Enhancing Cyber Security in Power Transmission Networks

undefined
Optimal Power Flow:
Closing the Loop over Corrupted Data
André Teixeira
, Henrik Sandberg, György Dán, and Karl H. Johansson
ACCESS Linnaeus Centre, KTH Royal Institute of Technology
American Control Conference
Montréal, June 28th, 2012
Motivation
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
2
 
Networked control systems are becoming
more pervasive
-
Increasing use of ”open” networks and COTS
 
Infrastructures are becoming more
vulnerable to cyber-threats!
-
Several attack points
 
Nature-driven events are known to have
caused severe disruptions
 
A major concern is the possible impact of
cyber threats on these systems
Power Transmission Networks
Previous work
-
Vulnerabilities of current
SCADA/EMS systems to data
attacks on measurements
Current work
-
Consequences on system
operation: Optimal Power Flow
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
3
SCADA: Supervisory Control and Data Acquisition
Cyber Security of State Estimator
 in Power Networks
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
4
 
State Estimator: estimates the state and unmeasured variables
Bad Data Detector: detects and removes corrupted measurements
 
Can data attacks affect the SE without being detected?
-
Yes! [Liu et al, 2009]
DC Network Model
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
5
Only active power:
-
Similar to a DC resistive
network
Simplifications:
-
-
-
No resistances or shunt
elements
Attacker Model
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
6
 
Corrupted measurements:
 
Attacker’s objectives:
-
Attack is stealthy (undetectable)
-
Target measurements are corrupted
 
Least-effort attacks are more likely
Larger effort     increased security
 
 
-
  : set of stealthy attacks
-
  : set of goals
-
  : set of constraints
   and   are scenario specific
Security Metric for Stealthy Attacks
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
7
 
                 is the security metric for the k-th measurement
-
      is the optimal solution of
 
 
 
-
-
-
 
Minimum number of attacked measurements so that
-
Attack is stealthy
-
Measurement      is corrupted
[Sandberg et al, 2010]
[Sou et al, 2011]
Cyber Security of Optimal Power Flow
 in Power Networks
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
8
 
How do stealthy attacks 
affect
 
the power system’s operation
?
-
Related work: [Xie et al, 2010], [Yuan et al, 2011]
 
Optimal Power Flow
-
Computes  generator setpoints minimizing operation costs
-
Ensures operation constraints
DC-Optimal Power Flow
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
9
 
 
 
$
DC-Optimal Power Flow
Nominal Operation
At optimality, the KKT conditions hold:
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
10
Lagrangian function:
DC-Optimal Power Flow under attack
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
11
DC-Optimal Power Flow under attack
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
12
Assume the attack does not change the active constraints
-
thus              are known
The proposed control action is given by
-
       is an affine map w.r.t
Estimated Re-Dispatch Profit
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
13
 
Consider the corrupted estimates      and
-
          : estimated operation cost
-
          : estimated optimal operation cost given
-
                               : 
estimated re-dispatch profit
Large estimated profit may lead the operator to apply
 
Mismatches between      and      are compensated by slack generators
-
can be modeled as an affine map w.r.t       :
-
          : true operation cost after re-dispatch
-
                                : 
true re-dispatch profit
Large       means more ”dangerous” attacks (larger impact)
True Re-Dispatch Profit
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
14
Proposed control action
True generation profile
Slack
generators
VIKING Benchmark: Impact of Data Attacks
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
15
 
 
Cost function corresponds to
the total resistive losses
 
Sparse attacks are computed
from the previous security
metric
 
 
     is computed for each
sparse attack
VIKING Benchmark: Impact of Data Attacks
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
16
 
Security metric
-
Are all the sparse attacks
equally dangerous?
 
Impact of Data Attacks
 
 
 
-
Most sparse attacks have low
impact on operation cost
                                     
Impact-Aware Security Metric
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
17
 
                 is the impact-aware security metric for the k-th
measurement
-
      is the optimal solution of
 
 
 
-
-
-
 
Similar to the previous security metric
-
Sensitive to the choice of parameters
Summary
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
18
-
The effects of data attacks on the DC-OPF were analyzed and analytically
characterized
-
The estimated and true profit were introduced
-
A novel impact-aware security metric was proposed
 
Thank you
Questions?
               is the impact-aware security metric for the k-th
measurement (cf.                )
-
      is the optimal solution of
Impact-Aware Security Metric
June 28th,
2012
ACCESS Linnaeus Centre            KTH-Royal Institute of Technology
19
 
Maximum impact to the network operation cost so that
-
Attacks are stealthy with a given sparsity
-
Measurement     is corrupted
Slide Note
Embed
Share

Exploring the vulnerabilities of SCADA/EMS systems to data attacks, focusing on the consequences of corrupted data on system operation and the importance of maintaining cyber security in power networks. The discussion covers topics such as optimal power flow, state estimation, bad data detection, and attacker models in the context of power network security.

  • Cyber security
  • Power networks
  • Data attacks
  • SCADA systems
  • Networked control systems

Uploaded on Oct 07, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Optimal Power Flow: Closing the Loop over Corrupted Data Andr Teixeira, Henrik Sandberg, Gy rgy D n, and Karl H. Johansson ACCESS Linnaeus Centre, KTH Royal Institute of Technology American Control Conference Montr al, June 28th, 2012

  2. Motivation Networked control systems are becoming more pervasive - Increasing use of open networks and COTS Infrastructures are becoming more vulnerable to cyber-threats! - Several attack points Nature-driven events are known to have caused severe disruptions A major concern is the possible impact of cyber threats on these systems June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 2

  3. Power Transmission Networks Previous work - Vulnerabilities of current SCADA/EMS systems to data attacks on measurements Current work - Consequences on system operation: Optimal Power Flow June 28th, 2012 SCADA: Supervisory Control and Data Acquisition ACCESS Linnaeus Centre KTH-Royal Institute of Technology 3

  4. Cyber Security of State Estimator in Power Networks State Estimator: estimates the state and unmeasured variables Bad Data Detector: detects and removes corrupted measurements Can data attacks affect the SE without being detected? - Yes! [Liu et al, 2009] June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 4

  5. DC Network Model Measurement model: Simplifications: - - - No resistances or shunt elements Linear Least Squares Estimator: Measurement residual: Only active power: Bad Data Detector: - Similar to a DC resistive network June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 5

  6. Attacker Model Corrupted measurements: Attacker s objectives: - Attack is stealthy (undetectable) - Target measurements are corrupted Least-effort attacks are more likely Larger effort increased security - : set of stealthy attacks - : set of goals - : set of constraints and are scenario specific Minimum effort attacks: June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 6

  7. Security Metric for Stealthy Attacks is the security metric for the k-th measurement is the optimal solution of - [Sandberg et al, 2010] [Sou et al, 2011] - - - Minimum number of attacked measurements so that - Attack is stealthy - Measurement is corrupted June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 7

  8. Cyber Security of Optimal Power Flow in Power Networks How do stealthy attacks affectthe power system s operation? - Related work: [Xie et al, 2010], [Yuan et al, 2011] Optimal Power Flow - Computes generator setpoints minimizing operation costs - Ensures operation constraints June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 8

  9. $$$ $ DC-Optimal Power Flow DC-Optimal Power Flow considers the lossless DC model - power demand - power generation Optimal power generation Operation costs: - Generation costs - Transmission losses - However may not be measured June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 9

  10. DC-Optimal Power Flow Nominal Operation Lagrangian function: At optimality, the KKT conditions hold: June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 10

  11. DC-Optimal Power Flow under attack The estimate is given by the State Estimator - vulnerable to cyber attacks Suppose the system is in optimality with and Operation under Data Attacks Proposed control action Ficticious operating conditions When would an operator apply the proposed control action? What would be the resulting operating cost? June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 11

  12. DC-Optimal Power Flow under attack Assume the attack does not change the active constraints - thus are known The proposed control action is given by - is an affine map w.r.t June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 12

  13. Estimated Re-Dispatch Profit Proposed control action Ficticious operating conditions Consider the corrupted estimates and - : estimated operation cost - : estimated optimal operation cost given - : estimated re-dispatch profit Large estimated profit may lead the operator to apply June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 13

  14. True Re-Dispatch Profit Slack generators Proposed control action True generation profile Mismatches between and are compensated by slack generators - can be modeled as an affine map w.r.t : - : true operation cost after re-dispatch - : true re-dispatch profit Large means more dangerous attacks (larger impact) June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 14

  15. VIKING Benchmark: Impact of Data Attacks Cost function corresponds to the total resistive losses Sparse attacks are computed from the previous security metric is computed for each sparse attack June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 15

  16. VIKING Benchmark: Impact of Data Attacks Security metric - Are all the sparse attacks equally dangerous? Target measurement index Impact of Data Attacks - Most sparse attacks have low impact on operation cost 16 June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology Target measurement index

  17. Impact-Aware Security Metric is the impact-aware security metric for the k-th measurement - is the optimal solution of - - - Similar to the previous security metric - Sensitive to the choice of parameters June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 17

  18. Summary - The effects of data attacks on the DC-OPF were analyzed and analytically characterized - The estimated and true profit were introduced - A novel impact-aware security metric was proposed Thank you Questions? June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 18

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#