首页 > 最新文献

2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)最新文献

英文 中文
Cooperative Carbon Emission Trading: A Coalitional Game Approach 合作碳排放交易:一种联盟博弈方法
Qisheng Huang, Yunshu Liu, Peng-jie Sun, Junling Li, Jin Xu
Many countries have implemented different policies to achieve carbon neutrality in the current century. The cap-and-trade policy is one of the popular policies. The cap-and-trade policy provides carbon emission quotas for power generation companies. Each company must carefully determine its energy production based on the carbon emission quota and demand uncertainty. In this paper, we analyze the cooperation among different power generation companies using the coalitional game theory. We show the optimality of the grand coalition for minimizing the total cost by proving that the cost function is subadditive. This result highlights the benefits of cooperation. We further propose a cost allocation mechanism that allocates the total cost to different power generation companies. We prove that the proposed cost allocation mechanism is in the core of the coalitional game such that no group of power generation companies has any incentive to leave the grand coalition. Numerical experiments have been conducted to validate the established theoretical results.
在本世纪,许多国家已经实施了不同的政策来实现碳中和。限额与交易政策是受欢迎的政策之一。限额与交易政策为发电公司提供碳排放配额。每家公司必须根据碳排放配额和需求不确定性,仔细确定自己的能源生产。本文运用联合博弈论分析了不同发电企业之间的合作问题。通过证明成本函数是次可加性的,证明了大联盟对于最小化总成本的最优性。这一结果凸显了合作的好处。我们进一步提出了一个成本分摊机制,将总成本分配给不同的发电公司。我们证明了所提出的成本分配机制是联盟博弈的核心,因此没有任何发电公司集团有任何动机离开大联盟。数值实验验证了所建立的理论结果。
{"title":"Cooperative Carbon Emission Trading: A Coalitional Game Approach","authors":"Qisheng Huang, Yunshu Liu, Peng-jie Sun, Junling Li, Jin Xu","doi":"10.1109/SmartGridComm52983.2022.9960999","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960999","url":null,"abstract":"Many countries have implemented different policies to achieve carbon neutrality in the current century. The cap-and-trade policy is one of the popular policies. The cap-and-trade policy provides carbon emission quotas for power generation companies. Each company must carefully determine its energy production based on the carbon emission quota and demand uncertainty. In this paper, we analyze the cooperation among different power generation companies using the coalitional game theory. We show the optimality of the grand coalition for minimizing the total cost by proving that the cost function is subadditive. This result highlights the benefits of cooperation. We further propose a cost allocation mechanism that allocates the total cost to different power generation companies. We prove that the proposed cost allocation mechanism is in the core of the coalitional game such that no group of power generation companies has any incentive to leave the grand coalition. Numerical experiments have been conducted to validate the established theoretical results.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134448251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Message Authentication Solutions for IEC 61850 in Substation Automation Systems IEC 61850在变电站自动化系统中的消息认证方案分析
Utku Tefek, Ertem Esiner, D. Mashima, Yih-Chun Hu
An inevitable consequence of automated control and communication in electric substations is the vulnerability against cyberattacks that compromise the integrity and authenticity of messages. IEC 62351 standard stipulates the use of message authentication solutions, although there is no firm guidance on the exact method to be adopted. The earlier IEC 62351-6:2007 standard recommended the use of digital signatures. However, digital signatures do not meet the timing requirements of IEC 61850 GOOSE and SV. Thus, the recent revisions to IEC 62351–6 backtracked from digital signatures in favor of message authentication code (MAC) algorithms, thereby sacrificing key properties, i.e., scaling well for multiple destinations, easy key distribution and management, public verifiability, and non-repudiation. Following these revisions, tailoring MAC-based algorithms for IEC 61850 message structure has gained traction. Additionally, new message authentication solutions that exploit the small or low entropy messages, such as those in GOOSE and SV, have been proposed to secure time-critical communication. These solutions retain certain key properties of digital signatures within the delay requirements of GOOSE and SV. This paper addresses the key trade-offs and discusses the feasibility of the promising message authentication solutions for IEC 61850 GOOSE and SV. Through their implementation on a low-cost hardware BeagleBoard-X15 we report on the real-world comparison of performance metrics.
变电站自动化控制和通信的一个不可避免的后果是容易受到网络攻击,从而损害信息的完整性和真实性。IEC 62351标准规定了消息身份验证解决方案的使用,尽管对于要采用的确切方法没有明确的指导。早期的IEC 62351-6:2007标准建议使用数字签名。然而,数字签名不符合IEC 61850 GOOSE和SV的时序要求。因此,IEC 62351-6的最新修订从数字签名转向了消息身份验证码(MAC)算法,从而牺牲了密钥属性,即多个目的地的良好扩展、易于密钥分发和管理、公共可验证性和不可否认性。在这些修订之后,为IEC 61850消息结构定制基于mac的算法获得了关注。此外,已经提出了利用小或低熵消息(例如GOOSE和SV中的消息)的新消息身份验证解决方案来保护时间关键型通信。这些解决方案在GOOSE和SV的延迟要求内保留了数字签名的某些关键属性。本文讨论了关键的权衡,并讨论了IEC 61850 GOOSE和SV有前途的消息认证解决方案的可行性。通过它们在低成本硬件BeagleBoard-X15上的实现,我们报告了实际性能指标的比较。
{"title":"Analysis of Message Authentication Solutions for IEC 61850 in Substation Automation Systems","authors":"Utku Tefek, Ertem Esiner, D. Mashima, Yih-Chun Hu","doi":"10.1109/SmartGridComm52983.2022.9961052","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961052","url":null,"abstract":"An inevitable consequence of automated control and communication in electric substations is the vulnerability against cyberattacks that compromise the integrity and authenticity of messages. IEC 62351 standard stipulates the use of message authentication solutions, although there is no firm guidance on the exact method to be adopted. The earlier IEC 62351-6:2007 standard recommended the use of digital signatures. However, digital signatures do not meet the timing requirements of IEC 61850 GOOSE and SV. Thus, the recent revisions to IEC 62351–6 backtracked from digital signatures in favor of message authentication code (MAC) algorithms, thereby sacrificing key properties, i.e., scaling well for multiple destinations, easy key distribution and management, public verifiability, and non-repudiation. Following these revisions, tailoring MAC-based algorithms for IEC 61850 message structure has gained traction. Additionally, new message authentication solutions that exploit the small or low entropy messages, such as those in GOOSE and SV, have been proposed to secure time-critical communication. These solutions retain certain key properties of digital signatures within the delay requirements of GOOSE and SV. This paper addresses the key trade-offs and discusses the feasibility of the promising message authentication solutions for IEC 61850 GOOSE and SV. Through their implementation on a low-cost hardware BeagleBoard-X15 we report on the real-world comparison of performance metrics.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114333831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smart Grid Network Flows Best Practices Checker 智能电网网络流量最佳实践检查器
D. Nicol, Emily Belovich, Atul Bohara
We describe BPC, an open source tool and a library of best-practice rules for configuration of smart grid communication networks and the flows they carry. We describe the kinds of rules BPC presently includes, the format of expressing best-practices rules, the way that BPC performs its evaluation and reporting, and application to a case study from a utility's network.
我们描述了BPC,一个开源工具和一个用于配置智能电网通信网络的最佳实践规则库,以及它们所携带的流程。我们描述了BPC目前包含的规则类型、表示最佳实践规则的格式、BPC执行其评估和报告的方式,以及将其应用于公用事业网络的案例研究。
{"title":"Smart Grid Network Flows Best Practices Checker","authors":"D. Nicol, Emily Belovich, Atul Bohara","doi":"10.1109/SmartGridComm52983.2022.9961056","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961056","url":null,"abstract":"We describe BPC, an open source tool and a library of best-practice rules for configuration of smart grid communication networks and the flows they carry. We describe the kinds of rules BPC presently includes, the format of expressing best-practices rules, the way that BPC performs its evaluation and reporting, and application to a case study from a utility's network.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115675017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Home/Office Energy Management based on Individual Data Analysis through IoT Networks 基于物联网网络个人数据分析的智能家居/办公能源管理
Guangjun Huang, A. Anwar, S. Loke, A. Zaslavsky, Jinho Choi
Sustainable use of energy requires to achieve optimal energy utilization in smart grid systems. It is possible by empowering the Internet of Things (IoT) based Wireless connectivity through real-time energy monitoring and analyses of power consumption patterns. Modeling optimal energy utilization considering multi-user behaviors is particularly challenging in such context. To address the challenge of one-to-one-mapping of energy disaggregation in device-sharing environments by multiple co-existing users, a new method based on data-driven machine learning (e.g., individual energy usage pattern analysis) is proposed in this paper that aims to accurately match the energy consumption of electrical appliances with specific users. In particular, the machine learning model with the best performance is selected for real-time energy/power disaggregation on the local server (i.e., small-scale home/office) to ensure comparable or better performance with state-of-the-art disaggregation algorithms. In addition, energy usage patterns and individual power consumption data are analyzed comprehensively to match overall energy consumption and label datasets by events. Distributed learning is also discussed to exploit other local servers' datasets for better disaggregation through IoT networks. The effectiveness of the proposed method is verified by using simulated datasets in a motivating scenario.
能源的可持续利用要求在智能电网系统中实现最佳的能源利用。通过实时能源监测和功耗模式分析,使基于物联网(IoT)的无线连接成为可能。在这种情况下,考虑多用户行为的最佳能源利用建模尤其具有挑战性。为了解决多个共存用户在设备共享环境中对能源分解进行一对一映射的挑战,本文提出了一种基于数据驱动的机器学习(例如,个人能源使用模式分析)的新方法,旨在将电器的能源消耗与特定用户精确匹配。特别是,在本地服务器(即小型家庭/办公室)上选择具有最佳性能的机器学习模型进行实时能源/电力分解,以确保与最先进的分解算法相当或更好的性能。此外,能源使用模式和个人电力消耗数据进行全面分析,以匹配整体能源消耗和按事件标记数据集。还讨论了分布式学习,以利用其他本地服务器的数据集,通过物联网网络进行更好的分解。通过在激励场景中使用模拟数据集验证了所提方法的有效性。
{"title":"Smart Home/Office Energy Management based on Individual Data Analysis through IoT Networks","authors":"Guangjun Huang, A. Anwar, S. Loke, A. Zaslavsky, Jinho Choi","doi":"10.1109/SmartGridComm52983.2022.9961051","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961051","url":null,"abstract":"Sustainable use of energy requires to achieve optimal energy utilization in smart grid systems. It is possible by empowering the Internet of Things (IoT) based Wireless connectivity through real-time energy monitoring and analyses of power consumption patterns. Modeling optimal energy utilization considering multi-user behaviors is particularly challenging in such context. To address the challenge of one-to-one-mapping of energy disaggregation in device-sharing environments by multiple co-existing users, a new method based on data-driven machine learning (e.g., individual energy usage pattern analysis) is proposed in this paper that aims to accurately match the energy consumption of electrical appliances with specific users. In particular, the machine learning model with the best performance is selected for real-time energy/power disaggregation on the local server (i.e., small-scale home/office) to ensure comparable or better performance with state-of-the-art disaggregation algorithms. In addition, energy usage patterns and individual power consumption data are analyzed comprehensively to match overall energy consumption and label datasets by events. Distributed learning is also discussed to exploit other local servers' datasets for better disaggregation through IoT networks. The effectiveness of the proposed method is verified by using simulated datasets in a motivating scenario.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114409552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Cyber Attacks in Smart Grids with Massive Unlabeled Sensing Data 利用大量未标记传感数据检测智能电网中的网络攻击
Hanyu Zeng, Zhen Wei Ng, Pengfei Zhou, Xin Lou, David K. Y. Yau, M. Winslett
Modern power grids are undergoing significant changes driven by information and communication technologies (ICTs), and evolving into smart grids with higher efficiency and lower operation cost. Using ICTs, however, comes with an inevitable side effect that makes the power system more vulnerable to cyber attacks. In this paper, we propose a self-supervised learning-based framework to detect and identify various types of cyber attacks. Different from existing approaches, the proposed framework does not rely on large amounts of well-curated labeled data but makes use of the massive unlabeled data in the wild which are easily accessible. Specifically, the proposed framework adopts the BERT model from the natural language processing domain and learns generalizable and effective representations from the unlabeled sensing data, which capture the distinctive patterns of different attacks. Using the learned representations, together with a very small amount of labeled data, we can train a task-specific classifier to detect various types of cyber attacks. Experiment results in a 3-area power grid system with 37 buses demonstrate the superior performance of our framework over existing approaches, especially when a very limited amount of labeled data are available. We believe such a framework can be easily adopted to detect a variety of cyber attacks in other power grid scenarios.
在信息通信技术的推动下,现代电网正经历着重大变革,向效率更高、运行成本更低的智能电网发展。然而,使用信息通信技术(ict)也带来了不可避免的副作用,即电力系统更容易受到网络攻击。在本文中,我们提出了一个基于自监督学习的框架来检测和识别各种类型的网络攻击。与现有的方法不同,该框架不依赖于大量精心策划的标记数据,而是利用了大量易于访问的未标记数据。具体而言,该框架采用自然语言处理领域的BERT模型,并从未标记的感知数据中学习可推广的有效表示,从而捕获不同攻击的独特模式。使用学习到的表征,加上非常少量的标记数据,我们可以训练一个特定于任务的分类器来检测各种类型的网络攻击。在具有37个总线的3区电网系统中的实验结果表明,我们的框架优于现有方法,特别是在可用的标记数据数量非常有限的情况下。我们相信,这种框架可以很容易地用于检测其他电网场景中的各种网络攻击。
{"title":"Detecting Cyber Attacks in Smart Grids with Massive Unlabeled Sensing Data","authors":"Hanyu Zeng, Zhen Wei Ng, Pengfei Zhou, Xin Lou, David K. Y. Yau, M. Winslett","doi":"10.1109/SmartGridComm52983.2022.9961017","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961017","url":null,"abstract":"Modern power grids are undergoing significant changes driven by information and communication technologies (ICTs), and evolving into smart grids with higher efficiency and lower operation cost. Using ICTs, however, comes with an inevitable side effect that makes the power system more vulnerable to cyber attacks. In this paper, we propose a self-supervised learning-based framework to detect and identify various types of cyber attacks. Different from existing approaches, the proposed framework does not rely on large amounts of well-curated labeled data but makes use of the massive unlabeled data in the wild which are easily accessible. Specifically, the proposed framework adopts the BERT model from the natural language processing domain and learns generalizable and effective representations from the unlabeled sensing data, which capture the distinctive patterns of different attacks. Using the learned representations, together with a very small amount of labeled data, we can train a task-specific classifier to detect various types of cyber attacks. Experiment results in a 3-area power grid system with 37 buses demonstrate the superior performance of our framework over existing approaches, especially when a very limited amount of labeled data are available. We believe such a framework can be easily adopted to detect a variety of cyber attacks in other power grid scenarios.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123930754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
HA-Grid: Security Aware Hazard Analysis for Smart Grids HA-Grid:智能电网安全意识危害分析
Luca Maria Castiglione, Zhongyuan Hau, Pudong Get, Kenneth T. Co, Luis Muñoz-González, F. Teng, Emil C. Lupu
Attacks targeting smart grid infrastructures can result in the disruptions of power supply as well as damages to costly equipment, with significant impact on safety as well as on end-consumers. It is therefore of essence to identify attack paths in the infrastructure that lead to safety violations and to determine critical components that must be protected. In this paper, we introduce a methodology (HA-Grid) that incorporates both safety and security modelling of smart grid infrastructure to analyse the impact of cyber threats on the safety of smart grid infrastructures. HA-Grid is applied on a smart grid test-bed to identify attack paths that lead to safety hazards, and to determine the common nodes in these attack paths as critical components that must be protected.
针对智能电网基础设施的攻击可能导致电力供应中断以及昂贵设备的损坏,对安全以及最终消费者产生重大影响。因此,在基础设施中识别导致违反安全的攻击路径并确定必须保护的关键组件是至关重要的。在本文中,我们介绍了一种方法(HA-Grid),该方法结合了智能电网基础设施的安全和安全建模,以分析网络威胁对智能电网基础设施安全的影响。HA-Grid应用于智能电网测试平台,用于识别导致安全危害的攻击路径,并确定这些攻击路径中的公共节点作为必须保护的关键组件。
{"title":"HA-Grid: Security Aware Hazard Analysis for Smart Grids","authors":"Luca Maria Castiglione, Zhongyuan Hau, Pudong Get, Kenneth T. Co, Luis Muñoz-González, F. Teng, Emil C. Lupu","doi":"10.1109/SmartGridComm52983.2022.9961003","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961003","url":null,"abstract":"Attacks targeting smart grid infrastructures can result in the disruptions of power supply as well as damages to costly equipment, with significant impact on safety as well as on end-consumers. It is therefore of essence to identify attack paths in the infrastructure that lead to safety violations and to determine critical components that must be protected. In this paper, we introduce a methodology (HA-Grid) that incorporates both safety and security modelling of smart grid infrastructure to analyse the impact of cyber threats on the safety of smart grid infrastructures. HA-Grid is applied on a smart grid test-bed to identify attack paths that lead to safety hazards, and to determine the common nodes in these attack paths as critical components that must be protected.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116221675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning 利用机器学习检测光伏系统中的隐藏攻击者
S. Sourav, P. Biswas, Binbin Chen, D. Mashima
In modern smart grids, the proliferation of communication enabled distributed energy resource (DER) systems has increased the surface of possible cyber-physical attacks. Attacks originating from the distributed edge devices of DER system, such as photovoltaic (PV) system, is often difficult to detect. An attacker may change the control configurations or various setpoints of the PV inverters to destabilize the power grid, damage devices, or for the purpose of economic gain. A more powerful attacker may even manipulate the PV system metering data transmitted for remote monitoring, so that (s)he can remain hidden. In this paper, we consider a case where PV systems operating in different control modes can be simultaneously attacked and the attacker has the ability to manipulate individual PV bus measurements to avoid detection. We show that even in such a scenario, with just the aggregated measurements (that the attacker cannot manipulate), machine learning (ML) techniques are able to detect the attack in a fast and accurate manner. We use a standard radial distribution network, together with real smart home electricity consumption data and solar power data in our experimental setup. We test the performance of several ML algorithms to detect attacks on the PV system. Our detailed evaluations show that the proposed intrusion detection system (IDS) is highly effective and efficient in detecting attacks on PV inverter control modes.
在现代智能电网中,通信支持的分布式能源(DER)系统的扩散增加了可能的网络物理攻击的表面。来自分布式分布式分布式分布式边缘设备(如光伏系统)的攻击往往难以检测。攻击者可以改变光伏逆变器的控制配置或各种设定值,以破坏电网稳定,损坏设备,或以经济利益为目的。更强大的攻击者甚至可以操纵为远程监控而传输的光伏系统计量数据,这样他就可以隐藏起来。在本文中,我们考虑了在不同控制模式下运行的光伏系统可以同时被攻击的情况,攻击者有能力操纵单个PV总线测量以避免被检测。我们表明,即使在这种情况下,仅使用聚合测量(攻击者无法操纵),机器学习(ML)技术也能够以快速准确的方式检测攻击。在我们的实验设置中,我们使用了标准的径向配电网,并结合了真实的智能家居用电量数据和太阳能发电数据。我们测试了几种机器学习算法的性能来检测对PV系统的攻击。我们的详细评估表明,所提出的入侵检测系统(IDS)在检测对光伏逆变器控制模式的攻击方面是非常有效和高效的。
{"title":"Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning","authors":"S. Sourav, P. Biswas, Binbin Chen, D. Mashima","doi":"10.1109/SmartGridComm52983.2022.9960965","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960965","url":null,"abstract":"In modern smart grids, the proliferation of communication enabled distributed energy resource (DER) systems has increased the surface of possible cyber-physical attacks. Attacks originating from the distributed edge devices of DER system, such as photovoltaic (PV) system, is often difficult to detect. An attacker may change the control configurations or various setpoints of the PV inverters to destabilize the power grid, damage devices, or for the purpose of economic gain. A more powerful attacker may even manipulate the PV system metering data transmitted for remote monitoring, so that (s)he can remain hidden. In this paper, we consider a case where PV systems operating in different control modes can be simultaneously attacked and the attacker has the ability to manipulate individual PV bus measurements to avoid detection. We show that even in such a scenario, with just the aggregated measurements (that the attacker cannot manipulate), machine learning (ML) techniques are able to detect the attack in a fast and accurate manner. We use a standard radial distribution network, together with real smart home electricity consumption data and solar power data in our experimental setup. We test the performance of several ML algorithms to detect attacks on the PV system. Our detailed evaluations show that the proposed intrusion detection system (IDS) is highly effective and efficient in detecting attacks on PV inverter control modes.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126809322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Carbon-Aware EV Charging 节能电动汽车充电
Kai-wen Cheng, Yuexin Bian, Yuanyuan Shi, Yize Chen
This paper examines the problem of optimizing the charging pattern of electric vehicles (EV) by taking real-time electricity grid carbon intensity into consideration. The objective of the proposed charging scheme is to minimize the carbon emissions contributed by EV charging events, while simultaneously satisfying constraints posed by EV user's charging schedules, charging station transformer limits, and battery physical constraints. Using real-world EV charging data and California electricity generation records, this paper shows that our carbon-aware real-time charging scheme saves an average of 3.81% of carbon emission while delivering satisfactory amount of energy. Furthermore, by using an adaptive balanced factor, we can reduce 26.00% of carbon emission on average while compromising 12.61% of total energy delivered.
本文研究了考虑实时电网碳强度的电动汽车充电模式优化问题。该充电方案的目标是在满足电动汽车用户充电计划、充电站变压器限制和电池物理约束的同时,最大限度地减少电动汽车充电事件对碳排放的贡献。利用真实的电动汽车充电数据和加利福尼亚州的发电记录,本文表明,我们的碳感知实时充电方案在提供令人满意的能量的同时,平均节省了3.81%的碳排放。此外,通过使用自适应平衡因子,我们可以平均减少26.00%的碳排放,同时减少12.61%的总能源交付。
{"title":"Carbon-Aware EV Charging","authors":"Kai-wen Cheng, Yuexin Bian, Yuanyuan Shi, Yize Chen","doi":"10.1109/SmartGridComm52983.2022.9960988","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960988","url":null,"abstract":"This paper examines the problem of optimizing the charging pattern of electric vehicles (EV) by taking real-time electricity grid carbon intensity into consideration. The objective of the proposed charging scheme is to minimize the carbon emissions contributed by EV charging events, while simultaneously satisfying constraints posed by EV user's charging schedules, charging station transformer limits, and battery physical constraints. Using real-world EV charging data and California electricity generation records, this paper shows that our carbon-aware real-time charging scheme saves an average of 3.81% of carbon emission while delivering satisfactory amount of energy. Furthermore, by using an adaptive balanced factor, we can reduce 26.00% of carbon emission on average while compromising 12.61% of total energy delivered.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129527900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Robust and Explainable Data-Driven Anomaly Detection Approach For Power Electronics 一种鲁棒且可解释的电力电子数据驱动异常检测方法
Alexander Beattie, Pavol Mulinka, Subham S. Sahoo, I. Christou, Charalampos Kalalas, Daniel Gutierrez-Rojas, P. Nardelli
Timely and accurate detection of anomalies in power electronics is becoming increasingly critical for maintaining complex production systems. Robust and explainable strategies help decrease system downtime and preempt or mitigate infrastructure cyberattacks. This work begins by explaining the types of uncertainty present in current datasets and machine learning algorithm outputs. Three techniques for combating these uncertainties are then introduced and analyzed. We further present two anomaly detection and classification approaches, namely the Matrix Profile algorithm and anomaly transformer, which are applied in the context of a power electronic converter dataset. Specifically, the Matrix Profile algorithm is shown to be well suited as a generalizable approach for detecting real-time anomalies in streaming time-series data. The STUMPY python library implementation of the iterative Matrix Profile is used for the creation of the detector. A series of custom filters is created and added to the detector to tune its sensitivity, recall, and detection accuracy. Our numerical results show that, with simple parameter tuning, the detector provides high accuracy and performance in a variety of fault scenarios.
及时准确地检测电力电子设备中的异常对于维护复杂的生产系统变得越来越重要。稳健且可解释的策略有助于减少系统停机时间,抢占或减轻基础设施网络攻击。这项工作首先解释当前数据集和机器学习算法输出中存在的不确定性类型。然后介绍和分析了对抗这些不确定性的三种技术。我们进一步提出了两种异常检测和分类方法,即矩阵轮廓算法和异常变压器,并将其应用于电力电子变流器数据集。具体来说,矩阵轮廓算法被证明非常适合作为一种可推广的方法来检测流时间序列数据中的实时异常。迭代矩阵配置文件的STUMPY python库实现用于创建检测器。创建一系列自定义过滤器并将其添加到检测器中,以调整其灵敏度、召回率和检测准确性。数值结果表明,通过简单的参数调整,该检测器在各种故障场景下都具有较高的精度和性能。
{"title":"A Robust and Explainable Data-Driven Anomaly Detection Approach For Power Electronics","authors":"Alexander Beattie, Pavol Mulinka, Subham S. Sahoo, I. Christou, Charalampos Kalalas, Daniel Gutierrez-Rojas, P. Nardelli","doi":"10.1109/SmartGridComm52983.2022.9961002","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9961002","url":null,"abstract":"Timely and accurate detection of anomalies in power electronics is becoming increasingly critical for maintaining complex production systems. Robust and explainable strategies help decrease system downtime and preempt or mitigate infrastructure cyberattacks. This work begins by explaining the types of uncertainty present in current datasets and machine learning algorithm outputs. Three techniques for combating these uncertainties are then introduced and analyzed. We further present two anomaly detection and classification approaches, namely the Matrix Profile algorithm and anomaly transformer, which are applied in the context of a power electronic converter dataset. Specifically, the Matrix Profile algorithm is shown to be well suited as a generalizable approach for detecting real-time anomalies in streaming time-series data. The STUMPY python library implementation of the iterative Matrix Profile is used for the creation of the detector. A series of custom filters is created and added to the detector to tune its sensitivity, recall, and detection accuracy. Our numerical results show that, with simple parameter tuning, the detector provides high accuracy and performance in a variety of fault scenarios.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125768459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Insurance Contract for High Renewable Energy Integration 高可再生能源整合保险合同
Dongwei Zhao, Hao Wang, Jianwei Huang, Xiaojun Lin
The increasing penetration of renewable energy poses significant challenges to power grid reliability. There have been increasing interests in utilizing financial tools, such as insurance, to help end-users hedge the potential risk of lost load due to renewable energy variability. With insurance, a user pays a premium fee to the utility, so that he will get compensated in case his demand is not fully satisfied. A proper insurance design needs to resolve the following two challenges: (i) users' reliability preference is private information; and (ii) the insurance design is tightly coupled with the renewable energy investment decision. To address these challenges, we adopt the contract theory to elicit users' private reliability preferences, and we study how the utility can jointly optimize the insurance contract and the planning of renewable energy. A key analytical challenge is that the joint optimization of the insurance design and the planning of renewables is non-convex. We resolve this difficulty by revealing important structural properties of the optimal solution, using the help of two benchmark problems: the no-insurance benchmark and the social-optimum benchmark. Compared with the no-insurance benchmark, we prove that the social cost and users' total energy cost are always no larger under the optimal contract. Simulation results show that the largest benefit of the insurance contract is achieved at a medium electricity-bill price together with a low type heterogeneity and a high renewable uncertainty.
可再生能源的日益普及对电网的可靠性提出了重大挑战。人们对利用保险等金融工具来帮助最终用户对冲因可再生能源变化而导致的潜在负荷损失风险的兴趣越来越大。有了保险,用户向公用事业公司支付保险费,这样如果他的需求没有得到充分满足,他就会得到补偿。一个合适的保险设计需要解决以下两个挑战:(1)用户的可靠性偏好是隐私信息;(2)保险设计与可再生能源投资决策紧密耦合。为了解决这些问题,我们采用契约理论来引出用户的私人可靠性偏好,并研究了公用事业公司如何共同优化保险合同和可再生能源规划。一个关键的分析挑战是,保险设计和可再生能源规划的联合优化是非凸的。我们利用两个基准问题:无保险基准和社会最优基准,揭示了最优解的重要结构性质,从而解决了这一困难。通过与无保险基准的比较,证明了在最优契约下,社会成本和用户总能源成本始终不大于无保险基准。仿真结果表明,在中等电价、低类型异质性和高可再生不确定性条件下,保险合同的最大效益能够实现。
{"title":"Insurance Contract for High Renewable Energy Integration","authors":"Dongwei Zhao, Hao Wang, Jianwei Huang, Xiaojun Lin","doi":"10.1109/SmartGridComm52983.2022.9960994","DOIUrl":"https://doi.org/10.1109/SmartGridComm52983.2022.9960994","url":null,"abstract":"The increasing penetration of renewable energy poses significant challenges to power grid reliability. There have been increasing interests in utilizing financial tools, such as insurance, to help end-users hedge the potential risk of lost load due to renewable energy variability. With insurance, a user pays a premium fee to the utility, so that he will get compensated in case his demand is not fully satisfied. A proper insurance design needs to resolve the following two challenges: (i) users' reliability preference is private information; and (ii) the insurance design is tightly coupled with the renewable energy investment decision. To address these challenges, we adopt the contract theory to elicit users' private reliability preferences, and we study how the utility can jointly optimize the insurance contract and the planning of renewable energy. A key analytical challenge is that the joint optimization of the insurance design and the planning of renewables is non-convex. We resolve this difficulty by revealing important structural properties of the optimal solution, using the help of two benchmark problems: the no-insurance benchmark and the social-optimum benchmark. Compared with the no-insurance benchmark, we prove that the social cost and users' total energy cost are always no larger under the optimal contract. Simulation results show that the largest benefit of the insurance contract is achieved at a medium electricity-bill price together with a low type heterogeneity and a high renewable uncertainty.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127177027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1