-
Value of Communication: Data-Driven Topology Optimization for Distributed Linear Cyber-Physical Systems
Authors:
Michael Nestor,
Fei Teng
Abstract:
Communication topology is a crucial part of a distributed control implementation for cyber-physical systems, yet is typically treated as a constraint within control design problems rather than a design variable. We propose a data-driven method for designing an optimal topology for the purpose of distributed control when a system model is unavailable or unaffordable, via a mixed-integer second-orde…
▽ More
Communication topology is a crucial part of a distributed control implementation for cyber-physical systems, yet is typically treated as a constraint within control design problems rather than a design variable. We propose a data-driven method for designing an optimal topology for the purpose of distributed control when a system model is unavailable or unaffordable, via a mixed-integer second-order conic program. The approach demonstrates improved control performance over random topologies in simulations and efficiently drops links which have a small effect on predictor accuracy, which we show correlates well with closed-loop control cost.
△ Less
Submitted 12 September, 2024;
originally announced September 2024.
-
Efficient Sampling for Data-Driven Frequency Stability Constraint via Forward-Mode Automatic Differentiation
Authors:
Wangkun Xu,
Qian Chen,
Pudong Ge,
Zhongda Chu,
Fei Teng
Abstract:
Encoding frequency stability constraints in the operation problem is challenging due to its complex dynamics. Recently, data-driven approaches have been proposed to learn the stability criteria offline with the trained model embedded as a constraint of online optimization. However, random sampling of stationary operation points is less efficient in generating balanced stable and unstable samples.…
▽ More
Encoding frequency stability constraints in the operation problem is challenging due to its complex dynamics. Recently, data-driven approaches have been proposed to learn the stability criteria offline with the trained model embedded as a constraint of online optimization. However, random sampling of stationary operation points is less efficient in generating balanced stable and unstable samples. Meanwhile, the performance of such a model is strongly dependent on the quality of the training dataset. Observing this research gap, we propose a gradient-based data generation method via forward-mode automatic differentiation. In this method, the original dynamic system is augmented with new states that represent the dynamic of sensitivities of the original states, which can be solved by invoking any ODE solver for a single time. To compensate for the contradiction between the gradient of various frequency stability criteria, gradient surgery is proposed by projecting the gradient on the normal plane of the other. In the end, we demonstrate the superior performance of the proposed sampling algorithm, compared with the unrolling differentiation and finite difference. All codes are available at https://github.com/xuwkk/frequency_sample_ad.
△ Less
Submitted 20 July, 2024;
originally announced July 2024.
-
Coordinated Planning for Stability Enhancement in High IBR-Penetrated Systems
Authors:
Zhongda Chu,
Fei Teng
Abstract:
Security and stability challenges in future power systems with high penetration Inverter-Based Resources (IBR) have been anticipated as the main barrier to decolonization. Grid-following IBRs may become unstable under small disturbances in weak grids, while, during transient processes, system stability and protection may be jeopardized due to the lack of sufficient Short-Circuit Current (SCC). To…
▽ More
Security and stability challenges in future power systems with high penetration Inverter-Based Resources (IBR) have been anticipated as the main barrier to decolonization. Grid-following IBRs may become unstable under small disturbances in weak grids, while, during transient processes, system stability and protection may be jeopardized due to the lack of sufficient Short-Circuit Current (SCC). To solve these challenges and achieve decarbonization, the future system has to be carefully planned. However, it remains unclear how both small-signal and transient processes can be considered during the system planning stage. In this context, this paper proposes a coordinated planning model of different resources to enhance system-level stability. The system strength and SCC constraints are analytically derived by considering the different characteristics of synchronous units and IBRs, which are further effectively linearized through a novel data-driven approach, where an active sampling method is proposed to generate a representative data set. The significant economic value of the proposed coordinated planning framework in both system asset investment and system operation is demonstrated through detailed case studies.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Uncertainty-Aware Transient Stability-Constrained Preventive Redispatch: A Distributional Reinforcement Learning Approach
Authors:
Zhengcheng Wang,
Fei Teng,
Yanzhen Zhou,
Qinglai Guo,
Hongbin Sun
Abstract:
Transient stability-constrained preventive redispatch plays a crucial role in ensuring power system security and stability. Since redispatch strategies need to simultaneously satisfy complex transient constraints and the economic need, model-based formulation and optimization become extremely challenging. In addition, the increasing uncertainty and variability introduced by renewable sources start…
▽ More
Transient stability-constrained preventive redispatch plays a crucial role in ensuring power system security and stability. Since redispatch strategies need to simultaneously satisfy complex transient constraints and the economic need, model-based formulation and optimization become extremely challenging. In addition, the increasing uncertainty and variability introduced by renewable sources start to drive the system stability consideration from deterministic to probabilistic, which further exaggerates the complexity. In this paper, a Graph neural network guided Distributional Deep Reinforcement Learning (GD2RL) method is proposed, for the first time, to solve the uncertainty-aware transient stability-constrained preventive redispatch problem. First, a graph neural network-based transient simulator is trained by supervised learning to efficiently generate post-contingency rotor angle curves with the steady-state and contingency as inputs, which serves as a feature extractor for operating states and a surrogate time-domain simulator during the environment interaction for reinforcement learning. Distributional deep reinforcement learning with explicit uncertainty distribution of system operational conditions is then applied to generate the redispatch strategy to balance the user-specified probabilistic stability performance and economy preferences. The full distribution of the post-redispatch transient stability index is directly provided as the output. Case studies on the modified New England 39-bus system validate the proposed method.
△ Less
Submitted 29 June, 2024; v1 submitted 14 February, 2024;
originally announced February 2024.
-
LF Tracy: A Unified Single-Pipeline Approach for Salient Object Detection in Light Field Cameras
Authors:
Fei Teng,
Jiaming Zhang,
Jiawei Liu,
Kunyu Peng,
Xina Cheng,
Zhiyong Li,
Kailun Yang
Abstract:
Leveraging rich information is crucial for dense prediction tasks. Light field (LF) cameras are instrumental in this regard, as they allow data to be sampled from various perspectives. This capability provides valuable spatial, depth, and angular information, enhancing scene-parsing tasks. However, we have identified two overlooked issues for the LF salient object detection (SOD) task. (1): Previo…
▽ More
Leveraging rich information is crucial for dense prediction tasks. Light field (LF) cameras are instrumental in this regard, as they allow data to be sampled from various perspectives. This capability provides valuable spatial, depth, and angular information, enhancing scene-parsing tasks. However, we have identified two overlooked issues for the LF salient object detection (SOD) task. (1): Previous approaches predominantly employ a customized two-stream design to discover the spatial and depth features within light field images. The network struggles to learn the implicit angular information between different images due to a lack of intra-network data connectivity. (2): Little research has been directed towards the data augmentation strategy for LF SOD. Research on inter-network data connectivity is scant. In this study, we propose an efficient paradigm (LF Tracy) to address those issues. This comprises a single-pipeline encoder paired with a highly efficient information aggregation (IA) module (around 8M parameters) to establish an intra-network connection. Then, a simple yet effective data augmentation strategy called MixLD is designed to bridge the inter-network connections. Owing to this innovative paradigm, our model surpasses the existing state-of-the-art method through extensive experiments. Especially, LF Tracy demonstrates a 23% improvement over previous results on the latest large-scale PKU dataset. The source code is publicly available at: https://github.com/FeiBryantkit/LF-Tracy.
△ Less
Submitted 26 August, 2024; v1 submitted 29 January, 2024;
originally announced January 2024.
-
Pricing of Short Circuit Current in High IBR-Penetrated System
Authors:
Zhongda Chu,
Jingyi Wu,
Fei Teng
Abstract:
With the growing penetration of Inverter-Based Resources (IBRs) in power systems, stability service markets have emerged to incentivize technologies that ensure power system stability and reliability. Among the various challenges faced in power system operation and stability, a prominent issue raised from the increasing integration of large-scale IBRs is the significant reduction of the Short-Circ…
▽ More
With the growing penetration of Inverter-Based Resources (IBRs) in power systems, stability service markets have emerged to incentivize technologies that ensure power system stability and reliability. Among the various challenges faced in power system operation and stability, a prominent issue raised from the increasing integration of large-scale IBRs is the significant reduction of the Short-Circuit Current (SCC) level in the system, which poses a considerable threat to system voltage stability and protection. Thus, a proper market mechanism to incentivize the provision of SCC as a stability service is desired. However, the pricing of this service within the future stability market has not yet been fully developed, due to the nonconvex nature of SCC constraints and the locational property of SCC. To address these problems, this work aims to explore, for the first time, a pricing model for SCC service by incorporating a linearized SCC constraint into the Unit Commitment (UC) problem, to achieve the desired SCC level and extract the shadow price for SCC through different pricing methods.
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
Decision-Oriented Learning for Future Power System Decision-Making under Uncertainty
Authors:
Ran Li,
Haipeng Zhang,
Mingyang Sun,
Fei Teng,
Can Wan,
Salvador Pineda,
Georges Kariniotakis
Abstract:
Better forecasts may not lead to better decision-making. To address this challenge, decision-oriented learning (DOL) has been proposed as a new branch of machine learning that replaces traditional statistical loss with a decision loss to form an end-to-end model. Applications of DOL in power systems have been developed in recent years. For renewable-rich power systems, uncertainties propagate thro…
▽ More
Better forecasts may not lead to better decision-making. To address this challenge, decision-oriented learning (DOL) has been proposed as a new branch of machine learning that replaces traditional statistical loss with a decision loss to form an end-to-end model. Applications of DOL in power systems have been developed in recent years. For renewable-rich power systems, uncertainties propagate through sequential tasks, where traditional statistical-based approaches focus on minimizing statistical errors at intermediate stages but may fail to provide optimal decisions at the final stage. This paper first elaborates on the mismatch between more accurate forecasts and more optimal decisions in the power system caused by statistical-based learning (SBL) and explains how DOL resolves this problem. Secondly, this paper extensively reviews DOL techniques and their applications in power systems while highlighting their pros and cons in relation to SBL. Finally, this paper identifies the challenges to adopt DOL in the energy sector and presents future research directions.
△ Less
Submitted 7 April, 2024; v1 submitted 8 January, 2024;
originally announced January 2024.
-
Managing the Uncertainty in System Dynamics Through Distributionally Robust Stability-Constrained Optimization
Authors:
Zhongda Chu,
Fei Teng
Abstract:
With the increasing penetration of Inverter-Based Resources (IBRs) and their impact on power system stability and operation, the concept of stability-constrained optimization has drawn significant attention from researchers. In order to manage the parametric uncertainty due to inaccurate modeling that influences the system dynamics, this work proposes a distributionally robust stability constraint…
▽ More
With the increasing penetration of Inverter-Based Resources (IBRs) and their impact on power system stability and operation, the concept of stability-constrained optimization has drawn significant attention from researchers. In order to manage the parametric uncertainty due to inaccurate modeling that influences the system dynamics, this work proposes a distributionally robust stability constraint formulation. However, the uncertainty of system dynamic parameters influences the stability constraints indirectly through a nonlinear and implicit relationship. To address this issue, a propagation mechanism from the uncertainty of the system dynamic parameters to the stability constraint coefficients is established. Since these coefficients are connected to the uncertain parameters through highly nonlinear and implicit functions, an approximation approach utilizing Taylor expansion and the Delta method is developed to estimate the statistical moments of the stability constraint coefficients based on the first and second-order derivatives, with which an ambiguity set for the distributionally robust optimization can be formulated. The accuracy of the uncertainty propagation as well as the effectiveness of the distributionally robust stability constraints are demonstrated through detailed case studies in the modified IEEE 39-bus system.
△ Less
Submitted 22 April, 2024; v1 submitted 7 September, 2023;
originally announced September 2023.
-
Cyber Recovery from Dynamic Load Altering Attacks: Linking Electricity, Transportation, and Cyber Networks
Authors:
Mengxiang Liu,
Zhongda Chu,
Fei Teng
Abstract:
To address the increasing vulnerability of power grids, significant attention has been focused on the attack detection and impact mitigation. However, it is still unclear how to effectively and quickly recover the cyber and physical networks from a cyberattack. In this context, this paper presents the first investigation of the Cyber Recovery from Dynamic load altering Attack (CRDA). Considering t…
▽ More
To address the increasing vulnerability of power grids, significant attention has been focused on the attack detection and impact mitigation. However, it is still unclear how to effectively and quickly recover the cyber and physical networks from a cyberattack. In this context, this paper presents the first investigation of the Cyber Recovery from Dynamic load altering Attack (CRDA). Considering the interconnection among electricity, transportation, and cyber networks, two essential sub-tasks are formulated for the CRDA: i) Optimal design of repair crew routes to remove installed malware and ii) Adaptive adjustment of system operation to eliminate the mitigation costs while guaranteeing stability. To achieve this, linear stability constraints are obtained by estimating the related eigenvalues under the variation of multiple IBR droop gains based on the sensitivity information of strategically selected sampling points. Moreover, to obtain the robust recovery strategy, the potential counter-measures from the adversary during the recovery process are modeled as maximizing the attack impact of remaining compromised resources in each step. A Mixed-Integer Linear Programming (MILP) problem can be finally formulated for the CRDA with the primary objective to reset involved droop gains and secondarily to repair all compromised loads. Case studies are performed in the modified IEEE 39-bus power system to illustrate the effectiveness of the proposed CRDA compared to the benchmark case.
△ Less
Submitted 6 September, 2023;
originally announced September 2023.
-
Task-Aware Machine Unlearning and Its Application in Load Forecasting
Authors:
Wangkun Xu,
Fei Teng
Abstract:
Data privacy and security have become a non-negligible factor in load forecasting. Previous researches mainly focus on training stage enhancement. However, once the model is trained and deployed, it may need to `forget' (i.e., remove the impact of) part of training data if the these data are found to be malicious or as requested by the data owner. This paper introduces the concept of machine unlea…
▽ More
Data privacy and security have become a non-negligible factor in load forecasting. Previous researches mainly focus on training stage enhancement. However, once the model is trained and deployed, it may need to `forget' (i.e., remove the impact of) part of training data if the these data are found to be malicious or as requested by the data owner. This paper introduces the concept of machine unlearning which is specifically designed to remove the influence of part of the dataset on an already trained forecaster. However, direct unlearning inevitably degrades the model generalization ability. To balance between unlearning completeness and model performance, a performance-aware algorithm is proposed by evaluating the sensitivity of local model parameter change using influence function and sample re-weighting. Furthermore, we observe that the statistical criterion such as mean squared error, cannot fully reflect the operation cost of the downstream tasks in power system. Therefore, a task-aware machine unlearning is proposed whose objective is a trilevel optimization with dispatch and redispatch problems considered. We theoretically prove the existence of the gradient of such an objective, which is key to re-weighting the remaining samples. We tested the unlearning algorithms on linear, CNN, and MLP-Mixer based load forecasters with a realistic load dataset. The simulation demonstrates the balance between unlearning completeness and operational cost. All codes can be found at https://github.com/xuwkk/task_aware_machine_unlearning.
△ Less
Submitted 11 March, 2024; v1 submitted 28 August, 2023;
originally announced August 2023.
-
Semi-Supervised Dual-Stream Self-Attentive Adversarial Graph Contrastive Learning for Cross-Subject EEG-based Emotion Recognition
Authors:
Weishan Ye,
Zhiguo Zhang,
Fei Teng,
Min Zhang,
Jianhong Wang,
Dong Ni,
Fali Li,
Peng Xu,
Zhen Liang
Abstract:
Electroencephalography (EEG) is an objective tool for emotion recognition with promising applications. However, the scarcity of labeled data remains a major challenge in this field, limiting the widespread use of EEG-based emotion recognition. In this paper, a semi-supervised Dual-stream Self-Attentive Adversarial Graph Contrastive learning framework (termed as DS-AGC) is proposed to tackle the ch…
▽ More
Electroencephalography (EEG) is an objective tool for emotion recognition with promising applications. However, the scarcity of labeled data remains a major challenge in this field, limiting the widespread use of EEG-based emotion recognition. In this paper, a semi-supervised Dual-stream Self-Attentive Adversarial Graph Contrastive learning framework (termed as DS-AGC) is proposed to tackle the challenge of limited labeled data in cross-subject EEG-based emotion recognition. The DS-AGC framework includes two parallel streams for extracting non-structural and structural EEG features. The non-structural stream incorporates a semi-supervised multi-domain adaptation method to alleviate distribution discrepancy among labeled source domain, unlabeled source domain, and unknown target domain. The structural stream develops a graph contrastive learning method to extract effective graph-based feature representation from multiple EEG channels in a semi-supervised manner. Further, a self-attentive fusion module is developed for feature fusion, sample selection, and emotion recognition, which highlights EEG features more relevant to emotions and data samples in the labeled source domain that are closer to the target domain. Extensive experiments conducted on two benchmark databases (SEED and SEED-IV) using a semi-supervised cross-subject leave-one-subject-out cross-validation evaluation scheme show that the proposed model outperforms existing methods under different incomplete label conditions (with an average improvement of 5.83% on SEED and 6.99% on SEED-IV), demonstrating its effectiveness in addressing the label scarcity problem in cross-subject EEG-based emotion recognition.
△ Less
Submitted 2 August, 2024; v1 submitted 13 August, 2023;
originally announced August 2023.
-
Control-mode as a Grid Service in Software-defined Power Grids: GFL vs GFM
Authors:
Guoxuan Cui,
Zhongda Chu,
Fei Teng
Abstract:
In power systems with high penetration of power electronics, grid-forming control is proposed to replace traditional Grid-Following Converter (GFL) in order to improve the overall system strength and resist small-signal instability in weak grids by directly forming the terminal voltage. However, sufficient headroom of both active and reactive power must be made available for Grid-Forming Converter…
▽ More
In power systems with high penetration of power electronics, grid-forming control is proposed to replace traditional Grid-Following Converter (GFL) in order to improve the overall system strength and resist small-signal instability in weak grids by directly forming the terminal voltage. However, sufficient headroom of both active and reactive power must be made available for Grid-Forming Converter (GFM) to operate, potentially leading to sub-optimal operation in steady states. This presents a new research problem to optimally allocate between GFM and GFL to balance the ability of GFMs to improve the grid strength and the potential economic loss resulting from reserved headroom. An optimization framework under software-defined grids is proposed, for the first time, to dynamically determine the optimal allocation of GFMs and GFLs in power systems at each time step of system scheduling according to system conditions, which ensures both system stability and minimum operational cost. To achieve this, the system scheduling model is expanded to simultaneously consider the constraints related to active and reactive power reserves for GFMs, as well as the system level stability. Case studies conducted on the modified IEEE 30-bus system demonstrate significant economic benefits in that the optimal proportion of GFMs in the power system can be dynamically determined while ensuring power reserve and grid stability constraints.
△ Less
Submitted 28 July, 2023;
originally announced July 2023.
-
OAFuser: Towards Omni-Aperture Fusion for Light Field Semantic Segmentation
Authors:
Fei Teng,
Jiaming Zhang,
Kunyu Peng,
Yaonan Wang,
Rainer Stiefelhagen,
Kailun Yang
Abstract:
Light field cameras are capable of capturing intricate angular and spatial details. This allows for acquiring complex light patterns and details from multiple angles, significantly enhancing the precision of image semantic segmentation. However, two significant issues arise: (1) The extensive angular information of light field cameras contains a large amount of redundant data, which is overwhelmin…
▽ More
Light field cameras are capable of capturing intricate angular and spatial details. This allows for acquiring complex light patterns and details from multiple angles, significantly enhancing the precision of image semantic segmentation. However, two significant issues arise: (1) The extensive angular information of light field cameras contains a large amount of redundant data, which is overwhelming for the limited hardware resources of intelligent agents. (2) A relative displacement difference exists in the data collected by different micro-lenses. To address these issues, we propose an Omni-Aperture Fusion model (OAFuser) that leverages dense context from the central view and extracts the angular information from sub-aperture images to generate semantically consistent results. To simultaneously streamline the redundant information from the light field cameras and avoid feature loss during network propagation, we present a simple yet very effective Sub-Aperture Fusion Module (SAFM). This module efficiently embeds sub-aperture images in angular features, allowing the network to process each sub-aperture image with a minimal computational demand of only (around 1GFlops). Furthermore, to address the mismatched spatial information across viewpoints, we present a Center Angular Rectification Module (CARM) to realize feature resorting and prevent feature occlusion caused by misalignment. The proposed OAFuser achieves state-of-the-art performance on four UrbanLF datasets in terms of all evaluation metrics and sets a new record of 84.93% in mIoU on the UrbanLF-Real Extended dataset, with a gain of +3.69%. The source code for OAFuser is available at https://github.com/FeiBryantkit/OAFuser.
△ Less
Submitted 9 September, 2024; v1 submitted 28 July, 2023;
originally announced July 2023.
-
Stability Constrained Optimization in High IBR-Penetrated Power Systems-Part II: Constraint Validation and Applications
Authors:
Zhongda Chu,
Fei Teng
Abstract:
Multiple operational constraints of power system stability are derived analytically and reformulated into Second-Order Cone (SOC) form through a unification method in Part I of this paper. The accuracy and conservativeness of the proposed methods are illustrated in the second part. The validity of the developed constraints is tested against dynamic simulations carried out based on the modified IEE…
▽ More
Multiple operational constraints of power system stability are derived analytically and reformulated into Second-Order Cone (SOC) form through a unification method in Part I of this paper. The accuracy and conservativeness of the proposed methods are illustrated in the second part. The validity of the developed constraints is tested against dynamic simulations carried out based on the modified IEEE 39-bus system. Furthermore, the developed power system stability constraints are applied to the optimal system scheduling model. The resulting stability-constrained system scheduling problem aims to achieve most economic system operation while ensuring different stability in power systems with high Inverter-Based Resources (IBR) penetration. Moreover, based on the stability-constrained optimization model, a novel marginal unit pricing scheme is proposed to quantify the stability services of different units appropriately according to their economic value in maintaining system stability, thus providing rational incentives to the stability service provider and insightful information for the stability market development.
△ Less
Submitted 14 February, 2024; v1 submitted 22 July, 2023;
originally announced July 2023.
-
Stability Constrained Optimization in High IBR-Penetrated Power Systems-Part I: Constraint Development and Unification
Authors:
Zhongda Chu,
Fei Teng
Abstract:
Maintaining power system stability is becoming more and more challenging due to the ever-increasing inverter-interfaced renewable penetration in power systems. To ensure system stability during system operation and to provide appropriate incentives in the future market-based stability maintenance framework, it is essential to develop a comprehensive set of power system stability constraints which…
▽ More
Maintaining power system stability is becoming more and more challenging due to the ever-increasing inverter-interfaced renewable penetration in power systems. To ensure system stability during system operation and to provide appropriate incentives in the future market-based stability maintenance framework, it is essential to develop a comprehensive set of power system stability constraints which can be incorporated into system operation, market design and planning problems. In this paper, different system stability issues, including synchronization, voltage and frequency stability, are investigated and the corresponding stability conditions are analytically formulated as system operation constraints. A unified framework is further proposed to represent the stability constraints in a general form and enables effective reformulation of the impedance-based stability metrics. All the constraints are converted into linear or Second-Order-Cone (SOC) form, which can be readily implemented in any optimisation-based applications, such as system scheduling, planning and market design, thus providing significant value for multiple system stability enhancement and studies.
△ Less
Submitted 22 July, 2023;
originally announced July 2023.
-
Vehicle-to-grid plug-in forecasting for participation in ancillary services markets
Authors:
Jemima Graham,
Fei Teng
Abstract:
Electric vehicle (EV) charge points (CPs) can be used by aggregators to provide frequency response (FR) services. Aggregators must have day-ahead half-hourly forecasts of minimum aggregate vehicle-to-grid (V2G) plug-in to produce meaningful bids for the day-ahead ancillary services market. However, there is a lack of understanding on what features should be considered and how complex the forecasti…
▽ More
Electric vehicle (EV) charge points (CPs) can be used by aggregators to provide frequency response (FR) services. Aggregators must have day-ahead half-hourly forecasts of minimum aggregate vehicle-to-grid (V2G) plug-in to produce meaningful bids for the day-ahead ancillary services market. However, there is a lack of understanding on what features should be considered and how complex the forecasting model should be. This paper explores the dependency of aggregate V2G plug-in on historic plug-in levels, calendar variables, and weather conditions. These investigations are used to develop three day-ahead forecasts of minimum aggregate V2G plug-in during 30-minute window. A neural network that considers previous V2G plug-in values the day before, three days before, and seven days before, in addition to day of the week, month, and hour, is found to be the most accurate.
△ Less
Submitted 16 August, 2023; v1 submitted 14 July, 2023;
originally announced July 2023.
-
Benchmarking Explanatory Models for Inertia Forecasting using Public Data of the Nordic Area
Authors:
Jemima Graham,
Evelyn Heylen,
Yuankai Bian,
Fei Teng
Abstract:
This paper investigates the performance of a day-ahead explanatory model for inertia forecasting based on field data in the Nordic system, which achieves a 43% reduction in mean absolute percentage error (MAPE) against a state-of-the-art time-series forecast model. The generalizability of the explanatory model is verified by its consistent performance on Nordic and Great Britain datasets. Also, it…
▽ More
This paper investigates the performance of a day-ahead explanatory model for inertia forecasting based on field data in the Nordic system, which achieves a 43% reduction in mean absolute percentage error (MAPE) against a state-of-the-art time-series forecast model. The generalizability of the explanatory model is verified by its consistent performance on Nordic and Great Britain datasets. Also, it appears that a long duration of training data is not required to obtain accurate results with this model, but taking a more spatially granular approach reduces the MAPE by 3.6%. Finally, two further model enhancements are studied considering the specific features in Nordic system: (i) a monthly interaction variable applied to the day-ahead national demand forecast feature, reducing the MAPE by up to 18%; and (ii) a feature based on the inertia from hydropower, although this has a negligible impact. The field dataset used for benchmarking is also made publicly available.
△ Less
Submitted 14 July, 2023;
originally announced July 2023.
-
Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey
Authors:
Mengxiang Liu,
Fei Teng,
Zhenyong Zhang,
Pudong Ge,
Ruilong Deng,
Mingyang Sun,
Peng Cheng,
Jiming Chen
Abstract:
The rapid development of information and communications technology has enabled the use of digital-controlled and software-driven distributed energy resources (DERs) to improve the flexibility and efficiency of power supply, and support grid operations. However, this evolution also exposes geographically-dispersed DERs to cyber threats, including hardware and software vulnerabilities, communication…
▽ More
The rapid development of information and communications technology has enabled the use of digital-controlled and software-driven distributed energy resources (DERs) to improve the flexibility and efficiency of power supply, and support grid operations. However, this evolution also exposes geographically-dispersed DERs to cyber threats, including hardware and software vulnerabilities, communication issues, and personnel errors, etc. Therefore, enhancing the cyber-resiliency of DER-based smart grid - the ability to survive successful cyber intrusions - is becoming increasingly vital and has garnered significant attention from both industry and academia. In this survey, we aim to provide a systematical and comprehensive review regarding the cyber-resiliency enhancement (CRE) of DER-based smart grid. Firstly, an integrated threat modeling method is tailored for the hierarchical DER-based smart grid with special emphasis on vulnerability identification and impact analysis. Then, the defense-in-depth strategies encompassing prevention, detection, mitigation, and recovery are comprehensively surveyed, systematically classified, and rigorously compared. A CRE framework is subsequently proposed to incorporate the five key resiliency enablers. Finally, challenges and future directions are discussed in details. The overall aim of this survey is to demonstrate the development trend of CRE methods and motivate further efforts to improve the cyber-resiliency of DER-based smart grid.
△ Less
Submitted 5 March, 2024; v1 submitted 9 May, 2023;
originally announced May 2023.
-
Optimal Design of Neural Network Structure for Power System Frequency Security Constraints
Authors:
Zhuoxuan Li,
Zhongda Chu,
Fei Teng
Abstract:
Recently, frequency security is challenged by high uncertainty and low inertia in power system with high penetration of Renewable Energy Sources (RES). In the context of Unit Commitment (UC) problems, frequency security constraints represented by neural networks have been developed and embedded into the optimization problem to represent complicated frequency dynamics. However, there are two major…
▽ More
Recently, frequency security is challenged by high uncertainty and low inertia in power system with high penetration of Renewable Energy Sources (RES). In the context of Unit Commitment (UC) problems, frequency security constraints represented by neural networks have been developed and embedded into the optimization problem to represent complicated frequency dynamics. However, there are two major disadvantages related to this technique: the risk of overconfident prediction and poor computational efficiency. To handle these disadvantages, novel methodologies are proposed to optimally design the neural network structure, including the use of asymmetric loss function during the training stage and scientifically selecting neural network size and topology. The effectiveness of the proposed methodologies are validated by case study which reveals the improvement of conservativeness and mitigation of computation performance issues.
△ Less
Submitted 20 August, 2023; v1 submitted 24 April, 2023;
originally announced April 2023.
-
Risk-Aware Objective-Based Forecasting in Inertia Management
Authors:
Haipeng Zhang,
Ran Li,
Yan Chen,
Zhongda Chu,
Mingyang Sun,
Fei Teng
Abstract:
The objective-based forecasting considers the asymmetric and non-linear impacts of forecasting errors on decision objectives, thus improving the effectiveness of its downstream decision-making process. However, existing objective-based forecasting methods are risk-neutral and not suitable for tasks like power system inertia management and unit commitment, of which decision-makers are usually biase…
▽ More
The objective-based forecasting considers the asymmetric and non-linear impacts of forecasting errors on decision objectives, thus improving the effectiveness of its downstream decision-making process. However, existing objective-based forecasting methods are risk-neutral and not suitable for tasks like power system inertia management and unit commitment, of which decision-makers are usually biased toward risk aversion in practice. To tackle this problem, this paper proposes a generic risk-aware objective-based forecasting method. It enables decision-makers to customize their forecasting with different risk preferences. The equivalence between the proposed method and optimization under uncertainty (stochastic/robust optimization) is established for the first time. Case studies are carried out on a Great Britain 2030 power system with system operational data from National Grid. The results show that the proposed model with deterministic optimization can approximate the performance of stochastic programming or robust optimization at only a fraction of their computational cost.
△ Less
Submitted 21 March, 2023;
originally announced March 2023.
-
Preventive-Corrective Cyber-Defense: Attack-Induced Region Minimization and Cybersecurity Margin Maximization
Authors:
Jiazuo Hou,
Fei Teng,
Wenqian Yin,
Yue Song,
Yunhe Hou
Abstract:
False data injection (FDI) cyber-attacks on power systems can be prevented by strategically selecting and protecting a sufficiently large measurement subset, which, however, requires adequate cyber-defense resources for measurement protection. With any given cyber-defense resource, this paper proposes a preventive-corrective cyber-defense strategy, which minimizes the FDI attack-induced region in…
▽ More
False data injection (FDI) cyber-attacks on power systems can be prevented by strategically selecting and protecting a sufficiently large measurement subset, which, however, requires adequate cyber-defense resources for measurement protection. With any given cyber-defense resource, this paper proposes a preventive-corrective cyber-defense strategy, which minimizes the FDI attack-induced region in a preventive manner, followed by maximizing the cybersecurity margin in a corrective manner. First, this paper proposes a preventive cyber-defense strategy that minimizes the volume of the FDI attack-induced region via preventive allocation of any given measurement protection resource. Particularly, a sufficient condition for constructing the FDI unattackable lines is proposed, indicating that the FDI cyber-attack could be locally rather than globally prevented. Then, given a non-empty FDI attack-induced region, this paper proposes a corrective cyber-defense strategy that maximizes the cybersecurity margin, leading to a trade-off between the safest-but-expensive operation point (i.e., Euclidean Chebyshev center) and the cheapest-but-dangerous operation point. Simulation results on a modified IEEE 14 bus system verify the effectiveness and cost-effectiveness of the proposed preventive-corrective cyber-defense strategy.
△ Less
Submitted 13 November, 2023; v1 submitted 15 February, 2023;
originally announced February 2023.
-
Availability Adversarial Attack and Countermeasures for Deep Learning-based Load Forecasting
Authors:
Wangkun Xu,
Fei Teng
Abstract:
The forecast of electrical loads is essential for the planning and operation of the power system. Recently, advances in deep learning have enabled more accurate forecasts. However, deep neural networks are prone to adversarial attacks. Although most of the literature focuses on integrity-based attacks, this paper proposes availability-based adversarial attacks, which can be more easily implemented…
▽ More
The forecast of electrical loads is essential for the planning and operation of the power system. Recently, advances in deep learning have enabled more accurate forecasts. However, deep neural networks are prone to adversarial attacks. Although most of the literature focuses on integrity-based attacks, this paper proposes availability-based adversarial attacks, which can be more easily implemented by attackers. For each forecast instance, the availability attack position is optimally solved by mixed-integer reformulation of the artificial neural network. To tackle this attack, an adversarial training algorithm is proposed. In simulation, a realistic load forecasting dataset is considered and the attack performance is compared to the integrity-based attack. Meanwhile, the adversarial training algorithm is shown to significantly improve robustness against availability attacks. All codes are available at https://github.com/xuwkk/AAA_Load_Forecast.
△ Less
Submitted 4 January, 2023;
originally announced January 2023.
-
Scheduling of Software-Defined Microgrids for Optimal Frequency Regulation
Authors:
Zhongda Chu,
Guoxuan Cui,
Fei Teng
Abstract:
Integrated with a high share of Inverter-Based Resources (IBRs), microgrids face increasing complexity of frequency dynamics, especially after unintentional islanding from the maingrid. These IBRs, on the other hand, provide more control flexibility to shape the frequency dynamics of microgrid and together with advanced communication infrastructure offer new opportunities in the future software-de…
▽ More
Integrated with a high share of Inverter-Based Resources (IBRs), microgrids face increasing complexity of frequency dynamics, especially after unintentional islanding from the maingrid. These IBRs, on the other hand, provide more control flexibility to shape the frequency dynamics of microgrid and together with advanced communication infrastructure offer new opportunities in the future software-defined microgrids. To enhance the frequency stability of microgrids with high IBR penetration, this paper proposes an optimal scheduling framework for software-defined microgrids to maintain frequency stability by utilizing the non-essential load shedding and dynamical optimization of the virtual inertia and virtual damping from IBRs. Moreover, side effects of these services, namely, the time delay associated with non-essential load shedding and potential IBR control parameter update failure are explicitly modeled to avoid underestimations of frequency deviation and over-optimistic results. The effectiveness and significant economic value of the proposed simultaneous and dynamic virtual inertia and damping provision strategy are demonstrated based on case studies in the modified IEEE 33-bus system.
△ Less
Submitted 21 February, 2024; v1 submitted 29 December, 2022;
originally announced December 2022.
-
Design and Planning of Flexible Mobile Micro-Grids Using Deep Reinforcement Learning
Authors:
Cesare Caputo,
Michel-Alexandre Cardin,
Pudong Ge,
Fei Teng,
Anna Korre,
Ehecatl Antonio del Rio Chanona
Abstract:
Ongoing risks from climate change have impacted the livelihood of global nomadic communities, and are likely to lead to increased migratory movements in coming years. As a result, mobility considerations are becoming increasingly important in energy systems planning, particularly to achieve energy access in developing countries. Advanced Plug and Play control strategies have been recently develope…
▽ More
Ongoing risks from climate change have impacted the livelihood of global nomadic communities, and are likely to lead to increased migratory movements in coming years. As a result, mobility considerations are becoming increasingly important in energy systems planning, particularly to achieve energy access in developing countries. Advanced Plug and Play control strategies have been recently developed with such a decentralized framework in mind, more easily allowing for the interconnection of nomadic communities, both to each other and to the main grid. In light of the above, the design and planning strategy of a mobile multi-energy supply system for a nomadic community is investigated in this work. Motivated by the scale and dimensionality of the associated uncertainties, impacting all major design and decision variables over the 30-year planning horizon, Deep Reinforcement Learning (DRL) is implemented for the design and planning problem tackled. DRL based solutions are benchmarked against several rigid baseline design options to compare expected performance under uncertainty. The results on a case study for ger communities in Mongolia suggest that mobile nomadic energy systems can be both technically and economically feasible, particularly when considering flexibility, although the degree of spatial dispersion among households is an important limiting factor. Key economic, sustainability and resilience indicators such as Cost, Equivalent Emissions and Total Unmet Load are measured, suggesting potential improvements compared to available baselines of up to 25%, 67% and 76%, respectively. Finally, the decomposition of values of flexibility and plug and play operation is presented using a variation of real options theory, with important implications for both nomadic communities and policymakers focused on enabling their energy access.
△ Less
Submitted 8 December, 2022;
originally announced December 2022.
-
Cyber-physical interdependent restoration scheduling for active distribution network via ad hoc wireless communication
Authors:
Chongyu Wang,
Mingyu Yan,
Kaiyuan Pang,
Fushuan Wen,
Fei Teng
Abstract:
This paper proposes a post-disaster cyber-physical interdependent restoration scheduling (CPIRS) framework for active distribution networks (ADN) where the simultaneous damages on cyber and physical networks are considered. The ad hoc wireless device-to-device (D2D) communication is leveraged, for the first time, to establish cyber networks instantly after the disaster to support ADN restoration.…
▽ More
This paper proposes a post-disaster cyber-physical interdependent restoration scheduling (CPIRS) framework for active distribution networks (ADN) where the simultaneous damages on cyber and physical networks are considered. The ad hoc wireless device-to-device (D2D) communication is leveraged, for the first time, to establish cyber networks instantly after the disaster to support ADN restoration. The repair and operation crew dispatching, the remote-controlled network reconfiguration and the system operation with DERs can be effectively coordinated under the cyber-physical interactions. The uncertain outputs of renewable energy resources (RESs) are represented by budget-constrained polyhedral uncertainty sets. Through implementing linearization techniques on disjunctive expressions, a monolithic mixed-integer linear programming (MILP) based two-stage robust optimization model is formulated and subsequently solved by a customized column-and-constraint generation (C&CG) algorithm. Numerical results on the IEEE 123-node distribution system demonstrate the effectiveness and superiorities of the proposed CPIRS method for ADN.
△ Less
Submitted 5 November, 2022;
originally announced November 2022.
-
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization
Authors:
Jiangyi Deng,
Fei Teng,
Yanjiao Chen,
Xiaofu Chen,
Zhaohui Wang,
Wenyuan Xu
Abstract:
Voice data generated on instant messaging or social media applications contains unique user voiceprints that may be abused by malicious adversaries for identity inference or identity theft. Existing voice anonymization techniques, e.g., signal processing and voice conversion/synthesis, suffer from degradation of perceptual quality. In this paper, we develop a voice anonymization system, named V-Cl…
▽ More
Voice data generated on instant messaging or social media applications contains unique user voiceprints that may be abused by malicious adversaries for identity inference or identity theft. Existing voice anonymization techniques, e.g., signal processing and voice conversion/synthesis, suffer from degradation of perceptual quality. In this paper, we develop a voice anonymization system, named V-Cloak, which attains real-time voice anonymization while preserving the intelligibility, naturalness and timbre of the audio. Our designed anonymizer features a one-shot generative model that modulates the features of the original audio at different frequency levels. We train the anonymizer with a carefully-designed loss function. Apart from the anonymity loss, we further incorporate the intelligibility loss and the psychoacoustics-based naturalness loss. The anonymizer can realize untargeted and targeted anonymization to achieve the anonymity goals of unidentifiability and unlinkability.
We have conducted extensive experiments on four datasets, i.e., LibriSpeech (English), AISHELL (Chinese), CommonVoice (French) and CommonVoice (Italian), five Automatic Speaker Verification (ASV) systems (including two DNN-based, two statistical and one commercial ASV), and eleven Automatic Speech Recognition (ASR) systems (for different languages). Experiment results confirm that V-Cloak outperforms five baselines in terms of anonymity performance. We also demonstrate that V-Cloak trained only on the VoxCeleb1 dataset against ECAPA-TDNN ASV and DeepSpeech2 ASR has transferable anonymity against other ASVs and cross-language intelligibility for other ASRs. Furthermore, we verify the robustness of V-Cloak against various de-noising techniques and adaptive attacks. Hopefully, V-Cloak may provide a cloak for us in a prism world.
△ Less
Submitted 26 October, 2022;
originally announced October 2022.
-
Towards Joint Electricity and Data Trading: A Scalable Cooperative Game Theoretic Approach
Authors:
Mingyu Yan,
Fei Teng
Abstract:
This paper, for the first time, proposes a joint electricity and data trading mechanism based on cooperative game theory. All prosumers first submit the parameters associated with both electricity and data to the market operator. The operator utilizes the public and prosumers' private data to forecast the distributed renewable generators (DRGs) and quantify the improvement driven by prosumers' pri…
▽ More
This paper, for the first time, proposes a joint electricity and data trading mechanism based on cooperative game theory. All prosumers first submit the parameters associated with both electricity and data to the market operator. The operator utilizes the public and prosumers' private data to forecast the distributed renewable generators (DRGs) and quantify the improvement driven by prosumers' private data in terms of reduced uncertainty set. Then, the operator maximizes the grand coalition's total payoff considering the uncertain generation of DRGs and imputes the payoff to each prosumer based on their contribution to electricity and data sharing. The mathematical formulation of the grand coalition is developed and converted into a second order cone programming problem by using an affinepolicy based robust approach. The stability of such a grand coalition is mathematically proved, i.e., all prosumers are willing to cooperate. Furthermore, to address the scalability challenge of existing payoff imputation methods in the cooperative game, a two stage optimization based approach is proposed, which is converted into a mixed integer second order cone programming and solved by the Benders decomposition. Case studies illustrate all prosumers are motivated to trade electricity and data under the joint trading framework and the proposed imputation method significantly enhances the scalability.
△ Less
Submitted 8 October, 2022;
originally announced October 2022.
-
A Wireless-Assisted Hierarchical Framework to Accommodate Mobile Energy Resources
Authors:
Pudong Ge,
Cesare Caputo,
Michel-Alexandre Cardin,
Anna Korre,
Fei Teng
Abstract:
The societal decarbonisation fosters the installation of massive renewable inverter-based resources (IBRs) in replacing fossil fuel based traditional energy supply. The efficient and reliable operation of distributed IBRs requires advanced Information and Communication Technologies (ICT) , which may lead to a huge infrastructure investment and long construction time for remote communities. Therefo…
▽ More
The societal decarbonisation fosters the installation of massive renewable inverter-based resources (IBRs) in replacing fossil fuel based traditional energy supply. The efficient and reliable operation of distributed IBRs requires advanced Information and Communication Technologies (ICT) , which may lead to a huge infrastructure investment and long construction time for remote communities. Therefore, to efficiently coordinate IBRs, we propose a low-cost hierarchical structure, especially for remote communities without existing strong ICT connections, that combines the advantages of centralised and distributed frameworks via advanced wireless communication technologies. More specifically, in each region covered by a single cellular network, dispatchable resources are controlled via a regional aggregated controller, and the corresponding regional information flow is enabled by a device-to-device (D2D) communication assisted wireless network. The wireless network can fully reuse the bandwidth to improve data flow efficiency, leading to a flexible information structure that can accommodate the plug-and-play operation of mobile IBRs. Simulation results demonstrate that the proposed wireless communication scheme significantly improves the utilization of existing bandwidth, and the dynamically allocated wireless system ensures the flexible operation of mobile IBRs.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Localization of Coordinated Cyber-Physical Attacks in Power Grids Using Moving Target Defense and Deep Learning
Authors:
Yexiang Chen,
Subhash Lakshminarayana,
Fei Teng
Abstract:
As one of the most sophisticated attacks against power grids, coordinated cyber-physical attacks (CCPAs) damage the power grid's physical infrastructure and use a simultaneous cyber attack to mask its effect. This work proposes a novel approach to detect such attacks and identify the location of the line outages (due to the physical attack). The proposed approach consists of three parts. Firstly,…
▽ More
As one of the most sophisticated attacks against power grids, coordinated cyber-physical attacks (CCPAs) damage the power grid's physical infrastructure and use a simultaneous cyber attack to mask its effect. This work proposes a novel approach to detect such attacks and identify the location of the line outages (due to the physical attack). The proposed approach consists of three parts. Firstly, moving target defense (MTD) is applied to expose the physical attack by actively perturbing transmission line reactance via distributed flexible AC transmission system (D-FACTS) devices. MTD invalidates the attackers' knowledge required to mask their physical attack. Secondly, convolution neural networks (CNNs) are applied to localize line outage position from the compromised measurements. Finally, model agnostic meta-learning (MAML) is used to accelerate the training speed of CNN following the topology reconfigurations (due to MTD) and reduce the data/retraining time requirements. Simulations are carried out using IEEE test systems. The experimental results demonstrate that the proposed approach can effectively localize line outages in stealthy CCPAs.
△ Less
Submitted 25 July, 2022;
originally announced July 2022.
-
Mitigating Load-Altering Attacks Against Power Grids Using Cyber-Resilient Economic Dispatch
Authors:
Zhongda Chu,
Subhash Lakshminarayana,
Balarko Chaudhuri,
Fei Teng
Abstract:
Large-scale Load-Altering Attacks (LAAs) against Internet-of-Things (IoT) enabled high-wattage electrical appliances (e.g., wifi-enabled air-conditioners, electric vehicles, etc.) pose a serious threat to power systems' security and stability. In this work, a Cyber-Resilient Economic Dispatch (CRED) framework is presented to mitigate the destabilizing effect of LAAs while minimizing the overall op…
▽ More
Large-scale Load-Altering Attacks (LAAs) against Internet-of-Things (IoT) enabled high-wattage electrical appliances (e.g., wifi-enabled air-conditioners, electric vehicles, etc.) pose a serious threat to power systems' security and stability. In this work, a Cyber-Resilient Economic Dispatch (CRED) framework is presented to mitigate the destabilizing effect of LAAs while minimizing the overall operational cost by dynamically optimizing the frequency droop control gains of Inverter-Based Resources (IBRs). The system frequency dynamics incorporating both LAAs and the IBR droop control are modeled. The system stability constraints are explicitly derived based on parametric sensitivities. To incorporate them into the CRED model and minimize the error of the sensitivity analysis, a recursive linearization method is further proposed. A distributionally robust approach is applied to account for the uncertainty associated with the LAA detection/parameter estimation. The overall performance of the proposed CRED model is demonstrated through simulations in a modified IEEE reliability test system.
△ Less
Submitted 27 June, 2022;
originally announced June 2022.
-
Blending Data and Physics Against False Data Injection Attack: An Event-Triggered Moving Target Defence Approach
Authors:
Wangkun Xu,
Martin Higgins,
Jianhong Wang,
Imad M. Jaimoukha,
Fei Teng
Abstract:
Fast and accurate detection of cyberattacks is a key element for a cyber-resilient power system. Recently, data-driven detectors and physics-based Moving Target Defences (MTD) have been proposed to detect false data injection (FDI) attacks on state estimation. However, the uncontrollable false positive rate of the data-driven detector and the extra cost of frequent MTD usage limit their wide appli…
▽ More
Fast and accurate detection of cyberattacks is a key element for a cyber-resilient power system. Recently, data-driven detectors and physics-based Moving Target Defences (MTD) have been proposed to detect false data injection (FDI) attacks on state estimation. However, the uncontrollable false positive rate of the data-driven detector and the extra cost of frequent MTD usage limit their wide applications. Few works have explored the overlap between these two areas. To fill this gap, this paper proposes blending data-driven and physics-based approaches to enhance the detection performance. To start, a physics-informed data-driven attack detection and identification algorithm is proposed. Then, an MTD protocol is triggered by the positive alarm from the data-driven detector. The MTD is formulated as a bilevel optimisation to robustly guarantee its effectiveness against the worst-case attack around the identified attack vector. Meanwhile, MTD hiddenness is also improved so that the defence cannot be detected by the attacker. To guarantee feasibility and convergence, the convex two-stage reformulation is derived through duality and linear matrix inequality. The simulation results verify that blending data and physics can achieve extremely high detection rate while simultaneously reducing the false positive rate of the data-driven detector and the extra cost of MTD. All codes are available at https://github.com/xuwkk/DDET-MTD.
△ Less
Submitted 21 December, 2022; v1 submitted 27 April, 2022;
originally announced April 2022.
-
Mitigation of Cyberattacks through Battery Storage for Stable Microgrid Operation
Authors:
Ioannis Zografopoulos,
Panagiotis Karamichailidis,
Andreas T. Procopiou,
Fei Teng,
George C. Konstantopoulos,
Charalambos Konstantinou
Abstract:
In this paper, we present a mitigation methodology that leverages battery energy storage system (BESS) resources in coordination with microgrid (MG) ancillary services to maintain power system operations during cyberattacks. The control of MG agents is achieved in a distributed fashion, and once a misbehaving agent is detected, the MG's mode supervisory controller (MSC) isolates the compromised ag…
▽ More
In this paper, we present a mitigation methodology that leverages battery energy storage system (BESS) resources in coordination with microgrid (MG) ancillary services to maintain power system operations during cyberattacks. The control of MG agents is achieved in a distributed fashion, and once a misbehaving agent is detected, the MG's mode supervisory controller (MSC) isolates the compromised agent and initiates self-healing procedures to support the power demand and restore the compromised agent. Our results demonstrate the practicality of the proposed attack mitigation strategy and how grid resilience can be improved using BESS synergies. Simulations are performed on a modified version of the Canadian urban benchmark distribution model.
△ Less
Submitted 8 September, 2022; v1 submitted 25 April, 2022;
originally announced April 2022.
-
Cyber-Physical Risk Assessment for False Data Injection Attacks Considering Moving Target Defences
Authors:
Martin Higgins,
Wangkun Xu,
Fei Teng,
Thomas Parisini
Abstract:
In this paper, we examine the factors that influence the success of false data injection (FDI) attacks in the context of both cyber and physical styles of reinforcement. Many works consider the FDI attack in the context of the ability to change a measurement in a static system only. However, successful attacks will require first intrusion into a system followed by construction of an attack vector…
▽ More
In this paper, we examine the factors that influence the success of false data injection (FDI) attacks in the context of both cyber and physical styles of reinforcement. Many works consider the FDI attack in the context of the ability to change a measurement in a static system only. However, successful attacks will require first intrusion into a system followed by construction of an attack vector that can bypass bad data detection (BDD). In this way, we develop a full service framework for FDI risk assessment. The framework considers both the costs of system intrusion via a weighted graph assessment in combination with a physical, line overload-based vulnerability assessment. We present our simulations on a IEEE 14-bus system with an overlain RTU network to model the true risk of intrusion. The cyber model considers multiple methods of entry for the FDI attack including meter intrusion, RTU intrusion and combined style attacks. Post-intrusion our physical reinforcement model analyses the required level of topology divergence to protect against a branch overload from an optimised attack vector.
△ Less
Submitted 20 September, 2022; v1 submitted 22 February, 2022;
originally announced February 2022.
-
Frequency Response from Aggregated V2G Chargers With Uncertain EV Connections
Authors:
Cormac O'Malley,
Luis Badesa,
Fei Teng,
Goran Strbac
Abstract:
Fast frequency response (FR) is highly effective at securing frequency dynamics after a generator outage in low inertia systems. Electric vehicles (EVs) equipped with vehicle to grid (V2G) chargers could offer an abundant source of FR in future. However, the uncertainty associated with V2G aggregation, driven by the uncertain number of connected EVs at the time of an outage, has not been fully und…
▽ More
Fast frequency response (FR) is highly effective at securing frequency dynamics after a generator outage in low inertia systems. Electric vehicles (EVs) equipped with vehicle to grid (V2G) chargers could offer an abundant source of FR in future. However, the uncertainty associated with V2G aggregation, driven by the uncertain number of connected EVs at the time of an outage, has not been fully understood and prevents its participation in the existing service provision framework. To tackle this limitation, this paper, for the first time, incorporates such uncertainty into system frequency dynamics, from which probabilistic nadir and steady state frequency requirements are enforced via a derived momeent-based distributionally-robust chance constraint. Field data from over 25,000 chargers is analysed to provide realistic parameters and connection forecasts to examine the value of FR from V2G chargers in annual operation of the the GB 2030 system. The case study demonstrates that uncertainty of EV connections can be effectively managed through the proposed scheduling framework, which results in annual savings of £6,300 or 37.4 tCO2 per charger. The sensitivity of this value to renewable capacity and FR delays is explored, with V2G capacity shown to be a third as valuable as the same grid battery capacity.
△ Less
Submitted 26 August, 2022; v1 submitted 16 February, 2022;
originally announced February 2022.
-
Using 5G in Smart Cities: A Systematic Mapping Study
Authors:
Chen Yang,
Peng Liang,
Liming Fu,
Guorui Cui,
Fei Huang,
Feng Teng,
Yawar Abbas Bangash
Abstract:
5G is the fifth generation wireless network, with a set of characteristics, e.g., high bandwidth and data rates. The scenarios of using 5G include enhanced Mobile Broadband (eMBB), massive Machine Type Communications (mMTC), and ultra-Reliable and Low-Latency Communications (uRLLC). 5G is expected to support a wide variety of applications. We conducted a systematic mapping study that covers the li…
▽ More
5G is the fifth generation wireless network, with a set of characteristics, e.g., high bandwidth and data rates. The scenarios of using 5G include enhanced Mobile Broadband (eMBB), massive Machine Type Communications (mMTC), and ultra-Reliable and Low-Latency Communications (uRLLC). 5G is expected to support a wide variety of applications. We conducted a systematic mapping study that covers the literature published between Jan 2012 and Dec 2019 regarding using 5G in smart cities. The scenarios, architecture, technologies, challenges, and lessons learned of using 5G in smart cities are summarized and further analyzed based on 32 selected studies, and the results are that: (1) The studies are distributed over 27 publication venues. 17 studies report results based on academic studies and 13 studies use demonstration or toy examples. Only 2 studies report using 5G in smart cities based on industrial studies. 16 studies include assumptions of 5G network design or smart city scenarios. (2) The most discussed smart city scenario is transportation, followed by public safety, healthcare, city tourism, entertainment, and education. (3) 28 studies propose and/or discuss the architecture of 5G-enabled smart cities, containing smart city architecture (treating 5G as a component), 5G network architecture in smart cities, and business architecture of using 5G in smart cities. (4) The most mentioned 5G-related technologies are radio access technologies, network slicing, and edge computing. (5) Challenges are mainly about complex context, challenging requirements, and network development of using 5G in smart cities. (6) Most of the lessons learned identified are benefits regarding 5G itself or the proposed 5G-related methods in smart cities. This work provides a reflection of the past eight years of the state of the art on using 5G in smart cities, which can benefit both researchers and practitioners.
△ Less
Submitted 15 February, 2022; v1 submitted 9 February, 2022;
originally announced February 2022.
-
Value of Fleet Vehicle Grid in Providing Transmission System Operator Services
Authors:
Cormac O'Malley,
Marko Aunedi,
Fei Teng,
Goran Strbac
Abstract:
In this paper a new aggregated model for electric vehicle (EV) fleets is presented that considers their daily and weekly usage patterns. A frequency-constrained stochastic unit commitment model is employed to optimally schedule EV charging and discharging as well as the provision of frequency response (FR) in an electricity system, while respecting the vehicles' energy requirements and driving sch…
▽ More
In this paper a new aggregated model for electric vehicle (EV) fleets is presented that considers their daily and weekly usage patterns. A frequency-constrained stochastic unit commitment model is employed to optimally schedule EV charging and discharging as well as the provision of frequency response (FR) in an electricity system, while respecting the vehicles' energy requirements and driving schedules. Through case studies we demonstrate that an EV with vehicle to grid (V2G) capability can reduce system costs in a future GB electricity grid by up to £12,000 per year, and reduce CO2 emissions by 60 tonnes per year, mainly due to reduced curtailment of wind power. The paper also quantifies the changes in the benefits of fleet V2G resulting from variations in FR delivery time, the penetration of wind or uptake of alternative flexibility providers. Finally , a battery degradation model dependent on an EV's state of charge is proposed and implemented in the stochastic scheduling problem. It enables significant degradation cost reductions of 16% with only a 0.4% reduction of an EV's system value.
△ Less
Submitted 14 January, 2022;
originally announced January 2022.
-
Voltage Stability Constrained Unit Commitment in High IBG-Penetrated Power Systems
Authors:
Zhongda Chu,
Fei Teng
Abstract:
With the increasing penetration of renewable energy sources, power system operation has to be adapted to ensure the system stability and security while considering the distinguished feature of the Power Electronics (PE) interfaced generators. The static voltage stability which is mainly compromised by heavy loading conditions in conventional power systems, faces new challenges due to the large sca…
▽ More
With the increasing penetration of renewable energy sources, power system operation has to be adapted to ensure the system stability and security while considering the distinguished feature of the Power Electronics (PE) interfaced generators. The static voltage stability which is mainly compromised by heavy loading conditions in conventional power systems, faces new challenges due to the large scale integration of PE-interfaced devices. This paper investigates the static voltage stability problem in high PE-penetrated system. The analytic criterion that ensures the voltage stability at the Inverter-Based Generator (IBG) buses are derived with the interaction of different IBGs being considered. Based on this, an optimal system scheduling model is proposed to minimize the overall system operation cost while maintaining the voltage stability during normal operation through dynamically optimizing the active and reactive power output from IBGs. The highly nonlinear voltage stability constraints are effectively converted into Second-Order-Cone (SOC) form, leading to an overall Mixed-Integer SOC Programming (MISOCP), together with the SOC reformulation of AC power flow and frequency constraints. The effectiveness of the proposed model and the impact of various factors on voltage stability are demonstrated in thorough case studies.
△ Less
Submitted 5 December, 2021;
originally announced December 2021.
-
Robust Moving Target Defence Against False Data Injection Attacks in Power Grids
Authors:
Wangkun Xu,
Imad M. Jaimoukha,
Fei Teng
Abstract:
Recently, moving target defence (MTD) has been proposed to thwart false data injection (FDI) attacks in power system state estimation by proactively triggering the distributed flexible AC transmission system (D-FACTS) devices. One of the key challenges for MTD in power grid is to design its real-time implementation with performance guarantees against unknown attacks. Converting from the noiseless…
▽ More
Recently, moving target defence (MTD) has been proposed to thwart false data injection (FDI) attacks in power system state estimation by proactively triggering the distributed flexible AC transmission system (D-FACTS) devices. One of the key challenges for MTD in power grid is to design its real-time implementation with performance guarantees against unknown attacks. Converting from the noiseless assumptions in the literature, this paper investigates the MTD design problem in a noisy environment and proposes, for the first time, the concept of robust MTD to guarantee the worst-case detection rate against all unknown attacks. We theoretically prove that, for any given MTD strategy, the minimal principal angle between the Jacobian subspaces corresponds to the worst-case performance against all potential attacks. Based on this finding, robust MTD algorithms are formulated for the systems with both complete and incomplete configurations. Extensive simulations using standard IEEE benchmark systems demonstrate the improved average and worst-case performances of the proposed robust MTD against state-of-the-art algorithms. All codes are available at https://github.com/xuwkk/Robust_MTD.
△ Less
Submitted 21 December, 2022; v1 submitted 11 November, 2021;
originally announced November 2021.
-
Fixed-Time Convergent Distributed Observer Design of Linear Systems: A Kernel-Based Approach
Authors:
Pudong Ge,
Peng Li,
Boli Chen,
Fei Teng
Abstract:
The robust distributed state estimation for a class of continuous-time linear time-invariant systems is achieved by a novel kernel-based distributed observer, which, for the first time, ensures fixed-time convergence properties. The communication network between the agents is prescribed by a directed graph in which each node involves a fixed-time convergent estimator. The local observer estimates…
▽ More
The robust distributed state estimation for a class of continuous-time linear time-invariant systems is achieved by a novel kernel-based distributed observer, which, for the first time, ensures fixed-time convergence properties. The communication network between the agents is prescribed by a directed graph in which each node involves a fixed-time convergent estimator. The local observer estimates and broadcasts the observable states among neighbours so that the full state vector can be recovered at each node and the estimation error reaches zero after a predefined fixed time in the absence of perturbation. This represents a new distributed estimation framework that enables faster convergence speed and further reduced information exchange compared to a conventional Luenberger-like approach. The ubiquitous time-varying communication delay across the network is suitably compensated by a prediction scheme. Moreover, the robustness of the algorithm in the presence of bounded measurement and process noise is characterised. Numerical simulations and comparisons demonstrate the effectiveness of the observer and its advantages over the existing methods.
△ Less
Submitted 19 September, 2022; v1 submitted 23 October, 2021;
originally announced October 2021.
-
A Resilience-Oriented Centralised-to-Decentralised Framework for Networked Microgrids Management
Authors:
Pudong Ge,
Fei Teng,
Charalambos Konstantinou,
Shiyan Hu
Abstract:
This paper proposes a cyber-physical cooperative mitigation framework to enhance power systems resilience under extreme events, e.g., earthquakes and hurricanes. Extreme events can simultaneously damage the physical-layer electric power infrastructure and the cyber-layer communication facilities. Microgrid (MG) has been widely recognised as an effective physical-layer response to such events, howe…
▽ More
This paper proposes a cyber-physical cooperative mitigation framework to enhance power systems resilience under extreme events, e.g., earthquakes and hurricanes. Extreme events can simultaneously damage the physical-layer electric power infrastructure and the cyber-layer communication facilities. Microgrid (MG) has been widely recognised as an effective physical-layer response to such events, however, the mitigation strategy in the cyber lay is yet to be fully investigated. Therefore, this paper proposes a resilience-oriented centralised-to-decentralised framework to maintain the power supply of critical loads such as hospitals, data centers, etc., under extreme events. For the resilient control, controller-to-controller (C2C) wireless network is utilised to form the emergency regional communication when centralised base station being compromised. Owing to the limited reliable bandwidth that reserved as a backup, the inevitable delays are dynamically minimised and used to guide the design of a discrete-time distributed control algorithm to maintain post-event power supply. The effectiveness of the cooperative cyber-physical mitigation framework is demonstrated through extensive simulations in MATLAB/Simulink.
△ Less
Submitted 19 November, 2021; v1 submitted 1 September, 2021;
originally announced September 2021.
-
Frequency-Constrained Resilient Scheduling of Microgrid: A Distributionally Robust Approach
Authors:
Zhongda Chu,
Ning Zhang,
Fei Teng
Abstract:
In order to prevent the potential frequency instability due to the high Power Electronics (PE) penetration under an unintentional islanding event, this paper presents a novel microgrid scheduling model which explicitly models the system frequency dynamics as well as the long/short term uncertainty associated with renewable energy resources and load. Synthetic Inertia (SI) control is applied to reg…
▽ More
In order to prevent the potential frequency instability due to the high Power Electronics (PE) penetration under an unintentional islanding event, this paper presents a novel microgrid scheduling model which explicitly models the system frequency dynamics as well as the long/short term uncertainty associated with renewable energy resources and load. Synthetic Inertia (SI) control is applied to regulating the active power output of the Inverter-Based Generators (IBGs) to support the post-islanding frequency evaluation. The uncertainty associated with the noncritical load shedding is explicitly modeled based on the distributionally robust formulation to ensure resilient operation during islanding events. The resulted frequency constraints are derived analytically and reformulated into Second-Order Cone (SOC) form, which are further incorporated into the microgrid scheduling model, enabling optimal SI provision of Renewable Energy Sources (RESs) from the micorgrid perspective. With the SOC relaxation of the AC power flow constraints, the overall problem is constructed as a mixed-integer SOC Programming (MISOCP). The effectiveness of the proposed model is demonstrated based on modified IEEE 14-bus system.
△ Less
Submitted 30 June, 2021;
originally announced June 2021.
-
Market Value of Differentially-Private Smart Meter Data
Authors:
Saurab Chhachhi,
Fei Teng
Abstract:
This paper proposes a framework to investigate the value of sharing privacy-protected smart meter data between domestic consumers and load serving entities. The framework consists of a discounted differential privacy model to ensure individuals cannot be identified from aggregated data, a ANN-based short-term load forecasting to quantify the impact of data availability and privacy protection on th…
▽ More
This paper proposes a framework to investigate the value of sharing privacy-protected smart meter data between domestic consumers and load serving entities. The framework consists of a discounted differential privacy model to ensure individuals cannot be identified from aggregated data, a ANN-based short-term load forecasting to quantify the impact of data availability and privacy protection on the forecasting error and an optimal procurement problem in day-ahead and balancing markets to assess the market value of the privacy-utility trade-off. The framework demonstrates that when the load profile of a consumer group differs from the system average, which is quantified using the Kullback-Leibler divergence, there is significant value in sharing smart meter data while retaining individual consumer privacy.
△ Less
Submitted 20 April, 2021;
originally announced April 2021.
-
Cyber-Resilient Self-Triggered Distributed Control of Networked Microgrids Against Multi-Layer DoS Attacks
Authors:
Pudong Ge,
Boli Chen,
Fei Teng
Abstract:
Networked microgrids with high penetration of distributed generators have ubiquitous remote information exchange, which may be exposed to various cyber security threats. This paper, for the first time, addresses a consensus problem in terms of frequency synchronisation in networked microgrids subject to multi-layer denial of service (DoS) attacks, which could simultaneously affect communication, m…
▽ More
Networked microgrids with high penetration of distributed generators have ubiquitous remote information exchange, which may be exposed to various cyber security threats. This paper, for the first time, addresses a consensus problem in terms of frequency synchronisation in networked microgrids subject to multi-layer denial of service (DoS) attacks, which could simultaneously affect communication, measurement and control actuation channels. A unified notion of Persistency-of-Data-Flow (PoDF) is proposed to characterise the data unavailability in different information network links, and further quantifies the multi-layer DoS effects on the hierarchical system. With PoDF, we provide a sufficient condition of the DoS attacks under which the consensus can be preserved with the proposed edge-based self-triggered distributed control framework. In addition, to mitigate the conservativeness of offline design against the worst-case attack across all agents, an online self-adaptive scheme of the control parameters is developed to fully utilise the latest available information of all data transmission channels. Finally, the effectiveness of the proposed cyber-resilient self-triggered distributed control is verified by representative case studies.
△ Less
Submitted 11 December, 2022; v1 submitted 19 April, 2021;
originally announced April 2021.
-
Probabilistic Scheduling of UFLS to Secure Credible Contingencies in Low Inertia Systems
Authors:
Cormac O'Malley,
Luis Badesa,
Fei Teng,
Goran Strbac
Abstract:
The reduced inertia levels in low-carbon power grids necessitate explicit constraints to limit frequency's nadir and rate of change during scheduling. This can result in significant curtailment of renewable energy due to the minimum generation of thermal plants that are needed to provide frequency response (FR) and inertia. Additional consideration of fast FR, a dynamically reduced largest loss an…
▽ More
The reduced inertia levels in low-carbon power grids necessitate explicit constraints to limit frequency's nadir and rate of change during scheduling. This can result in significant curtailment of renewable energy due to the minimum generation of thermal plants that are needed to provide frequency response (FR) and inertia. Additional consideration of fast FR, a dynamically reduced largest loss and under frequency load shedding (UFLS) allows frequency security to be achieved more cost effectively. This paper derives a novel nadir constraint from the swing equation that, for the first time, provides a framework for the optimal comparison of all these services. We demonstrate that this constraint can be accurately and conservatively approximated for moderate UFLS levels with a second order cone, resulting in highly tractable convex problems. Case studies performed on a Great Britain 2030 system demonstrate that UFLS as an option to contain single plant outages can reduce annual operational costs by up to £559m, 52% of frequency security costs. The sensitivity of this value to wind penetration, abundance of alternative frequency services, UFLS amount and cost is explored.
△ Less
Submitted 17 November, 2021; v1 submitted 11 March, 2021;
originally announced March 2021.
-
Topology Learning Aided False Data Injection Attack without Prior Topology Information
Authors:
Martin Higgins,
Jiawei Zhang,
Ning Zhang,
Fei Teng
Abstract:
False Data Injection (FDI) attacks against powersystem state estimation are a growing concern for operators.Previously, most works on FDI attacks have been performedunder the assumption of the attacker having full knowledge ofthe underlying system without clear justification. In this paper, wedevelop a topology-learning-aided FDI attack that allows stealthycyber-attacks against AC power system sta…
▽ More
False Data Injection (FDI) attacks against powersystem state estimation are a growing concern for operators.Previously, most works on FDI attacks have been performedunder the assumption of the attacker having full knowledge ofthe underlying system without clear justification. In this paper, wedevelop a topology-learning-aided FDI attack that allows stealthycyber-attacks against AC power system state estimation withoutprior knowledge of system information. The attack combinestopology learning technique, based only on branch and bus powerflows, and attacker-side pseudo-residual assessment to performstealthy FDI attacks with high confidence. This paper, for thefirst time, demonstrates how quickly the attacker can developfull-knowledge of the grid topology and parameters and validatesthe full knowledge assumptions in the previous work.
△ Less
Submitted 24 February, 2021;
originally announced February 2021.
-
Short Circuit Current Constrained UC in High IBG-Penetrated Power Systems
Authors:
Zhongda Chu,
Fei Teng
Abstract:
Inverter Based Generators (IBGs) have been increasing significantly in power systems. Due to the demanding thermal rating of Power Electronics (PE), their contribution to the system Short Circuit Current (SCC) is much less than that from the conventional Synchronous Generators (SGs) thus reducing the system strength and posing challenges to system protection and stability. This paper proposes a Un…
▽ More
Inverter Based Generators (IBGs) have been increasing significantly in power systems. Due to the demanding thermal rating of Power Electronics (PE), their contribution to the system Short Circuit Current (SCC) is much less than that from the conventional Synchronous Generators (SGs) thus reducing the system strength and posing challenges to system protection and stability. This paper proposes a Unit Commitment (UC) model with SCC constraint in high IBG-penetrated systems to ensure minimum operation cost while maintaining the SCC level at each bus in the system. The SCC from synchronous generators as well as the IBGs are explicitly modeled in the formulation leading to an SCC constraint involving decision-dependent matrix inverse. This highly nonlinear constraint is further reformulated into linear form conservatively. The influence of the SCC constraint on the system operation and its interaction with the frequency regulation are demonstrated through simulations on IEEE 30- and 118-bus systems.
△ Less
Submitted 13 January, 2021;
originally announced January 2021.
-
Towards Optimal Coordination between Regional Groups: HVDC Supplementary Power Control
Authors:
Andrea Tosatto,
Georgios Misyris,
Adrià Junyent-Ferré,
Fei Teng,
Spyros Chatzivasileiadis
Abstract:
With Europe dedicated to limiting climate change and greenhouse gas emissions, large shares of Renewable Energy Sources (RES) are being integrated in the national grids, phasing out conventional generation. The new challenges arising from the energy transition will require a better coordination between neighboring system operators to maintain system security. To this end, this paper studies the be…
▽ More
With Europe dedicated to limiting climate change and greenhouse gas emissions, large shares of Renewable Energy Sources (RES) are being integrated in the national grids, phasing out conventional generation. The new challenges arising from the energy transition will require a better coordination between neighboring system operators to maintain system security. To this end, this paper studies the benefit of exchanging primary frequency reserves between asynchronous areas using the Supplementary Power Control (SPC) functionality of High-Voltage Direct-Current (HVDC) lines. First, we focus on the derivation of frequency metrics for asynchronous AC systems coupled by HVDC interconnectors. We compare two different control schemes for HVDC converters, which allow for unilateral or bilateral exchanges of reserves between neighboring systems. Second, we formulate frequency constraints and include them in a unit commitment problem to ensure the N-1 security criterion. A data-driven approach is proposed to better represent the frequency nadir constraint by means of cutting hyperplanes. Our results suggest that the exchange of primary reserves through HVDC can reduce up to 10% the cost of reserve procurement while maintaining the system N-1 secure.
△ Less
Submitted 13 April, 2021; v1 submitted 25 November, 2020;
originally announced November 2020.
-
A Deep Learning based Detection Method for Combined Integrity-Availability Cyber Attacks in Power System
Authors:
Wangkun Xu,
Fei Teng
Abstract:
As one of the largest and most complex systems on earth, power grid (PG) operation and control have stepped forward as a compound analysis on both physical and cyber layers which makes it vulnerable to assaults from economic and security considerations. A new type of attack, namely as combined data Integrity-Availability attack, has been recently proposed, where the attackers can simultaneously ma…
▽ More
As one of the largest and most complex systems on earth, power grid (PG) operation and control have stepped forward as a compound analysis on both physical and cyber layers which makes it vulnerable to assaults from economic and security considerations. A new type of attack, namely as combined data Integrity-Availability attack, has been recently proposed, where the attackers can simultaneously manipulate and blind some measurements on SCADA system to mislead the control operation and keep stealthy. Compared with traditional FDIAs, this combined attack can further complicate and vitiate the model-based detection mechanism. To detect such attack, this paper proposes a novel random denoising LSTM-AE (LSTMRDAE) framework, where the spatial-temporal correlations of measurements can be explicitly captured and the unavailable data is countered by the random dropout layer. The proposed algorithm is evaluated and the performance is verified on a standard IEEE 118-bus system under various unseen attack attempts.
△ Less
Submitted 30 May, 2022; v1 submitted 3 November, 2020;
originally announced November 2020.
-
Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence
Authors:
Martin Higgins,
Keith Mayes,
Fei Teng
Abstract:
This paper outlines a cyber-physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks. We demonstrate that it is feasible to use small, low-cost, yet highly attack-resistant security chips as measurement nodes, enhanced with an event-triggered moving target defence (MTD), to offer effective cyber-physical security. At the cyber layer, the pr…
▽ More
This paper outlines a cyber-physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks. We demonstrate that it is feasible to use small, low-cost, yet highly attack-resistant security chips as measurement nodes, enhanced with an event-triggered moving target defence (MTD), to offer effective cyber-physical security. At the cyber layer, the proposed solution is based on the MULTOS Trust-Anchor chip, using an authenticated encryption protocol, offering cryptographically protected and chained reports at up to 12/s. The availability of the trust-anchors, allows the grid controller to delegate aspects of passive anomaly detection, supporting local as well as central alarms. In this context, a distributed event-triggered MTD protocol is implemented at the physical layer to complement cyber side enhancement. This protocol applies a distributed anomaly detection scheme based on Holt-Winters seasonal forecasting in combination with MTD implemented via inductance perturbation. The scheme is shown to be effective at preventing or detecting a wide range of attacks against power system measurement system.
△ Less
Submitted 30 October, 2020; v1 submitted 27 October, 2020;
originally announced October 2020.
-
Conditions for Regional Frequency Stability in Power System Scheduling -- Part II: Application to Unit Commitment
Authors:
Luis Badesa,
Fei Teng,
Goran Strbac
Abstract:
In Part I of this paper we have introduced the closed-form conditions for guaranteeing regional frequency stability in a power system. Here we propose a methodology to represent these conditions in the form of linear constraints and demonstrate their applicability by implementing them in a generation-scheduling model. This model simultaneously optimises energy production and ancillary services for…
▽ More
In Part I of this paper we have introduced the closed-form conditions for guaranteeing regional frequency stability in a power system. Here we propose a methodology to represent these conditions in the form of linear constraints and demonstrate their applicability by implementing them in a generation-scheduling model. This model simultaneously optimises energy production and ancillary services for maintaining frequency stability in the event of a generation outage, by solving a frequency-secured Stochastic Unit Commitment (SUC). We consider the Great Britain system, characterised by two regions that create a non-uniform distribution of inertia: England in the South, where most of the load is located, and Scotland in the North, containing significant wind resources. Through several case studies, it is shown that inertia and frequency response cannot be considered as system-wide magnitudes in power systems that exhibit inter-area oscillations in frequency, as their location in a particular region is key to guarantee stability. In addition, securing against a medium-sized loss in the low-inertia region proves to cause significant wind curtailment, which could be alleviated through reinforced transmission corridors. In this context, the proposed constraints allow to find the optimal volume of ancillary services to be procured in each region.
△ Less
Submitted 11 April, 2021; v1 submitted 28 September, 2020;
originally announced September 2020.