Professional Documents
Culture Documents
Full download Cyberphysical Infrastructures in Power Systems : Architectures and Vulnerabilities Magdi S. Mahmoud file pdf all chapter on 2024
Full download Cyberphysical Infrastructures in Power Systems : Architectures and Vulnerabilities Magdi S. Mahmoud file pdf all chapter on 2024
https://ebookmass.com/product/microgrid-cyberphysical-systems-
renewable-energy-and-plug-in-vehicle-integration-1st-edition-
bidyadhar-subudhi/
https://ebookmass.com/product/emerging-trends-in-applications-
and-infrastructures-for-computational-biology-bioinformatics-and-
systems-biology-systems-and-applications-1st-edition-arabnia/
https://ebookmass.com/product/big-data-application-in-power-
systems-reza-arghandeh/
https://ebookmass.com/product/intelligent-data-mining-and-
analysis-in-power-and-energy-systems-models-and-applications-for-
smarter-efficient-power-systems-1st-edition-zita-a-vale/
Power and Liberty: Constitutionalism in the American
Revolution Gordon S. Wood
https://ebookmass.com/product/power-and-liberty-
constitutionalism-in-the-american-revolution-gordon-s-wood/
https://ebookmass.com/product/power-in-deliberative-democracy-
norms-forums-systems-nicole-curato/
https://ebookmass.com/product/emerging-cyber-threats-and-
cognitive-vulnerabilities-vladlena-benson/
https://ebookmass.com/product/voltage-stability-in-electrical-
power-systems-1st-edition-farid-karbalaei/
https://ebookmass.com/product/power-and-ideology-in-south-
african-translation-a-social-systems-perspective-maricel-botha/
CYBERPHYSICAL
INFRASTRUC-
TURES IN POWER
SYSTEMS
This page intentionally left blank
CYBERPHYSICAL
INFRASTRUC-
TURES IN POWER
SYSTEMS
Architectures and Vulnerabilities
MAGDI S. MAHMOUD
King Fahd University of Petroleum and Minerals
Systems Engineering Department
Dhahran, Saudi Arabia
HARIS M. KHALID
Higher Colleges of Technology
Department of Electrical and Electronics Engineering
Sharjah, United Arab Emirates
MUTAZ M. HAMDAN
King Fahd University of Petroleum and Minerals
Systems Engineering Department
Dhahran, Saudi Arabia
Academic Press is an imprint of Elsevier
125 London Wall, London EC2Y 5AS, United Kingdom
525 B Street, Suite 1650, San Diego, CA 92101, United States
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
Copyright © 2022 Elsevier Inc. All rights reserved.
ISBN: 978-0-323-85261-6
Part 1. Background
1. Overview 3
1.1. Cyberphysical security modeling systems (CPS) 4
1.1.1. Introduction 4
1.1.2. Wide-area monitoring, protection and control systems 5
1.1.3. Wide-area protection 5
1.1.4. Phasor measurement units 6
1.2. Cyberattack taxonomy 6
1.2.1. Cyberattack classification 8
1.2.2. Coordinated attacks on WAMPAC 8
1.2.3. Cyberphysical security using game-theoretic approach 9
1.2.4. Cyberlayer risk assessment 11
1.2.5. Attack modeling 12
1.2.6. Game formulation and solution strategies 13
1.3. Challenges in cyberphysical power systems 14
1.3.1. Signal sampling 14
1.3.2. Signal quantization 15
1.3.3. Communication delay 18
1.3.4. Packet dropouts 21
1.3.5. Medium access constraints 27
1.3.6. Channel fading 28
1.3.7. Power constraints 29
1.4. Secure industrial control systems 35
1.4.1. Introduction 35
1.4.2. Progress of SICS 36
1.4.3. Major security objectives 37
1.5. Game-theoretic methods 39
1.5.1. Robustness issue 39
1.5.2. Resilient control design 40
1.5.3. Hierarchical systems 42
1.5.4. Physical layer control system problem 43
1.6. Notes 45
References 46
vii
viii Contents
Index 389
About the authors
sioned. Other terms that you might hear when discussing these and related
CPS technologies include
• internet of things (IoT),
• industrial internet,
• smart cities,
• smart grid.
In addressing CPS design challenges, it is important to take into considera-
tion that a resilient CPS design includes three features:
Stability: No matter how the environment generates noise and uncer-
tain factors, the control system should always reach a stable decision result
eventually;
Security: The system should be able to detect and countermeasure cy-
berphysical interaction attacks;
Systematization: The cyber and physical components should be seam-
lessly integrated together into a systematic design.
The impact of the development of sensor technology, electromechanical
systems, and digital communication networks enhances the fundamental
framework and motivates the dynamic growth of control systems (CSs).
Effectively, the elements of CSs are more intelligent, and they will never
act as the single role of a controlled object or controller, rather an agent is
now capable of integrating sensing, computing, and executing.
Power systems are very complex artificial systems. With the devel-
opment of the smart grid, high penetration of wind, solar power, and
customers’ active participation have lead smart grids to operate in more
uncertain, complex environments. Traditional power system analysis and
control decision-making are primarily dependent on physical modeling and
numerical calculations. The traditional methods find difficulty in address-
ing uncertainty and partial observability issues so that they cannot meet the
requirements of future development of smart grids. On the other hand,
widespread deployment of advanced metering infrastructures (AMI), wide-
area monitoring systems (WAMSs), and other monitoring/management
systems produce massive data and provide a data basis for algorithm/model
training in AI applications and the design of improved safe (secure) con-
trol/estimation/fault tolerant methods. These will be some of the enabling
technologies for the future development and success of smart grids.
Outstanding issues in this regard include:
• The uncertainties of wind and solar energy cause many challenges for
power systems. We should look for a potentially powerful tool to im-
Preface xix
prove solar and wind generation prediction accuracy based on large data
sets.
• Research activities to provide effective solutions for managing flexible
sources, including load forecasting, scheduling, dealing, etc.
In an uncertain and complex environment, to ensure secure and stable
operations of large-scale power systems is one of the greatest challenges
that power engineers have to address today. Traditionally, power system
operations and decision-making of controls are based on power system
computations of physical models describing the behavior of power systems.
Largely, physical models are constructed according to some assumptions and
simplifications, and such is the case with power system models. However,
the complexity of power system stability problems, along with the system’s
inherent uncertainties and nonlinearities, can result in models that are im-
practical or inaccurate. This calls for adaptive or deep-learning algorithms
to significantly improve current control schemes that solve decision and
control problems.
This book addresses advanced distributed methods for the important
topic of CPS infrastructures in power systems. The chief goal of this book
is to provide the readership with a high-level treatment and an extensive
overview of CPS concepts and infrastructures in power systems with a focus
on the current, state-of-the-art research in this field. Detailed classifications
are pursued highlighting existing solutions, problems, and developments in
this area.
The content is divided into three parts, which include the following
chapters:
Part 1: Background
Chapter 1 (Overview): In this chapter, an extensive overview of cyber-
physical system concepts and infrastructures in power systems is carried out
with a focus on the current, state-of-the-art research in this field. Detailed
classifications are pursued highlighting existing solutions, problems, and de-
velopments in this area.
Chapter 2 (Smart grids: control and cybersecurity): This chapter
presents a modeling framework and defines the intended problem for-
mulation. The dynamics of some typical practical cases are presented, such
as SCADA networks, excitation systems, generator protection, voltage and
frequency compensators, and economic dispatch scenarios where subse-
quently proposed algorithms are applied.
Part 2: Control, estimation, and fault detection
Another random document with
no related content on Scribd:
Minut oli suljettu pois, tuomittu ikuisesti! Miten pääsin kotiin, miten
kestin tämän päivän kurjuuden, miten minun onnistui salata syvä
kärsimyksen! omaisiltani — en tiedä. Tiedän vain, että pienet
sisarentyttäreni, joita suunnattomasti rakastin, näyttivät katseillaan
sanovan minulle: »Mitä etsit sinä, kadotettu enkeli, meidän
paratiisistamme?»
10. SISÄSTÄPÄIN ULOSPÄIN
Tunteet eivät voineet minua tyydyttää, kun älyni yhä pyrki uusille
urille. Käsitin loukkaavani ystävättäreni hellää mieltä, hän oli ärtynyt,
vieläpä mustasukkainenkin, kun muka huomasi, että seurustelin
enemmän muiden nuorten tyttöjen kanssa kuin hänen. Olin
pahoillani nähdessäni hänen kärsivän, mutta en voinut auttaa asiaa.
En ollut vielä hetikään saanut rauhaa uskonnollisilta kysymyksiltä.
En voinut koskaan kuulla puhuttavan ehtoollis-sakramentista
tuntematta samaa sisäistä vavistusta kuin ripillepääsy-päivänäni.
Onneksi ei perheeni erittäin ankarasti noudattanut kirkollisia tapoja ja
kesti kauan ennenkuin alettiin puhua uudesta ripilläkäynnistä. Nämä
ajatukset alkoivat kuitenkin jo jonkun verran hälvetä mielestäni. Olin
alkanut intohimoisesti tutkia historiaa ja kirjallisuutta. Olin siihen
aikaan kahden naiskirjailijan, Bettina von Arnimin ja Rahelin
lumoissa. Rahelin vakava, filosofinen, siveä ja suuremmoinen henki
miellytti minua enemmän ja liikutti syvästi mieltäni. Mutta Bettinan
runolliset, tenhoavat haaveet kiehtoivat minut »kesäyönunelmiin».
Hän kehitti mielikuvitus-maailmaani, jonka olin tahtonut
väkivaltaisesti tukahuttaa itsessäni dogmien askeettisen hengen
vaikutuksesta.