Implications of Cyber Attacks on Distributed Power System Operations
نویسندگان
چکیده
The electric grid is a complex physically distributed and inter-connected network managed by a large number of entities (e.g., systems operators, utilities) to ensure reliable transmission, generation, and distribution of power. Sustained and reliable operation with dynamic situational awareness in the grid requires continued data sharing amongst the grid entities. Lack of automated communications and coordination between distributed operators in the grid contributes significantly to the lack of global situational awareness occasionally with serious consequences of runaway cascading failures. While wide-area monitoring and information sharing has been proposed by the Federal Energy Regulatory Commission, real-time data sharing in the grid is still done in an ad hoc manner between connected areas. Furthermore, the mode, amount, and granularity of data shared are not standardized. A smart adversary can design man-in-the middle attacks that limit the information shared between adjacent areas, thereby threatening the reliable operation of the system. In this paper, we focus on a class of topology-targeted man-in-the-middle (MitM) communication attacks aimed at limiting information sharing between adjacent areas, particularly when one or both areas experience topology changes (e.g., line outages). To understand the broader consequences of such attacks on actual power systems operation, we develop a tractable temporal model for energy management system (EMS) operations that allows studying the time progression of the cyber-attack introduced in one area and its effect on both areas. The aim of this work is two-fold: (i) understanding the physical consequences of a class of cyber-attacks; and (ii) mimicking data sharing conditions that in practice led to blackouts when local outages were not shared in real-time between connected areas (e.g., Northeast black 2003). Our results demonstrate that such an MitM communication attack in a distributed power network leads to a range of consequences, some more severe than others: these include relatively benign oscillations in the power flow solutions between the two areas that eventually fix themselves (infrequent) to more complex situations (more likely) over time including power flow overload violations caused by thermal limit relaxations, progressively severe lack of convergence of OPF in both areas, as well as actual physical line overflows that are not observable from the cyber solution but can eventually cause line overheating and cascading outages. Based on these observations, in addition to the traditional countermeasure of human operator-based data sharing (which have been shown to be error-prone and delayed too), it is essential to have more resiliency via automated data sharing mechanisms. To this end, we propose an interactive distributed data processing platform. This could help both areas become aware of inconsistencies over faster time-scales including: (a) enable local topology processing to include interactive updating; (b) enable real-time coordination of dispatch between the two areas; and (c) create and share a list of external contingencies caused to other areas by an internal component outage.
منابع مشابه
Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملCatching Anomalous Distributed Photovoltaics: An Edge-based Multi-modal Anomaly Detection
A significant challenge in energy system cyber security is the current inability to detect cyber-physical attacks targeting and originating from distributed grid-edge devices such as photovoltaics (PV) panels, smart flexible loads, and electric vehicles. Cyber grid defenders lack the necessary algorithms and other detection capabilities to distinguish between normal operations, cyber-attacks, a...
متن کاملVulnerability Analysis of the State Estimation Problem under Cyber Attacks on WAMS
Electric power system is a critical infrastructure and loss of its resilience and/or operability can lead to negative consequences for the national economy. Modern power systems based on sophisticated computer and communication technologies are characterized by elevated vulnerability to different types of unauthorized malicious access, i.e. cyber-attacks. Wide area measurement system which is b...
متن کاملDeveloping a Correlation Index to Identify Coordinated Cyber-Attacks to Power Grids
The large deployment of Information and Communication Technology (ICT) exposes the power grid to a large number of coordinated cyber-attacks. Thus, it is necessary to design new security policies that allow an efficient and reliable operation in such conflicted cyber-space. The detection of cyberattacks is known to be a challenging problem, however, through the coordinated effort of defense-in-...
متن کاملCyber Risk Exposure and Prospects for Cyber Insurance
This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014