Professional Documents
Culture Documents
Wide Area Measurement-Based Cyber-Attack-Resilient Breaker Failure Protection Scheme
Wide Area Measurement-Based Cyber-Attack-Resilient Breaker Failure Protection Scheme
This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
Fig. 2: Various breaker failure schemes as per the "IEEE Guide for Breaker Failure Protection of Power Circuit Breakers",
IEEE Std C37.119-2016 [15]
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
PMU is genuine or due to a cyber-attack. SFVA has two TABLE I: Scope of the Proposed Scheme
layers: Status of PDC,
Status of Relay-PMU Proposed Scheme
– Layer-1: Fault Detection Algorithm (FDA) checks if Communications
there is a fault in the vicinity of the Relay-PMU that Not compromised Not compromised Within Scope
issued the BFI. Buses adjacent to the fault location Compromised Not compromised Within Scope
are expected to observe Under-Voltage (UV). It is a Compromised
Not compromised Within Scope
hierarchical voting scheme based on whether Relay- but detected
PMUs in the adjacent substations observe UV. Compromised Compromised Outside Scope
– Layer-2: Fault Confirmation Algorithm (FCA)
checks if the fault is within the zone of the Relay-
PMU that issued the BF I. BFP scheme should allow II. P ROPOSED S CHEME
BFP trip only if the fault is within the zone of the The proposed cyber-attack-resilient BFP scheme considers
Relay-PMU that issued the BFI. the following aspects:
• Part 2: It is the modification in the logic of the existing i. The relays in the substation are microprocessor-based
common BFP scheme at the BFP Relay-PMU to incor- relays with PMU capability. So, each Relay-PMU can
porate the decision from the SFVA. compute synchrophasors from the analog signals fed via
PSCAD simulations of the IEEE-118 bus system validate instrument transformers.
the proposed scheme. A lab implementation setup has also ii. Wide Area measurement systems (PDC, PMUs, commu-
been built to emulate synchrophasor communication for a part nication systems) are designed envisaging the nature of
of the IEEE-118 bus system. Lab implementation confirms applications and the volume of data they have to support.
that the execution time of the proposed scheme adheres to the To explain the proposed BFP scheme, Relay-PMU reporting
timing budget of the BFP scheme. rate of 50 frames per second is considered. So, a data frame is
The main contributions and characteristics of the proposed sent from each Relay-PMU to PDC after every 20 milliseconds
scheme are as follows: (ms). It is to be noted that the proposed scheme is applicable to
i. Proposed novel cyber-attack-resilient BFP scheme utilizes other synchrophasor reporting rates also. BFP scheme usually
the voltages observed by Relay-PMUs of the adjacent has a time budget of 10 to 12 power frequency cycles [20]. For
substation buses rather than utilizing the feeder current. a 50Hz system, 10 cycles translate to 200 ms. Fault detection
Since the proposed scheme does not employ current time for a Relay-PMU is considered as one power frequency
phasors, it eliminates issues due to CT saturation. cycle [24], i.e., 20 ms for a 50Hz system. Fig. 4 shows the BFP
ii. A novel concept of Dynamic Relay White-listing (DRW) operation timeline used for explaining the proposed method.
is proposed to avoid the usage of phasors from the Fig. 5 shows the proposed cyber-attack-resilient BFP Scheme.
susceptible Relay-PMUs in SFVA. When a Relay-PMU Consider a substation which has k Relay-PMUs and n Relay-
of a particular maker and family is compromised, other PMUs with BFP function. Relay-PMUs in the substations send
Relay-PMUs of the same maker and family are more synchrophasors to the PDC as per IEEE Std C37.118.2-2011
susceptible to the cyber-attack. The attacker can leverage [25]. The red outlined section of Fig. 5 shows the BFP Relay-
the same vulnerabilities to tamper with other Relay-PMUs PMU in which BFP scheme runs. It receives a BFI from an
of that particular make and family. So, SFVA does not use external compromised Relay-PMU. BF I can be issued by any
phasors from such Relay-PMUs. protective Relay-PMU such as feeder protection relay, trans-
iii. The proposed scheme is compatible with all the common former protection relay, bus protection relay, etc. Depending
BFP schemes. on the inputs BFI, 50BF, 52a and the BFP logic, a trigger is
iv. Proposed scheme works well even when a cyber-attack is sent to the PDC to activate the SFVA algorithm to validate the
executed simultaneously with a power system fault. BF I received. Depending on the inputs BFI, 50BF, 52a and
v. Proposed scheme is computationally efficient to imple- the BFP logic; the value of the T riggerP oint is determined.
ment because it only consists of a voting scheme and When the T riggerP oint becomes "1", following actions are
fault distance estimation. Thus, it adheres to the timing initiated:
requirements of the BFP scheme. i. The Main BFP Timer, i.e., Timer 62-1 is energized.
vi. This paper deals with the direct cyber-attack on a Relay- ii. The Re-Trip Timer, i.e., Timer 62-2 is energized.
PMU to issue false BF I. A Relay-PMU can also be iii. Checks for auxiliary BFP functions like pole discrepancy,
compromised via direct cyber-attacks on it without com- mechanical protection, etc are initiated.
promising the PDC and communication network. As an iv. Trigger is sent to the PDC.
example, an attacker can access a Relay-PMU via pass- When the primary breaker clears the fault before the Main
word hacking or software vulnerability. After exploring Timer 62-1 duration, the 50BF signal becomes "0". So, the
vulnerability of the Relay-PMU, the attacker can send a BFP Scheme Main Output remains "0". It ensures that the
false BFI to the BFP Relay-PMU. Similarly, malware can BFP scheme output never becomes "1" if the primary breaker
be inserted into a Relay-PMU during software update. In has cleared the fault. Similarly, if the primary breaker clears
addition, a Relay-PMU can come with inherent malware. the fault before the Re-Trip Timer 62-2, the 50BF signal
The scope of the proposed scheme is shown in Table I. becomes "0". So, the BFP Re-Trip Output remains "0". The
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
Re-Trip Output becomes ’1’ only when the primary breaker the BFP Relay-PMU which asked for the validation. When
has failed to clear the fault. When the T riggerP oint becomes the BFP Relay-PMU receives the SFVA Decision, it makes
’1’, the check for Auxiliary BFP functions are initiated. These communication status active, i.e., Comm Active = 1 (in Fig.
Auxiliary BFP functions may include: 5). Comm Active status allows the SFVA Decision and Timer
• Pole discrepancy 62-1 output to decide the BFP Scheme Main Output. Similarly,
• Over-voltage Comm Active status also allows the SFVA Decision and the
• Mechanical protection Re-Trip Timer 62-2 to decide the BFP Re-trip output. If the
Depending on the operation philosophy of these Auxiliary BFP BFP Relay-PMU does not receive any SFVA Decision, the
functions, the output of the Auxiliary BFP functions energizes communication status is set to 0, i.e., Comm Active = 0 (in
the Timer 62-3. The output of the Timer 62-3 determines the Fig. 5). A NOT gate is used to enable passing of the Timer 62-
final BFP Scheme Main Output. On receiving the trigger from 1 signal and Re-trip Timer 62-2, if the Comm Active is 0 due
the BFP Relay-PMU, SFVA runs at the PDC. The purpose of to the unavailability of communication network. So, the Timer
SFVA is to check whether the BFI issued is genuine. When 62-1 output and the Re-trip Timer 62-2 output would decide
BFI issued to the BFP Relay-PMU is genuine, SFVA Decision the BFP Scheme Main Output and the BFP Re-trip output,
is "1". When a false BF I is issued to the BFP Relay-PMU, respectively. It behaves like the conventional BFP scheme.
the SFVA Decision is "0". PDC reverts the SFVA Decision to Thus, it is fail-safe to the loss of communication to PDC.
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
Fig. 4 shows the BFP timeline. dt is the communication and mon BFP schemes. The boolean logic equations for trip
processing delay from Relay-PMUs to PDC and vice-versa. and re-trip of the conventional BFP scheme are shown in
So, the time available for the SFVA execution is 200 − (2 ∗ dt ) (3) and (4) respectively. Here, f 1(BF I, 52a, 50BF ) and
ms. As per IEEE Std C37.244-2013, dt is around 30-40 ms f 2(BF I, 52a, 50BF ) indicate the conventional BFP scheme
for implementing protection functions [26]. NERC reports dt outputs Conv_BFP_Trip and Conv_BFP_Re-Trip respectively
of the order of 50 ms [27]. The value of dt depends on which can be made of any logical combinations of the three in-
the communication network properties such as bandwidth, puts to the BFP scheme. Conv_BFP_Trip and Conv_BFP_Re-
architecture, protocol, etc. The desired ’2*dt ’ value can be Trip correspond to Local output and Re-Trip Output respec-
achieved by properly designing the communication network. tively in Fig. 5. The boolean logic equations for trip (Pro-
This study considers dt as 60 ms, which is higher than the posedSchemeTrip) and re-trip (ProposedSchemeRe-Trip) are
cited sources. The duration of Re-Trip Timer 62-2 should be shown in (5) and (6) respectively. The BFP_Auxiliary_Trip of
more than the total of the turn-around communication delay (5) and (6) correspond to the BFP Auxiliary Function Output
from the BFP Relay-PMU to the PDC, SFVA execution time, in Fig. 5. The operators && and || indicate logical AN D and
and a safety margin. Otherwise, the false BF I signal will re- logical OR operations respectively. Following points should
trip the breaker before SFVA Decision reaches the BFP relay- be noted from the equations (5) and (6):
PMU. Therefore, the recommendation for Timer 62-2 duration 1) The proposed scheme trip equation utilizes the conven-
is given by (1). For this study, dt is considered as 60 ms and tional BFP scheme output and checks its validity with the
the total safety margin is 20 ms (one fundamental cycle at SFVA Decision. Therefore, the proposed scheme works
50 Hz). Lab implementation results of the proposed scheme with any existing common BFP scheme.
in section III-E1 mention the maximum SFVA execution time 2) When there is a loss of communication between the BFP
to be 587.63 µs. As per (1), the Timer 62-2 duration comes Relay-PMU and the PDC, the Comm Active becomes
out to be 140.588 ms (60*2+20+0.588 ms). It is equivalent "0" and hence Comm Active becomes "1". Therefore, the
to seven power frequency cycles approximately for 50 Hz proposed scheme trip is an OR operation of conventional
system. When Timer 62-2 is set as per (1), the chance of BFP trip and BFP Auxiliary Function Output. Therefore,
false BFP Re-Trip to the primary breaker is reduced. Lower the proposed scheme is fail-safe to loss of communication
communication delay will lead to lower setting of the Timer between the BFP Relay-PMU and the PDC.
62-2. This will give more time for the breaker operation and
50BF re-set. The duration of the Timer 62-3 is determined by B. Susceptibility and Dynamic Relay White-listing (DRW)
the protection schemes used for implementing the auxiliary A digital relay performs pre-defined computations to distin-
functions such as pole discrepancy protection, over-voltage guish between fault and normal operation. An attack can be
protection, mechanical protection, etc. The duration of Timer launched by exploiting the bug in the hardware or software
62-3 should be more than the total of the BFP auxiliary architecture of the relay. When a Relay-PMU of a particular
protection operation time and the safety margin as per (2). model and maker is attacked, then there is an increased suscep-
tibility to an attack on other Relay-PMUs of the same maker
A. Boolean Logic Expressions for the Proposed Scheme and family because they may share the same vulnerabilities.
This section explains the modifications proposed (Fig. 5) Here, the susceptibility arises because the Relay-PMUs of the
to incorporate cyber-attack resilience in the existing com- same group share similar hardware and software architecture.
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
P roposed Scheme T rip = (Conv_BF P _T rip && Comm Active && SFVA Decision)
∥ (Conv_BF P _T rip && Comm Active) ∥ BF P _Auxiliary_T rip (5)
P roposed Scheme Re − T rip = (Conv_BF P _Re − T rip && Comm Active && SFVA Decision)
∥ (Conv_BF P _T rip && Comm Active) (6)
TABLE II: Relay-PMU Categorisation in a Substation based Relaying Systems" suggests introducing intentional differences
on Maker and Relay Family in redundant protective relaying schemes to avoid common
Relay-PMU Groups General Description modes of failure [28]. The differences in redundant protective
relays can be in different makers, different protection functions
Group 1 Maker A, Relay-PMU Family 1
and/or different operating principles.
Group 2 Maker A, Relay-PMU Family 2
. . TABLE III: Example of Relay-PMU Categorisation for a
. . Typical Substation
Group i Maker M, Relay-PMU Family N
. . Relay-PMU General Description
. . Groups
Group r Maker X, Relay-PMU Family Y Group 1 Transformer Protection Relays - Maker A
Group 2 Transformer Protection Relays - Maker B
Group 3 Feeder Protection Relays - Maker A
So, the same bug/vulnerability is expected to be present in the Group 4 Feeder Protection Relays - Maker B
Relay-PMUs of the same group. As this vulnerability was not Group 5 Generator Protection Relays - Maker A
known before, the Relay-PMUs of the same group remain sus- Group 6 Generator Protection Relays - Maker B
ceptible. Hence, SFVA avoids phasors from such Relay-PMUs. Group 7 Busbar Protection Relays
It is a novel concept introduced by this paper to add a layer of
security against common mode of failure. Improvement in the Table III shows an example of relay grouping in a sub-
power system resiliency metric by implementation of DRW station. Consider the substation has protective relays of two
is explained in the Appendix Section V-B. The Relay-PMUs different makers, namely, Maker A and Maker B. Consider a
in each substation bus are divided into pre-defined groups as case when a feeder protection relay of Maker A, i.e., Group 3
per their maker and family. This grouping is done when the issues a BF I to the BFP Relay-PMU, then the measurements
Relay-PMUs are installed in the substations. Therefore, this that will participate in the SFVA shall be from Groups 1, 2,
grouping is done when there is no cyber-attack in the system. 4, 5, 6 and 7.
Table II shows the Relay-PMU groups for an arbitrary
substation. Consider a case when a Relay-PMU from Group C. Overview of Synchrophasor based Fault Validation Algo-
2 has issued the BF I. In such a case, measurements from all rithm (SFVA)
the groups except Group 2 will participate in the SFVA. This Fig. 6 shows how various BFP schemes will trigger the
exclusion of measurements from Group 2 in the SFVA happens SFVA. It shows four common BFP schemes and their com-
when the BF I is issued to the BFP Relay-PMU and the BFP patibility with the proposed scheme. The part shown in black
Relay-PMU has issued the Trigger to the SFVA. So, the Relay- colour is the existing scheme. The part shown in blue colour
PMU groups participating in the SFVA will be chosen depend- is the modification proposed to incorporate cyber-attack re-
ing on the Relay-PMU group that issued the BF I. Hence, it is silience. When SFVA receives a trigger, DRW determines
named as Dynamic Relay White-listing (DRW). IEEE PSRC Relay-PMUs whose phasors will participate in SFVA. Fig.
WG I report titled "Redundancy Considerations for Protective 7 shows the flowchart of the Synchrophasor-based Fault
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
D. FDA
FDA performs the task of checking whether the fault is
near the BFP Relay-PMU that triggered the SFVA. Usually,
adjacent substation buses observe positive-sequence (pos-seq)
under-voltage (UV). Therefore, the magnitude of pos-seq
voltage can indicate whether a particular Relay-PMU observes
a fault in its vicinity.
1) Hierarchical Voting Scheme
Fig. 9 shows the hierarchical voting scheme for the FDA.
Fig. 8: Six-bus system with BF I issued to the BFP Relay- When a trigger is received, FDA checks the synchrophasors
PMU R from the adjacent substation buses. It shows a general case
of K adjacent substation buses around the location of the
trigger. Relay-PMUs associated with each substation bus are
Validation Algorithm (SFVA). SFVA has two layers: FDA segregated into groups as per pre-determined criteria of sus-
and FCA. Consider a six-bus system shown in Fig. 8. R is ceptibility. DRW will decide the Relay-PMU groups whose
the BFP Relay-PMU on Line 2-4. When BFP Relay-PMU phasors will participate in the SFVA. Bus j considers a general
R receives a BFI from a Relay-PMU, it triggers SFVA at case of N Relay-PMU groups participating in voting after
PDC. Firstly, FDA is executed. FCA is executed only if DRW. Each Relay-PMU group has multiple Relay-PMUs that
FDA’s output is "1". FDA checks whether there is a fault will vote depending on the magnitude of the pos-seq voltage
in the vicinity of the BFP Relay-PMU that received a BFI. they observe.
Usually, faults cause a positive sequence under-voltage at The voting scheme starts from Relay-PMUs as per (7).
the adjacent substation buses. Therefore, FDA checks the |Vrp | is the magnitude of pos-seq voltage observed by the
positive sequence voltages observed by the Relay-PMUs at concerned Relay-PMU. Vth is the threshold voltage set for
the adjacent buses of Bus 2 (in Fig. 8) to find out whether the bus. Different buses can have different Vth .
there is a fault in the vicinity of the origin of the trigger.
Suppose, a primary protection Relay-PMU issues a BFI to |Vrp | < Vth ⇒ V ote 1 ; |Vrp | > Vth ⇒ V ote 0 (7)
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
10
would behave as a conventional BFP scheme. Therefore, TABLE IV: Computational Requirements of the Proposed
it is fail-safe to the cyber-attacks on the PDC and the Scheme
communication network. Algorithm Tasks Nature Real-time
9) PMU Reporting Rates: The proposed method can work Complexity
with existing 30-120Hz (IEEE) or higher (IEC) reporting
Relay Grouping Offline Not
rates. Reporting rates are not a constraint for the proposed
in DRW Applicable
algorithm. In some situation, it is better if the reporting
Exclusion of Real-time, Logical Operations
rate is higher. Then, the synchrophasors are available at
Measurements Non-iterative
smaller time intervals which reduces the waiting time for
in DRW
the synchrophasors. This may improve the SFVA Decision
FDA Real-time, Logical Operations
time of the proposed algorithm.
Non-iterative
10) Scalability: In practice, any WAMS system is designed
FCA Real-time, Solving few
considering the applications which will run on that system
Non-iterative Algebraic Equations
and also the timing requirements. The communication
depending on the
bandwidth and other network parameters will be selected
number of adjacent
by considering the size of the system and levels of
buses participating
PDCs (regional and national PDCs). In this case also,
in SFVA
the WAMS systems should be designed or upgraded
Proposed BFP Real-time, Few Boolean
appropriately considering the proposed method. As a
Logic Non-iterative Operations
result, our proposed method is scalable to any size of
Evaluation
power systems network.
as per (5) and (6)
G. Computational Requirements
Table IV shows the breakup of the steps involved in the
proposed scheme and their computational requirements. The
steps in the proposed scheme are as follows:
1) Relay-PMU Grouping in DRW: The grouping of Relay-
PMUs in the substation, depending on its maker and
family, is done at the time of the installation of the
Relay-PMUs in the substation. Therefore, it’s not a real-
time process. Hence, there is no real-time computational
complexity involved in this process. Fig. 12: Proposed scheme considered for the test cases
2) Exclusion of Measurements in DRW: The exclusion of
measurements from the relay-group that issued the trigger
by PSCAD simulations and lab implementation emulating
to the proposed scheme happens in real-time. It is non-
synchrophasor communication for a part of the IEEE-118 bus
iterative in nature. It involves logical operations to avoid
system [39] as shown in Fig. 13. The communication and
measurements from a specific relay-group to participate
processing delay dt (shown in Fig. 4) is considered 60 ms.
in the SFVA.
So, the time available for SFVA execution is (200 − 2 ∗ dt ),
3) FDA: FDA is executed in real-time. It checks whether
i.e., 80 ms. Though the results are shown for this particular
there is a fault near the BFP Relay-PMU that triggered
BFP scheme, the results can be extended to all common
the SFVA. Its computation is non-iterative in nature. It
BFP schemes [15]. The part shown in blue colour is the
involves comparing the pos-seq voltage with the threshold
modifications proposed to incorporate cyber-attack resilience.
for each Relay-PMU participating in SFVA. It is followed
Cyber-attack is initiated by giving a false BF I.
by a general p out of q voting scheme.
4) FCA: FCA is executed in real-time. It checks whether A. Threshold Voltage and Voting Scheme Determination
the fault is within the zone of the Relay-PMU that issued
the BF I to the BFP Relay-PMU. Its computation is non- 1) Threshold Voltage Determination
iterative in nature. It involves solving algebraic equations NERC Guideline [29], GB Grid Code [40] and Indian Grid
depending on the number of adjacent buses participating Code [30] allow voltage deviation of ±5% at the transmission
in the SFVA. substations. So, Vth of 0.95 pu is chosen in this sub-section.
5) Proposed BFP Logic Evaluation: The boolean equations 2) Voting Scheme Determination
for the proposed BFP scheme are shown in (5) and (6). It The voting scheme considers the following:
is real-time and non-iterative in nature. It involves a few • Transformers between Bus 17 and Bus 30, and Bus 37
boolean operations. and Bus 38: Buses 17, 30 and Buses 37, 38 will vote
identically in FDA.
III. R ESULTS • Long line between Bus 38 and Bus 65: Fault studies show
Fig. 12 shows the proposed scheme employed for the vali- that for a fault near Bus 30, Bus 65 does not violate the
dation. The performance of the proposed scheme is validated voltage threshold. So it may vote "0" in FDA.
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
11
Fig. 13: Part of IEEE-118 bus system in one and half breaker scheme and the lab implementation setup image
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
12
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
13
Fig. 18: Test case 5: Magnitude of pos-seq voltage at adjacent Fig. 19: Test case 6: Magnitude of Pos-Sequence voltage at
buses when there is an AG fault at 5% length on Line 30-38, adjacent buses when AG fault at 50% length on Line 38-65,
i.e., F3 i.e., F4
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
14
• SFVA execution time was in the range from 368.31 µs TABLE V: SFVA Execution Time at PDC
to 553.54 µs with a mean of 413.24 µs. Subject General Description
3) Comparison of the proposed BFP scheme with the Con- PDC Computer Intel Core i5 Processor
ventional BFP scheme Configuration with 3.2 GHz frequency
Operating System Ubuntu Linux (Non-real Time)
• Performance of conventional BFP scheme: Fig. 21 shows
Minimum SFVA 367.23 µs
the conventional BFP scheme employed for validating
execution time
the proposed scheme. The conventional BFP scheme has
Maximum SFVA 587.63 µs
two inputs 50BF and the BFI. 50BF is the instantaneous
execution time
overcurrent element for the BFP scheme. As explained
in Section I, the setting of the 50BF is very sensitive. Mean SFVA 400.77 µs
Therefore, its value is "1" at rated loading conditions. execution time
Timer 62-1 is an ON-delay timer, i.e., its output becomes
"1" when the input is "1" for the duration of Timer 62-
1. When the attacker issues a false BFI, the input to the IV. C ONCLUSION
Timer 62-1 becomes "1". After the duration of Timer 62- The paper proposes a novel cyber-attack-resilient BFP
1 expires, the BFP scheme output becomes "1". Hence, it scheme using Wide Area Measurements. The proposed scheme
leads to false BFP operation and consequently, trips the validates the authenticity of the BFI issued to the BFP scheme
backup breakers. using WAMS. Test cases 1 and 3 use PSCAD simulations
on IEEE-118 bus system to show that the proposed scheme
detects cyber-attack and blocks false BFP trip in no-fault
conditions. PSCAD simulations for test cases 2, 4 and 5 show
that the proposed scheme allows legitimate BFP trips. Test
cases 6 and 7 show that the proposed scheme works well
even when a cyber-attack is executed simultaneously with a
Fig. 21: Conventional BFP scheme considered for the test power system fault. Lab implementation of test cases 6 and 7
cases verify that the execution time of the proposed scheme is well
within the time budget of the BFP scheme. Dynamic Relay
White-listing avoids phasors from susceptible Relay-PMUs
• Performance of the proposed BFP scheme: Fig. 12 shows from participating in the proposed scheme. Hence it adds a
the proposed BFP scheme employed for validating the layer of security. Simulation results and lab implementation
proposed scheme. Consider test case 6 to validate the confirm that the proposed scheme can effectively detect a false
performance of the proposed scheme. Fake BF I is issued BF I issued to the BFP scheme and block the false BFP trip
to the BFP Relay-PMU by a Feeder-protection Relay- command in healthy as well as faulted conditions.
PMU while an AG fault is observed at 50% length on
Line 38-65 named as F4 in Fig. 13. The execution details V. A PPENDIX
are as follows:
A. Likelihood of a Cyber-attack on BFP
1) Value of 50BF element is "1". Therefore, it triggers
the SFVA at PDC. This sub-section first presents the equations for reward for
2) DRW excludes the measurements from the same cyber-attack in power systems. Then, it presents the expression
Relay-PMU group. for the likelihood for a cyber-attack. Finally, it uses these
3) FDA votes "1" as per 4 out of 7 voting at Bus Voting equations to explain the likelihood of BFP operation caused
Block Level. by cyber-attack.
4) FCA confirms that fault is not on line 30-38. Therefore, Given a system state, the cyber-attacker aims to maximize
FCA decision is "0". the sum of two rewards [41]:
5) Since FCA decision is "0", SFVA Decision is "0". • Net reward of current attack: Power system changes
6) Since SFVA Decision is zero, the BFP scheme output states when an event happens due to a cyber-attack. The
becomes "0". Therefore, the output of the proposed new state caused by cyber-attack may lead to deteriora-
BFP scheme is zero. Hence, it avoids the mal-operation tion of the system performance such as system stability,
of the BFP scheme. loss of load, etc. The attacker assesses the estimated
7) Table V shows the execution details of the proposed impacts of the current attack using net reward. The effort
scheme. The PDC computer configuration is Intel required to make a cyber-attack is modelled by a “cost”.
i5 processor with 3.2 GHz frequency. The operating The net reward is the reward minus the cost.
system employed was Ubuntu Linux (non-real time). • Aggregate reward from potential future attacks: If
The SFVA execution time ranged from 367.23 µs to the current attack remains undetected, the attacker may
587.64 µs with a mean execution time of 400.77 µs. launch future attacks which may further deteriorate the
The time of execution shows that the proposed scheme system performance. The attacker will also try to maxi-
is computationally efficient. mize the aggregated rewards from the future attacks. If
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
15
the current attack is detected, the operator will try to limit studies. The concept of “common failure modes” is also
the future choices of attacks. popularly used in the design of resilient protection schemes
Now, suppose, S = {s1 , s2 , ..., sn } is the set of power for power systems. If the Relay-PMUs belong to the same
system states. A = {a1 , a2 , ..., an } is the set of actions caused group (maker and family), there will be significant “common
by cyber-attacks. p(si |si−1 , ai−1 ) is the probability of system failure modes”. If a Relay-PMU of a group gets compromised,
transiting to a new state si from state si−1 due to the action then the chance of other Relay-PMUs from the same group
ai−1 . G(si−1 , ai−1 ) is the cost for the cyber-attacker for taking getting compromised is high due to “common failure modes”.
action ai−1 at state si−1 . R(si |si−1 , ai−1 ) is the reward to The DRW increases the reliability and resiliency by decreasing
the cyber-attacker when system state transits from si−1 to si the “common failure modes” with respect to the compromised
due to action ai−1 . R(si−1 , ai−1 ) is the expected immediate relay (due to cyber-attack) issuing false BF I. This sub-section
reward from action ai−1 at si−1 . The likelihood of attack ai−1 provides a probability-based analysis to explain the theoretical
at state si−1 is L(ai−1 , si−1 ). relation between the DRW and resilience metrics.
The expected immediate reward from action ai−1 at state
si−1 is shown in (8) [41]. Suppose, there are two groups of Relay-PMUs as per the
Dynamic Relay White-listing (DRW) as shown in Fig. 22. R11
is the compromised relay (due to cyber-attack) which is issuing
R(si−1 , ai−1 ) = E[R(si |si−1 , ai−1 )] false BF I to trigger BFP. Wrong triggering of BFP (due to
X cyber-attack) will impact the following resilient metrics:
= p(si |si−1 , ai−1 ) · (R(si |si−1 , ai−1 )) (8)
si ∈S • Loss-of-load Probability
Therefore, the likelihood of attack ai−1 at state si−1 is • Customer Disruption Probability
L(ai−1 , si−1 ) which is proportional to the "Net reward of • Blackout Probability
current attack" as shown in (9). Table VI shows the various attacks and their descriptions
L(ai−1 , si−1 ) ∝ (R(si−1 , ai−1 ) − G(si−1 , ai−1 )) (9) for the system shown in Fig. 22. Moreover, (10) represents the
probability of wrong operation of SFVA. The (11) represents
Now, a cyber attacker will choose BFP if the attacker finds the probability of wrong operation of BFP.
the value of “Net reward of current attack” comparatively
higher for BFP. During cyber-attack caused mal-operation of
R1 BFP relay, Breakers B2, B3, B4 and B5 open as back-up p(SF V A_wrong) = P robability of wrong operation of SF V A
as shown in Fig. 1. This leads to larger system disturbance (10)
(in terms of load/generation loss and stability deterioration)
in comparison to single line tripping due to cyber-attack.
p(BF P _wrong) = P robability of wrong operation of BF P
The larger system disturbance can lead to bigger system
(11)
performance issues.
The value of R(si−1 , ai−1 ) in (8) will be higher for BFP in 1) Without DRW
comparison to single transmission line tripping due to cyber- Now, Relay-PMUs within a group (such as Group 1 in
attack. As G(si−1 , ai−1 ) value primarily depends on the relay Fig. 22) will have higher common failure modes with respect
hardware and software rather than protection type, therefore to cyber-attacks due to the use of common hardware and
the cost to the attacker will be similar irrespective of the software platforms. As a result, probabilities p(R12F |R11F )
protection being attacked. As a result, the likelihood value and p(R13F |R11F ) will be higher as shown in (12) and (13).
L(ai−1 , si−1 ) will be higher for BFP in comparison to primary
protection which opens a transmission line. p(R12F |R11F ) = Higher (12)
B. Relation between DRW and Resliency Metrics
The concept of DRW is inspired from “common failure p(R13F |R11F ) = Higher (13)
modes” which is popularly used in reliability and resiliency
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
16
Fig. 23: SFVA success probability while using DRW and without DRW
TABLE VI: Descriptions of Attacks measurements from Relay-PMUs without DRW increases the
Event Description probability of wrong BFP trip, large loss-of-load, larger cus-
tomer disruption and blackout. Therefore, non-implementation
R11F Compromise of Relay-PMU R11 by cyber-attack of DRW leads to compromise in the resiliency metrics likes
R12F Compromise of Relay-PMU R12 by cyber-attack loss-of-load, customer disruption and blackout.
R13F Compromise of Relay-PMU R13 by cyber-attack 2) With DRW
R21F Compromise of Relay-PMU R21 by cyber-attack Now, if DRW is used, then Relay-PMUs from a different
R22F Compromise of Relay-PMU R22 by cyber-attack group (such as Group 2 in Fig. 22) will have lower common
R23F Compromise of Relay-PMU R23 by cyber-attack failure modes with respect to cyber-attacks due to lesser
amount of common hardware and software platforms. As a
result, probabilities p(R21F |R11F ) and p(R22F |R11F ) will be
Fig. 23 shows the Relay-PMUs whose measurements will lower as shown in (12) and (13).
be employed for the SFVA implementation. When there is
no DRW, measurements from R12 and R13 may be used. In
p(R21F |R11F ) = Lower (22)
that situation, the probability of SFVA mal-operation will be
higher, i.e., p(SF V A_wrong) = higher.
From (14), (15), (16) and (17), it can be said that employing p(R22F |R11F ) = Lower (23)
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
17
Fig. 23 shows the Relay-PMUs whose measurements will be [17] X. Feng, L. Tan, Y. Wang, Y. Mao, J. Qiao, X. Yin, and D. Shi,
employed for the SFVA implementation. When there is DRW, “Improved generator circuit breaker failure protection method combined
with voltage quantities,” Energy Reports, vol. 8, pp. 419–427, 2022.
it means we would employ measurements from R21 and R22 . [18] M. Thompson and D. Finney, “New voltage-based breaker failure
Then the probability of SFVA mal-operation will be lower, scheme for generators,” in 15th International Conference on Develop-
i.e., p(SF V A_wrong) = lower. ments in Power System Protection (DPSP 2020), 2020.
[19] Y. Xue, M. Thakhar, J. C. Theron, and D. P. Erwin, “Review of the
From (18), (19), (20) and (21), it can be said that the use breaker failure protection practices in utilities,” in 2012 65th Annual
of measurements from Relay-PMUs after DRW decreases the Conference for Protective Relay Engineers. IEEE, 2012, pp. 260–268.
chance of wrong BFP activation. Therefore, implementation [20] B. Kasztenny, V. Muthukrishnan, and T. S. Sidhu, “Enhanced numerical
breaker failure protection,” IEEE Transactions on Power Delivery,
of DRW leads to better resiliency metrics such as lower vol. 23, no. 4, pp. 1838–1845, 2008.
probabilities of loss-of-load, customer disruption and blackout. [21] SEL-352, Breaker Failure and Monitoring Relay, SEL, 2011.
[22] Multilin 850, Feeder Protection System, GE Grid Solutions, 2018.
[23] B. Kasztenny and M. J. Thompson, “Breaker failure protec-
tion—standalone or integrated with zone protection relays?” in 2011
R EFERENCES 64th Annual Conference for Protective Relay Engineers. IEEE, 2011,
pp. 385–395.
[1] J. Slowik, “Crashoverride: Reassessing the 2016 ukraine electric power [24] S. Zubic, Z. Gajic, and D. Kralj, “Line protection operate time: How
event as a protection-focused attack,” Dragos, Inc, 2019. fast shall it be?” IEEE Access, vol. 9, pp. 75 608–75 616, 2021.
[2] A. Ameli, A. Hooshyar, E. F. El-Saadany, and A. M. Youssef, “An [25] “IEEE Standard for Synchrophasor Data Transfer for Power Systems,”
intrusion detection method for line current differential relays,” IEEE IEEE Std C37.118.2-2011 (Revision of IEEE Std C37.118-2005), pp.
Transactions on Information Forensics and Security, vol. 15, pp. 329– 1–53, 2011.
344, 2019. [26] “IEEE Guide for Phasor Data Concentrator Requirements for Power
[3] A. Ameli, A. Hooshyar, and E. F. El-Saadany, “Development of a cyber- System Protection, Control, and Monitoring,” IEEE Std C37.244-2013,
resilient line current differential relay,” IEEE Transactions on Industrial pp. 1–65, 2013.
Informatics, vol. 15, no. 1, pp. 305–318, 2019. [27] “PMU Placement and Installation,” Guideline, NERC Reliability, NERC,
[4] A. Ameli, A. Ayad, E. F. El-Saadany, M. M. A. Salama, and A. Youssef, Atlanta, GA, USA, 2016.
“A learning-based framework for detecting cyber-attacks against line [28] "Redundancy Considerations for Protective Relaying Systems", PSRC
current differential relays,” IEEE Transactions on Power Delivery, Working Group 119 Report, 2010.
vol. 36, no. 4, pp. 2274–2286, 2021. [29] “Reliability Guideline: Reactive Power Planning,” Guideline, NERC
[5] Y. M. Khaw, A. Abiri Jahromi, M. F. M. Arani, S. Sanner, D. Kundur, Reliability, NERC, Atlanta, GA, USA, 2016.
and M. Kassouf, “A deep learning-based cyberattack detection system [30] “Indian Electricity Grid Code,” National Grid Electricity Transmission,
for transmission protective relays,” IEEE Transactions on Smart Grid, 2017.
vol. 12, no. 3, pp. 2554–2565, 2021. [31] Z. Xu, S. Huang, L. Ran, J. Liu, Y. Qin, Q. Yang, and J. He, “A distance
[6] N. K. Kandasamy, “An investigation on feasibility and security for protection relay for a 1000-kv uhv transmission line,” IEEE Transactions
cyberattacks on generator synchronization process,” IEEE Transactions on Power Delivery, vol. 23, no. 4, pp. 1795–1804, 2008.
on Industrial Informatics, vol. 16, no. 9, pp. 5825–5834, 2019. [32] Y. Liang, Z. Lu, W. Li, W. Zha, and Y. Huo, “A novel fault impedance
calculation method for distance protection against fault resistance,” IEEE
[7] A. S. Mohamed, M. F. M. Arani, A. A. Jahromi, and D. Kundur, “False
Transactions on Power Delivery, vol. 35, no. 1, pp. 396–407, 2020.
data injection attacks against synchronization systems in microgrids,”
[33] F. B. Ajaei, M. Sanaye-Pasand, M. Davarpanah, A. Rezaei-Zare, and
IEEE Transactions on Smart Grid, vol. 12, no. 5, pp. 4471–4483, 2021.
R. Iravani, “Mitigating the impacts of ccvt subsidence transients on the
[8] J. Hong, R. F. Nuqui, A. Kondabathini, D. Ishchenko, and A. Martin,
distance relay,” IEEE transactions on power delivery, vol. 27, no. 2, pp.
“Cyber attack resilient distance protection and circuit breaker control
497–505, 2012.
for digital substations,” IEEE Transactions on Industrial Informatics,
[34] E. P. Machado, D. Fernandes, and W. L. A. Neves, “Tuning ccvt fre-
vol. 15, no. 7, pp. 4332–4341, 2018.
quency response data for improvement of numerical distance protection,”
[9] A. Ahmed, V. V. G. Krishnan, S. A. Foroutan, M. Touhiduzzaman, IEEE Transactions on Power Delivery, vol. 33, no. 3, pp. 1062–1070,
C. Rublein, A. Srivastava, Y. Wu, A. Hahn, and S. Suresh, “Cyber 2018.
physical security analytics for anomalies in transmission protection [35] D. Ritzmann, P. S. Wright, W. Holderbaum, and B. Potter, “A method
systems,” IEEE Transactions on Industry Applications, vol. 55, no. 6, for accurate transmission line impedance parameter estimation,” IEEE
pp. 6313–6323, 2019. Transactions on instrumentation and measurement, vol. 65, no. 10, pp.
[10] M. S. Rahman, M. A. Mahmud, A. M. T. Oo, and H. R. Pota, “Multi- 2204–2213, 2016.
agent approach for enhancing security of protection schemes in cyber- [36] H. Goklani, G. Gajjar, and S. A. Soman, “Instrument transformer
physical energy systems,” IEEE Transactions on Industrial Informatics, calibration and robust estimation of transmission line parameters using
vol. 13, no. 2, pp. 436–447, 2017. pmu measurements,” IEEE Transactions on Power Systems, vol. 36,
[11] J. Yang, C. Zhou, S. Yang, H. Xu, and B. Hu, “Anomaly detection based no. 3, pp. 1761–1770, 2021.
on zone partition for security protection of industrial cyber-physical [37] S. Gajare and A. K. Pradhan, “An accurate fault location method for
systems,” IEEE Transactions on Industrial Electronics, vol. 65, no. 5, multi-circuit series compensated transmission lines,” IEEE Transactions
pp. 4257–4267, 2018. on Power Systems, vol. 32, no. 1, pp. 572–580, 2017.
[12] J. Wang, D. Shi, Y. Li, J. Chen, H. Ding, and X. Duan, “Distributed [38] M. Saha, J. Izykowski, E. Rosolowski, and B. Kasztenny, “A new
framework for detecting pmu data manipulation attacks with deep accurate fault locating algorithm for series compensated lines,” IEEE
autoencoders,” IEEE Transactions on Smart Grid, vol. 10, no. 4, pp. Transactions on Power Delivery, vol. 14, no. 3, pp. 789–797, 1999.
4401–4410, 2019. [39] S. Peyghami, P. Davari, M. Fotuhi-Firuzabad, and F. Blaabjerg, “Stan-
[13] S. Sheng, W. L. Chan, K. K. Li, D. Xianzhong, and Z. Xiangjun, “Con- dard test systems for modern power system analysis: An overview,”
text information-based cyber security defense of protection system,” IEEE Industrial Electronics Magazine, vol. 13, no. 4, pp. 86–105, 2019.
IEEE Transactions on Power Delivery, vol. 22, no. 3, pp. 1477–1481, [40] “THE GRID CODE,” Central Electricity Regulatory Commission, 2010.
2007. [41] Y. Hao, M. Wang, and J. H. Chow, “Likelihood analysis of cyber
[14] S. Chakrabarty and B. Sikdar, “Detection of hidden transformer tap data attacks to power systems with markov decision processes,” IEEE
change command attacks in transmission networks,” IEEE Transactions Transactions on Smart Grid, vol. 9, no. 4, pp. 3191–3202, 2018.
on Smart Grid, vol. 11, no. 6, pp. 5161–5173, 2020.
[15] IEEE Guide for Breaker Failure Protection of Power Circuit Breakers,
IEEE Std C37.119-2016 (Revision of IEEE Std C37.119-2005), pp. 1–73,
2016.
[16] A. Radhakrishnan and S. Das, “Impact of converter-interfaced renewable
generations on breaker failure protection of the emanant transmission Paawan Kirankumar Dubal obtained his B.Tech degree in Electrical Engi-
lines,” IET Renewable Power Generation, vol. 15, no. 3, pp. 641–652, neering from the School of Technology of Pandit Deendayal Energy University
2021. in 2016. He carried out this research work while pursuing M.Tech(Research)
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Transactions on Smart Grid. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TSG.2024.3372632
18
Sarasij Das (Senior Member, IEEE) received the Ph.D. degree from the
University of Western Ontario, London, ON, Canada, in 2014. He was with the
Schneider Electric India Pvt. Ltd., Bangalore, India, and Power Research and
Development Consultants Pvt. Ltd., Bangalore, India. He is currently working
as an associate professor at the Electrical Engineering Department of Indian
Institute of Science, Bangalore, India.
Authorized licensed use limited to: Universität Leipzig. Downloaded on March 11,2024 at 10:43:43 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.