Open access peer-reviewed chapter - ONLINE FIRST

Enhancing Smart Grid Data Utilization within the Internet of Things Paradigm: A Cyber-Physical Security Framework

Written By

Zhijian Hu and Rong Su

Submitted: 01 June 2024 Reviewed: 17 July 2024 Published: 11 September 2024

DOI: 10.5772/intechopen.1006719

Data Privacy - Techniques, Applications, and Standards IntechOpen
Data Privacy - Techniques, Applications, and Standards Edited by Jaydip Sen

From the Edited Volume

Data Privacy - Techniques, Applications, and Standards [Working Title]

Prof. Jaydip Sen

Chapter metrics overview

6 Chapter Downloads

View Full Metrics

Abstract

The integration of Internet of Things (IoT) technologies transforms traditional power systems into smart grids with more opportunities for optimizing power generation and consumption. However, this integration incurs significant cyber-physical security challenges that must be addressed to ensure the authenticity of critical data. This chapter explores the intersection of smart grid data utilization and cyber-physical security within the IoT paradigm. We first introduce the key components of IoT systems and their communication in smart grids, highlighting the interdependencies and vulnerabilities. Then, we discuss the potential risks associated with the collection, transmission, and utilization of data in smart grid environments, emphasizing the importance of cyber-physical security countermeasures in mitigating these risks. Finally, we propose a cyber-physical security framework equipped with dual risk-mitigation layers, including offline parameter configuration and online intrusion detection, to safeguard smart grid data against cyber-physical threats. By adopting this security framework, stakeholders can leverage the full potential of IoT technologies in smart grids while ensuring the security of the critical infrastructure. This chapter contributes to the ongoing discourse on cyber-physical security in smart grids and provides practical insights for policymakers, industry practitioners, and researchers seeking to address the evolving challenges in this domain.

Keywords

  • internet of things
  • smart grid
  • cyber-physical security
  • data utilization
  • security framework
  • risk-mitigation
  • intrusion detection

1. Introduction

In recent decades, the Internet of Things (IoT) technologies have assumed a pivotal role in the evolution of modern smart grids, significantly enhancing data collection and utilization processes [1]. The integration of IoT technologies provides substantial benefits to smart grids, including advanced smart sensing capabilities and intelligent monitoring systems [2]. However, despite these advantages, the IoT framework presents significant challenges to the secure operation of smart grids. These challenges arise from both cyber and physical perspectives, particularly in environments characterized by uncertainty. Consequently, addressing these security concerns is crucial to ensuring the reliability and stability of smart grid operations.

The uncertainties originating from the IoT system in smart grids can be broadly categorized into two main aspects: data collection from power infrastructures and devices, and data exchange within IoT communication networks. The first aspect pertains to data collection, which typically involves heterogeneous sensors such as phasor measurement units (PMUs) and remote telemetry units (RTUs). These sensors, often installed in outdoor environments, are composed of numerous intelligent units designed for specific purposes such as data measuring, processing, and broadcasting [3, 4, 5]. Due to prolonged exposure to outdoor environments, these sensors face various uncertain factors, including limited processing capacities, functional disorders, sensor aging, and potential physical attacks from adversaries. These limitations can result in temporary sensor failures, leading to the degradation of the authenticity and reliability of the collected data. The second aspect involves data exchange within the IoT communication network. Modern smart grids often span distinct geographical landscapes, including multiple cities and remote communities. These areas share local data with their neighbors in real time, facilitated by wireless sensor networks (WSNs) due to their advantages in flexible deployment, adaptable relocation, and cost-effective installation and maintenance. However, the inherent openness of wireless transmission makes WSNs vulnerable to cyber attacks [6, 7]. Adversaries can exploit these vulnerabilities by injecting false data into the communication links of WSNs, thereby altering data values and potentially destroying the power equipment. These two primary concerns, encompassing both cyber and physical dimensions, form the core topics to be addressed in this chapter.

To address the vulnerabilities inherent in the data collection of smart grids, significant efforts have been undertaken, yielding several promising solutions in recent years [8, 9, 10, 11, 12, 13, 14, 15]. For instance, Ref. [8] examined PMU faults from a hardware-software interaction perspective, developing a comprehensive reliability model for PMUs based on Markov models. This model facilitates the estimation of PMU false data using Monte Carlo simulation techniques. Ref. [10] introduced a hybrid algorithm designed for fast path recovery in wide-area measurement systems to mitigate the effects of intermittent PMU outputs. Ref. [11] identified that intermittent PMU measurements are caused by both natural factors and physical attacks. It employed a Bernoulli process with a specified probability to model these intermittent measurements and the degrees of PMU failure. From the perspective of data utilization, various stability criteria have been employed to ensure the efficient operation of smart grids, despite the imperfections in PMU models, such as mean-square asymptotic stability [11] and stochastic stability [13], both of which are essential for guaranteeing the stability and robustness of smart grids amidst imperfect data collection. These methodologies and criteria serve as valuable tools in enhancing the security of smart grids from cyber-physical perspectives, addressing both hardware-software interactions and external threats to data integrity.

In response to cyber attacks targeting data exchange within IoT communication networks, extensive research has been conducted on cyber attack detection methodologies [7, 16]. Prominent methods include intrusion-detector-dependent attack detection [17, 18], credibility-based attack detection [19, 20], observer/filter-based detection [21], and learning-based detection [22]. For instance, Ref. [17] developed a χ2-detector-dependent approach to identify false data injection (FDI) attacks in distributed frequency regulation, leveraging the decentralized model of each area to provide the frequency reference signal. Ref. [20] incorporated credibility evaluation into frequency regulation within smart grids, effectively mitigating the impact of FDI attacks on frequency dynamics. Ref. [21] proposed a reduced-order observer-based approach for monitoring FDI attacks in large-scale smart grids, utilizing a reduced-order observer to generate residual signals and embedding an adaptive detection threshold to minimize conservativeness. Ref. [7] introduced a data-driven framework encompassing detection, classification, and control signal retrieval to mitigate the impacts of unobservable FDI attacks on smart grids. This framework includes a classifier designed to dynamically learn from historical data and accurately classify FDI attacks under challenging conditions. These advanced methodologies collectively enhance the robustness and security of smart grids against cyber threats, ensuring more reliable operation in the face of unexpected cyber attacks.

Based on the preceding discussion, we acknowledge that these results have contributed to the effective utilization of smart grid data within the IoT architecture. However, these findings are dispersed and lack a unified framework. This chapter aims to establish a comprehensive and systematic framework to enhance smart grid data utilization from both cyber and physical security perspectives, incorporating a wide range of potential uncertainties inherent in the IoT architecture. The proposed framework is designed to be general and represents a significant advancement toward providing a scientific foundation for smart grids in the context of IoT with inherent uncertainties. This framework is inspired from a macro perspective, focusing on system-level data utilization enhancement rather than merely local operations. It is structured into two risk-mitigation layers from cyber-physical perspectives. The first risk-mitigation (physical) layer involves offline control parameter configuration, which aims to integrate easily modeled uncertainties, such as intermittent sensor measurements, into system modeling and control design. This configuration is conducted prior to the deployment of smart grids, thereby contributing to offline security enhancement. To address the inaccurate or incomplete modeling issues that the first layer may not fully resolve, the second risk-mitigation layer is implemented. This layer focuses on online intrusion detection to counter potential cyber attacks within IoT communication networks. The dual-layer framework allows for both independent application and practical integration, providing a high degree of flexibility and universality. This approach offers valuable guidance for both academic researchers and industry practitioners, facilitating effective risk-mitigation and enhancing the reliability of smart grid operations in the face of diverse uncertainties.

The remainder of this chapter is structured as follows. Section 2 introduces the data collection and exchange within IoT in smart grids. Section 3 models the smart grids and potential risks. Section 4 designs the dual-layer security framework for enhancing smart grid data utilization. Section 5 validates the effectiveness of the dual-layer secure framework. Section 6 concludes this chapter.

Advertisement

2. Data collection and exchange within IoT in smart grids

As a representative example of cyber-physical systems, the smart grid exemplifies the intricate interaction between the physical and cyber layers during its operation. The physical layer is primarily responsible for data acquisition, encompassing the measurement and processing of essential signals through various sensor devices, such as PMUs and RTUs. In contrast, the cyber layer focuses on data communication, including the transmission, reception, and exchange of the collected data. Together, these layers form an IoT system, a pivotal concept in the context of smart grids. The IoT system encompasses devices equipped with sensors, computational capabilities, software, and auxiliary technologies, enabling their interconnectivity and data exchange with other devices and systems via the Internet or other communication networks. This interconnectivity is crucial for the implementation of supervisory control and data acquisition (SCADA) systems, which monitor the operational states of smart grids. The IoT system’s applications span various stages of smart grid operation, including power generation, transmission, distribution, and consumption, thereby enhancing efficiency and reliability [23].

The ways of data exchange within IoT are realized by the communication topology, which is commonly determined by the physical connection. Take a typical application scenario of smart grids, the communication topology of a power generation system is determined by the amount of areas and performance requirements. To better describe the characteristics of the communication topology of smart grids, we here introduce the concept of a directed graph.

In graph theory, G=VEL represents the mathematical formulation of a directed graph, which is employed to describe the communication topology in this chapter. Here, V=12n denotes the set of labels corresponding to different areas. The set EV×V characterizes the communication links between these areas. The adjacency matrix L=lijn×n encodes the presence and weights of these communication links, where lij>0 indicates that data transmission occurs from the i-th PMU to the j-th PMU. An area j is defined as a neighbor of an area i if lij=1. Consequently, the set NijVijE specifies the neighbors of the i-th PMU, indicating that the i-th PMU can receive state measurements from its neighboring PMUs jNi according to the defined communication topology.

Advertisement

3. Modeling of smart grids and potential risks

3.1 Modeling of smart grids

This chapter takes the load frequency control (LFC), also named automatic generation control, a typical application in smart grids, as an example. The LFC dynamics of each area contain the following five parts, i.e., generator, governor, power system, tie-line power, and area control error. The dynamics of these five parts are

ΔṖmi=1TdiΔPmi+1TdiΔPvi,E1
ΔṖvi=1RiTgiΔfi1TgiΔPvi+1TgiΔPci,E2
Δḟi=DiTmiΔfi+1TmiΔPmi1TmiΔPtiei1TmiΔPLi,E3
ΔṖtiei=j=1,jiN2πTijΔfiΔfj,E4
ACEi=μiΔfi+ΔPtiei,E5

where the physical meanings of the system parameters are shown in Table 1 [11].

SymbolPhysical meaning
Δfideviation of frequency
ΔPWithe wind power deviation
ΔPmideviation of generator mechanical power
ΔPvideviation of turbine value position
ΔPtieinet tie-line active power flow
ΔPLiload disturbance
Nthe number of areas
Tditime constant of the generator
Tgitime constant of the governor
Tmitime constant of the power system
Rispeed drop
Diequivalent damping coefficient of the generator
Tijtie-line synchronizing coefficient between the area i and j
μifrequency bias constant μi=1/Ri+Di

Table 1.

Parameters of area i.

The compact form of (1)(5) can be described as

ẋi=Aixi+j=1,jiNAijxj+Biui+Fiωi,yi=Cixi,E6

where xi=ΔfiΔPmiΔPviΔPtieiACEiT denotes the state vector; yi denotes the measured output; ui denotes the control input; ωi denotes the load disturbance;

Ai=DiTmi1Tmi01Tmi001Tdi1Tdi001RiTgi01Tgi00j=1,jiN2πTij0000μi0010,
Aij=0000000000000002πTij000000000,CiT=μi000001001,Bi=001Tgi00T,ωi=ΔPLi,ui=ΔPci,Fi=1Tmi0000T.E7

Given that state measurement and feedback control in smart grids are implemented through digital devices like PMUs and RTUs, a discrete-time state-space model is derived to facilitate the subsequent analysis. The discrete-time representation of the continuous-time system model (6) is formulated as

xik+1=Aixik+Biuik+j=1,jiNAijxjk+Fiωik,yik=Cixik,E8

where Ai=eAih, Bi=0heAisBids, Aij=eAijh, Fi=0heAisFids, and Ci=Ci; h denotes the sampling period.

3.2 Potential risks and descriptions

This chapter examines the potential risks to smart grids from both physical and cyber perspectives. Physical risks arise from sensor faults, which can be caused by limited processing capacities, functional impairments, sensor aging, and physical attacks from adversaries. Such sensor faults compromise the authenticity and reliability of the collected data. To model the impact of these physical risks, this chapter utilizes Bernoulli variables to capture the intermittent nature of measurements affected by sensor faults. Consequently, the actual measured output from the sensor i is represented as

y¯ik=θikyik,E9

where θik=0 means that the sensor i suffers faults at the time k, while θik=1 means the sensor i is healthy. The probability distribution of θik satisfies

Probθik=1=θ¯i,Probθik=0=1θ¯i,E10

where Prob denotes the probability operator, θik at different times are assumed to be independent and identically distributed.

Note that θik serves as a comprehensive representation of various factors, including limited processing capacities, functional impairments, sensor aging, and physical attacks from adversaries. Specifically, θik can be expressed as θik=θi1kθi2kθi3kθiMk, where denotes the total number of potential factors contributing to sensor faults.

From the cyber perspective, potential risks arise in the data exchange within the IoT communication network. Modern smart grids typically encompass multiple control areas, which share local data with neighboring areas in real time. However, the inherent openness of these communication networks renders them vulnerable to cyber attacks. Adversaries can inject false data into the communication links based on malicious intent, thereby compromising the data integrity of the national power grid and endangering public safety. In the context of false data injection (FDI) attacks on the communication network, the received data in the control area i, transmitted from neighboring area j, can be modeled as:

y˜jk=y¯jk+GjgjkE11

where y¯jk denotes the measured output at area j; gjk denotes a column vector implying the false data deliberately injected into the communication link from area j to area i by adversaries; and Gj defines the attack selection matrix. For the purposes of the ensuing sensitivity analysis, Gj is assumed to be a diagonal matrix with entries of 0 or 1, where 0 implies a real measurement and one implies a compromised measurement.

Advertisement

4. Dual-layer security framework for enhancing smart grid data utilization

This chapter endeavors to propose a dual-layer security framework for enhancing smart grid data utilization. Section 4.1 focuses on the first risk-mitigation layer, offline control parameter configuration, while Section 4.2 addresses the second risk-mitigation layer, online intrusion detection. In the following, we will discuss these two layers in detail.

4.1 Offline control parameter configuration: First risk-mitigation layer

Since we focus on multi-area smart grids, the distributed output feedback controller is designed considering the sensor faults, whose mathematical formulation is

uik=θikKiyik+j=1,jiNθjkKijyjk,E12

where Ki and Kij are local and neighboring control gains to be determined.

Then, the closed-loop system model (8) becomes

xik+1=Ai+θikBiKiCixik+j=1,jiNAij+θjkBiKijCjxjk+Fiωik,y¯ik=θikCixik.E13

Based on the closed-loop system (13), we will propose Theorem 1 and Theorem 2 to facilitate the control parameter configuration.

Theorem 1.1 Considering the sensor fault probability θ¯i, the closed-loop system (13) is mean-square asymptotically stable with Δfi satisfying the prescribed H performance indicator γi if there exist matrices Pi0 such that, for i=1,2,,N,

Ξ+DTDA¯TPFFTPFγ2I0E14

where Pi is the Lyapunov matrix; “” and “” define “positive definite” and “negative definite” of a matrix, respectively; “” denotes the symmetric item of a sophisticated matrix; DiagNiCi indicates that only the i-th diagonal block owns a nonzero value Ci while other diagonal blocks are all zero; and Ξ=A¯TPA¯+i=1Nρi2LiTPLiP, A¯=A+BKθ¯C, B=DiagB1B2BN, C=DiagC1C2CN, D=DiagD1D2DN, F=DiagF1F2FN, P=DiagP1P2PN, θ=Diagθ1θ2θN, γ=Diagγ1γ2γN, θ¯=Diagθ¯1θ¯2θ¯N, ρi=θ¯i1θ¯i, Di=10000, Li=BKEi, Ei=DiagNiCi, A has the identical form with K,

K=K1K12K1NK21K2K2NKN1KN2KN.E15

Proof: A similar proof procedure can be found in Ref. [24].

Careful readers may observe that condition (14) is not a strict linear matrix inequality (LMI) due to the coupling between the distributed controller gain K and the Lyapunov matrix P. Consequently, to determine the value of K, we further propose Theorem 2.

Theorem 1.2 Considering the sensor fault probability θ¯i, the closed-loop system (13) is mean-square asymptotically stable with Δfi satisfying the prescribed H performance indicator γi if there exist matrices Pi0 and Qi0 such that, for i=1,2,,N,

Q˜0L¯0QA˜FD˜0γ2I0,E16
PiQi=I,E17

where A˜=A+BKθ¯C, D˜=DTDP, L¯=ρ1L1Tkρ2L2TkρNLNTkT, Q˜=DiagNQQQ, and Q=DiagQ1Q2QN.

Proof: A similar proof procedure can be found in Ref. [24].

From Theorem 2, the distributed controller gain K can be determined automatically using the mincx solver in the LMI toolbox. Subsequently, the quantity of the control action can be calculated via(12) and applied to update the system (13). The obtained distributed controller gain K has a certain resiliency to different sensor fault probabilities.

4.2 Online intrusion detection: second risk-mitigation layer

The first risk-mitigation layer aims to tolerate certain categories of easily modeled uncertainties, such as temporary sensor faults, which are modeled offline prior to calculating the controller gains. However, in real-world applications, pre-modeling may be inaccurate or incomplete. Additionally, smart grids may encounter other hard-to-predict uncertainties, such as cyber attacks on communication networks. Consequently, the proposed security framework includes a second risk-mitigation layer to address the deficiencies of the first layer.

To mitigate the impacts of hard-to-predict uncertainties, such as potential false data injection (FDI) attacks on communication networks, on the stable operation of smart grids, an online intrusion detection unit is established at the control center of each area. Given that load disturbances typically follow a normal distribution, this section presents a decentralized model-based χ2 detection mechanism to evaluate the authenticity of data transmitted from neighboring areas in the presence of potential FDI attacks. This detection unit, installed at the local controller, is responsible for verifying the integrity of received data prior to executing control actions.

The fundamental logic behind χ2 detection is to identify abnormal signals by comparing the accumulated error between measured values and their estimates against a predefined alarm threshold. The accumulated error is calculated by

ξjk=l=kΓ+1kŷjly˜jlTŷjly˜jl,kΓ,E18

where ξjk follows a χ2 distribution with 5×Γ1 degrees of freedom, ŷjl represents the estimates of neighboring measurements, and Γ denotes the time window used to determine the number of signals considered.

The χ2 detector at time k is defined as

ξjkH1H0δjE19

where the threshold δj is chosen with precision according to the desired security level, Hypothesis H0 assumes that the received signals are identical to the actual measurements, while the hypothesis H1 posits that there are significant discrepancies. When hypothesis H0 is rejected, the hypothesis H1 is accepted, triggering an alarm. Consequently, the smart grid operators will isolate the compromised communication link.

Note that the precision of the χ2 detection is tightly related to the selected alarming threshold δj. Determining the optimal alarming threshold remains an open challenge in the field. A trade-off is necessary to balance the false isolation rate (FIR), false connection rate (FCR), and average detection time (ADT). The impacts of δj on FIR, FCR, and ADT are thoroughly examined through simulations, aiming to provide valuable insights for researchers and practitioners.

In (18), the estimates of neighboring measurements are calculated based on their respective decentralized models, as follows

x̂jk+1=Ajx̂jk+Bjujk,ŷjk=x̂jk,x̂j0=x̂j0.E20

where the tie-line related signals in (13) are set as zero in (20), to facilitate the calculation of (18).

4.3 Scalability analysis

Careful readers may observe that the mathematical formulation of each layer in the proposed security framework involves numerous parameters. These parameters significantly influence the framework’s implementation efficiency. A particularly important parameter is the subscript i, which appears in almost all mathematical formulas and denotes the number of areas within a large-scale power grid. Theoretically, the number of areas can impact the scalability of the proposed security framework. However, it is advantageous that each area of the large-scale power grid can be represented by an equivalent single-machine-single-load system, ensuring that the number of areas remains manageable. Consequently, each generator within an area will receive a power generation reference based on the reference obtained from the equivalent model and predetermined participation factors. Therefore, scalability is not a concern. The computational complexity and integration cost of the proposed framework with existing systems and control strategies are closely tied to the scale of the smart grid. Given that the number of areas is limited, both computational complexity and integration costs remain reasonable. As a result, the proposed security framework exhibits broad applicability.

Advertisement

5. Validation results

5.1 Structure and parameters of the smart grid

To verify the efficacy of the proposed dual-layer security framework, a four-area fully-connected smart grid is utilized for demonstration. In this configuration, each area is physically interconnected with the other three via tie-lines, facilitating mutual communication. The parameters of the smart grid are detailed in Table 2.

Area 1Area 2Area 3Area 4Unit
D1=5D2=1D3=3D4=4pu/Hz
2H1=202H2=142H3=112H4=9pus
Tch1=1.2Tch2=1.0Tch3=0.7Tch4=0.5s
Tg1=1.2Tg2=0.6Tg3=1.4Tg4=0.8s
R1=0.016R2=0.03R3=0.05R4=0.08Hz/pu
T12=0.1T21=0.1T31=0.1T41=0.1pu/rad
T13=0.1T23=0.1T32=0.1T42=0.1pu/rad
T14=0.1T24=0.1T34=0.1T43=0.1pu/rad

Table 2.

Parameters of the four-area smart grid.

5.2 First risk-mitigation layer validation

To validate the effectiveness of the first risk-mitigation layer, which involves offline control parameter configuration, a traditional PI controller is used as a benchmark. The traditional controller gains are automatically determined using the LMI toolbox in MATLAB, without accounting for PMU faults. Conversely, the risk-mitigation controller gains are automatically selected using the LMI toolbox, considering various PMU fault probabilities. The parameters are set as hi=1, Γi=0.12, and ΔPLik=0.06e0.05krand10.5.

Figures 1 and 2 compare the dynamics of Δfi between the traditional controller and the proposed risk-mitigation controller against PMU fault probabilities of 1θ¯i=0.1 and 0.3. The results indicate that the proposed risk-mitigation controller consistently outperforms the traditional controller, although the extent of improvement varies across scenarios. The incorporation of the first risk-mitigation layer significantly reduces the settling time for each area. In summary, by considering different PMU fault probabilities during the offline control parameter configuration, the controller’s resilience to PMU faults is enhanced. This validates the feasibility and effectiveness of the first risk-mitigation layer.

Figure 1.

Dynamics of Δfi under traditional controller (solid lines) and under risk-mitigation controller (dotted lines) against PMU fault probability 1θ¯i=0.1.

Figure 2.

Dynamics of Δfi under traditional controller (solid lines) and under risk-mitigation controller (dotted lines) against PMU fault probability 1θ¯i=0.3.

5.3 Second risk-mitigation layer validation

To validate the effectiveness of the second risk-mitigation layer, which focuses on online cyber attack detection within the communication network, the parameters for the decentralized model-based χ2 detection mechanism is specified as follows: Γj=20, Φj=Diag11, Gj=Diag10, and δj=10. For demonstration purposes, we assume that the communication link from Area 3 to Area 2 is subjected to the FDI attacks characterized by g2k=0.5+0.015k0T starting from k=50.

Figure 3 compares the dynamics of Δfi with and without the proposed intrusion detection unit. Without the online cyber attack detection unit, all four areas become unstable under FDI attacks, with Area 2 showing the most significant divergence due to cyber attacks on the communication link from Area 3 to Area 2. The other areas exhibit slower divergence influenced by the state updates from Area 2. With the deployment of the model-based χ2 intrusion detection unit, the FDI attacks are promptly identified at t=57s. Subsequently, implementing an attacked data compensation scheme based on the decentralized state estimation model (20), all four areas swiftly return to stable states after a brief period of divergence. The extent of divergence and the detection time are closely related to the false alarm threshold δ2. A larger δ2 requires a longer detection time and results in greater divergence, and vice versa.

Figure 3.

Solid lines imply Δfi without χ2 detection unit while dotted lines imply Δfi with χ2 detection unit.

We also investigate the impacts of various δ2 values (6, 15, 30, 45, 60) on Δf2 under the given FDI attacks, and similar conclusions are drawn. We conduct 100 independent tests to obtain statistical results between a wider range of alarming thresholds δ2 and the Key Performance Indicator (KPIs), as shown in Table 3. Observant readers may note that the FCR remains zero even when δ2 values as large as 90 are used. This occurs because the time-varying FDI attack, characterized by g2k=0.5+0.015k, continually increases in amplitude over time. Consequently, the proposed χ2 detection mechanism can identify such FDI attacks. However, a significant drawback is the extended detection duration, resulting in a more pronounced divergence in frequency deviation dynamics. Table 3 aims to serve as a guide for researchers and practitioners, providing references for balancing the FIR, FCR, and ADT.

δ2FIRFCRADT
900088.60
750069.11
600048.86
300028.24
15008.15
10005.54
62%03.03
58%02.79
314%01.29
127%01.00

Table 3.

KPIs under different δ2.

Advertisement

6. Conclusions

This chapter proposes a dual-layer security framework addressing cyber-physical aspects within the context of IoT systems in smart grids. This framework enhances data utilization in smart grids under conditions of cyber-physical generalized uncertainties, such as sensor faults and cyber attacks. It introduces a novel approach to facilitate data collection and utilization under imperfect conditions and offers a valuable reference for researchers and practitioners in the fields of smart grids. Validation results confirm the feasibility and effectiveness of the proposed cyber-physical security framework for smart grids.

Advertisement

Acknowledgments

This work is supported in part by the A*STAR under its IAF-ICP Programme I2001E0067 and the Schaeffler Hub for Advanced Research at NTU, in part by National Research Foundation of Singapore under its Medium-Sized Center for Advanced Robotics Technology Innovation and by Naval Group Far East Pte Ltd via an RCA with NTU.

References

  1. 1. Li J, Cheng Y. Deep meta-reinforcement learning-based data-driven active fault tolerance load frequency control for islanded microgrids considering internet of things. IEEE Internet of Things Journal. 2024;11(6):10295-10303
  2. 2. Li Y, Zhang H, Liang X, Huang B. Event-triggered-based distributed cooperative energy management for multienergy systems. IEEE Transactions on Industrial Informatics. 2019;15(4):2008-2022
  3. 3. Zhang P, Zhang J, Yang J, Gao S. Resilient event-triggered adaptive cooperative fault-tolerant tracking control for multiagent systems under hybrid actuator faults and communication constraints. IEEE Transactions on Aerospace and Electronic Systems. 2023;59(3):3021-3037
  4. 4. Hu Z, Zhang K, Su R, Wang R. Robust cooperative load frequency control for enhancing wind energy integration in multi-area power systems. IEEE Transactions on Automation Science and Engineering. DOI: 10.1109/TASE.2024.3367030
  5. 5. Gao Z, Song Y, Wen C. Asymptotic tracking control with bounded performance index for MIMO systems: A neuroadaptive fault-tolerant proportional-integral solution. IEEE transactions on. Cybernetics. July 2024;54(7):4255-4266
  6. 6. Ding K, Zhu Q, Huang T. Partial-information-based non-fragile intermittent estimator for microgrids with semi-aperiodic DoS attacks: Gain stochastic float. IEEE Transactions on Power Systems. 2024;39(1):2271-2283
  7. 7. Hallaji E, Razavi-Far R, Wang M, Saif M, Fardanesh B. A stream learning approach for real-time identification of false data injection attacks in cyber-physical power systems. IEEE Transactions on Information Forensics and Security. 2022;17:3934-3945
  8. 8. Roy DS, Murthy C, Mohanta DK. Reliability analysis of phasor measurement unit incorporating hardware and software interaction failures. IET Generation, Transmission & Distribution. 2015;9(2):164-171
  9. 9. Zhang K, Zhijian H, Song F, Yang X, Liu Y. Consensus of input constrained multi-agent systems by dynamic time-varying event-triggered strategy with a designable minimal inter-event time. IEEE Transactions on Circuits and Systems II: Express Briefs. 2024;71(4):2119-2123
  10. 10. Duan T, Dinavahi V. Fast path recovery for single link failure in SDN-enabled wide area measurement system. IEEE Transactions on Smart Grid. 2022;13(2):1645-1653
  11. 11. Zhijian H, Liu S, Luo W, Ligang W. Resilient distributed fuzzy load frequency regulation for power systems under cross-layer random denial-of-service attacks. IEEE Transactions on Cybernetics. 2022;52(4):2396-2406
  12. 12. Xiao S, Dong J. Distributed fault-tolerant containment control for linear heterogeneous multiagent systems: A hierarchical design approach. IEEE Transactions on Cybernetics. 2022;52(2):971-981
  13. 13. Liu S, Zhijian H, Wang X, Ligang W. Stochastic stability analysis and control of secondary frequency regulation for islanded microgrids under random denial of service attacks. IEEE Transactions on Industrial Informatics. 2019;15(7):4066-4075
  14. 14. Zeyuan X, Wang D, Yi G, Zhijian H. Asynchronous tracking control of amplitude signals in vibratory gyroscopes with partially unknown mode information. IEEE Transactions on Industrial Electronics. 2023;70(7):7478-7487
  15. 15. Zhijian H, Rong S, Zhang K, Zeyuan X, Ma R. Resilient event-triggered model predictive control for adaptive cruise control under sensor attacks. IEEE/CAA Journal of Automatica Sinica. 2023;10(3):807-809
  16. 16. Ma R, Zhijian H, Yang H, Jiang Y, Huo M, Luo H, et al. Adversarial FDI attack monitoring: Toward secure defense of industrial electronics. IEEE Industrial Electronics Magazine. June 2024;18(2):48-57
  17. 17. Zhijian H, Liu S, Luo W, Ligang W. Intrusion-detector-dependent distributed economic model predictive control for load frequency regulation with pevs under cyber attacks. IEEE Transactions on Circuits and Systems I: Regular Papers. 2021;68(9):3857-3868
  18. 18. Zhijian H, Rong S, Ling K-V, Guo Y, Ma R. Resilient event-triggered MPC for load frequency regulation with wind turbines under false data injection attacks. IEEE Transactions on Automation Science and Engineering. 2023. DOI: 10.1109/TASE.2023.3337006
  19. 19. Zeng W, Chow M-Y. A reputation-based secure distributed control methodology in D-NCS. IEEE Transactions on Industrial Electronics. 2014;61(11):6294-6303
  20. 20. Zhijian H, Liu S, Luo W, Ligang W. Credibility-based secure distributed load frequency control for power systems under false data injection attacks. IET Generation, Transmission & Distribution. 2020;14(17):3498-3507
  21. 21. Yan J-J, Yang G-H, Wang Y. Dynamic reduced-order observer-based detection of false data injection attacks with application to smart grid systems. IEEE Transactions on Industrial Informatics. 2022;18(10):6712-6722
  22. 22. Zhang K, Rong S, Zhang H, Tian Y. Adaptive resilient event-triggered control design of autonomous vehicles with an iterative single critic learning framework. IEEE Transactions on Neural Networks and Learning Systems. 2021;32(12):5502-5511
  23. 23. Hu Z, Ma R, Wang B, Huang Y, Su R. A general resiliency enhancement framework for load frequency control of interconnected power systems considering internet of things faults. IEEE Transactions on Industrial Informatics. DOI: 10.1109/TII.2024.3397400
  24. 24. Zhijian H, Rong S, Wang R, Liu G, Zhang K, Xie X. Robust distributed load frequency control for multiarea wind energy-dominated microgrids considering phasor measurement unit failures. IEEE Internet of Things Journal. 2024;11(13):23475-23484

Written By

Zhijian Hu and Rong Su

Submitted: 01 June 2024 Reviewed: 17 July 2024 Published: 11 September 2024