首页 > 最新文献

2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)最新文献

英文 中文
Resource Allocation for Intelligent Reflecting Surface-Assisted Cooperative NOMA-URLLC Networks in Smart Grid 智能电网中智能反射面辅助协同NOMA-URLLC网络资源分配
Junjie Yang, Geng Liu, J. Ren, Ying Liu, Liang Yao, Yuchen Zhou, Jian Chen
In this paper, we consider the resource allocation of mission-critical services in the smart grid, where we deploy an intelligent reflecting surface (IRS) during the transmission to alleviate the shortage of cooperative non-orthogonal multiple access (C-NOMA) in ultra-reliable and low-latency communications (URLLC). The purpose of this paper is to jointly optimize the power allocation, IRS phase shift, and the blocklength with finite blocklength information theory to minimize the total energy consumption subject to their delay and reliability constraints. Since the formulated optimization is non-convex, we first introduced two lemmas to simplify the constraints, and then we solve the optimization problem via the alternating optimization (AO). The transmit power and the blocklengths are optimized by using the techniques of successive convex approximation (SCA) and arithmetic geometry mean (AGM), and the reflective beamforming is optimized by using the techniques of semi-define relaxation (SDR) and sequential rank-one constraint relaxation (SROCR). Simulation results validate the advantage of IRS to C-NOMA in URLLC and the effectiveness of the resource allocation.
本文考虑了智能电网中关键业务的资源分配,在传输过程中部署智能反射面(IRS),以缓解超可靠低延迟通信(URLLC)中协作非正交多址(C-NOMA)的不足。本文的目的是利用有限块长信息理论,在时延和可靠性约束下,对功率分配、IRS相移和块长进行联合优化,使总能耗最小。由于公式优化是非凸的,我们首先引入两个引理来简化约束,然后通过交替优化(AO)来解决优化问题。采用连续凸近似(SCA)和算术几何平均(AGM)技术对发射功率和块长度进行优化,采用半定义松弛(SDR)和顺序秩一约束松弛(SROCR)技术对反射波束形成进行优化。仿真结果验证了IRS在URLLC中相对于C-NOMA的优势和资源分配的有效性。
{"title":"Resource Allocation for Intelligent Reflecting Surface-Assisted Cooperative NOMA-URLLC Networks in Smart Grid","authors":"Junjie Yang, Geng Liu, J. Ren, Ying Liu, Liang Yao, Yuchen Zhou, Jian Chen","doi":"10.1109/SmartGridComm52983.2022.9961057","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961057","url":null,"abstract":"In this paper, we consider the resource allocation of mission-critical services in the smart grid, where we deploy an intelligent reflecting surface (IRS) during the transmission to alleviate the shortage of cooperative non-orthogonal multiple access (C-NOMA) in ultra-reliable and low-latency communications (URLLC). The purpose of this paper is to jointly optimize the power allocation, IRS phase shift, and the blocklength with finite blocklength information theory to minimize the total energy consumption subject to their delay and reliability constraints. Since the formulated optimization is non-convex, we first introduced two lemmas to simplify the constraints, and then we solve the optimization problem via the alternating optimization (AO). The transmit power and the blocklengths are optimized by using the techniques of successive convex approximation (SCA) and arithmetic geometry mean (AGM), and the reflective beamforming is optimized by using the techniques of semi-define relaxation (SDR) and sequential rank-one constraint relaxation (SROCR). Simulation results validate the advantage of IRS to C-NOMA in URLLC and the effectiveness of the resource allocation.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126828409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge Computing supported Fault Indication in Smart Grid 边缘计算支持智能电网故障指示
P. Raussi, J. Kilpi, H. Kokkoniemi-Tarkkanen, A. Kulmala, P. Hovila
The distribution of smart grid applications to different physical devices not interconnected with physical sensors has opened the possibility for software virtualization allowing flexible localization of functionalities. Harnessing wireless 5G technology enables edge computing and locating smart grid applications at the edge. In this paper, we study edge computing supporting medium voltage grid fault location, discuss the challenges and benefits of bringing smart grid applications to the edge, and demonstrate fault location operation on an edge device. The challenges and benefits undertaken for a good business case are highlighted. The demonstration shows that the total data rate in urban areas is the critical parameter, whereas latency due to large distances and the general availability of edge resources are the most significant issues in rural areas.
将智能电网应用程序分发到不同的物理设备,而不与物理传感器互连,这为软件虚拟化提供了可能性,允许灵活的功能本地化。利用无线5G技术可以实现边缘计算并将智能电网应用定位在边缘。在本文中,我们研究了支持中压电网故障定位的边缘计算,讨论了将智能电网应用带到边缘的挑战和好处,并演示了在边缘设备上的故障定位操作。强调了一个好的商业案例所面临的挑战和带来的好处。该演示表明,城市地区的总数据速率是关键参数,而在农村地区,由于远距离和边缘资源的一般可用性导致的延迟是最重要的问题。
{"title":"Edge Computing supported Fault Indication in Smart Grid","authors":"P. Raussi, J. Kilpi, H. Kokkoniemi-Tarkkanen, A. Kulmala, P. Hovila","doi":"10.1109/SmartGridComm52983.2022.9960979","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960979","url":null,"abstract":"The distribution of smart grid applications to different physical devices not interconnected with physical sensors has opened the possibility for software virtualization allowing flexible localization of functionalities. Harnessing wireless 5G technology enables edge computing and locating smart grid applications at the edge. In this paper, we study edge computing supporting medium voltage grid fault location, discuss the challenges and benefits of bringing smart grid applications to the edge, and demonstrate fault location operation on an edge device. The challenges and benefits undertaken for a good business case are highlighted. The demonstration shows that the total data rate in urban areas is the critical parameter, whereas latency due to large distances and the general availability of edge resources are the most significant issues in rural areas.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Holistic Multi-Step Cyberattack Detection via a Graph-based Correlation Approach 基于图关联方法的整体多步网络攻击检测
Ömer Sen, C. Eze, Andreas Ulbig, A. Monti
While digitization of distribution grids through information and communications technology brings numerous benefits, it also increases the grid's vulnerability to serious cyber attacks. Unlike conventional systems, attacks on many industrial control systems such as power grids often occur in multiple stages, with the attacker taking several steps at once to achieve its goal. Detection mechanisms with situational awareness are needed to detect orchestrated attack steps as part of a coherent attack campaign. To provide a foundation for detection and prevention of such attacks, this paper addresses the detection of multi-stage cyber attacks with the aid of a graph-based cyber intelligence database and alert correlation approach. Specifically, we propose an approach to detect multi-stage attacks by lever-aging heterogeneous data to form a knowledge base and employ a model-based correlation approach on the generated alerts to identify multi-stage cyber attack sequences taking place in the network. We investigate the detection quality of the proposed approach by using a case study of a multi-stage cyber attack campaign in a future-orientated power grid pilot.
通过信息和通信技术实现配电网数字化带来诸多好处的同时,也增加了电网遭受严重网络攻击的脆弱性。与传统系统不同,对许多工业控制系统(如电网)的攻击通常分多个阶段进行,攻击者一次采取几个步骤来实现其目标。需要具有态势感知的检测机制来检测作为连贯攻击活动一部分的精心策划的攻击步骤。为了为此类攻击的检测和预防提供基础,本文借助基于图的网络情报数据库和警报关联方法解决了多阶段网络攻击的检测问题。具体而言,我们提出了一种通过利用老化的异构数据形成知识库来检测多阶段攻击的方法,并对生成的警报采用基于模型的关联方法来识别网络中发生的多阶段网络攻击序列。我们通过在面向未来的电网试点中使用多阶段网络攻击活动的案例研究来研究所提出方法的检测质量。
{"title":"On Holistic Multi-Step Cyberattack Detection via a Graph-based Correlation Approach","authors":"Ömer Sen, C. Eze, Andreas Ulbig, A. Monti","doi":"10.1109/SmartGridComm52983.2022.9961016","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961016","url":null,"abstract":"While digitization of distribution grids through information and communications technology brings numerous benefits, it also increases the grid's vulnerability to serious cyber attacks. Unlike conventional systems, attacks on many industrial control systems such as power grids often occur in multiple stages, with the attacker taking several steps at once to achieve its goal. Detection mechanisms with situational awareness are needed to detect orchestrated attack steps as part of a coherent attack campaign. To provide a foundation for detection and prevention of such attacks, this paper addresses the detection of multi-stage cyber attacks with the aid of a graph-based cyber intelligence database and alert correlation approach. Specifically, we propose an approach to detect multi-stage attacks by lever-aging heterogeneous data to form a knowledge base and employ a model-based correlation approach on the generated alerts to identify multi-stage cyber attack sequences taking place in the network. We investigate the detection quality of the proposed approach by using a case study of a multi-stage cyber attack campaign in a future-orientated power grid pilot.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131412775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feasibility of completely electrified two-way car sharing 全电气化双向汽车共享的可行性
Leo Strobel, M. Pruckner
Car sharing is a more sustainable approach to personal mobility than vehicle ownership, especially if car sharing services electrify their fleets. However, due to the limited range and slow charging process of electric vehicles, car sharing providers might face problems keeping the vehicles adequately charged. This paper analyzes 4.5 years of real booking data from a German two-way car sharing provider. The dataset includes information on the booking time window, driven distance, and location. We use this data to study the customer behavior and simulate the past operation with a completely electrified fleet. Based on the simulation, we determine whether charging problems exist and how they can be solved by adapting the charging rate, battery capacity, and number of charging points. Our results indicate that the operation of the service with modern electric vehicles is entirely feasible. Per car sharing station, two charging points are sufficient if vehicles do not have to be connected immediately upon arrival (by the customer), but can connect later once another vehicle has finished charging. Somewhat problematic is that 4% of the bookings have a longer driven distance than the vehicle's range. In these cases, the disutility to customers is unclear but, in all likelihood, manageable. Furthermore, we find that 50% of the charging events can be shifted by more than 10h, indicating significant flexibility that could be utilized for smart charging and the provision of ancillary services in the future.
对于个人出行来说,汽车共享是一种比拥有汽车更可持续的方式,尤其是在汽车共享服务使他们的车队电气化的情况下。然而,由于电动汽车的行驶里程有限,充电过程缓慢,汽车共享供应商可能会面临保持车辆充分充电的问题。本文分析了德国一家双向汽车共享提供商4.5年的真实预订数据。该数据集包括预订时间窗口、驾驶距离和位置等信息。我们使用这些数据来研究客户行为,并模拟过去完全电气化车队的运行情况。在仿真的基础上,通过调整充电速率、电池容量和充电点数量来确定是否存在充电问题以及如何解决充电问题。我们的研究结果表明,现代电动汽车运营该服务是完全可行的。每个汽车共享站,如果车辆不需要在到达时(由客户)立即连接,但可以在其他车辆完成充电后连接,则两个充电站就足够了。有些问题是,4%的预订的行驶距离超过了车辆的行驶里程。在这些情况下,对客户的负面影响尚不清楚,但很可能是可控的。此外,我们发现50%的充电事件可以转移超过10小时,这表明未来可以利用智能充电和提供辅助服务的巨大灵活性。
{"title":"Feasibility of completely electrified two-way car sharing","authors":"Leo Strobel, M. Pruckner","doi":"10.1109/SmartGridComm52983.2022.9961032","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961032","url":null,"abstract":"Car sharing is a more sustainable approach to personal mobility than vehicle ownership, especially if car sharing services electrify their fleets. However, due to the limited range and slow charging process of electric vehicles, car sharing providers might face problems keeping the vehicles adequately charged. This paper analyzes 4.5 years of real booking data from a German two-way car sharing provider. The dataset includes information on the booking time window, driven distance, and location. We use this data to study the customer behavior and simulate the past operation with a completely electrified fleet. Based on the simulation, we determine whether charging problems exist and how they can be solved by adapting the charging rate, battery capacity, and number of charging points. Our results indicate that the operation of the service with modern electric vehicles is entirely feasible. Per car sharing station, two charging points are sufficient if vehicles do not have to be connected immediately upon arrival (by the customer), but can connect later once another vehicle has finished charging. Somewhat problematic is that 4% of the bookings have a longer driven distance than the vehicle's range. In these cases, the disutility to customers is unclear but, in all likelihood, manageable. Furthermore, we find that 50% of the charging events can be shifted by more than 10h, indicating significant flexibility that could be utilized for smart charging and the provision of ancillary services in the future.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127455675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attention-guided Temporal Convolutional Network for Non-intrusive Load Monitoring 非侵入式负荷监测的注意引导时间卷积网络
Huamin Ren, Xiaomeng Su, R. Jenssen, Jingyue Li, S. Anfinsen
With the prevalence of smart meter infrastructure, data analysis on consumer side becomes more and more important in smart grid systems. One of the fundamental tasks is to disaggregate users' total consumption into appliance-wise values. It has been well noted that encoding of temporal dependency is a key issue for successful modelling of the relations between the total consumption and its decomposed consumption on an appliance historically, and therefore has been implemented in many state-of-the-art models. However, how to encode the varied long-term and short-term dependency coming from different appliances is yet an open and under-addressed question. In this paper, we propose an attention-guided temporal convolutional network (ATCN), which generates different temporal residual blocks and provides an attention mechanism to indicate the importance of those blocks with respect to the appliance. Ul-timately, we aim to address these two questions: i) How to employ both long-term and short-term temporal dependency to better disaggregate future loads while maintaining an affordable memory cost? ii) How to employ attention during the training of an appliance to obtain a better representation of the consumption pattern? We have demonstrated the effectiveness of our approach through comprehensive experiments and show that our proposed ATCN model achieves state-of-the-art performance, particularly on multi-status appliances that are normally hard to cope with regarding disaggregation accuracy and generalization capability.
随着智能电表基础设施的普及,用户侧数据分析在智能电网系统中变得越来越重要。其中一项基本任务是将用户的总消费分解为与设备相关的价值。人们已经注意到,时间依赖性的编码是一个关键问题,对于一个设备上的总消耗与其分解消耗之间的关系成功建模历史,因此已在许多最先进的模型中实现。然而,如何对来自不同设备的各种长期和短期依赖进行编码仍然是一个开放和未解决的问题。在本文中,我们提出了一个注意引导的时间卷积网络(ATCN),它产生不同的时间残差块,并提供一个注意机制来表明这些块相对于设备的重要性。最终,我们的目标是解决这两个问题:i)如何使用长期和短期时间依赖关系来更好地分解未来的负载,同时保持可负担的内存成本?ii)如何在器具的训练过程中运用注意力,以更好地反映消费模式?我们已经通过综合实验证明了我们方法的有效性,并表明我们提出的ATCN模型达到了最先进的性能,特别是在通常难以处理的多状态设备上的分解精度和泛化能力。
{"title":"Attention-guided Temporal Convolutional Network for Non-intrusive Load Monitoring","authors":"Huamin Ren, Xiaomeng Su, R. Jenssen, Jingyue Li, S. Anfinsen","doi":"10.1109/SmartGridComm52983.2022.9960976","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960976","url":null,"abstract":"With the prevalence of smart meter infrastructure, data analysis on consumer side becomes more and more important in smart grid systems. One of the fundamental tasks is to disaggregate users' total consumption into appliance-wise values. It has been well noted that encoding of temporal dependency is a key issue for successful modelling of the relations between the total consumption and its decomposed consumption on an appliance historically, and therefore has been implemented in many state-of-the-art models. However, how to encode the varied long-term and short-term dependency coming from different appliances is yet an open and under-addressed question. In this paper, we propose an attention-guided temporal convolutional network (ATCN), which generates different temporal residual blocks and provides an attention mechanism to indicate the importance of those blocks with respect to the appliance. Ul-timately, we aim to address these two questions: i) How to employ both long-term and short-term temporal dependency to better disaggregate future loads while maintaining an affordable memory cost? ii) How to employ attention during the training of an appliance to obtain a better representation of the consumption pattern? We have demonstrated the effectiveness of our approach through comprehensive experiments and show that our proposed ATCN model achieves state-of-the-art performance, particularly on multi-status appliances that are normally hard to cope with regarding disaggregation accuracy and generalization capability.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126219256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Dynamic Multi-source Multi-community Power Schedule and Trading 最优动态多源多社区电力调度与交易
Olamide Jogunola, B. Adebisi, H. Gačanin, M. Hammoudeh, Guan Gui
As peer-to-peer energy trading and local energy market are gaining momentum, a follow-up challenge is scaling up to include multi-community, multi-region power schedule and trading. This study introduces community-to-community power trading and schedules considering various generating units, including coal, gas, wind, and solar, as well as import and export prices from community transactions. These generating sources are used to fulfil the demand requirements of each community over a time horizon, as well as absorbing or trading the margin among the inter-connected communities, while fulfilling certain distribution network constraints. For a practical case, the uncertainties in wind power generations are considered. An optimality condition decomposition technique is used to decompose the overall problem into a community-based local problem. Thus, individual community solves their optimisation local problem in parallel for operational efficiency of real-time multi-commodity power schedule and trading. The initial results indicate that each community acts in its best interest to minimise its costs when there is a change in the variable. When emission costs are applied as a constraint to their generation, a reduction in power generation is observed augmented by an increase of up to 30.8% of power transferred in the inter-community transaction.
随着点对点能源交易和地方能源市场的蓬勃发展,后续的挑战正在扩大,包括多社区、多地区的电力调度和交易。本研究引入社区对社区的电力交易和计划,考虑各种发电机组,包括煤、天然气、风能和太阳能,以及社区交易的进出口价格。这些发电源用于满足每个社区在一段时间内的需求需求,以及在相互连接的社区之间吸收或交易边际,同时满足某些配电网限制。以实际情况为例,考虑了风力发电的不确定性。采用最优性条件分解技术,将整体问题分解为基于社区的局部问题。因此,各个社区并行解决了各自的局部优化问题,以提高实时多商品电力调度和交易的运行效率。初步结果表明,当变量发生变化时,每个社区都以其最佳利益行事,以尽量减少其成本。当排放成本作为发电的约束时,观察到发电量的减少因社区间交易中转移的电力增加高达30.8%而增加。
{"title":"Optimal Dynamic Multi-source Multi-community Power Schedule and Trading","authors":"Olamide Jogunola, B. Adebisi, H. Gačanin, M. Hammoudeh, Guan Gui","doi":"10.1109/SmartGridComm52983.2022.9961059","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961059","url":null,"abstract":"As peer-to-peer energy trading and local energy market are gaining momentum, a follow-up challenge is scaling up to include multi-community, multi-region power schedule and trading. This study introduces community-to-community power trading and schedules considering various generating units, including coal, gas, wind, and solar, as well as import and export prices from community transactions. These generating sources are used to fulfil the demand requirements of each community over a time horizon, as well as absorbing or trading the margin among the inter-connected communities, while fulfilling certain distribution network constraints. For a practical case, the uncertainties in wind power generations are considered. An optimality condition decomposition technique is used to decompose the overall problem into a community-based local problem. Thus, individual community solves their optimisation local problem in parallel for operational efficiency of real-time multi-commodity power schedule and trading. The initial results indicate that each community acts in its best interest to minimise its costs when there is a change in the variable. When emission costs are applied as a constraint to their generation, a reduction in power generation is observed augmented by an increase of up to 30.8% of power transferred in the inter-community transaction.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121650623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OpenConduit: A Tool for Recreating Power System Communication Networks Automatically OpenConduit:一个自动重建电力系统通信网络的工具
A. Umunnakwe, Patrick Wlazlo, A. Sahu, Julian Velasquez, K. Davis, A. Goulart, S. Zonouz
The daily operations of critical infrastructures have long relied upon computer networks. Nevertheless, these networks attract adversarial actions. To improve the security and resilience of electric power systems and other cyber-physical critical infrastructure, there is a crucial need to study their communication networks alongside their physical systems. However, there is a disconnect between network models used by research groups and the actual network topologies used in industry. These modeling differences lead to discrepancies between study results and what is attainable in the field. To address this, OpenConduit is introduced in this paper. OpenConduit is designed to achieve automated and realistic replication of electric power system networks in an emulation environment. OpenConduit interprets industrial networks' configuration data (real or synthetic) and rebuilds the network in the Common Open Research Emulator (CORE). OpenConduit's architecture, design, and integration into a large-scale cyber-physical testbed are the focus of the paper. Experiments with a sample synthetic electric utility network show its ability to efficiently enable detailed emulation studies for real utility networks in a safe environment. Finally, experiments on a range of cases demonstrate the OpenConduit tool to be effective for scalability in the emulation of larger networks, as well as achieving conformity with configuration files and system settings while maintaining functionality. Additionally, the emulation time which averages 59 seconds can be integrated with power systems operations, while upholding information security of system data.
关键基础设施的日常运作长期依赖于计算机网络。然而,这些网络吸引了敌对行动。为了提高电力系统和其他网络物理关键基础设施的安全性和弹性,迫切需要在研究其物理系统的同时研究其通信网络。然而,研究小组使用的网络模型与工业中使用的实际网络拓扑之间存在脱节。这些建模上的差异导致了研究结果与该领域实际情况之间的差异。为了解决这个问题,本文介绍了OpenConduit。OpenConduit设计用于在仿真环境中实现电力系统网络的自动化和逼真复制。OpenConduit解释工业网络的配置数据(真实的或合成的),并在Common Open Research Emulator (CORE)中重建网络。OpenConduit的架构、设计以及与大型网络物理测试平台的集成是本文的重点。仿真实验表明,该方法能够有效地对安全环境下的实际电网进行详细的仿真研究。最后,在一系列案例上的实验表明,OpenConduit工具对于模拟大型网络中的可伸缩性是有效的,并且在保持功能的同时实现与配置文件和系统设置的一致性。此外,仿真时间平均为59秒,可以与电力系统运行相结合,同时保证系统数据的信息安全。
{"title":"OpenConduit: A Tool for Recreating Power System Communication Networks Automatically","authors":"A. Umunnakwe, Patrick Wlazlo, A. Sahu, Julian Velasquez, K. Davis, A. Goulart, S. Zonouz","doi":"10.1109/SmartGridComm52983.2022.9960996","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960996","url":null,"abstract":"The daily operations of critical infrastructures have long relied upon computer networks. Nevertheless, these networks attract adversarial actions. To improve the security and resilience of electric power systems and other cyber-physical critical infrastructure, there is a crucial need to study their communication networks alongside their physical systems. However, there is a disconnect between network models used by research groups and the actual network topologies used in industry. These modeling differences lead to discrepancies between study results and what is attainable in the field. To address this, OpenConduit is introduced in this paper. OpenConduit is designed to achieve automated and realistic replication of electric power system networks in an emulation environment. OpenConduit interprets industrial networks' configuration data (real or synthetic) and rebuilds the network in the Common Open Research Emulator (CORE). OpenConduit's architecture, design, and integration into a large-scale cyber-physical testbed are the focus of the paper. Experiments with a sample synthetic electric utility network show its ability to efficiently enable detailed emulation studies for real utility networks in a safe environment. Finally, experiments on a range of cases demonstrate the OpenConduit tool to be effective for scalability in the emulation of larger networks, as well as achieving conformity with configuration files and system settings while maintaining functionality. Additionally, the emulation time which averages 59 seconds can be integrated with power systems operations, while upholding information security of system data.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125297406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Attack-aware Risk Management for PMSG-based Wind Farm Depending on System Strength Evaluation 基于系统强度评估的pmsg风电场在线攻击感知风险管理
Hang Du, Jun Yan, Mohsen Ghafouri, Rawad F. Zgheib, M. Debbabi
The retirement of synchronous generators and the increasing capacity of renewable energy sources (RES) have contributed to the decline of system strength in a power grid, leading to a problem such as subsynchronous oscillation (SSO) in permanent magnet synchronous generator (PMSG)-based wind farms. Cyberattacks aimed at reducing the system strength of the power grid may exacerbate this problem. However, existing solutions are either incomplete for system strength evaluation or exclude the consideration of cyberattacks. To this end, this paper presents a comprehensive system strength evaluation and a short-term system strength prediction process that takes into account the stealthy cyberattacks launched especially when the system strength provision is at its minimum level. In addition, proactive risk management is proposed to retain the grid's system strength for the wind farm above the minimum required level even if a cyberattack takes place. The efficacy of the proposed system strength evaluation and risk management based on system strength prediction is demonstrated through case studies in the IEEE 9-bus benchmark.
同步发电机的退役和可再生能源(RES)容量的增加导致电网系统强度下降,导致基于永磁同步发电机(PMSG)的风电场出现次同步振荡(SSO)等问题。旨在降低电网系统强度的网络攻击可能会加剧这一问题。然而,现有的解决方案要么是不完整的系统强度评估,要么是排除了网络攻击的考虑。为此,本文提出了一个综合的系统强度评估和短期系统强度预测过程,该过程考虑了特别是当系统强度供应处于最低水平时发起的隐形网络攻击。此外,提出了主动风险管理,即使发生网络攻击,也可以将风电场的电网系统强度保持在最低要求水平以上。通过IEEE 9总线基准的案例研究,验证了基于系统强度预测的系统强度评估和风险管理的有效性。
{"title":"Online Attack-aware Risk Management for PMSG-based Wind Farm Depending on System Strength Evaluation","authors":"Hang Du, Jun Yan, Mohsen Ghafouri, Rawad F. Zgheib, M. Debbabi","doi":"10.1109/SmartGridComm52983.2022.9961011","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961011","url":null,"abstract":"The retirement of synchronous generators and the increasing capacity of renewable energy sources (RES) have contributed to the decline of system strength in a power grid, leading to a problem such as subsynchronous oscillation (SSO) in permanent magnet synchronous generator (PMSG)-based wind farms. Cyberattacks aimed at reducing the system strength of the power grid may exacerbate this problem. However, existing solutions are either incomplete for system strength evaluation or exclude the consideration of cyberattacks. To this end, this paper presents a comprehensive system strength evaluation and a short-term system strength prediction process that takes into account the stealthy cyberattacks launched especially when the system strength provision is at its minimum level. In addition, proactive risk management is proposed to retain the grid's system strength for the wind farm above the minimum required level even if a cyberattack takes place. The efficacy of the proposed system strength evaluation and risk management based on system strength prediction is demonstrated through case studies in the IEEE 9-bus benchmark.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122394262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reconfigurable and Secure Firmware Updating Framework for Advanced Metering Infrastructure 高级计量基础设施的可重构安全固件更新框架
P. Gope, B. Sikdar
Smart meters play an important role in modern power grids by providing fine-grained power consumption data and enabling services such as dynamic pricing and demand-side management. The smart metering devices are firmware-driven, where it is important that the devices be able to securely update their firmware on a regular basis to fix bugs, and improve as well as add services. In this paper, we propose a new privacy-aware secure firmware-updating framework called PRSUF (Privacy-aware Reconfigurable Secure-Firmware Updating Framework) to securely update the firmware in smart metering devices. The proposed the framework allows a hardware intrinsic secret to being updated and stored in a secure and efficient way. One of its key differentiating features is that, unlike existing mechanisms, the proposed scheme does not require storing any keys in the meter's non-volatile memory (NVM), thereby making it is secure against a number of physical and side-channel attacks. As compared to state-of-the-art solutions, the proposed security framework has notable features such as reconfigurability, protection against cloning and downgrading, detection of theft of services and tampering with the firmware and the hardware, etc.
智能电表通过提供细粒度的电力消耗数据和实现动态定价和需求侧管理等服务,在现代电网中发挥着重要作用。智能计量设备是固件驱动的,重要的是设备能够定期安全地更新其固件以修复错误,并改进和添加服务。在本文中,我们提出了一个新的隐私感知安全固件更新框架,称为PRSUF(隐私感知可重构安全固件更新框架),以安全地更新智能计量设备中的固件。该框架允许以安全有效的方式更新和存储硬件内部秘密。与现有机制不同的是,该方案不需要在仪表的非易失性存储器(NVM)中存储任何密钥,从而使其能够安全抵御许多物理和侧信道攻击。与最先进的解决方案相比,拟议的安全框架具有显著的特点,如可重构性、防止克隆和降级、检测服务盗窃以及篡改固件和硬件等。
{"title":"A Reconfigurable and Secure Firmware Updating Framework for Advanced Metering Infrastructure","authors":"P. Gope, B. Sikdar","doi":"10.1109/SmartGridComm52983.2022.9961036","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961036","url":null,"abstract":"Smart meters play an important role in modern power grids by providing fine-grained power consumption data and enabling services such as dynamic pricing and demand-side management. The smart metering devices are firmware-driven, where it is important that the devices be able to securely update their firmware on a regular basis to fix bugs, and improve as well as add services. In this paper, we propose a new privacy-aware secure firmware-updating framework called PRSUF (Privacy-aware Reconfigurable Secure-Firmware Updating Framework) to securely update the firmware in smart metering devices. The proposed the framework allows a hardware intrinsic secret to being updated and stored in a secure and efficient way. One of its key differentiating features is that, unlike existing mechanisms, the proposed scheme does not require storing any keys in the meter's non-volatile memory (NVM), thereby making it is secure against a number of physical and side-channel attacks. As compared to state-of-the-art solutions, the proposed security framework has notable features such as reconfigurability, protection against cloning and downgrading, detection of theft of services and tampering with the firmware and the hardware, etc.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"97 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127999427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating Synthetic Datasets for Training Machine Learning Models to Detect Malicious Commands 评估用于训练机器学习模型以检测恶意命令的合成数据集
Jia Wei Teo, Sean Gunawan, P. Biswas, D. Mashima
Electrical substations in power grid act as the critical interface points for the transmission and distribution networks. Over the years, digital technology has been integrated into the substations for remote control and automation. As a result, substations are more prone to cyber attacks and exposed to digital vulnerabilities. One of the notable cyber attack vectors is the malicious command injection, which can lead to shutting down of substations and subsequently power outages as demonstrated in Ukraine Power Plant Attack in 2015. Prevailing measures based on cyber rules (e.g., firewalls and intrusion detection systems) are often inadequate to detect advanced and stealthy attacks that use legitimate-looking measurements or control messages to cause physical damage. Additionally, defenses that use physics-based approaches (e.g., power flow simulation, state estimation, etc.) to detect malicious commands suffer from high latency. Machine learning serves as a potential solution in detecting command injection attacks with high accuracy and low latency. However, sufficient datasets are not readily available to train and evaluate the machine learning models. In this paper, focusing on this particular challenge, we discuss various approaches for the generation of synthetic data that can be used to train the machine learning models. Further, we evaluate the models trained with the synthetic data against attack datasets that simulates malicious commands injections with different levels of sophistication. Our findings show that synthetic data generated with some level of power grid domain knowledge helps train robust machine learning models against different types of attacks.
电网中的变电站是输配电网络的关键接口。多年来,数字技术已被集成到变电站的远程控制和自动化。因此,变电站更容易受到网络攻击,暴露在数字漏洞之下。值得注意的网络攻击媒介之一是恶意命令注入,这可能导致变电站关闭,随后停电,如2015年乌克兰发电厂攻击所示。基于网络规则的现行措施(例如,防火墙和入侵检测系统)往往不足以检测使用看似合法的测量或控制消息造成物理损害的高级和隐蔽攻击。此外,使用基于物理的方法(例如,功率流模拟,状态估计等)来检测恶意命令的防御受到高延迟的影响。机器学习是检测命令注入攻击的潜在解决方案,具有高精度和低延迟。然而,没有足够的数据集来训练和评估机器学习模型。在本文中,针对这一特殊挑战,我们讨论了用于生成可用于训练机器学习模型的合成数据的各种方法。此外,我们评估了用合成数据训练的模型,以对抗模拟不同复杂程度的恶意命令注入的攻击数据集。我们的研究结果表明,通过一定程度的电网领域知识生成的合成数据有助于训练强大的机器学习模型来应对不同类型的攻击。
{"title":"Evaluating Synthetic Datasets for Training Machine Learning Models to Detect Malicious Commands","authors":"Jia Wei Teo, Sean Gunawan, P. Biswas, D. Mashima","doi":"10.1109/SmartGridComm52983.2022.9961001","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961001","url":null,"abstract":"Electrical substations in power grid act as the critical interface points for the transmission and distribution networks. Over the years, digital technology has been integrated into the substations for remote control and automation. As a result, substations are more prone to cyber attacks and exposed to digital vulnerabilities. One of the notable cyber attack vectors is the malicious command injection, which can lead to shutting down of substations and subsequently power outages as demonstrated in Ukraine Power Plant Attack in 2015. Prevailing measures based on cyber rules (e.g., firewalls and intrusion detection systems) are often inadequate to detect advanced and stealthy attacks that use legitimate-looking measurements or control messages to cause physical damage. Additionally, defenses that use physics-based approaches (e.g., power flow simulation, state estimation, etc.) to detect malicious commands suffer from high latency. Machine learning serves as a potential solution in detecting command injection attacks with high accuracy and low latency. However, sufficient datasets are not readily available to train and evaluate the machine learning models. In this paper, focusing on this particular challenge, we discuss various approaches for the generation of synthetic data that can be used to train the machine learning models. Further, we evaluate the models trained with the synthetic data against attack datasets that simulates malicious commands injections with different levels of sophistication. Our findings show that synthetic data generated with some level of power grid domain knowledge helps train robust machine learning models against different types of attacks.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121530003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1