Attack Detection and Mitigation for AGC
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3
Abstract
Cyber systems play a critical role in improving the efficiency and reliability of power system operation and ensuring the system remains within safe operating margins. An adversary can inflict severe damage to the underlying physical system by compromising the control and monitoring applications facilitated by the cyber layer. There is a growing need for cyber-attack-resilient control techniques that look beyond traditional cyber defense mechanisms to detect highly skilled attacks. In this paper, we make the following contributions. We first demonstrate the impact of data integrity attacks on Automatic Generation Control (AGC) on power system frequency and electricity market operation. We propose a general framework to the application of attack resilient control to power systems as a composition of smart attack detection and mitigation. Finally, we develop a model-based anomaly detection and attack mitigation algorithm for AGC. We evaluate the detection capability of the proposed anomaly detection algorithm through simulation studies. Our results show that the algorithm is capable of detecting scaling and ramp attacks with low false positive and negative rates. The proposed model-based mitigation algorithm is also efficient in maintaining system frequency within acceptable limits during the attack period.
Survey of MIRP for Vehicular Ad-Hoc Networks in Urban Environments
Vehicular communication is attracting growing attention from both academia and industry, owing to the amount and importance of the related applications, ranging from road safety to traffic control and up to mobile entert...
A Study on Effects of Social Networking Sites as an Educational Tool on College Students
Social media offers ample of opportunities for learning and interactivity for college students. If we spend a moment to think about it, it’s very difficult to see how students benefit from using social media. As younger...
A GIS Based Parking Management and Dissemination System
Parking is dynamic. One minute a parking space is engaged and the next ten or so minutes its vacant. Finding a parking space has thus become a nightmare in many cities. There are many Parking Guidance Information Systems...
Reliable Data Delivery using RPL
: As of late, for helping IPv6 routing for resource-limited devices in home, industrial and urban context, the Internet Engineering Task Force (IETF) routing protocol standardized the IPv6 routing protocol for low-power...
Text to Speech Conversion Using FLITE Algorithm
Speech synthesis is the artificial production of human voice. A computer system used for this task is called a speech synthesizer. Anyone can use this synthesizer in software or hardware products. The main aim of text-to...