Cyber-Physical Modeling and Cyber-Contingency Assessment of Hierarchical Control Systems

Online closed-loop hierarchical control systems (HCSs) are widely used in power-system operation. Like typical cyber-physical systems, the contingencies on the cyber side of an HCS may lead to inappropriate control commands, which will influence the physical power system. To evaluate the degree to which these inappropriate control commands influence the power system, we propose a cyber-physical equivalent model for HCSs. In this model, the HCS cyber network is abstracted to a directed graph consisting of data nodes and directed branches, and connectivity is described by using a node-branch incidence matrix. Using this strategy, we can describe the general information flow in an HCS using mathematical equations on the basis of which quantitative evaluation can be carried out. Furthermore, by using existing operation records, several kinds of typical cyber-contingencies are also modeled on the basis of which cyber-contingency assessment (cyber-CA) can be implemented by using a model-based approach. Considering the computational efficiency, such an approach keeps only key characteristics of the information flow rather than all features of the cyber network. In the case study, a coordinated secondary-voltage control system is studied as an example. The physical impacts of various cyber-contingencies on different data transmission and processing modules are compared. The results show that the model-based method provides improved efficiency compared with conventional simulation-based methods while maintaining accuracy.

[1]  G. Manimaran,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.

[2]  Bin Wang,et al.  Optimal Voltage Control of PJM Smart Transmission Grid: Study, Implementation, and Evaluation , 2013, IEEE Transactions on Smart Grid.

[3]  G. Manimaran,et al.  Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[4]  Deepa Kundur,et al.  A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid , 2014, IEEE Transactions on Smart Grid.

[5]  Lingfeng Wang,et al.  Trust System Design Optimization in Smart Grid Network Infrastructure , 2013, IEEE Transactions on Smart Grid.

[6]  Wenxia Liu,et al.  Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM , 2010, IEEE Transactions on Power Delivery.

[7]  Peter Palensky,et al.  Simulating Cyber-Physical Energy Systems: Challenges, Tools and Methods , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[8]  Marija Ilic-Spong,et al.  Secondary voltage control using pilot point information , 1988 .

[9]  William H. Sanders,et al.  SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures , 2014, IEEE Transactions on Smart Grid.

[10]  José M. F. Moura,et al.  Modeling of Future Cyber–Physical Energy Systems for Distributed Sensing and Control , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[11]  Lamine Mili,et al.  Power system and communication network co-simulation for smart grid applications , 2011, ISGT 2011.

[12]  F. Richard Yu,et al.  A Game-Theoretical Scheme in the Smart Grid With Demand-Side Management: Towards a Smart Cyber-Physical Power Infrastructure , 2013, IEEE Transactions on Emerging Topics in Computing.

[13]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[14]  Mourad Debbabi,et al.  Communication security for smart grid distribution networks , 2013, IEEE Communications Magazine.

[15]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[16]  Le Xie,et al.  Ramp-Induced Data Attacks on Look-Ahead Dispatch in Real-Time Power Markets , 2013, IEEE Transactions on Smart Grid.

[17]  Lang Tong,et al.  On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.

[18]  R. Giovanini,et al.  EPOCHS: a platform for agent-based electric power and communication simulation built from commercial off-the-shelf components , 2006, IEEE Transactions on Power Systems.

[19]  Keqin Li,et al.  An integrated cyber-physical simulation environment for smart grid applications , 2014, Tsinghua Science and Technology.

[20]  Bin Wang,et al.  An Adaptive Zone-Division-Based Automatic Voltage Control System With Applications in China , 2013, IEEE Transactions on Power Systems.

[21]  William H. Sanders,et al.  SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures , 2012, IEEE Transactions on Smart Grid.

[22]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[23]  Stamatis Karnouskos,et al.  Cyber-Physical Systems in the SmartGrid , 2011, 2011 9th IEEE International Conference on Industrial Informatics.

[24]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[25]  H. Lefebvre,et al.  Secondary coordinated voltage control system: feedback of EDF , 2000, 2000 Power Engineering Society Summer Meeting (Cat. No.00CH37134).

[26]  Deepa Kundur,et al.  A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.

[27]  Ahmed Yousuf Saber,et al.  Efficient Utilization of Renewable Energy Sources by Gridable Vehicles in Cyber-Physical Energy Systems , 2010, IEEE Systems Journal.

[28]  H. Vincent Poor,et al.  Multicast Routing for Decentralized Control of Cyber Physical Systems with an Application in Smart Grid , 2012, IEEE Journal on Selected Areas in Communications.

[29]  Lang Tong,et al.  On topology attack of a smart grid , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).