Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes

Dynamic load altering attacks (D-LAAs) are introduced as a new class of cyber-physical attacks against smart grid demand response programs. The fundamental characteristics of D-LAAs are explained. Accordingly, D-LAAs are classified in terms of open-loop versus closed-loop attacks, single-point versus multi-point attacks, the type of feedback, and the type of attack controller. A specific closed-loop D-LAA against power system stability is formulated and analyzed, where the attacker controls the changes in the victim load based on a feedback from the power system frequency. A protection system is designed against D-LAAs by formulating and solving a non-convex pole-placement optimization problem. Uncertainty with respect to attack sensor location is addressed. Case studies are presented to assess system vulnerabilities, impacts of single-point and multi-point attacks, and optimal load protection in an IEEE 39 bus test system.

[1]  Petr Kadurek,et al.  Electric Vehicles and their impact to the electric grid in isolated systems , 2009, 2009 International Conference on Power Engineering, Energy and Electrical Drives.

[2]  Koen Vanthournout,et al.  A Smart Domestic Hot Water Buffer , 2012, IEEE Transactions on Smart Grid.

[3]  Jason Stamp,et al.  Reliability impacts from cyber attack on electric power systems , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.

[4]  Hamid Sharif,et al.  A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.

[5]  Khosrow Moslehi,et al.  A Reliability Perspective of the Smart Grid , 2010, IEEE Transactions on Smart Grid.

[6]  Zhu Han,et al.  Manipulating the electricity power market via jamming the price signaling in smart grid , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[7]  Hiroyuki Kudo,et al.  A cooperative protection system with an agent model , 1998 .

[8]  P. Kundur,et al.  Power system stability and control , 1994 .

[9]  Vincent W. S. Wong,et al.  Autonomous Demand-Side Management Based on Game-Theoretic Energy Consumption Scheduling for the Future Smart Grid , 2010, IEEE Transactions on Smart Grid.

[10]  Ufuk Topcu,et al.  Design and Stability of Load-Side Primary Frequency Control in Power Systems , 2013, IEEE Transactions on Automatic Control.

[11]  Saifur Rahman,et al.  Demand Response as a Load Shaping Tool in an Intelligent Grid With Electric Vehicles , 2011, IEEE Transactions on Smart Grid.

[12]  Hsiao-Hwa Chen,et al.  Smart Grid Communication: Its Challenges and Opportunities , 2013, IEEE Transactions on Smart Grid.

[13]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[14]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[15]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[16]  Xiang Li,et al.  Price Modification Attack and Protection Scheme in Smart Grid , 2017, IEEE Transactions on Smart Grid.

[17]  F. Bullo,et al.  A graph-theoretical characterization of power network vulnerabilities , 2011, Proceedings of the 2011 American Control Conference.

[18]  Hamed Mohsenian Rad,et al.  Dynamic load altering attacks in smart grid , 2015, 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).

[19]  Gary Marks Opportunities for Demand Response in California Agricultural Irrigation: A Scoping Study , 2013 .

[20]  Harry Eugene Stanley,et al.  Catastrophic cascade of failures in interdependent networks , 2009, Nature.

[21]  Andreas Mauthe,et al.  Power Consumption Profiling Using Energy Time-Frequency Distributions in Smart Grids , 2015, IEEE Communications Letters.

[22]  Goran Strbac,et al.  Demand side management: Benefits and challenges ☆ , 2008 .

[23]  Zuyi Li,et al.  Local Load Redistribution Attacks in Power Systems With Incomplete Network Information , 2014, IEEE Transactions on Smart Grid.

[24]  Yang Liu,et al.  Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[25]  E. Yaz Linear Matrix Inequalities In System And Control Theory , 1998, Proceedings of the IEEE.

[26]  Xiaohui Liang,et al.  Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.

[27]  Hamed Mohsenian Rad,et al.  Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.

[28]  Jacob van der Woude,et al.  A graph-theoretic characterization for the rank of the transfer matrix of a structured system , 1991, Math. Control. Signals Syst..

[29]  Ning Lu,et al.  Appliance Commitment for Household Load Scheduling , 2011, IEEE Transactions on Smart Grid.

[30]  Sila Kiliccote,et al.  Fast DR: Controlling Small Loads over the Internet: , 2014 .

[31]  Saifur Rahman,et al.  Impact of TOU rates on distribution load shapes in a smart grid with PHEV penetration , 2010, IEEE PES T&D 2010.

[32]  Wayne F. Boyer,et al.  Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues , 2009 .

[33]  François Bouffard,et al.  Decentralized Demand-Side Contribution to Primary Frequency Control , 2011, IEEE Transactions on Power Systems.

[34]  John N. Tsitsiklis,et al.  Parallel and distributed computation , 1989 .

[35]  G. Radman,et al.  Under-Frequency Load Shedding: Towards a smarter smart house with a consumer level controller , 2011, 2011 Proceedings of IEEE Southeastcon.

[36]  Hamed Mohsenian Rad,et al.  Optimal Residential Load Control With Price Prediction in Real-Time Electricity Pricing Environments , 2010, IEEE Transactions on Smart Grid.

[37]  Ufuk Topcu,et al.  Optimal Load Control via Frequency Measurement and Neighborhood Area Communication , 2013, IEEE Transactions on Power Systems.

[38]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[39]  Wilsun Xu,et al.  Performance of frequency relays for distributed generation protection , 2006, IEEE Transactions on Power Delivery.

[40]  Hamed Mohsenian Rad,et al.  Energy and Performance Management of Green Data Centers: A Profit Maximization Approach , 2013, IEEE Transactions on Smart Grid.

[41]  Hau-Ren Lu,et al.  A Two-Way Direct Control of Central Air-Conditioning Load Via the Internet , 2009, IEEE Transactions on Power Delivery.

[42]  G. Manimaran,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.

[43]  Jelena V. Misic,et al.  Investigating Public-Key Certificate Revocation in Smart Grid , 2015, IEEE Internet of Things Journal.

[44]  John D. Fernandez,et al.  SCADA systems: vulnerabilities and remediation , 2005 .

[45]  Mohsen Jafari,et al.  An integrated security system of protecting Smart Grid against cyber attacks , 2010, 2010 Innovative Smart Grid Technologies (ISGT).

[46]  John N. Tsitsiklis,et al.  Parallel and distributed computation , 1989 .