Parameters of area
Abstract
The integration of Internet of Things (IoT) technologies transforms traditional power systems into smart grids with more opportunities for optimizing power generation and consumption. However, this integration incurs significant cyber-physical security challenges that must be addressed to ensure the authenticity of critical data. This chapter explores the intersection of smart grid data utilization and cyber-physical security within the IoT paradigm. We first introduce the key components of IoT systems and their communication in smart grids, highlighting the interdependencies and vulnerabilities. Then, we discuss the potential risks associated with the collection, transmission, and utilization of data in smart grid environments, emphasizing the importance of cyber-physical security countermeasures in mitigating these risks. Finally, we propose a cyber-physical security framework equipped with dual risk-mitigation layers, including offline parameter configuration and online intrusion detection, to safeguard smart grid data against cyber-physical threats. By adopting this security framework, stakeholders can leverage the full potential of IoT technologies in smart grids while ensuring the security of the critical infrastructure. This chapter contributes to the ongoing discourse on cyber-physical security in smart grids and provides practical insights for policymakers, industry practitioners, and researchers seeking to address the evolving challenges in this domain.
Keywords
- internet of things
- smart grid
- cyber-physical security
- data utilization
- security framework
- risk-mitigation
- intrusion detection
1. Introduction
In recent decades, the Internet of Things (IoT) technologies have assumed a pivotal role in the evolution of modern smart grids, significantly enhancing data collection and utilization processes [1]. The integration of IoT technologies provides substantial benefits to smart grids, including advanced smart sensing capabilities and intelligent monitoring systems [2]. However, despite these advantages, the IoT framework presents significant challenges to the secure operation of smart grids. These challenges arise from both cyber and physical perspectives, particularly in environments characterized by uncertainty. Consequently, addressing these security concerns is crucial to ensuring the reliability and stability of smart grid operations.
The uncertainties originating from the IoT system in smart grids can be broadly categorized into two main aspects: data collection from power infrastructures and devices, and data exchange within IoT communication networks. The first aspect pertains to data collection, which typically involves heterogeneous sensors such as phasor measurement units (PMUs) and remote telemetry units (RTUs). These sensors, often installed in outdoor environments, are composed of numerous intelligent units designed for specific purposes such as data measuring, processing, and broadcasting [3, 4, 5]. Due to prolonged exposure to outdoor environments, these sensors face various uncertain factors, including limited processing capacities, functional disorders, sensor aging, and potential physical attacks from adversaries. These limitations can result in temporary sensor failures, leading to the degradation of the authenticity and reliability of the collected data. The second aspect involves data exchange within the IoT communication network. Modern smart grids often span distinct geographical landscapes, including multiple cities and remote communities. These areas share local data with their neighbors in real time, facilitated by wireless sensor networks (WSNs) due to their advantages in flexible deployment, adaptable relocation, and cost-effective installation and maintenance. However, the inherent openness of wireless transmission makes WSNs vulnerable to cyber attacks [6, 7]. Adversaries can exploit these vulnerabilities by injecting false data into the communication links of WSNs, thereby altering data values and potentially destroying the power equipment. These two primary concerns, encompassing both cyber and physical dimensions, form the core topics to be addressed in this chapter.
To address the vulnerabilities inherent in the data collection of smart grids, significant efforts have been undertaken, yielding several promising solutions in recent years [8, 9, 10, 11, 12, 13, 14, 15]. For instance, Ref. [8] examined PMU faults from a hardware-software interaction perspective, developing a comprehensive reliability model for PMUs based on Markov models. This model facilitates the estimation of PMU false data using Monte Carlo simulation techniques. Ref. [10] introduced a hybrid algorithm designed for fast path recovery in wide-area measurement systems to mitigate the effects of intermittent PMU outputs. Ref. [11] identified that intermittent PMU measurements are caused by both natural factors and physical attacks. It employed a Bernoulli process with a specified probability to model these intermittent measurements and the degrees of PMU failure. From the perspective of data utilization, various stability criteria have been employed to ensure the efficient operation of smart grids, despite the imperfections in PMU models, such as mean-square asymptotic stability [11] and stochastic stability [13], both of which are essential for guaranteeing the stability and robustness of smart grids amidst imperfect data collection. These methodologies and criteria serve as valuable tools in enhancing the security of smart grids from cyber-physical perspectives, addressing both hardware-software interactions and external threats to data integrity.
In response to cyber attacks targeting data exchange within IoT communication networks, extensive research has been conducted on cyber attack detection methodologies [7, 16]. Prominent methods include intrusion-detector-dependent attack detection [17, 18], credibility-based attack detection [19, 20], observer/filter-based detection [21], and learning-based detection [22]. For instance, Ref. [17] developed a
Based on the preceding discussion, we acknowledge that these results have contributed to the effective utilization of smart grid data within the IoT architecture. However, these findings are dispersed and lack a unified framework. This chapter aims to establish a comprehensive and systematic framework to enhance smart grid data utilization from both cyber and physical security perspectives, incorporating a wide range of potential uncertainties inherent in the IoT architecture. The proposed framework is designed to be general and represents a significant advancement toward providing a scientific foundation for smart grids in the context of IoT with inherent uncertainties. This framework is inspired from a macro perspective, focusing on system-level data utilization enhancement rather than merely local operations. It is structured into two risk-mitigation layers from cyber-physical perspectives. The first risk-mitigation (physical) layer involves offline control parameter configuration, which aims to integrate easily modeled uncertainties, such as intermittent sensor measurements, into system modeling and control design. This configuration is conducted prior to the deployment of smart grids, thereby contributing to offline security enhancement. To address the inaccurate or incomplete modeling issues that the first layer may not fully resolve, the second risk-mitigation layer is implemented. This layer focuses on online intrusion detection to counter potential cyber attacks within IoT communication networks. The dual-layer framework allows for both independent application and practical integration, providing a high degree of flexibility and universality. This approach offers valuable guidance for both academic researchers and industry practitioners, facilitating effective risk-mitigation and enhancing the reliability of smart grid operations in the face of diverse uncertainties.
The remainder of this chapter is structured as follows. Section 2 introduces the data collection and exchange within IoT in smart grids. Section 3 models the smart grids and potential risks. Section 4 designs the dual-layer security framework for enhancing smart grid data utilization. Section 5 validates the effectiveness of the dual-layer secure framework. Section 6 concludes this chapter.
2. Data collection and exchange within IoT in smart grids
As a representative example of cyber-physical systems, the smart grid exemplifies the intricate interaction between the physical and cyber layers during its operation. The physical layer is primarily responsible for data acquisition, encompassing the measurement and processing of essential signals through various sensor devices, such as PMUs and RTUs. In contrast, the cyber layer focuses on data communication, including the transmission, reception, and exchange of the collected data. Together, these layers form an IoT system, a pivotal concept in the context of smart grids. The IoT system encompasses devices equipped with sensors, computational capabilities, software, and auxiliary technologies, enabling their interconnectivity and data exchange with other devices and systems
The ways of data exchange within IoT are realized by the communication topology, which is commonly determined by the physical connection. Take a typical application scenario of smart grids, the communication topology of a power generation system is determined by the amount of areas and performance requirements. To better describe the characteristics of the communication topology of smart grids, we here introduce the concept of a directed graph.
In graph theory,
3. Modeling of smart grids and potential risks
3.1 Modeling of smart grids
This chapter takes the load frequency control (LFC), also named automatic generation control, a typical application in smart grids, as an example. The LFC dynamics of each area contain the following five parts, i.e., generator, governor, power system, tie-line power, and area control error. The dynamics of these five parts are
where the physical meanings of the system parameters are shown in Table 1 [11].
Symbol | Physical meaning |
---|---|
deviation of frequency | |
the wind power deviation | |
deviation of generator mechanical power | |
deviation of turbine value position | |
net tie-line active power flow | |
load disturbance | |
the number of areas | |
time constant of the generator | |
time constant of the governor | |
time constant of the power system | |
speed drop | |
equivalent damping coefficient of the generator | |
tie-line synchronizing coefficient between the area | |
frequency bias constant |
The compact form of (1)–(5) can be described as
where
Given that state measurement and feedback control in smart grids are implemented through digital devices like PMUs and RTUs, a discrete-time state-space model is derived to facilitate the subsequent analysis. The discrete-time representation of the continuous-time system model (6) is formulated as
where
3.2 Potential risks and descriptions
This chapter examines the potential risks to smart grids from both physical and cyber perspectives. Physical risks arise from sensor faults, which can be caused by limited processing capacities, functional impairments, sensor aging, and physical attacks from adversaries. Such sensor faults compromise the authenticity and reliability of the collected data. To model the impact of these physical risks, this chapter utilizes Bernoulli variables to capture the intermittent nature of measurements affected by sensor faults. Consequently, the actual measured output from the sensor
where
where Prob
Note that
From the cyber perspective, potential risks arise in the data exchange within the IoT communication network. Modern smart grids typically encompass multiple control areas, which share local data with neighboring areas in real time. However, the inherent openness of these communication networks renders them vulnerable to cyber attacks. Adversaries can inject false data into the communication links based on malicious intent, thereby compromising the data integrity of the national power grid and endangering public safety. In the context of false data injection (FDI) attacks on the communication network, the received data in the control area
where
4. Dual-layer security framework for enhancing smart grid data utilization
This chapter endeavors to propose a dual-layer security framework for enhancing smart grid data utilization. Section 4.1 focuses on the first risk-mitigation layer, offline control parameter configuration, while Section 4.2 addresses the second risk-mitigation layer, online intrusion detection. In the following, we will discuss these two layers in detail.
4.1 Offline control parameter configuration: First risk-mitigation layer
Since we focus on multi-area smart grids, the distributed output feedback controller is designed considering the sensor faults, whose mathematical formulation is
where
Then, the closed-loop system model (8) becomes
Based on the closed-loop system (13), we will propose Theorem 1 and Theorem 2 to facilitate the control parameter configuration.
Theorem 1.1 Considering the sensor fault probability
where
Careful readers may observe that condition (14) is not a strict linear matrix inequality (LMI) due to the coupling between the distributed controller gain
Theorem 1.2 Considering the sensor fault probability
where
From Theorem 2, the distributed controller gain
4.2 Online intrusion detection: second risk-mitigation layer
The first risk-mitigation layer aims to tolerate certain categories of easily modeled uncertainties, such as temporary sensor faults, which are modeled offline prior to calculating the controller gains. However, in real-world applications, pre-modeling may be inaccurate or incomplete. Additionally, smart grids may encounter other hard-to-predict uncertainties, such as cyber attacks on communication networks. Consequently, the proposed security framework includes a second risk-mitigation layer to address the deficiencies of the first layer.
To mitigate the impacts of hard-to-predict uncertainties, such as potential false data injection (FDI) attacks on communication networks, on the stable operation of smart grids, an online intrusion detection unit is established at the control center of each area. Given that load disturbances typically follow a normal distribution, this section presents a decentralized model-based
The fundamental logic behind
where
The
where the threshold
Note that the precision of the
In (18), the estimates of neighboring measurements are calculated based on their respective decentralized models, as follows
where the tie-line related signals in (13) are set as zero in (20), to facilitate the calculation of (18).
4.3 Scalability analysis
Careful readers may observe that the mathematical formulation of each layer in the proposed security framework involves numerous parameters. These parameters significantly influence the framework’s implementation efficiency. A particularly important parameter is the subscript
5. Validation results
5.1 Structure and parameters of the smart grid
To verify the efficacy of the proposed dual-layer security framework, a four-area fully-connected smart grid is utilized for demonstration. In this configuration, each area is physically interconnected with the other three
Area 1 | Area 2 | Area 3 | Area 4 | Unit |
---|---|---|---|---|
5.2 First risk-mitigation layer validation
To validate the effectiveness of the first risk-mitigation layer, which involves offline control parameter configuration, a traditional PI controller is used as a benchmark. The traditional controller gains are automatically determined using the LMI toolbox in MATLAB, without accounting for PMU faults. Conversely, the risk-mitigation controller gains are automatically selected using the LMI toolbox, considering various PMU fault probabilities. The parameters are set as
Figures 1 and 2 compare the dynamics of
5.3 Second risk-mitigation layer validation
To validate the effectiveness of the second risk-mitigation layer, which focuses on online cyber attack detection within the communication network, the parameters for the decentralized model-based
Figure 3 compares the dynamics of
We also investigate the impacts of various
FIR | FCR | ADT | |
---|---|---|---|
90 | 0 | 0 | 88.60 |
75 | 0 | 0 | 69.11 |
60 | 0 | 0 | 48.86 |
30 | 0 | 0 | 28.24 |
15 | 0 | 0 | 8.15 |
10 | 0 | 0 | 5.54 |
6 | 2% | 0 | 3.03 |
5 | 8% | 0 | 2.79 |
3 | 14% | 0 | 1.29 |
1 | 27% | 0 | 1.00 |
6. Conclusions
This chapter proposes a dual-layer security framework addressing cyber-physical aspects within the context of IoT systems in smart grids. This framework enhances data utilization in smart grids under conditions of cyber-physical generalized uncertainties, such as sensor faults and cyber attacks. It introduces a novel approach to facilitate data collection and utilization under imperfect conditions and offers a valuable reference for researchers and practitioners in the fields of smart grids. Validation results confirm the feasibility and effectiveness of the proposed cyber-physical security framework for smart grids.
Acknowledgments
This work is supported in part by the A*STAR under its IAF-ICP Programme I2001E0067 and the Schaeffler Hub for Advanced Research at NTU, in part by National Research Foundation of Singapore under its Medium-Sized Center for Advanced Robotics Technology Innovation and by Naval Group Far East Pte Ltd via an RCA with NTU.
References
- 1.
Li J, Cheng Y. Deep meta-reinforcement learning-based data-driven active fault tolerance load frequency control for islanded microgrids considering internet of things. IEEE Internet of Things Journal. 2024; 11 (6):10295-10303 - 2.
Li Y, Zhang H, Liang X, Huang B. Event-triggered-based distributed cooperative energy management for multienergy systems. IEEE Transactions on Industrial Informatics. 2019; 15 (4):2008-2022 - 3.
Zhang P, Zhang J, Yang J, Gao S. Resilient event-triggered adaptive cooperative fault-tolerant tracking control for multiagent systems under hybrid actuator faults and communication constraints. IEEE Transactions on Aerospace and Electronic Systems. 2023; 59 (3):3021-3037 - 4.
Hu Z, Zhang K, Su R, Wang R. Robust cooperative load frequency control for enhancing wind energy integration in multi-area power systems. IEEE Transactions on Automation Science and Engineering. DOI: 10.1109/TASE.2024.3367030 - 5.
Gao Z, Song Y, Wen C. Asymptotic tracking control with bounded performance index for MIMO systems: A neuroadaptive fault-tolerant proportional-integral solution. IEEE transactions on. Cybernetics. July 2024; 54 (7):4255-4266 - 6.
Ding K, Zhu Q, Huang T. Partial-information-based non-fragile intermittent estimator for microgrids with semi-aperiodic DoS attacks: Gain stochastic float. IEEE Transactions on Power Systems. 2024; 39 (1):2271-2283 - 7.
Hallaji E, Razavi-Far R, Wang M, Saif M, Fardanesh B. A stream learning approach for real-time identification of false data injection attacks in cyber-physical power systems. IEEE Transactions on Information Forensics and Security. 2022; 17 :3934-3945 - 8.
Roy DS, Murthy C, Mohanta DK. Reliability analysis of phasor measurement unit incorporating hardware and software interaction failures. IET Generation, Transmission & Distribution. 2015; 9 (2):164-171 - 9.
Zhang K, Zhijian H, Song F, Yang X, Liu Y. Consensus of input constrained multi-agent systems by dynamic time-varying event-triggered strategy with a designable minimal inter-event time. IEEE Transactions on Circuits and Systems II: Express Briefs. 2024; 71 (4):2119-2123 - 10.
Duan T, Dinavahi V. Fast path recovery for single link failure in SDN-enabled wide area measurement system. IEEE Transactions on Smart Grid. 2022; 13 (2):1645-1653 - 11.
Zhijian H, Liu S, Luo W, Ligang W. Resilient distributed fuzzy load frequency regulation for power systems under cross-layer random denial-of-service attacks. IEEE Transactions on Cybernetics. 2022; 52 (4):2396-2406 - 12.
Xiao S, Dong J. Distributed fault-tolerant containment control for linear heterogeneous multiagent systems: A hierarchical design approach. IEEE Transactions on Cybernetics. 2022; 52 (2):971-981 - 13.
Liu S, Zhijian H, Wang X, Ligang W. Stochastic stability analysis and control of secondary frequency regulation for islanded microgrids under random denial of service attacks. IEEE Transactions on Industrial Informatics. 2019; 15 (7):4066-4075 - 14.
Zeyuan X, Wang D, Yi G, Zhijian H. Asynchronous tracking control of amplitude signals in vibratory gyroscopes with partially unknown mode information. IEEE Transactions on Industrial Electronics. 2023; 70 (7):7478-7487 - 15.
Zhijian H, Rong S, Zhang K, Zeyuan X, Ma R. Resilient event-triggered model predictive control for adaptive cruise control under sensor attacks. IEEE/CAA Journal of Automatica Sinica. 2023; 10 (3):807-809 - 16.
Ma R, Zhijian H, Yang H, Jiang Y, Huo M, Luo H, et al. Adversarial FDI attack monitoring: Toward secure defense of industrial electronics. IEEE Industrial Electronics Magazine. June 2024; 18 (2):48-57 - 17.
Zhijian H, Liu S, Luo W, Ligang W. Intrusion-detector-dependent distributed economic model predictive control for load frequency regulation with pevs under cyber attacks. IEEE Transactions on Circuits and Systems I: Regular Papers. 2021; 68 (9):3857-3868 - 18.
Zhijian H, Rong S, Ling K-V, Guo Y, Ma R. Resilient event-triggered MPC for load frequency regulation with wind turbines under false data injection attacks. IEEE Transactions on Automation Science and Engineering. 2023. DOI: 10.1109/TASE.2023.3337006 - 19.
Zeng W, Chow M-Y. A reputation-based secure distributed control methodology in D-NCS. IEEE Transactions on Industrial Electronics. 2014; 61 (11):6294-6303 - 20.
Zhijian H, Liu S, Luo W, Ligang W. Credibility-based secure distributed load frequency control for power systems under false data injection attacks. IET Generation, Transmission & Distribution. 2020; 14 (17):3498-3507 - 21.
Yan J-J, Yang G-H, Wang Y. Dynamic reduced-order observer-based detection of false data injection attacks with application to smart grid systems. IEEE Transactions on Industrial Informatics. 2022; 18 (10):6712-6722 - 22.
Zhang K, Rong S, Zhang H, Tian Y. Adaptive resilient event-triggered control design of autonomous vehicles with an iterative single critic learning framework. IEEE Transactions on Neural Networks and Learning Systems. 2021; 32 (12):5502-5511 - 23.
Hu Z, Ma R, Wang B, Huang Y, Su R. A general resiliency enhancement framework for load frequency control of interconnected power systems considering internet of things faults. IEEE Transactions on Industrial Informatics. DOI: 10.1109/TII.2024.3397400 - 24.
Zhijian H, Rong S, Wang R, Liu G, Zhang K, Xie X. Robust distributed load frequency control for multiarea wind energy-dominated microgrids considering phasor measurement unit failures. IEEE Internet of Things Journal. 2024; 11 (13):23475-23484