KP

19 records found

Authored

The main objective of this article is to develop scalable dynamic anomaly detectors with high-fidelity simulators of power systems. On the one hand, models in high-fidelity simulators are typically 'intractable' if one opts to describe them in a mathematical formulation in ord ...

Equilibrium analysis has been widely studied as an effective tool to model gaming interactions and predict market results. However, as competition modes are fundamentally changed by the decarbonization and decentralization of power systems, analysis techniques must evolve. This a ...

This paper proposes a novel application for the optimal Linear Quadratic Gaussian (LQG) servo controller to enable a proper coordination of the AC/HVDC interconnected system with Virtual Synchronous Power (VSP) based inertia emulation. Particularly, the proposed control design ...

Towards Cyber-secure Intelligent Electrical Power Grids

Vulnerability Analysis and Attack Detection

The digital transformation of power systems has introduced a new challenge for robustness: cyber security threats. Motivated by the feasibility of a potent attack (e.g., the Stuxnet worm attack and the one in the hacker-caused Ukraine blackout) that it can be equipped with extens ...

The high penetration of renewable energy resources and power electronic-based components has led to a low-inertia power grid which would bring challenges to system operations. The new model of load frequency control (LFC) must be able to handle the modern scenario where contro ...

State estimation is of considerable significance for the power system operation and control. However, well-designed false data injection attacks can utilize blind spots in conventional residual-based bad data detection methods to manipulate measurements in a coordinated manner an ...
Developing advanced diagnosis tools to detect cyber attacks is the key to security of power systems. It has been shown that multivariate data injection attacks can bypass bad data detection schemes typically built on static behavior of the systems, which misleads operators to dis ...
The security of energy supply in a power grid critically depends on the ability to accurately estimate the state of the system. However, manipulated power flow measurements can potentially hide overloads and bypass the bad data detection scheme to interfere the validity of estima ...

Power systems are moving towards hybrid AC/DC grids with the integration of HVDC links, renewable resources and energy storage modules. The load frequency control (LFC) of tomorrow has to consider the complex interactions between these components. Meanwhile, more attention sho ...

The evolved smart grid has become a cyber physical energy system that could be exposed to a massive amount of cyber threats. Vulnerabilities within the cyber part can be used to launch multiple types of attacks that corrupt the physical system. The complexity of cyber physical ...

The situational grid awareness is becoming increasingly important for power system operations due to smaller operational margins, wide range of uncertainties entailed by renewables and highly critical infrastructure failures due to potential cyber-attacks. In this chapter, we loo ...

Understanding smart grid cyber attacks is key for developing appropriate protection and recovery measures. Advanced attacks pursue maximized impact at minimized costs and detectability. This paper conducts risk analysis of combined data integrity and availability attacks again ...

Co-simulation for Cyber Security Analysis

Data Attacks against Energy Management System

It is challenging to assess the vulnerability of a cyber-physical power system to data attacks from an integral perspective. In order to support vulnerability assessment except analytic analysis, suitable platform for security tests needs to be developed. In this paper we analyze ...

Cyber Security of Intelligent Power Grids

Vulnerability and Impact Assessment for Combined Data Attacks

This work introduces combined data integrity and availability attacks to expand the attack scenarios against intelligent power grids. We propose security metrics that quantify vulnerability of power grids to combined data attacks under both power system models and communication m ...

Data Attacks on Power System State Estimation

Limited Adversarial Knowledge vs. Limited Attack Resources

It has shown that with perfect knowledge of the system model and the capability to manipulate a certain number of measurements, the false data injection (FDI) attacks, as a class of data integrity attacks, can coordinate measurements corruption to keep stealth against the bad dat ...

Cosimulation of Intelligent Power Systems

Fundamentals, Software Architecture, Numerics, and Coupling

Smart grids link various types of energy technologies-such as power electronics, machines, grids, and markets-via communication technology, which leads to a transdisciplinary, multidomain system. Simulation packages for assessing system integration of components typically cover o ...

Applied Cosimulation of Intelligent Power Systems

Implementing Hybrid Simulators for Complex Power Systems

Smart grids link various types of energy technologies, such as power electronics, machines, grids, and markets, via communication technology, which leads to transdisciplinary, multidomain systems. Simulation packages for assessing the system integration of components typically co ...
Distributed energy resources (DERs) have seen significant expansion in utilization over the past decade. This expansion is best observed with the rooftop solar panels whose penetration has substantially grown in terms of deployed MWs. With the transformation of the grid towards m ...
This paper introduces combined data integrity and availability attacks to expand the attack scenarios against power system state estimation. The goal of the adversary, who uses the combined attack, is to perturb the state estimates while remaining hidden from the observer. We pro ...