Chris DeMarco Power System Engineering Research Center Department of Electrical & Computer Engineering University of Wisconsin-Madison, USA



Similar documents
Dynamical Systems Analysis II: Evaluating Stability, Eigenvalues

PLCs and SCADA Systems

Power System review W I L L I A M V. T O R R E A P R I L 1 0,

Understanding SCADA System Security Vulnerabilities

SuperIOr Controller. Digital Dynamics, Inc., 2014 All Rights Reserved. Patent Pending. Rev:

Security in the smart grid

Symantec Client Management Suite 8.0

Chapter 3 Safeguarding Your Network

More effective protection for your access control system with end-to-end security

Oscillation Monitoring System

Transmission Protection Overview

Use and Application of Output Limiting Amplifiers (HFA1115, HFA1130, HFA1135)

Securing the Service Desk in the Cloud

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

CompTIA Network+ (Exam N10-005)

Distributed Power, Renewables, Stored Energy and the Grid Blinkless Synchronous Inverter System

ABB PSPS Erich Steinmann; Generator control-2013

Advantages of Auto-tuning for Servo-motors

dspace DSP DS-1104 based State Observer Design for Position Control of DC Servo Motor

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions

Secure access to a water treatment plant s SCADA network

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

SCADA SYSTEMS AND SECURITY WHITEPAPER

Smart Grid and Renewable Energy Grid Integration. Jian Sun, Professor and Director Department of ECSE & Center for Future Energy Systems

9 Simple steps to secure your Wi-Fi Network.

INTRUSION PREVENTION AND EXPERT SYSTEMS

SCADA. The Heart of an Energy Management System. Presented by: Doug Van Slyke SCADA Specialist

Everything you need for protection scheme testing

OPC COMMUNICATION IN REAL TIME

Electronics for Analog Signal Processing - II Prof. K. Radhakrishna Rao Department of Electrical Engineering Indian Institute of Technology Madras

Wide Area Monitoring Current Continental Europe TSOs Applications Overview

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

TCG Trusted Network Connect IF-MAP Metadata for ICS Security. Document Draft Comments. Prepared by Joseph J. Januszewski, III, CISSP

Industrial Process Controllers

RF Safety Compliance and Duty Cycle for OpenWay CENTRON 4G-LTE Meters December 2015

What Consumers Believe About Cloud File Sharing & Why That s a Warning to IT Pros

An Implementation of Active Data Technology

Hybrid processing of SCADA and synchronized phasor measurements for tracking network state

INTRODUCTION TO SYNCHRONIZING AUTOMATIC SYNCHRONIZING CONSIDERATIONS AND APPLICATIONS

The EVault Portfolio

Smart Grid Security: A roadmap

Microsoft Technologies

Reliably computing cellular automaton, in 1-sparse noise

Engineering innovation

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

High rate and Switched WiFi. WiFi QoS, Security 2G. WiFi a/b/g. PAN LAN Cellular MAN

GENERATOR START CONTROL MODULE - MINI (2 Wire to 3 Wire)

Cancellation of Load-Regulation in Low Drop-Out Regulators

Utilizing Temperature Monitoring to Increase Datacenter Cooling Efficiency

Norton Personal Firewall for Macintosh

ELECTRICAL ENGINEERING

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.

Laboratory 4: Feedback and Compensation

Physical Infrastructure Management Solutions

VOLTAGE REGULATOR AND PARALLEL OPERATION

Data Mining: Algorithms and Applications Matrix Math Review

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Positive Feedback and Oscillators

User Guide for Windows 10

Hacking Database for Owning your Data

Securing your Linksys WRT54G

Transient analysis of integrated solar/diesel hybrid power system using MATLAB Simulink

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Chapter 2 Configuring Your Wireless Network and Security Settings

NetScanner System. Toronto: , Montreal: , Toll Free: ,

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management

Linear Motion and Assembly Technologies Pneumatics Service. Industrial Ethernet: The key advantages of SERCOS III

Permissible ambient temperature Operation Storage, transport

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process

OSI Seven Layers Model Explained with Examples

Troubleshooting and Auto-Negotiation Features for IMC Networks Media Conversion Products

Cyber Security. Doug Houseman Engineering Consulting Research. Modeling Simulation Security. The Practical Grid Visionaries TM

The basic mode for adjusting a time zone clock are primarily: 21, 24 and 51-1 (51-1 is for Alpha Characters) Entering Mode Programming

Innovative Defense Strategies for Securing SCADA & Control Systems

PENETRATION TESTING GUIDE. 1

Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n

PLC Security for Water / Wastewater Systems

Desktop and Laptop Security Policy

WHITEPAPER. 7 Reasons Why Businesses are Shifting to Cloud Backup

Square D Model 6 Motor Control Centers

IBM Deep Computing Visualization Offering

Guide for wireless environments

Reactive Power and Importance to Bulk Power System OAK RIDGE NATIONAL LABORATORY ENGINEERING SCIENCE & TECHNOLOGY DIVISION

Secure Remote Control Security Features for Enterprise Remote Access and Control

Local SecurityNetwork We know what it s all about

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Isolated-Parallel UPS Configuration

PC control for flexible packaging

OPC & DCOM Troubleshooting: Quick Start Guide. Author: Randy Kondor, B.Sc. in Computer Engineering January 2008

Top Signs You re Prime for a Data Breach in 2014

Advanced Transportation Management Systems

For Utility Operations

METHODOLOGICAL CONSIDERATIONS OF DRIVE SYSTEM SIMULATION, WHEN COUPLING FINITE ELEMENT MACHINE MODELS WITH THE CIRCUIT SIMULATOR MODELS OF CONVERTERS.

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

AC : MATHEMATICAL MODELING AND SIMULATION US- ING LABVIEW AND LABVIEW MATHSCRIPT

Transcription:

Grid Vulnerability in Remote Configuration of Generator Controllers: The Threat of Hacking with Megawatts Chris DeMarco Power System Engineering Research Center Department of Electrical & Computer Engineering University of Wisconsin-Madison, USA demarco@engr.wisc.edu

Motivation Idealized economic viewpoint on competitive generating units: one would like to view each as independent entity, interacting with other gens only through the market. Reality: Synchronous generators interconnected in AC grid form a single, unified dynamical system, with significant electromechanical coupling on a continental scale (as witnessed August 14, 2003)

Motivation (cont.) More specifically: on electromechanical timescale, dynamic coupling acts over large geographic distances through interarea modes. This dynamic coupling makes grid stability dependent on control parameters acting on time scales much faster than vast majority of present day ISO s monitoring and sensing.

Motivation (cont.) Observation: with admirable goal of increasing flexibility of equipment and reducing personnel costs, vendors offer remote setting of generator control parameters via internet. At risk of picking on a little guy, consider following control system web advertising from Rapid-Eau Technologies, Inc. (page images to follow sampled Nov. 2005 at www.rapid-eau.com/opsystems.html)

Vendor Example QuickTime and a decompressor are needed to see this picture.

Vendor Example QuickTime and a decompressor are needed to see this picture.

Quoting from Rapid-Eau page: System Configuration and Troubleshooting: An extensive amount of system parameters can be configured by the operator directly from the panel mounted interface. A laptop computer can be easily connected to the PLC to make programming changes and view logic while operating.

Quoting from Rapid-Eau page: Remote Operation: The Ethernet Bridge module is an addon for the PLC that allows remote operation of the entire control system. Remote operation can be configured to use any type of dedicated Ethernet or Internet connection. To ensure system security, features CAN be put into place such as a firewall, data encryption, and user passwords. (emphasis mine )

Abridged version of this talk My strong recommendation to replace: CAN in previous slide with: ABSOLUTELY MUST

For the Unabridged Version I engaged in work in 90 s to demonstrate that governor controller redesign, deployed in small number of governor feedback loops, could selectively destabilize a power system (fairly complete summary of work in T. Gorski and C. DeMarco, "Application of Dynamic Generation Control for Predatory Competitive Advantage in Electric Power Markets," pp. 517-546, in Restructuring, Power Systems Engineering and Economics, F. Galiana, M. Ilic, L. Fink, ed., Kluwer Academic Publishers, Boston, 1998.)

For the Unabridged Version Goal today is to revisit and update that work, with perspective that advances in networked control make an intruder hacking with megawatts a credible threat, as opposed to a dirty trick for a market player seeking competitive advantage, as I envisioned in work almost a decade ago.

Potential Weakness of Previous Formulation In 98 book chapter, estimate of system dynamic state was needed for control at each generator; assumed full state observer in each control loop. Large computational burden might have made predatory control impossible to implement with standard controller hardware: what s a quad processor system doing in that generator s governor loop?

New Contribution Here Show predatory control has special structure that allows much reduced order observers; indeed, only second order controller needed in each loop. Consequence: predatory controller take on extremely simple feedback structure in governor loop, easily implemented with slight software reconfiguration of standard control functions.

New Issues Here Concern 1: ease of nearly normal implementation could make predatory control very difficult to police against. Concern 2: frequency of continuously sampled measurements in present ISO practice make identification of controller parameters in (anywhere near) real time extraordinarily difficult.

Technical Development State feedback predatory control is really simple exercise in eigenvector/eigenvalue placement. Hacker must have approximate knowledge (our studies suggest ±20%) of linearization of system swing dynamics: state matrix A; e-values λ 1, λ 2, λ 3, e-vecs v 1, v 2, v 3...

Technical Development Choose one pair of complex e-values (a swing * mode) to destabilize; say λ 1 = λ 2. * New unstable e-values chosen λ 1 = λ 2. Set of small number m>1 machines collaborate in predatory control; this determines an input matrix B (physically: inputs are Δ power commands at corrupted generators).

Technical Development Design state feedback matrix F such that: (A - BF) v 1 = λ 1 v 1 ; (1) (A - BF)v k = λ k v k for k=3, 4,, n. (2) v 1 is new unstable eigenvector; constructed to maximize component magnitudes at targeted machines, mininmize components at control group machines.

Key New Observation A bit of algebra on (1)& (2) reveals that any F must have rows made only of linear combinations of real & imag part of left eigenvector for original λ 1. Payoff: To estimate Fx, don t need whole state x, only the two dimensional subsystem associated with the one mode λ 1!

Little Case Study Based on modified form of IEEE 14 bus test system; 5 generators, one set as infinite bus here (note that presence of an infinite bus makes job of designing predatory control more challenging!)

12 12 13 13 19 20 # - Transmission Line #'s 19 20 - Transmission Line #'s Bus #'s # - Bus #'s 14 14 14 14 Bus Bus Test Test System System 13 13 11 11 17 17 1 G 1 2 12 12 G 11 11 6 10 10 5 18 18 10 10 16 16 15 15 9 9 7 4 8 7 14 14 8 G 5 2 4 6 G 3 3 G

Predatory Control Design Predatory group gens at buses 2 &3. Control is designed such that ( ideally ): gen@3 experiences no oscillations; gen@8 2.4x larger oscillation than gen@2; gen@8 1.9x larger oscillation than gen@2

Predatory Control Design Each controller acts as a strictly local governor feedback, from local frequency error measurement to commanded prime mover ΔMech_Power.

Predatory Control Design -(0.0982s + 0.5306) G (s) = 1 s 2 0.68s + 25.62 poles at -0.34 ± j5.05, zero at -5.403; G (s) = 0.0474s + 0.6139 2 s 2 0.68s + 25.62 poles at -0.34 ± j5.05, zero at - 12.95.

Simulation Results Simulation here is simple swing dynamics only, classical model (admittedly, a rough cut ) However - it tests efficacy of linear predatory control design in a model reflecting nonlinear power flow coupling.

0.3 Gen @ bus # 2 0.2 0.1 0-0.1-0.2-0.3 0 5 10 15 20 time (sec) Figure 2: Generator@2 Frequency Trajectory

0.15 Gen @ bus # 3 0.1 0.05 0-0.05-0.1-0.15 0 5 10 15 20 time (sec)

0.6 Gen @ bus # 6 0.4 0.2 0-0.2-0.4-0.6 0 5 10 15 20 time (sec)

0.6 Gen @ bus # 8 0.4 0.2 0-0.2-0.4-0.6-0.8 0 5 10 15 20 time (sec)

Observations Recall that common form of protective relay on generators is disconnect on detection of excessive df/dt = rate of change of frequency. Predatory design successfully subjects target machines to much higher df/dt than machines exercising the predatory control.

Observations Key point: generators experiencing the worst instability are NOT those machines causing it!

Conclusions New algebraic observation indicates predatory control very easy to implement. Only second order transfer function added in governor control loop at each participating machine (example here just 2 machines) With remote internet access to gen controller parameters, intruder could turn these on/off selectively.

Conclusions Implications: suggests predatory control might be difficult to police against. In particular, detecting point of intrusion into system would be very challenging without realtime monitoring of internal control parameters to best knowledge of this author, no regulations/ authority for such monitoring currently exist!

Conclusions Decision for today s audience: is this a ridiculous red-herring or a Cassandra s warning: That seduced by attractiveness of advanced internet technology for remote controller updates, insufficient attention will be paid to severe SYSTEM-WIDE vulnerabilities created if intruders gain access to controllers of even a small number of low output generators.