Cyber attack in a two-area power system: Impact identification using reachability

PM Esfahani, M Vrakopoulou… - Proceedings of the …, 2010 - ieeexplore.ieee.org
Proceedings of the 2010 American control conference, 2010ieeexplore.ieee.org
This paper presents new results on the applications of reachability methods and
computational tools to a twoarea power system in the case of a cyber attack. In the VIKING
research project a novel concept to assess the vulnerabilities introduced by the interaction
between the IT infrastructure and power systems is proposed. Here we develop a new
framework and define a systematic methodology, based on reachability, for identifying the
impact that an intrusion might have in the Automatic Generation Control loop, which …
This paper presents new results on the applications of reachability methods and computational tools to a twoarea power system in the case of a cyber attack. In the VIKING research project a novel concept to assess the vulnerabilities introduced by the interaction between the IT infrastructure and power systems is proposed. Here we develop a new framework and define a systematic methodology, based on reachability, for identifying the impact that an intrusion might have in the Automatic Generation Control loop, which regulates the frequency and the power exchange between the controlled areas. The numerical results reveal the weaknesses of the system and indicate possible policies that an attacker could use to disturb it.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果

Google学术搜索按钮

example.edu/paper.pdf
搜索
获取 PDF 文件
引用
References