Blocking microgrid cyberattacks to keep the power flowing

Charalambos Konstantinou (left) and Ioannis Zografopoulos (right) are developing effective methods to increase the resilience of power grids to cyberattacks. Credit: KAUST

Power grids have become far more complex in recent decades due to energy demands, environmental regulations and small-scale renewable energy systems that turn businesses and individuals into combined consumer-producers. One way to ensure that power supplies remain resilient is to create small groups of sources and loads called microgrids. Microgrids can operate independently of the main grid when required, such as supporting hospitals during natural disasters, for example.

As microgrids grow more complex, they require sophisticated computer networks to coordinate, control and distribute different sources of power. Like any network, they are vulnerable to cyberattacks. To prepare for such events, KAUST researchers have been running simulations of possible attacks, assessing the impact that they might have and developing methods to detect and suppress malicious behavior.

“The microgrid system that we considered was the Canadian urban distribution model, comprised of four inverter-based distributed generations (DGs),” says Ph.D. student Ioannis Zografopoulos, who worked on the project alongside Charalambos Konstantinou, assistant professor of computer science. “The Canadian model is ideal to effectively capture the system dynamics and interdependencies between the four DGs and exhibit how a malicious event affecting one DG can propagate to the rest of the system.”

While previous studies into microgrid attacks assumed that attackers have a good knowledge of the power grid’s internal components and structure, Zografopoulos and Konstantinou took a more realistic approach. Instead, they adopted a model where the attacker has limited knowledge but is able to design attacks based on historical measured data about the grid’s performance.

The researchers considered three different types of attack. Zografopoulos explains, “the first scenario involved altering the measurement data that the microgrid system operator uses to coordinate the power generation of the DGs, the second involved modifying the control signals that regulate power conversion within the DG controllers, while the third involved sudden changes in load, causing grid instabilities.”

The simulations showed that all three scenarios could have damaging effects that cascade through the power system, inducing large costs, power losses and damage to equipment. However, the researchers also identified effective methods to quickly and accurately detect the anomalous conditions associated with an incoming attack.

“Our future work will focus on identifying disruptive events and mitigating them via the preventive isolation of microgrid subsystems, safeguarding their crown-jewel components,” says Zografopoulos. “We envision that our contributions will pave the way for resilient microgrids, automating the detection of attacks and supporting defensive and self-healing strategies.”

Going off-grid easier with friends

More information:
Ioannis Zografopoulos et al, Detection of Malicious Attacks in Autonomous Cyber-Physical Inverter-Based Microgrids, IEEE Transactions on Industrial Informatics (2021). DOI: 10.1109/TII.2021.3132131

Provided by
King Abdullah University of Science and Technology

Blocking microgrid cyberattacks to keep the power flowing (2022, February 10)
retrieved 10 February 2022

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.