Ziran Gao, Tazim Ridwan Billah Kushal, M. Illindala, Jiankang Wang
{"title":"Inter-area Oscillations caused by Cyber Attacks and their Countermeasures","authors":"Ziran Gao, Tazim Ridwan Billah Kushal, M. Illindala, Jiankang Wang","doi":"10.1109/TPEC56611.2023.10078562","DOIUrl":null,"url":null,"abstract":"With the rapid technological advances in the smart grid, cyber-attacks have become a major cause of concern for the grid security. In this paper, a major type of cyber-attack, known as the time-delay attack (TDA), is analyzed for inter-area oscillations (IAO) in a power system. An attack vector is derived at first that is based on the Man-In-The-Middle (MITM) attack with stealthy properties. To defend against such attacks, a risk assessment metric is introduced based on cyber-physical configurations of victim systems. The performance of the proposed risk assessment metric against attack vectors is tested on a four-machine-two-area system.","PeriodicalId":183284,"journal":{"name":"2023 IEEE Texas Power and Energy Conference (TPEC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE Texas Power and Energy Conference (TPEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TPEC56611.2023.10078562","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the rapid technological advances in the smart grid, cyber-attacks have become a major cause of concern for the grid security. In this paper, a major type of cyber-attack, known as the time-delay attack (TDA), is analyzed for inter-area oscillations (IAO) in a power system. An attack vector is derived at first that is based on the Man-In-The-Middle (MITM) attack with stealthy properties. To defend against such attacks, a risk assessment metric is introduced based on cyber-physical configurations of victim systems. The performance of the proposed risk assessment metric against attack vectors is tested on a four-machine-two-area system.