Showing 1–2 of 2 results for author: Masum, R
-
Trajectory Synthesis for a UAV Swarm to Perform Resilient Requirement-Aware Surveillance: A Smart Grid-based Study
Authors:
M. Ashiqur Rahman,
Rahat Masum,
Matthew Anderson,
Steven L. Drager
Abstract:
A smart grid is a widely distributed engineering system with overhead transmission lines. Physical damage to these power lines, from natural calamities or technical failures, will disrupt the functional integrity of the grid. To ensure the continuation of the grid's operational flow when those phenomena happen, the grid operator must immediately take steps to nullify the impacts and repair the pro…
▽ More
A smart grid is a widely distributed engineering system with overhead transmission lines. Physical damage to these power lines, from natural calamities or technical failures, will disrupt the functional integrity of the grid. To ensure the continuation of the grid's operational flow when those phenomena happen, the grid operator must immediately take steps to nullify the impacts and repair the problems, even if those occur in hardly-reachable remote areas. Emerging unmanned aerial vehicles (UAVs) show great potential to replace traditional human patrols for regularly monitoring critical situations involving the safety of the grid. The critical lines can be monitored by a fleet of UAVs to ensure a resilient surveillance system. The proposed approach considers the \textit{n}-1 contingency analysis to find the criticality of a transmission line. We propose a formal framework that verifies whether a given set of UAVs (i.e., a UAV swarm) can perform continuous surveillance of the grid satisfying various requirements, particularly the monitoring and resiliency specifications. The verification process ultimately provides a trajectory plan for the UAVs, including the refueling schedules. The resiliency requirement of inspecting a point on a line is expressed in terms of a $k-$property specifying that if $k$ UAVs fail or compromised still there is a UAV to collect the data at the point within on time. We evaluate the proposed framework on synthetic data based on various IEEE test bus systems.
△ Less
Submitted 3 November, 2019;
originally announced November 2019.
-
Novel Attacks against Contingency Analysis in Power Grids
Authors:
Mohammad Ashiqur Rahman,
Md Hasan Shahriar,
Mohamadsaleh Jafari,
Rahat Masum
Abstract:
Contingency Analysis (CA) is a core component of the Energy Management System (EMS) in the power grid. The goal of CA is to operate the power system in a secure manner by analyzing the system subject to a contingency (e.g., the outage of a transmission line or a power generator) to determine the setpoints that will allow system operation without violation of constraints. The analysis in CA is cond…
▽ More
Contingency Analysis (CA) is a core component of the Energy Management System (EMS) in the power grid. The goal of CA is to operate the power system in a secure manner by analyzing the system subject to a contingency (e.g., the outage of a transmission line or a power generator) to determine the setpoints that will allow system operation without violation of constraints. The analysis in CA is conducted based on the output from State Estimation (SE), another core EMS module. However, it is also shown that an adversary can alter certain power measurements to corrupt the system states estimated by SE without being detected. Such a corrupted estimation can severely skew the results of the contingency analysis as it will provide a fake model to deal with. In this research, we formally model necessary interdependency relationships and systematically analyze these novel attacks on the contingency analysis. In particular, this research focuses on Security Constrained Optimal Power Flow (SCOPF) that finds out the optimal economic dispatches considering a single line failure (based on the $n - 1$ contingency analysis) and transmission line capacities. The proposed model is implemented and solved to find out potential threat vectors (i.e., a set of measurements to be altered) that can evade CA so that the system will face overloading situation on one or more transmission lines when some specific contingencies happen. We demonstrate our formal model on an IEEE 14 bus system-based case study and verify the results with a standard PowerWorld model. We further evaluate the model with respect to various attacks and grid characteristics.
△ Less
Submitted 3 November, 2019;
originally announced November 2019.