7
Vulnerability Analysis Of Optimal Power Flow Problem Under Cyber-Physical Security Attacks Devendra Shelar and Saurabh Amin Massachusetts Institute of Technology INFORMS November 15 th , 2016

Vulnerability Analysis Of Optimal Power Flow Problem Under ...shelard/slides/INFORMS2016.pdfVulnerability Analysis Of Optimal Power Flow Problem Under Cyber-Physical Security Attacks

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Vulnerability Analysis Of Optimal Power Flow Problem Under ...shelard/slides/INFORMS2016.pdfVulnerability Analysis Of Optimal Power Flow Problem Under Cyber-Physical Security Attacks

Vulnerability Analysis Of Optimal Power Flow ProblemUnder Cyber-Physical Security Attacks

Devendra Shelar and Saurabh Amin

Massachusetts Institute of Technology

INFORMSNovember 15th, 2016

Page 2: Vulnerability Analysis Of Optimal Power Flow Problem Under ...shelard/slides/INFORMS2016.pdfVulnerability Analysis Of Optimal Power Flow Problem Under Cyber-Physical Security Attacks

Vulnerable Electricity Networks: Key issues

§ In addition to reliability failures, powergrids are increasingly vulnerable tocyber-physical security (CPS) attacks

§ Such CPS attacks can be modeled asbilevel optimization problems

§ We present two CPS attack scenarios§ Dynamic Line Rating (DLR)Manipulation

§ Distributed Energy Resource (DER)disruption

§ Structural insights allow for greedy andefficient (approximate) algorithms

Two motivating attack models

California Sniper Attack

Ukraine Cyber Attack

Page 3: Vulnerability Analysis Of Optimal Power Flow Problem Under ...shelard/slides/INFORMS2016.pdfVulnerability Analysis Of Optimal Power Flow Problem Under Cyber-Physical Security Attacks

Related work

§ A. Verma, D. Bienstock: N-k vulnerability problem§ Attacker disrupts generators or manipulates line impedances tomaximinimize load shedding

§ DC Power Flow approximation§ S.Wright et al.: Vulnerability Analysis of Power Systems

§ Attacker increases the line impedances to maximinimize§ Loss of voltage regulation, OR Load shedding

§ Use both active and reactive power

§ R. Baldick, K. Wood, D. Bienstock: Network Interdiction, Cascades

Use bilevel optimization models with outer problem as attack model, andthe inner problem being optimal power flow (OPF) problem

§ Ensure demand is fully met while minimizing costs subject togenerator, capacity, supply-demand balance, power flow constraints

Page 4: Vulnerability Analysis Of Optimal Power Flow Problem Under ...shelard/slides/INFORMS2016.pdfVulnerability Analysis Of Optimal Power Flow Problem Under Cyber-Physical Security Attacks

DLR Manipulations in Transmission Networks

Line capacity violationshave cause cascadingfailures in the past, e.g.,July 2012 blackout in India

Bilevel problem (Stackelberg game)§ Leader: Attacker compromises the DLRs using false data injection attack;§ Follower: Defender’s economic dispatch solution is optimal for new

manipulated system, but possibly infeasible for the old actual system.Problem statement:

§ Determine an optimal attack plan to maximinimize line rating violations

Page 5: Vulnerability Analysis Of Optimal Power Flow Problem Under ...shelard/slides/INFORMS2016.pdfVulnerability Analysis Of Optimal Power Flow Problem Under Cyber-Physical Security Attacks

Solution Approaches

Benders Decomposition (Kevin Wood et al.)§ Alternately consider follower problem, with fixed attacker actions, andmaster problem with fixed defender actions

§ Sequentially generate Benders cut for the Master Problem until zerooptimality gap

§ Results in systematic vertex enumeration of the inner problem

Kuhn-Tucker Single-level reformulation (Bard et al.)§ Apply KKT optimality conditions for the inner problem, andreformulate complementarity constraints

§ Use Branch-n-Bound techniques to solve the resulting Mixed-IntegerLinear Program (MILP)

Page 6: Vulnerability Analysis Of Optimal Power Flow Problem Under ...shelard/slides/INFORMS2016.pdfVulnerability Analysis Of Optimal Power Flow Problem Under Cyber-Physical Security Attacks

Insights

G1 G2

L

f12

f13 f23

β23

β13

p2p1

u13 u23 =

β12 u12

ua23

ud23

§ Attacker strategy, by and large,exhibits a bang-bang policy

§ Some DLRs are set tomaximum

§ Other DLRs are set tominimum (as long as feasibleoperating point exists)

§ Similar results hold for larger(118 node) testcase

5 10 15 20

Time (in hours)

100

150

200

250

300

Actu

al D

LR

(in

MW

)

0

200

400

600

800

1000

De

ma

nd

(in

MW

)

ud13

ud23

us13, u

s23

Demand

5 10 15 20

Time (in hours)

100

150

200

250

300

Ma

nip

ula

ted

DL

R (

in M

W)

ua13

ua23

f13

f23

Page 7: Vulnerability Analysis Of Optimal Power Flow Problem Under ...shelard/slides/INFORMS2016.pdfVulnerability Analysis Of Optimal Power Flow Problem Under Cyber-Physical Security Attacks

Implementation of attack in Powerworld simulator

06410AE0 01 00 00 00 C0 65 49 09 00 00 00 00 00 00 00 0006410AF0 00 00 00 00 00 00 00 00 00 00 00 00 00 FE 00 0006410B00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 0006410B10 00 00 00 00 00 00 C0 3F E1 FA C7 42 E1 FA C7 42

06410840 01 00 00 00 A0 64 49 09 00 00 00 00 00 00 00 0006410850 00 00 00 00 00 00 00 00 00 00 00 00 00 FE 00 0006410860 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 0006410870 00 00 00 00 00 00 C0 3F E1 FA C7 42 E1 FA C7 42

(c) Pre-attack system state (safe).

06410AE0 01 00 00 00 C0 65 49 09 00 00 00 00 00 00 00 0006410AF0 00 00 00 00 00 00 00 00 00 00 00 00 00 FE 00 0006410B00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 0006410B10 00 00 00 00 9A 99 19 40 E1 FA C7 42 E1 FA C7 42

06410840 01 00 00 00 60 65 49 09 00 00 00 00 00 00 00 0006410850 00 00 00 00 00 00 00 00 00 00 00 00 00 FE 00 0006410860 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 0006410870 00 00 00 00 9A 99 99 3F E1 FA C7 42 E1 FA C7 42

(d) Post-attack system state (unsafe).