Cyber-Physical Attacks Detection and Resilience Methods in Smart Grids
dc.contributor.advisor | Farag, Hany E. Z. | |
dc.contributor.author | Sawas, Abdullah | |
dc.date.accessioned | 2023-12-08T14:21:51Z | |
dc.date.available | 2023-12-08T14:21:51Z | |
dc.date.issued | 2023-12-08 | |
dc.date.updated | 2023-12-08T14:21:50Z | |
dc.degree.discipline | Computer Science | |
dc.degree.level | Doctoral | |
dc.degree.name | PhD - Doctor of Philosophy | |
dc.description.abstract | Backed by the deployment of increasingly reliable Information and Communication Technologies (ICT) infrastructure, modern power systems heavily depend on computerized circuits to function within an interconnected environment. In particular, Smart Grids (SGs) core domain relies on ICTs networks and components to communicate control signals and data measurements to improve the efficiency of power generation and distribution while maintaining safe and reliable operations. ICTs have also extended the SG domain of interaction to include other utilities, such as the natural gas grid to efficiently utilize multiple energy forms and resources. In the consumer domain, a growing number of appliances and autonomous smart loads equipped with Internet of Things (IoT) technology are being deployed into SG, the results in large portions of electric demand being remotely controlled. Despite their advantages, ICTs are vulnerable to cyber–attacks that can deteriorate SGs' operational safety and integrity. Thus, new approaches to enhance the resiliency of SGs against cyber-physical attacks are needed. To that extent, this thesis develops new resiliency investigation approaches under the three aforementioned domains. First, in the SG domain, an efficient False Data Injection Attack (FDIA) approach is developed imitating an intelligent adversary behavior searching for an optimal attack vector against State Estimation (SE) modules. Simulation results show that using this approach, an adversary can identify attack vectors with minimal size and superior flexibility to manipulate, in real-time, power flow measurements of the system lines as perceived by the SE without the need to acquire additional measurements. Hence, attacks constructed using this approach require less computational time and resources compared to the existing methods making it beneficial for the analysis of cyber–security vulnerabilities and the design of resilient SE modules. Second, under the Integrated Energy System (IES) domain, an operational framework model is developed to be used as a testbed for performing and analyzing the impact of cyber–attacks. The framework models steady–state power and gas flow operations, and presents a new financial interdependency operation scheduling model. The framework is validated on standard power distribution and transmission systems with variable generation and demand scenarios and high renewable penetration levels. Using this framework, an attack resiliency method is developed based on signal processing and machine-learning tools. The method is able to detect 98.6% and 94.5% of the external signals and internal control commands respectively. Third, the vulnerability of Power Distribution Systems (PDSs) to compromised collections of IoT-enabled appliances is investigated, and a stealthy attack strategy is presented. Accordingly, a new index is developed, referred to as Feeder Loading Abnormal Power Spectrum (FLAPS), and used in a novel real-time detection and prediction approach to counter stealthy attacks and estimate the attack onset time. Results demonstrate that the method is able to detect and alert for stealthy attacks in a timely manner, thereby enabling the system to operate reliably and securely. By identifying new attacks, and proposing detection methods and countermeasures, this thesis contributes to the collective efforts to address the risks associated with cyber–attacks against the SGs components. Specifically, the quantitative results show that deploying the proposed methods will enhance the resiliency of SE and IESs, and protect the PDSs against threats of large-scale deployment of IoT-enabled appliances. | |
dc.identifier.uri | https://hdl.handle.net/10315/41595 | |
dc.language | en | |
dc.rights | Author owns copyright, except where explicitly noted. Please contact the author directly with licensing requests. | |
dc.subject | Electrical engineering | |
dc.subject | Computer science | |
dc.subject | Artificial intelligence | |
dc.subject.keywords | Cyber-physical security | |
dc.subject.keywords | False data injection attacks | |
dc.subject.keywords | State estimation | |
dc.subject.keywords | Power systems | |
dc.subject.keywords | IoT appliances | |
dc.subject.keywords | Distribution systems | |
dc.subject.keywords | Power and gas integration | |
dc.subject.keywords | Cyber-attacks | |
dc.subject.keywords | Resiliency | |
dc.subject.keywords | Feeder loading abnormal power spectrum | |
dc.title | Cyber-Physical Attacks Detection and Resilience Methods in Smart Grids | |
dc.type | Electronic Thesis or Dissertation |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Abdullah_Sawas_2022_PhD.pdf
- Size:
- 4.58 MB
- Format:
- Adobe Portable Document Format