curve similarity performance percentage metric (CSPpM) that acts as the accompanying performance metric of FIIM is introduced. Second, the impact of various fault and instability conditions on the OV HV BPL transfer functions is demonstrated. Third, the fault and instability prediction procedure by applying the FIIM is first reported.Citation: Lazaropoulos, A. G. (2016). Measurement Differences, Faults and Instabilities in Intelligent Energy Systems – Part 2: Fault and Instability Prediction in Overhead High-Voltage Broadband over Power Lines Networks by Applying Fault and Instability Identification Methodology (FIIM). Trends in Renewable Energy, 2(3), 113-142. DOI: 10.17737/tre.2016.2.3.002

    Power system security boundary visualization using intelligent techniques

    Get PDF
    In the open access environment, one of the challenges for utilities is that typical operating conditions tend to be much closer to security boundaries. Consequently, security levels for the transmission network must be accurately assessed and easily identified on-line by system operators;Security assessment through boundary visualization provides the operator with knowledge of system security levels in terms of easily monitorable pre-contingency operating parameters. The traditional boundary visualization approach results in a two-dimensional graph called a nomogram. However, an intensive labor involvement, inaccurate boundary representation, and little flexibility in integrating with the energy management system greatly restrict use of nomograms under competitive utility environment. Motivated by the new operating environment and based on the traditional nomogram development procedure, an automatic security boundary visualization methodology has been developed using neural networks with feature selection. This methodology provides a new security assessment tool for power system operations;The main steps for this methodology include data generation, feature selection, neural network training, and boundary visualization. In data generation, a systematic approach to data generation has been developed to generate high quality data. Several data analysis techniques have been used to analyze the data before neural network training. In feature selection, genetic algorithm based methods have been used to select the most predicative precontingency operating parameters. Following neural network training, a confidence interval calculation method to measure the neural network output reliability has been derived. Sensitivity analysis of the neural network output with respect to input parameters has also been derived. In boundary visualization, a composite security boundary visualization algorithm has been proposed to present accurate boundaries in two dimensional diagrams to operators for any type of security problem;This methodology has been applied to thermal overload, voltage instability problems for a sample system

    False Data Injection Attack Detection based on Hilbert-Huang Transform in AC Smart Islands

    Get PDF
    In Smart Island (SI) systems, operators of power distribution system usually utilize actual-time measurement information as the Advanced Metering Infrastructure (AMI) to have an accurate, efficient, advanced control and monitor of whole their system. SI system can be vulnerable to complicated information integrity attacks such as False Data Injection Attack (FDIA) on some equipment including sensors and controllers, which can generate misleading operational decision in the system. Hence, lack of detailed research in the evaluation of power system that links the FDIAs with system stability is felt, and it will be important for both assessment of the effect of cyber-attack and taking preventive protection measures. In this regards, time-frequency-based differential approach is proposed for SI cyber-attack detection according to non-stationary signal assessment. In this paper, non-stationary signal processing approach of Hilbert-Huang Transform (HHT) is performed for the FDIA detection in several case studies. Since various critical case studies with a small FDIA in data where accurate and efficient detection can be a challenge, the simulation results confirm the efficiency of HHT approach and the proposed detection frame is compared with shallow model. In this research, the configuration of the SI test case is developed in the MATLAB software with several Distributed Generations (DGs). As a result, it is found that the HHT approach is completely efficient and reliable for FDIA detection target in AC-SI. The simulation results verify that the proposed model is able to achieve accuracy rate of 93.17% and can detect FDIAs less than 50 ms from cyber-attack starting in different kind of scenarios
    • …
    corecore