A novel self-evolving multi-agent architecture for power system monitoring and protection against attacks of malicious intent

In this paper, we propose a novel self-evolving multi-agent methodology (MAM) for power system monitoring and protection. The uniqueness of the proposed architecture is the ability of MAM to evolve in the wake of an attack of malicious intent by mutation and thus always monitoring a power system bus remotely. Also, the architecture interacting with the mutated agents uses a voting methodology thus alleviating the effect of agent malfunction in the presence of attack. This novel architecture is tested on a Single Machine Infinite Bus (SMIB) power network and a two area network with five equivalent generators and eight bus, two area power system for abnormal condition detection and generator bus isolation. Simulation studies indicate that the proposed methodology is capable of not only detecting the power grid attack once, but can also continuously monitor and isolate the generator bus even in the presence of sustained attack as the agents are regenerated.

[1]  P. Kundur,et al.  Power system stability and control , 1994 .

[2]  S.D.J. McArthur,et al.  Multi-Agent Systems for Power Engineering Applications—Part II: Technologies, Standards, and Tools for Building Multi-agent Systems , 2007, IEEE Transactions on Power Systems.

[3]  Luiz Eduardo Borges da Silva,et al.  Improving Detection Attacks in Electric Power System Critical Infrastructure Usign Rough Classification Algorith , 2007 .

[4]  T. Nagata,et al.  A multi-agent approach to power system restoration , 2002 .

[5]  G. Manimaran,et al.  Cybersecurity for electric power control and automation systems , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.

[6]  Norman Wilde,et al.  Preventing unauthorized islanding: cyber-threat analysis , 2006, 2006 IEEE/SMC International Conference on System of Systems Engineering.

[7]  L. Mili,et al.  Power System Stability Agents Using Robust Wide-Area Control , 2002, IEEE Power Engineering Review.

[8]  I.S. Baxevanos,et al.  Implementing Multiagent Systems Technology for Power Distribution Network Control and Protection Management , 2007, IEEE Transactions on Power Delivery.

[9]  Zahia Guessoum Adaptive agents and multiagent systems , 2004, IEEE Distributed Systems Online.

[10]  Takeshi Nagata,et al.  Power system restoration by joint usage of expert system and mathematical programming approach , 1996 .

[11]  Chen-Ching Liu,et al.  The strategic power infrastructure defense (SPID) system. A conceptual design , 2000, IEEE Control Systems.

[12]  Chen-Ching Liu Strategic power infrastructure defense (SPID) , 2004 .

[13]  Lamine Mili,et al.  Power system stability agents using robust wide area control , 2002 .

[14]  I.S. Baxevanos,et al.  Software Agents Situated in Primary Distribution Networks: A Cooperative System for Fault and Power Restoration Management , 2007, IEEE Transactions on Power Delivery.

[15]  Chen-Ching Liu,et al.  Cyber-vulnerability of power grid monitoring and control systems , 2008, CSIIRW '08.

[16]  Youyi Wang,et al.  Global Transient Stability and Voltage Regulation for Power Systems , 2001 .

[17]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[18]  Eric Chien,et al.  BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES , 2002 .

[19]  H. F. Wang Multi-agent co-ordination for the secondary voltage control in power-system contingencies , 2001 .

[20]  S.D.J. McArthur,et al.  Multi-Agent Systems for Power Engineering Applications—Part I: Concepts, Approaches, and Technical Challenges , 2007, IEEE Transactions on Power Systems.

[21]  Ciwei Gao,et al.  Risk Assessment of Malicious Attacks Against Power Systems , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[22]  Fei Xue,et al.  Assessment of information impacts in power system security against malicious attacks in a general framework , 2009, Reliab. Eng. Syst. Saf..

[23]  Norman Wilde,et al.  Prevention, Detection and Recovery from Cyber-Attacks Using a Multilevel Agent Architecture , 2007, 2007 IEEE International Conference on System of Systems Engineering.