98 research outputs found

    Data-driven Identification and Prediction of Power System Dynamics Using Linear Operators

    Get PDF
    In this paper, we propose linear operator theoretic framework involving Koopman operator for the data-driven identification of power system dynamics. We explicitly account for noise in the time series measurement data and propose robust approach for data-driven approximation of Koopman operator for the identification of nonlinear power system dynamics. The identified model is used for the prediction of state trajectories in the power system. The application of the framework is illustrated using an IEEE nine bus test system.Comment: Accepted for publication in IEEE Power and Energy System General Meeting 201

    False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition

    Full text link
    This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be identified by detector based on low-rank decomposition (LD). In this work, a class of more sophisticated FDI attacks that captures the temporal correlation of PMU data is introduced. Such attacks are designed with a convex optimization problem and can always bypass the LD detector. The vulnerability of this attack model is illustrated on both the IEEE 24-bus RTS and the IEEE 118-bus systems.Comment: 6 pages, 4 figures, submitted to 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm

    A Software-based Low-Jitter Servo Clock for Inexpensive Phasor Measurement Units

    Full text link
    This paper presents the design and the implementation of a servo-clock (SC) for low-cost Phasor Measurement Units (PMUs). The SC relies on a classic Proportional Integral (PI) controller, which has been properly tuned to minimize the synchronization error due to the local oscillator triggering the on-board timer. The SC has been implemented into a PMU prototype developed within the OpenPMU project using a BeagleBone Black (BBB) board. The distinctive feature of the proposed solution is its ability to track an input Pulse-Per-Second (PPS) reference with good long-term stability and with no need for specific on-board synchronization circuitry. Indeed, the SC implementation relies only on one co-processor for real-time application and requires just an input PPS signal that could be distributed from a single substation clock

    Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks

    Get PDF
    Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to these technologies becoming ubiquitous in control centers around the world. While the benefits are numerous, the functionality of operator-level applications can easily be nullified by injection of deceptive data signals disguised as genuine measurements. Such deceptive action is a common precursor to nefarious, often malicious activity. A correlation coefficient characterization and machine learning methodology are proposed to detect and identify injection of spoofed data signals. The proposed method utilizes statistical relationships intrinsic to power system parameters, which are quantified and presented. Several spoofing schemes have been developed to qualitatively and quantitatively demonstrate detection capabilities.Comment: 8 pages, 4 figures, submitted to IEEE Transaction

    Detection of Different Types of Fault and its Location in Transmission Line by using Negative Sequence Component

    Get PDF
    In recent years, voltage instability has been a major issue in power systems. There are many factors contributing to voltage collapse which might cause blackouts, such as demands of consumption growth, the influence of harmonic component and reactive power constraints. These factors are very difficult to predict in real environment. High-voltage transmission lines are an important part of the power system. As the operation of the power grid expands, the demands on long distance transmission lines will increase. These lines are often exposed to large diverse geographical areas with complex terrain and weather conditions. If a fault occurs in a transmission line, it can be very hard to find and report it. Even if the fault is fixed, the new steady state of the power systems needs to be monitored to avoid failure again. The paper aims at studying the technology which overcomes various limitations of the power system

    Synchrophasor Technology for Cyber Security in Smart Grid

    Get PDF
    Smart grid is controlled by an authority personnel who uses LAN or the internet to control it. By knowing this information any one from outside can control the smart grid using LAN or the internet. This process of hacking the smart grid control is known as aurora attack. The Aurora attack may pose a risk to rotating machinery operating under certain conditions on the electrical grid. The Aurora attack involves opening and closing one or more circuit breakers, resulting in an out-of-synchronism condition that may damage rotating equipment connected to the power grid.This paper focuses on the Aurora attack on a synchronous generator and the existing technology available to mitigate the attack. The root cause of the vulnerability is breakdown in security. The first level prevents the attack with sound security practices. The second level protects the equipment in the event that the security level is compromised. The equipment can be protected using wide-area synchronized phasor measurement and protection system and security considerations
    corecore