SlideShare a Scribd company logo
1 of 3
Download to read offline
Optimized Predictive Control for AGC Cyber Resiliency
Muhammad Nouman Nafees
Cardiff University
Cardiff, United Kingdom
nafeesm@cardiff.ac.uk
Neetesh Saxena
Cardiff University
Cardiff, United Kingdom
saxenan4@cardiff.ac.uk
Pete Burnap
Cardiff University
Cardiff, United Kingdom
burnapp@cardiff.ac.uk
ABSTRACT
Automatic Generation Control (AGC) is used in smart grid systems
to maintain the grid’s frequency to a nominal value. Cyber-attacks
such as time delay and false data injection on the tie-line power flow,
frequency measurements, and Area Control Error (ACE) control
signals can cause frequency excursion that can trigger load shed-
ding, generators’ damage, and blackouts. Therefore, resilience and
detection of attacks are of paramount importance in terms of the
reliable operation of the grid. In contrast with the previous works
that overlook ACE resiliency, this paper proposes an approach for
cyber-attack detection and resiliency in the overall AGC process.
We propose a state estimation algorithm approach for the AGC
system by utilizing prior information based on Gaussian process
regression, a non-parametric, Bayesian approach to regression. We
evaluate our approach using the PowerWorld simulator based on
the three-area New England IEEE 39-bus model. Moreover, we uti-
lize the modified version of the New England ISO load data for
the three-area power system to create a more realistic dataset. Our
results clearly show that our resilient control system approach can
mitigate the system using predictive control and detect the attack
with a 100 percent detection rate in a shorter period using prior
auxiliary information.
CCS CONCEPTS
• Security and privacy Intrusion detection systems;
KEYWORDS
automatic generation control; resiliency; anomaly detection
ACM Reference Format:
Muhammad Nouman Nafees, Neetesh Saxena, and Pete Burnap. 2021. Opti-
mized Predictive Control for AGC Cyber Resiliency . In Proceedings of the
2021 ACM SIGSAC Conference on Computer and Communications Security
(CCS ’21), November 15–19, 2021, Virtual Event, Republic of Korea. ACM, New
York, NY, USA, 4 pages. https://doi.org/10.1145/3460120.3485358
1 INTRODUCTION
The Automatic Generation Control (AGC) is a wide-area frequency
control application that ensures frequency stability and keeps the
power interchange between Balancing Authority (BA) areas at the
Permission to make digital or hard copies of part or all of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for third-party components of this work must be
honored. For all other uses, contact the Owner/Author.
CCS '21, November 15–19, 2021, Virtual Event, Republic of Korea
© 2021 Copyright is held by the owner/author(s).
ACM ISBN 978-1-4503-8454-4/21/11.
https://doi.org/10.1145/3460120.3485358
scheduled values [7]. The control of the AGC mechanism relies on
geographically dispersed sensing devices that are remotely con-
trolled. The tie-line power flow between BA areas and frequency
measurements from these sensing devices are sent to supervisory
control and data acquisition (SCADA) systems and control centers.
State Estimation (SE) ensures the data measurement integrity for
power flow, and frequency measurements and Bad Data Detection
(BDD) algorithm are applied. SE can reduce measurement noise
and detect faulty sensor data. However, Area Control Error (ACE)
measurement, an integral part of the AGC algorithm, is vulnerable
to integrity attacks due to no estimation mechanism for such mea-
surements. Such underlying vulnerability may significantly degrade
system performance under cyber-attacks; false data injection and
time delay attacks over the communication channels may mislead
the AGC performance, triggering improper actions such as load
shedding and even cascading outages.
The Department of Homeland security and the National Institute
for Standards and Technology (NIST) recommends Intrusion Detec-
tion Systems (IDS) and De-militarized zones to protect the critical
infrastructures [4, 5]. Implementing these technologies in Informa-
tion Technology (IT) is well understood; however, much of what
is known about the applicability to the AGC is still anecdotal due
to the intrinsic constraints such as stringent timing requirements,
non-synchronicity of signals, and other inescapable non-linearities.
In addition, the existing diagnosis approaches for attack-resilient
algorithms in AGC typically cover measurement noise and other
anomalous factors only in state estimation for tie-line power flow
and frequency measurements. Recent works focus on a model-based
AGC cyber-attack resiliency approach that involves correlating all
the required parameters. In [7], Zhang et al. proposed an attack im-
pact evaluation framework by utilizing stochastic system analysis
methods to evaluate the statistics of system state variables in the
AGC. However, the resilience and detection of cyber-attacks was
not the scope of the work. Similar to our work, Tan et al. [6] derived
an attack impact model consisting of a series of false data injec-
tions and developing an efficient algorithm to detect the attacks.
However, the work only considers the consistency between the ob-
served frequency deviation and the predicted frequency deviation
and ignores the ACE measurement integrity.
Contributions. Our aim in this paper is to introduce an ap-
proach for cyber-attack detection and resiliency in the AGC pro-
cess: Resiliency refers to the capability of a system to maintain low
estimation error under cyber-attacks. In this direction, we propose
a state estimation-based detection approach for the AGC system by
utilizing prior information based on Gaussian process regression,
a non-parametric, Bayesian approach to regression. We use the
information to boost state estimation and resiliency and enforce
properties about how the algorithm identifies the anomalous mea-
surements. Specifically, our approach utilizes the model-based and
Session 8: Poster  Demo Session CCS ’21, November 15–19, 2021, Virtual Event, Republic of Korea
2450
AGC
Algorithm
- With Prior
- Without Prior
Gaussian Process
Regression
Estimation
ACE Forecast
Load Forecast
Predicted ACE
Anomaly
Yes/No
No - Real ACE
Yes
Real
ACE
Tie-line Power Flow
Frequency Resilient Estimator
Figure 1: Conceptual resilient control model for AGC.
data-driven algorithm to boost the resiliency and detection perfor-
mance: Properties of the model-based method and the accuracy
of the data-driven method provide further redundancy, which can
enhance the overall system performance. To validate our approach,
we used the PowerWorld simulator based on the three-area New
England IEEE 39-bus model. Furthermore, we also utilized and mod-
ified the New England ISO load data for a 3-area power system to
create a more realistic dataset.
2 AGC RESILIENCE USING PRIOR
INFORMATION
This section presents the AGC model details adopted in this work.
Furthermore, we provide the prior model and anomaly detection
engine estimation, seeking to correlate between tie-line power flow,
frequency, and ACE measurements. Lastly, we present the threat
model.
System Model. As in the smart grid AGC literature, we consider
a standard electric power AGC system; where the function of the
system is to maintain the system frequency at its nominal value, e.g.,
60 Hz in North America, and to regulate the net scheduled value of
power flow across different BAs. The state variables are represented
by the system’s tie-line power flow and frequency measurements:
The AGC controller computes the ACE using these measurements
after receiving them over a communication network. For the 𝑖𝑡ℎ
area, 𝐴𝐶𝐸𝑖 = 𝑎𝑖 · 𝑃𝐸𝑖 + 𝑏𝑖 · 𝑓𝑖, where 𝑃𝐸𝑖 and 𝑓𝑖 are the 𝑖𝑡ℎ area’s
power export and frequency deviation of the grid, whereas 𝑎𝑖 and
𝑏𝑖 are the constants. The ACE values are sent to the generators
to adjust the primary control loop set-points, and the process is
repeated every 2-4 seconds, also referred to as the AGC cycle.
Prior Model. The objective of the prior model is to provide an
extra layer of resiliency to the AGC system. We use auxiliary models
such as transformer ratings, historical information of generator ca-
pacity, statistical characterization of tie-line power flow, frequency,
and ACE values to map them with the real-time measurements
by building Gaussian process regression with hyper-parameters
tuning in the machine learning algorithms and data pre-processing
tool known as Weka. Specifically, the prior information and load
data are fed into our proposed model to correlate with the forecast
values of power flow, frequency, and ACE values.
Anomaly detection Engine Estimation. We now describe
how our approach instantiates each of the phases in the cyber-
attack detection and resilience architecture. Figure 1 presents a con-
ceptual diagram of our proposed model for the AGC. Throughout
the resilient control and detection mechanism, we integrate model-
based and data-driven techniques to boost the performance of our
proposed approach: We use Gaussian Process for the data-driven
scheme for the predicted estimation of the AGC relevant measure-
ments. The final ACE measurement is correlated with the prior
information to identify any anomalous measurements throughout
the real-time process. If the ACE value does not get to zero due to
any frequency fault or cyber-attack, the system utilizes the prior
auxiliary information to compute the probability of the error and
compare it with the real-time values. For liveness, the framework
relies on the sum of two terms: The significant difference between
the actual and forecasted values; and the temporal characterization
of the control signal to identify the cyber-attacks such as ramp at-
tacks where the adversary gradually deviates the system frequency
to conceal the attack.
Threat model. We can envision that an adversary has gained
initial access to the communication system via social engineering
techniques. Next, an adversary can mount time delay attacks be-
tween the controller and actuator to delay control commands. For
example, an attacker can compromise a communication path such
as a router to delay the control commands. Similarly, adversaries
can access remote sensors to mount false data injection attacks on
power flow measurements. In this scenario, the attacker tries to
provide a wrong perception of the system load. For example, the at-
tacker can trick any area of AGC into believing that the power flow
has increased/decreased; the action can cause the incorrect compu-
tation of an ACE value sent to the generators. Consequently, the
wrong ACE value sent to the generator will falsely ramp up/down
the generator. Any of the mentioned scenarios can adversely impact
the performance of the AGC system, which can cause generation
imbalance and destabilize systems’ frequency.
3 EVALUATION - AGC AND SIMULATION
SETTINGS
To evaluate our approach, we conduct PowerWorld [2] simula-
tions - an industry-class high-class fidelity simulator – based on the
three-area New England IEEE 39-bus model [1]. The complete sys-
tem contains 10 generators with the same value of nominal power
1000 MVA, 19 loads, and 39 buses. Furthermore, each generator is
equipped with 4 second AGC cycle length and Multi-Band Power
System Stabilizer (MBPSS). Frequency deviation and the measure-
ment of tie-line active power exchanged are utilized to compute the
ACE. Moreover, we collect frequency values locally using a rotor
speed deviation of all generators; frequency is a global signal that
does not have significant variations throughout the power system,
and a rotor speed deviation is equal to a frequency deviation.
To validate our approach, we consider two simulation scenar-
ios: The first is a false data injection to the tine-line power flow
measurements in which we increase the power flow values with
small magnitude to cause grid frequency fluctuations; in the second
scenario, we consider the delay of ACE values to the generators
in which we employ the OpenSSL 1.0.1 to mimic a control center
Session 8: Poster  Demo Session CCS ’21, November 15–19, 2021, Virtual Event, Republic of Korea
2451
58.6
58.8
60.0
60.2
60.4
110 120 130 140 150 160
Time (s)
Frequency
(Hz)
(a)
Normal Attack Predicted
0.20
0.40
0.60
0.80
1.00
0.4 0.8 1.2 1.6 2.0 2.4
Injection Magnitude
Detection
Probability
(b)
With Prior
Withour Prior
Figure 2: (a) Validating prediction for AGC frequency under
false data injection attack. (b) Efficacy of prior information
in detection probability.
and a substation. An SSL session is established every 4 seconds to
transmit sensor readings. The simulation of AGC under no attack
starts at t = 15s and terminates at t = 340s, and data is collected
with a frequency of 0.25, which is equivalent to 4 seconds. The
simulation generates zero-mean process and measurement noises
as the default settings.
To create a dataset for evaluation, we also utilize the New Eng-
land ISO load data for a 3-area power system [3]; we modified the
load data by adding unavailable line load information from our
simulation results. Moreover, we duplicated the data with the sim-
ulation results of attack scenarios: The corrupted load data with
the standard deviation of 97 was correlated with actual simulation
results for the accuracy of the dataset. To reduce the size of the
dataset, we used a smaller range of ACE delay attacks. The data is
then fed into Gaussian process regression with hyper-parameters
tuning in the Weka tool to produce mean and covariance matrix of
the corresponding power flow and frequency deviation measure-
ments. Towards this end, auxiliary variables and prior information
are fed into the model to correlate the corresponding measurements
with the historical values accurately.
Simulation Results. Figure 2 (a) shows the results of our pro-
posed resilient control approach during the false data injection
attack on power flow measurements. The horizontal axis is time in
seconds, while the vertical axis is the gird’s frequency. During the
injection attack to power flow and frequency readings, the gird’s
frequency fluctuates and decreases to a minimum of 58.6 Hz. As
seen from the figure, the system’s predicted value is closer to the ac-
tual values, the performance of the resilient control system clearly
suggests an anomaly; therefore, it maintains the system’s frequency
according to the predicted values using the combination of prior
auxiliary information and independent power system attributes.
Furthermore, Figure 2 (b) shows the detection probability against
the magnitude of the false data injection attack. The results show
that resilient control using prior information has a better attack
detection probability compared to the results of detecting an attack
without utilizing prior information and attributes.
Figure 3 (a) compares the predicted frequency deviation values
during the time delay attacks. The algorithm calculates the fre-
quency deviation based on prior information and historical data
of local measurement of frequency and tie-line power flow. The
prediction improves with an increasing number of AGC cycles; it
-0.4
-.02
0.0
0.2
0.4
110 130 150 170 190 200
AGC Cycle Index - Time Delay
Frequency
Dev.(Hz)
(a)
Normal Attack Predicted
0.20
0.40
0.60
0.80
1.00
1.0 2.0 3.0 4.0 6.0 7.0
Time Period
Detection
Probability
(b)
With Prior
Withour Prior
Figure 3: (a) Predicted frequency deviation using the regres-
sion model. (b) Impact of prior information on detection
probability over time.
means there will be more waiting time for the detection of an attack,
leading to a longer reaction time to counteract the attack. However,
the system remains stable under lower frequency fluctuation in
stealthy attacks as it marks the field measurements as anomalous
after identifying the attack; this means the accuracy of detection
becomes better for the stealthy time delay attack after some AGC
cycles. Similarly, Figure 3 (b) compares the detection probability
against time. The approach with prior information clearly identifies
the attack with a 100 % detection rate in a shorter period than using
without prior auxiliary information.
4 CONCLUSION
In this paper, we proposed an approach based on prior informa-
tion for the AGC cyber-attack detection and resiliency. Specifically,
we showed that specific power system attributes in conjunction
with prior auxiliary information could improve the system’s re-
siliency against cyber-attacks. To validate our approach, we used
the PowerWorld simulator based on the three-area New England
IEEE 39-bus model. The results demonstrate that incorporating
prior information based on Gaussian process regression can signifi-
cantly improve the system’s resiliency and probability of predicting
cyber-attacks correctly. Our future work will aim to investigate
the performance of our approach for malicious and natural load
disturbances. Moreover, we plan to add more power systems at-
tributes and prior information to evaluate this approach against a
wide variety of cyber-attacks.
REFERENCES
[1] 2021. New-England-IEEE-39-bus-system. (2021). https://electricgrids.engr.tamu.
edu/
[2] 2021. PowerWorldThe visual approach to electric power systems. (2021). https:
//www.powerworld.com/
[3] 2021. Pricing Reports. (2021). https://www.iso-ne.com/isoexpress/web/reports/
pricing
[4] David Kuipers and Mark Fabro. 2006. Control systems cyber security: Defense in
depth strategies. Technical Report. Idaho National Laboratory (INL).
[5] Victoria Y Pillitteri and Tanya L Brewer. 2014. Guidelines for smart grid cyberse-
curity. (2014).
[6] Rui Tan, Hoang Hai Nguyen, Eddy YS Foo, Xinshu Dong, David KY Yau, Zbigniew
Kalbarczyk, Ravishankar K Iyer, and Hoay Beng Gooi. 2016. Optimal false data
injection attack against automatic generation control in power grids. In 2016
ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS). 1–10.
[7] Jiangmeng Zhang and Alejandro D Domínguez-García. 2016. On the impact
of measurement errors on power system automatic generation control. IEEE
Transactions on Smart Grid 9, 3 (2016), 1859–1868.
Session 8: Poster  Demo Session CCS ’21, November 15–19, 2021, Virtual Event, Republic of Korea
2452

More Related Content

Similar to Optimized Predictive Control for AGC Cyber Resiliency.pdf

SYNCHROPHASOR DATA BASED INTELLIGENT ALGORITHM FOR REAL TIME EVENT DETECTION ...
SYNCHROPHASOR DATA BASED INTELLIGENT ALGORITHM FOR REAL TIME EVENT DETECTION ...SYNCHROPHASOR DATA BASED INTELLIGENT ALGORITHM FOR REAL TIME EVENT DETECTION ...
SYNCHROPHASOR DATA BASED INTELLIGENT ALGORITHM FOR REAL TIME EVENT DETECTION ...IAEME Publication
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksEcway Technologies
 
Java in-network estimation with delay constraints in wireless sensor networks
Java  in-network estimation with delay constraints in wireless sensor networksJava  in-network estimation with delay constraints in wireless sensor networks
Java in-network estimation with delay constraints in wireless sensor networksecwayerode
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksecway
 
On false data injection attacks against power system
On false data injection attacks against power systemOn false data injection attacks against power system
On false data injection attacks against power systemShakas Technologies
 
IRJET- A Literature Study on Fault Recognition in Different System
IRJET- A Literature Study on Fault Recognition in Different SystemIRJET- A Literature Study on Fault Recognition in Different System
IRJET- A Literature Study on Fault Recognition in Different SystemIRJET Journal
 
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...chennaijp
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...swathi78
 
International Journal of Engineering (IJE) Volume (3) Issue (1)
International Journal of Engineering (IJE) Volume (3)  Issue (1)International Journal of Engineering (IJE) Volume (3)  Issue (1)
International Journal of Engineering (IJE) Volume (3) Issue (1)CSCJournals
 
Enhanced Protection Modeling Approach for Power System Transient Stability St...
Enhanced Protection Modeling Approach for Power System Transient Stability St...Enhanced Protection Modeling Approach for Power System Transient Stability St...
Enhanced Protection Modeling Approach for Power System Transient Stability St...Power System Operation
 
Study on the performance indicators for smart grids: a comprehensive review
Study on the performance indicators for smart grids: a comprehensive reviewStudy on the performance indicators for smart grids: a comprehensive review
Study on the performance indicators for smart grids: a comprehensive reviewTELKOMNIKA JOURNAL
 
LATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEM
LATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEMLATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEM
LATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEMijiert bestjournal
 
Overview of State Estimation Technique for Power System Control
Overview of State Estimation Technique for Power System ControlOverview of State Estimation Technique for Power System Control
Overview of State Estimation Technique for Power System ControlIOSR Journals
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstracttsysglobalsolutions
 
IRJET- Data Duplicity Reduction Model for WSN
IRJET- Data Duplicity Reduction Model for WSNIRJET- Data Duplicity Reduction Model for WSN
IRJET- Data Duplicity Reduction Model for WSNIRJET Journal
 
TRANSMISSION LINE HEALTH PREDICTION SYSTEM IN HVDC AND HVAC LINES
TRANSMISSION LINE HEALTH PREDICTION SYSTEM IN HVDC AND HVAC LINESTRANSMISSION LINE HEALTH PREDICTION SYSTEM IN HVDC AND HVAC LINES
TRANSMISSION LINE HEALTH PREDICTION SYSTEM IN HVDC AND HVAC LINESIRJET Journal
 
Fault diagnosis of a high voltage transmission line using waveform matching a...
Fault diagnosis of a high voltage transmission line using waveform matching a...Fault diagnosis of a high voltage transmission line using waveform matching a...
Fault diagnosis of a high voltage transmission line using waveform matching a...ijsc
 
Phase Measurement Units based FACT’s Devices for the Improvement of Power Sys...
Phase Measurement Units based FACT’s Devices for the Improvement of Power Sys...Phase Measurement Units based FACT’s Devices for the Improvement of Power Sys...
Phase Measurement Units based FACT’s Devices for the Improvement of Power Sys...IJECEIAES
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...IEEEGLOBALSOFTSTUDENTPROJECTS
 

Similar to Optimized Predictive Control for AGC Cyber Resiliency.pdf (20)

SYNCHROPHASOR DATA BASED INTELLIGENT ALGORITHM FOR REAL TIME EVENT DETECTION ...
SYNCHROPHASOR DATA BASED INTELLIGENT ALGORITHM FOR REAL TIME EVENT DETECTION ...SYNCHROPHASOR DATA BASED INTELLIGENT ALGORITHM FOR REAL TIME EVENT DETECTION ...
SYNCHROPHASOR DATA BASED INTELLIGENT ALGORITHM FOR REAL TIME EVENT DETECTION ...
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
 
Java in-network estimation with delay constraints in wireless sensor networks
Java  in-network estimation with delay constraints in wireless sensor networksJava  in-network estimation with delay constraints in wireless sensor networks
Java in-network estimation with delay constraints in wireless sensor networks
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
 
On false data injection attacks against power system
On false data injection attacks against power systemOn false data injection attacks against power system
On false data injection attacks against power system
 
IRJET- A Literature Study on Fault Recognition in Different System
IRJET- A Literature Study on Fault Recognition in Different SystemIRJET- A Literature Study on Fault Recognition in Different System
IRJET- A Literature Study on Fault Recognition in Different System
 
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
ASHUTOSH BHATT DT19EEJ008 RPC JUNE22.ppt
ASHUTOSH BHATT DT19EEJ008 RPC JUNE22.pptASHUTOSH BHATT DT19EEJ008 RPC JUNE22.ppt
ASHUTOSH BHATT DT19EEJ008 RPC JUNE22.ppt
 
International Journal of Engineering (IJE) Volume (3) Issue (1)
International Journal of Engineering (IJE) Volume (3)  Issue (1)International Journal of Engineering (IJE) Volume (3)  Issue (1)
International Journal of Engineering (IJE) Volume (3) Issue (1)
 
Enhanced Protection Modeling Approach for Power System Transient Stability St...
Enhanced Protection Modeling Approach for Power System Transient Stability St...Enhanced Protection Modeling Approach for Power System Transient Stability St...
Enhanced Protection Modeling Approach for Power System Transient Stability St...
 
Study on the performance indicators for smart grids: a comprehensive review
Study on the performance indicators for smart grids: a comprehensive reviewStudy on the performance indicators for smart grids: a comprehensive review
Study on the performance indicators for smart grids: a comprehensive review
 
LATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEM
LATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEMLATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEM
LATEST TRENDS IN CONTINGENCY ANALYSIS OF POWER SYSTEM
 
Overview of State Estimation Technique for Power System Control
Overview of State Estimation Technique for Power System ControlOverview of State Estimation Technique for Power System Control
Overview of State Estimation Technique for Power System Control
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
IRJET- Data Duplicity Reduction Model for WSN
IRJET- Data Duplicity Reduction Model for WSNIRJET- Data Duplicity Reduction Model for WSN
IRJET- Data Duplicity Reduction Model for WSN
 
TRANSMISSION LINE HEALTH PREDICTION SYSTEM IN HVDC AND HVAC LINES
TRANSMISSION LINE HEALTH PREDICTION SYSTEM IN HVDC AND HVAC LINESTRANSMISSION LINE HEALTH PREDICTION SYSTEM IN HVDC AND HVAC LINES
TRANSMISSION LINE HEALTH PREDICTION SYSTEM IN HVDC AND HVAC LINES
 
Fault diagnosis of a high voltage transmission line using waveform matching a...
Fault diagnosis of a high voltage transmission line using waveform matching a...Fault diagnosis of a high voltage transmission line using waveform matching a...
Fault diagnosis of a high voltage transmission line using waveform matching a...
 
Phase Measurement Units based FACT’s Devices for the Improvement of Power Sys...
Phase Measurement Units based FACT’s Devices for the Improvement of Power Sys...Phase Measurement Units based FACT’s Devices for the Improvement of Power Sys...
Phase Measurement Units based FACT’s Devices for the Improvement of Power Sys...
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
IEEE 2014 JAVA NETWORKING PROJECTS Secure continuous aggregation in wireless ...
 

Recently uploaded

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Recently uploaded (20)

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 

Optimized Predictive Control for AGC Cyber Resiliency.pdf

  • 1. Optimized Predictive Control for AGC Cyber Resiliency Muhammad Nouman Nafees Cardiff University Cardiff, United Kingdom nafeesm@cardiff.ac.uk Neetesh Saxena Cardiff University Cardiff, United Kingdom saxenan4@cardiff.ac.uk Pete Burnap Cardiff University Cardiff, United Kingdom burnapp@cardiff.ac.uk ABSTRACT Automatic Generation Control (AGC) is used in smart grid systems to maintain the grid’s frequency to a nominal value. Cyber-attacks such as time delay and false data injection on the tie-line power flow, frequency measurements, and Area Control Error (ACE) control signals can cause frequency excursion that can trigger load shed- ding, generators’ damage, and blackouts. Therefore, resilience and detection of attacks are of paramount importance in terms of the reliable operation of the grid. In contrast with the previous works that overlook ACE resiliency, this paper proposes an approach for cyber-attack detection and resiliency in the overall AGC process. We propose a state estimation algorithm approach for the AGC system by utilizing prior information based on Gaussian process regression, a non-parametric, Bayesian approach to regression. We evaluate our approach using the PowerWorld simulator based on the three-area New England IEEE 39-bus model. Moreover, we uti- lize the modified version of the New England ISO load data for the three-area power system to create a more realistic dataset. Our results clearly show that our resilient control system approach can mitigate the system using predictive control and detect the attack with a 100 percent detection rate in a shorter period using prior auxiliary information. CCS CONCEPTS • Security and privacy Intrusion detection systems; KEYWORDS automatic generation control; resiliency; anomaly detection ACM Reference Format: Muhammad Nouman Nafees, Neetesh Saxena, and Pete Burnap. 2021. Opti- mized Predictive Control for AGC Cyber Resiliency . In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS ’21), November 15–19, 2021, Virtual Event, Republic of Korea. ACM, New York, NY, USA, 4 pages. https://doi.org/10.1145/3460120.3485358 1 INTRODUCTION The Automatic Generation Control (AGC) is a wide-area frequency control application that ensures frequency stability and keeps the power interchange between Balancing Authority (BA) areas at the Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author. CCS '21, November 15–19, 2021, Virtual Event, Republic of Korea © 2021 Copyright is held by the owner/author(s). ACM ISBN 978-1-4503-8454-4/21/11. https://doi.org/10.1145/3460120.3485358 scheduled values [7]. The control of the AGC mechanism relies on geographically dispersed sensing devices that are remotely con- trolled. The tie-line power flow between BA areas and frequency measurements from these sensing devices are sent to supervisory control and data acquisition (SCADA) systems and control centers. State Estimation (SE) ensures the data measurement integrity for power flow, and frequency measurements and Bad Data Detection (BDD) algorithm are applied. SE can reduce measurement noise and detect faulty sensor data. However, Area Control Error (ACE) measurement, an integral part of the AGC algorithm, is vulnerable to integrity attacks due to no estimation mechanism for such mea- surements. Such underlying vulnerability may significantly degrade system performance under cyber-attacks; false data injection and time delay attacks over the communication channels may mislead the AGC performance, triggering improper actions such as load shedding and even cascading outages. The Department of Homeland security and the National Institute for Standards and Technology (NIST) recommends Intrusion Detec- tion Systems (IDS) and De-militarized zones to protect the critical infrastructures [4, 5]. Implementing these technologies in Informa- tion Technology (IT) is well understood; however, much of what is known about the applicability to the AGC is still anecdotal due to the intrinsic constraints such as stringent timing requirements, non-synchronicity of signals, and other inescapable non-linearities. In addition, the existing diagnosis approaches for attack-resilient algorithms in AGC typically cover measurement noise and other anomalous factors only in state estimation for tie-line power flow and frequency measurements. Recent works focus on a model-based AGC cyber-attack resiliency approach that involves correlating all the required parameters. In [7], Zhang et al. proposed an attack im- pact evaluation framework by utilizing stochastic system analysis methods to evaluate the statistics of system state variables in the AGC. However, the resilience and detection of cyber-attacks was not the scope of the work. Similar to our work, Tan et al. [6] derived an attack impact model consisting of a series of false data injec- tions and developing an efficient algorithm to detect the attacks. However, the work only considers the consistency between the ob- served frequency deviation and the predicted frequency deviation and ignores the ACE measurement integrity. Contributions. Our aim in this paper is to introduce an ap- proach for cyber-attack detection and resiliency in the AGC pro- cess: Resiliency refers to the capability of a system to maintain low estimation error under cyber-attacks. In this direction, we propose a state estimation-based detection approach for the AGC system by utilizing prior information based on Gaussian process regression, a non-parametric, Bayesian approach to regression. We use the information to boost state estimation and resiliency and enforce properties about how the algorithm identifies the anomalous mea- surements. Specifically, our approach utilizes the model-based and Session 8: Poster Demo Session CCS ’21, November 15–19, 2021, Virtual Event, Republic of Korea 2450
  • 2. AGC Algorithm - With Prior - Without Prior Gaussian Process Regression Estimation ACE Forecast Load Forecast Predicted ACE Anomaly Yes/No No - Real ACE Yes Real ACE Tie-line Power Flow Frequency Resilient Estimator Figure 1: Conceptual resilient control model for AGC. data-driven algorithm to boost the resiliency and detection perfor- mance: Properties of the model-based method and the accuracy of the data-driven method provide further redundancy, which can enhance the overall system performance. To validate our approach, we used the PowerWorld simulator based on the three-area New England IEEE 39-bus model. Furthermore, we also utilized and mod- ified the New England ISO load data for a 3-area power system to create a more realistic dataset. 2 AGC RESILIENCE USING PRIOR INFORMATION This section presents the AGC model details adopted in this work. Furthermore, we provide the prior model and anomaly detection engine estimation, seeking to correlate between tie-line power flow, frequency, and ACE measurements. Lastly, we present the threat model. System Model. As in the smart grid AGC literature, we consider a standard electric power AGC system; where the function of the system is to maintain the system frequency at its nominal value, e.g., 60 Hz in North America, and to regulate the net scheduled value of power flow across different BAs. The state variables are represented by the system’s tie-line power flow and frequency measurements: The AGC controller computes the ACE using these measurements after receiving them over a communication network. For the 𝑖𝑡ℎ area, 𝐴𝐶𝐸𝑖 = 𝑎𝑖 · 𝑃𝐸𝑖 + 𝑏𝑖 · 𝑓𝑖, where 𝑃𝐸𝑖 and 𝑓𝑖 are the 𝑖𝑡ℎ area’s power export and frequency deviation of the grid, whereas 𝑎𝑖 and 𝑏𝑖 are the constants. The ACE values are sent to the generators to adjust the primary control loop set-points, and the process is repeated every 2-4 seconds, also referred to as the AGC cycle. Prior Model. The objective of the prior model is to provide an extra layer of resiliency to the AGC system. We use auxiliary models such as transformer ratings, historical information of generator ca- pacity, statistical characterization of tie-line power flow, frequency, and ACE values to map them with the real-time measurements by building Gaussian process regression with hyper-parameters tuning in the machine learning algorithms and data pre-processing tool known as Weka. Specifically, the prior information and load data are fed into our proposed model to correlate with the forecast values of power flow, frequency, and ACE values. Anomaly detection Engine Estimation. We now describe how our approach instantiates each of the phases in the cyber- attack detection and resilience architecture. Figure 1 presents a con- ceptual diagram of our proposed model for the AGC. Throughout the resilient control and detection mechanism, we integrate model- based and data-driven techniques to boost the performance of our proposed approach: We use Gaussian Process for the data-driven scheme for the predicted estimation of the AGC relevant measure- ments. The final ACE measurement is correlated with the prior information to identify any anomalous measurements throughout the real-time process. If the ACE value does not get to zero due to any frequency fault or cyber-attack, the system utilizes the prior auxiliary information to compute the probability of the error and compare it with the real-time values. For liveness, the framework relies on the sum of two terms: The significant difference between the actual and forecasted values; and the temporal characterization of the control signal to identify the cyber-attacks such as ramp at- tacks where the adversary gradually deviates the system frequency to conceal the attack. Threat model. We can envision that an adversary has gained initial access to the communication system via social engineering techniques. Next, an adversary can mount time delay attacks be- tween the controller and actuator to delay control commands. For example, an attacker can compromise a communication path such as a router to delay the control commands. Similarly, adversaries can access remote sensors to mount false data injection attacks on power flow measurements. In this scenario, the attacker tries to provide a wrong perception of the system load. For example, the at- tacker can trick any area of AGC into believing that the power flow has increased/decreased; the action can cause the incorrect compu- tation of an ACE value sent to the generators. Consequently, the wrong ACE value sent to the generator will falsely ramp up/down the generator. Any of the mentioned scenarios can adversely impact the performance of the AGC system, which can cause generation imbalance and destabilize systems’ frequency. 3 EVALUATION - AGC AND SIMULATION SETTINGS To evaluate our approach, we conduct PowerWorld [2] simula- tions - an industry-class high-class fidelity simulator – based on the three-area New England IEEE 39-bus model [1]. The complete sys- tem contains 10 generators with the same value of nominal power 1000 MVA, 19 loads, and 39 buses. Furthermore, each generator is equipped with 4 second AGC cycle length and Multi-Band Power System Stabilizer (MBPSS). Frequency deviation and the measure- ment of tie-line active power exchanged are utilized to compute the ACE. Moreover, we collect frequency values locally using a rotor speed deviation of all generators; frequency is a global signal that does not have significant variations throughout the power system, and a rotor speed deviation is equal to a frequency deviation. To validate our approach, we consider two simulation scenar- ios: The first is a false data injection to the tine-line power flow measurements in which we increase the power flow values with small magnitude to cause grid frequency fluctuations; in the second scenario, we consider the delay of ACE values to the generators in which we employ the OpenSSL 1.0.1 to mimic a control center Session 8: Poster Demo Session CCS ’21, November 15–19, 2021, Virtual Event, Republic of Korea 2451
  • 3. 58.6 58.8 60.0 60.2 60.4 110 120 130 140 150 160 Time (s) Frequency (Hz) (a) Normal Attack Predicted 0.20 0.40 0.60 0.80 1.00 0.4 0.8 1.2 1.6 2.0 2.4 Injection Magnitude Detection Probability (b) With Prior Withour Prior Figure 2: (a) Validating prediction for AGC frequency under false data injection attack. (b) Efficacy of prior information in detection probability. and a substation. An SSL session is established every 4 seconds to transmit sensor readings. The simulation of AGC under no attack starts at t = 15s and terminates at t = 340s, and data is collected with a frequency of 0.25, which is equivalent to 4 seconds. The simulation generates zero-mean process and measurement noises as the default settings. To create a dataset for evaluation, we also utilize the New Eng- land ISO load data for a 3-area power system [3]; we modified the load data by adding unavailable line load information from our simulation results. Moreover, we duplicated the data with the sim- ulation results of attack scenarios: The corrupted load data with the standard deviation of 97 was correlated with actual simulation results for the accuracy of the dataset. To reduce the size of the dataset, we used a smaller range of ACE delay attacks. The data is then fed into Gaussian process regression with hyper-parameters tuning in the Weka tool to produce mean and covariance matrix of the corresponding power flow and frequency deviation measure- ments. Towards this end, auxiliary variables and prior information are fed into the model to correlate the corresponding measurements with the historical values accurately. Simulation Results. Figure 2 (a) shows the results of our pro- posed resilient control approach during the false data injection attack on power flow measurements. The horizontal axis is time in seconds, while the vertical axis is the gird’s frequency. During the injection attack to power flow and frequency readings, the gird’s frequency fluctuates and decreases to a minimum of 58.6 Hz. As seen from the figure, the system’s predicted value is closer to the ac- tual values, the performance of the resilient control system clearly suggests an anomaly; therefore, it maintains the system’s frequency according to the predicted values using the combination of prior auxiliary information and independent power system attributes. Furthermore, Figure 2 (b) shows the detection probability against the magnitude of the false data injection attack. The results show that resilient control using prior information has a better attack detection probability compared to the results of detecting an attack without utilizing prior information and attributes. Figure 3 (a) compares the predicted frequency deviation values during the time delay attacks. The algorithm calculates the fre- quency deviation based on prior information and historical data of local measurement of frequency and tie-line power flow. The prediction improves with an increasing number of AGC cycles; it -0.4 -.02 0.0 0.2 0.4 110 130 150 170 190 200 AGC Cycle Index - Time Delay Frequency Dev.(Hz) (a) Normal Attack Predicted 0.20 0.40 0.60 0.80 1.00 1.0 2.0 3.0 4.0 6.0 7.0 Time Period Detection Probability (b) With Prior Withour Prior Figure 3: (a) Predicted frequency deviation using the regres- sion model. (b) Impact of prior information on detection probability over time. means there will be more waiting time for the detection of an attack, leading to a longer reaction time to counteract the attack. However, the system remains stable under lower frequency fluctuation in stealthy attacks as it marks the field measurements as anomalous after identifying the attack; this means the accuracy of detection becomes better for the stealthy time delay attack after some AGC cycles. Similarly, Figure 3 (b) compares the detection probability against time. The approach with prior information clearly identifies the attack with a 100 % detection rate in a shorter period than using without prior auxiliary information. 4 CONCLUSION In this paper, we proposed an approach based on prior informa- tion for the AGC cyber-attack detection and resiliency. Specifically, we showed that specific power system attributes in conjunction with prior auxiliary information could improve the system’s re- siliency against cyber-attacks. To validate our approach, we used the PowerWorld simulator based on the three-area New England IEEE 39-bus model. The results demonstrate that incorporating prior information based on Gaussian process regression can signifi- cantly improve the system’s resiliency and probability of predicting cyber-attacks correctly. Our future work will aim to investigate the performance of our approach for malicious and natural load disturbances. Moreover, we plan to add more power systems at- tributes and prior information to evaluate this approach against a wide variety of cyber-attacks. REFERENCES [1] 2021. New-England-IEEE-39-bus-system. (2021). https://electricgrids.engr.tamu. edu/ [2] 2021. PowerWorldThe visual approach to electric power systems. (2021). https: //www.powerworld.com/ [3] 2021. Pricing Reports. (2021). https://www.iso-ne.com/isoexpress/web/reports/ pricing [4] David Kuipers and Mark Fabro. 2006. Control systems cyber security: Defense in depth strategies. Technical Report. Idaho National Laboratory (INL). [5] Victoria Y Pillitteri and Tanya L Brewer. 2014. Guidelines for smart grid cyberse- curity. (2014). [6] Rui Tan, Hoang Hai Nguyen, Eddy YS Foo, Xinshu Dong, David KY Yau, Zbigniew Kalbarczyk, Ravishankar K Iyer, and Hoay Beng Gooi. 2016. Optimal false data injection attack against automatic generation control in power grids. In 2016 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS). 1–10. [7] Jiangmeng Zhang and Alejandro D Domínguez-García. 2016. On the impact of measurement errors on power system automatic generation control. IEEE Transactions on Smart Grid 9, 3 (2016), 1859–1868. Session 8: Poster Demo Session CCS ’21, November 15–19, 2021, Virtual Event, Republic of Korea 2452