Impact of Cyber-Attack on Isolated Power System

被引:0
|
作者
Sahabuddin, Md. [1 ]
Dutta, Bilash [1 ]
Hassan, Mehedi [1 ]
机构
[1] Jessore Univ Sci & Technol, Dept Elect & Elect Engn, Jessore 7408, Bangladesh
关键词
cyber-attack; advanced control; cyber-security; LFC; AGC;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this modern era of civilization demand of electricity from interconnected grid system is increasing day by day. That is why improving the reliability of the power system has become the main concern to the experts. This article investigates the impact of cyber-attack on an isolated power station in frequency disturbing aspects during sudden changes of load of the system. Stable limit of the speed regulation for load frequency control (LFC) and integral controller gain for automatic generation control (AGC) is derived from their characteristic equations. Depending upon the nature of cyber-attack ( positive biased attack or negative biased attack) simulation curves are developed to show the frequency deviations and oscillations of the power system. Most severe attack is also characterized to protect power system from unstable situation.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] A deep learning-based classification scheme for cyber-attack detection in power system
    Ding, Yucheng
    Ma, Kang
    Pu, Tianjiao
    Wang, Xingying
    Li, Ran
    Zhang, Dongxia
    [J]. IET ENERGY SYSTEMS INTEGRATION, 2021, 3 (03) : 274 - 284
  • [22] Cyber-Attack on a Power Plant using Bias Injected Measurements
    Kontouras, Efstathios
    Tzes, Anthony
    Dritsas, Leonidas
    [J]. 2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 5507 - 5512
  • [23] Algorithmic Approaches to Characterizing Power Flow Cyber-Attack Vulnerabilities
    Tuttle, Michael
    Wicker, Braden
    Poshtan, Majid
    Callenes, Joseph
    [J]. 2019 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2019,
  • [24] Rapid Cyber-Attack Detection System with Low Probability of Missed Attack Warnings
    Vidanapathirana, Dushani
    Mohammad, Azeem
    Halgamuge, Malka N.
    [J]. 2022 IEEE 17TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2022, : 1423 - 1429
  • [25] Linux-based system modelling for cyber-attack simulation
    Lee, JS
    Jung, JR
    Park, JS
    Chi, SD
    [J]. ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 585 - 596
  • [26] Machine learning classifier-based detection of cyber-attack on power system: Comparative analysis
    Saini, Rahul
    Verma, Yajvender Pal
    Saluja, Krishan Kumar
    [J]. 2022 22ND NATIONAL POWER SYSTEMS CONFERENCE, NPSC, 2022,
  • [27] A Data Preparation Method for Machine-Learning-Based Power System Cyber-Attack Detection
    Chen, Hongyu
    Wang, Jingyu
    Shi, Dongyuan
    [J]. 2018 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2018, : 3003 - 3009
  • [28] Cyber-attack Detection in the Networked Control System with Faulty Plant
    Yaseen, Amer Atta
    Bayart, Mireille
    [J]. 2017 25TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2017, : 980 - 985
  • [29] Cyber-attack and defense simulation framework
    Bergin, Dennis Lee
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 383 - 392
  • [30] Cyber-attack as inevitable kinetic war
    Lilienthal, Gary
    Ahmad, Nehaluddin
    [J]. COMPUTER LAW & SECURITY REVIEW, 2015, 31 (03) : 390 - 400