Resilient Distribution Networks Secure control under DER/PV disruptions



Similar documents
Securing Cyber-Physical Systems

Data Security Concerns for the Electric Grid

Smart Inverters Smart Grid Information Sharing Webcast

Grid Edge Control Extracting Value from the Distribution System

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids

Smart Grid Cyber Security. University of Sydney

Realization of control center HMIs by using IEC and CIM data bases for communication and data handling

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Cybersecurity Risk Assessment in Smart Grids

Summary of CIP Version 5 Standards

Network Security Validation Using Game Theory

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology

Business Continuity for Cyber Threat

Energy Cybersecurity Regulatory Brief

Cyber Security of the Smart Grid

Cisco Security Optimization Service

Alberta Reliability Standard Cyber Security Security Management Controls CIP-003-AB-5

FUNCTIONS AND CAPABILITIES OF PV INVERTERS TO BE PART OF A SMART GRID

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios

Update On Smart Grid Cyber Security

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

Alberta Reliability Standard Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-AB-1

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Synchronized real time data: a new foundation for the Electric Power Grid.

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

Basics of Internet Security

What Risk Managers need to know about ICS Cyber Security

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

APPLICATION NOTE. Increasing PV Hosting Capacity on LV Secondary Circuits with the Gridco System empower TM Solution

Software that provides secure access to technology, everywhere.

Microgrids: Key to Energy Security, Resiliency and Clean Energy. Marita Mirzatuny Project Manager, Smart Power U.S. Climate & Energy EDF

OPC & Security Agenda

5.5. Penetration Tests. Report of the Auditor General of the Ville de Montréal to the City Council and to the Urban Agglomeration Council

Wireless Sensor Networks Chapter 14: Security in WSNs

Siemens Hybrid Power Solutions. Cost and emission reduction by integrating renewables into diesel plants

Cisco Advanced Services for Network Security

How Secure is Your SCADA System?

Security in Smart Grid / IoT. Nenad Andrejević Comtrade Solutions Engineering

Advanced Protection of Distribution Networks with Distributed Generators

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Operation and Control Microgrid and Distributed Generation. Mohammad Shahidehpour Illinois Institute of Technology

Energy Systems Integration

Technical Information POWER PLANT CONTROLLER

What is Really Needed to Secure the Internet of Things?

What is Cyber Liability

Cyber Security. Protecting the UK water industry

Keeping the Lights On

Smart Grid Enabling a Sustainable Energy Future

Energy Storage Systems in Grid4EU Demo4 and in Other Enel Distribuzione Projects Speaker

Integration Capacity Analysis Workshop 11/10/15 California IOU s Approach

Power System review W I L L I A M V. T O R R E A P R I L 1 0,

How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System

A Survey of SCADA and Critical Infrastructure Incidents

CDM Vulnerability Management (VUL) Capability

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006

Cyber Security for SCADA and DCS systems A summary of the current situation and Key points to consider

Integration of Distributed Generation in the Power System. IEEE Press Series on Power Engineering

Information Security Organizations trends are becoming increasingly reliant upon information technology in

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

Smart Grid Cyber Security

Smart Grid and Cyber Challenges

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

TLP WHITE. Denial of service attacks: what you need to know

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

William Hery Research Professor, Computer Science and Engineering NYU-Poly

Cybersecurity for the C-Level

NERC CIP VERSION 5 COMPLIANCE

Detecting Computer Worms in the Cloud

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

Grid Integration of Photovoltaic (PV) Systems

Low-rate TCP-targeted Denial of Service Attack Defense

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

A 360 degree approach to security

APPLICATION SECURITY RESPONSE: WHEN HACKERS COME A-KNOCKING

Creating a Resilient Energy Network of Net Zero Buildings

Steve Lusk Alex Amirnovin Tim Collins

High Performance, Secure VPN Servers for Remote Utility, Industrial Automation Systems:

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Introduction to Wireless Sensor Network Security

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

DeltaV System Cyber-Security

Transcription:

Resilient Distribution Networks Secure control under DER/PV disruptions Saurabh Amin (joint work with Devendra Shelar) Department of Civil and Environmental Engineering MIT Solar Day September 10, 2015

Reliability failures in distribution networks Local disruptions to cascading failures (blackouts) Amin, Shelar (MIT) Resilient Distribution Networks September 10th, 2015 2 / 13

Smart distribution networks Sensor-actuator webs: New functionalities Distributed Energy Resources (DERs): PVs, EVs, DGs State awareness Network control Demand response Cyber-physical interactions: New threats Off-the-shelf IT devices software bugs and hardware flaws Open networks remote accessibility Multi-party management incentives for misbehavior Large number of field devices increased attack surface Cyber-Physical Systems (CPS) Amin, Shelar (MIT) Resilient Distribution Networks September 10th, 2015 3 / 13

Cyber-attacks & the Stuxnet Worm Maroochy Shire sewage plant (2000) Los Angeles traffic control (2008) Tehama Colusa canal system (2007) Cal-ISO power system computers (2007) Amin, Shelar (MIT) Resilient Distribution Networks September 10th, 2015 4 / 13

Main questions When malicious entities (or random failures) compromise DERs/PVs: How to perform security threat assessment of distribution networks under DER/PV disruptions? How to design decentralized defender (network operator) strategies? Control Center sg d sg Substation sg a 0 Nodes with PVs Critical Nodes 13 4 1 12 11 5 3 2 6 7 10 19 18 17 16 8 14 20 21 9 15 26 25 22 23 28 27 24 29 28 35 35 31 32 33 34 36 Amin, Shelar (MIT) Resilient Distribution Networks September 10th, 2015 5 / 13

Hackers: Disruption of supply and protection devices Hacking substation communications Generation Transmission lines Target PVs, EVs, DERs Hack substation communications Introduce incorrect set-points Disable supply & safety devices Cause voltage & freq violations Substation Induce cascading failures Distribution lines Control Central Typical communication New communication requirenments Amin, Shelar (MIT) Resilient Distribution Networks September 10th, 2015 6 / 13

Attacker-defender interaction Game-theoretic model Attacker compromises a subset of DERs/PVs; Defender response by implementing network control Problem statement: Determine worse-case attack plan (compromise DERs/PVs) to induce: loss of voltage regulation loss due to load shedding loss of frequency regulation [esp, for large PV installations] Best defender response (reactive control): Non-compromised DERs provide active and reactive power (VAR) Load control: demand at consumption nodes may be partly satisfied Amin, Shelar (MIT) Resilient Distribution Networks September 10th, 2015 7 / 13

Effect of attack on loss of voltage regulation Optimal defender response under DER/PV disruptions Voltage regulation can be improved by selective load control If load control is costly, defender permits loss of voltage regulation 1200 1000 BF GA BC NPF BC LPF W C = 10 800 LOVR (in $) 600 W C = 2 400 W C = 18 200 0 0 2 4 6 8 10 12 14 δ Amin, Shelar (MIT) Resilient Distribution Networks September 10th, 2015 8 / 13

Effect of attack on cost of load control Optimal defender response under DER/PV disruptions For small intensity attack, load control limits losses For high intensity attack, load control not effective 1600 1400 BF GA BC NPF BC LPF W C = 18 1200 VOLL (in $) 1000 800 600 W C = 10 400 200 W C = 2 0 0 2 4 6 8 10 12 14 δ Amin, Shelar (MIT) Resilient Distribution Networks September 10th, 2015 9 / 13

Optimal PV attack plan Theorem Ọptimal attack plan show downstream preference g j 0 a b c i m j i k e = i k b k e d k Amin, Shelar (MIT) Resilient Distribution Networks September 10th, 2015 10 / 13

Secure network designs: which DERs/PVs to secure? 0 0 1 1 2 3 2 3 4 5 6 7 4 5 6 7 8 9 10 11 12 13 14 15 8 9 10 11 12 13 14 15 Design 1 Design 2 Theorem A homogeneous DN with optimally secure PVs has following properties: If any PV node is secure, secure all its child nodes At most one intermediate level with both vulnerable and secure nodes In this intermediate level, secure nodes uniformly at random Amin, Shelar (MIT) Resilient Distribution Networks September 10th, 2015 11 / 13

Resilient defender response Desirable properties of defender response: 1 Security: Centralized control strategy undesirable if CC-SS communication is vulnerable 2 Compensation to owners: Upstream DERs/PVs likely to be owned by distribution utilities costs when set-points change for larger DERs (esp real power production) 3 Flexibility: Topology of DNs might be variable across time: configuration of worst affected nodes may change We propose a decentralized control strategy and find new set-points for non-compromised nodes using Information: local measurements (voltage & freq) and location of the node with lowest voltage; Diversification: each node contributes either to voltage or to frequency regulation Amin, Shelar (MIT) Resilient Distribution Networks September 10th, 2015 12 / 13

Decentralized DER/PV control Theorem: Node diversification Detect attack Find worst affected nodes Launch distributed energy resources Control voltage & freq violations Prevent cascading failures 0965 Voltage (pu) 096 0955 095 0945 1900 1950 2000 2050 2100 2150 2200 2250 2300 Without control Decentralized control Centralized control Frequency deviation (Hz) 0-01 -01-02 -02-03 -03 2000 2002-04 1900 1950 2000 2050 2100 2150 2200 2250 2300 Time (sec) Amin, Shelar (MIT) Resilient Distribution Networks September 10th, 2015 13 / 13