<p><i>Distributed Control and Cyber Security Issues in Microgrids </i>presents a thorough treatment of distributed control methods and cyber security issues for power system researchers and engineers. With the help of mathematical tools, this reference gives a deep understanding of microgrids and ne
Cyber Security for Microgrids
β Scribed by Subham Sahoo, Frede Blaabjerg, Tomislav DragiceviΔ
- Publisher
- The Institution of Engineering and Technology
- Year
- 2022
- Tongue
- English
- Leaves
- 327
- Series
- IET Energy Engineering Series, 196
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Microgrids use ICT to intelligently deliver energy and integrate clean generation. They can operate independently from a larger grid and can help to strengthen grid resilience. Applications include remote as well as urban areas, hospitals, and manufacturing complexes. Cybersecurity challenges arise, exposing the microgrids to cyber-attacks, possibly resulting in harm to infrastructure and to people. Research has classified attacks based on confidentiality, integrity, and availability, and most countermeasures focus on specific attacks or on protecting specific components. A global approach is needed combining solutions that can secure the entire system and respond in milliseconds.
This reference work for researchers, in academia, industry and at grid operators as well as for students, provides an up-to-date framework for cybersecurity technologies and perspectives on operation, control, testbed and protection of microgrids from a system level perspective. Coverage includes the role of modern power electronics in active distribution networks, cyber-induced steady-state and dynamic issues, situational awareness of cyber-attacks, AI aided detection of data manipulation, cyber security threats in multi-agent microgrids, communication assisted protection, design and modeling of cyber-attacks for grid tied PV systems, stealth cyber-attacks, resilient distributed control, cyber-physical testbeds for smart grids and EV charging, and event-driven resiliency of microgrids against cyber-attacks. The book offers advanced cyber-attack detection strategies for microgrids to address breaches, counter attacks, deploy appropriate countermeasures, and stabilize microgrids under cyber-attacks.
β¦ Table of Contents
Contents
About the Editors
1 Cyber-induced power system steady-state and dynamic issues
1.1 Introduction
1.2 System structure and problem description
1.2.1 System operational structure
1.2.2 Feasibility in system level
1.2.3 Stability issue in microgrid level
1.3 Cyber-induced power flow feasibility issue
1.3.1 Introduction
1.3.2 System modeling and problem statement
1.3.3 Defense strategy
1.4 Resiliency mechanism in microgrids
1.5 Conclusion
References
2 Modern power electronics in active distribution network
2.1 Introduction
2.2 AC/DC distribution systems
2.3 Modern power electronics – Key enablers of intelligent grids
2.3.1 Renewable energy interfacing
2.3.2 High-voltage DC transmission systems
2.3.3 Flexible AC transmission systems
2.3.4 Smart transformer
2.4 Controllability
2.5 Artificial intelligence in modern power systems
2.5.1 Energy forecasting
2.5.2 Scheduling and electricity market
2.5.3 System optimization and stability control
2.5.4 Fault detection and protection
2.5.5 Cybersecurity
2.6 Cyber-physical security in active distribution network
2.6.1 Potential vulnerability
2.6.2 Vulnerability analysis of cyber attacks on control of VSCs
2.6.3 Cyber attacks in active distribution network
References
3 Microgrids in mission-critical applications
3.1 Introduction
3.2 Electric aircrafts
3.3 MVDC shipboards
3.4 Coordinated control in aircrafts and shipboards
3.4.1 Aircraft power systems
3.4.2 Shipboard power systems
3.5 Threat analysis against cyber attacks
3.6 Case study of MVDC shipboard microgrid
3.6.1 Attack Scenario 1
3.6.2 Attack Scenario 2
3.7 Conclusion
References
4 Situational awareness of cyber attacks in smart grids
4.1 Introduction
4.1.1 Related work
4.1.2 Challenges for wide-area situational awareness
4.2 Wide-area cybersecurity situational awareness
4.2.1 Conceptual architecture
4.3 Smart grid cybersecurity testbed
4.4 Case study: anomaly detection for WAMS
4.4.1 Synchrophasor-based WAMS
4.4.2 Problem formulation
4.4.3 Prototype demonstration using the commercial platform
4.5 Cybersecurity training for situational awareness
4.6 Conclusion
References
5 Artificial intelligence-aided detection of data manipulation attacks in smart grid
5.1 Introduction
5.1.1 Power grid as a cyber-physical system
5.1.2 Cybersecurity concerns and related work
5.2 Data manipulation attacks on PSSE
5.2.1 Brief overview of state estimation
5.2.2 Attack formulation
5.2.3 Impact analysis
5.3 Defense strategies against FDIAs
5.3.1 Securing measurements: merits and demerits
5.3.2 Hybrid statistical-AI-based detection
5.4 Summary
References
6 Cyber security threats in multi-agent microgrids
6.1 Cyber-physical MG system architecture
6.1.1 Microgrid physical layer architecture
6.1.2 Cyber-communication layer
6.1.3 Control layer
6.2 Distributed control for AC MG
6.2.1 Optimal dispatch control along with frequency restoration
6.2.2 Reactive power sharing along with network voltage restoration
6.3 Cyber threats in multi-agent–based MGs
6.3.1 Types of cyberattacks
6.4 Multi-agent–based cyberattack detection algorithms
6.4.1 Security at cyber layer
6.4.2 Security at physical and control layer
6.5 Summary
References
7 Communication-assisted protections for DC microgrids and their performance analysis during cyberattacks
7.1 Introduction
7.1.1 Related works
7.1.2 Chapter focus
7.2 Fault analysis in DC microgrids
7.2.1 Analysis of capacitor discharge
7.2.2 Freewheeling diode operation
7.3 A Unit protection scheme for DC microgrid
7.3.1 The unit protection methodology
7.3.2 Operation issues and economic aspects
7.3.3 Economics
7.3.4 Case study
7.3.5 Performance with noisy signals
7.4 Centralized protection of DC microgrids
7.4.1 The centralized protection methodology
7.4.2 Cosine similarity index (CSI)-based protection decision
7.4.3 Case study
7.4.4 Discussion
7.5 Performance of communication-based protections during cyber-attacks
7.5.1 Performance of unit protection for cyberattack
7.5.2 Performance of centralized protection for cyberattack
7.6 Conclusion
References
8 Cyber-physical microgrids: toward flexible energy districts
8.1 Introduction
8.2 Impact of nearly zero energy districts
8.3 Methods for improvement of energy flexibility in energy districts
8.4 Cybersecurity of flexible energy districts
8.5 Impact of cyberattacks on flexibility utilization
8.6 Conclusion
References
9 Design and modeling approaches to cyberattacks for grid-tied PV systems
9.1 Overview
9.2 Cyberattack for grid-tied PV system
9.2.1 DoS attack
9.2.2 Data integrity attack
9.2.3 Replay attack
9.2.4 Stealthy attack
9.2.5 Harmonic injection attack
9.2.6 Other attacks
9.3 Physics-based approach
9.4 Data-oriented approach
9.5 FDI attack generation
9.5.1 Physics-oriented tool
9.5.2 Data-oriented tool
9.5.3 GT approach
9.5.4 Generative adversarial networks
9.6 Result and analysis
9.7 Conclusion
References
10 Stealth cyber attacks in microgrids: detectability and observability
10.1 Introduction
10.2 Cyber-physical preliminaries of microgrids
10.3 Proposed stealth attack detection strategies
10.3.1 Stealth attack on voltages
10.3.2 Stealth attack on currents
10.4 Results
10.4.1 Stealth voltage attacks
10.4.2 Stealth current attacks
10.5 Conclusion
Appendix
References
11 Resilient distributed control strategies in microgrids against cyber attacks
11.1 Introduction
11.1.1 Related works
11.1.2 Chapter focus
11.1.3 Chapter structure
11.2 Cyber-physical DC microgrids
11.2.1 Physical networks
11.2.2 Cyber networks
11.2.3 Impact of cyber attacks on microgrids
11.3 Resilient cooperative control in DC microgrids
11.3.1 Structure of resilient cooperative controllers
11.3.2 Proposed baseline attack detectors
11.3.3 Attack scenarios and adversary model
11.3.4 Proposed model of cyber-physical DC microgrids
11.3.5 Metrics for resilient analysis
11.4 Stability and attack-resilience analysis
11.4.1 State space representation of cyber-physical DC microgrids
11.4.2 Stability analysis in the absence of stealthy FDI attacks
11.4.3 Stability under stealthy FDI attacks
11.4.4 Stealthy FDI attack-resilience analysis
11.4.5 Design of resilient cooperative control parameters
11.5 Simulation results
11.6 Conclusion
References
12 Cyber-physical testbeds for smart grid and electric vehicle-charging infrastructure
12.1 Introduction
12.2 Brief description of MG
12.3 Vulnerabilities associated with MG
12.3.1 Overview of the testbed for MG
12.3.2 Features of testbed
12.4 Brief description of EV-charging infrastructure
12.5 Vulnerabilities associated with EV-charging infrastructure
12.5.1 Overview of the testbed for EV-charging infrastructure
12.5.2 Features of testbed
12.6 Conclusion
References
13 Event-driven resiliency of microgrids against cyber attacks
13.1 Introduction
13.2 Preliminaries of cyber-physical microgrids
13.2.1 DC microgrids
13.2.2 AC microgrids
13.3 Proposed event-driven resiliency against cyber attacks
13.3.1 DC microgrids
13.3.2 Mitigation
13.3.3 AC microgrids
13.4 Results
13.4.1 DC microgrids
13.4.2 AC microgrids
13.5 Conclusions
Appendix
References
14 Cybersecurity in future energy systems: outlooks and recommendations
14.1 Introduction
14.1.1 Energy transition
14.1.2 Cyber resilience
14.2 Vulnerabilities, outlooks, and recommendations
14.3 Book summary
References
Index
π SIMILAR VOLUMES
<p><span>This textbook provides students with an overview of cyber-physical microgrid networks and an in-depth introduction to photovoltaics, batteries, flywheel, supercapacitor, micro-turbines, wind generation, power-electronic interfaces, modeling and stability analysis of microgrids, and cyber-co
<p><p>This book is a pioneering yet primary general reference resource on cyber physical systems and their security concerns. Providing a fundamental theoretical background, and a clear and comprehensive overview of security issues in the domain of cyber physical systems, it is useful for students i
<p><span>Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical model
<div>The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed</div><div>proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China.</div><div></div><div>The 100