Open Cyber-Architecture for electrical energy markets

Automated control and management of large-scale physical systems is a challenging problem in a wide variety of applications including: power grids, transportation networks, and telecommunication networks. Such systems require (i) data collection, (ii) secure data transfer to processing centers, (iii) data processing, and (iv) timely decision making and control actions. These tasks are complicated by the vast amount of data, the distributed sources of data, and the need for efficient data communication. In addition, large physical systems are often subdivided into separately owned subsystems. This multi-owner structure imposes physical, economic, market, and political constraints on the data transfer. These divisions make systems vulnerable to potential coordinated attacks. Defending against such attacks requires the infrastructures to be more automated and self-healing. Motivated by the challenge of a more efficient, secure and robust power grid, which is less vulnerable to blackouts due to cascaded events, this paper discusses some of the fundamental problems in designing future cyber-physical systems.

[1]  Birgit Pfitzmann,et al.  The PERSEUS System Architecture , 2001 .

[2]  Jean-Pierre Seifert,et al.  Model-based behavioral attestation , 2008, SACMAT '08.

[3]  M. Jamshidi Large-Scale Systems: Modeling, Control and Fuzzy Logic , 1996 .

[4]  Michio Sugeno,et al.  On stability of fuzzy systems expressed by fuzzy rules with singleton consequents , 1999, IEEE Trans. Fuzzy Syst..

[5]  J. D. Guy Security Constrained Unit Commitment , 1971 .

[6]  J. Carpentier,et al.  Optimal Power Flows , 1979, VSC-FACTS-HVDC.

[7]  Christer Carlsson,et al.  Optimization under fuzzy linguistic rule constraints , 1999 .

[8]  Dragoslav D. Šiljak,et al.  Decentralized control of complex systems , 2012 .

[9]  Anjan Bose,et al.  Input-output Processing Of On-line Contingency Analysis , 1979 .

[10]  O. Alsac,et al.  Optimal Load Flow with Steady-State Security , 1974 .

[11]  Li-Xin Wang,et al.  A Course In Fuzzy Systems and Control , 1996 .

[12]  Fred C. Schweppe,et al.  Power System Static-State Estimation, Part I: Exact Model , 1970 .

[13]  Petros G. Voulgaris,et al.  A convex characterization of distributed control problems in spatially invariant systems with communication constraints , 2005, Syst. Control. Lett..

[14]  Ward Whitt,et al.  Value‐Based Routing and Preference‐Based Routing in Customer Contact Centers , 2007 .

[15]  Francesco Borrelli,et al.  Distributed LQR Design for Identical Dynamically Decoupled Systems , 2008, IEEE Transactions on Automatic Control.

[16]  A. Gomez Exposito,et al.  Distributed contingency analysis: practical issues , 1999 .

[17]  Eduardo N. Asada,et al.  Critical evaluation of direct and iterative methods for solving Ax=b systems in power flow calculations and contingency analysis , 1999 .

[18]  O. Alsaç,et al.  Generalized state estimation , 1998 .

[19]  Balho H. Kim,et al.  A fast distributed implementation of optimal power flow , 1999 .

[20]  Scott A. Rotondo Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.

[21]  M H Gunes,et al.  Blind processing: Securing data against system administrators , 2010, 2010 IEEE/IFIP Network Operations and Management Symposium Workshops.

[22]  Pramod K. Varshney,et al.  Data-aggregation techniques in sensor networks: a survey , 2006, IEEE Communications Surveys & Tutorials.

[23]  M. Sami Fadali,et al.  Stability Analysis of Discrete TSK Type II/III Systems , 2006, IEEE Transactions on Fuzzy Systems.

[24]  Michael Margaliot,et al.  New Approaches to Fuzzy Modeling and Control - Design and Analysis , 2000, Series in Machine Perception and Artificial Intelligence.

[25]  Mary Baker,et al.  Peer-to-Peer Caching Schemes to Address Flash Crowds , 2002, IPTPS.

[26]  M. Sami Fadali,et al.  TSK fuzzy systems types II and III stability analysis: continuous case , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[27]  D. M. Goldschlag,et al.  Security issues in networks with Internet access , 1997 .

[28]  Nicholas R. Jennings,et al.  Prioritised fuzzy constraint satisfaction problems: axioms, instantiation and validation , 2003, Fuzzy Sets Syst..