Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Open access

Applying Trust for Operational States of ICT-Enabled Power Grid Services

Published: 22 October 2024 Publication History

Abstract

Digitalization enables the automation required to operate modern cyber-physical energy systems (CPESs), leading to a shift from hierarchical to organic systems. However, digitalization increases the number of factors affecting the state of a CPES (e.g., software bugs and cyber threats). In addition to established factors like functional correctness, others like security become relevant but are yet to be integrated into an operational viewpoint, i.e., a holistic perspective on the system state. Trust in organic computing is an approach to gain a holistic view of the state of systems. It consists of several facets (e.g., functional correctness, security, and reliability), which can be used to assess the state of CPES. Therefore, a trust assessment on all levels can contribute to a coherent state assessment. This article focuses on the trust in ICT-enabled grid services in a CPES. These are essential for operating the CPES, and their performance relies on various data aspects like availability, timeliness, and correctness. This article proposes to assess the trust in involved components and data to estimate data correctness, which is crucial for grid services. The assessment is presented considering two exemplary grid services, namely state estimation and coordinated voltage control. Furthermore, the interpretation of different trust facets is also discussed.

1 Introduction

1.1 Motivation

Modern power systems have increased uncertainties due to the penetration of distributed energy resources. The safe and reliable operation of such systems requires improved observability and controllability. This is achieved by the deep interconnection with information and communication technology (ICT) systems, giving rise to cyber-physical energy systems (CPESs) [48]. A promising approach for operating such complex systems with system-wide ICT, a large number of actors, and a high degree of automation is to shift from a hierarchical system, operated mainly in a centralized manner by humans, to a distributed one, mainly operated autonomously but with several actors interacting with each other as well as with humans. Consequentially, such CPESs can be regarded as organic computing systems [27, 34] as they continuously and dynamically adapt to exogenous and endogenous changes on various time scales—from significant changes in generation technologies driven by external regulatory and political factors to unforeseen demand fluctuations due to stochastic human behavior. To cope with these dynamics, the system is characterized by self-* properties, e.g., self-organization of battery storage swarms [41], self-configuration of SCADA and protection systems [43], self-explanation, and context awareness [5].
Owing to the geographical size and many actors, CPESs are among the biggest and most complex human-made organic computing systems. However, the ICT penetration has further increased the overall system complexity, leading to new risks such as software failures, malfunctions, and cyberattacks [42]. This, in turn, increases the number of factors affecting the state and health of a CPES. In addition to established factors like functional correctness and safety, other factors like security, credibility, and usability must be considered. Although these aspects may already be considered in certain subsystems (e.g., safety for power lines and security for communication networks), they are yet to be integrated and used to operate the whole CPES, i.e., a holistic state and health of CPESs considering the individual subsystems.
Following the idea of the transition of CPESs towards organic computing systems, trust from the domain of organic computing (OC) (OC-Trust) [40], used for assessing trust between autonomous actors and technical subsystems, is a promising approach for a holistic state and health assessment. Here, trust is defined as a context-dependent and multifaceted sense of a technical entity with respect to its functional correctness, safety, security, reliability, credibility, and usability. All of these facets can be directly mapped onto the state and health of complex CPESs. The assessment of trust on all levels of a CPES can contribute to a coherent state and health assessment, which may then be interpreted by technical subsystems or used by operators in their decision-making.
Assessing the trust of CPESs implies assessing the trust of its constituting (autonomous) subsystems, components, and services, which is challenging as they face a broad and diverse threat landscape [42]. In addition to disturbances in power systems, disturbances in ICT systems can also impact the interconnected power system via the grid services. The 2003 North American blackout resulted from a software bug in the state estimation service, which gave incorrect situational awareness to the system operators, thereby hiding certain power line failures [33]. The 2015 and 2017 Ukraine blackouts were caused by hackers taking over control rooms and shutting down vital grid services [47]. This illustrates the vulnerability of CPESs to cyberattacks. Other examples of ICT disturbances include sensor failures affecting observability, controller failures affecting controllability, and communication network failures affecting data transfer, causing data to be either delayed or lost [30]. It is evident that ICT disturbances impact the performance of grid services, which in turn impacts the operation of the power system. Therefore, these ICT-enabled grid services can be regarded as entities, for which trust aspects like functional correctness, security, reliability, and credibility must be assessed.
The operational state classification solely based on electrotechnical parameters (e.g., voltage, frequency, currents) is the prominent state-of-the-art among power system operators to assess the current state (or performance) of a power system [12, 15]. The operation of a power system can be classified into one of five different states: normal, alert, emergency, blackout, and restorative. Disturbances in the system can cause the state to degrade, and suitable grid services (referred to as remedial actions) can be triggered to improve the state again. However, as already mentioned, certain disturbances can also impact the grid services, causing them (in the worst case) to fail [30]. To address this, the authors of References [17, 20] propose an operational state classification for each ICT-enabled grid service. Based on three properties of the ICT system, i.e., availability of components and data, timeliness of data transfer, and data correctness, the state of a grid service can be classified into normal, limited, or failed. These properties are regarded as the requirements of the grid services. Figure 1 shows the operational states of the power grid as well as of ICT-enabled grid services, along with possible state transitions [20]. The remedial actions in the operational state classification of a power system (left part) are performed via the ICT-enabled grid services, and the remedial actions of grid services (right part) would be actions in the ICT network, such as rerouting traffic or traffic shaping [49]. The states of grid services will be further elaborated in Section 2. The authors of Reference [20] present only the theoretical foundations for these states without concrete use cases. These states are formalized in Reference [17], and their benefits were demonstrated using simulations in Reference [31]. However, the impact of data correctness on the state of ICT-enabled grid services is not investigated because the ICT disturbances impacting the state are not considered.
Fig. 1.
Fig. 1. Operational states and transitions of Power System (left) and ICT-enabled Grid Service (right) [20].
As mentioned earlier, cyberattacks are disturbances that can impact all three aforementioned properties. A denial-of-service attack can render a component unable to communicate (availability) or communicate with unaccepted timeliness [46], whereas a false data injection attack can impact the data correctness by injecting manipulated data [26]. In this regard, there exists a fundamental difference between the aforementioned availability and timeliness on one hand and data correctness on the other. The first two properties can be measured, e.g., by pinging (or heartbeat) and comparing timestamps, respectively [22]. However, data correctness cannot be directly measured due to the absence of ground truth (i.e., real/actual value).
Traditionally, data correctness in a power system refers to the correctness of measurements. State estimation, in combination with bad data detection, is used in this regard and is the base for almost all other services [32]. However, this requires redundant measurements and assumes measurement errors to be randomly distributed [1]. While the former is not applicable for distribution grids (especially on the lower voltages) [14], the latter does not hold for all ICT disturbances, e.g., for coordinated false data injection attacks [26]. Therefore, data correctness is challenging to determine, especially considering the rising cyber threats in CPESs. Unlike other disturbances, such as link and sensor failures, the diverse nature of cyberattacks makes it challenging to investigate their impact on the ICT system as well as the interconnected power system [8]. Furthermore, since ICT systems span over large geographical areas (similar to power systems), data transfer from source to destination typically passes through several intermediate nodes (or hops), all of which are potential entry points for attackers. An intelligent attacker can make it challenging (or even impossible) for destination nodes to determine, whether the received data is correct, especially without the ground truth. Additionally, as shown in [30], malfunctions and incorrect operation of components (e.g., sensors) can also impact data correctness.

1.2 Related Work

Addressing issues regarding the correctness of process data has been the focus of several studies. They can be categorized into field measures (e.g., References [13, 36]), improved bad data detection (e.g., References [16, 45]), and trust-based measures (e.g., References [8, 25]). Field measures aim to improve cyber security and accuracy, e.g., by placing different types of sensors, but not by estimating data correctness. Research on improved bad data detection is specialized (e.g., against coordinated false data injection attacks). Both measures in the field and improved bad data detection only tackle a subset of threats impacting the correctness of measurements or they rely on certain invalid assumptions (e.g., measurement redundancy). Considering various types of power systems, grid services, and threats to the correctness of measurements, a more holistic approach capable of integrating existing approaches is needed. Trust-based approaches can provide a suitable framework to estimate data correctness, but the interpretation of the term trust lacks uniformity. In Reference [25], for example, field devices (referred to as agents) derive trust from the deviation of the estimated measurements of neighboring devices based on measurements received from the neighboring device. A disadvantage of such univariate trust-based measures is that the trust in the measurements of the other device relies only on one piece of information, in this case, the deviation from the expected data.
The authors of References [6, 7, 8] adapt OC-Trust to a multifaceted trust model for power systems, referred to as trust in power system network assessment (PSNA-Trust). Here, trust is defined as a “context-dependent, and multivariate sense about an entity with respect to its functional correctness, safety, security, reliability, credibility, and usability”. Additionally, a methodology to assess or estimate the trust in measurements and state variables is presented in Reference [6, 7]. Due to the absence of ground truth, data correctness can often only be estimated (i.e., cannot be directly measured), which makes PSNA-Trust and its assessment methodology a promising approach.
There also exist other trust approaches in other domains like the so-called ABI model (ability, benevolence, integrity) in the field of organizational trust [29] or the concept of data veracity in the field of big data [4, 21]. However, OC-Trust focuses on trust in and between autonomous software agents in complex systems and provides for this specific environment, a more specific (compared with data veracity) and fine-granular (compared with the ABI model) grouping of factors affecting trust. In addition, there already exist applications of OC-Trust in the domain of power systems [3, 6, 37].

1.3 Contribution

This article aims to combine a definition of states of ICT-enabled grid services [20, 31] with a trust assessment model [6, 7, 8] by using trust to estimate data correctness. Overall, this article highlights the need for a state classification for ICT-enabled grid services and serves as a step towards the system-wide application of trust to assess the state or health of a CPES. The concrete contributions of this article are:
an interpretation of the trust facets for estimating data correctness considering various ICT disturbances,
the application of trust as a measure of data correctness for ICT-enabled grid services, and
two use cases of grid services, namely state estimation and coordinated voltage control (CVC), along with a concrete approach to derive the state of these services using trust.
Since this article is a conceptual work, a concrete implementation is out of its scope. The remainder of this article is structured as follows. Section 2 introduces the operational state classification for ICT-enabled grid services and the properties used for the classification. The application of trust as a measure for data correctness is explained in Section 3, which also includes an overview of PSNA-Trust and the interpretation of the trust facets (functional correctness, safety, security, reliability, credibility, and usability) in the context of the targeted application. In Section 4, the operational state classification considering PSNA-Trust as a measure of data correctness is presented based on two exemplary grid services, namely state estimation and CVC. Section 5 discusses the proposed approach, limitations, and future work. Finally, Section 6 concludes the article.

2 State Classification of ICT-enabled Grid Services

A typical ICT system in a CPES encompasses hardware and software components for data acquisition, control (or actuation), computation, and data transfer. In the context of this article, the ICT system includes power system field devices such as sensors and controllers, communication network devices such as routers and switches, and servers for computation located in the control room. The role of the ICT system is to enable the grid services by fulfilling their aforementioned requirements of suitable data/components, namely availability, timeliness, and correctness. Consequentially, ICT disturbances can impact the performance of these grid services. Based on Reference [20], the states of grid services, which reflect their performance, can be classified as follows:
Normal State: In this state, the grid service is fully functional and can be used as intended. Coordinated decision-making and control are possible in this state. A grid service is said to be in normal state if no disturbance has occurred or if the occurred disturbances have been absorbed by the robustness of the ICT system (e.g., redundant components).
Limited State: This state indicates partial performance degradation of the grid service and the service should be used with caution. This state is typically characterized by disturbed communication, which limits the coordination among various actors. A grid service is in its limited state if certain disturbances have negatively impacted the service, causing it to resort to fallback mechanisms (e.g., using local instead of wide-area measurements).
Failed State: In this state, the service is no longer functional or yields grossly incorrect results. Suitable actions should immediately be taken to restore the functionality of the service. A service is said to be in failed state when disturbances have impacted critical components beyond the scope of the fallback mechanisms.
These states are further elaborated in Section 4. As shown in [17, 20], the state of a grid service can be assessed using the following three properties.
Availability indicates the functionality of a component at a specific time instant. Each grid service requires certain ICT components (e.g., sensors, routers, and servers) to be available. Depending on its design, the service can still be in the normal state despite the unavailability of certain non-critical components. However, disturbances causing the unavailability of critical components will lead to a performance degradation of the grid service.
Timeliness indicates, whether a grid service can provide a timely reaction. A grid service should be able to receive field measurements, take decisions, and then send control signals to the actuators in a timely manner. In the context of communication networks, timeliness refers to latency, which is a quality-of-service aspect that captures the speed of data transfer (e.g., processing and transmission delays in routers).
Data Correctness is the closeness of the data (measurement or control signal) to its ground truth. Data correctness heavily influences the decisions made by the grid services based on this data.
These properties have service-specific thresholds, which are further elaborated in Sections 4.1 and 4.2. As mentioned in Section 1, measuring availability and latency are well-researched topics. Availability of components can be determined by monitoring their heartbeats as shown in Reference [22]. Latency could be measured using network monitoring tools such as CheckMK [5]. However, the same is not true for data correctness. Measuring data correctness is challenging as the ground truth is typically not known. To address this, the concept of PSNA-Trust is considered in the operational state classification of ICT-enabled grid services.

3 Trust as A Measure of Data Correctness

Trust in the context of power system network assessment (PSNA) [6, 8] is defined as a “[...] context-dependent, and multivariate sense about an entity with respect to its functional correctness, safety, security, reliability, credibility, and usability”. While functional correctness is a so-called trust facet, data correctness, in the scope of this article, is a property of an ICT-enabled grid state (Section 2). Since data correctness is challenging to assess, this article proposes to assess the trust in components, data, and services and to use the assessed trust as hints for data correctness. If, for example, a component has issues with functional correctness, the trust in the component and data from that component should be decreased, which should be reflected in the state of the service accordingly. Here, trust in process data could be estimated based on static information about the involved components (e.g., from an information security management system (ISMS) for the security facet), live information from monitoring systems (e.g., from an information technology (IT) health monitoring system for the functional correctness facet), and experience [5, 6, 7].
A model for trust in the context of power systems called PSNA-Trust and the estimation of trust of components and data is presented in Section 3.1. In Section 3.2, the role of the individual trust facets for data correctness is discussed. This is relevant as not all facets have the same influence on data correctness. An implementation of PSNA-Trust with numerical calculations for the use cases is out of this article’s scope. However, a demonstration of the application of the trust model for a state estimation service is described in Reference [9].1

3.1 The Model of PSNA-Trust

Figure 2 shows the model of PSNA-Trust as a unified modeling language (UML) class diagram. The model combines the representation of trust with its facets, i.e., functional correctness, safety, security, reliability, credibility, and usability, and an approach for its estimation. In the top left, there are the objects of investigation (OoIs)—the entities (e.g., components) for which trust is to be estimated. OoIs can be clustered into domains such as power and ICT systems. Another part of PSNA-Trust is the derived OoIs, the trust in which can only be estimated indirectly using the trust in other OoIs. For example, in acquiring measurements in a power system, the measurements themselves are not monitored but the components involved in the acquisition process, such as sensors and routers. Hence, the trust in such measurements (derived OoIs) is derived using the trust in the involved components (OoIs).
Fig. 2.
Fig. 2. The model of PSNA-Trust as a UML class diagram.
An important aspect of PSNA-Trust is that there can be various information about specific trust aspects within a facet. A security aspect can be derived from the information from an ISMS as well as from an intrusion detection system (IDS). PSNA-Trust considers this by allowing different trust estimators with different trust sources in parallel and by defining so-called simple trust values [7]. A simple trust value is a pair consisting of a trust estimator and a trust probability, i.e., an estimation of the trust in the OoI from the perspective of the respective trust estimator. These are also shown in Figure 2. Trust sources on the right side provide trust inputs that the trust estimators use to estimate a trust probability, for example, alerts (trust inputs) from an IDS (trust source). The difference between a trust probability and a trust value is, that trust values are more complex, containing the trust probability and its source. To do so, the trust estimators use transformation functions that transform the trust inputs for a given OoI in a certain context to a trust probability. An example of a trust context is the temporal validity of the OoI. Trust inputs for a certain OoI should only be used if the inputs are within a certain time window. Furthermore, transformation functions can also aggregate different trust probabilities, which is needed for derived OoIs. A trust estimator can, in the first step, calculate the trust probability for all involved (direct) OoIs and, in the next step, aggregate the results to derive a trust probability for the derived OoI.
Irrespective of the number of trust estimators and the concrete transformation functions, the result is a set of simple trust values, which are mapped to at least one trust facet. Therefore, a trust facet is a set of simple trust values and can be empty if no trust estimator is contributing to that facet. Accordingly, a multivariate trust value (top in Figure 2) is a set of different trust facets and, therefore, a set of sets of simple trust values. Based on the definition of PSNA-Trust, a multivariate trust value is a 6-tuple containing the facets functional correctness, safety, security, reliability, credibility, and usability.
Figure 3 shows a minimal exemplary instantiation of the model with sensors as OoIs and measurements as derived OoIs. A trust estimator, called IDSbasedEstimator, uses alerts from an IDS to estimate the trust (specifically, the security) in sensors (shown at the left of IDSbasedEstimator) as well as in measurements (shown below IDSbasedEstimator). To do so, it uses a transformation function that is capable of transforming IDS alerts to a trust probability for a sensor and of aggregating trust probabilities for sensors (in this example, only one sensor is considered) to a trust probability for a measurement. The resulting simple trust values contribute to the security facet of the sensor or the measurement, respectively.
Fig. 3.
Fig. 3. Examplary instantiation of PSNA-Trust as an UML class diagram.
The described model is for the estimation of trust in components and data. However, for the grid service property of data correctness, the estimation of the trust in service outputs is required, which depends on the trust in the inputs and the service core (algorithm). This dependency is specific for each grid service as it depends on the service algorithm and the dependency between the inputs and outputs. For the state estimation service in a power system, an estimation of the trust in the outputs (state variables) based on the trust in the inputs (field measurements) is proposed in Reference [7]. The result is a multivariate trust value for each state variable, where the information about different facets and simple trust values is kept intact. However, to estimate data correctness, it is necessary to aggregate the multivariate trust values, first, to a single multivariate trust value for the whole service output and, second, to a single trust probability. Furthermore, not all trust facets are feasible or relevant to estimate the data correctness. This is discussed in the following subsection.

3.2 An Interpretation of the Trust Facets

While the PSNA-Trust model has already been used (e.g., in References [6, 7]), an interpretation of the trust facets has only been discussed with a low fidelity in Reference [8]. Therefore, this subsection provides a more elaborated interpretation of the trust facets with the goal of using trust to estimate data correctness. For PSNA-Trust, the trust facets are defined as follows [8], which are adapted from OC-Trust [40].
Functional correctness is “the quality of a system to adhere to its functional specification under the condition that no unexpected disturbances occur in the system’s environment”.
Safety is “the quality of a system to be free of the possibility to enter a state or to create an output that may impose harm to its users, the system itself or parts of it, or to its environment”.
Security is “the absence of possibilities to defect the system in ways that disclose private information, change or delete data without authorization, or to unlawfully assume the authority to act on behalf of others in the system”.
Reliability is “the quality of a system to remain available even under disturbances or partial failure for a specified period of time as measured quantitatively by means of guaranteed availability, mean-time between failures, or stochastically defined performance guarantees”.
Credibility is “the belief in the ability and willingness of a cooperation partner to participate in an interaction in a desirable manner. Also, the ability of a system to communicate with a user consistently and transparently”.
Usability is “the quality of a system to provide an interface to the user that can be used efficiently, effectively and satisfactorily that, in particular, incorporates consideration of user control, transparency and privacy”.
As mentioned in the previous section, all of the six facets do not necessarily contribute to an estimation of data correctness. Reduced reliability, for example, is of high relevance for (predictive) maintenance of components but not for data correctness at the point in time the component delivers the data. Therefore, it is proposed to build context-dependent clusters of facets. In the scope of data correctness, a cluster for facets that directly contribute to the correctness of components or data, referred to as data correctness cluster, is proposed. This contains the following facets:
Reduced functional correctness of a component, data, or service may indicate that the respective entity is not working correctly or that the data is not correct, respectively. A memory load at maximum, for example, can lead to data loss and, therefore, wrong results.
Reduced security in terms of reduced integrity of a component, data, or service, on the one hand, may indicate that the respective entity is manipulated, hints for a manipulation exist, or that it is at least vulnerable for manipulations, i.e., data correctness cannot be guaranteed. A reduced availability of information (as part of information security), on the other hand, may indicate that information/data from a component or service is not available. This can also reduce data correctness. Alerts from an IDS, for example, can be the result of data manipulation or denial-of-service attacks.
Reduced credibility may indicate that a component, data source, or service cannot or does not want to work correctly or provide correct data. A third-party system, for example, cannot be monitored to the same extent as its own system, and, therefore, its credibility cannot be guaranteed.
Reduced usability of a component, data source, or service may have caused wrong handling by a human, thereby impacting the data correctness. This plays a role only if entities are involved that are controlled by humans. If, for example, it is not clear in which unit a certain value has to be entered in a user interface, the value might be wrong because of bad usability. Another example of usability pertains to the cognitive load of the human operator. Due to the large number of digital actors, CPESs have large volumes of data, which can potentially overwhelm the human operators resulting in wrong decisions. Consequentially, systems should be designed considering the strengths of human perception to enable fast and correct usage by the human operator [38].
The described interpretation of the facets with the aim of using trust to estimate data correctness considering various ICT disturbances is the first contribution of this article (Section 1.3). In the following section, this is used in the state assessment of the ICT-enabled grid services.

4 Operational States of ICT-enabled Grid Services

In this section, the feasibility of the proposed state classification is demonstrated. An exemplary CPES, the two ICT-enabled grid services of state estimation and coordinated voltage control (CVC), and their operational states considering PSNA-Trust are presented in detail. Figure 4 shows the exemplary CPES. The thicker solid lines represent the power system buses and the thinner solid lines represent the electric power lines. These are analogous to nodes and edges of a graph. Measurements from different parts of the grid are gathered from ICT-based sensors. They are transmitted via the communication network (yellow dashed lines) to the control room, where the servers for processing are located. In this context, the control room represents the system operator. In a typical power system, the state estimation service runs centrally on a control room server [1]. The controllable elements in the grid (in this example, a photovoltaic panel and wind turbines) can be controlled via ICT-based controllers, which have two operational modes: remote and local. In the remote mode, a central coordinated control strategy is followed, where control signals (referred to as setpoints) are sent from the control room to the controllers via the communication network. The CVC service typically involves controlling different power system parameters based on the state estimation results to remedy voltage violations. Examples of CVC implementations, which depend on the state estimation service, can be found in References [18, 39, 44]. Without setpoints from the control room, the controllers shift to the local mode of operation as a fall-back measure. In this mode, the controllers act solely based on local measurements and are, therefore, uncoordinated.
Fig. 4.
Fig. 4. Exemplary grid showing state estimation and coordinated voltage control services.
In the following subsections, the state classification for the two grid services, namely, state estimation and CVC are proposed. Note that many possibilities exist for the state classification of ICT-enabled grid services. The presented ones are just options to emphasize the need for such a state classification.

4.1 Operational States of State Estimation

State estimation is one of the important ICT-enabled services used to monitor the power system in real-time by estimating the two system state variables, i.e., voltage magnitude and angle at all buses [1]. This is done based on measurements gathered from sensors in the power system field as well as using a topological model of the power system. Typical field measurements are currents, active, and reactive power at different parts of the power system. State estimation provides situational awareness to the grid operator, based on which suitable control actions could be taken to improve the power system state (Figure 1).
Weighted least squares is one of the most common state estimation algorithms [1, 14]. The necessary and sufficient condition for the solvability of this algorithm is \(rank(H) = n_{sv}\), where H is a function that relates the available field measurements to the number of state variables [28]. In addition to the availability of a server for running the state estimation algorithm, a successful run of this service requires sufficient measurements to satisfy this criterion. State estimation is performed at fixed time intervals with the measurements available at the control room, which imposes a timeliness (or latency) constraint on the field measurements to reach the control room. Typical latency requirements for state estimation can be found in References [19, 24]. It can vary depending on the design of this service and is also a design specification for the communication network in the CPES.
Furthermore, since the weighted least squares algorithm is deterministic, the correctness of state estimation results, i.e., the state variables, largely depends on the correctness of the input field measurements. This implies that only the measurements with a certain level of data correctness should be considered by the state estimation algorithm. A typical state estimation service is equipped only with a bad data detector, as discussed in Section 1, which is insufficient for estimating data correctness, especially considering disturbances that are not randomly distributed, e.g., coordinated cyber attacks.
Failures of sensors or congestions in the ICT system may either result in a complete loss or a delayed arrival of certain measurements at the control room. The correctness of measurement data received at the control room can be impacted by ICT disturbances. In case of temporal unavailability or incorrectness of field measurements, they can be replaced by suitable pseudo-measurements, which are typically calculated based on historical measurements [14]. This is a fallback measure that, on the one hand, ensures solvability but, on the other hand, decreases the data correctness of the state estimation results as pseudo-measurements may not capture recent events in the CPES, i.e., can be outdated. Based on these criteria, the state classification (Section 2) and the trust assessment (Section 3), the following operational states of the state estimation service reflecting its performance can be derived:
Normal State: The state estimation service is in the normal state if all state variables can be estimated properly, i.e., the solvability is achieved only with field measurements (no pseudo-measurements) and all state variables can be trusted in terms of the facets of the data correctness cluster.
Limited State: The state estimation service is in the limited state if pseudo-measurements were needed to either achieve solvability or achieve trust in a facet of the data correctness cluster. Due to pseudo-measurements, the resulting state variables should be used with caution. Appropriate actions are also demanded to improve the state of the grid service even though the service has not failed.
Failed State: The state estimation service is in the failed state if it cannot be run at all, the solvability cannot be achieved even with pseudo-measurements, or if the resulting state variables cannot be trusted in terms of at least one facet of the data correctness cluster, even after using pseudo-measurements. In this state, the state variables are either unavailable or cannot be trusted. This is henceforth referred to as data correctness issue.
Figure 5 shows an activity diagram for assessing the state of a state estimation service. First, the availability of the server, which hosts the state estimation algorithm, is checked. This is trivial and the unavailability of a suitable server results in the failed state. Typical CPESs have redundant servers, where a backup server takes over in the case of primary server failure [22]. If at least one server is available, the solvability is checked based on the measurements available within the specified time interval. If this criterion is satisfied, the state estimation algorithm is run, and the state variables are calculated. The trust in these state variables (see Reference [7]) regarding data correctness issues is then checked. Here, thresholds at which state estimation results can be trusted must be defined. Furthermore, the multivariate trust values have to be aggregated to calculate a trust probability that can then be compared with this threshold. Depending on the design of state estimation, this could be done in several ways such as calculating the minimum or (weighted) average [7].
Fig. 5.
Fig. 5. Activity diagram showing states of state estimation service.
If the solvability condition is satisfied and if there are no data correctness issues, the service is in the normal state. If the solvability is violated or if there is a data correctness issue in the state variables, suitable pseudo-measurements are integrated and the solvability as well as the trust in the state variables are successively re-evaluated. Since pseudo-measurements are derived from historical data, there exists a certain design-specific threshold for their maximum number that could be used for a state estimation run [14]. It is possible to increase the use of pseudo-measurements and perform the two aforementioned checks iteratively until either both checks are satisfied, or the threshold for the maximum pseudo-measurements is reached (without satisfying the checks). The former (both checks satisfied) would indicate that the service is in the limited state, while the latter would indicate a failed state.
\begin{align} \begin{split} S_{SE} = \text{failed} ~\Leftrightarrow ~ & \lnot \Phi _{serv} \vee ((rank(H_{\vec{z}}) \ne n_{sv} ~\vee ~ t_c(\vec{x},\vec{z}) \lt t_{c,threshold})\\ & \wedge ~ (rank(H_{\vec{z_p}}) \ne n_{sv} ~\vee ~ t_c(\vec{x},\vec{z_p}) \lt t_{c,threshold})) \end{split}, \end{align}
(1)
\begin{align} \begin{split} S_{SE} = \text{limited} ~\Leftrightarrow ~ & \Phi _{serv} ~\wedge ~ (rank(H_{\vec{z}}) \ne n_{sv} ~\vee ~ t_c(\vec{x},\vec{z}) \lt t_{c,threshold})\\ &\wedge ~ rank(H_{\vec{z_p}}) = n_{sv} ~\wedge ~ t_c(\vec{x},\vec{z_p}) \ge t_{c,threshold} \end{split}, \end{align}
(2)
\begin{align} \begin{split} S_{SE} = \text{normal} ~\Leftrightarrow ~ & \Phi _{serv} ~\wedge ~ rank(H_{\vec{z}}) = n_{sv} ~\wedge ~ t_c(\vec{x},\vec{z}) \ge t_{c,threshold}\\ &\wedge ~ t_m(\vec{x},\vec{z}) \ge t_{m,threshold}. \end{split} \end{align}
(3)
Equations (1)–(3) formalize the conditions for each state. \(S_{SE}\) denotes the state of the state estimation service, \(\Phi _{serv}\) the availability of the state estimation server, \(\vec{z}\) the set of field measurements, \(\vec{z_p}\) the set of field measurements augmented with pseudo-measurements, \(\vec{x}\) the set of state variables (state estimation results), \(H(\vec{z})\) and \(H(\vec{z_p})\) functions which relate \(\vec{z}\) and \(\vec{z_p}\), respectively, to \(\vec{x}\), and \(t_c\) is the trust concerning data correctness issues. Note that this state classification considers a centralized state estimation. State classification of decentral and distributed architectures is part of future work. Since these architectures do not involve a central control room, the trust assessment becomes challenging because there is no central point where trust inputs can be gathered and trust values can be calculated. Moreover, field devices do not have advanced monitoring capabilities for computing trust.
This section shows how trust can be used to measure the data correctness, which is then used to determine the operational states of the state estimation service. This corresponds to the second and third contributions of this article (Section 1.3).

4.2 Operational States of Coordinated Voltage Control (CVC)

Disturbances in a power system, such as line failures and sudden changes in power generation, can impact the bus voltages. When a bus voltage exceeds a certain threshold (typically \(\pm (5-\!10)\%\)), voltage instabilities can arise [23]. The voltage control service aim at remedying these voltage problems by suitably adjusting the output of controllable devices such as transformers or distributed energy resources. These devices are, henceforth, referred to as controllers. In this article, a specific type of voltage control, namely CVC, is considered. Typically, voltage control algorithms use local measurements at the bus to adjust the output of the corresponding controllers. In the CVC, these measurements are transferred to a server, typically located in the control room [39]. Here, optimization problems based on the received measurements are solved with the aim of adjusting the bus voltages, the results (or solution) of which are the coordinated adjustments of the various controllers. The existence of a feasible solution indicates that the underlying voltage problem can be remedied using the considered controllers. The corresponding control signals (known as setpoints) are then transferred back via the communication network to the controllers, which perform the required adjustments. These controllers can, however, also act based on local measurements in case the central control signals are absent. Unlike the state estimation service, which only provides monitoring information about the CPES, the CVC service also performs actuation based on the monitored data.
A vital part of typical CVC algorithms such as [18, 39, 44] is the availability of reliable state estimation results as the CVC optimization requires the knowledge of bus voltages in the grid. A failure of the state estimation service will result in a loss of grid observability for the CVC service, thus hindering coordinated decision-making. In this case, the controllers do not receive setpoints from the control room and, therefore, can act only based on local measurements. When the state estimation service is in its limited state, i.e., when its results depend on pseudo-measurements, coordinated actions by the CVC service are still possible but with an increased risk as the pseudo-measurements (based on historical data) may not capture certain recent events in the power system [31]. In this case, it can also be argued that the controllers should act based on local measurements rather than measurements from the control room. This is a design tradeoff as coordinated actions, on the one hand, can remedy a broader range of disturbances but, on the other hand, rely on potentially incorrect state estimation results as well as the communication between the control room and controllers.
To transmit the setpoints derived from the optimization results to the corresponding controllers, a communication network with an acceptable level of latency between the CVC server and the controllers is required. Similar to the state estimation service, the acceptable latency depends on the design of the CVC service as well as the severity of the disturbance, e.g., larger/faster voltage deviations require faster remedy [23]. Furthermore, the ability of the CVC service to remedy voltage problems in the CPES is largely impacted by the trust in the state estimation results and the controllers. While the former is already covered in Section 4.1, the latter is relevant considering the increasing risk of ICT disturbances in CPESs such as hardware/ software failures and cyberattacks [30]. In other words, a successful remedy of a voltage problem by the CVC service requires controllers, which can be trusted and are reachable in time via the communication network. Based on these criteria, the state classification (Section 2), and the trust assessment (Section 3), the following operational states of the CVC service reflecting its performance can be derived:
Normal State: The first requirement for the CVC to be in normal state is that the state estimation service should not be in the failed state as the CVC uses the state estimation results. Second, a feasible CVC solution should exist with the controllers reachable on time and considering only trusted controllers.
Limited State: The CVC is in the limited state if a feasible CVC solution is only possible considering at least one untrusted controller. However, all involved controllers are still reachable on time. This state indicates potential problems when realizing the current CVC solution due to the involvement of untrusted controllers.
Failed State: The CVC is in the failed state if the state estimation service has failed, there is no feasible CVC solution without using pseudo-measurements, or the required controllers are not reachable in time. In this state, coordinated actions are no longer possible and controllers must use local measurements.
Similar to the state estimation use case, appropriate actions from the operator are demanded in the limited state to improve the state, although the service has not failed. Note that the control room cannot directly monitor whether the controllers implement the received setpoints correctly or if the setpoints achieve the desired voltages at the power system buses. This can only be assessed in the next state estimation run using updated field measurements after the control action.
Fig. 6.
Fig. 6. Activity diagram showing states of coordinated voltage control service.
Figure 6 shows an activity diagram for the proposed process of deriving the state of the CVC service. Since the CVC service depends on the state estimation service, its state is checked first. A failure of the state estimation will cause the CVC to fail, forcing the controllers to switch to the local mode. The same applies if state estimation is in the limited state and all possible CVC solutions rely on pseudo-measurements. As in the case of state estimation, local voltage control is recommended in this case since pseudo-measurements are not as accurate as field measurements. As mentioned earlier, this is a design tradeoff as CVC can remedy a large range of disturbances (due to broader observability based on state estimation) but could also result in undesired control action due to a dependency on pseudo-measurements. Contrarily, local measurements can be trusted more but can only indicate local voltage problems. If the state estimation service has not failed and there exists a feasible CVC solution that does not rely on pseudo-measurements, the reachability of the controllers, i.e., the ability to respond in time, is checked. A feasible CVC solution that relies only on reachable controllers is then chosen. If no solution exists for which all controllers are reachable, the CVC fails and the voltage control is executed in local mode. Otherwise, the trust in terms of data correctness of the reachable controllers is checked, which decides whether the CVC is in the limited or normal state. Similar to the case of pseudo-measurements in the state estimation service, a design-specific threshold can exist to decide the maximum number of untrusted controllers that can be considered in a particular CVC solution. If the number of untrusted controllers is higher than this threshold, the CVC service is regarded as failed. Note that the CVC optimization problem may have several feasible solutions, possibly ranging from best to marginally acceptable in terms of its quality. Since trust is checked only after calculating the CVC solutions, it could happen that the best solution has a lower trust compared with a worse (but still feasible) solution. In this case, a tradeoff has to be made between the quality of the solution and the trust in the controllers.
\begin{align} \begin{split} S_{CVC} = \text{failed}~\Leftrightarrow ~&(S_{SE} = \text{failed}) ~\vee ~ \\ &(\forall y(\vec{x}) \in Y ~|~ y(\vec{x}) \stackrel{d}{\sim } \vec{p}~\vee ~ \exists a \in A_y~|~l_{serv,a} \gt l_{threshold}), \end{split} \end{align}
(4)
\begin{align} \begin{split} S_{CVC} = \text{limited}~\Leftrightarrow ~&(S_{SE} \ne \text{failed}) ~\wedge ~ (\exists y(\vec{x}) \in Y ~| ~(!(y(\vec{x}) \stackrel{d}{\sim } \vec{p}))\\ & ~\wedge ~ (\forall a \in A_y~|~l_{serv,a} \le l_{threshold}) \\ & ~\wedge ~ (\exists a \in A_y ~|~ t_{a} \lt t_{threshold}) \end{split}, \end{align}
(5)
\begin{align} \begin{split} S_{CVC} = \text{normal}~\Leftrightarrow ~&(S_{SE} \ne \text{failed})\\ & ~\wedge ~ (\forall a \in A_y~|~l_{serv,a} \le l_{threshold}~\wedge t_{a} \ge t_{threshold}). \end{split} \end{align}
(6)
Equations (4)–(6) formalize the conditions for each state. \(S_{CVC}\) denotes the state of the CVC service, \(y(\vec{x}) = \lbrace (v, a)\rbrace\) denote a feasible CVC solution that is a set consisting of pairs of voltage setpoints v and the corresponding controller \(a \in A\), \(A_y\) be the set of controller which are involved in a CVC solution y, \(Y = \lbrace y(\vec{x})\rbrace\) be the set of all feasible CVC solutions, \(a \stackrel{d}{\sim } b\) a dependency of a on b, \(l_{serv,a}\) the latency between the CVC server (or control room) and controller a, and \(t_a\) is the trust of controller a (data correctness cluster).
This section shows how trust can be used to measure the data correctness, which is then used to determine the operational states of the CVC service. Similar to the state estimation service in Section 4.1, this corresponds to the second and third contributions of this article (Section 1.3).

5 Discussion and Future Work

This section discusses the presented approach, open points and limitations. Section 5.1 discusses potential adaptations for the state classification. Section 5.2 discusses the capabilities and limitations of controllers in the field to assess trust, while potential measures for system operators based on the state classification are presented in Section 5.3. Finally, Section 5.4 discusses the application of trust in CPESs from a holistic perspective.

5.1 Adaptations of State Classification

As mentioned in Section 4, the presented state classification for the state estimation and CVC grid services is just one of many possibilities because grid services in CPESs can vary drastically in their designs. One differentiator is the number of sensors in the power system. While electric transmission grids are typically equipped with redundant sensors at nearly every power system bus, electric distribution grids are typically equipped with sensors only at specific buses without any redundancy. This is due to cost and a lower level of digitalization in distribution grids [10]. For the state classification of the state estimation service (Figure 5), an alternative approach can be identified for grids with redundant measurements. Here, only trusted measurements could be considered by the state estimation algorithm, while untrusted field measurements could be discarded. This could potentially result in better state estimation results. However, discarding measurements in the case without redundant measurement (e.g., distribution grids) is impractical as it would directly violate the solvability condition (Section 4.1). However, the proposed state classification in Figure 5 would be applicable to both cases.
Another point for discussion is the thresholds for availability, timeliness, and trust, which define state transitions. The diverse nature of grid services and their designs makes it challenging to identify universal thresholds. For instance, the timeliness requirement of the state estimation service can vary depending on the type of sensors, e.g., \(\le 0.1s\) as in Reference [24] and \(\le 1s\) as in Reference [19]. The same is true for the CVC service, where a range of latency requirements from 1s to 30s can be identified [11]. However, the presented state classification does not provide concrete thresholds and can, therefore, be applied to any design by considering the corresponding thresholds.
The three operational states of ICT-enabled grid services are established in the literature (see References [17, 20, 31]) and are similar to the widely-used operational states of the power system (Figure 1). However, a more fine-granular state classification is required to assess the current performance quantitatively. Such a model can determine the current state and the depth of degradation, e.g., a limited state near the border to the normal state is less critical than a limited state near the border to the failed state. As a first step, the limited state, which encompasses everything between full functionality and complete failure, could be elaborated. Since these states are intended for situational awareness, simplicity (ease of use and understanding) and complexity (having more states to capture the actual behavior) should be balanced.

5.2 Abilities and Limitations for Controllers

In the CVC use case, an important question is how controllers in the field can assess the trust in commands or setpoints from the control room. Field controllers, unlike a control room, do not have advanced monitoring capabilities, such as an IDS. This is relevant in case of, e.g., spoofing attacks, where attackers can masquerade as the control room and send malicious setpoints to controllers. In this regard, measures such as local plausibilisation or reputation are required. In a local plausibilisation, field controllers verify the received commands based on their intelligence. This is discussed in Reference [2] and is still a nascent area of research. Reputation refers to a trust assessment based on the experience of other controllers with commands from the control room [40].
From a control room perspective, the state assessment of closed-loop services (with monitoring and control) like CVC is more challenging than open-loop services (only monitoring) like state estimation. The performance of a closed-loop service can only be assessed when the impact on the power system is reported to the control room. This is typically only done in the next cycle of data acquisition and state estimation.

5.3 Measures for System Operators

One of the main benefits of the proposed state classification is that it provides the operator with information regarding the performance of ICT-enabled grid services, based on which suitable actions can be taken (in the case of state degradation). Specific proactive measures can also be taken to improve the resilience and robustness of the system, which can either prevent state degradation or improve the performance in the degraded state. Some examples are discussed in the following.
It can be seen in Figure 5 that the state estimation service can fail either due to a server failure or loss of field measurements. In the case of the former, suitable actions include fixing the server with active backup [30] or redeployment and reallocation of the state estimation algorithm using virtualization [22] can be performed. In the latter’s case, actions such as repairing sensors and rerouting network traffic can be performed. These actions aim at mitigating the impact of the disturbance and improve the state of the grid service.
Although the operational states only provide abstracted information about the performance of the grid service, a closer examination of the classification will provide details on which of the three properties, i.e., availability, timeliness, and data correctness (trust), are currently impacted. Regarding availability and timeliness issues in the state estimation service, pseudo-measurements can be used to prevent further state degradation. Here, increasing the number of sensors to have more redundant field measurements will make the system more robust to sensor failures, whereas measures to improve the quality of pseudo-measurements will ensure better performance in case of state degradation. Communication network measures such as packet prioritization, network function virtualization, and traffic shaping could facilitate fast data transfer and reduce network downtime in the case of disturbances [35]. The robustness of the communication network could also be improved by considering redundant paths and meshing during the design phase. These measures may vary depending on the impacted facets. In the case of a security issue (in particular, integrity), closing vulnerabilities of the affected components is a suitable measure. For reduced functional correctness based on, for example, excessive resource usage, the resources and the implementation should be checked. In this regard, the use of the trust facets, along with other tools, to trace the issue to its source can be investigated as part of future work.

5.4 Trust in CPESs

This article presents a specific application of trust, i.e., to estimate the trust in components and data. The underlying trust approach can also potentially be used to gain a more holistic perspective of the health and state of a CPES, which considers not only the electrotechnical measurements (e.g., voltages, currents) but also the performance of the ICT components and the grid services.
Because of the hierarchical structure of power systems, it may be feasible to also do the trust assessment hierarchically instead of centrally. Figure 7 shows an exemplary hierarchical trust assessment. The data flow for the electrotechnical measurements can be separated into three levels. On the process level, the sensors provide measurements such as active (P) and reactive powers (Q) and currents (I). These measurements are then sent to an aggregator located at the substation level. This corresponds to the power system buses in Figure 4. The aggregator collects the measurements from all the sensors and sends the packed measurements to a supervisory, control and data acquisition (SCADA) system at the control room level. The first trust assessment for the sensors and their measurements can already be done at the aggregator using the information from an IDS, an ISMS, and a health monitoring system, exemplarily. Therefore, the data transmitted to the SCADA system would be enriched with a multivariate trust value. In the SCADA system, a second trust assessment can be performed considering the trust in the aggregator. In Figure 7, this is done based on trust inputs from the same trust sources, which also monitor the sensors. The output of the trust assessment, as shown in Figure 2, are state variables annotated with multivariate trust values, similar to the state estimation use case in Section 4.1.
Fig. 7.
Fig. 7. Exemplary system for hierarchical trust assessment
The future work regarding trust in CPESs is three-fold. First, trust propagation in a hierarchical system with interdependent services must be modelled and analyzed. Second, subsystems that are not under the control of the system operator (e.g., third-party assets like solar panels in households) also need to be considered in the overall trust assessment, especially since CPESs are organic systems with autonomous subsystems interacting with each other. The challenge here is that third-party assets may not have direct monitoring. Here, experience (as in OC-Trust) and possibilities to indicate own trustworthiness (trusted computing) are of interest. This contributes to a holistic trust assessment for CPESs to determine the state and health of the overall system of systems.

6 Conclusion

This article applies the concept of PSNA-Trust, which is based on OC-Trust, to the operational state classification of ICT-enabled grid services. The operational states of grid services, based on literature, can be assessed based on three properties—availability, timeliness, and data correctness. Unlike the first two properties, data correctness is challenging to measure due to the lack of a ground truth. Furthermore, the rising impact of cyber threats in CPESs increases the relevance of the data correctness property. The first contribution of the article is the interpretation of PSNA-Trust and its facets to estimate data correctness considering various ICT disturbances. This is then applied to the operational state classification of ICT-enabled grid services, particularly for the data correctness property, which is the second contribution of the article. As a third contribution, the operational states of two grid services, namely state estimation and CVC, were discussed as use cases. In this regard, several possible future steps were also identified and discussed. The results provide the system operator (or the control room) with an enhanced situational awareness, particularly regarding the ICT-enabled grid services. In the case of state degradation, based on the state, alternative grid services could be used in addition to measures for improving the state.

Footnote

References

[1]
Ali Abur and Antonio Gomez Exposito. 2004. Power System State Estimation: Theory and Implementation. CRC Press, London.
[2]
acatech/Leopoldina/Akademienunion. 2021. The Resilience of Digitalised Energy Systems. Options for Reducing Blackout Risks (Series on Science-Based Policy Advice).
[3]
Gerrit Anders, Jan-Philipp Steghöfer, Florian Siefert, and Wolfgang Reif. 2011. Patterns to measure and utilize trust in multi-agent systems. In 2011 Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops. IEEE, Ann Arbor, MI, USA, 35–40.
[4]
Fatmah Assiri. 2020. Methods for assessing, predicting, and improving data veracity: A survey. ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal 9, 4 (2020), 5.
[5]
Michael Brand, Shoaib Ansari, Felipe Castro, Ranim Chakra, Batoul Hage Hassan, Carsten Krüger, Davood Babazadeh, and Sebastian Lehnhof. 2019. A framework for the integration of ICT-relevant data in power system applications. In 2019 IEEE Milan PowerTech. IEEE, New York City, USA, 1–6.
[6]
Michael Brand, Davood Babazadeh, Carsten Krüger, Björn Siemers, and Sebastian Lehnhoff. 2020. Trust assessment of power system states. Energy Informatics 3, 1 (2020), 1–11.
[7]
Michael Brand, Davood Babazadeh, and Sebastian Lehnhoff. 2021. Trust in power system state variables based on trust in measurements. In 2021 IEEE Madrid PowerTech. IEEE, New York City, USA, 1–6.
[8]
Michael Brand, Davood Babazadeh, Sebastian Lehnhoff, and Dominik Engel. 2019. Trust in control: A trust model for power system network assessment. In EPJ Web of Conferences, Vol. 217. EDP Sciences, Les Ulis, France, 01008.
[9]
Michael Brand, Felipe Castro, Batoul Hage Hassen, Carsten Krüger, Torben Logemann, Björn Siemers, Dennis Weller, Torge Wolff, and Sebastian Lehnhoff. 2021. Demo abstract: A platform to assess the trust in power system components, data, and services. In Abstracts of the 10th DACH+ Conference on Energy Informatics. Springer, 26.
[10]
Gert Brunekreeft, Marius Buchmann, Christian Dänekas, Xin Guo, Christoph Mayer, Marcus Merkel, Christian Rehtanz, André Göring, Andre Herrmann, Ray Kodali, et al. 2015. Germany’s way from conventional power grids towards smart grids. Regulatory Pathways for Smart Grid Development in China (2015), 45–78. DOI:
[11]
Moustafa Chenine, Kun Zhu, and Lars Nordstrom. 2009. Survey on priorities and communication requirements for PMU-based applications in the Nordic Region. In 2009 IEEE Bucharest PowerTech. IEEE, New York City, USA, 1–8.
[12]
European Commission. 2001. European Union (EU) Commission Regulation 2017/1485—Establishing a Guideline on Electricity Transmission System Operation. European Union (EU) Commission. Retrieved from DOI:http://data.europa.eu/eli/reg/2017/1485/oj Retrieved May 7, 2020 from
[13]
György Dán and Henrik Sandberg. 2010. Stealth attacks and protection schemes for state estimators in power systems. In 2010 first IEEE International Conference on Smart Grid Communications. IEEE, New York City, USA, 214–219.
[14]
Kaveh Dehghanpour, Zhaoyu Wang, Jianhui Wang, Yuxuan Yuan, and Fankun Bu. 2018. A survey on state estimation techniques and challenges in smart distribution systems. IEEE Transactions on Smart Grid 10, 2 (2018), 2312–2322.
[15]
Lester H. Fink and Kjell Carlsen. 1978. Operating under stress and strain [electrical power systems control under emergency conditions]. IEEE Spectrum 15, 3 (1978), 48–53.
[16]
A. M. Glazunova and I. N. Kolosok. 2014. Bad data detection by dynamic state estimation for the case of low redundancy of measurements. In 2014 IEEE International Energy Conference (ENERGYCON). IEEE, New York City, USA, 407–412.
[17]
J. Haack, A. Narayan, A. D. Patil, M. Klaes, M. Braun, S. Lehnhoff, H. de Meer, and C. Rehtanz. 2022. A hybrid model for analysing disturbance propagation in cyber–physical energy systems. Electric Power Systems Research 212 (2022), 108356. DOI:
[18]
C. M. Hird, H. Leite, N. Jenkins, and H. Li. 2004. Network voltage controller for distributed generation. IEE Proceedings-Generation, Transmission and Distribution 151, 2 (2004), 150–156.
[19]
Prashant Kansal and Anjan Bose. 2012. Bandwidth and latency requirements for smart transmission grid applications. IEEE Transactions on Smart Grid 3, 3 (2012), 1344–1352.
[20]
Marcel Klaes, Anand Narayan, Amit Dilip Patil, Jonas Haack, Martin Lindner, Christian Rehtanz, Martin Braun, Sebastian Lehnhoff, and Hermann de Meer. 2020. State description of cyber-physical energy systems. Energy Informatics 3, 1 (2020), 1–19.
[21]
Marina Krotofil, Jason Larsen, and Dieter Gollmann. 2015. The process matters: Ensuring data veracity in cyber-physical systems. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. 133–144.
[22]
Carsten Krüger, Anand Narayan, Felipe Castro, Batoul Hage Hassan, Shadi Attarha, Davood Babazadeh, and Sebastian Lehnhoff. 2020. Real-time test platform for enabling grid service virtualisation in cyber physical energy system. In 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vol. 1. IEEE, New York City, USA, 109–116.
[23]
Prabha Kundur. 2022. Power System Stability and Control. McGraw-Hill Education, London, UK.
[24]
Murat Kuzlu, Manisa Pipattanasomporn, and Saifur Rahman. 2014. Communication network requirements for major smart grid applications in HAN, NAN and WAN. Computer Networks 67 (2014), 74–88. DOI:
[25]
Ying Liu and Chunguang Li. 2018. Secure distributed estimation over wireless sensor networks under attacks. IEEE Trans. Aerospace Electron. Systems 54, 4 (2018), 1815–1831. DOI:
[26]
Yao Liu, Peng Ning, and Michael K. Reiter. 2011. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC) 14, 1 (2011), 1–33.
[27]
Inga Loeser, Martin Braun, Christian Gruhl, Jan-Hendrik Menke, Bernhard Sick, and Sven Tomforde. 2022. The vision of self-management in cognitive organic power distribution systems. Energies 15, 3 (2022), 881.
[28]
Robert Lukomski and Kazimierz Wilkosz. 2008. Methods of measurement placement design for power system state estimation. AT&P journal Plus 2 (2008), 75–79.
[29]
Roger C. Mayer, James H. Davis, and F. David Schoorman. 1995. An integrative model of organizational trust. Academy of Management Review 20, 3 (1995), 709–734.
[30]
Anand Narayan, Marcel Klaes, Davood Babazadeh, Sebastian Lehnhoff, and Christian Rehtanz. 2019. First approach for a multi-dimensional state classification for ICT-reliant energy systems. In International ETG-Congress 2019; ETG Symposium. VDE, Offenbach am Main, Germany, 1–6.
[31]
Anand Narayan, Marcel Klaes, Sebastian Lehnhoff, and Christian Rehtanz. 2021. Analyzing the propagation of disturbances in CPES considering the states of ICT-enabled grid services. In IEEE Electrical Power and Energy Conference (EPEC). IEEE, New York City, USA, 522–529.
[32]
Anand Narayan, Carsten Krueger, Andre Goering, Davood Babazadeh, Marie-Christin Harre, Bertram Wortelen, Andreas Luedtke, and Sebastian Lehnhoff. 2019. Towards future scada systems for ict-reliant energy systems. In International ETG-Congress 2019; ETG Symposium. VDE, Offenbach am Main, Germany, 1–7.
[33]
NERC. 2004. Technical Analysis of the August 14, 2003 Blackout: What Happened, Why, and What Did We Learn? Report to the NERC Board of Trustees by the NERC Steering Group. Technical Report. NERC. 1–119 pages.
[34]
Astrid Nieße and Martin Tröschel. 2016. Controlled self-organization in smart grids. In 2016 IEEE International Symposium on Systems Engineering (ISSE). IEEE, 1–6.
[35]
Frauke Oest and Sebastian Lehnhoff. 2022. Constraint-based modeling of smart grid services in ICT-reliant power systems. In ENERGY 2022, The Twelfth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies. IARIA XPS Press, 15–21. Retrieved from DOI:https://www.thinkmind.org/articles/energy_2022_1_50_30030.pdf
[36]
Chao Pei, Yang Xiao, Wei Liang, and Xiaojia Han. 2020. Pmu placement protection against coordinated false data injection attacks in smart grid. IEEE Transactions on Industry Applications 56, 4 (2020), 4381–4393.
[37]
Christine Rosinger, Mathias Uslar, and Jürgen Sauer. 2013. Threat scenarios to evaluate trustworthiness of multi-agents in the energy data management. In 7th International Conference on Environmental Informatics for Environmental Protection, Sustainable Development and Risk Management, EnviroInfo 2013, Hamburg, Germany, September 2-4, 2013. Proceedings.Shaker, Hamburg, Germany, 258—-264.
[38]
Marcel Saager, Jan-Patrick Osterloh, and Yvonne Brück. 2022. KONECT: Implementation and extension of a method for the development of safety-critical human-machine interaction interfaces. In 13th International Conference on Applied Human Factors and Ergonomics 2022.
[39]
Shemsedin Nursebo Salih and Peiyuan Chen. 2015. On coordinated control of OLTC and reactive power compensation for voltage regulation in distribution systems with wind power. IEEE Transactions on Power Systems 31, 5 (2015), 4026–4035.
[40]
Jan-Philipp Steghöfer, Rolf Kiefhaber, Karin Leichtenstern, Yvonne Bernard, Lukas Klejnowski, Wolfgang Reif, Theo Ungerer, Elisabeth André, Jörg Hähner, and Christian Müller-Schloer. 2010. Trustworthy organic computing systems: Challenges and perspectives. In International Conference on Autonomic and Trusted Computing. Springer, Berlin, Germany, 62–76.
[41]
Paul Hendrik Tiemann, Marvin Nebel-Wenner, Stefanie Holly, Emilie Frost, Adrian Jimenez Martinez, and Astrid Nieße. 2022. Operational flexibility for multi-purpose usage of pooled battery storage systems. Energy Informatics 5, 1 (2022), 1–13.
[42]
Inger Anne Tøndel, Jørn Foros, Stine Skaufel Kilskar, Per Hokstad, and Martin Gilje Jaatun. 2018. Interdependencies and reliability in the combined ICT and power system: An overview of current research. Applied Computing and Informatics 14, 1 (2018), 17–27.
[43]
Jorge Velasquez, Carsten Krüger, Davood Babazadeh, Sebastian Lehnhoff, Rajkumar Palaniappan, Björn Bauernschmitt, Dominik Hilbrich, and Christian Rehtanz. 2019. Flexible and reconfigurable automation architecture for electrical power systems. In 2019 IEEE Milan PowerTech. IEEE, 1–6.
[44]
Ferry A. Viawan and Daniel Karlsson. 2008. Coordinated voltage and reactive power control in the presence of distributed generation. In 2008 IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century. IEEE, New York City, USA, 1–6.
[45]
Chenguang Wang, Simon Tindemans, Kaikai Pan, and Peter Palensky. 2020. Detection of false data injection attacks using the autoencoder approach. In 2020 International Conference on Probabilistic Methods Applied to Power Systems (PMAPS). IEEE, New York City, USA, 1–6.
[46]
Jingyu Wang and Dongyuan Shi. 2018. Cyber-attacks related to intelligent electronic devices and their countermeasures: A review. In 2018 53rd International Universities Power Engineering Conference (UPEC). IEEE, Glasgow, 1–6. DOI:
[47]
Yuan-Kang Wu, Shih Ming Chang, and Yi-Liang Hu. 2017. Literature review of power system blackouts. Energy Procedia 141 (2017), 428–431. DOI:
[48]
Xinghuo Yu and Yusheng Xue. 2016. Smart grids: A cyber-physical systems perspective. Proc. IEEE 104, 5 (2016), 1058–1070.
[49]
Yongxiang Zhao, Baoxian Zhang, Cheng Li, and Changjia Chen. 2017. On/off traffic shaping in the internet: Motivation, challenges, and solutions. IEEE Network 31, 2 (2017), 48–57.

Index Terms

  1. Applying Trust for Operational States of ICT-Enabled Power Grid Services

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Autonomous and Adaptive Systems
      ACM Transactions on Autonomous and Adaptive Systems  Volume 19, Issue 4
      December 2024
      179 pages
      EISSN:1556-4703
      DOI:10.1145/3613715
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 October 2024
      Online AM: 03 April 2024
      Accepted: 13 March 2024
      Revised: 27 September 2023
      Received: 15 November 2022
      Published in TAAS Volume 19, Issue 4

      Check for updates

      Author Tags

      1. Cyber-physical energy systems
      2. data correctness
      3. operational state classification
      4. trust in power systems

      Qualifiers

      • Research-article

      Funding Sources

      • German Federal Ministry for Economic Affairs and Energy (BMWi)
      • Deutsche Forschungsgemeinschaft (DFG)

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 325
        Total Downloads
      • Downloads (Last 12 months)325
      • Downloads (Last 6 weeks)115
      Reflects downloads up to 06 Jan 2025

      Other Metrics

      Citations

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Full Access

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media