Cyberphysical Infrastructures in Power Systems: Architectures and Vulnerabilities
()
About this ebook
In an uncertain and complex environment, to ensure secure and stable operations of large-scale power systems is one of the biggest challenges that power engineers have to address today. Traditionally, power system operations and decision-making in controls are based on power system computations of physical models describing the behavior of power systems. Largely, physical models are constructed according to some assumptions and simplifications, and such is the case with power system models. However, the complexity of power system stability problems, along with the system's inherent uncertainties and nonlinearities, can result in models that are impractical or inaccurate. This calls for adaptive or deep-learning algorithms to significantly improve current control schemes that solve decision and control problems.
Cyberphysical Infrastructures in Power Systems: Architectures and Vulnerabilities provides an extensive overview of CPS concepts and infrastructures in power systems with a focus on the current state-of-the-art research in this field. Detailed classifications are pursued highlighting existing solutions, problems, and developments in this area.
- Gathers the theoretical preliminaries and fundamental issues related to CPS architectures.
- Provides coherent results in adopting control and communication methodologies to critically examine problems in various units within smart power systems and microgrid systems.
- Presents advanced analysis under cyberphysical attacks and develops resilient control strategies to guarantee safe operation at various power levels.
Magdi S. Mahmoud
Magdi S. Mahmoud is a distinguished professor at King Fahd University of Petroleum and Minerals (KFUPM), Saudi Arabia. He has been faculty member at different universities worldwide including Egypt (CU, AUC), Kuwait (KU), UAE (UAEU), UK (UMIST), USA (Pitt, Case Western), Singapore (Nanyang), and Australia (Adelaide). He lectured in Venezuela (Caracas), Germany (Hanover), UK (Kent), USA (UoSA), Canada (Montreal) and China (BIT, Yanshan). He is the principal author of 51 books, inclusive book-chapters, and author/co-author of more than 610 peer-reviewed papers. He is a fellow of the IEE and a senior member of the IEEE, the CEI (UK). He is currently actively engaged in teaching and research in the development of modern methodologies to distributed control and filtering, networked control systems, fault-tolerant systems, cyberphysical systems, and information technology.
Read more from Magdi S. Mahmoud
Networked Control Systems: Cloud Control and Secure Control Rating: 0 out of 5 stars0 ratingsAdvanced Control Design with Application to Electromechanical Systems Rating: 5 out of 5 stars5/5Cloud Control Systems: Analysis, Design and Estimation Rating: 0 out of 5 stars0 ratingsAdvanced Distributed Consensus for Multiagent Systems Rating: 0 out of 5 stars0 ratingsDiscrete Networked Dynamic Systems: Analysis and Performance Rating: 0 out of 5 stars0 ratings
Related to Cyberphysical Infrastructures in Power Systems
Related ebooks
Advances in Smart Grid Power System: Network, Control and Security Rating: 0 out of 5 stars0 ratingsDistributed Control Methods and Cyber Security Issues in Microgrids Rating: 0 out of 5 stars0 ratingsSmart Grid Security: Innovative Solutions for a Modernized Grid Rating: 0 out of 5 stars0 ratingsElectric Power Systems Resiliency: Modelling, Opportunity and Challenges Rating: 0 out of 5 stars0 ratingsInternet of Multimedia Things (IoMT): Techniques and Applications Rating: 0 out of 5 stars0 ratingsSmart Sensors Networks: Communication Technologies and Intelligent Applications Rating: 0 out of 5 stars0 ratingsSecurity and Privacy Issues in Internet of Medical Things Rating: 0 out of 5 stars0 ratingsPractical Guidance for Defining a Smart Grid Modernization Strategy: The Case of Distribution Rating: 0 out of 5 stars0 ratingsOperational Technology: A Holistic View Rating: 0 out of 5 stars0 ratingsAdvanced Reactor Concepts (ARC): A New Nuclear Power Plant Perspective Producing Energy Rating: 0 out of 5 stars0 ratingsFrom Smart Grid to Internet of Energy Rating: 0 out of 5 stars0 ratingsSCADA supervisory control and data acquisition Third Edition Rating: 0 out of 5 stars0 ratingsApplication of Smart Grid Technologies: Case Studies in Saving Electricity in Different Parts of the World Rating: 0 out of 5 stars0 ratingsSCADA Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsMicrogrid Protection and Control Rating: 0 out of 5 stars0 ratingsCybersecurity Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsAdvanced Metering Infrastructure (AMI) Third Edition Rating: 0 out of 5 stars0 ratingsNetwork Topologies A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsIoT for Smart Operations in the Oil and Gas Industry: From Upstream to Downstream Rating: 0 out of 5 stars0 ratingsIntelligent Coordinated Control of Complex Uncertain Systems for Power Distribution and Network Reliability Rating: 0 out of 5 stars0 ratingsBattery Management System A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsPower Quality in Power Systems, Electrical Machines, and Power-Electronic Drives Rating: 0 out of 5 stars0 ratingsReal-Time Simulation Technology for Modern Power Electronics Rating: 0 out of 5 stars0 ratingsIEC 61850 A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsDistributed Power Resources: Operation and Control of Connecting to the Grid Rating: 0 out of 5 stars0 ratingsHyperscale Data Centers A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsMachine-to-Machine M2M Communications Third Edition Rating: 0 out of 5 stars0 ratingsSecuring the Smart Grid: Next Generation Power Grid Security Rating: 0 out of 5 stars0 ratings
Mechanical Engineering For You
How to Walk on Water and Climb up Walls: Animal Movement and the Robots of the Future Rating: 3 out of 5 stars3/5Basic Engineering Mechanics Explained, Volume 1: Principles and Static Forces Rating: 5 out of 5 stars5/5The CIA Lockpicking Manual Rating: 5 out of 5 stars5/5Airplane Flying Handbook: FAA-H-8083-3C (2024) Rating: 4 out of 5 stars4/5Basic Machines and How They Work Rating: 4 out of 5 stars4/5Introduction to Fluid Dynamics Rating: 5 out of 5 stars5/5Albert Einstein's Theory Of Relativity Explained Simply Rating: 0 out of 5 stars0 ratingsEinstein's Fridge: How the Difference Between Hot and Cold Explains the Universe Rating: 4 out of 5 stars4/5Small Gas Engine Repair, Fourth Edition Rating: 0 out of 5 stars0 ratingsThe Science of Everyday Life: An Entertaining and Enlightening Examination of Everything We Do and Everything We See Rating: 0 out of 5 stars0 ratingsFreeCAD Basics Tutorial Rating: 3 out of 5 stars3/5Orbital Mechanics: For Engineering Students Rating: 5 out of 5 stars5/5Plane Sense: A Beginner's Guide to Owning and Operating Private Aircraft FAA-H-8083-19A Rating: 0 out of 5 stars0 ratingsEPA 608 Study Guide: HVAC, #1 Rating: 4 out of 5 stars4/5Tides: The Science and Spirit of the Ocean Rating: 4 out of 5 stars4/5How to Repair Briggs and Stratton Engines, 4th Ed. Rating: 0 out of 5 stars0 ratingsMechanical Engineering Rating: 5 out of 5 stars5/5Pilot's Handbook of Aeronautical Knowledge (2024): FAA-H-8083-25C Rating: 0 out of 5 stars0 ratingsApplied Mathematics: Made Simple Rating: 4 out of 5 stars4/5Robotics, Mechatronics, and Artificial Intelligence: Experimental Circuit Blocks for Designers Rating: 5 out of 5 stars5/5Practical Electronics Handbook Rating: 4 out of 5 stars4/5Principles of Engineering Mechanics Rating: 4 out of 5 stars4/5Balloon Flying Handbook: FAA-H-8083-11A Rating: 2 out of 5 stars2/5Mechanical Engineer's Handbook Rating: 4 out of 5 stars4/5Structural and Stress Analysis Rating: 0 out of 5 stars0 ratingsBasic Fluid Mechanics Rating: 4 out of 5 stars4/5
Reviews for Cyberphysical Infrastructures in Power Systems
0 ratings0 reviews
Book preview
Cyberphysical Infrastructures in Power Systems - Magdi S. Mahmoud
Part 1: Background
Outline
Introduction
Chapter 1. Overview
Chapter 2. Smart grids: control and cybersecurity
Introduction
This part consists of two chapters:
Chapter 1: Overview
Chapter 2: Smart grids control and cybersecurity
Chapter 1: Overview
Abstract
Smart grid initiatives aim at producing a grid that is increasingly dependent on its cyberinfrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. This chapter discusses cyberphysical security of wide-area monitoring, protection and control (WAMP) from a coordinated cyberattack perspective and introduces a game theoretic approach to address the issue. Essentially, this chapter provides:
• A comprehensive overview on consensus control in multiagent systems from the network viewpoints. This comes in line of the extensive researches due to its applicability in analyzing and designing coordination behaviors among agents in multiagent framework.
• The problem of cyberphysical security (CPS) modeling systems is introduced with emphasis on wide area monitoring, protection and control systems (WAMPCS), wide-area protection (WAP), phasor measurement units.
• A quantification of the performance degradation of cyberphysical systems under the effect of stealthy integrity attacks. The CPS is modeled as a stochastic linear time-invariant (LTI) system equipped with a linear filter and feedback controller and failure detector.
• Finally, a brief account of challenges in cyberphysical power systems. Then, it addresses the secure industrial control systems along with Game-theoretic methods.
Keywords
SCADA systems; security; robustness
Chapter Outline
1.1 Cyberphysical security modeling systems (CPS)
1.1.1 Introduction
1.1.2 Wide-area monitoring, protection and control systems
1.1.3 Wide-area protection
1.1.4 Phasor measurement units
1.2 Cyberattack taxonomy
1.2.1 Cyberattack classification
1.2.2 Coordinated attacks on WAMPAC
1.2.3 Cyberphysical security using game-theoretic approach
1.2.4 Cyberlayer risk assessment
1.2.5 Attack modeling
1.2.6 Game formulation and solution strategies
1.3 Challenges in cyberphysical power systems
1.3.1 Signal sampling
1.3.2 Signal quantization
1.3.3 Communication delay
1.3.4 Packet dropouts
1.3.5 Medium access constraints
1.3.6 Channel fading
1.3.6.1 Information-theory based approach
1.3.6.2 Stochastic system approach
1.3.7 Power constraints
1.3.7.1 Reducing the transmission rate
1.3.7.2 Packet size reduction
1.4 Secure industrial control systems
1.4.1 Introduction
1.4.2 Progress of SICS
1.4.3 Major security objectives
1.5 Game-theoretic methods
1.5.1 Robustness issue
1.5.2 Resilient control design
1.5.3 Hierarchical systems
1.5.4 Physical layer control system problem
1.6 Notes
References
1.1 Cyberphysical security modeling systems (CPS)
In this section, we articulate the importance of securing the wide-area monitoring, protection and control (WAMPAC) systems to maintain bulk power system reliability. We present cyberattack taxonomy on WAMPAC, and also identify the cybersecurity requirements, concerns and future requirements for the various applications. Next we introduce different types of coordinated cyberattack scenarios in WAMPAC and presented their potential impacts.
1.1.1 Introduction
Smart grid technologies utilize recent cyberadvancements to enhance control and monitoring functions throughout the electric power grid. The smart grid incorporates various individual technical initiatives such as advanced metering infrastructure (AMI), demand response (DR), WAMPAC systems based on phasor measurement units (PMUs), large scale renewable integration in the form of wind and solar generation, and plug-in hybrid electric vehicles (PHEVs). Of these initiatives, AMI and WAMPAC depend heavily on the cyberinfrastructure and its data transported through several communication protocols to utility control centers and the consumers. Cybersecurity concerns within the communication and computation infrastructure may allow attackers to manipulate either the power applications or physical system. Cyberattacks can take many forms depending on their objective. Attackers can perform various intrusions by exploiting software vulnerabilities or misconfiguration. System resources can also be rendered unavailable through denial of service (DoS) attacks by congesting the network or system with unnecessary data. Even secure cybersystems can be attacked due to insider threats, where a trusted individual can leverage system privileges to steal data or impact system operations. Also, weaknesses in communication protocols allow attackers to steal or manipulate data in transit.
AMI is based on the deployment of smart meters at consumer end and the utility. This provides the utility with the ability to push real-time pricing data to consumers, collect information about current usage, and perform more advanced analysis of faults within the distribution system. Since AMI is associated with the distribution system, typically a huge volume of consumer meters needs to be compromised to create a substantial impact in the bulk power system reliability. This is in strong contrast to the impact a coordinated cyberattack on WAMPAC would have on bulk power system reliability. Therefore, the main focus of this chapter is to study pertinent issues in cyberphysical security of WAMPAC. However, it is important to note that several cybersecurity and privacy issues do exist with respect to AMI and are beyond the scope of this chapter.
1.1.2 Wide-area monitoring, protection and control systems
WAMPAC leverage the phasor measurements units (PMUs) to gain real-time awareness of current grid operations and also provide real-time protection and control functions such as special protection schemes (SPSs) and automatic generation control (AGC), besides other emerging applications such as oscillation detection, and transient stability predictions.
While communication is the key to a smarter grid, developing and securing the appropriate cyberinfrastructures and their communication protocols is crucial. WAMPAC can be subdivided further into its constituent components namely, wide-area monitoring systems (WAMSs), wide-area protection (WAP) systems, and wide-area control (WAC). PMUs utilize high sampling rates and accurate GPS-based timing to provide very accurate, synchronized grid readings. While PMUs provide increasingly accurate situational awareness capabilities, their full potential will not be realized unless these measurement data can be shared among other utilities and regulators. Additionally, power system applications need to be re-examined to determine the extent to which these enhancements can improve the grid's efficiency and reliability. The development of advanced control applications will depend on WAMS, which can effectively distribute information in a secure and reliable manner. An example of WAMS deployment is NASPInet, which is the development of a separate network for PMU data transmission and data sharing including real-time control, quality of service and cybersecurity requirements [1,2].
1.1.3 Wide-area protection
WAP involves the use of system wide information collected over a wide geographic area to perform fast decision-making and switching actions in order to counteract the propagation of large disturbances [3]. The advent of PMUs has transformed protection from a local concept into a system level wide-area concept to handle disturbances. Several protection applications fall under the umbrella of WAP, but the most common one among them is SPS. The North American Electric Reliability Council (NERC) defines SPS as an automatic protection system designed to detect abnormal or predetermined system conditions, and takes corrective actions other than and/or in addition to the isolation of faulted components to maintain system reliability [4]. Such action may include changes in demand, generation (Megawatt (MW) and Mega volt-ampere reactive (MVAR)), or system configuration to maintain system stability, acceptable voltage, or power flows. Some of the most common SPS applications are as follows: generator rejection, load rejection, under frequency load shedding, under voltage load shedding, out-of-step relaying, volt-ampere reactive (VAR) compensation, discrete excitation control, High-Voltage Direct Current (HVDC).
1.1.4 Phasor measurement units
Until the advent of PMUs, the only major WAC mechanism in the power grid was AGC. The AGC functions with the help of tie line flow measurements, frequency and generation data obtained from supervisory control and data acquisition (SCADA) infrastructure. The purpose of the AGC in a power system is to correct system generation in accordance with load changes in order to maintain grid frequency at 60 Hz. Currently, the concept of real-time WAC using PMU data is still in its infancy, and there are no standardized applications that are widely deployed on a system wide scale, though there are several pilot projects in that area [5]. Some of the potential WAC applications are secondary voltage control using PMU data, static VAR compensator (SVC) control using PMUs, and inter-area oscillation damping.
1.2 Cyberattack taxonomy
Fig. 1.1 shows a generic WAMPAC architecture with the various components involved. The system conditions are measured using measurement devices (mostly PMUs). These measurements are communicated to a logic processor to determine corrective actions for each contingency, and then appropriate actions are initiated, usually through high speed communication links. The inherent wide-area nature of these schemes presents several vulnerabilities in terms of possible cyberintrusions to hinder or alter the normal functioning of these schemes. Even though SPS are designed to cause minimal or no impact to the power system under failure, they are not designed to handle failures that are due to malicious events like cyberattacks. Also, as more and more SPS are added in the power system, unexpected dependencies in the operation of the various schemes are introduced, and this increases the risk of increased impacts like system wide collapse due to a cyberattack. It therefore becomes critical to reexamine the design of the WAP schemes with a specific focus on cyberphysical system (CPS) security.
Figure 1.1 Generic WAMPAC architecture.
In addition, Fig. 1.1 presents a control systems (CS) view of the power system and the WAP scheme. The power system is the plant under control, where the parameters like currents and voltages at different places are measured using sensors (PMUs) and sent through the high-speed communication network to the WAP controller for appropriate decision making. The controller decides based on the system conditions and sends corresponding commands to the actuators, which are the protection elements and VAR control elements like SVC and Flexible AC Transmission Systems (FACTS) devices for voltage control related applications. There are different places where a cyberattack can take place in this CS model. The cyberattack could affect the delays experienced in the forward or the feedback path or it could directly affect the data corresponding to sensors, the actuators or the controller. Fig. 1.1 also indicates the attack points on this CS model through the lightning