skip to main content
10.1145/3450267.3450536acmconferencesArticle/Chapter ViewAbstractPublication PagesiccpsConference Proceedingsconference-collections
research-article
Public Access

RADM: a risk-aware DER management framework with real-time DER trustworthiness evaluation

Published:19 May 2021Publication History

ABSTRACT

The increasing penetration level of distributed energy resources (DERs) substantially expands the attack surface of the modern power grid. By compromising DERs, adversaries are capable of destabilizing the grid and potentially causing large-area blackouts. Due to the limited administrative control over DERs, constrained computational capabilities, and possible physical accesses to DERs, current device level defenses are insufficient to defend against malicious attacks on DERs. To compensate the shortcomings of device level defenses, in this paper, we develop a system-level risk-aware DER management framework (RADM) to mitigate the attack impacts. We propose a metric, trust score, to dynamically evaluate the trustworthiness of DERs. The trust scores are initialized with offline trust scores derived from static information and then regularly updated with online trust scores derived from a physics-guided Gaussian Process Regressor using real-time data. The trust scores are integrated into the grid control decision making process by balancing the grid performance and the security risks. Extensive simulations are conducted to justify the effectiveness of the proposed method.

References

  1. 2015. IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems. IEEE Std C37.240-2014 (2015), 1--38. Google ScholarGoogle ScholarCross RefCross Ref
  2. 2018. IEEE Standard for Interconnection and Interoperability of Distributed Energy Resources with Associated Electric Power Systems Interfaces. IEEE Std 1547-2018 (Revision of IEEE Std 1547-2003) (2018), 1--138. Google ScholarGoogle ScholarCross RefCross Ref
  3. Olugbenga Moses Anubi and Charalambos Konstantinou. 2019. Enhanced resilient state estimation using data-driven auxiliary models. IEEE Transactions on Industrial Informatics 16, 1 (2019), 639--647.Google ScholarGoogle ScholarCross RefCross Ref
  4. Anomadarshi Barua and Mohammad Abdullah Al Faruque. 2020. Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1273--1290.Google ScholarGoogle Scholar
  5. Rojan Bhattarai, Sheikh Jakir Hossain, Junjian Qi, Jianhui Wang, and Sukumar Kamalasadan. 2018. Sustained system oscillation by malicious cyber attacks on distributed energy resources. In 2018 IEEE Power & Energy Society General Meeting (PESGM). IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  6. Partha P Biswas, Ponnuthurai N Suganthan, Rammohan Mallipeddi, and Gehan AJ Amaratunga. 2018. Optimal power flow solutions using differential evolution algorithm integrated with effective constraint handling techniques. Engineering Applications of Artificial Intelligence 68 (2018), 81--100.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cedric Carter, Ifeoma Onunkwo, Patricia Cordeiro, and Jay Johnson. 2017. Cyber security assessment of distributed energy resources. In 2017 IEEE 44th Photovoltaic Specialist Conference (PVSC). IEEE, 2135--2140.Google ScholarGoogle ScholarCross RefCross Ref
  8. Critical Infrastructure Cybersecurity. 2014. Framework for Improving Critical Infrastructure Cybersecurity. Framework 1, 11 (2014).Google ScholarGoogle Scholar
  9. Ricardo Siqueira de Carvalho and Danish Saleem. 2019. Recommended functionalities for improving cybersecurity of distributed energy resources. In 2019 Resilience Week (RWS), Vol. 1. IEEE, 226--231.Google ScholarGoogle ScholarCross RefCross Ref
  10. Kalyanmoy Deb. 2000. An efficient constraint handling method for genetic algorithms. Computer methods in applied mechanics and engineering 186, 2-4 (2000), 311--338.Google ScholarGoogle Scholar
  11. Simulink Documentation. 2020. Simulation and Model-Based Design. https://www.mathworks.com/products/simulink.htmlGoogle ScholarGoogle Scholar
  12. Sasan Gholami, Sajeeb Saha, and Mohammad Aldeen. 2017. A cyber attack resilient control for distributed energy resources. In 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  13. William Hupp, Adarsh Hasandka, Ricardo Siqueira de Carvalho, and Danish Saleem. 2020. Module-OT: A Hardware Security Module for Operational Technology. In 2020 IEEE Texas Power and Energy Conference (TPEC). IEEE, 1--6.Google ScholarGoogle Scholar
  14. Samuel Koebrich, Thomas Bowen, and Austen Sharpe. 2018. 2018 Renewable Energy Data Book. U.S. Department of Energy (DOE), Office of Energy Efficiency & Renewable Energy (EERE) (2018).Google ScholarGoogle Scholar
  15. Christine Lai, Patricia Cordeiro, Adarsh Hasandka, Nicholas Jacobs, Shamina Hossain-McKenzie, Deepu Jose, Danish Saleem, and Maurice Martin. 2019. Cryptography considerations for distributed energy resource systems. In 2019 IEEE Power and Energy Conference at Illinois (PECI). IEEE, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  16. Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Hanchao Qi, and Jie Hu. 2016. VulPecker: an automated vulnerability detection system based on code similarity analysis. In Proceedings of the 32nd Annual Conference on Computer Security Applications. 201--213.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Bin Liu, Zhen Li, Xi Chen, Yuehui Huang, and Xiangdong Liu. 2017. Recognition and vulnerability analysis of key nodes in power grid based on complex network centrality. IEEE Transactions on Circuits and Systems II: Express Briefs 65, 3 (2017), 346--350.Google ScholarGoogle ScholarCross RefCross Ref
  18. James M Lucas and Michael S Saccucci. 1990. Exponentially weighted moving average control schemes: properties and enhancements. Technometrics 32, 1 (1990), 1--12.Google ScholarGoogle ScholarCross RefCross Ref
  19. Michael Mylrea and Sri Nikhil Gupta Gourisetti. 2017. Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security. In 2017 Resilience Week (RWS). IEEE, 18--23.Google ScholarGoogle Scholar
  20. James Obert, Patricia Cordeiro, Jay Johnson, Gordon Lum, Tom Tansy, Max Pala, and Ronald Ih. 2019. Recommendations for trust and encryption in DER interoperability standards. In Tech. Report, Sandia National Laboratories. SAND2019--1490.Google ScholarGoogle Scholar
  21. D Jonathan Sebastian, Utkarsh Agrawal, Ali Tamimi, and Adam Hahn. 2019. DERTEE: Secure distributed energy resource operations through trusted execution environments. IEEE Internet of Things Journal 6, 4 (2019), 6476--6486.Google ScholarGoogle ScholarCross RefCross Ref
  22. Manajit Sengupta, Yu Xie, Anthony Lopez, Aron Habte, Galen Maclaurin, and James Shelby. 2018. The national solar radiation database (NSRDB). Renewable and Sustainable Energy Reviews 89 (2018), 51--60.Google ScholarGoogle ScholarCross RefCross Ref
  23. Saleh Soltan, Prateek Mittal, and H Vincent Poor. 2018. BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 15--32.Google ScholarGoogle Scholar
  24. Pirathayini Srikantha and Deepa Kundur. 2015. A DER attack-mitigation differential game for smart grid security analysis. IEEE Transactions on Smart Grid 7, 3 (2015), 1476--1485.Google ScholarGoogle ScholarCross RefCross Ref
  25. Rainer Storn and Kenneth Price. 1997. Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces. Journal of global optimization 11, 4 (1997), 341--359.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Hongmei Tian, Fernando Mancilla-David, Kevin Ellis, Eduard Muljadi, and Peter Jenkins. 2012. Detailed performance model for photovoltaic systems. Technical Report. National Renewable Energy Lab.(NREL), Golden, CO (United States).Google ScholarGoogle Scholar
  27. Durgadevi Velusamy and Ganesh Kumar Pugalendhi. 2019. Fuzzy integrated Bayesian Dempster-Shafer theory to defend cross-layer heterogeneity attacks in communication network of Smart Grid. Information Sciences 479 (2019), 542--566.Google ScholarGoogle ScholarCross RefCross Ref
  28. Zhifang Wang, Anna Scaglione, and Robert J Thomas. 2010. Electrical centrality measures for electric power grid vulnerability analysis. In 49th IEEE conference on decision and control (CDC). IEEE, 5792--5797.Google ScholarGoogle ScholarCross RefCross Ref
  29. RD Zimmerman and CE Murillo-Sánchez. 2020. Matpower [Software].Google ScholarGoogle Scholar
  30. Ioannis Zografopoulos and Charalambos Konstantinou. 2020. DERauth: A Battery-based Authentication Scheme for Distributed Energy Resources. In 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 560--567.Google ScholarGoogle Scholar

Index Terms

  1. RADM: a risk-aware DER management framework with real-time DER trustworthiness evaluation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ICCPS '21: Proceedings of the ACM/IEEE 12th International Conference on Cyber-Physical Systems
      May 2021
      242 pages
      ISBN:9781450383530
      DOI:10.1145/3450267

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 May 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate25of91submissions,27%
    • Article Metrics

      • Downloads (Last 12 months)90
      • Downloads (Last 6 weeks)7

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader