We consider a bilevel attacker–defender problem to find the worst-case attack on the relays that control transmission grid components. The attacker infiltrates some number of relays and renders all of the components connected to them inoperable with the goal of maximizing load shed. The defender responds by minimizing the resulting load shed, redispatching using a DC optimal power flow (DCOPF) problem on the remaining network. Though worst-case interdiction problems on the transmission grid have been studied for years, there remains a need for exact and scalable methods. Methods based on using duality on the inner problem rely on the bounds of the dual variables of the defender problem in order to reformulate the bilevel problem as a mixed integer linear problem. Valid dual bounds tend to be large, resulting in weak linear programming relaxations and, hence, making the problem more difficult to solve at scale. Often smaller heuristic bounds are used, resulting in a lower bound. In this work, we also consider a lower bound, but instead of bounding the dual variables, we drop the constraints corresponding to Ohm’s law, relaxing DCOPF to capacitated network flow. We present theoretical results showing that, for uncongested networks, approximating DCOPF with network flow yields the same set of injections and, thus, the same load shed, which suggests that this restriction likely gives a high-quality lower bound in the uncongested case. Furthermore, we show that, in the network flow relaxation of the defender problem, the duals are bounded by one, so we can solve our restriction exactly. Finally, because the big-M values in the linearization are equal to one and network flow has a well-known structure, we see empirically that this formulation scales well computationally with increased network size. Through empirical experiments on 16 networks with up to 6,468 buses, we find that this bound is almost always as tight as we can get from guessing the dual bounds even for congested networks in which the theoretical results do not hold. In addition, calculating the bound is approximately 150 times faster than achieving the same bound with the reformulation guessing the dual bounds.
Sandia National Laboratories performed tests to address the potential vulnerability concerns of a coupled High-Altitude Electromagnetic Pulse (HEMP) inducing secondary coupling onto critical instrumentation and control cables in a nuclear power plant, with specific focus on early-time HEMP. Three types of receiving cables in nine configurations were tested to determine transfer functions between two electrically separated cables referenced to the common mode input current on the transmitting cable. One type of transfer function related the input short circuit current and resulting open circuit voltage on the receiving cable. The other transfer function related the input short circuit current and the resulting short circuit current on the receiving cable. A 500 A standard HEMP waveform was input into the transfer functions to calculate peak coupling values on the receiving cables. The highest level of coupling using the standard waveform occurred when cables were in direct contact, with a peak short circuit current of 85 A and open circuit voltage of 9.8 kV, while configurations with separated cables predicted coupling levels of less than 5 A or 500 V.
As the U.S. electrifies the transportation sector, cyberattacks targeting vehicle charging could impact several critical infrastructure sectors including power systems, manufacturing, medical services, and agriculture. This is a growing area of concern as charging stations increase power delivery capabilities and must communicate to authorize charging, sequence the charging process, and manage load (grid operators, vehicles, OEM vendors, charging network operators, etc.). The research challenges are numerous and complicated because there are many end users, stakeholders, and software and equipment vendors interests involved. Poorly implemented electric vehicle supply equipment (EVSE), electric vehicle (EV), or grid operator communication systems could be a significant risk to EV adoption because the political, social, and financial impact of cyberattacks — or public perception of such — would ripple across the industry and produce lasting effects. Unfortunately, there is currently no comprehensive EVSE cybersecurity approach and limited best practices have been adopted by the EV/EVSE industry. There is an incomplete industry understanding of the attack surface, interconnected assets, and unsecured inter faces. Comprehensive cybersecurity recommendations founded on sound research are necessary to secure EV charging infrastructure. This project provided the power, security, and automotive industry with a strong technical basis for securing this infrastructure by developing threat models, determining technology gaps, and identifying or developing effective countermeasures. Specifically, the team created a cybersecurity threat model and performed a technical risk assessment of EVSE assets across multiple manufacturers and vendors, so that automotive, charging, and utility stakeholders could better protect customers, vehicles, and power systems in the face of new cyber threats.
Khan, Rabia; Miller, Michelle; Valerio, Analise; Willhite, Isabella; Hernandez, Zachary
A need for a standardized Division 10000 onboarding program for virtual hires was identified by management to formalize the way employees and interns are onboarded and trained into Division 10000. This white paper provides effective short and long-term suggestions in the efforts of improving virtual onboarding. Data suggests that remote work is going to become the forefront of many industry practices, which indicates the need of a standardized virtual onboarding practices. With our research, gap assessments, benchmarking, and conducting interviews both internally and externally, we found that clarity, culture, and connection proved to be the strongest solutions in order to maintain Sandia’s competitive edge and sustain workers both remote and in-person.
The information impulse function (IIF), running Variance, and local Hölder Exponent are three conceptually different time-series evaluation techniques. These techniques examine time-series for local changes in information content, statistical variation, and point-wise smoothness, respectively. Using simulated data emulating a randomly excited nonlinear dynamical system, this study interrogates the utility of each method to correctly differentiate a transient event from the background while simultaneously locating it in time. Computational experiments are designed and conducted to evaluate the efficacy of each technique by varying pulse size, time location, and noise level in time-series. Our findings reveal that, in most cases, the first instance of a transient event is more easily observed with the information-based approach of IIF than with the Variance and local Hölder Exponent methods. While our study highlights the unique strengths of each technique, the results suggest that very robust and reliable event detection for nonlinear systems producing noisy time-series data can be obtained by incorporating the IIF into the analysis.
The objective of this milestone was to finish integrating GenTen tensor software with combustion application Pele using the Ascent in situ analysis software, partnering with the ALPINE and Pele teams. Also, to demonstrate the usage of the tensor analysis as part of a combustion simulation.
Incipient melting is a phenomenon that can occur in aluminum alloys where solute rich areas, such as grain boundaries, can melt before the rest of the material; incipient melting can degrade mechanical and corrosion properties and is irreversible, resulting in material scrapping. After detecting indications of incipient melting as the cause of failure in 7075 aluminum alloy parts (AA7075), a study was launched to determine threshold temperature for incipient melting. Samples of AA7075 were solution annealed using temperatures ranging from 870-1090F. A hardness profile was developed to demonstrate the loss of mechanical properties through the progression of incipient melting. Additionally, Zeiss software Zen Core Intellesis was utilized to more accurately quantify the changes in microstructural properties as AA7075 surpassed the onset of incipient melting. The results from this study were compared with previous AA7075 material that demonstrated incipient melting.