Recent research has shown that large-scale Internet of Things (IoT)-based load altering attacks can have a serious impact on power grid operations such as causing unsafe frequency excursions and destabilizing the grid's control loops. In this work, we present an analytical framework to investigate the impact of IoT-based static/dynamic load altering attacks (S/DLAAs) on the power grid's dynamic response. Existing work on this topic has mainly relied on numerical simulations and, to date, there is no analytical framework to identify the victim nodes from which that attacker can launch the most impactful attacks. To address these shortcomings, we use results from second-order dynamical systems to analyze the power grid frequency control loop under S/DLAAs. We use parametric sensitivity of the system's eigensolutions to identify victim nodes that correspond to the least-effort destabilizing DLAAs. Further, to analyze the SLAAs, we present closed-form expression for the system's frequency response in terms of the attacker's inputs, helping us characterize the minimum load change required to cause unsafe frequency excursions. Using these results, we formulate the defense against S/DLAAs as a linear programming problem in which we determine the minimum amount of load that needs to be secured at the victim nodes to ensure system safety/stability. Extensive simulations conducted using benchmark IEEE-bus systems validate the accuracy and efficacy of our approach.
翻译:最近的研究显示,大规模基于Tings(IoT)的重负改变互联网式袭击可能对电网操作产生严重影响,例如造成不安全的频率外出和破坏电网控制环。在这项工作中,我们提出了一个分析框架,以调查基于IoT的静态/动态负载改变攻击(S/DLAAs)对电网动态反应的影响。关于这个主题的现有工作主要依靠数字模拟,迄今为止,还没有分析框架来确定攻击者能够发动影响最大的攻击的受害人节点。为了解决这些缺陷,我们利用二级动态系统的结果分析S/DLAs的电网控制环。我们使用基于IoT的静态/动态负载改变攻击(S/DLAs)的静态敏感度来辨别与破坏DLAs动态反应最小性相对应的受害人节点。此外,为了分析SLAs,我们用攻击者投入的频率反应是封闭式表达系统对系统对系统频率反应的表达方式,帮助我们在S/DLA的最小载量上分析,从而确定安全性要求的精确度的系统。