首页 > 最新文献

2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)最新文献

英文 中文
Low-complexity Risk-averse MPC for EMS EMS的低复杂性风险规避MPC
J. Maree, S. Gros, Venkatachalam Lakshmanan
A data-driven stochastic MPC strategy is presented as an EMS for the Skagerak Energilab microgrid. Uncertainties, introduced due to the intermittent nature of RES and load demands, are systematically incorporated into the MPC problem via adaptive chance-constraints. These chance-constraints promote admissible probabilistic operation of the microgrid within the stipulated SOC bounds of an ESS. For computational tractability, these chance-constraints are approximated by solving the inverse cumulative distribution function of a disturbance innovation sequence. This disturbance innovation sequence defines the difference between forecast and realized disturbances, and is sampled for a sliding window as disturbances are revealed over closed-loop operation. No a-prior assumptions are made on the distribution function of the disturbance innovation sequence; instead, solving the Maximum Spacings Estimation problem (off-line), we adapt some parametrized distribution function to fit this disturbance innovation sequence. The proposed strategy has computational complexity comparable to nominal deterministic MPC, promote the satisfaction of constraints in a probabilistic sense, and, decrease closed-loop operational costs by 26%.
数据驱动的随机MPC策略作为Skagerak Energilab微电网的EMS提出。由于RES和负载需求的间歇性而引入的不确定性,通过自适应机会约束系统地纳入MPC问题。这些机会约束促进了微电网在ESS规定的SOC范围内的可接受概率运行。为了计算的可追溯性,这些机会约束通过求解扰动创新序列的逆累积分布函数来逼近。该扰动创新序列定义了预测扰动与实现扰动之间的差异,并在闭环操作中显示扰动时对滑动窗口进行采样。对扰动创新序列的分布函数不作先验假设;为了解决最大间距估计问题(离线),我们采用一些参数化分布函数来拟合该扰动创新序列。该策略的计算复杂度与名义确定性MPC相当,在概率意义上提高了约束的满足程度,并将闭环运行成本降低了26%。
{"title":"Low-complexity Risk-averse MPC for EMS","authors":"J. Maree, S. Gros, Venkatachalam Lakshmanan","doi":"10.1109/SmartGridComm51999.2021.9632329","DOIUrl":"https://doi.org/10.1109/SmartGridComm51999.2021.9632329","url":null,"abstract":"A data-driven stochastic MPC strategy is presented as an EMS for the Skagerak Energilab microgrid. Uncertainties, introduced due to the intermittent nature of RES and load demands, are systematically incorporated into the MPC problem via adaptive chance-constraints. These chance-constraints promote admissible probabilistic operation of the microgrid within the stipulated SOC bounds of an ESS. For computational tractability, these chance-constraints are approximated by solving the inverse cumulative distribution function of a disturbance innovation sequence. This disturbance innovation sequence defines the difference between forecast and realized disturbances, and is sampled for a sliding window as disturbances are revealed over closed-loop operation. No a-prior assumptions are made on the distribution function of the disturbance innovation sequence; instead, solving the Maximum Spacings Estimation problem (off-line), we adapt some parametrized distribution function to fit this disturbance innovation sequence. The proposed strategy has computational complexity comparable to nominal deterministic MPC, promote the satisfaction of constraints in a probabilistic sense, and, decrease closed-loop operational costs by 26%.","PeriodicalId":378884,"journal":{"name":"2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"40 20","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113974795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defense against Power System Time Delay Attacks via Attention-based Multivariate Deep Learning 基于注意力的多变量深度学习防御电力系统时延攻击
Shahram Ghahremani, Rajvir Sidhu, David K. Y. Yau, Ngai-Man Cheung, Justin Albrethsen
Time delay attacks pose a threat to power systems that conventional cybersecurity methods do not adequately address. Conventional methods analyze the contents of network packets to identify threats; this is not effective against time delay attacks, which do not alter packet contents. To detect and identify time delay attacks, a new method is needed. In this paper, a novel and data-driven deep learning (DL) approach is developed to detect time delay attacks on power systems and simultaneously identify both the time of attack and attack magnitude. While conventional DL networks struggle with multivariate long time series data generated by power systems, this can be improved using attention mechanisms. In this paper, dual attention mechanisms (DA) are used to focus and improve a gated recurrent unit (GRU) network for detecting and identifying time delay attacks. A comparative analysis shows the proposed GRU-DA approach outperforms conventional DL, machine learning (ML), and statistical methods while maintaining low model complexity.
延时攻击对电力系统构成威胁,这是传统网络安全方法无法充分解决的问题。传统的方法是通过分析网络数据包的内容来识别威胁;这对于不改变包内容的延时攻击是无效的。为了检测和识别延时攻击,需要一种新的方法。本文提出了一种新的数据驱动的深度学习方法,用于检测电力系统的时延攻击,并同时识别攻击时间和攻击幅度。虽然传统的深度学习网络难以处理电力系统生成的多变量长时间序列数据,但可以使用注意力机制来改进这一点。本文采用双注意机制(dual attention mechanism, DA)对门控循环单元(GRU)网络进行关注和改进,用于检测和识别时延攻击。对比分析表明,提出的GRU-DA方法优于传统的深度学习、机器学习(ML)和统计方法,同时保持较低的模型复杂性。
{"title":"Defense against Power System Time Delay Attacks via Attention-based Multivariate Deep Learning","authors":"Shahram Ghahremani, Rajvir Sidhu, David K. Y. Yau, Ngai-Man Cheung, Justin Albrethsen","doi":"10.1109/SmartGridComm51999.2021.9632305","DOIUrl":"https://doi.org/10.1109/SmartGridComm51999.2021.9632305","url":null,"abstract":"Time delay attacks pose a threat to power systems that conventional cybersecurity methods do not adequately address. Conventional methods analyze the contents of network packets to identify threats; this is not effective against time delay attacks, which do not alter packet contents. To detect and identify time delay attacks, a new method is needed. In this paper, a novel and data-driven deep learning (DL) approach is developed to detect time delay attacks on power systems and simultaneously identify both the time of attack and attack magnitude. While conventional DL networks struggle with multivariate long time series data generated by power systems, this can be improved using attention mechanisms. In this paper, dual attention mechanisms (DA) are used to focus and improve a gated recurrent unit (GRU) network for detecting and identifying time delay attacks. A comparative analysis shows the proposed GRU-DA approach outperforms conventional DL, machine learning (ML), and statistical methods while maintaining low model complexity.","PeriodicalId":378884,"journal":{"name":"2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132449162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Moving Target Defense in Unbalanced and Multiphase Distribution Systems Considering Voltage Stability 考虑电压稳定性的不平衡多相配电系统运动目标防御分析
Mengxiang Liu, Chengcheng Zhao, Zhenyong Zhang, Ruilong Deng, Peng Cheng
Moving Target Defense (MTD) is a new technology to defend against the false data injection attack (FDIA) on distribution system state estimation (DSSE). It works by proactively perturbing the branch reactance. However, due to the challenges induced by the nonlinear dynamics and the coupling phases in the three-phase AC DSSE model, the analysis on the effectiveness and hiddenness of MTD, which are two essential performance metrics, has not yet been conducted. In this paper, we attempt to optimize the effectiveness and hiddenness of MTD while considering voltage stability. Firstly, we quantify the two metrics with approximated measurement residuals. Based on the quantified metrics, we formulate an optimization problem to maximize the effectiveness with guaranteed hiddenness and ensure voltage stability by minimizing the voltage variation induced by MTD. The original problem is transformed to a polynomial optimization problem based on the observation that the alteration of the projection matrix caused by reactance perturbation is neglectable, such that the near-optimal result can be obtained. Finally, extensive simulations are conducted on the IEEE 13-bus test feeder to evaluate the performance of the proposed MTD.
移动目标防御(MTD)是一种针对配电系统状态估计(DSSE)的虚假数据注入攻击(FDIA)的新防御技术。它的工作原理是主动干扰支路电抗。然而,由于三相交流DSSE模型的非线性动力学和耦合相位所带来的挑战,MTD的有效性和隐藏性这两个重要的性能指标尚未得到分析。本文在考虑电压稳定性的同时,试图优化MTD的有效性和隐蔽性。首先,我们用近似的测量残差来量化这两个度量。在量化指标的基础上,通过最小化MTD引起的电压变化,在保证隐蔽性的前提下实现效率最大化和电压稳定的优化问题。根据观察到电抗扰动引起的投影矩阵的变化可以忽略不计,将原问题转化为多项式优化问题,从而得到接近最优的结果。最后,在IEEE 13总线测试馈线上进行了广泛的仿真,以评估所提出的MTD的性能。
{"title":"Analysis of Moving Target Defense in Unbalanced and Multiphase Distribution Systems Considering Voltage Stability","authors":"Mengxiang Liu, Chengcheng Zhao, Zhenyong Zhang, Ruilong Deng, Peng Cheng","doi":"10.1109/SmartGridComm51999.2021.9632320","DOIUrl":"https://doi.org/10.1109/SmartGridComm51999.2021.9632320","url":null,"abstract":"Moving Target Defense (MTD) is a new technology to defend against the false data injection attack (FDIA) on distribution system state estimation (DSSE). It works by proactively perturbing the branch reactance. However, due to the challenges induced by the nonlinear dynamics and the coupling phases in the three-phase AC DSSE model, the analysis on the effectiveness and hiddenness of MTD, which are two essential performance metrics, has not yet been conducted. In this paper, we attempt to optimize the effectiveness and hiddenness of MTD while considering voltage stability. Firstly, we quantify the two metrics with approximated measurement residuals. Based on the quantified metrics, we formulate an optimization problem to maximize the effectiveness with guaranteed hiddenness and ensure voltage stability by minimizing the voltage variation induced by MTD. The original problem is transformed to a polynomial optimization problem based on the observation that the alteration of the projection matrix caused by reactance perturbation is neglectable, such that the near-optimal result can be obtained. Finally, extensive simulations are conducted on the IEEE 13-bus test feeder to evaluate the performance of the proposed MTD.","PeriodicalId":378884,"journal":{"name":"2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125839564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mining the energy consumption data of industrial systems to identify and characterize energy flexibility capabilities 挖掘工业系统的能耗数据,以识别和表征能源灵活性能力
Alejandro Tristán Jiménez, C. Kaymakci, A. Sauer
Industrial energy flexibility can play a pivotal supporting role in the transition towards renewable energy sources. Nonetheless, to harness the vast potential of industrial energy flexibility operation-friendly energy flexibility measures need to be identified and characterized. This work presents a step by step approach to mine historical energy consumption data of an industrial system using the k-means algorithm with support of the average silhouette score method to establish the system's typical operation profiles. These profiles can then be used not only to identify specific energy flexibility measures but their energy flexibility potential among other characterization parameters. The paper presents two representative use case examples and concludes by enumerating the benefits and providing an outlook of improvement opportunities for the developed approach.
工业能源灵活性可以在向可再生能源过渡的过程中发挥关键的支持作用。然而,为了利用工业能源灵活性的巨大潜力,需要确定和确定有利于运营的能源灵活性措施。本文提出了一种利用k-means算法逐步挖掘工业系统历史能耗数据的方法,并支持平均轮廓评分法来建立系统的典型运行曲线。然后,这些剖面不仅可以用于确定特定的能量柔韧性措施,还可以用于确定其他表征参数中的能量柔韧性潜力。本文提出了两个有代表性的用例示例,并通过列举益处和提供已开发方法的改进机会前景来进行总结。
{"title":"Mining the energy consumption data of industrial systems to identify and characterize energy flexibility capabilities","authors":"Alejandro Tristán Jiménez, C. Kaymakci, A. Sauer","doi":"10.1109/SmartGridComm51999.2021.9632330","DOIUrl":"https://doi.org/10.1109/SmartGridComm51999.2021.9632330","url":null,"abstract":"Industrial energy flexibility can play a pivotal supporting role in the transition towards renewable energy sources. Nonetheless, to harness the vast potential of industrial energy flexibility operation-friendly energy flexibility measures need to be identified and characterized. This work presents a step by step approach to mine historical energy consumption data of an industrial system using the k-means algorithm with support of the average silhouette score method to establish the system's typical operation profiles. These profiles can then be used not only to identify specific energy flexibility measures but their energy flexibility potential among other characterization parameters. The paper presents two representative use case examples and concludes by enumerating the benefits and providing an outlook of improvement opportunities for the developed approach.","PeriodicalId":378884,"journal":{"name":"2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130400868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PLC-RF hybrid communication systems, model and simulation PLC-RF混合通信系统,模型和仿真
A. Sanz, José Carlos Ibar, Luis Lacasa
This paper is motivated by the evolution of PLC systems to new hybrid systems combining PLC and RF. In order to achieve a good performance and optimization of the system, the development of a simulator that allows debugging it is crucial. A fundamental part of this evolution is the modelling of the RF channel adapted to the MAC level simulators we are using. This paper presents an introduction to this evolution of PLC systems to new hybrid systems and the results of RF channel field measurements along with models of signal propagation and FER based on them.
本文的研究源于PLC系统向PLC与射频相结合的新型混合系统的发展。为了达到良好的性能和优化的系统,开发一个允许调试的模拟器是至关重要的。这种演变的一个基本部分是射频信道的建模,以适应我们正在使用的MAC级模拟器。本文介绍了PLC系统向新型混合系统的演变,以及射频信道现场测量的结果,以及基于这些结果的信号传播和FER模型。
{"title":"PLC-RF hybrid communication systems, model and simulation","authors":"A. Sanz, José Carlos Ibar, Luis Lacasa","doi":"10.1109/SmartGridComm51999.2021.9632300","DOIUrl":"https://doi.org/10.1109/SmartGridComm51999.2021.9632300","url":null,"abstract":"This paper is motivated by the evolution of PLC systems to new hybrid systems combining PLC and RF. In order to achieve a good performance and optimization of the system, the development of a simulator that allows debugging it is crucial. A fundamental part of this evolution is the modelling of the RF channel adapted to the MAC level simulators we are using. This paper presents an introduction to this evolution of PLC systems to new hybrid systems and the results of RF channel field measurements along with models of signal propagation and FER based on them.","PeriodicalId":378884,"journal":{"name":"2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128927047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep Learning Based Multi-Label Attack Detection for Distributed Control of AC Microgrids 基于深度学习的交流微电网分布式控制多标签攻击检测
S. Mohiuddin, Junjian Qi, Sasha Fung, Yu Huang, Yufei Tang
This paper presents a deep learning based multi-label attack detection approach for the distributed control in AC microgrids. The secondary control of AC microgrids is formulated as a constrained optimization problem with voltage and frequency as control variables which is then solved using a distributed primal-dual gradient algorithm. The normally distributed false data injection (FDI) attacks against the proposed distributed control are then designed for the distributed gener-ator's output voltage and active/reactive power measurements. In order to detect the presence of false measurements, a deep learning based attack detection strategy is further developed. The proposed attack detection is formulated as a multi-label classification problem to capture the inconsistency and co-occurrence dependencies in the power flow measurements due to the presence of FDI attacks. With this multi-label classification scheme, a single model is able to identify the presence of different attacks and load change simultaneously. Two different deep learning techniques are compared to design the attack detector, and the performance of the proposed distributed control and the attack detector is demonstrated through simulations on the modified IEEE 34-bus distribution test system.
提出了一种基于深度学习的交流微电网分布式控制多标签攻击检测方法。将交流微电网的二次控制问题表述为一个以电压和频率为控制变量的约束优化问题,然后使用分布式原对偶梯度算法求解。然后针对分布式发电机的输出电压和有功/无功测量,设计了针对所提出的分布式控制的正态分布假数据注入(FDI)攻击。为了检测错误测量的存在,进一步开发了一种基于深度学习的攻击检测策略。所提出的攻击检测被制定为一个多标签分类问题,以捕获由于存在FDI攻击而导致的潮流测量中的不一致和共现依赖关系。使用这种多标签分类方案,单个模型能够同时识别不同攻击的存在和负载变化。比较了两种不同的深度学习技术来设计攻击检测器,并在改进的IEEE 34总线分布式测试系统上进行了仿真,验证了所提出的分布式控制和攻击检测器的性能。
{"title":"Deep Learning Based Multi-Label Attack Detection for Distributed Control of AC Microgrids","authors":"S. Mohiuddin, Junjian Qi, Sasha Fung, Yu Huang, Yufei Tang","doi":"10.1109/SmartGridComm51999.2021.9631998","DOIUrl":"https://doi.org/10.1109/SmartGridComm51999.2021.9631998","url":null,"abstract":"This paper presents a deep learning based multi-label attack detection approach for the distributed control in AC microgrids. The secondary control of AC microgrids is formulated as a constrained optimization problem with voltage and frequency as control variables which is then solved using a distributed primal-dual gradient algorithm. The normally distributed false data injection (FDI) attacks against the proposed distributed control are then designed for the distributed gener-ator's output voltage and active/reactive power measurements. In order to detect the presence of false measurements, a deep learning based attack detection strategy is further developed. The proposed attack detection is formulated as a multi-label classification problem to capture the inconsistency and co-occurrence dependencies in the power flow measurements due to the presence of FDI attacks. With this multi-label classification scheme, a single model is able to identify the presence of different attacks and load change simultaneously. Two different deep learning techniques are compared to design the attack detector, and the performance of the proposed distributed control and the attack detector is demonstrated through simulations on the modified IEEE 34-bus distribution test system.","PeriodicalId":378884,"journal":{"name":"2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130921992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interoperability analysis of IEC61850 protocol using an emulated IED in a HIL microgrid testbed IEC61850协议在HIL微电网试验台上的互操作性分析
M. Hemmati, H. Palahalli, G. Gruosso, S. Grillo
Expansion of distributed energy resources (DERs) leads to more complex and interconnected networks in smart grids. This increased the requirement of fast and standardized information exchanges for stable, resilient, and reliable operations in microgrids. To extend interoperability, modern power grids utilize a sophisticated network of Intelligent Electronic Devices (IEDs). These devices are able to communicate with one another using the IEC-61850 communication protocol. In this article, one particular architecture to inspect Generic Object Oriented Substation Event (GOOSE) services is proposed. phase one of the project resides in design details of an assumed micro- grid simulation as the testbed in Typhoon HIL, and modelling of the characteristics of a generic IED running on a Hardware-In-the-Loop device. While phase two of the project involves the HIL test setup as a novel methodology to approach the communication scenarios of mentioned commercial relays. one particular overload scenario is stated in more detail to investigate the performance of the protection mechanisms and GOOSE services emulated in the IED.
分布式能源(DERs)的扩展导致智能电网网络更加复杂和互联。这增加了对快速和标准化信息交换的需求,以实现微电网稳定、有弹性和可靠的运行。为了扩展互操作性,现代电网利用复杂的智能电子设备(ied)网络。这些设备能够使用IEC-61850通信协议相互通信。本文提出了一种检查通用面向对象变电站事件(GOOSE)服务的特殊体系结构。该项目的第一阶段是对台风HIL中作为测试平台的假设微电网模拟的设计细节,以及在硬件在环设备上运行的通用简易爆炸装置的特性建模。该项目的第二阶段涉及HIL测试设置,作为一种新的方法来接近上述商业继电器的通信场景。更详细地说明了一个特定的过载场景,以研究IED中模拟的保护机制和GOOSE服务的性能。
{"title":"Interoperability analysis of IEC61850 protocol using an emulated IED in a HIL microgrid testbed","authors":"M. Hemmati, H. Palahalli, G. Gruosso, S. Grillo","doi":"10.1109/SmartGridComm51999.2021.9632327","DOIUrl":"https://doi.org/10.1109/SmartGridComm51999.2021.9632327","url":null,"abstract":"Expansion of distributed energy resources (DERs) leads to more complex and interconnected networks in smart grids. This increased the requirement of fast and standardized information exchanges for stable, resilient, and reliable operations in microgrids. To extend interoperability, modern power grids utilize a sophisticated network of Intelligent Electronic Devices (IEDs). These devices are able to communicate with one another using the IEC-61850 communication protocol. In this article, one particular architecture to inspect Generic Object Oriented Substation Event (GOOSE) services is proposed. phase one of the project resides in design details of an assumed micro- grid simulation as the testbed in Typhoon HIL, and modelling of the characteristics of a generic IED running on a Hardware-In-the-Loop device. While phase two of the project involves the HIL test setup as a novel methodology to approach the communication scenarios of mentioned commercial relays. one particular overload scenario is stated in more detail to investigate the performance of the protection mechanisms and GOOSE services emulated in the IED.","PeriodicalId":378884,"journal":{"name":"2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131203726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting Attacks on Synchrophasor Protocol Using Machine Learning Algorithms 利用机器学习算法检测对同步量协议的攻击
Kolten Knesek, Patrick Wlazlo, Hao Huang, A. Sahu, A. Goulart, K. Davis
Phasor measurement units (PMUs) are used in power grids across North America to measure the amplitude, phase, and frequency of an alternating voltage or current. PMU's use the IEEE C37.118 protocol to send telemetry to phasor data collectors (PDC) and human machine interface (HMI) workstations in a control center. However, the C37.118 protocol utilizes the internet protocol stack without any authentication mechanism. This means that the protocol is vulnerable to false data injection (FDI) and false command injection (FCI). In order to study different scenarios in which C37.118 protocol's integrity and confidentiality can be compromised, we created a testbed that emulates a C37.118 communication network. In this testbed we conduct FCI and FDI attacks on real-time C37.118 data packets using a packet manipulation tool called Scapy. Using this platform, we generated C37.118 FCI and FDI datasets which are processed by multi-label machine learning classifier algorithms, such as Decision Tree (DT), k-Nearest Neighbor (kNN), and Naive Bayes (NB), to find out how effective machine learning can be at detecting such attacks. Our results show that the DT classifier had the best precision and recall rate.
相量测量单元(pmu)在北美的电网中用于测量交变电压或电流的幅度、相位和频率。PMU使用IEEE C37.118协议向控制中心的相量数据采集器(PDC)和人机界面(HMI)工作站发送遥测数据。而C37.118协议利用的是互联网协议栈,没有任何认证机制。这意味着该协议容易受到虚假数据注入(FDI)和虚假命令注入(FCI)的攻击。为了研究C37.118协议完整性和保密性可能受到损害的不同场景,我们创建了一个模拟C37.118通信网络的测试平台。在这个测试平台中,我们使用一个名为Scapy的数据包操作工具对实时C37.118数据包进行FCI和FDI攻击。使用该平台,我们生成了C37.118 FCI和FDI数据集,这些数据集由多标签机器学习分类器算法处理,如决策树(DT), k-近邻(kNN)和朴素贝叶斯(NB),以了解机器学习在检测此类攻击方面的有效性。结果表明,DT分类器具有最佳的准确率和召回率。
{"title":"Detecting Attacks on Synchrophasor Protocol Using Machine Learning Algorithms","authors":"Kolten Knesek, Patrick Wlazlo, Hao Huang, A. Sahu, A. Goulart, K. Davis","doi":"10.1109/SmartGridComm51999.2021.9631996","DOIUrl":"https://doi.org/10.1109/SmartGridComm51999.2021.9631996","url":null,"abstract":"Phasor measurement units (PMUs) are used in power grids across North America to measure the amplitude, phase, and frequency of an alternating voltage or current. PMU's use the IEEE C37.118 protocol to send telemetry to phasor data collectors (PDC) and human machine interface (HMI) workstations in a control center. However, the C37.118 protocol utilizes the internet protocol stack without any authentication mechanism. This means that the protocol is vulnerable to false data injection (FDI) and false command injection (FCI). In order to study different scenarios in which C37.118 protocol's integrity and confidentiality can be compromised, we created a testbed that emulates a C37.118 communication network. In this testbed we conduct FCI and FDI attacks on real-time C37.118 data packets using a packet manipulation tool called Scapy. Using this platform, we generated C37.118 FCI and FDI datasets which are processed by multi-label machine learning classifier algorithms, such as Decision Tree (DT), k-Nearest Neighbor (kNN), and Naive Bayes (NB), to find out how effective machine learning can be at detecting such attacks. Our results show that the DT classifier had the best precision and recall rate.","PeriodicalId":378884,"journal":{"name":"2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing Outages under Coordinated Cyber-Physical Attack with Secured PMUs 利用安全pmu防止协同网络物理攻击下的中断
Yudi Huang, Ting-nian He, N. Chaudhuri, T. L. Porta
Due to the severe consequences of the coordinated cyber-physical attack (CCPA), the design of defenses has gained a lot of attention. A popular defense approach is to eliminate the existence of attacks by either securing existing sensors or deploying secured PMUs. In this work, we improve this approach by lowering the defense target from eliminating attacks to preventing outages in order to reduce the required number of secured PMUs. To this end, we formulate the problem of PMU Placement for Outage Prevention (PPOP) as a tri-level non-linear optimization and transform it into a bi-level mixed-integer linear programming (MILP) problem. Then, we propose an alternating optimization algorithm to solve it optimally. Finally, we evaluate our algorithm on IEEE 30-bus, 57-bus, and 118-bus systems, which demonstrates the advantage of the proposed approach in significantly reducing the required number of secured PMUs.
由于协同网络物理攻击(CCPA)的严重后果,防御设计受到了广泛关注。一种流行的防御方法是通过保护现有传感器或部署安全的pmu来消除攻击的存在。在这项工作中,我们通过降低防御目标从消除攻击到防止中断来改进这种方法,以减少所需的安全pmu数量。为此,我们将PMU的停运预防(PPOP)问题表述为一个三层非线性优化问题,并将其转化为一个双层混合整数线性规划(MILP)问题。然后,我们提出了一种交替优化算法来最优求解。最后,我们在IEEE 30总线,57总线和118总线系统上评估了我们的算法,这表明了所提出的方法在显着减少所需的安全pmu数量方面的优势。
{"title":"Preventing Outages under Coordinated Cyber-Physical Attack with Secured PMUs","authors":"Yudi Huang, Ting-nian He, N. Chaudhuri, T. L. Porta","doi":"10.1109/SmartGridComm51999.2021.9632306","DOIUrl":"https://doi.org/10.1109/SmartGridComm51999.2021.9632306","url":null,"abstract":"Due to the severe consequences of the coordinated cyber-physical attack (CCPA), the design of defenses has gained a lot of attention. A popular defense approach is to eliminate the existence of attacks by either securing existing sensors or deploying secured PMUs. In this work, we improve this approach by lowering the defense target from eliminating attacks to preventing outages in order to reduce the required number of secured PMUs. To this end, we formulate the problem of PMU Placement for Outage Prevention (PPOP) as a tri-level non-linear optimization and transform it into a bi-level mixed-integer linear programming (MILP) problem. Then, we propose an alternating optimization algorithm to solve it optimally. Finally, we evaluate our algorithm on IEEE 30-bus, 57-bus, and 118-bus systems, which demonstrates the advantage of the proposed approach in significantly reducing the required number of secured PMUs.","PeriodicalId":378884,"journal":{"name":"2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124283915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RICSel21 Data Collection: Attacks in a Virtual Power Network RICSel21数据采集:虚拟电网中的攻击
Chih-Yuan Lin, August Fundin, Erik Westring, Tommy Gustafsson, Simin Nadim-Tehrani
Attacks against Supervisory Control and Data Acquisition (SCADA) systems operating critical infrastructures have increased since the appearance of Stuxnet. To defend critical infrastructures, security researchers need realistic datasets to evaluate and benchmark their defense mechanisms such as Anomaly Detection Systems (ADS). However, real-world data collected from critical infrastructures are too sensitive to share openly. Therefore, testbed datasets have become a viable option to balance the requirement of openness and realism. This study provides a data generation framework based on a virtual testbed with a commercial SCADA system and presents an openly available dataset called RICSel21, with packets in IEC-60870-5-104 protocol streams. The dataset is the result of performing 12 attacks, identifying the impact of attacks on a power management system and recording the logs of the seven successful attacks.
自从Stuxnet出现以来,针对运行关键基础设施的监控和数据采集(SCADA)系统的攻击有所增加。为了保护关键基础设施,安全研究人员需要真实的数据集来评估和基准测试他们的防御机制,如异常检测系统(ADS)。然而,从关键基础设施收集的真实数据过于敏感,无法公开共享。因此,测试平台数据集已成为平衡开放性和现实性需求的可行选择。本研究提供了一个基于商业SCADA系统的虚拟测试平台的数据生成框架,并提供了一个名为RICSel21的公开可用数据集,其数据包采用IEC-60870-5-104协议流。该数据集是执行了12次攻击的结果,确定了攻击对电源管理系统的影响,并记录了7次成功攻击的日志。
{"title":"RICSel21 Data Collection: Attacks in a Virtual Power Network","authors":"Chih-Yuan Lin, August Fundin, Erik Westring, Tommy Gustafsson, Simin Nadim-Tehrani","doi":"10.1109/SmartGridComm51999.2021.9632328","DOIUrl":"https://doi.org/10.1109/SmartGridComm51999.2021.9632328","url":null,"abstract":"Attacks against Supervisory Control and Data Acquisition (SCADA) systems operating critical infrastructures have increased since the appearance of Stuxnet. To defend critical infrastructures, security researchers need realistic datasets to evaluate and benchmark their defense mechanisms such as Anomaly Detection Systems (ADS). However, real-world data collected from critical infrastructures are too sensitive to share openly. Therefore, testbed datasets have become a viable option to balance the requirement of openness and realism. This study provides a data generation framework based on a virtual testbed with a commercial SCADA system and presents an openly available dataset called RICSel21, with packets in IEC-60870-5-104 protocol streams. The dataset is the result of performing 12 attacks, identifying the impact of attacks on a power management system and recording the logs of the seven successful attacks.","PeriodicalId":378884,"journal":{"name":"2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"500 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123981030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1