Jorge A. Ramos-Ruiz, Jaewon Kim, Woo-Hyun Ko, Tong Huang, P. Enjeti, P. Kumar, Le Xie
{"title":"An Active Detection Scheme for Cyber Attacks on Grid-tied PV Systems","authors":"Jorge A. Ramos-Ruiz, Jaewon Kim, Woo-Hyun Ko, Tong Huang, P. Enjeti, P. Kumar, Le Xie","doi":"10.1109/CyberPELS49534.2020.9311539","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311539","url":null,"abstract":"This paper introduces an active defense mechanism against cyber attacks in grid-tied Photovoltaic (PV) systems connected at the distribution level. The core of such a defense mechanism dynamic watermarking approach is to detect malicious manipulation of voltage/current sensor measurements feeding inverter control. The defense mechanism is described in detail and several attack possibilities, based on manipulating the current measurements, are described. Three attack models are used to test the validity of the proposed approach on a single-phase, 5 kW, grid-tied inverter, connected at the distribution level.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116275057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rahman, Md. Tauhidur Rahman, M. Kisacikoglu, K. Akkaya
{"title":"Intrusion Detection Systems-Enabled Power Electronics for Unmanned Aerial Vehicles","authors":"M. Rahman, Md. Tauhidur Rahman, M. Kisacikoglu, K. Akkaya","doi":"10.1109/CyberPELS49534.2020.9311545","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311545","url":null,"abstract":"Compromised power electronics, due to firmware attacks and hardware Trojans, in a flight computer can jeopardize the safety and security of an Unmanned Aerial Vehicle (UAV). They can maliciously alter sensor measurements or control commands to make a UAV to take disastrous moves. Unfortunately, most of these attacks are difficult to detect before deploying components in the system. Therefore, detecting compromised behavior run-time is important, while it is challenging at the same time. In this work, we propose to build machine learning-based intrusion detection systems (IDSs) to be deployed at the power electronics/microcontorller level such that it can deal with malicious data/control commands initiated due to hardware attacks.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131296099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Georgios Tertytchny, Hazem Karbouj, L. Hadjidemetriou, C. Charalambous, M. Michael, Marios Sazos, M. Maniatakos
{"title":"Demonstration of Man in the Middle Attack on a Commercial Photovoltaic Inverter Providing Ancillary Services","authors":"Georgios Tertytchny, Hazem Karbouj, L. Hadjidemetriou, C. Charalambous, M. Michael, Marios Sazos, M. Maniatakos","doi":"10.1109/CyberPELS49534.2020.9311531","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311531","url":null,"abstract":"Rapid modernisation of distribution power systems aims to improve system efficiency and reliability while increasing photovoltaic (PV) penetration levels. However, ensuring the cyber security of such smart distribution grids has emerged as major challenge. Cyber-attacks on key equipment of distribution power systems may lead to inefficient operation of the grid, breach private smart meter data or cause intentional false tripping of feeders. In this paper, a man in the middle attack on a commercial solar PV inverter, which provides ancillary services to the grid, is demonstrated to cause an intentional false tripping of the entire feeder leading to a regional blackout. The successful experimental implementation of the attack reveals the effectiveness and the risk of this attack. Detailed risk analysis is conducted to asses the influence of different factors, such as feeder loading and PV inverter capacity, on the effectiveness of the proposed attack.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114814011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Siddiqui, Prithwiraj Roy Chowdhury, Prashant Sawant, S. M. Shinde, Yutian Gui, M. Manjrekar, S. Essakiappan, F. Saqib
{"title":"Implementation of a Grid-Tied Secure Reconfigurable Power Converter","authors":"A. Siddiqui, Prithwiraj Roy Chowdhury, Prashant Sawant, S. M. Shinde, Yutian Gui, M. Manjrekar, S. Essakiappan, F. Saqib","doi":"10.1109/CyberPELS49534.2020.9311537","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311537","url":null,"abstract":"In power converter designs embedding security is essential to protect the device from physical and network attacks, and to provide secure communication between Distributed Energy Resources (DER) and power system operators. The communication-based cyber-attacks such as physical access to a network and remote networked attacks compromise the signals, reverse engineer and inject faults. The resource-constrained terminal devices such as smart meters, power converters as well as third party appliances open additional opportunities for malicious actors. In this work, we present a low overhead secure communication framework that incorporates processors, Trusted Platform Module (TPM) for communication in a grid-tied system. We propose a novel reconfigurable design of a power converter controller to establish secure communication for a grid-tied converter. An open-source Field Programmable Gate Array (FPGA) platform is used to develop the library functions necessary to perform power electronic controls. The FPGA works in conjunction with the integrated TPM to exchange command and feedback signals. Preliminary results of the operation of the controller with a 3-phase inverter feeding power to a resistive load are also presented.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127164223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohsen Hosseinzadehtaher, Ahmad Khan, M. Shadmand, H. Abu-Rub
{"title":"Anomaly Detection in Distribution Power System based on a Condition Monitoring Vector and Ultra- Short Demand Forecasting","authors":"Mohsen Hosseinzadehtaher, Ahmad Khan, M. Shadmand, H. Abu-Rub","doi":"10.1109/CyberPELS49534.2020.9311534","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311534","url":null,"abstract":"This paper presents a proactive intrusion detection system (IDS) for smart distribution power systems. The considered attack scenario is manipulation of the advanced measuring infrastructures (AMIs) readings and/or smart inverters data. These manipulated data from the grid edge devices mislead the grid operator for making proper operational planning decisions. In a stealthy attack model, where the attacker compromises significant number of these smart devices, serious demand-supply unbalance can occur that may result in major blackouts. The proposed IDS is based on a condition monitoring vector (CMV) equipped with a learned ultra-short-term demand forecasting (USTDF) mechanism. This cybersecurity approach is able to verify smart devices readings. In the proposed method, the instantaneous difference of collected AMIs and other smart devices data with the ultra-short term forecasted demand is defined as the CMV. This vector probes a pre-defined error band for identifying the compromised smart devices. The learned USTDF mechanism is based on the distribution grid historical load profile and the temperature data for the goal area. An accurate multi-dimensional regression model is developed and learned for forecasting the load behavior in this area. Finally, the suspicious areas are flagged or become separated from the main grid by the network operator based on the proposed CMV outcomes and the output of decision-making module. The proposed IDS aims to enhance the cybersecurity of the smart devices at the grid-edge that plays major role in ensuring the resiliency of the grid. The theoretical analyses are verified by several case studies.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115735535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Subham S. Sahoo, T. Dragičević, Yongheng Yang, F. Blaabjerg
{"title":"Adaptive Resilient Operation of Cooperative Grid-Forming Converters Under Cyber Attacks","authors":"Subham S. Sahoo, T. Dragičević, Yongheng Yang, F. Blaabjerg","doi":"10.1109/CyberPELS49534.2020.9311543","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311543","url":null,"abstract":"This paper proposes an attack-resilient adaptive controller to ensure synchronization of multiple cooperative grid-forming converters (GfCs) under cyber attacks. As the existing cooperative control philosophies do not consider the impact of intrusion into the sensors, communication links with an open-end vulnerability in the control layer, this scenario may lead to asynchrony or even cause shutdown of multiple GfCs in a cascaded manner by unnecessarily triggering the protection schemes. Hence, these vulnerabilities in the control layer have firstly been assessed in this paper. Further, an adaptive resilient control update is designed to ensure synchronization despite the presence of these attacks. Finally, the efficacy of the proposed control strategy for multiple GfCs is evaluated under simulated conditions.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125017154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyunjun Lee, Gomanth Bere, Kyung-soo Kim, Justin Ochoa, Joung-Hu Park, Taesic Kim
{"title":"Deep Learning-Based False Sensor Data Detection for Battery Energy Storage Systems","authors":"Hyunjun Lee, Gomanth Bere, Kyung-soo Kim, Justin Ochoa, Joung-Hu Park, Taesic Kim","doi":"10.1109/CyberPELS49534.2020.9311542","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311542","url":null,"abstract":"Battery energy storage systems are facing risks of unreliable battery sensor data which might be caused by sensor faults in an embedded battery management system, communication failures, and even cyber-attacks. It is crucial to evaluate the trustworthiness of battery sensor data since inaccurate sensor data could lead to not only serious damages to battery energy storage systems, but also threaten the overall reliability of their applications (e.g., electric vehicles or power grids). This paper introduces a battery sensor data trust framework enabling detecting unreliable data using a deep learning algorithm. The proposed sensor data trust mechanism could potentially improve safety and reliability of the battery energy storage systems. The proposed deep learning-based battery sensor fault detection algorithm is validated by simulation studies using a convolutional neural network.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126667115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-physical security framework for Photovoltaic Farms","authors":"Jinan Zhang, Qi Li, Jin Ye, Lulu Guo","doi":"10.1109/CyberPELS49534.2020.9311533","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311533","url":null,"abstract":"With the evolution of PV converters, a growing number of vulnerabilities in PV farms are exposing to cyber threats. To mitigate the influence of cyber-attack on PV farms, it is necessary to study attacks’ impact and propose detection methods. To meet this requirement, a cyber-physical security framework is proposed for PV farms. Data integrity attacks (DIAs) are studied on different control loops. As μPMU is gaining in popularity, a lower sampling rate of μPMU data is applied to develop a detection algorithm. We have evaluated two data-driven methods, which are support vector machine (SVM) and long short-term memory (LSTM). Finally, the data-driven methods verify the feasibility of μPMU data in attack detection.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129031327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Contract-Defined Secondary Control and Co-Simulation for Smart Solar Inverters using Blockchain Technology","authors":"A. Hadi, Gomanth Bere, Bohyun Ahn, Taesic Kim","doi":"10.1109/CyberPELS49534.2020.9326268","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9326268","url":null,"abstract":"This paper proposes a cooperative control approach using blockchain technology for solar inverters in a photovoltaic system. Moreover, a co-simulation method for smart inverters and a blockchain network is studied. The blockchain assisted-smart inverter (BASI) consists of a solar inverter and an internet of things device as a client node of a blockchain network, which can fully utilize emerging blockchain technologies such as distributed ledger, security functions, and smart contract. The control includes a primary-level droop control in a BASI and smart contract-defined secondary-level supervisory control in a secured blockchain network. The concept of the proposed smart contract-defined control approach is validated by simulation studies using the cyber-physical co-simulation testbed built-in MATLAB/Simulink in a PC interfacing with a Hyperledger-Fabric blockchain software implemented in a PC.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129046972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmad Khan, Mohsen Hosseinzadehtaher, M. Shadmand, Danish Saleem, H. Abu-Rub
{"title":"Intrusion Detection for Cybersecurity of Power Electronics Dominated Grids: Inverters PQ Set-Points Manipulation","authors":"Ahmad Khan, Mohsen Hosseinzadehtaher, M. Shadmand, Danish Saleem, H. Abu-Rub","doi":"10.1109/CyberPELS49534.2020.9311538","DOIUrl":"https://doi.org/10.1109/CyberPELS49534.2020.9311538","url":null,"abstract":"This work provides cybersecurity analytics for a high photovoltaic (PV) penetrated distribution network, representing future power electronics dominated grid (PEDG). Firstly, the impact of active and reactive power (PQ) set-points manipulation on the network is studied. Then, an intrusion detection system (IDS) is developed for identifying the potentially compromised PV inverters in the network. The proposed IDS is based on defining the normal, safe, and abnormal operation regions of the PV inverters from point of view of the steady state voltage stability of the network. These three-operation regions are identified by utilizing active power, reactive power, and voltage (PQV) limits of each specific grid-following inverter in the network. Each grid-following inverter’s PQV contour includes the information of network topology, inverter ratings, and inverter controller. The developed PQ limits are integrated into the centralized secondary control layer for realization of the proposed IDS. Furthermore, the proposed secondary control layer is capable of providing remedial actions during an anomaly event to enhance the grid resiliency. The theoretical analyses are verified by several attack scenarios for a network of grid-following inverters.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116803266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}