首页 > 最新文献

2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)最新文献

英文 中文
SmartGridComm 2019 Program & Papers SmartGridComm 2019程序和论文
{"title":"SmartGridComm 2019 Program & Papers","authors":"","doi":"10.1109/smartgridcomm.2019.8909737","DOIUrl":"https://doi.org/10.1109/smartgridcomm.2019.8909737","url":null,"abstract":"","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116827562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Control of Electric Vehicle Smart Charging for Cost Minimization Considering Temperature and Battery Health 考虑温度和电池健康的成本最小化电动汽车智能充电分散控制
Yassir Dahmane, M. Ghanes, R. Chenouard, Mario Alvarado-Ruiz
A decentralized optimal control strategy for one electric vehicle is proposed to minimize the charging cost and maximize the customer’s profit while considering the temperature effect on lithium-ion batteries. To achieve this, we propose a smart bidirectional charging algorithm that exploits the grid to vehicle and vehicle to grid concepts. The decentralized smart charging algorithm takes into account the daily energy price, electric vehicle information, customer needs, the outside air temperature and the temperature of the battery, in order to formulate and solve a non-linear constrained optimization problem. The algorithm is tested over several different scenarios considering a daily energy price profile in France. The results obtained show a great efficiency of the decentralized algorithm and significant charging cost reduction compared to the uncontrolled charging.
考虑温度对锂离子电池的影响,提出了一种单辆电动汽车的分散最优控制策略,使充电成本最小,客户利润最大化。为了实现这一目标,我们提出了一种智能双向充电算法,该算法利用了电网对车辆和车辆对电网的概念。分布式智能充电算法考虑了日常能源价格、电动汽车信息、客户需求、外部空气温度和电池温度等因素,制定并求解了一个非线性约束优化问题。该算法在考虑法国每日能源价格概况的几个不同场景下进行了测试。结果表明,与不受控制的充电相比,分散充电算法效率高,充电成本显著降低。
{"title":"Decentralized Control of Electric Vehicle Smart Charging for Cost Minimization Considering Temperature and Battery Health","authors":"Yassir Dahmane, M. Ghanes, R. Chenouard, Mario Alvarado-Ruiz","doi":"10.1109/SmartGridComm.2019.8909796","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909796","url":null,"abstract":"A decentralized optimal control strategy for one electric vehicle is proposed to minimize the charging cost and maximize the customer’s profit while considering the temperature effect on lithium-ion batteries. To achieve this, we propose a smart bidirectional charging algorithm that exploits the grid to vehicle and vehicle to grid concepts. The decentralized smart charging algorithm takes into account the daily energy price, electric vehicle information, customer needs, the outside air temperature and the temperature of the battery, in order to formulate and solve a non-linear constrained optimization problem. The algorithm is tested over several different scenarios considering a daily energy price profile in France. The results obtained show a great efficiency of the decentralized algorithm and significant charging cost reduction compared to the uncontrolled charging.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122247233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Traction substation power signal characteristics and transient power quality evaluation method 牵引变电所电力信号特征及暂态电能质量评价方法
Wenli Chen, Kaitao Peng, C. Yang, Yao Wang, Zhihong Fu
The electric locomotive operation leads to complex nonlinear dynamic characteristics of the power signal of the traction substation, which makes the calculation of the power quality index based on the steady state signal processing technology have large errors. Therefore, based on power systems computer aided design/electromagnetic transients including DC (PSCAD/EMTDC), the simulation model of common electric locomotive converter is built. The characteristics of traction substation power signal are analyzed and compared with the measured power signal. The internal relationship between the line impedance change of traction electric multiple units (EMU) and grid signal fluctuation is analyzed. Finally, some transient power quality evaluation methods are proposed, and the instantaneous normalized distortion energy index (INDEI) is used to evaluate the transient power quality of the measured power signals. This index can accurately identify the signal jumping type and help to improve the reliability of dynamic load power quality analysis.
电力机车运行导致牵引变电所电力信号具有复杂的非线性动态特性,使得基于稳态信号处理技术的电能质量指标计算存在较大误差。因此,基于电力系统计算机辅助设计/包括直流在内的电磁暂态(PSCAD/EMTDC),建立了普通电力机车变换器的仿真模型。分析了牵引变电所电力信号的特点,并与实测电力信号进行了比较。分析了动车组线路阻抗变化与电网信号波动之间的内在关系。最后,提出了几种暂态电能质量评价方法,并采用瞬时归一化失真能量指数(INDEI)来评价实测电能信号的暂态电能质量。该指标能准确识别信号跳变类型,有助于提高动态负载电能质量分析的可靠性。
{"title":"Traction substation power signal characteristics and transient power quality evaluation method","authors":"Wenli Chen, Kaitao Peng, C. Yang, Yao Wang, Zhihong Fu","doi":"10.1109/SmartGridComm.2019.8909782","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909782","url":null,"abstract":"The electric locomotive operation leads to complex nonlinear dynamic characteristics of the power signal of the traction substation, which makes the calculation of the power quality index based on the steady state signal processing technology have large errors. Therefore, based on power systems computer aided design/electromagnetic transients including DC (PSCAD/EMTDC), the simulation model of common electric locomotive converter is built. The characteristics of traction substation power signal are analyzed and compared with the measured power signal. The internal relationship between the line impedance change of traction electric multiple units (EMU) and grid signal fluctuation is analyzed. Finally, some transient power quality evaluation methods are proposed, and the instantaneous normalized distortion energy index (INDEI) is used to evaluate the transient power quality of the measured power signals. This index can accurately identify the signal jumping type and help to improve the reliability of dynamic load power quality analysis.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preventing False Tripping Cyberattacks Against Distance Relays: A Deep Learning Approach 防止对距离继电器的误跳闸网络攻击:一种深度学习方法
Yew Meng Khaw, A. Jahromi, M. Arani, D. Kundur, S. Sanner, Marthe Kassouf
The false tripping of circuit breakers initiated by cyberattacks on protective relays is a growing concern in power systems. This is of high importance because multiple false equipment tripping initiated by coordinated cyberattacks on protective relays can cause large scale disturbance in power systems and potentially lead to cascading failures and blackouts. In this paper, a deep learning based autoencoder is employed to identify anomalous voltage and current data injection to distance protection relays. The autoencoder is first trained with current and voltage data sets representing three-phase faults in zone 1 of a distance relay using a benchmark test system. The autoencoder is then employed to identify anomalies in voltage and current data to prevent false tripping commands by the distance relay. The simulation results verify the capability of the autoencoder model to extract signatures of three-phase faults in the intended zone of a protective relay and detect three-phase fault current and voltage data that do not contain these signatures with high accuracy.
在电力系统中,由网络攻击引起的断路器误跳闸问题日益受到关注。这一点非常重要,因为通过对保护继电器的协同网络攻击引发的多次假设备跳闸可能会对电力系统造成大规模干扰,并可能导致级联故障和停电。本文采用一种基于深度学习的自编码器来识别距离保护继电器中注入的异常电压和电流数据。自动编码器首先使用基准测试系统对代表距离继电器1区三相故障的电流和电压数据集进行训练。然后使用自动编码器识别电压和电流数据中的异常情况,以防止距离继电器的误跳闸命令。仿真结果验证了自编码器模型提取保护继电器预定区域三相故障特征的能力,并以较高的精度检测不包含这些特征的三相故障电流和电压数据。
{"title":"Preventing False Tripping Cyberattacks Against Distance Relays: A Deep Learning Approach","authors":"Yew Meng Khaw, A. Jahromi, M. Arani, D. Kundur, S. Sanner, Marthe Kassouf","doi":"10.1109/SmartGridComm.2019.8909810","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909810","url":null,"abstract":"The false tripping of circuit breakers initiated by cyberattacks on protective relays is a growing concern in power systems. This is of high importance because multiple false equipment tripping initiated by coordinated cyberattacks on protective relays can cause large scale disturbance in power systems and potentially lead to cascading failures and blackouts. In this paper, a deep learning based autoencoder is employed to identify anomalous voltage and current data injection to distance protection relays. The autoencoder is first trained with current and voltage data sets representing three-phase faults in zone 1 of a distance relay using a benchmark test system. The autoencoder is then employed to identify anomalies in voltage and current data to prevent false tripping commands by the distance relay. The simulation results verify the capability of the autoencoder model to extract signatures of three-phase faults in the intended zone of a protective relay and detect three-phase fault current and voltage data that do not contain these signatures with high accuracy.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132823490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Semantic-Based Detection Architectures Against Monitoring-Control Attacks in Power Grids 基于语义的电网监控攻击检测体系
Gonzalo E. Constante, C. Moya, Jiankang Wang
The modernization of power grids is depending significantly on Information and Communication Technologies, which increases the vulnerability to cyber-attacks. Particularly, Monitoring-Control Attacks (MCA), attacks that manipulate control decisions by fabricating measurements in the feedback loop, are highly threatening. To defend against MCAs, we propose a semantic analysis framework to be implemented in complement to IDS by identifying the adversary’s intention using power grid contextual information. In addition, the framework identifies critical substations for planning protection. The proposed framework can be implemented in three architectures, namely, centralized, hierarchical, and distributed. The effectiveness of the proposed work is demonstrated on the New England IEEE 39 Bus system.
电网的现代化在很大程度上依赖于信息和通信技术,这增加了对网络攻击的脆弱性。特别是,监视控制攻击(MCA),通过在反馈回路中制造测量来操纵控制决策的攻击,具有很高的威胁性。为了防御MCAs,我们提出了一个语义分析框架,通过使用电网上下文信息识别对手的意图,作为IDS的补充。此外,该框架确定了需要规划保护的关键变电站。该框架可以采用集中式、分层式和分布式三种架构实现。在新英格兰IEEE 39总线系统上验证了所提工作的有效性。
{"title":"Semantic-Based Detection Architectures Against Monitoring-Control Attacks in Power Grids","authors":"Gonzalo E. Constante, C. Moya, Jiankang Wang","doi":"10.1109/SmartGridComm.2019.8909721","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909721","url":null,"abstract":"The modernization of power grids is depending significantly on Information and Communication Technologies, which increases the vulnerability to cyber-attacks. Particularly, Monitoring-Control Attacks (MCA), attacks that manipulate control decisions by fabricating measurements in the feedback loop, are highly threatening. To defend against MCAs, we propose a semantic analysis framework to be implemented in complement to IDS by identifying the adversary’s intention using power grid contextual information. In addition, the framework identifies critical substations for planning protection. The proposed framework can be implemented in three architectures, namely, centralized, hierarchical, and distributed. The effectiveness of the proposed work is demonstrated on the New England IEEE 39 Bus system.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122227539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid F-Pro:一种快速灵活的智能电网源感知消息认证方案
Ertem Esiner, D. Mashima, Binbin Chen, Z. Kalbarczyk, D. Nicol
Successful attacks against smart grid systems often exploited the insufficiency of checking mechanisms — e.g., commands are largely executed without checking whether they are issued by the legitimate source and whether they are transmitted through the right network path and hence undergone all necessary mediations and scrutinizes. While adding such enhanced security checking into smart grid systems will significantly raise the bar for attackers, there are two key challenges: 1) the need for real-time, and 2) the need for flexibility — i.e., the scheme needs to be applicable to different deployment settings/communication models and counter various types of attacks. In this work, we design and implement F-Pro, a transparent, bump-in-the-wire solution for fast and flexible message authentication scheme that addresses both challenges. Specifically, by using a lightweight hash-chaining-based scheme that supports provenance verification, F-Pro achieves less than 2 milliseconds end-to-end proving and verifying delay for a single or 2-hop communication in a variety of smart grid communication models, when implemented on a low-cost BeagleBoard-X15 platform.
针对智能电网系统的成功攻击往往利用了检查机制的不足——例如,命令在执行时大部分没有检查它们是否由合法来源发出,以及它们是否通过正确的网络路径传输,因此经历了所有必要的中介和审查。虽然将这种增强的安全检查添加到智能电网系统将大大提高攻击者的门槛,但存在两个关键挑战:1)对实时性的需求;2)对灵活性的需求——即,该方案需要适用于不同的部署设置/通信模型,并应对各种类型的攻击。在这项工作中,我们设计并实现了F-Pro,这是一种透明的、在线碰撞的解决方案,用于快速灵活的消息身份验证方案,解决了这两个挑战。具体来说,通过使用支持来源验证的轻量级哈希链方案,F-Pro在低成本BeagleBoard-X15平台上实现时,可以在各种智能电网通信模型中实现不到2毫秒的单跳或2跳通信端到端验证和验证延迟。
{"title":"F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid","authors":"Ertem Esiner, D. Mashima, Binbin Chen, Z. Kalbarczyk, D. Nicol","doi":"10.1109/SmartGridComm.2019.8909712","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909712","url":null,"abstract":"Successful attacks against smart grid systems often exploited the insufficiency of checking mechanisms — e.g., commands are largely executed without checking whether they are issued by the legitimate source and whether they are transmitted through the right network path and hence undergone all necessary mediations and scrutinizes. While adding such enhanced security checking into smart grid systems will significantly raise the bar for attackers, there are two key challenges: 1) the need for real-time, and 2) the need for flexibility — i.e., the scheme needs to be applicable to different deployment settings/communication models and counter various types of attacks. In this work, we design and implement F-Pro, a transparent, bump-in-the-wire solution for fast and flexible message authentication scheme that addresses both challenges. Specifically, by using a lightweight hash-chaining-based scheme that supports provenance verification, F-Pro achieves less than 2 milliseconds end-to-end proving and verifying delay for a single or 2-hop communication in a variety of smart grid communication models, when implemented on a low-cost BeagleBoard-X15 platform.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123634903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Grouping-Based Extended Discontinuous Reception with Adjustable eDRX Cycles for Smart Grid 基于分组的可调eDRX周期扩展不连续接收智能电网
Xiang Fan, Qing-Sheng Hu, Guo Cao
This paper investigates a grouping-based extended discontinuous reception (eDRX) scheme for smart grid in order to save energy efficiently. By dividing users into different groups and assigning them different eDRX parameters, each group can employ appropriate cycle of themselves and only respond in this cycle rather than work in the whole time. Based on a semi- Markov model, the proposed eDRX process has been simulated and compared with standard DRX from the aspects of power saving factor and wake-up delay. Simulation results show that our scheme outperforms standard DRX in many cases, and a good tradeoff between power saving factor and wake-up delay should be considered properly for practical applications.
本文研究了一种基于分组的智能电网扩展不连续接收(eDRX)方案,以达到高效节能的目的。通过将用户划分为不同的组,并为其分配不同的eDRX参数,每个组可以使用适当的自己的周期,只在该周期内响应,而不是在整个时间内工作。基于半马尔可夫模型,对所提出的eDRX过程进行了仿真,并从省电系数和唤醒延迟两方面与标准DRX进行了比较。仿真结果表明,该方案在许多情况下都优于标准DRX,在实际应用中应适当考虑节能系数和唤醒延迟之间的权衡。
{"title":"Grouping-Based Extended Discontinuous Reception with Adjustable eDRX Cycles for Smart Grid","authors":"Xiang Fan, Qing-Sheng Hu, Guo Cao","doi":"10.1109/SmartGridComm.2019.8909750","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909750","url":null,"abstract":"This paper investigates a grouping-based extended discontinuous reception (eDRX) scheme for smart grid in order to save energy efficiently. By dividing users into different groups and assigning them different eDRX parameters, each group can employ appropriate cycle of themselves and only respond in this cycle rather than work in the whole time. Based on a semi- Markov model, the proposed eDRX process has been simulated and compared with standard DRX from the aspects of power saving factor and wake-up delay. Simulation results show that our scheme outperforms standard DRX in many cases, and a good tradeoff between power saving factor and wake-up delay should be considered properly for practical applications.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122297820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PAVED: Perturbation Analysis for Verification of Energy Data 铺:能量数据验证的摄动分析
Megan Culler, K. Davis, A. Sahu
Sensor integrity is arguably the most critical feature to protect in cyber-physical systems. Since power systems are cyber-physical systems with ubiquitous sensors that monitor and protect the grid, data must be trustworthy. Process safety and control decisions ultimately depend on data. The focus of this paper is how to design and apply perturbation based detection for sensor verification, under full AC unobservable false data injection (AU-FDI) attacks, by combining an active probing strategy with cyber-side data based on the cyber-physical situational awareness model CyPSA. A case study on a cyber-physical eight substation model is presented, where we construct an AU-FDI attack and introduce our probing-based detection solution and evaluate it with varying probe signals, values, and locations. Results demonstrate how sensor data in power systems can be systematically authenticated using perturbation-based techniques and how different perturbation types and locations affect the results. The case study then demonstrates the improvements to verification by using both physical and cyber data, as CyPSA provides risk prioritization in the form of authenticity weight measure of the sensors, for enhancing the security of power systems from a cyber-physical point of view.
传感器完整性可以说是网络物理系统中需要保护的最关键特征。由于电力系统是网络物理系统,具有无处不在的传感器来监控和保护电网,因此数据必须是可信的。过程安全和控制决策最终取决于数据。本文的重点是如何设计和应用基于微扰检测的传感器验证,在全交流不可观察的假数据注入(AU-FDI)攻击下,通过基于网络物理态势感知模型CyPSA的主动探测策略与网络侧数据相结合。本文提出了一个网络物理八变电站模型的案例研究,其中我们构建了一个AU-FDI攻击,并介绍了我们基于探测的检测解决方案,并用不同的探测信号、值和位置对其进行评估。结果展示了如何使用基于微扰的技术系统地验证电力系统中的传感器数据,以及不同的微扰类型和位置如何影响结果。案例研究随后展示了通过使用物理和网络数据对验证的改进,因为CyPSA以传感器的真实性权重度量的形式提供风险优先级,从网络物理的角度增强了电力系统的安全性。
{"title":"PAVED: Perturbation Analysis for Verification of Energy Data","authors":"Megan Culler, K. Davis, A. Sahu","doi":"10.1109/SmartGridComm.2019.8909800","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909800","url":null,"abstract":"Sensor integrity is arguably the most critical feature to protect in cyber-physical systems. Since power systems are cyber-physical systems with ubiquitous sensors that monitor and protect the grid, data must be trustworthy. Process safety and control decisions ultimately depend on data. The focus of this paper is how to design and apply perturbation based detection for sensor verification, under full AC unobservable false data injection (AU-FDI) attacks, by combining an active probing strategy with cyber-side data based on the cyber-physical situational awareness model CyPSA. A case study on a cyber-physical eight substation model is presented, where we construct an AU-FDI attack and introduce our probing-based detection solution and evaluate it with varying probe signals, values, and locations. Results demonstrate how sensor data in power systems can be systematically authenticated using perturbation-based techniques and how different perturbation types and locations affect the results. The case study then demonstrates the improvements to verification by using both physical and cyber data, as CyPSA provides risk prioritization in the form of authenticity weight measure of the sensors, for enhancing the security of power systems from a cyber-physical point of view.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130365742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CAPTAR: Causal-Polytree-based Anomaly Reasoning for SCADA Networks CAPTAR:基于因果多树的SCADA网络异常推理
Wenyu Ren, Tuo Yu, Timothy M. Yardley, K. Nahrstedt
The Supervisory Control and Data Acquisition (SCADA) system is the most commonly used industrial control system but is subject to a wide range of serious threats. Intrusion detection systems are deployed to promote the security of SCADA systems, but they continuously generate tremendous number of alerts without further comprehending them. There is a need for an efficient system to correlate alerts and discover attack strategies to provide explainable situational awareness to SCADA operators. In this paper, we present a causal-polytree-based anomaly reasoning framework for SCADA networks, named CAPTAR. CAPTAR takes the meta-alerts from our previous anomaly detection framework EDMAND, correlates the them using a naive Bayes classifier, and matches them to predefined causal polytrees. Utilizing Bayesian inference on the causal polytrees, CAPTAR can produces a high-level view of the security state of the protected SCADA network. Experiments on a prototype of CAPTAR proves its anomaly reasoning ability and its capabilities of satisfying the real-time reasoning requirement.
监控和数据采集(SCADA)系统是最常用的工业控制系统,但受到各种严重威胁。入侵检测系统是为了提高SCADA系统的安全性而部署的,但入侵检测系统不断产生大量的警报,而对这些警报却没有深入的了解。需要一个有效的系统来关联警报和发现攻击策略,为SCADA操作员提供可解释的态势感知。在本文中,我们提出了一个基于因果多树的SCADA网络异常推理框架,名为CAPTAR。CAPTAR从我们之前的异常检测框架EDMAND中获取元警报,使用朴素贝叶斯分类器将它们关联起来,并将它们与预定义的因果多树相匹配。利用因果多树上的贝叶斯推理,CAPTAR可以生成受保护的SCADA网络安全状态的高级视图。在CAPTAR原型机上的实验证明了其异常推理能力和满足实时推理要求的能力。
{"title":"CAPTAR: Causal-Polytree-based Anomaly Reasoning for SCADA Networks","authors":"Wenyu Ren, Tuo Yu, Timothy M. Yardley, K. Nahrstedt","doi":"10.1109/SmartGridComm.2019.8909766","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909766","url":null,"abstract":"The Supervisory Control and Data Acquisition (SCADA) system is the most commonly used industrial control system but is subject to a wide range of serious threats. Intrusion detection systems are deployed to promote the security of SCADA systems, but they continuously generate tremendous number of alerts without further comprehending them. There is a need for an efficient system to correlate alerts and discover attack strategies to provide explainable situational awareness to SCADA operators. In this paper, we present a causal-polytree-based anomaly reasoning framework for SCADA networks, named CAPTAR. CAPTAR takes the meta-alerts from our previous anomaly detection framework EDMAND, correlates the them using a naive Bayes classifier, and matches them to predefined causal polytrees. Utilizing Bayesian inference on the causal polytrees, CAPTAR can produces a high-level view of the security state of the protected SCADA network. Experiments on a prototype of CAPTAR proves its anomaly reasoning ability and its capabilities of satisfying the real-time reasoning requirement.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128279311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Energy Trading with Demand Response in a Community-based P2P Energy Market 基于社区的P2P能源市场中需求响应的能源交易
Min Zhang, F. Eliassen, Amirhosein Taherkordi, H. Jacobsen, Hwei-Ming Chung, Yan Zhang
Peer-to-peer (P2P) energy trading among neighbouring prosumers is considered as a promising trading method for the future smart grid. Demand response management becomes a critical challenge due to increased penetration of renewable energy. Earlier work mostly considers P2P trading models with only prosumers, while we believe there will still be a role to play for electricity suppliers in local energy markets in the foreseeable future. This paper therefore proposes a trading model in a community based P2P electric energy market that includes local energy suppliers and a community coordinator as market participants, in addition to pure energy consumers, and prosumers. We develop a demand response mechanism for the proposed trading model, in which dynamic pricing for suppliers is used. The community coordinator negotiates with suppliers on the external energy price and trades with them on behalf of the households within the P2P energy market. In our proposed trading model, the behaviour of the suppliers and the community households are modelled as two non-cooperative games. We propose a distributed algorithm to determine the equilibrium of the games. Simulation results show that our model has great effect on reducing the net peak load and increasing the market participants’ profit. Additionally, the proposed mechanism is shown to act as an efficient incentive for pure energy consumers to become prosumers.
邻近产消用户之间的点对点(P2P)能源交易被认为是未来智能电网的一种有前途的交易方式。由于可再生能源的日益普及,需求响应管理成为一个严峻的挑战。早期的工作主要考虑的是只有产消费者的P2P交易模式,而我们相信在可预见的未来,电力供应商在当地能源市场仍将发挥作用。因此,本文提出了一种基于社区的P2P电力能源市场交易模型,该模型除了纯能源消费者和产消者外,还包括当地能源供应商和社区协调者作为市场参与者。我们为提议的交易模型开发了需求响应机制,其中使用了供应商的动态定价。社区协调员与供应商就外部能源价格进行协商,并在P2P能源市场中代表住户与供应商进行交易。在我们提出的交易模型中,供应商和社区家庭的行为被建模为两个非合作博弈。我们提出了一种分布式算法来确定博弈的均衡。仿真结果表明,该模型对降低净高峰负荷和提高市场参与者的利润具有显著的效果。此外,所提出的机制被证明是一个有效的激励纯能源消费者成为产消者。
{"title":"Energy Trading with Demand Response in a Community-based P2P Energy Market","authors":"Min Zhang, F. Eliassen, Amirhosein Taherkordi, H. Jacobsen, Hwei-Ming Chung, Yan Zhang","doi":"10.1109/SmartGridComm.2019.8909798","DOIUrl":"https://doi.org/10.1109/SmartGridComm.2019.8909798","url":null,"abstract":"Peer-to-peer (P2P) energy trading among neighbouring prosumers is considered as a promising trading method for the future smart grid. Demand response management becomes a critical challenge due to increased penetration of renewable energy. Earlier work mostly considers P2P trading models with only prosumers, while we believe there will still be a role to play for electricity suppliers in local energy markets in the foreseeable future. This paper therefore proposes a trading model in a community based P2P electric energy market that includes local energy suppliers and a community coordinator as market participants, in addition to pure energy consumers, and prosumers. We develop a demand response mechanism for the proposed trading model, in which dynamic pricing for suppliers is used. The community coordinator negotiates with suppliers on the external energy price and trades with them on behalf of the households within the P2P energy market. In our proposed trading model, the behaviour of the suppliers and the community households are modelled as two non-cooperative games. We propose a distributed algorithm to determine the equilibrium of the games. Simulation results show that our model has great effect on reducing the net peak load and increasing the market participants’ profit. Additionally, the proposed mechanism is shown to act as an efficient incentive for pure energy consumers to become prosumers.","PeriodicalId":377150,"journal":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124063518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
期刊
2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1