23 research outputs found

    電力系統の静的および動的セキュリティ評価増強のための同期位相計測装置の最適配置

    Get PDF
    九州工業大学博士学位論文 学位記番号:工博甲第490号 学位授与年月日:令和2年3月25日1 INTRODUCTION|2 PMU-BASED POWER SYSTEM MONITORING AND CONTROL|3 OPTIMAL PMU PLACEMENT PROBLEM AND STATE ESTIMATION|4 MULTI OBJECTIVE PMU PLACEMENT WITH CURRENT CHANNEL SELECTION|5 INFLUENCE OF MEASUREMENT UNCERTAINTY PROPAGATION IN PMU PSEUDO MEASUREMENT|6 PHASOR-ASSISTED VOLTAGE STABILITY ASSESSMENT BASED ON OPTIMALLY PLACED PMUS|7 PMU PLACEMENT FOR DYNAMIC VULNERABILITY ASSESSMENT|8 CONCLUSIONS九州工業大学令和元年

    Cloud Computing Strategies for Enhancing Smart Grid Performance in Developing Countries

    Get PDF
    In developing countries, the awareness and development of Smart Grids are in the introductory stage and the full realisation needs more time and effort. Besides, the partially introduced Smart Grids are inefficient, unreliable, and environmentally unfriendly. As the global economy crucially depends on energy sustainability, there is a requirement to revamp the existing energy systems. Hence, this research work aims at cost-effective optimisation and communication strategies for enhancing Smart Grid performance on Cloud platforms

    Impact Assessment, Detection, And Mitigation Of False Data Attacks In Electrical Power Systems

    Get PDF
    The global energy market has seen a massive increase in investment and capital flow in the last few decades. This has completely transformed the way power grids operate - legacy systems are now being replaced by advanced smart grid infrastructures that attest to better connectivity and increased reliability. One popular example is the extensive deployment of phasor measurement units, which is referred to PMUs, that constantly provide time-synchronized phasor measurements at a high resolution compared to conventional meters. This enables system operators to monitor in real-time the vast electrical network spanning thousands of miles. However, a targeted cyber attack on PMUs can prompt operators to take wrong actions that can eventually jeopardize the power system reliability. Such threats originating from the cyber-space continue to increase as power grids become more dependent on PMU communication networks. Additionally, these threats are becoming increasingly efficient in remaining undetected for longer periods while gaining deep access into the power networks. An attack on the energy sector immediately impacts national defense, emergency services, and all aspects of human life. Cyber attacks against the electric grid may soon become a tactic of high-intensity warfare between nations in near future and lead to social disorder. Within this context, this dissertation investigates the cyber security of PMUs that affects critical decision-making for a reliable operation of the power grid. In particular, this dissertation focuses on false data attacks, a key vulnerability in the PMU architecture, that inject, alter, block, or delete data in devices or in communication network channels. This dissertation addresses three important cyber security aspects - (1) impact assessment, (2) detection, and (3) mitigation of false data attacks. A comprehensive background of false data attack models targeting various steady-state control blocks is first presented. By investigating inter-dependencies between the cyber and the physical layers, this dissertation then identifies possible points of ingress and categorizes risk at different levels of threats. In particular, the likelihood of cyber attacks against the steady-state power system control block causing the worst-case impacts such as cascading failures is investigated. The case study results indicate that false data attacks do not often lead to widespread blackouts, but do result in subsequent line overloads and load shedding. The impacts are magnified when attacks are coordinated with physical failures of generators, transformers, or heavily loaded lines. Further, this dissertation develops a data-driven false data attack detection method that is independent of existing in-built security mechanisms in the state estimator. It is observed that a convolutional neural network classifier can quickly detect and isolate false measurements compared to other deep learning and traditional classifiers. Finally, this dissertation develops a recovery plan that minimizes the consequence of threats when sophisticated attacks remain undetected and have already caused multiple failures. Two new controlled islanding methods are developed that minimize the impact of attacks under the lack of, or partial information on the threats. The results indicate that the system operators can successfully contain the negative impacts of cyber attacks while creating stable and observable islands. Overall, this dissertation presents a comprehensive plan for fast and effective detection and mitigation of false data attacks, improving cyber security preparedness, and enabling continuity of operations

    Impact Assessment, Detection, and Mitigation of False Data Attacks in Electrical Power Systems

    Get PDF
    The global energy market has seen a massive increase in investment and capital flow in the last few decades. This has completely transformed the way power grids operate - legacy systems are now being replaced by advanced smart grid infrastructures that attest to better connectivity and increased reliability. One popular example is the extensive deployment of phasor measurement units, which is referred to PMUs, that constantly provide time-synchronized phasor measurements at a high resolution compared to conventional meters. This enables system operators to monitor in real-time the vast electrical network spanning thousands of miles. However, a targeted cyber attack on PMUs can prompt operators to take wrong actions that can eventually jeopardize the power system reliability. Such threats originating from the cyber-space continue to increase as power grids become more dependent on PMU communication networks. Additionally, these threats are becoming increasingly efficient in remaining undetected for longer periods while gaining deep access into the power networks. An attack on the energy sector immediately impacts national defense, emergency services, and all aspects of human life. Cyber attacks against the electric grid may soon become a tactic of high-intensity warfare between nations in near future and lead to social disorder. Within this context, this dissertation investigates the cyber security of PMUs that affects critical decision-making for a reliable operation of the power grid. In particular, this dissertation focuses on false data attacks, a key vulnerability in the PMU architecture, that inject, alter, block, or delete data in devices or in communication network channels. This dissertation addresses three important cyber security aspects - (1) impact assessment, (2) detection, and (3) mitigation of false data attacks. A comprehensive background of false data attack models targeting various steady-state control blocks is first presented. By investigating inter-dependencies between the cyber and the physical layers, this dissertation then identifies possible points of ingress and categorizes risk at different levels of threats. In particular, the likelihood of cyber attacks against the steady-state power system control block causing the worst-case impacts such as cascading failures is investigated. The case study results indicate that false data attacks do not often lead to widespread blackouts, but do result in subsequent line overloads and load shedding. The impacts are magnified when attacks are coordinated with physical failures of generators, transformers, or heavily loaded lines. Further, this dissertation develops a data-driven false data attack detection method that is independent of existing in-built security mechanisms in the state estimator. It is observed that a convolutional neural network classifier can quickly detect and isolate false measurements compared to other deep learning and traditional classifiers. Finally, this dissertation develops a recovery plan that minimizes the consequence of threats when sophisticated attacks remain undetected and have already caused multiple failures. Two new controlled islanding methods are developed that minimize the impact of attacks under the lack of, or partial information on the threats. The results indicate that the system operators can successfully contain the negative impacts of cyber attacks while creating stable and observable islands. Overall, this dissertation presents a comprehensive plan for fast and effective detection and mitigation of false data attacks, improving cyber security preparedness, and enabling continuity of operations

    On the design of a cost-efficient resource management framework for low latency applications

    Get PDF
    The ability to offer low latency communications is one of the critical design requirements for the upcoming 5G era. The current practice for achieving low latency is to overprovision network resources (e.g., bandwidth and computing resources). However, this approach is not cost-efficient, and cannot be applied in large-scale. To solve this, more cost-efficient resource management is required to dynamically and efficiently exploit network resources to guarantee low latencies. The advent of network virtualization provides novel opportunities in achieving cost-efficient low latency communications. It decouples network resources from physical machines through virtualization, and groups resources in the form of virtual machines (VMs). By doing so, network resources can be flexibly increased at any network locations through VM auto-scaling to alleviate network delays due to lack of resources. At the same time, the operational cost can be largely reduced by shutting down low-utilized VMs (e.g., energy saving). Also, network virtualization enables the emerging concept of mobile edge-computing, whereby VMs can be utilized to host low latency applications at the network edge to shorten communication latency. Despite these advantages provided by virtualization, a key challenge is the optimal resource management of different physical and virtual resources for low latency communications. This thesis addresses the challenge by deploying a novel cost-efficient resource management framework that aims to solve the cost-efficient design of 1) low latency communication infrastructures; 2) dynamic resource management for low latency applications; and 3) fault-tolerant resource management. Compared to the current practices, the proposed framework achieves 80% of deployment cost reduction for the design of low latency communication infrastructures; continuously saves up to 33% of operational cost through dynamic resource management while always achieving low latencies; and succeeds in providing fault tolerance to low latency communications with a guaranteed operational cost

    Modelling and planning reliable wireless sensor networks based on multi-objective optimization genetic algorithm with changeable length

    Get PDF
    Wireless sensor networks (WSN) have shown their potentials in various applications, which bring a lot of benefits to users from different working areas. However, due to the diversity of the deployed environments and resource constraints, it is difficult to predict the performance of a topology. Besides the connectivity, coverage, cost, network longevity and service quality should all be considered during the planning procedure. Therefore, efficiently planning a reliable WSN is a challenging task, which requires designers coping with comprehensive and interdisciplinary knowledge. A WSN planning method is proposed in this work to tackle the above mentioned challenges and efficiently deploying reliable WSNs. First of all, the above mentioned metrics are modeled more comprehensively and practically compared with other works. Especially 3D ray tracing method is used to model the radio link and sensing signal, which are sensitive to the obstruction of obstacles; network routing is constructed by using AODV protocol; the network longevity, packet delay and packet drop rate are obtained via simulating practical events in WSNet simulator, which to the best of our knowledge, is the first time that network simulator is involved in a planning algorithm. Moreover, a multi-objective optimization algorithm is developed to cater for the characteristics of WSNs. Network size is changeable during evolution, meanwhile the crossovers and mutations are limited by certain constraints to eliminate invalid modifications and improve the computation efficiency. The capability of providing multiple optimized solutions simultaneously allows users making their own decisions, and the results are more comprehensive optimized compared with other state-of-the-art algorithms. Practical WSN deployments are also realized for both indoor and outdoor environments and the measurements coincident well with the generated optimized topologies, which prove the efficiency and reliability of the proposed algorithm

    Situational awareness in low-observable distribution grid - exploiting sparsity and multi-timescale data

    Get PDF
    Doctor of PhilosophyDepartment of Electrical and Computer EngineeringBalasubramaniam NatarajanThe power distribution grid is typically unobservable due to a lack of real-time measurements. While deploying more sensors can alleviate this issue, it also presents new challenges related to data aggregation and the underlying communication infrastructure. Limited real-time measurements hinders the distribution system state estimation (DSSE). DSSE involves estimation of the system states (i.e., voltage magnitude and voltage angle) based on available measurements and system model information. To cope with the unobservability issue, sparsity-based DSSE approaches allow us to recover system state information from a small number of measurements, provided the states of the distribution system exhibit sparsity. However, these approaches perform poorly in the presence of outliers in measurements and errors in system model information. In this dissertation, we first develop robust formulations of sparsity-based DSSE to deal with uncertainties in the system model and measurement data in a low-observable distribution grid. We also combine the advantages of two sparsity-based DSSE approaches to estimate grid states with high fidelity in low observability regions. In practical distribution systems, information from field sensors and meters are unevenly sampled at different time scales and could be lost during the transmission process. It is critical to effectively aggregate these information sources for DSSE as well as other tasks related to situational awareness. To address this challenge, the second part of this dissertation proposes a Bayesian framework for multi-timescale data aggregation and matrix completion-based state estimation. Specifically, the multi-scale time-series data aggregated from heterogeneous sources are reconciled using a multitask Gaussian process. The resulting consistent time-series alongwith the confidence bound on the imputations are fed into a Bayesian matrix completion method augmented with linearized power-flow constraints for accurate state estimation low-observable distribution system. We also develop a computationally efficient recursive Gaussian process approach that is capable of handling batch-wise or real-time measurements while leveraging the network connectivity information of the grid. To further enhance the scalability and accuracy, we develop neural network-based approaches (latent neural ordinary differential equation approach and stochastic neural differential equation with recurrent neural network approach) to aggregate irregular time-series data in the distribution grid. The stochastic neural differential equation and recurrent neural network also allows us to quantify the uncertainty in a holistic manner. Simulation results on the different IEEE unbalanced test systems illustrate the high fidelity of the Bayesian and neural network-based methods in aggregating multi-timescale measurements. Lastly, we develop phase, and outage awareness approaches for power distribution grid. In this regard, we first design a graph signal processing approach that identifies the phase labels in the presence of limited measurements and incorrect phase labeling. The second approach proposes a novel outage detector for identifying all outages in a reconfigurable distribution network. Simulation results on standard IEEE test systems reveal the potential of these methods to improve situational awareness

    A Scalable and Adaptive Network on Chip for Many-Core Architectures

    Get PDF
    In this work, a scalable network on chip (NoC) for future many-core architectures is proposed and investigated. It supports different QoS mechanisms to ensure predictable communication. Self-optimization is introduced to adapt the energy footprint and the performance of the network to the communication requirements. A fault tolerance concept allows to deal with permanent errors. Moreover, a template-based automated evaluation and design methodology and a synthesis flow for NoCs is introduced
    corecore