首页 > 最新文献

2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)最新文献

英文 中文
iCAD: information-Centric network Architecture for DDoS Protection in the Smart Grid iCAD:智能电网DDoS防护的信息中心网络架构
George Torres, Sharad Shrestha, S. Misra
With the proliferation of differently-abled and het-erogeneous devices in the smart grid Denial of Service (DoS) is becoming an even more potent attack vector than it was before. This paper demonstrates the ease with which an adversary can orchestrate DoS and distributed DoS (DDoS) attacks on the grid. We then propose iCAD-an information-centric ar-chitecture, which extends the iCAAP architecture proposed by us [8], complete with mitigation strategies built for DoS/DDoS resilience. We discuss our architecture in detail and demonstrate the architecture and the mitigation technique's effectiveness in mitigating DoS/DDoS attacks in the face of significant attack load from the distributed agents.
随着智能电网中不同功能和异构设备的激增,拒绝服务(DoS)正成为一种比以前更强大的攻击媒介。本文演示了攻击者可以轻松地在网格上编排DoS和分布式DoS (DDoS)攻击。然后,我们提出了icad -一种以信息为中心的ar架构,它扩展了我们b[8]提出的iCAAP架构,并提供了针对DoS/DDoS弹性构建的缓解策略。我们详细讨论了我们的体系结构,并演示了该体系结构和缓解技术在面对来自分布式代理的大量攻击负载时减轻DoS/DDoS攻击的有效性。
{"title":"iCAD: information-Centric network Architecture for DDoS Protection in the Smart Grid","authors":"George Torres, Sharad Shrestha, S. Misra","doi":"10.1109/SmartGridComm52983.2022.9960983","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960983","url":null,"abstract":"With the proliferation of differently-abled and het-erogeneous devices in the smart grid Denial of Service (DoS) is becoming an even more potent attack vector than it was before. This paper demonstrates the ease with which an adversary can orchestrate DoS and distributed DoS (DDoS) attacks on the grid. We then propose iCAD-an information-centric ar-chitecture, which extends the iCAAP architecture proposed by us [8], complete with mitigation strategies built for DoS/DDoS resilience. We discuss our architecture in detail and demonstrate the architecture and the mitigation technique's effectiveness in mitigating DoS/DDoS attacks in the face of significant attack load from the distributed agents.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Security of the Wireless Electric Vehicle Charging Communication 电动汽车无线充电通信的安全性研究
S. Köhler, S. Birnbach, Richard Baker, I. Martinovic
The adoption of fully Electric Vehicles (EVs) is happening at a rapid pace. To make the charging as fast and convenient as possible, new charging approaches are developed constantly. One such approach is wireless charging, also known as Wireless Power Transfer (WPT). Instead of charging an EV via a charging cable, the battery is charged wirelessly. For safety and efficiency reasons, the vehicle and the charging station continuously exchange critical information about the charging process. This includes, e.g., the maximum voltage and current, battery temperature, and State of Charge (SoC). Since there is no physical connection between the vehicle and the charging station, this necessary control communication has to be implemented as a wireless connection. However, if the communication is interrupted, the charging process is aborted for safety reasons. In this paper, we analyze the attack surface of EV charging standards that use such a wireless control communication. More specifically, we discuss potential wireless attacks that can violate the availability and analyze the implemented security features of a real-world wireless charging station that has already been deployed. We found that the tested charging station does not implement even simple security measures, such as IEEE 802.11w, that can protect the communication from denial-of-service attacks. Finally, we discuss potential countermeasures, and give recommendations to improve the security and increase the resilience of wireless charging.
全电动汽车(ev)的普及速度很快。为了使充电尽可能的快捷方便,新的充电方式不断被开发出来。其中一种方法是无线充电,也称为无线电力传输(WPT)。与通过充电电缆为电动汽车充电不同,电池采用无线充电方式。出于安全和效率的考虑,车辆和充电站不断交换有关充电过程的关键信息。这包括最大电压和电流、电池温度和充电状态(SoC)等。由于车辆和充电站之间没有物理连接,这种必要的控制通信必须以无线连接的方式实现。但是,如果通信中断,则出于安全原因终止充电过程。本文分析了使用这种无线控制通信的电动汽车充电标准的攻击面。更具体地说,我们讨论了可能违反可用性的潜在无线攻击,并分析了已经部署的现实世界无线充电站的实现安全特性。我们发现测试的充电站甚至没有实施简单的安全措施,例如IEEE 802.11w,可以保护通信免受拒绝服务攻击。最后,我们讨论了可能的对策,并提出了提高无线充电安全性和增强弹性的建议。
{"title":"On the Security of the Wireless Electric Vehicle Charging Communication","authors":"S. Köhler, S. Birnbach, Richard Baker, I. Martinovic","doi":"10.1109/SmartGridComm52983.2022.9961000","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961000","url":null,"abstract":"The adoption of fully Electric Vehicles (EVs) is happening at a rapid pace. To make the charging as fast and convenient as possible, new charging approaches are developed constantly. One such approach is wireless charging, also known as Wireless Power Transfer (WPT). Instead of charging an EV via a charging cable, the battery is charged wirelessly. For safety and efficiency reasons, the vehicle and the charging station continuously exchange critical information about the charging process. This includes, e.g., the maximum voltage and current, battery temperature, and State of Charge (SoC). Since there is no physical connection between the vehicle and the charging station, this necessary control communication has to be implemented as a wireless connection. However, if the communication is interrupted, the charging process is aborted for safety reasons. In this paper, we analyze the attack surface of EV charging standards that use such a wireless control communication. More specifically, we discuss potential wireless attacks that can violate the availability and analyze the implemented security features of a real-world wireless charging station that has already been deployed. We found that the tested charging station does not implement even simple security measures, such as IEEE 802.11w, that can protect the communication from denial-of-service attacks. Finally, we discuss potential countermeasures, and give recommendations to improve the security and increase the resilience of wireless charging.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Data Recovery Against False Data Injection Attacks in DC Microgrids 针对直流微电网虚假数据注入攻击的分布式数据恢复
Zexuan Jin, Mengxiang Liu, Ruilong Deng, Peng Cheng
With the development of information and communications technology (ICT) in DC microgrids (DCmGs), the threat of false data injection attacks (FDIAs) is becoming more and more serious. However, the existing literature mainly focuses on the detection and identification of FDIAs in DCmGs, while the data recovery after the perception of FDIAs has never been thor-oughly investigated yet. In this paper, we propose a distributed data recovery scheme to eliminate the adverse impact caused by FDIAs in DCmGs. Firstly, by observing the point of common coupling (PCC) voltage under FDIAs, the injected constant bias can be roughly estimated. In order to obtain the precise constant bias, the mean filter (MF) is adopted to handle the measurement noises and small oscillations. Then, the estimated precise constant bias is compensated for the communicated signal to eliminate the attack impact. Furthermore, our proposed data recovery scheme, which only needs local information, is fully distributed. Finally, the accuracy and effectiveness of the distributed data recovery scheme are evaluated through systematical hardware-in-the-loop (HIL) experiments.
随着信息通信技术(ICT)在直流微电网中的发展,虚假数据注入攻击(FDIAs)的威胁越来越严重。然而,现有的文献主要集中在DCmGs中FDIAs的检测和识别,而FDIAs感知后的数据恢复尚未得到深入的研究。在本文中,我们提出了一种分布式数据恢复方案,以消除DCmGs中fdi带来的不利影响。首先,通过观察FDIAs下的共耦合点电压(PCC),可以粗略估计注入的恒定偏置。为了获得精确的恒定偏置,采用均值滤波器(MF)处理测量噪声和小振荡。然后,对通信信号补偿估计的精确常数偏差,以消除攻击的影响。此外,我们提出的数据恢复方案是完全分布式的,只需要局部信息。最后,通过系统的半实物实验对分布式数据恢复方案的准确性和有效性进行了评价。
{"title":"Distributed Data Recovery Against False Data Injection Attacks in DC Microgrids","authors":"Zexuan Jin, Mengxiang Liu, Ruilong Deng, Peng Cheng","doi":"10.1109/SmartGridComm52983.2022.9960968","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960968","url":null,"abstract":"With the development of information and communications technology (ICT) in DC microgrids (DCmGs), the threat of false data injection attacks (FDIAs) is becoming more and more serious. However, the existing literature mainly focuses on the detection and identification of FDIAs in DCmGs, while the data recovery after the perception of FDIAs has never been thor-oughly investigated yet. In this paper, we propose a distributed data recovery scheme to eliminate the adverse impact caused by FDIAs in DCmGs. Firstly, by observing the point of common coupling (PCC) voltage under FDIAs, the injected constant bias can be roughly estimated. In order to obtain the precise constant bias, the mean filter (MF) is adopted to handle the measurement noises and small oscillations. Then, the estimated precise constant bias is compensated for the communicated signal to eliminate the attack impact. Furthermore, our proposed data recovery scheme, which only needs local information, is fully distributed. Finally, the accuracy and effectiveness of the distributed data recovery scheme are evaluated through systematical hardware-in-the-loop (HIL) experiments.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115786480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fault Diagnosis of Microgrids Using Branch Convolution Neural Network and Majority Voting 基于分支卷积神经网络和多数表决的微电网故障诊断
Zhoubing Li, Meng Zhang, Lin Li, Xiaohong Guan
Fault diagnosis is an important guarantee for the stable and safe operation of microgrids, which consists of fault detection and fault localization. However, most current researches separately deal with these two issues, which cannot obtain completed fault diagnosis results. This paper proposes a solution based on deep learning, namely branch convolution neural network (CNN) with a majority voting (B-CNN-MV) model, to simultaneously realize fault detection and fault localization through two branches. One of the branches realizes fault detection and the other performs fault localization. Firstly, in each branch, the CNN module extracts the two-dimensional image features of each sample in the spatial dimension and outputs primary classification results. Then, the classification results from the CNN module within one period of data constitute the temporal dimension input for the following majority voting module. Finally, the majority voting modules after each branch employ these temporal dimension inputs to calculate the final fault type and location results. Through this new design, the information on accurate fault type and fault location can be obtained simultaneously. Moreover, the test results show the proposed B-CNN-MV model can also achieve a high accuracy even in the case of insufficient data.
故障诊断是微电网稳定安全运行的重要保证,包括故障检测和故障定位。然而,目前的研究大多将这两个问题分开处理,无法获得完整的故障诊断结果。本文提出了一种基于深度学习的解决方案,即采用多数投票(B-CNN-MV)模型的分支卷积神经网络(CNN),通过两个分支同时实现故障检测和故障定位。其中一个分支实现故障检测,另一个分支实现故障定位。首先,在每个分支中,CNN模块在空间维度上提取每个样本的二维图像特征,输出初级分类结果。然后,CNN模块在一个数据周期内的分类结果构成了下一个多数投票模块的时间维度输入。最后,每个分支后的多数投票模块利用这些时间维度输入来计算最终的故障类型和定位结果。通过这种新设计,可以同时获得准确的故障类型和故障定位信息。此外,测试结果表明,即使在数据不足的情况下,所提出的B-CNN-MV模型也能达到较高的精度。
{"title":"Fault Diagnosis of Microgrids Using Branch Convolution Neural Network and Majority Voting","authors":"Zhoubing Li, Meng Zhang, Lin Li, Xiaohong Guan","doi":"10.1109/SmartGridComm52983.2022.9961044","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961044","url":null,"abstract":"Fault diagnosis is an important guarantee for the stable and safe operation of microgrids, which consists of fault detection and fault localization. However, most current researches separately deal with these two issues, which cannot obtain completed fault diagnosis results. This paper proposes a solution based on deep learning, namely branch convolution neural network (CNN) with a majority voting (B-CNN-MV) model, to simultaneously realize fault detection and fault localization through two branches. One of the branches realizes fault detection and the other performs fault localization. Firstly, in each branch, the CNN module extracts the two-dimensional image features of each sample in the spatial dimension and outputs primary classification results. Then, the classification results from the CNN module within one period of data constitute the temporal dimension input for the following majority voting module. Finally, the majority voting modules after each branch employ these temporal dimension inputs to calculate the final fault type and location results. Through this new design, the information on accurate fault type and fault location can be obtained simultaneously. Moreover, the test results show the proposed B-CNN-MV model can also achieve a high accuracy even in the case of insufficient data.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121147266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Optimization Framework for Effective Flexibility Management for Prosumers 产消企业有效柔性管理的优化框架
Thanasis G. Papaioannou, G. Stamoulis
Energy flexibility management can significantly support the smoother and more cost-effective green transformation of the energy mix. However, effective management of the flexibility of residential loads can only be achieved if users are successfully engaged into the process. In this paper, we propose an optimization framework that incorporates provision of different forms of monetary and non-monetary incentives to prosumers, i.e., rewards, lotteries, peer-pressure, for providing flexibility at specific time slots. Economic rewards are offered according to a simple, yet very powerful, linear incentives' function. Dynamic tariffs per time slot for purchasing and selling electricity are accommodated in this framework as well. The optimization problem of the DR aggregator is modeled as a cost-minimization one; its solution as a Stackelberg game is outlined for the case of full information on user-utility functions by the DR aggregator. Moreover, a distributed iterative algorithm is developed for solving the flexibility-management problem in the case where user-utility functions are not known to the aggregator. Numerical results show that this optimization framework is able to elicit the required flexibility from users at a minimum incentive cost, especially when monetary rewards are combined with peer pressure.
能源灵活性管理可以极大地支持能源结构更平稳、更具成本效益的绿色转型。然而,只有用户成功地参与到这一过程中,才能有效地管理住宅负荷的灵活性。在本文中,我们提出了一个优化框架,该框架结合了对生产消费者提供不同形式的货币和非货币激励,即奖励,彩票,同行压力,以在特定时间段提供灵活性。经济奖励是根据一个简单但非常强大的线性激励功能提供的。该框架还包含了购电和售电的每个时间段的动态电价。将DR聚合器的优化问题建模为成本最小化问题;它的解决方案是一个Stackelberg游戏,概述了DR聚合器对用户效用函数的完整信息的情况。此外,针对聚合器不知道用户效用函数的情况下的灵活性管理问题,提出了一种分布式迭代算法。数值结果表明,该优化框架能够以最小的激励成本从用户那里获得所需的灵活性,特别是当货币奖励与同伴压力相结合时。
{"title":"An Optimization Framework for Effective Flexibility Management for Prosumers","authors":"Thanasis G. Papaioannou, G. Stamoulis","doi":"10.1109/SmartGridComm52983.2022.9961040","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961040","url":null,"abstract":"Energy flexibility management can significantly support the smoother and more cost-effective green transformation of the energy mix. However, effective management of the flexibility of residential loads can only be achieved if users are successfully engaged into the process. In this paper, we propose an optimization framework that incorporates provision of different forms of monetary and non-monetary incentives to prosumers, i.e., rewards, lotteries, peer-pressure, for providing flexibility at specific time slots. Economic rewards are offered according to a simple, yet very powerful, linear incentives' function. Dynamic tariffs per time slot for purchasing and selling electricity are accommodated in this framework as well. The optimization problem of the DR aggregator is modeled as a cost-minimization one; its solution as a Stackelberg game is outlined for the case of full information on user-utility functions by the DR aggregator. Moreover, a distributed iterative algorithm is developed for solving the flexibility-management problem in the case where user-utility functions are not known to the aggregator. Numerical results show that this optimization framework is able to elicit the required flexibility from users at a minimum incentive cost, especially when monetary rewards are combined with peer pressure.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121139394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integration of LSTM based Model to guide short-term energy forecasting for green ICT networks in smart grids 基于LSTM模型的智能电网绿色ICT网络短期能源预测指导
H. Malik, A. Pouttu
Existing ICT networks are characterized by high level of energy consumption. In order to power up 5G base station sites, rising energy cost and high carbon emissions are major concerns that need to be dealt with. To achieve carbon neutrality, ICT sector needs to transform base station sites in a self-sustainable manner using renewable energy sources, local batteries and energy conservation techniques, even in adverse weather conditions and unexpected power outages. In this paper, short term-forecasting models are studied for accurate energy consumption and production forecast. The proposed architecture provides adaptive energy conservation technique using time series data analysis and Long Short-Term Memory for 5GNR base station site which is independent of traditional power sources and is completely powered by green energy. The accuracy analysis of this study was performed by the Mean Square Error (MSE) and Root Mean Square Error (RMSE). The results show high accuracy levels of LSTM model in guiding short-term energy forecasting for green ICT networks.
现有信息通信技术网络的特点是能耗高。为了给5G基站供电,不断上升的能源成本和高碳排放是需要解决的主要问题。为了实现碳中和,ICT行业需要以自我可持续的方式改造基站站点,使用可再生能源、当地电池和节能技术,即使在恶劣天气条件和意外停电的情况下也是如此。为了准确地预测能源消耗和生产,本文研究了短期预测模型。该架构为不依赖传统电源、完全由绿色能源供电的5GNR基站站点提供了利用时间序列数据分析和长短期记忆的自适应节能技术。本研究的准确性分析采用均方误差(MSE)和均方根误差(RMSE)进行。结果表明,LSTM模型在指导绿色ICT网络短期能源预测方面具有较高的准确性。
{"title":"Integration of LSTM based Model to guide short-term energy forecasting for green ICT networks in smart grids","authors":"H. Malik, A. Pouttu","doi":"10.1109/SmartGridComm52983.2022.9960992","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960992","url":null,"abstract":"Existing ICT networks are characterized by high level of energy consumption. In order to power up 5G base station sites, rising energy cost and high carbon emissions are major concerns that need to be dealt with. To achieve carbon neutrality, ICT sector needs to transform base station sites in a self-sustainable manner using renewable energy sources, local batteries and energy conservation techniques, even in adverse weather conditions and unexpected power outages. In this paper, short term-forecasting models are studied for accurate energy consumption and production forecast. The proposed architecture provides adaptive energy conservation technique using time series data analysis and Long Short-Term Memory for 5GNR base station site which is independent of traditional power sources and is completely powered by green energy. The accuracy analysis of this study was performed by the Mean Square Error (MSE) and Root Mean Square Error (RMSE). The results show high accuracy levels of LSTM model in guiding short-term energy forecasting for green ICT networks.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127350085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework to Evaluate PMU Networks for Resiliency Under Network Failure Conditions 一种评估PMU网络在网络故障条件下弹性的框架
Reuben Samson Raj, Dong Jin
Phasor Measurement Units (PMU), due to their capability for providing highly precise and time-synchronized measurements of synchrophasors, have now become indispensable in wide area monitoring of power-grid systems. Successful and reliable delivery of synchrophasor packets from the PMUs to the Phasor Data Concentrators (PDCs) and beyond, requires a backbone communication network that is robust and resilient to failures. These networks are vulnerable to a range of failures that include cyber-attacks, system or device level outages and link failures. In this paper, we present a framework to evaluate the resilience of a PMU network in the context of link failures. We model the PMU network as a connected graph and link failures as edges being removed from the graph. Our approach, inspired by model checking methods, involves exhaustively checking the reachability of PMU nodes to PDC nodes, for all possible combinations of link failures, given an expected number of links fail simultaneously. Using the IEEE 14-bus system, we illustrate the construction of the graph model and the solution design. Finally, a comparative evaluation on how adding redundant links to the network improves the Power System Observability, is performed on the IEEE 118 bus-system.
相量测量单元(PMU)由于能够提供高精度和时间同步的同步相量测量,现在已成为电网系统广域监测中不可或缺的设备。从pmu到相量数据集中器(PDCs)的同步数据包的成功和可靠的传递需要一个强大的骨干通信网络,并且对故障具有弹性。这些网络容易受到一系列故障的影响,包括网络攻击、系统或设备级中断以及链路故障。在本文中,我们提出了一个框架来评估PMU网络在链路故障情况下的弹性。我们将PMU网络建模为连通图,并将链路故障作为从图中移除的边。我们的方法受到模型检查方法的启发,在给定同时发生故障的链路数量的情况下,针对所有可能的链路故障组合,详尽地检查PMU节点到PDC节点的可达性。以IEEE 14总线系统为例,给出了图形模型的构建和方案设计。最后,在ieee118总线系统上,对增加冗余链路如何提高电力系统的可观测性进行了比较评估。
{"title":"A Framework to Evaluate PMU Networks for Resiliency Under Network Failure Conditions","authors":"Reuben Samson Raj, Dong Jin","doi":"10.1109/SmartGridComm52983.2022.9961035","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961035","url":null,"abstract":"Phasor Measurement Units (PMU), due to their capability for providing highly precise and time-synchronized measurements of synchrophasors, have now become indispensable in wide area monitoring of power-grid systems. Successful and reliable delivery of synchrophasor packets from the PMUs to the Phasor Data Concentrators (PDCs) and beyond, requires a backbone communication network that is robust and resilient to failures. These networks are vulnerable to a range of failures that include cyber-attacks, system or device level outages and link failures. In this paper, we present a framework to evaluate the resilience of a PMU network in the context of link failures. We model the PMU network as a connected graph and link failures as edges being removed from the graph. Our approach, inspired by model checking methods, involves exhaustively checking the reachability of PMU nodes to PDC nodes, for all possible combinations of link failures, given an expected number of links fail simultaneously. Using the IEEE 14-bus system, we illustrate the construction of the graph model and the solution design. Finally, a comparative evaluation on how adding redundant links to the network improves the Power System Observability, is performed on the IEEE 118 bus-system.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132802342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Integrated Resilient Distributed Energy Resources Management System 区块链集成弹性分布式能源管理系统
Seerin Ahmad, Bohyun Ahn, Taesic Kim, Jinchun Choi, Myungsuk Chae, Dongjun Han, D. Won
Distributed energy resource management system (DERMS) is a supervision system managing distributed energy resources (DERs) in a distribution system. However, the centralized DERMS has a potential risk of a single point of failure posed by cyber-attacks (e.g., denial of service attacks and ransomware attacks). This will cause visibility and control losses of the DER system. In this paper, blockchain (BC) technology is leveraged to enhance the resilience of DERMS by recovering the operation of a DER system during the DERMS outage. The proposed BC system is a governance platform for the DER system proving security and resilient control services on behalf of the DERMS until the availability of the DERMS is recovered. The feasibility of the proposed BC-integrated DERMS system toward a resilient DER system is validated by using a cyber-physical co-simulation testbed.
分布式能源管理系统(DERMS)是一种对配电系统中的分布式能源进行管理的监控系统。然而,集中式DERMS具有由网络攻击(例如,拒绝服务攻击和勒索软件攻击)引起的单点故障的潜在风险。这将导致DER系统的可视性和控制损失。在本文中,利用区块链(BC)技术通过在DERMS中断期间恢复DER系统的运行来增强DERMS的弹性。提议的BC系统是DER系统的治理平台,代表DERMS证明安全性和弹性控制服务,直到DERMS的可用性恢复。通过使用网络物理联合仿真试验台验证了所提出的bc集成DERMS系统面向弹性DER系统的可行性。
{"title":"Blockchain-Integrated Resilient Distributed Energy Resources Management System","authors":"Seerin Ahmad, Bohyun Ahn, Taesic Kim, Jinchun Choi, Myungsuk Chae, Dongjun Han, D. Won","doi":"10.1109/SmartGridComm52983.2022.9961046","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961046","url":null,"abstract":"Distributed energy resource management system (DERMS) is a supervision system managing distributed energy resources (DERs) in a distribution system. However, the centralized DERMS has a potential risk of a single point of failure posed by cyber-attacks (e.g., denial of service attacks and ransomware attacks). This will cause visibility and control losses of the DER system. In this paper, blockchain (BC) technology is leveraged to enhance the resilience of DERMS by recovering the operation of a DER system during the DERMS outage. The proposed BC system is a governance platform for the DER system proving security and resilient control services on behalf of the DERMS until the availability of the DERMS is recovered. The feasibility of the proposed BC-integrated DERMS system toward a resilient DER system is validated by using a cyber-physical co-simulation testbed.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129977946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Connectivity Preserving Anonymization of Smart Grid Network Configurations 智能电网网络配置的连通性保持匿名化
D. Nicol
We describe a method where a utility can anonymize network device configurations and upload them to a remote service provider who analyzes connectivity (oblivious to the anonymization) and returns the results in anonymized coordinates to the utility, where they are de-anonymized. The approach has application for sharing problematic configurations with vendors, for cloud-based services that analyze connectivity and detect problems, and for connectivity of the sort regulated by NERC-CIP requirements.
我们描述了一种方法,在这种方法中,实用程序可以匿名化网络设备配置,并将其上传到远程服务提供商,后者分析连接性(忽略匿名化),并以匿名坐标将结果返回给实用程序,在那里它们被去匿名化。该方法适用于与供应商共享有问题的配置,用于分析连接性和检测问题的基于云的服务,以及受NERC-CIP要求监管的连接性。
{"title":"Connectivity Preserving Anonymization of Smart Grid Network Configurations","authors":"D. Nicol","doi":"10.1109/SmartGridComm52983.2022.9961050","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961050","url":null,"abstract":"We describe a method where a utility can anonymize network device configurations and upload them to a remote service provider who analyzes connectivity (oblivious to the anonymization) and returns the results in anonymized coordinates to the utility, where they are de-anonymized. The approach has application for sharing problematic configurations with vendors, for cloud-based services that analyze connectivity and detect problems, and for connectivity of the sort regulated by NERC-CIP requirements.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131443855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating the Cybersecurity of Smart Grids Based on Cyber-Physical Twin Approach 基于网络物理孪生方法的智能电网网络安全研究
Ömer Sen, Florian Schmidtke, F. Carere, F. Santori, Andreas Ulbig, A. Monti
While the increasing penetration of information and communication technology into distribution grid brings numerous benefits, it also opens up a new threat landscape, particularly through cyberattacks. To provide a basis for countermeasures against such threats, this paper addresses the investigation of the impact and manifestations of cyberattacks on smart grids by replicating the power grid in a secure, isolated, and controlled laboratory environment as a cyber-physical twin. Currently, detecting intrusions by unauthorized third parties into the central monitoring and control system of grid operators, especially attacks within the grid perimeter, is a major challenge. The development and validation of methods to detect and prevent coordinated and timed attacks on electric power systems depends not only on the availability and quality of data from such attack scenarios, but also on suitable realistic investigation environments. However, to create a comprehensive investigation environment, a realistic representation of the study object is required to thoroughly investigate critical cyberattacks on grid operations and evaluate their impact on the power grid using real data. In this paper, we demonstrate our cyber-physical twin approach using a microgrid in the context of a cyberattack case study.
在信息和通信技术日益渗透到配电网中带来诸多好处的同时,它也带来了新的威胁,特别是通过网络攻击。为了提供应对此类威胁的对策基础,本文通过在安全、隔离和受控的实验室环境中将电网复制为网络物理孪生体,研究了网络攻击对智能电网的影响和表现。目前,检测未经授权的第三方对电网运营商中央监控系统的入侵,特别是对电网周边的攻击,是一个重大挑战。开发和验证检测和防止对电力系统的协调和定时攻击的方法不仅取决于来自此类攻击场景的数据的可用性和质量,还取决于合适的现实调查环境。然而,为了创造一个全面的调查环境,需要一个真实的研究对象,以深入研究电网运行的关键网络攻击,并使用真实数据评估其对电网的影响。在本文中,我们在网络攻击案例研究的背景下使用微电网演示了我们的网络物理孪生方法。
{"title":"Investigating the Cybersecurity of Smart Grids Based on Cyber-Physical Twin Approach","authors":"Ömer Sen, Florian Schmidtke, F. Carere, F. Santori, Andreas Ulbig, A. Monti","doi":"10.1109/SmartGridComm52983.2022.9961061","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961061","url":null,"abstract":"While the increasing penetration of information and communication technology into distribution grid brings numerous benefits, it also opens up a new threat landscape, particularly through cyberattacks. To provide a basis for countermeasures against such threats, this paper addresses the investigation of the impact and manifestations of cyberattacks on smart grids by replicating the power grid in a secure, isolated, and controlled laboratory environment as a cyber-physical twin. Currently, detecting intrusions by unauthorized third parties into the central monitoring and control system of grid operators, especially attacks within the grid perimeter, is a major challenge. The development and validation of methods to detect and prevent coordinated and timed attacks on electric power systems depends not only on the availability and quality of data from such attack scenarios, but also on suitable realistic investigation environments. However, to create a comprehensive investigation environment, a realistic representation of the study object is required to thoroughly investigate critical cyberattacks on grid operations and evaluate their impact on the power grid using real data. In this paper, we demonstrate our cyber-physical twin approach using a microgrid in the context of a cyberattack case study.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134178842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1