Cyber-Attacks in the Automatic Generation Control

Power systems are traditionallymonitored and controlled by an IT infrastructure, referred to as Supervisory Control and Data Acquisition (SCADA) system. The cyber-physical interaction of power systems (physical) and SCADA systems (cyber) rises security issues, since the links between those systems are vulnerable to cyber-attacks that can potentially lead to catastrophic economical and societal effects. In this chapter we focus on a specific cyber-physical link, the Automatic Generation Control (AGC), which is an automatic frequency control loop closed over the SCADA system. We provide an impact analysis in case of a cyber-attack on the AGC signal. We first carry out a feasibility analysis based on reachability and optimal control theory, that provides an information regarding the existence of an attack pattern that can disturb the power system. We then deal with the problem of synthesizing an attack signal and treat it as a nonlinear control synthesis problem. Third, performance of our methodologies are illustrated by means of dynamic simulations on IEEE-118 bus network.

[1]  S. Sastry Nonlinear Systems: Analysis, Stability, and Control , 1999 .

[2]  John Lygeros,et al.  A tractable nonlinear fault detection and isolation technique with application to the cyber-physical security of power systems , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[3]  Henrik Sandberg,et al.  Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.

[4]  F. Bouffard,et al.  Keeping the lights on and the information flowing , 2009, IEEE Power and Energy Magazine.

[5]  Siddhartha Kumar Khaitan,et al.  Cyber physical system approach for design of power grids: A survey , 2013, 2013 IEEE Power & Energy Society General Meeting.

[6]  Goran Andersson,et al.  Dynamics and Control of Electric Power Systems , 2007 .

[7]  Siddhartha Kumar Khaitan,et al.  Design Techniques and Applications of Cyberphysical Systems: A Survey , 2015, IEEE Systems Journal.

[8]  Alexandre M. Bayen,et al.  A time-dependent Hamilton-Jacobi formulation of reachable sets for continuous dynamic games , 2005, IEEE Transactions on Automatic Control.

[9]  H. H. Happ,et al.  Power System Control and Stability , 1979, IEEE Transactions on Systems, Man, and Cybernetics.

[10]  Gene F. Franklin,et al.  Feedback Control of Dynamic Systems , 1986 .

[11]  M. Negrete-Pincetic,et al.  Towards quantifying the impacts of cyber attacks in the competitive electricity market environment , 2009, 2009 IEEE Bucharest PowerTech.

[12]  P. Kundur,et al.  Power system stability and control , 1994 .

[13]  John Lygeros,et al.  Stochastic Optimization on Continuous Domains With Finite-Time Guarantees by Markov Chain Monte Carlo Methods , 2009, IEEE Transactions on Automatic Control.

[14]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[15]  Douglas P. Looze Franklin, Powell and Emami-Naeini, Feedback Control of Dynamic Systems, 6 th Edition, Prentice-Hall, 2010. (referred to as FPE) References: Ogata, Modern Control Engineering, Prentice-Hall, 2009. Dorf, Modern Control Systems, Prentice-Hall, 2008. , 2013 .

[16]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[17]  John Lygeros,et al.  Cyber attack in a two-area power system: Impact identification using reachability , 2010, Proceedings of the 2010 American Control Conference.

[18]  John Lygeros,et al.  On reachability and minimum cost optimal control , 2004, Autom..

[19]  John Lygeros,et al.  A robust policy for Automatic Generation Control cyber attack in two area power network , 2010, 49th IEEE Conference on Decision and Control (CDC).

[20]  Mathias Ekstedt,et al.  Vulnerability assessment of SCADA systems , 2011 .

[21]  John Lygeros,et al.  A Tractable Fault Detection and Isolation Approach for Nonlinear Systems With Probabilistic Performance , 2014, IEEE Transactions on Automatic Control.

[22]  Jian-Wei Wang,et al.  Cascade-based attack vulnerability on the US power grid. , 2009 .

[23]  I. Kamwa,et al.  Causes of the 2003 major grid blackouts in North America and Europe, and recommended means to improve system dynamic performance , 2005, IEEE Transactions on Power Systems.

[24]  Turhan Demiray,et al.  Simulation of Power System Dynamics using Dynamic Phasor Models , 2008 .

[25]  Marek Zima,et al.  Operation, Monitoring and Control Technology of Power Systems , 2007 .