Optimal Power Flow: Closing the Loop over Corrupted Data André Teixeira, Henrik Sandberg, György Dán, and Karl H. Johansson ACCESS Linnaeus Centre, KTH.

Slides:



Advertisements
Similar presentations
Spoofing State Estimation
Advertisements

1 1 Slide Chapter 1 & Lecture Slide Body of Knowledge n Management science Is an approach to decision making based on the scientific method Is.
Marzieh Parandehgheibi
Decision analysis: part 2
1/22 Competitive Capacity Sets Existence of Equilibria in Electricity Markets A. Downward G. ZakeriA. Philpott Engineering Science, University of Auckland.
Optimization of thermal processes2007/2008 Optimization of thermal processes Maciej Marek Czestochowa University of Technology Institute of Thermal Machinery.
Presenter: Raghu Ranganathan ECE / CMR Tennessee Technological University March 22th, 2011 Smart grid seminar series Yao Liu, Peng Ning, and Michael K.
Lingwen Gan1, Na Li1, Ufuk Topcu2, Steven Low1
The Simplex Algorithm An Algorithm for solving Linear Programming Problems.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
A Kolmogorov Complexity Approach for Measuring Attack Path Complexity By Nwokedi C. Idika & Bharat Bhargava Presented by Bharat Bhargava.
Matching a 3D Active Shape Model on sparse cardiac image data, a comparison of two methods Marleen Engels Supervised by: dr. ir. H.C. van Assen Committee:
Finite Mathematics & Its Applications, 10/e by Goldstein/Schneider/SiegelCopyright © 2010 Pearson Education, Inc. 1 of 99 Chapter 4 The Simplex Method.
Efficient Estimation of Emission Probabilities in profile HMM By Virpi Ahola et al Reviewed By Alok Datar.
1 EE 616 Computer Aided Analysis of Electronic Networks Lecture 9 Instructor: Dr. J. A. Starzyk, Professor School of EECS Ohio University Athens, OH,
1 Linear Programming Using the software that comes with the book.
1 1 Slide LINEAR PROGRAMMING Introduction to Sensitivity Analysis Professor Ahmadi.
D Nagesh Kumar, IIScOptimization Methods: M3L4 1 Linear Programming Simplex method - II.
ECE 530 – Analysis Techniques for Large-Scale Electrical Systems
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
Chapter 4 The Simplex Method
EE 369 POWER SYSTEM ANALYSIS
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Computing Equilibria in Electricity Markets Tony Downward Andy Philpott Golbon Zakeri University of Auckland.
Yuan Chen Advisor: Professor Paul Cuff. Introduction Goal: Remove reverberation of far-end input from near –end input by forming an estimation of the.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
1 The Role of Sensitivity Analysis of the Optimal Solution Is the optimal solution sensitive to changes in input parameters? Possible reasons for asking.
Sampling. Concerns 1)Representativeness of the Sample: Does the sample accurately portray the population from which it is drawn 2)Time and Change: Was.
Alternative Measures of Risk. The Optimal Risk Measure Desirable Properties for Risk Measure A risk measure maps the whole distribution of one dollar.
Real-Time Optimization (RTO) In previous chapters we have emphasized control system performance for load and set-point changes. Now we will be concerned.
1 A Fast-Nonegativity-Constrained Least Squares Algorithm R. Bro, S. D. Jong J. Chemometrics,11, , 1997 By : Maryam Khoshkam.
Machine Learning Seminar: Support Vector Regression Presented by: Heng Ji 10/08/03.
Relationship Between in-situ Information and ex-situ Metrology in Metal Etch Processes Jill Card, An Cao, Wai Chan, Bill Martin, Yi-Min Lai IBEX Process.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Solving Linear Programming Problems: The Simplex Method
Algorithms for Wireless Sensor Networks Marcela Boboila, George Iordache Computer Science Department Stony Brook University.
Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin.
9-1 Chapter 9 Project Scheduling Chapter 9 Project Scheduling McGraw-Hill/Irwin Copyright © 2005 by The McGraw-Hill Companies, Inc. All rights reserved.
CP Summer School Modelling for Constraint Programming Barbara Smith 2. Implied Constraints, Optimization, Dominance Rules.
CS Statistical Machine learning Lecture 18 Yuan (Alan) Qi Purdue CS Oct
Cross-Layer Optimization in Wireless Networks under Different Packet Delay Metrics Chris T. K. Ng, Muriel Medard, Asuman Ozdaglar Massachusetts Institute.
Evaluating Network Security with Two-Layer Attack Graphs Anming Xie Zhuhua Cai Cong Tang Jianbin Hu Zhong Chen ACSAC (Dec., 2009) 2010/6/151.
DISTRIBUTION AND NETWORK MODELS (1/2)
1 1 Slide © 2005 Thomson/South-Western Linear Programming: The Simplex Method n An Overview of the Simplex Method n Standard Form n Tableau Form n Setting.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Robust data filtering in wind power systems
1 Analytic Solution of Hierarchical Variational Bayes Approach in Linear Inverse Problem Shinichi Nakajima, Sumio Watanabe Nikon Corporation Tokyo Institute.
Optimal Placement of Energy Storage in Power Networks Christos Thrampoulidis Subhonmesh Bose and Babak Hassibi Joint work with 52 nd IEEE CDC December.
Overview of Optimization in Ag Economics Lecture 2.
Author: Tadeusz Sawik Decision Support Systems Volume 55, Issue 1, April 2013, Pages 156–164 Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin.
Multi-area Nonlinear State Estimation using Distributed Semidefinite Programming Hao Zhu October 15, 2012 Acknowledgements: Prof. G.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
REDUNDANCY VS. PROTECTION VS. FALSE TARGETS FOR SYSTEMS UNDER ATTACK Gregory Levitin, Senior Member, IEEE, and Kjell Hausken IEEE Transactions on Reliability.
1  Problem: Consider a two class task with ω 1, ω 2   LINEAR CLASSIFIERS.
Large-Scale Matrix Factorization with Missing Data under Additional Constraints Kaushik Mitra University of Maryland, College Park, MD Sameer Sheoreyy.
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
Stochastic Optimization
“ Methodology to characterize the performance of IEEE nodes to be deployed in multi- hop environments ” “ Marc Portoles Comeras, Andrey Krendzel,
Slide 1/20 Defending Against Strategic Adversaries in Dynamic Pricing Markets for Smart Grids Paul Wood, Saurabh Bagchi Purdue University
On Security Indices for State Estimators in Power Networks Henrik Sandberg, André Teixeira, and Karl Henrik Johansson Automatic Control Lab, ACCESS Linnaeus.
Optimization-based Cross-Layer Design in Networked Control Systems Jia Bai, Emeka P. Eyisi Yuan Xue and Xenofon D. Koutsoukos.
(iii) Simplex method - I D Nagesh Kumar, IISc Water Resources Planning and Management: M3L3 Linear Programming and Applications.
CYSM Risk Assessment Methodology Co-funded by the Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks Programme.
COST BENEFIT ANALYSIS OF IMPROVED PATCHING WINDOW USING FAIR
Secure Control Systems - A Quantitative Risk Management Approach
ECEN 460 Power System Operation and Control
Adjoint based gradient calculation
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
Information Theoretical Analysis of Digital Watermarking
Autonomous Network Alerting Systems and Programmable Networks
Presentation transcript:

Optimal Power Flow: Closing the Loop over Corrupted Data André Teixeira, Henrik Sandberg, György Dán, and Karl H. Johansson ACCESS Linnaeus Centre, KTH Royal Institute of Technology American Control Conference Montréal, June 28th, 2012

Motivation June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology2 Networked control systems are becoming more pervasive -Increasing use of ”open” networks and COTS Infrastructures are becoming more vulnerable to cyber-threats! -Several attack points Nature-driven events are known to have caused severe disruptions A major concern is the possible impact of cyber threats on these systems

Power Transmission Networks Previous work -Vulnerabilities of current SCADA/EMS systems to data attacks on measurements Current work -Consequences on system operation: Optimal Power Flow June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology3 SCADA: Supervisory Control and Data Acquisition

Cyber Security of State Estimator in Power Networks June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology4 State Estimator: estimates the state and unmeasured variables Bad Data Detector: detects and removes corrupted measurements Can data attacks affect the SE without being detected? -Yes! [Liu et al, 2009]

DC Network Model June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology5 Only active power: -Similar to a DC resistive network Simplifications: - -No resistances or shunt elements Measurement model: Linear Least Squares Estimator: Measurement residual: Bad Data Detector:

Attacker Model June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology6 Corrupted measurements: Attacker’s objectives: -Attack is stealthy (undetectable) -Target measurements are corrupted Least-effort attacks are more likely Larger effort increased security - : set of stealthy attacks - : set of goals - : set of constraints and are scenario specific Minimum effort attacks:

Security Metric for Stealthy Attacks June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology7 is the security metric for the k-th measurement - is the optimal solution of Minimum number of attacked measurements so that -Attack is stealthy -Measurement is corrupted [Sandberg et al, 2010] [Sou et al, 2011]

Cyber Security of Optimal Power Flow in Power Networks June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology8 How do stealthy attacks affect the power system’s operation? -Related work: [Xie et al, 2010], [Yuan et al, 2011] Optimal Power Flow -Computes generator setpoints minimizing operation costs -Ensures operation constraints

DC-Optimal Power Flow June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology9 Optimal power generation -However may not be measured DC-Optimal Power Flow considers the lossless DC model - power demand - power generation Operation costs: -Generation costs -Transmission losses $ $ $ $

DC-Optimal Power Flow Nominal Operation At optimality, the KKT conditions hold: June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology10 Lagrangian function:

DC-Optimal Power Flow under attack June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology11 The estimate is given by the State Estimator -vulnerable to cyber attacks Suppose the system is in optimality with and Operation under Data Attacks Ficticious operating conditions Proposed control action When would an operator apply the proposed control action? What would be the resulting operating cost?

DC-Optimal Power Flow under attack June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology12 Assume the attack does not change the active constraints -thus are known The proposed control action is given by - is an affine map w.r.t

Estimated Re-Dispatch Profit June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology13 Consider the corrupted estimates and - : estimated operation cost - : estimated optimal operation cost given - : estimated re-dispatch profit Large estimated profit may lead the operator to apply Ficticious operating conditions Proposed control action

Mismatches between and are compensated by slack generators -can be modeled as an affine map w.r.t : - : true operation cost after re-dispatch - : true re-dispatch profit Large means more ”dangerous” attacks (larger impact) True Re-Dispatch Profit June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology14 Proposed control actionTrue generation profile Slack generators

VIKING Benchmark: Impact of Data Attacks June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology15 Cost function corresponds to the total resistive losses Sparse attacks are computed from the previous security metric is computed for each sparse attack

VIKING Benchmark: Impact of Data Attacks June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology 16 Security metric -Are all the sparse attacks equally dangerous? Impact of Data Attacks -Most sparse attacks have low impact on operation cost Target measurement index

Impact-Aware Security Metric June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology17 is the impact-aware security metric for the k-th measurement - is the optimal solution of Similar to the previous security metric -Sensitive to the choice of parameters

Summary June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology18 -The effects of data attacks on the DC-OPF were analyzed and analytically characterized -The estimated and true profit were introduced -A novel impact-aware security metric was proposed Thank you Questions?

is the impact-aware security metric for the k-th measurement (cf. ) - is the optimal solution of Impact-Aware Security Metric June 28th, 2012 ACCESS Linnaeus Centre KTH-Royal Institute of Technology19 Maximum impact to the network operation cost so that -Attacks are stealthy with a given sparsity -Measurement is corrupted