Skip to main content

Dynamical Analysis of Cyber-Related Contingencies Initiated from Substations

Abstract

The N-1 contingency analysis of bulk power systems is a widely accepted pre-screening criterion to ensure system reliability and stability in operational planning. While the nature of contingencies in anticipating the threats relies on the initial events of weather-related storms, the emerging threats of cybersecurity on substation automation have introduced the complexity of threat event combinations. This chapter introduces a fundamental establishment of stability studies under the assumption of intrusion-based cyber-physical attack, which can impact the physical operation of a power system. The study of such combinatorial attacks can be hypothesized based multiple substation outages that can be plotted by attackers to disruptively opening the breakers in compromised substations, S-k, where k is the number of substation outage based on the total number of substations S. This chapter demonstrates the stability of the grid based on the impact analysis initiated hypothetically by switching attacks and the subsequent events that can lead to widespread instability. The proof-of-concept cases included in this study are performed based on the dynamical simulation using the IEEE-14 bus system. Relay models and associated control mechanisms provided are to characterize the relays tripping and its cascading consequences by the initial event of switching attacks based on observation of other locations of relaying. The expected outcome of simulated statistics for the small power system has shown the cascading effects of grids between initial event and topology of the network. The cascading effects of relay models are discerned by the local measurements from other substations based on the electrical quantity, such as frequency and voltage of substations as well as the rotor angle of generators, to exhibit spatiotemporal breaker trippings.

Keywords

  • Electric substation
  • Cyber-attack
  • Cyber-physical system
  • Power system
  • Relay

This is a preview of subscription content, access via your institution.

Buying options

Chapter
EUR   29.95
Price includes VAT (Finland)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR   139.09
Price includes VAT (Finland)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR   186.99
Price includes VAT (Finland)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
EUR   186.99
Price includes VAT (Finland)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions
Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Notes

  1. 1.

    The terms substations and buses are interchangeable and are used throughout the chapter. The “bus” has been used in literature. Both terms indicate a node of power transmission networks. The hypothesized nodal removal is introduced due to the possibilities of remote access to those substations, implied to the possibilities of “intruders” through electronic means. By electrically disconnecting the compromised substation(s) through switching attack, it may introduce grid congestion, leading to various sorts of instability issues from the subsequent events.

References

  1. C.-W. Ten, C.-C. Liu, M. Govindarasu, Vulnerability assessment of cybersecurity for SCADA system. IEEE Trans. Power Syst. 23(4), 1836–1846 (2008)

    CrossRef  Google Scholar 

  2. R. Bulbul, P. Sapkota, C.-W. Ten, L. Wang, A. Ginter, Intrusion evaluation of communication network architectures for power substations. IEEE Trans. Power Syst. 30(30), 1372–1382 (2015)

    CrossRef  Google Scholar 

  3. D. Leversage, E. James, Estimating a system’s mean time-to-compromise. IEEE Secur. Priv. 6(1), 52–60 (2008)

    CrossRef  Google Scholar 

  4. J. Hong, C.-C. Liu, Intelligent electronic devices with collaborative intrusion detection systems. IEEE Trans. Smart Grid 10(1), 271–281 (2019)

    CrossRef  Google Scholar 

  5. C. Moya, J. Wang, Developing correlation indices to identify coordinated cyber-attacks on power grids. IET Cyber-Phys. Syst. Theory Appl. 3(4), 178–186 (2018)

    CrossRef  Google Scholar 

  6. R.P. Stanley, Topics in algebraic combinatorics, course notes for mathematics 192. Harvard University (2013). http://www-math.mit.edu/~rstan/algcomb/algcomb.pdf

  7. Electricity Information Sharing and Anlaysis Center (E-ISAC), Analysis of the cyber attack on the Ukrainian power grid, 18 Mar 2016. https://www.nerc.com/pa/CI/ESISAC/Documents/E-ISAC_SANS_Ukraine_DUC_18Mar2016.pdf

  8. Industrial Control Systems Cyber Emergency Response Team (ICSCERT), Cyber-attack against Ukrainian critical infrastructure, Feb 2016. https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01

  9. E. Perez, First on CNN: U.S. investigators find proof of cyberattack on Ukraine power grid, 3 Feb 2016. http://www.cnn.com/2016/02/03/politics/cyberattack-ukraine-power-grid/

  10. K. Zetter, Everything we know about Ukraine’s power plant hack, 20 Jan 2016. http://www.wired.com/2016/01/everything-we-know-about-ukraines-power-plant-hack/

  11. ICS-CERT Alert (IR-ALERT-H-16-056-01), Cyber-attack against Ukrainian critical infrastructure, 25 Feb 2016. https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01

  12. L. Pietre-Cambacedes, M. Tritschler, G.N. Ericsson, Cybersecurity myths on power control systems: 21 misconceptions and false beliefs. IEEE Trans. Power Del. 26(1), 161–172 (2011)

    CrossRef  Google Scholar 

  13. S. Zonouz, K.M. Rogers, R. Berthier, R.B. Bobba, W.H. Sanders, T.J. Overbye, SCPSE: security-oriented cyber-physical state estimation for power grid critical infrastructures. IEEE Trans. Smart Grid 3(4), 1790–1799 (2012)

    CrossRef  Google Scholar 

  14. Y. Zhang, L. Wang, Y. Xiang, C.-W. Ten, Inclusion of SCADA cyber vulnerability in power system reliability assessment considering optimal resources allocation. IEEE Trans. Power Syst. 31(6), 4379–4394 (2016)

    CrossRef  Google Scholar 

  15. Y. Zhang, L. Wang, Y. Xiang, Power system reliability analysis with intrusion tolerance in SCADA systems. IEEE Trans. Smart Grid 7(2), 669–683 (2016)

    CrossRef  Google Scholar 

  16. M.A.C. Camargo, A.J. Rivera, R.R. Pena, Impact assessment of substation contingencies in power systems, in Transmission Distribution Conference and Exposition - Latin America (PES T D-LA), 2014 IEEE PES, Medellin, Sept 2014, pp. 1–6

    Google Scholar 

  17. S.H. Song, S.H. Lee, T.K. Oh, J. Lee, Risk-based contingency analysis for transmission and substation planning, in Proc. IEEE Trans. Dist. Conf. Exposition: Asia and Pacific, Seoul, Oct. 2009, pp. 1–4

    Google Scholar 

  18. M. Paramasivam, S. Dasgupta, V. Ajjarapu, U. Vaidya, Contingency analysis and identification of dynamic voltage control areas. IEEE Trans. Power Syst. 30(6), 2974 – 2983 (2015)

    CrossRef  Google Scholar 

  19. M.J. Eppstein, P.D. Hines, A “random chemistry” algorithm for identifying collections of multiple contingencies that initiate cascading failure. IEEE Trans. Power Syst. 27(3), 1698–1705 (2012)

    CrossRef  Google Scholar 

  20. Q. Chen, J. McCalley, Identifying high risk N-k contingencies for on-line security assessment. IEEE Trans. Power Syst. 20(2), 823–834 (2005)

    CrossRef  Google Scholar 

  21. V. Madani, Global industry experiences with system integrity protection schemes (SIPS). IEEE Power System Relaying Committee, Tech. Rep. Working Group C4 2009 Report, Oct 2009

    Google Scholar 

  22. P. Kundur, J. Paserba, V. Ajjarapu, G. Andersson, A. Bose, C. Canizares, N. Hatziargyriou, D. Hill, A. Stankovic, C. Taylor, T.V. Cutsem, V. Vittal, Definition and classification of power system stability IEEE/CIGRE joint task force on stability terms and definitions. IEEE Trans. Power Syst. 19(3), 1387–1401 (2004)

    CrossRef  Google Scholar 

  23. W. G. C2/C4.37, A proposed framework for coordinated power system stability control. CIGRE, Paris, Tech. Rep. TB742, Sept 2018

    Google Scholar 

  24. C.-W. Ten, K. Yamashita, Z. Yang, A. Vasilakos, A. Ginter, Impact assessment of hypothesized cyberattacks on interconnected bulk power systems. IEEE Trans. Smart Grid 9(5), 4405–4425 (2018)

    CrossRef  Google Scholar 

  25. C.-W. Ten, A. Ginter, R. Bulbul, Cyber-based contingency analysis. IEEE Trans. Power Syst. 31(4), 3040–3050 (2016)

    CrossRef  Google Scholar 

  26. Z. Yang, C.-W. Ten, A. Ginter, Extended enumeration of hypothesized substations outages incorporating overload implication. IEEE Trans. Smart Grid 9(6), 6929–6938 (2018)

    CrossRef  Google Scholar 

  27. Z. Huang, Y. Chen, J. Nieplocha, Massive contingency analysis with high performance computing, in Power Energy Society General Meeting, 2009. PES ’09. IEEE, Calgary, AB, July 2009, pp. 1–8

    Google Scholar 

  28. V. Vittal, J.D. McCalley, P. Anderson, A. Fouad, Power System Control and Stability, 3rd edn. (Wiley-IEEE Press, Hoboken, 2019)

    Google Scholar 

  29. CIGRE Working Group B5.19, Protection Relay Coordination. Technical Brochure 432, pp. 1–179, Oct 2010

    Google Scholar 

  30. P. Kundar, Power System Stability and Control, 1st edn. (McGraw-Hill, New York, 1994)

    Google Scholar 

  31. IEEE Recommended Practice for Excitation System Models for Power System Stability Studies. IEEE Std. 421.5, 2016

    Google Scholar 

  32. H. Taniguchi, Power System Analysis – Modeling and Simulation (Japanese), 1st edn. (IEEJ and Ohmsha, Tokyo, 2009)

    Google Scholar 

  33. P. Pourbeik, Dynamic models for turbine-governors in power system studies. IEEE PES, Tech. Rep. PES-TR1, Jan 2013

    Google Scholar 

  34. Power System Stability Study Group, Integrated Analysis Software for Bulk Power System Stability. CRIEPI Report: ET90002, July 1991

    Google Scholar 

  35. R.D. Christie, Power systems test case archive, Aug 1999. https://labs.ece.uw.edu/pstca/

  36. ERCOT, ERCOT nodal operating guides – section 2: system operations and control requirements, May 2019

    Google Scholar 

  37. PJM Manual 36: System Restoration Revision: 25, PJM System Operations Division, June 2018. https://www.pjm.com/~/media/documents/manuals/m36.ashx

  38. IEEE SCC21 Standards Coordinating Committee on Fuel Cells, Photovoltaics, Dispersed Generation, and Energy Storage, in IEEE Standard for Interconnection and Interoperability of Distributed Energy Resources with Associated Electric Power Systems Interfaces, April 2018 (IEEE, Piscataway, 2018)

    Google Scholar 

  39. J.L. Blackburn, T.J. Domin, Protective Relaying: Principles and Applications, 4th edn. (CRC Press, Boca Raton, 2014)

    CrossRef  Google Scholar 

  40. W.G. C4.605, Modeling and aggregation of loads in flexible power networks. CIGRE, Paris, Tech. Rep. TB566, Feb 2014

    Google Scholar 

  41. J.V. Milanovic, K. Yamashita, S.M. Villanueva, S. Djokic, L.M. Korunovic, International industry practice on power system load modeling. IEEE Trans. Power Syst. 28(3), 3038–12 (2013)

    CrossRef  Google Scholar 

  42. S.M. Villanueva, K. Yamashita, L.M. Korunovic, S.Z. Djokic, J. Matevosyan, A. Borghetti, Z.Y. Dong, J.V. Milanovic, CIGRE WG C4.605 – modeling and aggregation of loads in flexible power networks – scope and status of the work by June 2012, in Proc. of CIGRE C4 Colloquium, Hakodate (2012), pp. 109–114

    Google Scholar 

  43. Y. Tang, S. Zhao, C. Ten, K. Zhang, L. Thillainathan, Establishment of enhanced load modeling by correlating with occupancy information. IEEE Trans. Smart Grid 11, 1–12 (2019)

    Google Scholar 

  44. K. Yamashita, S.Z. Djokic, F. Villella, J.V. Milanovic, Self-disconnection and self-recovery of loads due to voltage sags and short interruptions, in Proc. of CIGRE Symposium, Lisbon, April 2013, pp. 22–24

    Google Scholar 

  45. IEEE Standard for Electrical Power System Device Function Numbers, Acronyms, and Contact Designations, IEEE Std. C37.2, 2008

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Koji Yamashita .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Yamashita, K., Ten, CW., Wang, L. (2020). Dynamical Analysis of Cyber-Related Contingencies Initiated from Substations. In: Karimipour, H., Srikantha, P., Farag, H., Wei-Kocsis, J. (eds) Security of Cyber-Physical Systems. Springer, Cham. https://doi.org/10.1007/978-3-030-45541-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-45541-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-45540-8

  • Online ISBN: 978-3-030-45541-5

  • eBook Packages: Computer ScienceComputer Science (R0)