An Efficient Method for Available Transfer Capability Calculation Considering Cyber-Attacks in Power Systems

被引:1
|
作者
Eidiani, Mostafa [1 ]
Zeynal, Hossein [2 ]
Zakaria, Zuhaina [3 ]
机构
[1] Khorasan Inst Higher Educ Mashhad, Dept Elect Engn, Mashhad, Iran
[2] Buein Zahra Tech Univ Buein Zahra, Dept Elect & Comp, Qazvin, Iran
[3] Univ Teknol MARA, Sch Elect Engn, Shah Alam 40450, Malaysia
来源
2023 IEEE 3RD INTERNATIONAL CONFERENCE IN POWER ENGINEERING APPLICATIONS, ICPEA | 2023年
关键词
Cyberattack; State Estimation; DIgSILENT Power Factory; Available Transfer Capability; SCADA; DATA INJECTION ATTACKS;
D O I
10.1109/ICPEA56918.2023.10093168
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
At this work, the impact of cyberattacks in power system Available Transfer Capability (ATC) solution is investigated using DIgSILENT Power factory software. Based on the literature, there reported several power network blackouts that caused by hackers and the Stuxnet worm in Ukraine, which exhibited that power systems are quite vulnerable to widespread and integrated cyberattacks. As a result, power market clearing mechanism and ATC solution can no longer be reliable if hackers possess enough information to manipulate input data. Instead of using complex methods to detect information manipulation in state estimation programs, this paper uses the weakness of the program when the correct information is entered. To end the evaluations, the proposed cyber-aware ATC algorithm is tested on a realistic utility network. Based on the simulation results, in spite of improvement in state estimation execution time, the quickness of ATC calculation is somewhat heightened when applying the proposed method of weighted least squares.
引用
收藏
页码:127 / 130
页数:4
相关论文
共 50 条
  • [21] A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems
    Mohan, Athira M.
    Meskin, Nader
    Mehrjerdi, Hasan
    ENERGIES, 2020, 13 (15)
  • [22] Modeling cyber-attacks on Industrial Control Systems
    Paliath, Vivin
    Shakarian, Paulo
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 316 - 318
  • [23] Cyber-attacks on health-care systems
    Devi, Sharmila
    LANCET ONCOLOGY, 2023, 24 (04): : 148 - 148
  • [24] TAXONOMY OF SEVERITY OF CYBER-ATTACKS IN CYBER-MANUFACTURING SYSTEMS
    Espinoza-Zelaya, Carlos
    Moon, Young
    PROCEEDINGS OF ASME 2022 INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, IMECE2022, VOL 2B, 2022,
  • [25] New Iterative Method for Available Transfer Capability Calculation
    Patel, M. Y.
    Girgis, A. A.
    2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2011,
  • [26] Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy
    Su, Qingyu
    Wang, Handong
    Sun, Chaowei
    Li, Bo
    Li, Jian
    APPLIED MATHEMATICS AND COMPUTATION, 2022, 413
  • [27] Secure SCADA Communication Network for Detecting and Preventing Cyber-Attacks on Power Systems
    Chalamasetty, Goutham K.
    Mandal, Paras
    Tseng, Tzu-Liang
    2016 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2016,
  • [28] Calculation of available transfer capability considering voltage stability and transient stability
    Wang, Jun
    Cai, Xingguo
    Zhang, Zhan'an
    Dianwang Jishu/Power System Technology, 2011, 35 (10): : 88 - 93
  • [29] Available transfer capability calculation considering generation bidding in electricity market
    Northeast Dianli University, Jilin 132012, China
    Zhongguo Dianji Gongcheng Xuebao, 2006, 8 (18-22):
  • [30] Detection and Mitigation of Cyber-Attacks on AGC Systems of Low Inertia Power Grid
    Roy, Siddhartha Deb
    Debbarma, Sanjoy
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 2023 - 2031