Adequacy evaluation of electric power grids considering substation cyber vulnerabilities

Abstract Modern cyber-physical smart power grids are becoming increasingly dependent on the associated cyber networks for performing various monitoring and control functions, which inevitably leads to increased cyber vulnerabilities. It is thus a pressing task to develop effective methods for comprehensively evaluating the overall adequacy of power systems considering the probable cyber vulnerabilities. This paper is focused on quantifying the impact of substation cyber vulnerabilities on power supply adequacy. The temporal occurrence pattern of cyber attacks is statistically analyzed based on the human dynamics theory. Also, the attack/defense interactions of intelligent attackers and defenders are modeled by static and Markov games in different attack scenarios. A novel power system adequacy evaluation framework is proposed by incorporating both physical failures and cybersecurity risks. Simulation studies are performed on a typical IEEE reliability test system, and the influences of critical factors related to cybersecurity are carefully investigated. These quantitative studies show that implementing effective cyber security measures and making informed decisions about the allocation of limited resources are beneficial to enhancing the overall adequacy of contemporary cyber-physical power systems.

[1]  Wenyuan Li,et al.  Reliability Assessment of Electric Power Systems Using Monte Carlo Methods , 1994 .

[2]  Tansu Alpcan,et al.  Network Security , 2010 .

[3]  David K. Y. Yau,et al.  Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation , 2013, IEEE Transactions on Power Systems.

[4]  Marimuthu Palaniswami,et al.  Security Games and Risk Minimization for Automatic Generation Control in Smart Grid , 2012, GameSec.

[5]  Mahmud Fotuhi-Firuzabad,et al.  Toward a Comprehensive Model of Large-Scale DFIG-Based Wind Farms in Adequacy Assessment of Power Systems , 2014, IEEE Transactions on Sustainable Energy.

[6]  Lin Zhu,et al.  A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Trans. Ind. Electron..

[7]  Li Yong,et al.  Cyber attack impact on power system blackout , 2011 .

[8]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[9]  Bruno Gonçalves,et al.  Human dynamics revealed through Web analytics , 2008, Physical review. E, Statistical, nonlinear, and soft matter physics.

[10]  Hannes Holm A Large-Scale Study of the Time Required to Compromise a Computer System , 2014, IEEE Transactions on Dependable and Secure Computing.

[11]  Lingfeng Wang,et al.  Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.

[12]  Paul Hines,et al.  A “Random Chemistry” Algorithm for Identifying Collections of Multiple Contingencies That Initiate Cascading Failure , 2012, IEEE Transactions on Power Systems.

[13]  Marimuthu Palaniswami,et al.  Security games for voltage control in smart grid , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[14]  G.N. Ericsson Toward a Framework for Managing Information Security for an Electric Power Utility—CIGRÉ Experiences , 2007, IEEE Transactions on Power Delivery.

[15]  Di Shi,et al.  Optimal allocation of static var compensator via mixed integer conic programming , 2017, 2017 IEEE Power & Energy Society General Meeting.

[16]  Deepa Kundur,et al.  A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.

[17]  F Aminifar,et al.  Probabilistic Multistage PMU Placement in Electric Power Systems , 2011, IEEE Transactions on Power Delivery.

[18]  Wenxia Liu,et al.  Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM , 2010, IEEE Transactions on Power Delivery.

[19]  Kevin Tomsovic,et al.  Security Constrained Multi-Stage Transmission Expansion Planning Considering a Continuously Variable Series Reactor , 2017, IEEE Transactions on Power Systems.

[20]  Alexei Vazquez Impact of memory on human dynamics , 2007 .

[21]  William H. Sanders,et al.  SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures , 2014, IEEE Transactions on Smart Grid.

[22]  N. Johnson,et al.  From old wars to new wars and global terrorism , 2005 .

[23]  Jason Stamp,et al.  Reliability impacts from cyber attack on electric power systems , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.

[24]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[25]  Farrokh Aminifar,et al.  Impact of WAMS Malfunction on Power System Reliability Assessment , 2012, IEEE Transactions on Smart Grid.

[26]  Lingfeng Wang,et al.  Inclusion of SCADA Cyber Vulnerability in Power System Reliability Assessment Considering Optimal Resources Allocation , 2016, IEEE Transactions on Power Systems.

[27]  Yang Wang,et al.  Reliability Analysis of Wide-Area Measurement System , 2010, IEEE Transactions on Power Delivery.

[28]  Albert-László Barabási,et al.  The origin of bursts and heavy tails in human dynamics , 2005, Nature.

[29]  Beom Jun Kim,et al.  Role of activity in human dynamics , 2007, EPL (Europhysics Letters).

[30]  Probability Subcommittee,et al.  IEEE Reliability Test System , 1979, IEEE Transactions on Power Apparatus and Systems.

[31]  Yu Liu,et al.  A Game Theoretic Approach to Efficient Mixed Strategies for Intrusion Detection , 2006, 2006 IEEE International Conference on Communications.

[32]  Wang Bing-Hong,et al.  Statistical Property and Model for the Inter-Event Time of Terrorism Attacks , 2010 .

[33]  M. Fotuhi-Firuzabad,et al.  Observability enhancement by optimal PMU placement considering random power system outages , 2011 .

[34]  Yang Wang,et al.  Evaluating multiple reliability indices of regional networks in wide area measurement system , 2009 .

[35]  Xiao-Pu Han,et al.  Scaling property and opinion model for interevent time of terrorism attack , 2009 .

[36]  Zhu Han,et al.  Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.