Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Designs

نویسندگان

  • Sajjad Amini
  • Fabio Pasqualetti
چکیده

Dynamic load altering attacks (D-LAA) are introduced as a new class of cyber-physical attacks against smart grid demand response programs. The fundamental characteristics of D-LAAs are explained. Accordingly, D-LAAs are classified in terms of open-loop versus closed-loop attacks, single-point versus multi-point attacks, the type of feedback, and the type of attack controller. A specific closed-loop D-LAA against power system stability is formulated and analyzed, where the attacker controls the changes in the victim load based on a feedback from the power system frequency. A protection system is designed against D-LAAs by formulating and solving a non-convex pole-placement optimization problem. Uncertainty with respect to attack sensor location is addressed. Case studies are presented to assess system vulnerabilities, impacts of single-point and multi-point attacks, and optimal load protection in an IEEE 39 bus test system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

بهبود پایداری شبکه قدرت با روش جدید حذف بار ترکیبی

Power system blackouts have become a serious problem for electric utilities especially in recent years. Different forms of system instability have emerged in recent blackouts, such as voltage instability and frequency instability. To counteract each form of system instability, special algorithms have been designed in the protection system, e.g. Under Frequency Load Shedding (UFLS) and Under Vol...

متن کامل

CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...

متن کامل

Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

متن کامل

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

Threshold Implementation as a Countermeasure against Power Analysis Attacks

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015