impact of signal delay attack on voltage control for
play

Impact of Signal Delay Attack on Voltage Control for Electrified - PowerPoint PPT Presentation

Impact of Signal Delay Attack on Voltage Control for Electrified Railways Hoang Hai Nguyen 1 Rui Tan 1 David K. Y. Yau 1,2 1 Advanced Digital Sciences Center (Singapore), University of Illinois at Urbana-Champaign 2 Singapore University of


  1. Impact of Signal Delay Attack on Voltage Control for Electrified Railways Hoang Hai Nguyen 1 Rui Tan 1 David K. Y. Yau 1,2 1 Advanced Digital Sciences Center (Singapore), University of Illinois at Urbana-Champaign 2 Singapore University of Technology and Design

  2. Motivation 3 rd largest cluster of cyber-physical attacks 3 largest cluster of cyber-physical attacks 2014 Moscow derailment 2014 Moscow derailment [U.S. CERT / ICS-CERT, 2013] [Image from USNews] • Cyber-attacks on industrial control systems – Dragonfly, Stuxnet – 11 transportation intrusions in 2013 • Voltage control in traction power systems – Cybernated, safety-critical – Voltage drop before Moscow derailment https://ics-cert.us-cert.gov/sites/default/files/ICS-CERT_Monitor_April-June2013_3.pdf

  3. Background • AC traction power systems – Up to 50 kV – Substations connected to utility grid or dedicated power grid • Large voltage fluctuations – Trains: moving loads – De-accelerating trains: moving generators – Train shift between sections causes step change – Train shift between sections causes step change

  4. Background • AC traction power systems – Up to 50 kV – Substations connected to utility grid or dedicated power grid • Large voltage fluctuations – Trains: moving loads – De-accelerating trains: moving generators – Train shift between sections causes step change – Train shift between sections causes step change Centralized Generators or Traction power Changing power controller transformers grid consumption of trains Comm. Voltage networks sensors

  5. Voltage Control • State-space model for multi-bus power grid x [ k ] ≈ x [ k − 1] + Cu [ k ] + B ( q [ k ] − q [ k − 1])

  6. Voltage Control • State-space model for multi-bus power grid x [ k ] ≈ x [ k − 1] + Cu [ k ] + B ( q [ k ] − q [ k − 1]) substation generator/transformer substation reactive voltages voltages power draws

  7. Voltage Control • State-space model for multi-bus power grid x [ k ] ≈ x [ k − 1] + Cu [ k ] + B ( q [ k ] − q [ k − 1]) substation generator/transformer substation reactive voltages voltages power draws – Maintain x at nominal x 0 when q changes

  8. Voltage Control • State-space model for multi-bus power grid x [ k ] ≈ x [ k − 1] + Cu [ k ] + B ( q [ k ] − q [ k − 1]) substation generator/transformer substation reactive voltages voltages power draws – Maintain x at nominal x 0 when q changes • Control algorithm u [ k ] = α C − 1 ( x 0 − x [ k ]) – BIBO stable if 0 < α < 2 – Similar controls applied in practice

  9. Signal Delay Attack Centralized Generators or Traction power Changing power controller transformers grid consumption of trains Comm. Voltage networks networks sensors sensors • Controller uses old voltage measurements u [k] = α C -1 ( x 0 – x [k – τ])

  10. Signal Delay Attack Centralized Generators or Traction power Changing power controller transformers grid consumption of trains Comm. Voltage networks networks sensors sensors • Controller uses old voltage measurements u [k] = α C -1 ( x 0 – x [k – τ]) – Network congestion, time desynchronization – Easier than data integrity attacks

  11. Impact of Attack on Stability • System state transform [ ] y [ ] x [ ] x , x [ 1 ] x , , x [ ] x = − − − − τ − n n n n L 0 0 0 – New state transition model I 0 0 0 I − α   L     I I 0 0 0 0 0 0 0 0 L L   y [ 1 ] G y [ ] G  0 I 0 0 0  + = ⋅ = n n L   M M M O M M     0 0 0 I 0 L   • G’s characteristic polynomial τ + 1 τ 0 λ − λ + α = – Stable: All roots in unit circle of complex plane

  12. Impact of Attack on Stability • System state transform [ ] y [ ] x [ ] x , x [ 1 ] x , , x [ ] x = − − − − τ − n n n n L 0 0 0 – New state transition model I 0 0 0 I − α   L     I I 0 0 0 0 0 0 0 0 L L   y [ 1 ] G y [ ] G  0 I 0 0 0  + = ⋅ = n n L   M M M O M M     0 0 0 I 0 L   • G’s characteristic polynomial u [n] = α C -1 ( x 0 – x [n – τ]) τ + 1 τ 0 λ − λ + α = – Stable: All roots in unit circle of complex plane

  13. Stable Region • λ τ+1 – λ τ + α = 0 – No closed-form solutions – Jury test of α Stable region of Malicious time delay τ

  14. Stable Region • λ τ+1 – λ τ + α = 0 – No closed-form solutions – Jury test of α Stable region of When no attack • Faster convergence • Smaller fluctuation Malicious time delay τ

  15. Stable Region • λ τ+1 – λ τ + α = 0 – No closed-form solutions – Jury test of α Stable region of When no attack • Faster convergence • Smaller fluctuation Malicious time delay τ Trade-off btw control performance and tolerable malicious delay

  16. An Example • PowerWorld simulations – 37-bus power system – 10 feeder buses under voltage control α=0.8 Voltage Voltage α=0.2 α=0.2 deviation (p.u.) No attack α=0.8 Voltage deviation (p.u.) τ = 2 α=0.2 Time step k

  17. Analysis Verification • Approximations in system modeling – Affect accuracy of stability analysis Stable region of α By Jury test By simulations Malicious time delay τ

  18. Summary and Future Work • Stability condition of voltage control under signal delay attack • Trade-off between – Voltage convergence speed when no attack – Voltage convergence speed when no attack – Tolerable time delay in terms of stability • Future work – Other voltage control approaches – Attack mitigation

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend