Cyber Attack in a Two-Area Power System Impact Identification

Cyber Attack in a Two-Area Power System Impact Identification

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Cyber Attack in a Two-Area Power System: Impact Identifcation using Reachability Peyman Mohajerin Esfahani, Maria Vrakopoulou, Kostas Margellos, John Lygeros and G¨oran Andersson Abstract — This paper presents new results on the applica- tions oF reachability methods and computational tools to a two- area power system in the case oF a cyber attack. In the VIKING research project a novel concept to assess the vulnerabilities introduced by the interaction between the IT inFrastructure and power systems is proposed. Here we develop a new Framework and defne a systematic methodology, based on reachability, For identiFying the impact that an intrusion might have in the Automatic Generation Control loop, which regulates the Frequency and the power exchange between the controlled areas. The numerical results reveal the weaknesses oF the system and indicate possible policies that an attacker could use to disturb it. I. INTRODUCTION The electric power trasmission system is probably the most vital infrastructure in our society [1]. Large power systems are nowadays very complex and tightly coupled with the SCADA system, which supervises them in terms of collecting data from remote facilities and sending back control commands. The resilience of power system on this infrastructure, makes it more susceptible not only to opera- tional errors but also to external attacks. The SCADA system measures data through remote devices and transmits them to control centers through communication channels. There computer processing takes place and control commands are sent back to the system. The vulnerabilities that are introduced could be exploited by malicious attackers. In [2], [3], [4], [5] real examples of cyber attacks were reported. The authors of [6] proposed a framework in order to clarify the interaction between the power system and the IT infrastructure and identify the vulnerabilities and the malfunctions of both that could lead to an abnormal operation of the power network. From another perspective the authors of [7] attempted to quantify the impact of a cyber attack in the power market. The work in this paper is motivated by the framework proposed by the VIKING research project [8]. This project proposes a novel concept to address the challenges intro- duced by the interaction between the IT systems and the power transmission and distribution systems. Main objective Peyman Mohajerin Esfahani, Kostas Margellos and John Lygeros are with the Automatic Control Laboratory, Department of Electrical En- gineering, Swiss Federal Institute of Technology (ETH), Physikstrasse 3, ETL I22, 8092, Z¨urich, Switzerland. email: { mohajerin, margellos, lygeros } @control.ee.ethz.ch Maria Vrakopoulou and G¨oran Andersson are with the Power Systems Laboratory, Department of Electrical Engineering, Swiss Federal Institute of Technology (ETH), Physikstrasse 3, ETL G26, 8092, Z¨urich, Switzerland.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 6

Cyber Attack in a Two-Area Power System Impact Identification

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online