Smart Cyber-Attack Diagnosis and Mitigation in a Wind Farm Network Operator

被引:13
作者
Badihi, Hamed [1 ]
Jadidi, Saeedreza [2 ]
Yu, Ziquan [1 ]
Zhang, Youmin [2 ]
Lu, Ningyun [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Automat Engn, Nanjing 211106, Peoples R China
[2] Concordia Univ, Dept Mech Ind & Aerosp Engn, Montreal, PQ H3G1M8, Canada
基金
加拿大自然科学与工程研究理事会; 中国国家自然科学基金;
关键词
Cyberattack; fuzzy modeling and identification (FMI); intrusion detection; wind farm; wind turbine; SECURITY; MODEL;
D O I
10.1109/TII.2022.3228686
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rise of wind energy production in global power generation, wind farm facilities are becoming increasingly attractive targets for malicious attacks, in particular those affecting wind farm network operators' cybersubsystems and functionalities. Given the significance of this problem, this article proposes a novel anomaly-based intrusion detection and diagnosis system to carry out in-line monitoring as with firewalls. Also, an innovative cyberattack-resilient active power control is designed to responsively mitigate the impacts of cyberattacks on the safe regulation of active power from wind farms. An offshore wind farm benchmark is used to implement and demonstrate the effectiveness of the proposed solutions in the presence of wind turbulences, measurement noises and realistic smart cyberattack scenarios.
引用
收藏
页码:9468 / 9478
页数:11
相关论文
共 20 条
  • [1] An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
    Almalawi, Abdulmohsen
    Yu, Xinghuo
    Tari, Zahir
    Fahad, Adil
    Khalil, Ibrahim
    [J]. COMPUTERS & SECURITY, 2014, 46 : 94 - 110
  • [2] Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks
    Amin, Saurabh
    Litrico, Xavier
    Sastry, Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1963 - 1970
  • [3] [Anonymous], 1998, INT SER INTELL TECHN
  • [4] Axelsson S, 2000, INTRUSION DETECTION
  • [5] Blake S., 2019, 1 OF A KIND US GRID
  • [6] A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems
    Cruz, Tiago
    Rosa, Luis
    Proenca, Jorge
    Maglaras, Leandros
    Aubigny, Matthieu
    Lev, Leonid
    Jiang, Jianmin
    Simoes, Paulo
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (06) : 2236 - 2246
  • [7] Cyber-physical attacks and defences in the smart grid: a surveyInspec keywordsOther keywords
    He, Haibo
    Yan, Jun
    [J]. IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2016, 1 (01) : 13 - 27
  • [8] Jun Yan, 2011, 2011 3rd International Conference on Computer Research and Development (ICCRD 2011), P1, DOI 10.1109/ICCRD.2011.5764232
  • [9] An Investigation on Feasibility and Security for Cyberattacks on Generator Synchronization Process
    Kandasamy, Nandha Kumar
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) : 5825 - 5834
  • [10] On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
    Mo, Yilin
    Sinopoli, Bruno
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (09) : 2618 - 2624