Journal article 316 views
Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems
IEEE Transactions on Smart Grid, Volume: 12, Issue: 5, Pages: 4415 - 4425
Swansea University Author: Sondipon Adhikari
Full text not available from this repository: check for access using links below.
DOI (Published version): 10.1109/tsg.2021.3070313
Abstract
Recent research has shown that large-scale Internet of Things (IoT)-based load altering attacks can have a serious impact on power grid operations such as causing unsafe frequency excursions and destabilizing the grid’s control loops. In this work, we present an analytical framework to investigate t...
Published in: | IEEE Transactions on Smart Grid |
---|---|
ISSN: | 1949-3053 1949-3061 |
Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2021
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa56703 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
first_indexed |
2021-04-20T07:47:15Z |
---|---|
last_indexed |
2021-09-24T03:19:50Z |
id |
cronfa56703 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2021-09-23T11:55:59.7698569</datestamp><bib-version>v2</bib-version><id>56703</id><entry>2021-04-20</entry><title>Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems</title><swanseaauthors><author><sid>4ea84d67c4e414f5ccbd7593a40f04d3</sid><firstname>Sondipon</firstname><surname>Adhikari</surname><name>Sondipon Adhikari</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2021-04-20</date><deptcode>FGSEN</deptcode><abstract>Recent research has shown that large-scale Internet of Things (IoT)-based load altering attacks can have a serious impact on power grid operations such as causing unsafe frequency excursions and destabilizing the grid’s control loops. In this work, we present an analytical framework to investigate the impact of IoT-based static/dynamic load altering attacks (S/DLAAs) on the power grid’s dynamic response. Existing work on this topic has mainly relied on numerical simulations and, to date, there is no analytical framework to identify the victim nodes from which that attacker can launch the most impactful attacks. To address these shortcomings, we use results from second-order dynamical systems to analyze the power grid frequency control loop under S/DLAAs. We use parametric sensitivity of the system’s eigensolutions to identify victim nodes that correspond to the least-effort destabilizing DLAAs. Further, to analyze the SLAAs, we present closed-form expression for the system’s frequency response in terms of the attacker’s inputs, helping us characterize the minimum load change required to cause unsafe frequency excursions. Using these results, we formulate the defense against S/DLAAs as a linear programming problem in which we determine the minimum amount of load that needs to be secured at the victim nodes to ensure system safety/stability. Extensive simulations conducted using benchmark IEEE-bus systems validate the accuracy and efficacy of our approach.</abstract><type>Journal Article</type><journal>IEEE Transactions on Smart Grid</journal><volume>12</volume><journalNumber>5</journalNumber><paginationStart>4415</paginationStart><paginationEnd>4425</paginationEnd><publisher>Institute of Electrical and Electronics Engineers (IEEE)</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>1949-3053</issnPrint><issnElectronic>1949-3061</issnElectronic><keywords/><publishedDay>1</publishedDay><publishedMonth>9</publishedMonth><publishedYear>2021</publishedYear><publishedDate>2021-09-01</publishedDate><doi>10.1109/tsg.2021.3070313</doi><url/><notes/><college>COLLEGE NANME</college><department>Science and Engineering - Faculty</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>FGSEN</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2021-09-23T11:55:59.7698569</lastEdited><Created>2021-04-20T08:44:20.6134107</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Engineering and Applied Sciences - Uncategorised</level></path><authors><author><firstname>Subhash</firstname><surname>Lakshminarayana</surname><order>1</order></author><author><firstname>Sondipon</firstname><surname>Adhikari</surname><order>2</order></author><author><firstname>Carsten</firstname><surname>Maple</surname><order>3</order></author></authors><documents/><OutputDurs/></rfc1807> |
spelling |
2021-09-23T11:55:59.7698569 v2 56703 2021-04-20 Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems 4ea84d67c4e414f5ccbd7593a40f04d3 Sondipon Adhikari Sondipon Adhikari true false 2021-04-20 FGSEN Recent research has shown that large-scale Internet of Things (IoT)-based load altering attacks can have a serious impact on power grid operations such as causing unsafe frequency excursions and destabilizing the grid’s control loops. In this work, we present an analytical framework to investigate the impact of IoT-based static/dynamic load altering attacks (S/DLAAs) on the power grid’s dynamic response. Existing work on this topic has mainly relied on numerical simulations and, to date, there is no analytical framework to identify the victim nodes from which that attacker can launch the most impactful attacks. To address these shortcomings, we use results from second-order dynamical systems to analyze the power grid frequency control loop under S/DLAAs. We use parametric sensitivity of the system’s eigensolutions to identify victim nodes that correspond to the least-effort destabilizing DLAAs. Further, to analyze the SLAAs, we present closed-form expression for the system’s frequency response in terms of the attacker’s inputs, helping us characterize the minimum load change required to cause unsafe frequency excursions. Using these results, we formulate the defense against S/DLAAs as a linear programming problem in which we determine the minimum amount of load that needs to be secured at the victim nodes to ensure system safety/stability. Extensive simulations conducted using benchmark IEEE-bus systems validate the accuracy and efficacy of our approach. Journal Article IEEE Transactions on Smart Grid 12 5 4415 4425 Institute of Electrical and Electronics Engineers (IEEE) 1949-3053 1949-3061 1 9 2021 2021-09-01 10.1109/tsg.2021.3070313 COLLEGE NANME Science and Engineering - Faculty COLLEGE CODE FGSEN Swansea University 2021-09-23T11:55:59.7698569 2021-04-20T08:44:20.6134107 Faculty of Science and Engineering School of Engineering and Applied Sciences - Uncategorised Subhash Lakshminarayana 1 Sondipon Adhikari 2 Carsten Maple 3 |
title |
Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems |
spellingShingle |
Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems Sondipon Adhikari |
title_short |
Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems |
title_full |
Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems |
title_fullStr |
Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems |
title_full_unstemmed |
Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems |
title_sort |
Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems |
author_id_str_mv |
4ea84d67c4e414f5ccbd7593a40f04d3 |
author_id_fullname_str_mv |
4ea84d67c4e414f5ccbd7593a40f04d3_***_Sondipon Adhikari |
author |
Sondipon Adhikari |
author2 |
Subhash Lakshminarayana Sondipon Adhikari Carsten Maple |
format |
Journal article |
container_title |
IEEE Transactions on Smart Grid |
container_volume |
12 |
container_issue |
5 |
container_start_page |
4415 |
publishDate |
2021 |
institution |
Swansea University |
issn |
1949-3053 1949-3061 |
doi_str_mv |
10.1109/tsg.2021.3070313 |
publisher |
Institute of Electrical and Electronics Engineers (IEEE) |
college_str |
Faculty of Science and Engineering |
hierarchytype |
|
hierarchy_top_id |
facultyofscienceandengineering |
hierarchy_top_title |
Faculty of Science and Engineering |
hierarchy_parent_id |
facultyofscienceandengineering |
hierarchy_parent_title |
Faculty of Science and Engineering |
department_str |
School of Engineering and Applied Sciences - Uncategorised{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Engineering and Applied Sciences - Uncategorised |
document_store_str |
0 |
active_str |
0 |
description |
Recent research has shown that large-scale Internet of Things (IoT)-based load altering attacks can have a serious impact on power grid operations such as causing unsafe frequency excursions and destabilizing the grid’s control loops. In this work, we present an analytical framework to investigate the impact of IoT-based static/dynamic load altering attacks (S/DLAAs) on the power grid’s dynamic response. Existing work on this topic has mainly relied on numerical simulations and, to date, there is no analytical framework to identify the victim nodes from which that attacker can launch the most impactful attacks. To address these shortcomings, we use results from second-order dynamical systems to analyze the power grid frequency control loop under S/DLAAs. We use parametric sensitivity of the system’s eigensolutions to identify victim nodes that correspond to the least-effort destabilizing DLAAs. Further, to analyze the SLAAs, we present closed-form expression for the system’s frequency response in terms of the attacker’s inputs, helping us characterize the minimum load change required to cause unsafe frequency excursions. Using these results, we formulate the defense against S/DLAAs as a linear programming problem in which we determine the minimum amount of load that needs to be secured at the victim nodes to ensure system safety/stability. Extensive simulations conducted using benchmark IEEE-bus systems validate the accuracy and efficacy of our approach. |
published_date |
2021-09-01T04:11:51Z |
_version_ |
1763753812887076864 |
score |
11.012924 |