Cybersecurity Analytics for Virtual Power Plants

被引:0
|
作者
Khan, Ahmad [1 ]
Hosseinzadehtaher, Mohsen [1 ]
Shadmand, Mohammad B. [1 ]
Mazumder, Sudip K. [1 ]
机构
[1] Univ Illinois, Dept Elect & Comp Engn, Chicago, IL 60680 USA
关键词
Virtual power plant; power electronics-dominated grid; cybersecurity analytics; SMART INVERTERS;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
This article presents a framework to realize cybersecure virtual power plant (VPP). The foundation of this cybersecurity analytics is established on a developed normal operation region identification methodology. This normal operation region is exploited as a confirmation strategy to distinguish malicious set-points that are determined by VPP cyber-layer. These malicious set-points are spawned by a cyber-attacker influencing the VPP cyber-layer. The normal operation region is based on a derived one-to-one mapping between the network internal point of common coupling (PCC) bus voltages and the cyber-layer generated set-points. This derived mapping is compared with an inverse mapping through internal PCC bus voltage monitoring for anomalies. Once, an inconsistency is witnessed by the cybersecurity analytics between the one-to-one mapping and the inverse mapping, then the initial voltage anomaly detected by the monitoring system is due to an intrusion. The developed theory is validated through simulation of a cyber attacker gradually violating the network stability boundary through manipulating the operation set-points.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] A cybersecurity assessment framework for virtual operational technology in power system automation
    Sarkar, Sajal
    Teo, Yong Meng
    Chang, Ee-Chien
    SIMULATION MODELLING PRACTICE AND THEORY, 2022, 117
  • [22] Virtual power plants: Theory or reality?
    Arndt, Ulli
    von Roon, Serafin
    Wagner, Ulrich
    BWK, 2006, 58 (06): : 52 - 57
  • [23] Applications of Virtual Power Plants Approaches
    Dulau, Lucian Ioan
    Abrudean, Mihail
    Bica, Dorin
    2014 INTERNATIONAL CONFERENCE AND EXPOSITION ON ELECTRICAL AND POWER ENGINEERING (EPE), 2014, : 1060 - 1064
  • [24] Optimal Regulation of Virtual Power Plants
    Dall'Anese, Emiliano
    Guggilam, Swaroop S.
    Simonetto, Andrea
    Chen, Yu Christine
    Dhople, Sairaj V.
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (02) : 1868 - 1881
  • [25] Robust Optimization for Virtual Power Plants
    De Filippo, Allegra
    Lombardi, Michele
    Milano, Michela
    Borghetti, Alberto
    AI*IA 2017 ADVANCES IN ARTIFICIAL INTELLIGENCE, 2017, 10640 : 17 - 30
  • [26] The Role of Virtual Power Plants in a Decentralized Power Grid
    Saliba, Sleman
    Power, 2020, 164 (08) : 40 - 41
  • [27] An overview of methodologies for cybersecurity vulnerability assessments conducted in nuclear power plants
    Peterson, John
    Haney, Michael
    Borrelli, R. A.
    NUCLEAR ENGINEERING AND DESIGN, 2019, 346 : 75 - 84
  • [28] Security Analytics: Essential Data Analytics Knowledge for Cybersecurity Professionals and Students
    Verma, Rakesh
    Kantarcioglu, Murat
    Marchette, David
    Leiss, Ernst
    Solorio, Thamar
    IEEE SECURITY & PRIVACY, 2015, 13 (06) : 60 - 65
  • [29] Using Google Analytics to Support Cybersecurity Forensics
    Qin, Han
    Riehle, Kit
    Zhao, Haozhen
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 3831 - 3834
  • [30] Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence
    Sun, Nan
    Zhang, Jun
    Gao, Shang
    Zhang, Leo Yu
    Camtepe, Seyit
    Xiang, Yang
    NETWORK AND SYSTEM SECURITY, NSS 2020, 2020, 12570 : 3 - 21