335 research outputs found

    Hierarchical Signal Processing for Tractable Power Flow Management in Electric Grid Networks

    Get PDF
    Rapid advancements in smart grid technologies have brought about the proliferation of intelligent and actuating power system components such as distributed generation, storage, and smart appliance units. Capitalizing fully on the potential benefits of these systems for sustainable and economical power generation, management, and delivery is currently a significant challenge due to issues of scalability, intermittency, and heterogeneity of the associated networks. In particular, vertically integrated and centralized power system management is no longer tractable for optimally coordinating these diverse devices at large scale while also accounting for the underlying complex physical grid constraints. To address these challenges, we propose a hierarchical signal processing framework for optimal power flow management whereby the cyber-physical network relationships of the modern grid are leveraged to enable intelligent decision-making by individual devices based on local constraints and external information. Decentralized and distributed techniques based on convex optimization and game theoretic constructs are employed for information exchanges and decision-making at each tier of the proposed framework. It is shown via theoretical and simulation studies that our technique allows for the seamless integration of power components into the grid with low computational and communication overhead while maintaining optimal, sustainable, and feasible grid operations

    Towards cyber-resilient telecontrol commands using software-defined networking

    Get PDF
    Cybersecurity enhancement of power systems has become one of the main objectives of utility managers and regulatory agencies because of the increasing number of cyberattacks against critical infrastructures. In this paper, we investigate the application of software-defined networking for improving the cyber-resilience of power systems in the presence of cyberattacks using false telecontrol commands. It is first demonstrated that cyberattackers can use false telecontrol commands to separate a power plant from a power grid or trip a major transmission line. Next, it is shown that software-defined networking can significantly enhance the cyber-resilience of power systems in the presence of cyberattacks using false telecontrol commands compared to legacy communication networks. This is because the source, destination and protocol of telecontrol commands can be examined and verified in software-defined networking before communication packet forwarding actions take place. Moreover, primary and back-up routes of telecontrol commands can be pre-engineered in software-defined networking to counteract potential cyberattacks

    False Data Injection Attacks Against Synchronization Systems in Microgrids

    Get PDF
    Synchronization systems play a vital role in the day-to-day operation of power systems and their restoration after cascading failures. Hence, their resilience to cyberattacks is imperative. In this paper, we demonstrate that a well-planned false data injection attack against the synchronization system of a generator is capable of causing tripping subsequently leading to instability and blackout. We present an analytical framework behind the design and implementation of the proposed cyberattack. Moreover, we derive and discuss the conditions for which a cyberattack interfering with a synchronizing signal can be successful. Effective physical mitigation strategies are then proposed to improve the cyber-resilience of synchronization systems. The proposed cyberattack model and mitigation strategies are verified for a microgrid test system using an OPAL-RT real-time simulator

    Cyber-Physical Attacks Targeting Communication-Assisted Protection Schemes

    Get PDF
    The dependence of modern societies on electric energy is ever increasing by the emergence of smart cities and electric vehicles. This is while unprecedented number of cyber-physical hazards are threatening the integrity and availability of the power grid on a daily basis. On one hand, physical integrity of power systems is under threat by more frequent natural disasters and intentional attacks. On the other hand, the cyber vulnerability of power grids is on the rise by the emergence of smart grid technologies. This underlines an imminent need for the modeling and examination of power grid vulnerabilities to cyber-physical attacks. This paper examines the vulnerability of the communication-assisted protection schemes like permissive overreaching transfer trip to cyberattacks using a co-simulation platform. The simulation results show that the transient angle stability of power systems can be jeopardized by cyberattacks on the communication-assisted protection schemes. To address this vulnerability, two physical solutions including the deployment of communication channel redundancy, and a more advanced communicated-assisted protection scheme, i.e., directional comparison unblocking scheme (DCUB), are considered and tested. The proposed solutions address the vulnerability of the communication-assisted protection schemes to distributed denial of service attack to some extent. Yet, the simulation results show the vulnerability of the proposed solutions to sophisticated cyberattacks like false data injection attacks. This highlights the need for the development of cyber-based solutions for communication channel monitoring

    Cybersecurity Enhancement of Transformer Differential Protection Using Machine Learning

    Get PDF
    The growing use of information and communication technologies (ICT) in power grid operational environments has been essential for operators to improve the monitoring, maintenance and control of power generation, transmission and distribution, however, at the expense of an increased grid exposure to cyber threats. This paper considers cyberattack scenarios targeting substation protective relays that can form the most critical ingredient for the protection of power systems against abnormal conditions. Disrupting the relays operations may yield major consequences on the overall power grid performance possibly leading to widespread blackouts. We investigate methods for the enhancement of substation cybersecurity by leveraging the potential of machine learning for the detection of transformer differential protective relays anomalous behavior. The proposed method analyses operational technology (OT) data obtained from the substation current transformers (CTs) in order to detect cyberattacks. Power systems simulation using OPAL-RT HYPERSIM is used to generate training data sets, to simulate the cyberattacks and to assess the cybersecurity enhancement capability of the proposed machine learning algorithms

    A Deep Learning-Based Cyberattack Detection System for Transmission Protective Relays

    Get PDF
    The digitalization of power systems over the past decade has made the cybersecurity of substations a top priority for regulatory agencies and utilities. Proprietary communication protocols are being increasingly replaced by standardized and interoperable protocols providing utility operators with remote access and control capabilities at the expense of growing cyberattack risks. In particular, the potential of supply chain cyberattacks is on the rise in industrial control systems. In this environment, there is a pressing need for the development of cyberattack detection systems for substations and in particular protective relays, a critical component of substation operation. This paper presents a deep learning-based cyberattack detection system for transmission line protective relays. The proposed cyberattack detection system is first trained with current and voltage measurements representing various types of faults on the transmission lines. The cyberattack detection system is then employed to detect current and voltage measurements that are maliciously injected by an attacker to trigger the transmission line protective relays. The proposed cyberattack detection system is evaluated under a variety of cyberattack scenarios. The results demonstrate that a universal architecture can be designed for the deep learning-based cyberattack detection systems in substations

    On robustness against JPEG2000: a performance evaluation of wavelet-based watermarking techniques

    Get PDF
    With the emergence of new scalable coding standards, such as JPEG2000, multimedia is stored as scalable coded bit streams that may be adapted to cater network, device and usage preferences in multimedia usage chains providing universal multimedia access. These adaptations include quality, resolution, frame rate and region of interest scalability and achieved by discarding least significant parts of the bit stream according to the scalability criteria. Such content adaptations may also affect the content protection data, such as watermarks, hidden in the original content. Many wavelet-based robust watermarking techniques robust to such JPEG2000 compression attacks are proposed in the literature. In this paper, we have categorized and evaluated the robustness of such wavelet-based image watermarking techniques against JPEG2000 compression, in terms of algorithmic choices, wavelet kernel selection, subband selection, or watermark selection using a new modular framework. As most of the algorithms use a different set of parametric combination, this analysis is particularly useful to understand the effect of various parameters on the robustness under a common platform and helpful to design any such new algorithm. The analysis also considers the imperceptibility performance of the watermark embedding, as robustness and imperceptibility are two main watermarking properties, complementary to each other

    An Input-to-State Stability Approach to Verify Almost Global Stability of a Synchronous-Machine-Infinite-Bus System

    Get PDF
    Conditions for almost global stability of an operating point of a realistic model of a synchronous generator with constant field current connected to an infinite bus are derived. The analysis is conducted by employing the recently proposed concept of input-to-state stability (ISS)–Leonov functions, which is an extension of the powerful cell structure principle developed by Leonov and Noldus to the ISS framework. Compared with the original ideas of Leonov and Noldus, the ISS–Leonov approach has the advantage of providing additional robustness guarantees. The efficiency of the derived sufficient conditions is illustrated via numerical experiments
    corecore