skip to main content
10.1145/2939940.2939943acmotherconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Impact of cyber-attacks on islanded microgrid operation

Published:21 June 2016Publication History

ABSTRACT

The prevalent integration of highly intermittent renewable distributed energy resources (DER) into microgrids necessitates the deployment of a microgrid controller. In the absence of the main electric grid setting the network voltage and frequency, the microgrid power and energy management becomes more challenging, accentuating the need for a centralized microgrid controller that, through communication links, ensures smooth operation of the autonomous system. This extensive reliance on information and communication technologies (ICT) creates potential access points and vulnerabilities that may be exploited by cyber-attackers. This paper first presents a typical microgrid configuration operating in islanded mode; the microgrid elements, primary and secondary control functions for power, energy and load management are defined. The information transferred from the central controller to coordinate and dispatch the DERs is provided along with the deployable communication technologies and protocols. The vulnerabilities arising in such microgrids along with the cyber-attacks exploiting them are described. The impact of these attacks on the microgrid controller functions was shown to be dependent on the characteristics, location and target of the cyber-attack, as well as the microgrid configuration and control. A real-time hardware-in-the loop (HIL) testing platform, which emulates a microgrid featuring renewable DERs, an energy storage system (ESS), a diesel generator and controllable loads was used as the case study in order to demonstrate the impact of various cyber-attacks.

References

  1. Katiraei, F., Iravani, R., Hatziargyriou, N., and Dimeas, A., Microgrids management. Power and Energy Magazine, IEEE, 2008. 6(3): p. 54--65.Google ScholarGoogle Scholar
  2. Yan, Y., Qian, Y., Sharif, H., and Tipper, D., A survey on smart grid communication infrastructures: Motivations, requirements and challenges. Communications Surveys & Tutorials, IEEE, 2013. 15(1): p. 5--20.Google ScholarGoogle Scholar
  3. Liu, J., Xiao, Y., Li, S., Liang, W., and Chen, C. L., Cyber security and privacy issues in smart grids. Communications Surveys & Tutorials, IEEE, 2012. 14(4): p. 981--997.Google ScholarGoogle Scholar
  4. Lu, Z., Lu, X., Wang, W., and Wang, C., Review and evaluation of security threats on the communication networks in the smart grid. in Military Communications Conference, 2010-MILCOM 2010. 2010. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  5. Kundur, D., Feng, X., Mashayekh, S., Liu, S., Zourntos, T., and Butler-Purry, K. L., Towards modelling the impact of cyber attacks on a smart grid. International Journal of Security and Networks, 2011. 6(1): p. 2--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Chen, B., Mashayekh, S., Butler-Purry, K. L., and Kundur, D., Impact of cyber attacks on transient stability of smart grids with voltage support devices. in Power and Energy Society General Meeting (PES), 2013 IEEE. 2013. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  7. Katiraei, F. and Iravani, M. R., Power management strategies for a microgrid with multiple distributed generation units. Power Systems, IEEE Transactions on, 2006. 21(4): p. 1821--1831.Google ScholarGoogle Scholar
  8. Rocabert, J., Luna, A., Blaabjerg, F., and Rodríguez, P., Control of power converters in AC microgrids. Power Electronics, IEEE Transactions on, 2012. 27(11): p. 4734--4749.Google ScholarGoogle Scholar
  9. Margaris, I. D., Papathanassiou, S. A., Hatziargyriou, N. D., Hansen, A. D., and Sørensen, P., Frequency control in autonomous power systems with high wind power penetration. Sustainable Energy, IEEE Transactions on, 2012. 3(2): p. 189--199.Google ScholarGoogle Scholar
  10. Kanchev, H., Lu, D., Colas, F., Lazarov, V., and Francois, B., Energy management and operational planning of a microgrid with a PV-based active generator for smart grid applications. Industrial Electronics, IEEE Transactions on, 2011. 58(10): p. 4583--4592.Google ScholarGoogle Scholar
  11. Modbus, MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1b3. 2012.Google ScholarGoogle Scholar
  12. IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3). IEEE Std 1815-2012 (Revision of IEEE Std 1815-2010), 2012: p. 1--821.Google ScholarGoogle Scholar
  13. Commission, I. E., IEC/TR 61850 Communication networks and systems for power utility automation -- Part 90-4: Network engineering guidelines. 2013.Google ScholarGoogle Scholar
  14. NIST, Guidelines for Smart Grid Cybersecurity, in Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements. 2014.Google ScholarGoogle Scholar
  15. Dollen, D. V., Report to NIST on the Smart Grid Interoperability Standards Roadmap---Post Comment Period Version. 2009.Google ScholarGoogle Scholar
  16. Yan, Y., Qian, Y., Sharif, H., and Tipper, D., A survey on cyber security for smart grid communications. Communications Surveys & Tutorials, IEEE, 2012. 14(4): p. 998--1010.Google ScholarGoogle Scholar
  17. NESCOR, Electric Sector Failure Scenarios and Impact Analyses -- Version 3.0. 2015.Google ScholarGoogle Scholar
  18. NERC, Automatic Underfrequency Load Shedding. 2012.Google ScholarGoogle Scholar

Index Terms

  1. Impact of cyber-attacks on islanded microgrid operation

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          RSES '16: Proceedings of the Workshop on Communications, Computation and Control for Resilient Smart Energy Systems
          June 2016
          31 pages
          ISBN:9781450344180
          DOI:10.1145/2939940

          Copyright © 2016 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 June 2016

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader