310
views
0
recommends
+1 Recommend
1 collections
    8
    shares
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      PSP: A Framework to Allocate Resources to Power Storage Systems under Cyber-Physical Attacks

      proceedings-article
      1 , 1 , 2
      5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018)
      ICS & SCADA Cyber Security Research
      29 - 30 August 2018
      Smart Grid, Distributed Generation, Security Planning, Cyber-Physical Security, Energy Storage Systems
      Bookmark

            Abstract

            This risk assessment of the smart grid focuses on energy storage, which is essential but largely unaddressed by the current literature. This work concentrates on actions (such as decreasing or increasing power reserve and power dispatch, performing load curtailment or load shedding, or repair of nodes) the defender should take to meet power demand at minimum operating cost in the presence of cyber-physical attacks on the power and information infrastructure of the smart grid. In this paper, we formulate a Power Storage Protection (PSP) framework against a fixed opponent (adversary). We fix the strategy for the adversary and model the problem as a Partially Observable Markov Decision Process (POMDP) from the perspective of the defender (power utility) and solve it using POMDP solver. We provide a theoretical framework for formulating the above problem and provide experimental results to support our claim using a simplified PSP scenario in which optimal POMDP policy is computed efficiently.

            Content

            Author and article information

            Contributors
            Conference
            August 2018
            August 2018
            : 57-66
            Affiliations
            [1 ]University of Southern California, Los Angeles, CA
            [2 ]The Hashemite University, Zarqa, Jordan
            Article
            10.14236/ewic/ICS2018.7
            d6b4afa8-2706-4405-8095-1927244dd4cb
            © Wadhawan et al. Published by BCS Learning and Development Ltd. Proceedings of ICS & SCADA 2018

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            5th International Symposium for ICS & SCADA Cyber Security Research 2018
            ICS-CSR 2018
            5
            University of Hamburg, Germany
            29 - 30 August 2018
            Electronic Workshops in Computing (eWiC)
            ICS & SCADA Cyber Security Research
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICS2018.7
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Smart Grid,Cyber-Physical Security,Distributed Generation,Energy Storage Systems,Security Planning

            REFERENCES

            1. “Interdependency of natural gas network and power system security” IEEE Transactions on Power Systems 23 4 2008 1817 1824

            2. 2016 October Evaluating Resilience of Gas Pipeline Systems Under Cyber-Physical Attacks: A Function- Based Methodology Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy 71 80

            3. Mediating cyber and physical threat propagation in secure smart grid architectures Smart Grid Communications (SmartGridComm), IEEE International Conference on 238 243 2011

            4. “Optimal False Data Injection Attack against Automatic Generation Control in Power Grids” In 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS) 1 10 IEEE 2016

            5. “A DER Attack-Mitigation Differential Game for Smart Grid Security Analysis” IEEE Transactions on Smart Grid 7 3 2016 1476 1485

            6. SANS E-ISAC 2016 Analysis of the Cyber Attack on the Ukrainian Power Grid March 2016 http://www.nerc.com/pa/CI/ESISAC/Documents/E-ISAC_SANS_Ukraine_DUC_18Mar2016.pdf

            7. “Puppet attack: A denial of service attack in advanced metering infrastructure network” Journal of Network and Computer Applications 59 2016 325 332

            8. A systems approach to analysing cyber-physical threats in the Smart Grid 2013 IEEE International Conference on Smart Grid Communications

            9. 2011 November The case for efficient renewable energy management in smart homes Proceedings of the Third ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings 67 72 ACM

            10. 2017 Impacts of optimal energy storage deployment and network reconfiguration on renewable integration level in distribution systems Applied Energy 185 44 55

            11. 2005 Causes of the 2003 major grid blackouts in North America and Europe, and recommended means to improve system dynamic performance IEEE Transactions on Power Systems 20 4 1922 1928

            12. 2016 November Combined data integrity and availability attacks on state estimation in cyber-physical power grids Smart Grid Communications (SmartGridComm), 2016 IEEE International Conference on 271 277 IEEE

            13. “Q-learningbased vulnerability analysis of smart grid against sequential topology attacks” IEEE Transactions on Information Forensics and Security 12 1 2017): 200 210

            14. 2011 A denial-of-service jamming game for remote state monitoring in smart grid Information Sciences and Systems (CISS), 2011 45th Annual Conference on 1 6 IEEE

            15. 2017 A game-theoretic framework for resilient and distributed generation control of renewable energies in microgrids IEEE Transactions on Smart Grid 8 1 285 295

            16. “Incremental pruning: A simple, fast, exact method for partially observable Markov decision processes” Proceedings of the Thirteenth conference on Uncertainty in artificial intelligence 54 61 Morgan Kaufmann Publishers Inc. 1997

            17. “Best-response play in partially observable card games” In Proceedings of the 14th annual machine learning conference of Belgium and the Netherlands 45 50 2005

            18. Alpha Guardian 2017 Energy Storage System Vulnerabilities http://www.alphaguardian.net/energy-storage-system-cyber-vulnerabilities/

            19. 2003-2018 Partially Observable Markov Decision Process http://www.pomdp.org

            Comments

            Comment on this article