http://iet.metastore.ingenta.com
1887

access icon openaccess Analytic corrective control selection for online remedial action scheme design in a cyber adversarial environment

  • XML
    149.4912109375Kb
  • HTML
    170.427734375Kb
  • PDF
    2.973700523376465MB
Loading full text...

Full text loading...

/deliver/fulltext/iet-cps/2/4/IET-CPS.2017.0014.html;jsessionid=2fq7ws6tfa2s6.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-cps.2017.0014&mimeType=html&fmt=ahah

References

    1. 1)
      • 1. North American Electric Reliability Corporation: ‘Proposed definition of ‘remedial action scheme’, NERC Reliability Standards. Available at http://www.nerc.com/pa/Stand/Prjct201005_2SpclPrtctnSstmPhs2/Proposed%20RAS%20Definition_10262014_clean.pdf.
        .
    2. 2)
      • A.P. Meliopoulos , A.G. Bakirtzis .
        2. Meliopoulos, A.P., Bakirtzis, A.G.: ‘Corrective control computations for large power systems’, IEEE Trans. Power Appar. Syst., 1983, PAS-102, (11), pp. 35983604.
        . IEEE Trans. Power Appar. Syst. , 11 , 3598 - 3604
    3. 3)
      • P.M. Anderson , B.K. LeReverend .
        3. Anderson, P.M., LeReverend, B.K.: ‘Industry experience with special protection schemes’, IEEE Trans. Power Syst., 1996, 11, (3), pp. 11661179.
        . IEEE Trans. Power Syst. , 3 , 1166 - 1179
    4. 4)
      • C.F. Henville , E. Struyke .
        4. Henville, C.F., Struyke, E.: ‘RAS and stretched power system’. Western Protective Relaying Conf., 2006.
        . Western Protective Relaying Conf.
    5. 5)
      • J. Wirfs-Brock .
        5. Wirfs-Brock, J.: ‘The realities of cybersecurity at a rural utility’, Inside Energy, September 2015. Available at http://grid.insideenergy.org/cybersecurity/.
        .
    6. 6)
      • M.J. Assante .
        6. Assante, M.J.: ‘Confirmation of a coordinated attack on the Ukrainian power grid’, SANS Industrial Control Systems, January 2016. Available at https://ics.sans.org/blog/2016/01/09/confirmation-of-a-coordinated-attack-on-the-ukrainian-power-grid.
        .
    7. 7)
      • C.C. Liu , A. Stefanov , J. Hong .
        7. Liu, C.C., Stefanov, A., Hong, J., et al: ‘Intruders in the grid’, IEEE Power Energy Mag., 2012, 10, (1), pp. 5866.
        . IEEE Power Energy Mag. , 1 , 58 - 66
    8. 8)
      • R. Ramanathan , B. Tuck , J. O'Brien .
        8. Ramanathan, R., Tuck, B., O'Brien, J.: ‘BPA's experience of implementing remedial action schemes in power flow for operation studies’. 2013 IEEE Power Energy Society General Meeting, July 2013.
        . 2013 IEEE Power Energy Society General Meeting
    9. 9)
      • S.C. Pai , J. Sun .
        9. Pai, S.C., Sun, J.: ‘BCTCs experience towards a smarter grid—increasing limits and reliability with centralized intelligence remedial action schemes’. Electric Power Conf., 2008. EPEC 2008. IEEE, Canada, October 2008, pp. 17.
        . Electric Power Conf., 2008. EPEC 2008. IEEE , 1 - 7
    10. 10)
      • A.A. Fouad , A. Ghafurian , K. Nodehi .
        10. Fouad, A.A., Ghafurian, A., Nodehi, K., et al: ‘Calculation of generation-shedding requirements of the B.C. hydro system using transient energy functions’, IEEE Power Eng. Rev., 1986, PER-6, (5), pp. 3132.
        . IEEE Power Eng. Rev. , 5 , 31 - 32
    11. 11)
      • Y. Zhang , K. Tomsovic .
        11. Zhang, Y., Tomsovic, K.: ‘Adaptive remedial action scheme based on transient energy analysis’. Power Systems Conf. Exposition, 2004. IEEE PES. IEEE, 2004, pp. 925931.
        . Power Systems Conf. Exposition, 2004. IEEE PES. IEEE , 925 - 931
    12. 12)
      • W. Shao , V. Vittal .
        12. Shao, W., Vittal, V.: ‘Corrective switching algorithm for relieving overloads and voltage violations’, IEEE Trans. Power Syst., 2005, 20, (4), pp. 18771885.
        . IEEE Trans. Power Syst. , 4 , 1877 - 1885
    13. 13)
      • S. Wang , G. Rodriguez .
        13. Wang, S., Rodriguez, G.: ‘Smart RAS (remedial action scheme)’. 2010 Innovative Smart Grid Technologies (ISGT), January 2010, pp. 16.
        . 2010 Innovative Smart Grid Technologies (ISGT) , 1 - 6
    14. 14)
      • H. Atighechi , P. Hu , J. Lu .
        14. Atighechi, H., Hu, P., Lu, J., et al: ‘A fast load shedding remedial action scheme using real-time data for BC hydro system’. 2016 IEEE Power and Energy Society General Meeting (PESGM), July 2016, pp. 15.
        . 2016 IEEE Power and Energy Society General Meeting (PESGM) , 1 - 5
    15. 15)
      • 15. L. Hitachi America: ‘Introduction to online RAS (remedial action scheme)’, April 2016. Available at https://www.wecc.biz/Administrative/RAS%20Arming%20-%20Hitachi%20America.pdf.
        .
    16. 16)
      • M. Kazerooni .
        16. Kazerooni, M.: ‘Enhanced power system resiliency to high-impact, low-frequency events with emphasis on geomagnetic disturbances’. PhD dissertation, University of Illinois at Urbana-Champaign, 2016.
        .
    17. 17)
      • H. Song , B. Lee , V. Ajjarapu .
        17. Song, H., Lee, B., Ajjarapu, V.: ‘Control strategies against voltage collapse considering undesired relay operations’, IET. Gener. Transm. Distrib., 2009, 3, (2), pp. 164172.
        . IET. Gener. Transm. Distrib. , 2 , 164 - 172
    18. 18)
      • R.M. Lee , M.J. Assante , T. Conway .
        18. Lee, R.M., Assante, M.J., Conway, T.: ‘Analysis of the cyber attack on the Ukrainian power grid’, SANS Ind. Control Syst., 2016.
        . SANS Ind. Control Syst.
    19. 19)
      • S. Hossain , S. Etigowni , K. Davis .
        19. Hossain, S., Etigowni, S., Davis, K., et al: ‘Towards cyber-physical intrusion tolerance’. 2015 IEEE Int. Conf. Smart Grid Communications (SmartGridComm), 2015, pp. 139144.
        . 2015 IEEE Int. Conf. Smart Grid Communications (SmartGridComm) , 139 - 144
    20. 20)
      • 20. ‘D-FACTS devices in PowerWorld Simulator.’ Available at https://www.powerworld.com/files/PW-DFACTS-QuickStart-Jan-15-2014.pdf.
        .
    21. 21)
      • K.R. Davis , R. Berthier , S.A. Zonouz .
        21. Davis, K.R., Berthier, R., Zonouz, S.A., et al: ‘Cyber-physical security assessment (CyPSA) for electric power systems’, IEEE-HKN: The Bridge, 2016, 112, (2), pp. 819, an optional note.
        . IEEE-HKN: The Bridge , 2 , 8 - 19
    22. 22)
      • G.A. Weaver , K. Davis , C.M. Davis .
        22. Weaver, G.A., Davis, K., Davis, C.M., et al: ‘Cyber-physical models for power grid security analysis: 8-substation case’. 2016 IEEE Int. Conf. Smart Grid Communications (SmartGridComm), November 2016, pp. 140146.
        . 2016 IEEE Int. Conf. Smart Grid Communications (SmartGridComm) , 140 - 146
    23. 23)
      • M. Dahleh , I. Diaz-Bobillo . (1995)
        23. Dahleh, M., Diaz-Bobillo, I.: ‘Control of uncertain systems: a linear programming approach’ (Prentice Hall, 1995).
        .
    24. 24)
      • K.M. Rogers , R. Klump , H. Khurana .
        24. Rogers, K.M., Klump, R., Khurana, H., et al: ‘An authenticated control framework for distributed voltage support on the smart grid’, IEEE Trans. Smart Grid, 2010, 1, (1), pp. 4047.
        . IEEE Trans. Smart Grid , 1 , 40 - 47
    25. 25)
      • M.T. Heath . (2002)
        25. Heath, M.T.: ‘Scientific computing’ (McGraw-Hill, New York, 2002).
        .
    26. 26)
      • J.M. Lim , C.L. DeMarco .
        26. Lim, J.M., DeMarco, C.L.: ‘Model-free voltage stability assessments via singular value analysis of PMU data’. Bulk Power System Dynamics and Control—IX Optimization, Security and Control of the Emerging Power Grid (IREP), 2013 IREP Symp., August 2013, pp. 110.
        . Bulk Power System Dynamics and Control—IX Optimization, Security and Control of the Emerging Power Grid (IREP), 2013 IREP Symp. , 1 - 10
    27. 27)
      • M. Gavish , D. Donoho .
        27. Gavish, M., Donoho, D.: ‘The optimal hard threshold for singular values is (4/3)’, IEEE Trans. Inf. Theory, 2014, 60, (8), pp. 50405053.
        . IEEE Trans. Inf. Theory , 8 , 5040 - 5053
    28. 28)
      • G. Golub , W. Kahan .
        28. Golub, G., Kahan, W.: ‘Calculating the singular values and pseudo-inverse of a matrix’, J. Soc. Ind. Appl. Math. B Numer. Anal., 1965, 2, (2), pp. 205224.
        . J. Soc. Ind. Appl. Math. B Numer. Anal. , 2 , 205 - 224
    29. 29)
      • M. Hong , C.-C. Liu .
        29. Hong, M., Liu, C.-C.: ‘Complete controllability of power system dynamics’. The 2000 IEEE Int. Symp. Circuits and Systems, 2000, vol. 4, pp. 241244.
        . The 2000 IEEE Int. Symp. Circuits and Systems , 241 - 244
    30. 30)
      • R.B. Bobba , K.M. Rogers , Q. Wang .
        30. Bobba, R.B., Rogers, K.M., Wang, Q., et al: ‘Detecting false data injection attacks on dc state estimation’. Preprints of the First Workshop on Secure Control Systems, CPSWEEK, 2010.
        . Preprints of the First Workshop on Secure Control Systems, CPSWEEK
    31. 31)
      • J. Chen , A. Abur .
        31. Chen, J., Abur, A.: ‘Placement of PMUs to enable bad data detection in state estimation’, IEEE Trans. Power Syst., 2006, 21, (4), pp. 16081615.
        . IEEE Trans. Power Syst. , 4 , 1608 - 1615
    32. 32)
      • G. Peters , J.H. Wilkinson .
        32. Peters, G., Wilkinson, J.H.: ‘The least squares problem and pseudo-inverses’, Comput. J., 1970, 13, (3), pp. 309316.
        . Comput. J. , 3 , 309 - 316
    33. 33)
      • 33. United States Department of Defense: ‘Trusted computer system evaluation criteria (orange book)’, Technical Report1985.
        .
    34. 34)
      • P.J. Rousseeuw .
        34. Rousseeuw, P.J.: ‘Silhouettes: a graphical aid to the interpretation and validation of cluster analysis’, J. Comput. Appl. Math., 1987, 20, pp. 5365.
        . J. Comput. Appl. Math. , 53 - 65
    35. 35)
      • 35. CyPSA Team, Information Trust Institute, University of Illinois: ‘Cypsa open source release’, https://github.com/bigezy/Armadillo, 2016.
        .
    36. 36)
      • G. Hug-Glanzmann , G. Andersson .
        36. Hug-Glanzmann, G., Andersson, G.: ‘Decentralized optimal power flow control for overlapping areas in power systems’, IEEE Trans. Power Syst., 2009, 24, (1), pp. 327336.
        . IEEE Trans. Power Syst. , 1 , 327 - 336
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2017.0014
Loading

Related content

content/journals/10.1049/iet-cps.2017.0014
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address