CYBER-POWER SYSTEM ANALYSIS USING A REAL TIME TEST BED

By Ceeman Brightson Vellaithurai, M.S. Washington State University July 2013 Chair: Anurag K. Srivastava The Electric Power System (EPG) has been identified as one of the most critical infrastructure that is considered to be vulnerable to cyber-physical attacks. With the emphasis on making the grid “smarter”, there have been an increase in the deployment of several smart devices in the power grid, and automation of the power system has received a major investments. It is necessary to consider the interdependencies of cyber and physical networks for cyber-power system analysis with increasing automation. Applications and algorithms developed for the smart grid need to be tested and evaluated using an integrated cyberphysical test bed. This work relates to cyber-power system analysis using developed real time test bed utilizing the Real Time Digital Simulator (RTDS) and Network Simulator 3 (NS3) supported by other software and hardware resources. Integration of network simulator with power system simulator indicates that communication links are generally not a bottleneck for wide area monitoring and control. Results from the simulation of an Aurora type of attack on a generator using the test bed indicate that the generator is likely to suffer mechanical damage, if the attack is successful. Real time simulation results for micro-grid reconfiguration and voltage stability of transmission grid using the developed cyber-physical test bed provides insight for implementation of these specific applications.

[1]  Saugata S. Biswas,et al.  Development and real time implementation of a synchrophasor based fast voltage stability monitoring algorithm with consideration of load models , 2013, 2013 IEEE Industry Applications Society Annual Meeting.

[2]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[3]  Mark Zeller,et al.  Myth or reality — Does the Aurora vulnerability pose a risk to my generator? , 2011, 2011 64th Annual Conference for Protective Relay Engineers.

[4]  Kameshwar Poolla,et al.  Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[5]  A. K. Srivastava,et al.  Power system vulnerability analysis - towards validation of centrality measures , 2012, PES T&D 2012.

[6]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[7]  R. Kuffel,et al.  Real time digital simulation for control and protection system testing , 2004, 2004 IEEE 35th Annual Power Electronics Specialists Conference (IEEE Cat. No.04CH37551).

[8]  Saugata S. Biswas,et al.  A novel method for distributed real time voltage stability monitoring using synchrophasor measurements , 2013, 2013 IREP Symposium Bulk Power System Dynamics and Control - IX Optimization, Security and Control of the Emerging Power Grid.

[9]  Richard Bellman,et al.  ON A ROUTING PROBLEM , 1958 .

[10]  Jeong Hun Kim,et al.  Development of a smart grid test bed and applications in PMU and PDC testing , 2012, 2012 North American Power Symposium (NAPS).

[11]  Saman A. Zonouz,et al.  SECPSIM: A Training Simulator for cyber-power infrastructure security , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[12]  Gary W. Chang,et al.  Power System Analysis , 1994 .

[13]  Anjan Bose,et al.  Bandwidth and Latency Requirements for Smart Transmission Grid Applications , 2012, IEEE Transactions on Smart Grid.

[14]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[15]  D M Faissol,et al.  Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches , 2009 .

[16]  H. H. Happ,et al.  Power System Control and Stability , 1979, IEEE Transactions on Systems, Man, and Cybernetics.

[17]  Anjan Bose,et al.  Smart grid communication requirements for the high voltage power system , 2011, 2011 IEEE Power and Energy Society General Meeting.

[18]  Thomas H. Morris,et al.  Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information , 2013, IEEE Transactions on Smart Grid.

[19]  Laszlo Gyugyi,et al.  Understanding FACTS: Concepts and Technology of Flexible AC Transmission Systems , 1999 .

[20]  Mourad Debbabi,et al.  Communication security for smart grid distribution networks , 2013, IEEE Communications Magazine.

[21]  Dana A. Shea Critical Infrastructure: Control Systems and the Terrorist Threat [Updated October 1, 2002] , 2002 .

[22]  Pierluigi Siano,et al.  Smart Operation of Wind Turbines and Diesel Generators According to Economic Criteria , 2011, IEEE Transactions on Industrial Electronics.

[23]  Taskin Koçak,et al.  Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.

[24]  N. Hadjsaid,et al.  Overview of the power systems security with regard to cyberattacks , 2009, 2009 Fourth International Conference on Critical Infrastructures.

[25]  A. Bose,et al.  A failure to communicate: next generation communication requirements, technologies, and architecture for the electric power grid , 2005, IEEE Power and Energy Magazine.

[26]  Marcus K. Rogers,et al.  A two-dimensional circumplex approach to the development of a hacker taxonomy , 2006, Digit. Investig..