Journal article 316 views
Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems
IEEE Transactions on Smart Grid, Volume: 12, Issue: 5, Pages: 4415 - 4425
Swansea University Author: Sondipon Adhikari
Full text not available from this repository: check for access using links below.
DOI (Published version): 10.1109/tsg.2021.3070313
Abstract
Recent research has shown that large-scale Internet of Things (IoT)-based load altering attacks can have a serious impact on power grid operations such as causing unsafe frequency excursions and destabilizing the grid’s control loops. In this work, we present an analytical framework to investigate t...
Published in: | IEEE Transactions on Smart Grid |
---|---|
ISSN: | 1949-3053 1949-3061 |
Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2021
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa56703 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract: |
Recent research has shown that large-scale Internet of Things (IoT)-based load altering attacks can have a serious impact on power grid operations such as causing unsafe frequency excursions and destabilizing the grid’s control loops. In this work, we present an analytical framework to investigate the impact of IoT-based static/dynamic load altering attacks (S/DLAAs) on the power grid’s dynamic response. Existing work on this topic has mainly relied on numerical simulations and, to date, there is no analytical framework to identify the victim nodes from which that attacker can launch the most impactful attacks. To address these shortcomings, we use results from second-order dynamical systems to analyze the power grid frequency control loop under S/DLAAs. We use parametric sensitivity of the system’s eigensolutions to identify victim nodes that correspond to the least-effort destabilizing DLAAs. Further, to analyze the SLAAs, we present closed-form expression for the system’s frequency response in terms of the attacker’s inputs, helping us characterize the minimum load change required to cause unsafe frequency excursions. Using these results, we formulate the defense against S/DLAAs as a linear programming problem in which we determine the minimum amount of load that needs to be secured at the victim nodes to ensure system safety/stability. Extensive simulations conducted using benchmark IEEE-bus systems validate the accuracy and efficacy of our approach. |
---|---|
College: |
Faculty of Science and Engineering |
Issue: |
5 |
Start Page: |
4415 |
End Page: |
4425 |