SlideShare a Scribd company logo
Study of Cyber-Security on
Load Frequency Control in
Power System
Presented By:
U KUSHAL RAO
Regd.No.-1604050018






Main objective is to
add cyber security to the
power system that includes
generation, transmission, and
distribution, so it can be able
to stabilze the frequency
reponse after any type of
attacks.
Figure 1: Electrical Power System
 Increased cyber hacking activities are posing a threat to power systems with
high integration of information technologies.
 Various critical data of power systems were compromised by cyber-attacks
during the incident.
 Large power outages can be difficult and time-consuming to restore, and they
can also have disastrous economic and humanitarian consequences.
 Monitoring is justified by the reduction of fault occurrence of electric power,
damage to the equipment, emergency equipment replacement cost.
 Taking an assumption that an attacker has gained access to one of the power
system's components.
 After its attack how much frequency response is being deviated from the
original one.
 Attackers can penetrate the smart grid verbal
exchange structures by the use of susceptible
entry factors in the logical border surrounding
a network.
 Any type of offence that uses cyberspace for
the purpose of disrupting,disabling,
destroying any system is basically Cyber
Attack.
 There can be several impacts after cyber
attack. So impacts are categorized in two
types
 Economic Impacts
 Technical Impacts
Figure 2: Simulink model for two area power system
Generally cyber-attacks are classified under 3 types :
.
01
02
.
03
.
Figure 3: Frequency measurement before any type of cyber-attack
 Integrity / Timing
Attack
Attackers attack with
induced delay of 10s.
ACEu = ACE + x
Here,x = 10 s.
(Transport Delay)
Figure 4: Frequency measurement under Timing attack
 Template / Scaling
Attack
Attackers attack in such a
way that input signal is
scaled into 5 times.
ACEu = a ACE
Here, a = 5
(Constant Block)
Figure 5: Frequency measurement under Template attack
 Random Attack
Attackers attack in such a
way that input signal is
provided by some random
values as -1 to 1.
(Uniform Random Number
Block)
Figure 6: Frequency measurement under Random attack
 Pulse Attack
Attackers attack in such a
way that adds pulsating
signal in the input with an
amplitude of 5.
ACEu = b
Here , b = 5
(Continuous Pulse
Generator Block)
Figure 6: Frequency measurement under Pulse attack
 Time Delay Attack
If system is being delayed
by 5s then, attackers can
change the delay to 105s
(Transport Delay).
Figure 6: Frequency measurement under Time Delay attack
 Bias Injection Attack
Attackers add a bias block
to manipulate the
waveform.
Figure 6: Frequency measurement under
Positive bias injection attack
Figure 7: Frequency measurement under
Negative bias injection attack
 Load Attack
Attackers add a gaussian
random signal with a
variation of 0.1.
Figure 6: Frequency measurement under Load attack
 Performed different types of attacks in the two area power system model.
 Observed that there is a huge frequency deviation for all of the performed attacks.
 By adding Cyber-Security to this model so that there will be no further deviation of
frequency.
 Then the same method of Cyber-Security will be synced with a microgrid.
 Ali, E.S. and Abd-Elazim, S.M., 2011. Bacteria foraging optimization algorithm based load frequency
controller for interconnected power system. International Journal of Electrical Power & Energy
Systems, 33(3), pp.633-638.
 Saxena, S., Bhatia, S. and Gupta, R., 2021. Cybersecurity Analysis of Load Frequency Control in Power
Systems: A Survey. Designs, 5(3), p.52.
 Nagarjuna, N. and Shankar, G., 2015, August. Load frequency control of two area power system with
AC-DC tie line using PSO optimized controller. In 2015 International Conference on Power and
Advanced Control Engineering (ICPACE) (pp. 227-231). IEEE.
 Xu, Y., 2020. A review of cyber security risks of power systems: from static to dynamic false data
attacks. Protection and Control of Modern Power Systems, 5(1), pp.1-12.
 Nejabatkhah, F., Li, Y.W., Liang, H. and Reza Ahrabi, R., 2021. Cyber-security of smart microgrids: A
survey. Energies, 14(1), p.27.
 Wu, Y., Wei, Z., Weng, J., Li, X. and Deng, R.H., 2017. Resonance attacks on load frequency control of
smart grids. IEEE Transactions on Smart Grid, 9(5), pp.4490-4502.
 Miloševič, J., Tanaka, T., Sandberg, H. and Johansson, K.H., 2017. Analysis and mitigation of bias
injection attacks against a Kalman filter. IFAC-PapersOnLine, 50(1), pp.8393-8398..
 Lin, T.L., Chang, H.Y. and Li, S.L., 2020. A Location Privacy Attack Based on the Location Sharing
Mechanism with Erroneous Distance in Geosocial Networks. Sensors, 20(3), p.918.
Study of Cyber-Security on Load Frequency Control in Power System

More Related Content

PDF
Cybersecurity in Industrial Control Systems (ICS)
PPTX
Artificial Intelligence and Cybersecurity
PPTX
AI and the Impact on Cybersecurity
PDF
Protection of transmission lines (distance)
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Diabetes Mellitus
PPTX
Hypertension
PPTX
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptx
Cybersecurity in Industrial Control Systems (ICS)
Artificial Intelligence and Cybersecurity
AI and the Impact on Cybersecurity
Protection of transmission lines (distance)
Cybersecurity Attack Vectors: How to Protect Your Organization
Diabetes Mellitus
Hypertension
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptx

What's hot (20)

PPT
Smart Grid Cyber Security
PDF
Power system planing and operation (pce5312) chapter three
PPTX
Cyber security for smart grid
PDF
Smart grid security
PDF
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
PPTX
CYBER SECURITY IN THE SMART GRID
PPTX
Cyber security in power sector
PPTX
Cyber Security of Power grids
PPTX
Smart grid ppt seminar topic
PPTX
Electrical services of bs by krt
PPTX
Smart grid presentation
PPTX
Cyber security in Smart grid system
PPTX
Smart grid
PDF
Artificial Intelligence in Smart Grid
PPTX
Smart grid challenge
PPTX
Flexible Ac Transmission System
PPTX
Flexible AC Transmission Sytstem
PPTX
Smart grid technology
PPTX
Firewall and its purpose
PPTX
Presentation On Fact Device
Smart Grid Cyber Security
Power system planing and operation (pce5312) chapter three
Cyber security for smart grid
Smart grid security
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
CYBER SECURITY IN THE SMART GRID
Cyber security in power sector
Cyber Security of Power grids
Smart grid ppt seminar topic
Electrical services of bs by krt
Smart grid presentation
Cyber security in Smart grid system
Smart grid
Artificial Intelligence in Smart Grid
Smart grid challenge
Flexible Ac Transmission System
Flexible AC Transmission Sytstem
Smart grid technology
Firewall and its purpose
Presentation On Fact Device
Ad

Similar to Study of Cyber-Security on Load Frequency Control in Power System (20)

PDF
23 9754 assessment paper id 0023 (ed l)2
PDF
FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: ...
PDF
designdesigndesigndesigns-05-00052-v2.pdf
PDF
A new linear quadratic regulator model to mitigate frequency disturbances in...
DOCX
on false data-injection attacks against power system state estimation modelin...
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
PPTX
Presentation1 160729072733
PDF
Efficient detection of faults and false data injection attacks in smart grid ...
PDF
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
DOCX
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
DOC
On false data injection attacks against power system
PDF
Effect of fuzzy PID controller on feedback control systems based on wireless ...
PDF
A Secure Routing Process to Simultaneously Defend Against False Report and Wo...
PDF
35 electrical power
PDF
power electrical
PDF
35_ELECTRICAL POWER
PDF
A secure routing process to simultaneously defend against false report and wo...
PDF
IRJET- False Data Injection Attacks in Insider Attack
PPT
Area of vulnerabilty
23 9754 assessment paper id 0023 (ed l)2
FUZZY-BASED ENERGY EFFICIENT METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: ...
designdesigndesigndesigns-05-00052-v2.pdf
A new linear quadratic regulator model to mitigate frequency disturbances in...
on false data-injection attacks against power system state estimation modelin...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
Presentation1 160729072733
Efficient detection of faults and false data injection attacks in smart grid ...
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
On false data injection attacks against power system
Effect of fuzzy PID controller on feedback control systems based on wireless ...
A Secure Routing Process to Simultaneously Defend Against False Report and Wo...
35 electrical power
power electrical
35_ELECTRICAL POWER
A secure routing process to simultaneously defend against false report and wo...
IRJET- False Data Injection Attacks in Insider Attack
Area of vulnerabilty
Ad

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Sustainable Sites - Green Building Construction
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Well-logging-methods_new................
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Welding lecture in detail for understanding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPT
Project quality management in manufacturing
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Foundation to blockchain - A guide to Blockchain Tech
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
bas. eng. economics group 4 presentation 1.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Mechanical Engineering MATERIALS Selection
Sustainable Sites - Green Building Construction
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Well-logging-methods_new................
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Automation-in-Manufacturing-Chapter-Introduction.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
CH1 Production IntroductoryConcepts.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Welding lecture in detail for understanding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Project quality management in manufacturing
Operating System & Kernel Study Guide-1 - converted.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Foundation to blockchain - A guide to Blockchain Tech

Study of Cyber-Security on Load Frequency Control in Power System

  • 1. Study of Cyber-Security on Load Frequency Control in Power System Presented By: U KUSHAL RAO Regd.No.-1604050018
  • 3. Main objective is to add cyber security to the power system that includes generation, transmission, and distribution, so it can be able to stabilze the frequency reponse after any type of attacks. Figure 1: Electrical Power System
  • 4.  Increased cyber hacking activities are posing a threat to power systems with high integration of information technologies.  Various critical data of power systems were compromised by cyber-attacks during the incident.  Large power outages can be difficult and time-consuming to restore, and they can also have disastrous economic and humanitarian consequences.  Monitoring is justified by the reduction of fault occurrence of electric power, damage to the equipment, emergency equipment replacement cost.  Taking an assumption that an attacker has gained access to one of the power system's components.  After its attack how much frequency response is being deviated from the original one.
  • 5.  Attackers can penetrate the smart grid verbal exchange structures by the use of susceptible entry factors in the logical border surrounding a network.  Any type of offence that uses cyberspace for the purpose of disrupting,disabling, destroying any system is basically Cyber Attack.  There can be several impacts after cyber attack. So impacts are categorized in two types  Economic Impacts  Technical Impacts
  • 6. Figure 2: Simulink model for two area power system
  • 7. Generally cyber-attacks are classified under 3 types : . 01 02 . 03 . Figure 3: Frequency measurement before any type of cyber-attack
  • 8.  Integrity / Timing Attack Attackers attack with induced delay of 10s. ACEu = ACE + x Here,x = 10 s. (Transport Delay) Figure 4: Frequency measurement under Timing attack
  • 9.  Template / Scaling Attack Attackers attack in such a way that input signal is scaled into 5 times. ACEu = a ACE Here, a = 5 (Constant Block) Figure 5: Frequency measurement under Template attack
  • 10.  Random Attack Attackers attack in such a way that input signal is provided by some random values as -1 to 1. (Uniform Random Number Block) Figure 6: Frequency measurement under Random attack
  • 11.  Pulse Attack Attackers attack in such a way that adds pulsating signal in the input with an amplitude of 5. ACEu = b Here , b = 5 (Continuous Pulse Generator Block) Figure 6: Frequency measurement under Pulse attack
  • 12.  Time Delay Attack If system is being delayed by 5s then, attackers can change the delay to 105s (Transport Delay). Figure 6: Frequency measurement under Time Delay attack
  • 13.  Bias Injection Attack Attackers add a bias block to manipulate the waveform. Figure 6: Frequency measurement under Positive bias injection attack Figure 7: Frequency measurement under Negative bias injection attack
  • 14.  Load Attack Attackers add a gaussian random signal with a variation of 0.1. Figure 6: Frequency measurement under Load attack
  • 15.  Performed different types of attacks in the two area power system model.  Observed that there is a huge frequency deviation for all of the performed attacks.  By adding Cyber-Security to this model so that there will be no further deviation of frequency.  Then the same method of Cyber-Security will be synced with a microgrid.
  • 16.  Ali, E.S. and Abd-Elazim, S.M., 2011. Bacteria foraging optimization algorithm based load frequency controller for interconnected power system. International Journal of Electrical Power & Energy Systems, 33(3), pp.633-638.  Saxena, S., Bhatia, S. and Gupta, R., 2021. Cybersecurity Analysis of Load Frequency Control in Power Systems: A Survey. Designs, 5(3), p.52.  Nagarjuna, N. and Shankar, G., 2015, August. Load frequency control of two area power system with AC-DC tie line using PSO optimized controller. In 2015 International Conference on Power and Advanced Control Engineering (ICPACE) (pp. 227-231). IEEE.  Xu, Y., 2020. A review of cyber security risks of power systems: from static to dynamic false data attacks. Protection and Control of Modern Power Systems, 5(1), pp.1-12.  Nejabatkhah, F., Li, Y.W., Liang, H. and Reza Ahrabi, R., 2021. Cyber-security of smart microgrids: A survey. Energies, 14(1), p.27.  Wu, Y., Wei, Z., Weng, J., Li, X. and Deng, R.H., 2017. Resonance attacks on load frequency control of smart grids. IEEE Transactions on Smart Grid, 9(5), pp.4490-4502.  Miloševič, J., Tanaka, T., Sandberg, H. and Johansson, K.H., 2017. Analysis and mitigation of bias injection attacks against a Kalman filter. IFAC-PapersOnLine, 50(1), pp.8393-8398..  Lin, T.L., Chang, H.Y. and Li, S.L., 2020. A Location Privacy Attack Based on the Location Sharing Mechanism with Erroneous Distance in Geosocial Networks. Sensors, 20(3), p.918.