Adversarial control scheme for an islanded power plant

This paper addresses the concept of an adversarial control scheme designed for an islanded power plant with input hard constraints. The system evolves in the discrete-time domain and is subject to performance and alarm state constraints, both described by convex and compact polyhedral sets, that represent valid domains of safe operation under the effect of a stabilizing output-feedback controller. An attacker succeeds in gaining access to the automatic generation control unit of the system and sends false control commands, whenever necessary, attempting to drive the state vector outside the performance set, at the maximum admissible rate, without violating any alarm constraints. Simulation studies highlight the effects of the adversarial policies on the physical plant.

[1]  Nikolaos Athanasopoulos,et al.  Invariant set computation for constrained uncertain discrete-time linear systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[2]  Anthony Tzes,et al.  Adversary control strategies for discrete-time systems , 2014, 2014 European Control Conference (ECC).

[3]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.

[4]  Karl Henrik Johansson,et al.  Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[5]  John Lygeros,et al.  A robust policy for Automatic Generation Control cyber attack in two area power network , 2010, 49th IEEE Conference on Decision and Control (CDC).

[6]  Jean-Pierre Aubin,et al.  Viability theory , 1991 .

[7]  André Teixeira,et al.  Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.

[8]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[9]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[10]  Olle I. Elgerd,et al.  Electric Energy Systems Theory: An Introduction , 1972 .

[11]  Anthony Tzes,et al.  Covert attack on a discrete-time system with limited use of the available disruption resources , 2015, 2015 European Control Conference (ECC).

[12]  Jian-Wei Wang,et al.  Cascade-based attack vulnerability on the US power grid. , 2009 .

[13]  John Lygeros,et al.  Cyber attack in a two-area power system: Impact identification using reachability , 2010, Proceedings of the 2010 American Control Conference.

[14]  Franco Blanchini,et al.  Set-theoretic methods in control , 2007 .

[15]  G. Bitsoris On the positive invariance of polyhedral sets for discrete-time systems , 1988 .