Professional Documents
Culture Documents
TPEC 2023 Paper 126
TPEC 2023 Paper 126
TPEC 2023 Paper 126
Abstract—This paper provides a strategy to identify layers provides literature survey on cyber attacks and cybersecurity
and sub-layers of cyber-physical power systems (CPPS) and measures for CPPSs. This work describes the CPPS as the
characterize their inter- and intra-actions. The physical layer coupled network of cyber and physical system. Cyber layer
usually consists of the power grid and protection devices whereas
the cyber layer consists of communication, and computation and consists of computation, communication, and control system.
control components. Combining components of the cyber layer Physical system, on the other hand, consists of physical power
in one layer complicates the process of modeling intra-actions grid governed by physics-based rules. In [2], key features
because each component has different failure modes. On the of cyber-physical system in multi-layered architecture are
other hand, dividing the cyber layers into a large number of conceptualized. This work characterizes the cyber physical
sub-layers may unnecessarily increase the number of system
states and increase the computational burden. In this paper, system into physical layer, cyber-physical layer, and the cyber
we classify system layers based on their common, coupled, layer. Physical layer consists of physical components and
and shared functions. Also, interactions between the classified their dynamics, physical measurements, and physical operator.
layers are identified, characterized, and clustered based on Cyber-physical layer includes programmable controllers,
their impact on the system. Furthermore, based on the overall real-time communication networks, sensors, and actuators.
function of each layer and types of its components, intra-actions
within layers are characterized. The strategies developed in Cyber layer is formed by combination of cyber communication
this paper for comprehensive classification of system layers networks, supervisory computers, and supervisors.
and characterization of their inter- and intra-actions contribute Cyber layer can be identified as the layer responsible for the
toward the goal of accurate and detailed modeling of state computation, analysis, and assessment of the power system
transition and failure and attack propagation in CPPS, which on the regional and global scale. Defining the boundaries
can be used for various reliability assessment studies.
Index Terms—Cyber-Physical Power Systems, Resilience, of a cyber layer within a CPPS model is not a straight
real-time simulation. forward process. First, the advancement in information and
communication technology has resulted in embedded smart
I. I NTRODUCTION computation processors in all power system components. This
The advancement in communication and automation raises a concern whether such computation parts are system or
technologies has increased significantly in the last decade component involved. Also, some system computational tasks
resulting in wide-spread integration and deployment in takes place in the local level such as protection decision;
power systems. Grid modernization approaches created whereas other wide-area analysis are handled in the energy
what is now known to be cyber-physical power systems management systems [3]. This raises a concern whether cyber
(CPPSs). Such systems are composed mainly of cyber layer is composed of a single layer or can be split into
layer, i.e., communication and control systems, and several layers. The cyber layer comprises of all required
physical layer referring to the power system. Despite applications to maintain reliable and economical operation of
the noticeable added benefits of cyber layer on power systems the power system. Some of these applications are run in the
achieving reliable, secured, and economic operation, increased local level prior to passing to global level such as automatic
vulnerabilities against cyber threats and attacks are always generation control, remedial action schemes, and protection
being associated with the level of integration. Also, the protocols. Other global applications include but not limited
reliance to leverage user-friendly human interface platforms, to state estimation, real-time contingency analysis, security
cloud computation, and smart artificial-intelligence devices constrained optimal power flow, unit commitment, and energy
create further complexities to analyses of CPPSs. Therefore, market optimization. Determining the proper input data into
it has become a necessity to accurately model the state diverse applications causes a confusion on boundaries of cyber
transitions and propagation behaviors in CPPSs for improved layer.
analysis, evaluation, and enhancement of their resilience and Whereas the power grid represents only a physics-governed
performance. physical layer, the cyber layer consists of several layers such as
Recently published work, [1], provides a comprehensive sensor, protection, communication, computation, and control
review of CPPSs from the perspective of modeling, simulation, layers. Combining the components of the cyber layers in
and analysis with cyber security applications. This paper also one layer complicates the process of modeling intra-actions
because each component has different failure modes. On the A. Existing CPPS Models
other hand, dividing the cyber layers into a large number of The layer classification of CPPS model varies in the existing
sub-layers may unnecessarily increase the number of system literature based on the study or the system. In [7], [8],
states and increase the computational burden. Therefore, a two-layer CPPS model has been provided to assess
rigorously identifying system heterogeneous layers (cyber and the transient power system stability against control and
physical) and comprehensively characterizing their inter- and communication failures. The first layer represents the power
intra-actions are essential to (1) establish accurate models for grid system; whereas, the second refers to the cyber layer.
state transitions; (2) identify chains of failure propagation Another two-layer CPPS model has been provided in [9],
within and between layers; and (3) develop efficient and where the cyber layer is represented by three sub-layers
practical reliability and resilience analysis, evaluation, and including measurements, protection, and control. Authors of
enhancement methods and strategies for CPPSs. Further [3] have restructured the CPPS model in [9] to include an
research is inevitable for the maturity of CPPS classification, intermediate layer between the cyber and physical layers. The
characterization, and modeling, simulation, and analysis of connecting layer handles three main applications, wide-area
interactions between and within the CPPS layers. monitoring, protection, and control. The function of the
This paper establishes strategies to identify CPPS layers intermediate layer has been changed in [10] to represent
and sub-layers and characterizes their inter- and intra-actions. only the communication between the physical layer and the
In this paper, CPPS layers are classified based on their cyber layer. A comprehensive four layers CPPS model has
common, coupled, and shared functions. During classification, been provided in [11] representing physical, communication,
we start with common intended functions, of which there are control, and monitoring layers.
many, each of which aggregates several system components. Fig. 1 represents a three-layer CPPS model in [12].
Then, we identify coupling layers (i.e., failure of coupling The bottom layer represents the physical power system;
layers separates two or more layers) such as communication the intermediate layer refers to the coupling communication
layer, which couples the heterogeneous physical layer and layer; and the top layer is the decision control layer. The
remaining layers. Next, we identify shared layers such as the measurement layer is assumed fully reliable; whereas, the
sensors’ layer—a shared layer between the communication protection layer is ignored. The mathematical computations
and protection layers. Also, interactions between the classified are integrated within the control layer. It is worth noting that
layers are identified and characterized; possible interactions this model captures only the states and interactions of three
are discussed and clustered based on their impacts on the main layers neglecting the inter-actions within each layer.
system. Furthermore, intra-actions within each layer are
characterized based on the overall function of the layer and Decision layer
types of its components. The strategies developed in this Operation Decision error Failure
paper for comprehensive classification of system layers and
Measurements
Control signals