Publications

Results 1–25 of 54

Search results

Jump to search filters

Leveraging graph clustering techniques for cyber-physical system analysis to enhance disturbance characterisation

IET Cyber-Physical Systems: Theory and Applications

Jacobs, Nicholas J.; Hossain-McKenzie, Shamina S.; Sun, Shining; Payne, Emily; Al-Homoud, Leen; Summers, Adam; Layton, Astrid; Davis, Kate; Goes, Christopher E.

Cyber-physical systems have behaviour that crosses domain boundaries during events such as planned operational changes and malicious disturbances. Traditionally, the cyber and physical systems are monitored separately and use very different toolsets and analysis paradigms. The security and privacy of these cyber-physical systems requires improved understanding of the combined cyber-physical system behaviour and methods for holistic analysis. Therefore, the authors propose leveraging clustering techniques on cyber-physical data from smart grid systems to analyse differences and similarities in behaviour during cyber-, physical-, and cyber-physical disturbances. Since clustering methods are commonly used in data science to examine statistical similarities in order to sort large datasets, these algorithms can assist in identifying useful relationships in cyber-physical systems. Through this analysis, deeper insights can be shared with decision-makers on what cyber and physical components are strongly or weakly linked, what cyber-physical pathways are most traversed, and the criticality of certain cyber-physical nodes or edges. This paper presents several types of clustering methods for cyber-physical graphs of smart grid systems and their application in assessing different types of disturbances for informing cyber-physical situational awareness. The collection of these clustering techniques provide a foundational basis for cyber-physical graph interdependency analysis.

More Details

Adaptive Protection and Control for High Penetration PV and Grid Resilience (Final Technical Report)

Reno, Matthew J.; Jimenez Aparicio, Miguel J.; Patel, Trupal; Summers, Adam; Hernandez Alvidrez, Javier H.; Wilches-Bernal, Felipe; Montoya, Armando Y.; Dow, Andrew R.R.; Kelly, Daniel; Matthews, Ronald C.; Ojetola, Samuel; Darbali-Zamora, Rachid; Palacios, Felipe N.; Flicker, Jack D.; Bidram, Ali; Paruthiyil, Sajay K.; Montoya, Rudy; Poudel, Binod; Rajendra-Kurup, Aswathy; Martinez-Ramon, Manel; Brahma, Sukumar; Bin Gani, Munim; Adhikari, Prabin; Gopalakrishnan, Ashok; Alkraimeen, Yazid; Dong, Yimai; Sun, Liangyi; Zheng, Ce; Oppedahl, Gary; Bauer, Daniel

The report summarizes the work and accomplishments of DOE SETO funded project 36533 “Adaptive Protection and Control for High Penetration PV and Grid Resilience”. In order to increase the amount of distributed solar power that can be integrated into the distribution system, new methods for optimal adaptive protection, artificial intelligence or machine learning based protection, and time domain traveling wave protection are developed and demonstrated in hardware-in-the-loop and a field demonstration.

More Details

Towards the Characterization of Cyber-Physical System Interdependencies in the Electric Grid

2023 IEEE Power and Energy Conference at Illinois, PECI 2023

Hossain-McKenzie, Shamina S.; Jacobs, Nicholas J.; Summers, Adam; Adams, Ryan A.; Goes, Christopher E.; Chatterjee, Abheek; Layton, Astrid; Davis, Katherine; Huang, Hao

As the electric grid becomes increasingly cyber-physical, it is important to characterize its inherent cyber-physical interdepedencies and explore how that characterization can be leveraged to improve grid operation. It is crucial to investigate what data features are transferred at the system boundaries, how disturbances cascade between the systems, and how planning and/or mitigation measures can leverage that information to increase grid resilience. In this paper, we explore several numerical analysis and graph decomposition techniques that may be suitable for modeling these cyber-physical system interdependencies and for understanding their significance. An augmented WSCC 9-bus cyber-physical system model is used as a small use-case to assess these techniques and their ability in characterizing different events within the cyber-physical system. These initial results are then analyzed to formulate a high-level approach for characterizing cyber-physical interdependencies.

More Details

Harmonized Automatic Relay Mitigation of Nefarious Intentional Events (HARMONIE) - Special Protection Scheme (SPS)

Hossain-McKenzie, Shamina S.; Jacobs, Nicholas J.; Summers, Adam; Kolaczkowski, Bryan D.; Goes, Christopher E.; Fasano, Raymond E.; Mao, Zeyu; Al Homoud, Leen; Davis, Kate; Overbye, Thomas

The harmonized automatic relay mitigation of nefarious intentional events (HARMONIE) special protection scheme (SPS) was developed to provide adaptive, cyber-physical response to unpredictable disturbances in the electric grid. The HARMONIE-SPS methodology includes a machine learning classification framework that analyzes real time cyber-physical data and determines if the system is in normal conditions, cyber disturbance, physical disturbance, or cyber-physical disturbance. This classification then informs response, if needed and/or suitable, and included cyber-physical corrective actions. Beyond standard power system mitigations, a few novel approaches were developed that included a consensus algorithm-based relay voting scheme, an automated power system triggering condition and corrective action pairing algorithm, and a cyber traffic routing optimization algorithm. Both the classification and response techniques were tested within a newly integrated emulation environment composed of a real-time digital simulator (RTDS) and SCEPTRE™. This report details the HARMONIE-SPS methodology, highlighting both the classification and response techniques, and the subsequent testing results from the emulation environment.

More Details

Securing Inverter Communication: Proactive Intrusion Detection and Mitigation System to Tap, Analyze, and Act

Hossain-McKenzie, Shamina S.; Chavez, Adrian R.; Jacobs, Nicholas J.; Jones, Christian B.; Summers, Adam; Wright, Brian J.

The electric grid has undergone rapid, revolutionary changes in recent years; from the addition of advanced smart technologies to the growing penetration of distributed energy resources (DERs) to increased interconnectivity and communications. However, these added communications, access interfaces, and third-party software to enable autonomous control schemes and interconnectivity also expand the attack surface of the grid. To address the gap of DER cybersecurity and secure the grid-edge to motivate a holistic, defense-in-depth approach, a proactive intrusion detection and mitigation system (PIDMS) device was developed to secure PV smart inverter communications. The PIDMS was developed as a distributed, flexible bump-in-the-wire (BITW) solution for protecting PV smart inverter communications. Both cyber (network traffic) and physical (power system measurements) are processed using network intrusion monitoring tools and custom machinelearning algorithms for deep packet analysis and cyber-physical event correlation. The PIDMS not only detects abnormal events but also deploys mitigations to limit or eliminate system impact; the PIDMS communicates with peer PIDMSs at different locations using the MQTT protocol for increased situational awareness and alerting. The details of the PIDMS methodology and prototype development are detailed in this report as well as the evaluation results within a cyber-physical emulation environment and subsequent industry feedback.

More Details

Towards Cyber-Physical Special Protection Schemes: Design and Development of a Co-Simulation Testbed Leveraging SCEPTRE™

2022 IEEE Power and Energy Conference at Illinois, PECI 2022

Summers, Adam; Goes, Christopher E.; Calzada, Daniel A.; Jacobs, Nicholas J.; Hossain-McKenzie, Shamina S.; Mao, Zeyu

Unpredictable disturbances with dynamic trajectories such as extreme weather events and cyber attacks require adaptive, cyber-physical special protection schemes to mitigate cascading impact in the electric grid. A harmonized automatic relay mitigation of nefarious intentional events (HARMONIE) special protection scheme (SPS) is being developed to address that need. However, for evaluating the HARMONIE-SPS performance in classifying system disturbances and mitigating consequences, a cyber-physical testbed is required to further development and validate the methodology. In this paper, we present a design for a co-simulation testbed leveraging the SCEPTRE™ platform and the real-time digital simulator (RTDS). The integration of these two platforms is detailed, as well as the unique, specific needs for testing HARMONIE-SPS within the environment. Results are presented from tests involving a WSCC 9-bus system with different load shedding scenarios with varying cyber-physical impact.

More Details

Prediction of Relay Settings in an Adaptive Protection System

2022 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2022

Summers, Adam; Patel, Trupal; Matthews, Ronald C.; Reno, Matthew J.

Communication-assisted adaptive protection can improve the speed and selectivity of the protection system. However, in the event, that communication is disrupted to the relays from the centralized adaptive protection system, predicting the local relay protection settings is a viable alternative. This work evaluates the potential for machine learning to overcome these challenges by using the Prophet algorithm programmed into each relay to individually predict the time-dial (TDS) and pickup current (IPICKUP) settings. A modified IEEE 123 feeder was used to generate the data needed to train and test the Prophet algorithm to individually predict the TDS and IPICKUP settings. The models were evaluated using the mean average percentage error (MAPE) and the root mean squared error (RMSE) as metrics. The results show that the algorithms could accurately predict IPICKUP setting with an average MAPE accuracy of 99.961%, and the TDS setting with a average MAPE accuracy of 94.32% which is sufficient for protection parameter prediction.

More Details

A Graph Theory Approach for Placing Overcurrent Relays and Reclosers for Economical Protection of Meshed Transmission Networks

2022 North American Power Symposium, NAPS 2022

Matthews, Ronald C.; Patel, Trupal; Summers, Adam; Reno, Matthew J.

Penetration of the power grid by renewable energy sources, distributed storage, and distributed generators is becoming more widespread. Increased utilization of these distributed energy resources (DERs) has given rise to additional protection concerns. With radial feeders terminating in DERs or in microgrids containing DERs, standard non-directional radial protection may be rendered useless. Moreover, coordination will first require the protection engineer to determine what combination of directional and nondirectional elements is required to properly protect the system at a reasonable cost. In this paper, a method is proposed to determine the type of protection that should be placed on each line. Further, an extreme cost constraint is assumed so that an attempt is made to protect a meshed network using only overcurrent protection devices. A method is proposed where instantaneous reclosers are placed in locations that cause the system to temporarily become radial when a fault occurs. Directional and nondirectional overcurrent (OC) relays are placed in locations that allow for standard radial coordination techniques to be utilized while the reclosers are open to clear any sustained faults. The proposed algorithm is found to effectively determine the placement of protection devices while utilizing a minimal number of directional devices. Additionally, it was shown for the IEEE 14-bus case that the proposed relay placement algorithm results in a system where relay coordination remains feasible.

More Details

Zonal Machine Learning-Based Protection for Distribution Systems

IEEE Access

Poudel, Binod P.; Bidram, Ali; Reno, Matthew J.; Summers, Adam

Adaptive protection is defined as a real-time system that can modify the protective actions according to the changes in the system condition. An adaptive protection system (APS) is conventionally coordinated through a central management system located at the distribution system substation. An APS depends significantly on the communication infrastructure to monitor the latest status of the electric power grid and send appropriate settings to all of the protection relays existing in the grid. This makes an APS highly vulnerable to communication system failures (e.g., broken communication links due to natural disasters as well as wide-range cyber-attacks). To this end, this paper presents the addition of local adaptive modular protection (LAMP) units to the protection system to guarantee its reliable operation under extreme events when the operation of the APS is compromised. LAMP units operate in parallel with the conventional APS. As a backup, if APS fails to operate because of an issue in the communication system, LAMP units can accommodate a reliable fault detection and location on behalf of the protection relay. The performance of the proposed APS is verified using IEEE 123 node test system.

More Details

Optimal Coordination of Distance and Overcurrent Relays with Sparse Placement

2022 North American Power Symposium, NAPS 2022

Matthews, Ronald C.; Patel, Trupal; Summers, Adam; Reno, Matthew J.

For the protection engineer, it is often the case, that full coverage and thus perfect selectivity of the system is not an option for protection devices. This is because perfect selectivity requires protection devices on every line section of the network. Due to cost limitation, relays may not be placed on each branch of a network. Therefore, a method is needed to allow for optimal coordination of relays with sparse relay placement. In this paper, methods for optimal coordination of networks with sparse relay placement introduced in prior work are applied to a system where both overcurrent and distance relays are present. Additionally, a method for defining primary (Zone 1) and secondary (Zone 2) protection zones for the distance relays in such a sparse system is proposed. The proposed method is applied to the IEEE 123-bus test case. The proposed method is found to successfully coordinate the system while also limiting the maximum relay operating time to 1.78s which approaches the theoretical lower bound of 1.75s.

More Details

Named Data Networking for DER Cybersecurity

Chavez, Adrian R.; Cordeiro, Patricia G.; Huang, Gary H.; Kitsos, Panayioti C.; La Pay, Trevor L.; Short, Austin S.; Summers, Adam

We present our research findings on the novel NDN protocol. In this work, we defined key attack scenarios for possible exploitation and detail software security testing procedures to evaluate the security of the NDN software. This work was done in the context of distributed energy resources (DER). The software security testing included an execution of unit tests and static code analyses to better understand the software rigor and the security that has been implemented. The results from the penetration testing are presented. Recommendations are discussed to provide additional defense for secure end-to-end NDN communications.

More Details

Design Considerations for Distributed Energy Resource Honeypots and Canaries

Johnson, Jay; Jencka, Louis A.; Ortiz, Timothy O.; Jones, Christian B.; Chavez, Adrian R.; Wright, Brian J.; Summers, Adam

There are now over 2.5 million Distributed Energy Resource (DER) installations connected to the U.S. power system. These installations represent a major portion of American electricity critical infrastructure and a cyberattack on these assets in aggregate would significantly affect grid operations. Virtualized Operational Technology (OT) equipment has been shown to provide practitioners with situational awareness and better understanding of adversary tactics, techniques, and procedures (TTPs). Deploying synthetic DER devices as honeypots and canaries would open new avenues of operational defense, threat intelligence gathering, and empower DER owners and operators with new cyber-defense mechanisms against the growing intensity and sophistication of cyberattacks on OT systems. Well-designed DER canary field deployments would deceive adversaries and provide early-warning notifications of adversary presence and malicious activities on OT networks. In this report, we present progress to design a high-fidelity DER honeypot/canary prototype in a late-start Laboratory Directed Research and Development (LDRD) project.

More Details

Power System Protection Parameter Sensitivity Analysis with Integrated Inverter Based Resources

Conference Record of the IEEE Photovoltaic Specialists Conference

Summers, Adam; Matthews, Ronald C.; Patel, Trupal; Reno, Matthew J.

As conventional generation sources continue to be replaced with inverter-based resources, the traditional fixed overcurrent protection schemes used at the distribution level will no longer be valid. Adaptive protection will provide the ability to update the protection scheme in near real-time to ensure reliability and increase the resilience of the grid. However, knowing and detecting when to update protection parameters that are calculated with an adaptive protection algorithm to prevent unnecessarily communicating with relays still needs to be understood. The proposed method provides a sensitivity analysis to understand when it is necessary to issue new parameters to the relays. The results show that settings do not need to be issued at each available time step. Instead, the proposed sensitivity analysis method can be used to ensure that only the imperative protection parameters are communicated to the relay, allowing for more optimal utilization of the communications. The results show that the sensitivity analysis reduces the settings communicated to the devices by 93% over the year.

More Details

Modeling data flows with network calculus in cyber-physical systems: Enabling feature analysis for anomaly detection applications

Information (Switzerland)

Jacobs, Nicholas J.; Hossain-McKenzie, Shamina S.; Summers, Adam

The electric grid is becoming increasingly cyber-physical with the addition of smart technologies, new communication interfaces, and automated grid-support functions. Because of this, it is no longer sufficient to only study the physical system dynamics, but the cyber system must also be monitored as well to examine cyber-physical interactions and effects on the overall system. To address this gap for both operational and security needs, cyber-physical situational awareness is needed to monitor the system to detect any faults or malicious activity. Techniques and models to understand the physical system (the power system operation) exist, but methods to study the cyber system are needed, which can assist in understanding how the network traffic and changes to network conditions affect applications such as data analysis, intrusion detection systems (IDS), and anomaly detection. In this paper, we examine and develop models of data flows in communication networks of cyber-physical systems (CPSs) and explore how network calculus can be utilized to develop those models for CPSs, with a focus on anomaly and intrusion detection. This provides a foundation for methods to examine how changes to behavior in the CPS can be modeled and for investigating cyber effects in CPSs in anomaly detection applications.

More Details

Circuit Topology Estimation in an Adaptive Protection System

2020 52nd North American Power Symposium, NAPS 2020

Poudel, Binod; Garcia, Daniel R.; Bidram, Ali; Reno, Matthew J.; Summers, Adam

The goal of this paper is to utilize machine learning (ML) techniques for estimating the distribution circuit topology in an adaptive protection system. In a reconfigurable distribution system with multiple tie lines, the adaptive protection system requires knowledge of the existing circuit topology to adapt the correct settings for the relay. Relays rely on the communication system to identify the latest status of remote breakers and tie lines. However, in the case of communication system failure, the performance of adaptive protection system can be significantly impacted. To tackle this challenge, the remote circuit breakers and tie lines' status are estimated locally at a relay to identify the circuit topology in a reconfigurable distribution system. This paper utilizes Support Vector Machine (SVM) to forecast the status of remote circuit breakers and identify the circuit topology. The effectiveness of proposed approach is verified on two sample test systems.

More Details

Proactive Intrusion Detection and Mitigation System: Case Study on Packet Replay Attacks in Distributed Energy Resource Systems

2021 IEEE Power and Energy Conference at Illinois, PECI 2021

Hossain-McKenzie, Shamina S.; Chavez, Adrian R.; Jacobs, Nicholas J.; Jones, Christian B.; Summers, Adam; Wright, Brian J.

The electric grid is rapidly being modernized with novel technologies, adaptive and automated grid-support functions, and added connectivity with internet-based communications and remote interfaces. These advancements render the grid increasingly 'smart' and cyber-physical, but also broaden the vulnerability landscape and potential for malicious, cascading disturbances. The grid must be properly defended with security mechanisms such as intrusion detection systems (IDSs), but these tools must account for power system behavior as well as network traffic to be effective. In this paper, we present a cyber-physical IDS, the proactive intrusion detection and mitigation system (PIDMS), that analyzes both cyber and physical data streams in parallel, detects intrusion, and deploys proactive response. We demonstrate the PIDMS with an exemplar case study exploring a packet replay attack scenario focused on photovoltaic inverter communications; the scenario is tested with an emulated, cyber-physical grid environment with hardware-in-the-loop inverters.

More Details
Results 1–25 of 54
Results 1–25 of 54