Risk of Cyber-Physical Attack via Load With Emulated Inertia Control

被引:26
|
作者
Brown, Hilary E. [1 ]
DeMarco, Christopher L. [1 ]
机构
[1] Univ Wisconsin Madison, Dept Elect & Comp Engn, Madison, WI 53706 USA
关键词
Aggregated load control; cybersecurity; emulated inertia; malicious control; rate of change of frequency (ROCOF); singular value decomposition (SVD); virtual synchronous generators (VSGs); CONTROL-SYSTEMS; GENERATION CONTROL; THEORETIC METHODS; SECURITY; FEEDBACK;
D O I
10.1109/TSG.2017.2697823
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The intrinsic electromechanical coupling of power and frequency across a power system creates the possibility of indirect cyber-physical attacks, where the attack's impact occurs at locations far removed from the intrusion point. The work here explores this vulnerability, demonstrating mechanisms by which an attacker could cause system-wide unstable oscillations and trips of generators, by an attack altering only local control characteristics of customer loads. This extends previous work on malicious control in generator governor control loops in three ways. First, the fidelity and size of the study system is improved, with each generator represented via detailed models in a non-linear dynamic simulation. Second, we study an increasingly plausible attack, in which loads (prior to attack) are enlisted to enhance system stability through the exercise of emulated inertia control. Finally, the work demonstrates methodologies which an attacker might employ to choose the generator(s) targeted to experience large oscillations (and tripping through protective relay action) and the locations, where compromised control systems would have greatest impact. Nonlinear simulation results indicate that malicious control destabilizes the power system, with targeted generators experiencing large magnitude oscillations, and probable tripping of rate of change of frequency protective relays. These results are demonstrated as robust over variations in parameters, topology, and loading.
引用
收藏
页码:5854 / 5866
页数:13
相关论文
共 50 条
  • [41] SAGE: Stealthy Attack Generation in cyber-physical systems
    Biehler, Michael
    Zhong, Zhen
    Shi, Jianjun
    IISE TRANSACTIONS, 2024, 56 (01) : 54 - 68
  • [42] Cyber-Physical Attack Launched From EVSE Botnet
    Wei, Fanrong
    Lin, Xiangning
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2024, 39 (02) : 3603 - 3614
  • [43] A Stealthy Sensor Attack for Uncertain Cyber-Physical Systems
    Jeon, Heegyun
    Eun, Yongsoon
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) : 6345 - 6352
  • [44] Quantifying the econometric loss of a cyber-physical attack on a seaport
    Tam, Kimberly
    Chang, Barbara
    Hopcraft, Rory
    Moara-Nkwe, Kemedi
    Jones, Kevin
    FRONTIERS IN COMPUTER SCIENCE, 2023, 4
  • [45] An optimal cyber-physical attack strategy on DC microgrids
    Asghari, Mohammadmahdi
    Ameli, Amir
    Ghafouri, Mohsen
    Kirakosyan, Aram
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2024, 157
  • [46] Smart Grid Cyber-Physical Attack and Defense: A Review
    Zhang, Hang
    Liu, Bo
    Wu, Hongyu
    IEEE ACCESS, 2021, 9 : 29641 - 29659
  • [47] Detection and mitigation of coordinated cyber-physical attack in CPPS
    Varshini, G. Y. Sree
    Latha, S.
    HELIYON, 2024, 10 (04)
  • [48] Attack Detection for Cyber-Physical Systems: A Zonotopic Approach
    Li, Jitao
    Wang, Zhenhua
    Shen, Yi
    Xie, Lihua
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (11) : 6828 - 6835
  • [49] Attack and defence methods in cyber-physical power system
    Yang, Ting
    Liu, Yuzhe
    Li, Wei
    IET ENERGY SYSTEMS INTEGRATION, 2022, 4 (02) : 159 - 170
  • [50] Fast Attack Recovery for Stochastic Cyber-Physical Systems
    Zhang, Lin
    Burbano, Luis
    Chen, Xin
    Cardenas, Alvaro A.
    Drager, Steven
    Anderson, Matthew
    Kong, Fanxin
    2024 IEEE 30TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, RTAS 2024, 2023, : 280 - 293