-
Modeling and Rapid Prototyping of Integrated Transmission-Distribution OPF Formulations with PowerModelsITD.jl
Authors:
Juan Ospina,
David M. Fobes,
Russell Bent,
Andreas Wächter
Abstract:
Conventional electric power systems are composed of different unidirectional power flow stages of generation, transmission, and distribution, managed independently by transmission system and distribution system operators. However, as distribution systems increase in complexity due to the integration of distributed energy resources, coordination between transmission and distribution networks will b…
▽ More
Conventional electric power systems are composed of different unidirectional power flow stages of generation, transmission, and distribution, managed independently by transmission system and distribution system operators. However, as distribution systems increase in complexity due to the integration of distributed energy resources, coordination between transmission and distribution networks will be imperative for the optimal operation of the power grid. However, coupling models and formulations between transmission and distribution is non-trivial, in particular due to the common practice of modeling transmission systems as single-phase, and distribution systems as multi-conductor phase-unbalanced. To enable the rapid prototyping of power flow formulations, in particular in the modeling of the boundary conditions between these two seemingly incompatible data models, we introduce PowerModelsITD.jl, a free, open-source toolkit written in Julia for integrated transmission-distribution (ITD) optimization that leverages mature optimization libraries from the InfrastructureModels.jl-ecosystem. The primary objective of the proposed framework is to provide baseline implementations of steady-state ITD optimization problems, while providing a common platform for the evaluation of emerging formulations and optimization problems. In this work, we introduce the nonlinear formulations currently supported in PowerModelsITD.jl, which include AC-polar, AC-rectangular, current-voltage, and a linear network transportation model. Results are validated using combinations of IEEE transmission and distribution networks.
△ Less
Submitted 28 October, 2022;
originally announced October 2022.
-
CPES-QSM: A Quantitative Method Towards the Secure Operation of Cyber-Physical Energy Systems
Authors:
Juan Ospina,
Venkatesh Venkataramanan,
Charalambos Konstantinou
Abstract:
Power systems are evolving into cyber-physical energy systems (CPES) due to the integration of modern communication and Internet-of-Things (IoT) devices. CPES security evaluation is challenging since the physical and cyber layers are often not considered holistically. Existing literature focuses on only optimizing the operation of either the physical or cyber layer while ignoring the interactions…
▽ More
Power systems are evolving into cyber-physical energy systems (CPES) due to the integration of modern communication and Internet-of-Things (IoT) devices. CPES security evaluation is challenging since the physical and cyber layers are often not considered holistically. Existing literature focuses on only optimizing the operation of either the physical or cyber layer while ignoring the interactions between them. This paper proposes a metric, the Cyber-Physical Energy System Quantitative Security Metric (CPES-QSM), that quantifies the interaction between the cyber and physical layers across three domains: electrical, cyber-risk, and network topology. A method for incorporating the proposed cyber-metric into operational decisions is also proposed by formulating a cyber-constrained AC optimal power flow (C-ACOPF) that considers the status of all the CPES layers. The cyber-constrained ACOPF considers the vulnerabilities of physical and cyber networks by incorporating factors such as voltage stability, contingencies, graph-theory, and IoT cyber risks, while using a multi-criteria decision-making technique. Simulation studies are conducted using standard IEEE test systems to evaluate the effectiveness of the proposed metric and the C-ACOPF formulation.
△ Less
Submitted 26 September, 2022; v1 submitted 7 June, 2022;
originally announced June 2022.
-
Load-Altering Attacks Against Power Grids under COVID-19 Low-Inertia Conditions
Authors:
Subhash Lakshminarayana,
Juan Ospina,
Charalambos Konstantinou
Abstract:
The COVID-19 pandemic has impacted our society by forcing shutdowns and shifting the way people interacted worldwide. In relation to the impacts on the electric grid, it created a significant decrease in energy demands across the globe. Recent studies have shown that the low demand conditions caused by COVID-19 lockdowns combined with large renewable generation have resulted in extremely low-inert…
▽ More
The COVID-19 pandemic has impacted our society by forcing shutdowns and shifting the way people interacted worldwide. In relation to the impacts on the electric grid, it created a significant decrease in energy demands across the globe. Recent studies have shown that the low demand conditions caused by COVID-19 lockdowns combined with large renewable generation have resulted in extremely low-inertia grid conditions. In this work, we examine how an attacker could exploit these {scenarios} to cause unsafe grid operating conditions by executing load-altering attacks (LAAs) targeted at compromising hundreds of thousands of IoT-connected high-wattage loads in low-inertia power systems. Our study focuses on analyzing the impact of the COVID-19 mitigation measures on U.S. regional transmission operators (RTOs), formulating a plausible and realistic least-effort LAA targeted at transmission systems with low-inertia conditions, and evaluating the probability of these large-scale LAAs. Theoretical and simulation results are presented based on the WSCC 9-bus {and IEEE 118-bus} test systems. Results demonstrate how adversaries could provoke major frequency disturbances by targeting vulnerable load buses in low-inertia systems and offer insights into how the temporal fluctuations of renewable energy sources, considering generation scheduling, impact the grid's vulnerability to LAAs.
△ Less
Submitted 28 February, 2022; v1 submitted 25 January, 2022;
originally announced January 2022.
-
Faster than Real-Time Simulation: Methods, Tools, and Applications
Authors:
XiaoRui Liu,
Juan Ospina,
Ioannis Zografopoulos,
Alonzo Russell,
Charalambos Konstantinou
Abstract:
Real-time simulation enables the understanding of system operating conditions by evaluating simulation models of physical components running synchronized at the real-time wall clock. Leveraging the real-time measurements of comprehensive system models, faster than real-time (FTRT) simulation allows the evaluation of system architectures at speeds faster than real-time. FTRT simulation can assist i…
▽ More
Real-time simulation enables the understanding of system operating conditions by evaluating simulation models of physical components running synchronized at the real-time wall clock. Leveraging the real-time measurements of comprehensive system models, faster than real-time (FTRT) simulation allows the evaluation of system architectures at speeds faster than real-time. FTRT simulation can assist in predicting the system's behavior efficiently, thus assisting the operation of system processes. Namely, the provided acceleration can be used for improving system scheduling, assessing system vulnerabilities, and predicting system disruptions in real-time systems. The acceleration of simulation times can be achieved by utilizing digital real-time simulators (RTS) and high-performance computing (HPC) architectures. FTRT simulation has been widely used, among others, for the operation, design, and investigation of power system events, building emergency management plans, wildfire prediction, etc. In this paper, we review the existing literature on FTRT simulation and its applications in different disciplines, with a particular focus on power systems. We present existing system modeling approaches, simulation tools and computing frameworks, and stress the importance of FTRT accuracy.
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies
Authors:
Ioannis Zografopoulos,
Juan Ospina,
XiaoRui Liu,
Charalambos Konstantinou
Abstract:
Cyber-physical systems (CPS) are interconnected architectures that employ analog, digital, and communication resources for their interaction with the physical environment. CPS are the backbone of enterprise, industrial, and critical infrastructure. Thus, their vital importance makes them prominent targets for malicious attacks aiming to disrupt their operations. Attacks targeting cyber-physical en…
▽ More
Cyber-physical systems (CPS) are interconnected architectures that employ analog, digital, and communication resources for their interaction with the physical environment. CPS are the backbone of enterprise, industrial, and critical infrastructure. Thus, their vital importance makes them prominent targets for malicious attacks aiming to disrupt their operations. Attacks targeting cyber-physical energy systems (CPES), given their mission-critical nature, can have disastrous consequences. The security of CPES can be enhanced leveraging testbed capabilities to replicate power system operations, discover vulnerabilities, develop security countermeasures, and evaluate grid operation under fault-induced or maliciously constructed scenarios. In this paper, we provide a comprehensive overview of the CPS security landscape with emphasis on CPES. Specifically, we demonstrate a threat modeling methodology to accurately represent the CPS elements, their interdependencies, as well as the possible attack entry points and system vulnerabilities. Leveraging the threat model formulation, we present a CPS framework designed to delineate the hardware, software, and modeling resources required to simulate the CPS and construct high-fidelity models which can be used to evaluate the system's performance under adverse scenarios. The system performance is assessed using scenario-specific metrics, while risk assessment enables system vulnerability prioritization factoring the impact on the system operation. The overarching framework for modeling, simulating, assessing, and mitigating attacks in a CPS is illustrated using four representative attack scenarios targeting CPES. The key objective of this paper is to demonstrate a step-by-step process that can be used to enact in-depth cybersecurity analyses, thus leading to more resilient and secure CPS.
△ Less
Submitted 19 February, 2021; v1 submitted 25 January, 2021;
originally announced January 2021.
-
On the Feasibility of Load-Changing Attacks in Power Systems during the COVID-19 Pandemic
Authors:
Juan Ospina,
XiaoRui Liu,
Charalambos Konstantinou,
Yury Dvorkin
Abstract:
The electric power grid is a complex cyberphysical energy system (CPES) in which information and communication technologies (ICT) are integrated into the operations and services of the power grid infrastructure. The growing number of Internet-of-things (IoT) high-wattage appliances, such as air conditioners and electric vehicles, being connected to the power grid, together with the high dependence…
▽ More
The electric power grid is a complex cyberphysical energy system (CPES) in which information and communication technologies (ICT) are integrated into the operations and services of the power grid infrastructure. The growing number of Internet-of-things (IoT) high-wattage appliances, such as air conditioners and electric vehicles, being connected to the power grid, together with the high dependence of ICT and control interfaces, make CPES vulnerable to high-impact, low-probability load-changing cyberattacks. Moreover, the side-effects of the COVID-19 pandemic demonstrate a modification of electricity consumption patterns with utilities experiencing significant net-load and peak reductions. These unusual sustained low load demand conditions could be leveraged by adversaries to cause frequency instabilities in CPES by compromising hundreds of thousands of IoT-connected high-wattage loads. This paper presents a feasibility study of the impacts of load-changing attacks on CPES during the low loading conditions caused by the lockdown measures implemented during the COVID-19 pandemic. The load demand reductions caused by the lockdown measures are analyzed using dynamic mode decomposition (DMD), focusing on the March-to-July 2020 period and the New York region as the most impacted time period and location in terms of load reduction due to the lockdowns being in full execution. Our feasibility study evaluates load-changing attack scenarios using real load consumption data from the New York Independent System Operator (NYISO) and shows that an attacker with sufficient knowledge and resources could be capable of producing frequency stability problems, with frequency excursions going up to 60.5 Hz and 63.4 Hz, when no mitigation measures are taken.
△ Less
Submitted 23 December, 2020; v1 submitted 19 November, 2020;
originally announced November 2020.
-
Harness the Power of DERs for Secure Communications in Electric Energy Systems
Authors:
Ioannis Zografopoulos,
Juan Ospina,
Charalambos Konstantinou
Abstract:
Electric energy systems are undergoing significant changes to improve system reliability and accommodate increasing power demands. The penetration of distributed energy resources (DERs) including roof-top solar panels, energy storage, electric vehicles, etc., enables the on-site generation of economically dispatchable power curtailing operational costs. The effective control of DERs requires commu…
▽ More
Electric energy systems are undergoing significant changes to improve system reliability and accommodate increasing power demands. The penetration of distributed energy resources (DERs) including roof-top solar panels, energy storage, electric vehicles, etc., enables the on-site generation of economically dispatchable power curtailing operational costs. The effective control of DERs requires communication between utilities and DER system operators. The communication protocols employed for DER management and control lack sophisticated cybersecurity features and can compromise power systems secure operation if malicious control commands are issued to DERs. To overcome authentication-related protocol issues, we present a bolt-on security extension that can be implemented on Distributed Network Protocol v3 (DNP3). We port an authentication framework, DERauth, into DNP3, and utilize real-time measurements from a simulated DER battery energy storage system to enhance communication security. We evaluate our framework in a testbed setup using DNP3 master and outstation devices performing secure authentication by leveraging the entropy of DERs.
△ Less
Submitted 15 September, 2020;
originally announced September 2020.
-
Modeling Communication Networks in a Real-Time Simulation Environment for Evaluating Controls of Shipboard Power Systems
Authors:
Colin Ogilvie,
Juan Ospina,
Charalambos Konstantinou,
Tuyen Vu,
Mark Stanovich,
Karl Schoder,
Mischa Steurer
Abstract:
Interest by the U.S. Navy in the development and deployment of advanced controls in future shipboard platforms has motivated the development of the Controls Evaluation Framework (CEF) for use in investigating dynamics present in complex automated systems. This paper reports on the implementation and investigation of a communication network component within the CEF. This implementation is designed…
▽ More
Interest by the U.S. Navy in the development and deployment of advanced controls in future shipboard platforms has motivated the development of the Controls Evaluation Framework (CEF) for use in investigating dynamics present in complex automated systems. This paper reports on the implementation and investigation of a communication network component within the CEF. This implementation is designed to augment the CEF's available feature set, permitting the exploration of various communication conditions on advanced control performance. Results obtained from controller hardware-in-the-loop testing are presented and analyzed to demonstrate performance characteristics pertaining to the implemented module.
△ Less
Submitted 15 August, 2020;
originally announced August 2020.
-
Deep Reinforcement Learning for Cybersecurity Assessment of Wind Integrated Power Systems
Authors:
XiaoRui Liu,
Juan Ospina,
Charalambos Konstantinou
Abstract:
The integration of renewable energy sources (RES) is rapidly increasing in electric power systems (EPS). While the inclusion of intermittent RES coupled with the wide-scale deployment of communication and sensing devices is important towards a fully smart grid, it has also expanded the cyber-threat landscape, effectively making power systems vulnerable to cyberattacks. This paper proposes a cybers…
▽ More
The integration of renewable energy sources (RES) is rapidly increasing in electric power systems (EPS). While the inclusion of intermittent RES coupled with the wide-scale deployment of communication and sensing devices is important towards a fully smart grid, it has also expanded the cyber-threat landscape, effectively making power systems vulnerable to cyberattacks. This paper proposes a cybersecurity assessment approach designed to assess the cyberphysical security of EPS. The work takes into consideration the intermittent generation of RES, vulnerabilities introduced by microprocessor-based electronic information and operational technology (IT/OT) devices, and contingency analysis results. The proposed approach utilizes deep reinforcement learning (DRL) and an adapted Common Vulnerability Scoring System (CVSS) score tailored to assess vulnerabilities in EPS in order to identify the optimal attack transition policy based on N-2 contingency results, i.e., the simultaneous failure of two system elements. The effectiveness of the work is validated via numerical and real-time simulation experiments performed on literature-based power grid test cases. The results demonstrate how the proposed method based on deep Q-network (DQN) performs closely to a graph-search approach in terms of the number of transitions needed to find the optimal attack policy, without the need for full observation of the system. In addition, the experiments present the method's scalability by showcasing the number of transitions needed to find the optimal attack transition policy in a large system such as the Polish 2383 bus test system. The results exhibit how the proposed approach requires one order of magnitude fewer transitions when compared to a random transition policy.
△ Less
Submitted 14 November, 2020; v1 submitted 6 July, 2020;
originally announced July 2020.
-
Embedded Model Control approach to robust control
Authors:
Enrico Canuto,
Wilber Acuna-Bravo,
Andrés Molano-Jimenez,
José Ospina,
Carlos Perez-Montenegro
Abstract:
Robust control design is mainly devoted to guarantee closed-loop stability of a model-based control law in presence of parametric and structural uncertainties. The control law is usually a complex feedback law which is derived from a (nonlinear) model, possibly complemented with some mathematical envelope of the model uncertainty. Stability may be guarantee with the help of some ignorance coeffici…
▽ More
Robust control design is mainly devoted to guarantee closed-loop stability of a model-based control law in presence of parametric and structural uncertainties. The control law is usually a complex feedback law which is derived from a (nonlinear) model, possibly complemented with some mathematical envelope of the model uncertainty. Stability may be guarantee with the help of some ignorance coefficients and restricting the feedback control effort with respect to the model-based design. Embedded Model Control shows that under certain conditions, the model-based control law must and can be kept intact under uncertainty, if the controllable dynamics is complemented by a suitable disturbance dynamics capable of real-time encoding the different uncertainties affecting the 'embedded model', i.e. the model which is both the design source and the core of the control unit. To be real-time updated the disturbance state is driven by an unpredictable input vector, called noise, which can be only estimated from the model error. The uncertainty (or plant)-based design concerns the noise estimator, as the model error may convey into the embedded model uncertainty components (parametric, cross-coupling, neglected dynamics) which are command-dependent and thus prone to destabilize the controlled plant. Separation of the components into the low and high frequency domain by the noise estimator allows to recover and guarantee stability, and to cancel the low frequency ones from the plant. Among the advantages, control algorithms are neatly and univocally related to the embedded model, the embedded model provides a real-time image of the plant, all control gains are tuned by fixing closed-loop eigenvalues. Last but not least, the resulting control unit has modular structure and algorithms, thus facilitating coding. A simulated case study helps to understand the key assets of the methodology.
△ Less
Submitted 11 August, 2011;
originally announced August 2011.