6,033 research outputs found

    Power Market Cybersecurity and Profit-targeting Cyberattacks

    Get PDF
    The COVID-19 pandemic has forced many companies and business to operate through remote platforms, which has made everyday life and everyone more digitally connected than ever before. The cybersecurity has become a bigger priority in all aspects of life. A few real-world cases have demonstrated the current capability of cyberattacks as in [1], [2], and [3]. These cases invalidate the traditional belief that cyberattacks are unable to penetrate real-world industrial systems. Beyond the physical damage, some attackers target financial arbitrage advantages brought by false data injection attacks (FDIAs) [4]. Malicious breaches into power market operations could induce catastrophic consequences on fair financial settlements and reliable transmission services. In this dissertation, an in-depth study is conducted to investigate power market cybersecurity and profit-targeting cyberattacks. In the first work, we demonstrate the importance of market-level behavior in defending cyberattacks and designing cyberattacks. A market-level defense analysis is developed to help operators identify cyberattacks, and an LMP-disguising attack strategy is developed to disguise the abnormal LMPs, which can bypass both the bad data detection and market-level detection. In the second work, we propose a comprehensive CVA model for delivering a detailed analysis of four aspects of vulnerability: highly probable cyberattack targets, devastating attack targets, risky load levels, and mitigation ability under different degrees of defense. In the third work, we identify that revenue adequacy, a fundamental power market operation criterion, has not been analyzed under the context of cybersecurity, and we explore the impact of FDIAs targeting real-time (RT) market operations on ISO revenue adequacy analytically and numerically. In the last work, we extend the power system cybersecurity analysis to multi-energy system (MES) framework. An optimally coordinated (OC-FDIA) targeting MES is proposed. Then, we show that the OC-FDIA cause much more severe damages than single-system FDIA and uncoordinated FDIAs. Further, an effective countermeasure is developed against the proposed OCFDIA based on deep learning technique (DL)

    Insights from the Inventory of Smart Grid Projects in Europe: 2012 Update

    Get PDF
    By the end of 2010 the Joint Research Centre, the European Commission’s in-house science service, launched the first comprehensive inventory of smart grid projects in Europe1. The final catalogue was published in July 2011 and included 219 smart grid and smart metering projects from the EU-28 member states, Switzerland and Norway. The participation of the project coordinators and the reception of the report by the smart grid community were extremely positive. Due to its success, the European Commission decided that the project inventory would be carried out on a regular basis so as to constantly update the picture of smart grid developments in Europe and keep track of lessons learnt and of challenges and opportunities. For this, a new on-line questionnaire was launched in March 2012 and information on projects collected up to September 2012. At the same time an extensive search of project information on the internet and through cooperation links with other European research organizations was conducted. The resulting final database is the most up to date and comprehensive inventory of smart grids and smart metering projects in Europe, including a total of 281 smart grid projects and 90 smart metering pilot projects and rollouts from the same 30 countries that were included in the 2011 inventory database. Projects surveyed were classified into three categories: R&D, demonstration or pre-deployment) and deployment, and for the first time a distinction between smart grid and smart metering projects was made. The following is an insight into the 2012 report.JRC.F.3-Energy securit

    Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts

    Full text link
    Smart Grid has rapidly transformed the centrally controlled power system into a massively interconnected cyber-physical system that benefits from the revolutions happening in the communications (e.g. 5G) and the growing proliferation of the Internet of Things devices (such as smart metres and intelligent electronic devices). While the convergence of a significant number of cyber-physical elements has enabled the Smart Grid to be far more efficient and competitive in addressing the growing global energy challenges, it has also introduced a large number of vulnerabilities culminating in violations of data availability, integrity, and confidentiality. Recently, false data injection (FDI) has become one of the most critical cyberattacks, and appears to be a focal point of interest for both research and industry. To this end, this paper presents a comprehensive review in the recent advances of the FDI attacks, with particular emphasis on 1) adversarial models, 2) attack targets, and 3) impacts in the Smart Grid infrastructure. This review paper aims to provide a thorough understanding of the incumbent threats affecting the entire spectrum of the Smart Grid. Related literature are analysed and compared in terms of their theoretical and practical implications to the Smart Grid cybersecurity. In conclusion, a range of technical limitations of existing false data attack research is identified, and a number of future research directions is recommended.Comment: Double-column of 24 pages, prepared based on IEEE Transaction articl

    Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks

    Full text link
    This paper studies the vulnerability of large-scale power systems to false data injection (FDI) attacks through their physical consequences. Prior work has shown that an attacker-defender bi-level linear program (ADBLP) can be used to determine the worst-case consequences of FDI attacks aiming to maximize the physical power flow on a target line. This ADBLP can be transformed into a single-level mixed-integer linear program, but it is hard to solve on large power systems due to numerical difficulties. In this paper, four computationally efficient algorithms are presented to solve the attack optimization problem on large power systems. These algorithms are applied on the IEEE 118-bus system and the Polish system with 2383 buses to conduct vulnerability assessments, and they provide feasible attacks that cause line overflows, as well as upper bounds on the maximal power flow resulting from any attack.Comment: 6 pages, 5 figure

    Optimal and Secure Electricity Market Framework for Market Operation of Multi-Microgrid Systems

    Get PDF
    Traditional power systems were typically based on bulk energy services by large utility companies. However, microgrids and distributed generations have changed the structure of modern power systems as well as electricity markets. Therefore, restructured electricity markets are needed to address energy transactions in modern power systems. In this dissertation, we developed a hierarchical and decentralized electricity market framework for multi-microgrid systems, which clears energy transactions through three market levels; Day-Ahead-Market (DAM), Hour-Ahead-Market (HAM) and Real-Time-Market (RTM). In this market, energy trades are possible between all participants within the microgrids as well as inter-microgrids transactions. In this approach, we developed a game-theoretic-based double auction mechanism for energy transactions in the DAM, while HAM and RTM are cleared by an optimization algorithm and reverse action mechanism, respectively. For data exchange among market players, we developed a secure data-centric communication approach using the Data Distribution Service. Results demonstrated that this electricity market could significantly reduce the energy price and dependency of the multi-microgrid area on the external grid. Furthermore, we developed and verified a hierarchical blockchain-based energy transaction framework for a multi-microgrid system. This framework has a unique structure, which makes it possible to check the feasibility of energy transactions from the power system point of view by evaluating transmission system constraints. The blockchain ledger summarization, microgrid equivalent model development, and market players’ security and privacy enhancement are new approaches to this framework. The research in this dissertation also addresses some ancillary services in power markets such as an optimal power routing in unbalanced microgrids, where we developed a multi-objective optimization model and verified its ability to minimize the power imbalance factor, active power losses and voltage deviation in an unbalanced microgrid. Moreover, we developed an adaptive real-time congestion management algorithm to mitigate congestions in transmission systems using dynamic thermal ratings of transmission lines. Results indicated that the developed algorithm is cost-effective, fast, and reliable for real-time congestion management cases. Finally, we completed research about the communication framework and security algorithm for IEC 61850 Routable GOOSE messages and developed an advanced protection scheme as its application in modern power systems

    Distribution system congestion management through market mechanism

    Get PDF
    Nowadays, the electricity industry has experienced essential changes compared to the past. The idea of distributed generations (DGs) in distribution networks replacing the bulk power plants traditionally connected to the high voltage levels is one of those changes. Irrespective of the positive aspects of the mentioned change, congestion is the problem that is increasingly occurring in distribution systems due to an upward trend in DGs’ penetration in distribution net-works. Methods to solve the congestion in distribution networks has received the attention of researchers and those who are working in the distribution network domain recently. The idea of the thesis is to solve the congestion in distribution networks through market mechanisms. To do so, a simulation environment is designed and implemented in order to ena-ble us to analyze and understand the features of various scenarios associated with congestion management with or without using market mechanisms. By using the simulation environment, five different scenarios are investigated, and the results show the congestion relief of the distri-bution network by linking the flexibility buyers (distribution system operators (DSOs)) to flexibil-ity providers (aggregators) through the local flexibility market (LFM) platform. Timing and fre-quency of operation are proposed for LFM in the thesis. Besides, the benefits of LFM for DSOs are investigated, and the impact of inaccuracy in predictive optimal power flow (OPF) on the real-time operation of the distribution system is studied as well

    Critical Infrastructure Protection Metrics and Tools Papers and Presentations

    Get PDF
    Contents: Dr. Hilda Blanco: Prioritizing Assets in Critical Infrastructure Systems; Christine Poptanich: Strategic Risk Analysis; Geoffrey S. French/Jin Kim: Threat-Based Approach to Risk Case Study: Strategic Homeland Infrastructure Risk Assessment (SHIRA); William L. McGill: Techniques for Adversary Threat Probability Assessment; Michael R. Powers: The Mathematics of Terrorism Risk Stefan Pickl: SOA Approach to the IT-based Protection of CIP; Richard John: Probabilistic Project Management for a Terrorist Planning a Dirty Bomb Attack on a Major US Port; LCDR Brady Downs: Maritime Security Risk Analysis Model (MSRAM); Chel Stromgren: Terrorism Risk Assessment and Management (TRAM); Steve Lieberman: Convergence of CIP and COOP in Banking and Finance; Harry Mayer: Assessing the Healthcare and Public Health Sector with Model Based Risk Analysis; Robert Powell: How Much and On What? Defending and Deterring Strategic Attackers; Ted G. Lewis: Why Do Networks Cascade
    • …
    corecore