Next Article in Journal
Overcoming the Limits of the Charge Transient Fault Location Algorithm by the Artificial Neural Network
Previous Article in Journal
Lignocellulosic Ethanol Biorefinery: Valorization of Lignin-Rich Stream through Hydrothermal Liquefaction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Assessing the Impact of Cybersecurity Attacks on Power Systems

by
Athanasios Dagoumas
Energy & Environmental Policy Laboratory, School of Economics, Business and International Studies, University of Piraeus, PC 18532 Piraeus, Greece
Energies 2019, 12(4), 725; https://doi.org/10.3390/en12040725
Submission received: 4 December 2018 / Revised: 30 January 2019 / Accepted: 21 February 2019 / Published: 22 February 2019
(This article belongs to the Section F: Electrical Engineering)

Abstract

:
Cybersecurity is an emerging challenge for power systems, as it strongly affects their reliability and the whole energy system cost. The paper uses several Unit Commitments (UC) models, applying different methods to tackle renewables’ uncertainty. The selected power system is IEEE RTS 96. The UC models are used to assess the impact of different cybersecurity threats. The focus is to assess their impact on the total operating cost and the power grid adequacy to handle them. The comparison between the UC models shows that more robust UC models lead to higher total operating costs. The cost, unit dispatching, and energy mix evolution have a non-linear trend, depending on the power system characteristics and the cyberattacks types. However, the paper provides evidence of considerable price signals in the case of the examined cyberattacks. Each Transmission System Operator (TSO) should examine combinations of cyberattacks and operating conditions to identify crucial cases for system stability and power system cost operation. The applied methodology would also require substantial developments or supplementary approaches to assess cyberthreats at the distribution level.

1. Introduction

Power systems are among the most complex and critical infrastructures of a modern digital society, serving as the backbone for its economic activities and security. It is therefore in the interest of every country to secure their operation against cyber risks and threats [1], as stated in the report of the European Commission’s Smart Grids Task Force, as well as in the ‘Cyber Security in the Energy Sector’ report [2] published in 2017 by the Energy Expert Cyber Security Platform (EESCP), stressing the need for addressing the major challenges of cyber threats in the energy sector as well as providing the requirements for addressing appropriately cybersecurity. Potential cybersecurity threats could have cascading effects, leading to damage and power outages, as well as personal data breaches [3].
Over the last few decades, the power system has been modernized. This modernization concerns (i) market aspects, due to its liberalization, (ii) organizational aspects, due to the change of roles from the utilities, where central planning is replaced by decentralized operation with active participation of final consumers, as well as (iii) operational aspects, due to the evolution of smart technologies and communication protocols. Novel Internet of Things (IoT) nodes and smart meters are introduced in various parts of the energy grid, while existing SCADA systems are used for monitoring and control operations that are widely dispersed in case of energy transport and distribution networks. Furthermore, distributed control systems (DCS) are used for single facilities or small geographical areas, while remote terminal units (RTU) and programmable logic controllers (PLC) monitor system data and initiate programmed control activities in response to input data and alerts. Figure 1 provides the typical structure of a modern power system [4], as well as the communication among the different assets of the power system, in generation, transmission, distribution, and consumption.
Cyber threats are evolving at a tremendous pace, exploiting capabilities created by the modernization of the power systems, as stated in the ENISA Smart Grid Threat Landscape report [5]. This is related to the transition from a centralized power system, based on large power stations and vertical integrated utilities, to a decentralized power systems model [6], as well as the complementary evolution of more advanced communication and digital systems. Modern power systems are becoming increasingly dependent on communication systems for their operations, and as a result increasingly susceptible to cyberattacks. As stated in the NIST report for Guidelines for Smart Grid Cybersecurity [7], while integrating information technologies is essential to building the smart grid and realizing its benefits, the same networked technologies add complexity and introduce new interdependencies and vulnerabilities to potential attackers and unintentional errors.
However, the development of smart power systems creates critical challenges, especially related to tackling rapidly evolving cybersecurity issues. This affects the capability of the Transmission and Distribution System Operators (TSOs and DSOs) to guarantee resilience, reliability, stability, security of supply, and power quality for the final users of electricity.
  • Essential power system functions at risk from cyberattacks include:
  • Electricity supply (generation) stability and reliability;
  • Electricity transmission and distribution stability and reliability;
  • Communication between systems or equipment;
  • Information on the operating conditions of generation, transmission or distribution equipment;
  • Black start capability;
  • Equipment performance and ability to recover (backup systems).
Cyberattacks could affect not only system operators, but also market participants. For example, demand aggregators create billing systems for issuing invoices to their final consumers. Those systems, either using desktop computers, cloud services, or blockchain technology, are in danger of cyberattacks, which could considerably affect cash flows and finally the viability of market participants. Similar threats exist for participants that use peer-to-peer trading services. Although such types of threats are possible and can have important effect, the threats that affect grid stability are considered more challenging due to their cascading effects.
A crucial issue in the assessment of cybersecurity threats is the identification of their impact on power systems’ reliability and the whole energy system cost. This paper uses different unit commitment models, implementing different levels of robustness to tackle uncertain renewables generation, to assess the impact of the cybersecurity threats on the power systems. It provides price signals on the impact of the threats on the wholesale marginal prices and on the whole energy system costs. It identifies cases where black-out events are inevitable, estimating the overall cost of the interruption in energy service. The paper provides useful insights to the TSOs, as it provides price signals of the cyberthreats, enabling the identification of benchmark values for relevant equipment costs and tariff policies for producers and end users.
Sun et al. [8] provide a review of cyber systems in a smart grid, summarizing the cyber protection and cyber‒physical system testbeds. The paper proposes a methodology for the detection of coordinated cyberattacks, which, however, is not holistic as there are unsolved cyber vulnerabilities that require further research. Mrabet et al. [9] provide a review of the cybersecurity requirements in smart grids, describing different types of severe cyberattacks. The paper proposes a cybersecurity strategy to detect and counter these critical attacks. Jarmakiewicz et al. [10] describe a cybersecurity protection approach for power grid control systems, by identifying key elements of the power system and their importance to power grid security. Shi et al. [11] provide a review of models, methods, and applications for the cyber‒physical interaction in power systems. Poudel et al. [12] present a real-time cyber‒physical system testbed for power system security and control, focusing on voltage stability and generation loss. Hammad et al. [13] present an offline co-simulation testbed for studies of power systems’ cybersecurity and control verification. Liu et al. [14] present a novel model for the evaluation of the validity of active cyber‒physical distribution system. The paper quantifies the impact of cyber faults on functionality validity during distribution automation.
The previous paragraph shows that the literature on cybersecurity issues in power systems is rapidly increasing. However, the papers mainly focus on the identification of security threats, rather than on the assessment on the actual operation and cost of the power systems. There are also a growing number of research papers on specific aspects of the power systems. Part et al. [15] focus on the implementation of cybersecurity strategy for safety systems of nuclear facilities. Gunduz and Jayaweera [16] provide a reliability assessment of a power system with cyber‒physical interactive operation of photovoltaic systems. They present a probabilistic reliability model, concluding that impacts of cyber threats are considerable. However, they do not provide relative price signals but suggest that a relative quantitative assessment is required. Sundararajan et al. [17] provide a survey of challenges and solutions for distributed generation cyber‒physical security. The paper identifies the key vulnerabilities, attacks and potential solutions for solar and wind units at the protocol level. Tellbach and Li [18] examine cyberattacks on smart meters in residential customers, concluding that integrity and confidentiality attacks cause monetary effects on the power grid, while availability attacks—besides monetary effects on the power grid—mainly aim at delaying or stopping the operation of smart meters. Ye et al. [19] provide a quantitative vulnerability assessment of cybersecurity for distribution automation systems. Potential physical consequences of cyberattacks are analyzed at two levels: the terminal device level and the control center server level. A game theory-based approach is used to examine the relationships among different vulnerabilities by introducing a vulnerability adjacency matrix. The results in a relatively small system demonstrate the reasonability and effectiveness of the proposed methodology. Venkatachary et al. [20] provide a review of the economic impacts of cybersecurity in the energy sector. However, the analysis is done in a top-down manner, without applying a detailed robust methodology that assesses the impacts of specific threats to the power system. Liu et al. [21] examine the impact of cyberattacks on the economic operation of power systems. Liu et al. [22] estimate the impact of three different possible cyber events on a physical power grid, using an integrated cyber‒power modeling and simulation testbed. Poudineh and Jamasb [23] examine the impact of electricity supply interruptions in case of the Scottish economy. They provide the sectoral interdependencies as well as the cost of energy not delivered. Considering that those interruptions could result from cyberattacks, the paper provides insights into related price signals.
Cybersecurity is affected by the structure of power systems, as well as by communication protocols and standards. Leszczyna [24] provides a review of standards with cybersecurity requirements for the smart grid. The paper assesses 17 standards, which are described from a cybersecurity requirements perspective and refer to the IEC smart grid architecture. Moreover, the relationships between cybersecurity requirements in different standards are analyzed and visualized. The role of communication standards is important, as shown in a paper that provides a technical overview and benefits of the popular IEC 61850 standard for substation automation [25]. Jarmakiewicz et al. [26] describe a cybersecurity protection approach for power grid control systems. The paper also discusses the verification process of the functionality provided by an implemented cybersecurity system. Cybersecurity is a challenge for different systems and applications, leading to the development of cybersecurity assessment models. A recent paper [27] describes a cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory in order to evaluate cybersecurity risk of particular applications. Zarreh et al. [28] describe a game theory-based cybersecurity assessment model for advanced manufacturing systems. The literature review revealed that cybersecurity in power systems is a challenging issue. Relevant papers are rapidly disseminating; however, they mainly focus on the identification of relevant threats and vulnerabilities, rather than on the quantification of their impact on the power system operation and cost. This gap is the focus of this paper, namely, to provide a quantitative assessment of the impact of cybersecurity threats. Towards providing robust price signals, robust methodologies must be selected. This is the reason that a Unit Commitment (UC) model has been chosen for this analysis. The aim of a UC algorithm is to determine which units will produce energy in each hour of a day to meet demand. The UC problem is complex as it incorporates several techno-economic constraints related to the production units and the transmission lines. The UC problem identifies the power units’ dispatch, considering their operational and maintenance costs, their ramping capacity, their capability to provide ancillary services, and other techno-economic criteria. The UC problem is formulated as a Mixed Integer Linear Programming (MILP) problem, which is adequate to handle such complicated problems. The problem is solved in such a way that the overall fuel cost is minimized with respect to the system’s and unit’s constraints.
The applications of unit commitment models are also extended, as they are considered robust approaches to simulate the power systems operation. UC models examine—in most cases—a national power system or a small power system, providing insights into different challenges it faces. However, to our knowledge, there has been no attempt to quantify the impact of cybersecurity threats on power systems. Moreover, there are few cases providing a comparison among different UC models, which would be a useful step towards revealing the required level of detail for robust solutions and the impact of uncertainties on key variables. The Energy and Environmental Policy laboratory at the University of Piraeus has extensive experience in developing and extending UC models, but its work mainly concerns the Hellenic power system [29,30,31]. Considering that the assessment of cybersecurity threats is a challenging issue, the application of a common power system such as the IEEE RTS 96 with increased penetration of renewables has been selected, as this represents a large but more commonly used power system in the international community. This has led to the application and extension of UC models by the Renewables Energy Analysis Lab at the University of Washington [32].
The paper contributes to the literature by applying different UC models, differentiated by tackling uncertain renewable electricity generation, to estimate the impact of cybersecurity threats in a commonly used power system. The highlights of the paper are: (i) integration of cybersecurity threats in the Unit Commitment problem, (ii) comparison of different UC models on the IEEE RTS 96 power system, tackling differently the uncertainty of renewable electricity generation, (iii) assessment of the impact of cybersecurity threats in the power system cost and scheduling; and (iv) provision of useful insights into the effects of cybersecurity threats on the total operating cost of a power system and its adequacy to handle them.
The rest of the paper is organized: Section 2 provides the methodology applied. Section 3 examines potential cyberattacks on the power system, identifying scenarios that will be described, simulated, and discussed in Section 4. Finally, Section 5 provides the main conclusions and highlights of the paper.

2. Methodology

The Renewables Energy Analysis Lab at the University of Washington has developed five different implementations of the Unit Commitment problem [33], where the basic formulation is described in Appendix A. The application of the UC models concerns the IEEE RTS-96 power system, shown in Figure 2. This power system includes, apart from thermal production units of various fuel (nuclear, coal-fired, diesel, natural gas) with 10,215 MW total installed capacity, renewable energy generation units from wind, whose power production is uncertain compared to other renewable technologies such as photovoltaics [33]. The whole system can be seen in the following layout.
Renewable energy sources introduce uncertainty, due to the stochastic nature of the wind and the weather conditions in general. Transmission system operators must forecast the real generation from those renewable sources, affecting the stability of the power system, the strategy of energy market participants. We did not consider other renewable technologies, such as photovoltaics, as their power output can be forecasted with much higher accuracy, so the introduction of photovoltaics would lead to an upgrade of the net load at each bus rather than an introduction of uncertain renewables production. Photovoltaics, aside from the sunset effect, which affects the unit commitment problem and enhances the need for flexible ramping capacity, does not increase uncertainty in the dispatch of power units, as the uncertain power output from wind farms is doing.
The models developed by the Renewables Energy Analysis Lab, used for this paper, are the following: Deterministic unit commitment, Stochastic unit commitment, Improved interval unit commitment, Interval unit commitment, and Robust unit commitment. Each of those models uses a different mathematical procedure to forecast the anticipated renewable production. Some of them are more conservative than others. Consequently, those models are committing more thermal units, and the stability of the system is increased but with a higher total economic cost.
The UC models require a considerable amount of input data, which are described in Appendix B. The modelers have the option to change some constants in the data input program. Through those options, we can modify the penetration of the renewable sources, the variable cost, and ramping capabilities of thermal units, the capacities of the transmission lines, the wind profile and a penalty factor in the case of spilled wind production or unserved loads. In our research, we choose to have 30% of energy from wind power units, which is much higher than the current state of most power grids and a possible future power system of the next decades. Another decision is to go with the unfavorable or favorable wind profile. We have chosen the unfavorable wind profile.

2.1. Differences between the UC Models

2.1.1. Deterministic Unit Commitment Model (DUC)

This model uses only one forecast for the wind production, resulting from the elaboration of historical data. This model provides either conservative or very inefficient solutions in certain conditions. Therefore, the incapability of the model to tackle uncertainty of renewables production, leads to solution with limited robustness.

2.1.2. Stochastic Unit Commitment Model (SUC)

The stochastic model, instead of using a fixed forecast calculates the unit commitment for 10 different wind scenarios, assigning a weight on them based on the probability of each scenario. The model captures a certain level of unhedged uncertainty, which is quantified concerning expected unserved loads and spilled production [34].

2.1.3. Interval Unit Commitment Model (IUC)

This model implements a simplified representation of renewables uncertainty. The deterministic scenario is used a basis, on which an upper and a lower bound scenario for the wind energy production are identified. The model uses upper and lower bound forecasts in order to estimate the ramp-up and ramp-down limits for the thermal units, which leads to the commissioning of more power units and increase of the overall energy cost.

2.1.4. Improved Interval Unit Commitment Model (IIUC)

The Improved Interval Unit Commitment Model (IIUC) is an enhanced version of the previous model, where the upper and lower bounds are replaced by four scenarios. The two new scenarios incorporate more realistic slopes for the ramping capability of the thermal units. This approach is much more realistic because the previous extreme transition values are not possible in the real world. As a result, we anticipate that the IIUC solution will be less expensive than IUC.

2.1.5. Robust Unit Commitment Model (RUC)

The objective function of the model is the following, as presented in [35]:
t = 1 T i = 1 I ( α · x i ( t ) + s u c i ( t ) ) + m a x { b = 1 B k b · g i , b ( t ) }       t T ,   i I
The nomenclature for all UC models are provided in Appendix A. The objective function includes the startup cost and fixed production cost of the power units, as well as the variable production cost in the worst-case scenario, which stands as the main difference with the other models. The model is considered as a conservative unit commitment model with increased robustness, as it is based on the worst-case scenario. The model initially decides which units to be committed, based on their fixed and start-up costs. Then the output power of the power units is calculated to meet the reserves for the worst-case scenario [35].

2.1.6. Comparison of UC Models

Considering the theoretical model differences, a recent work [36] confirms those results. Figure 3 summarizes the differences between the models. Figure 3 shows that more robust UC models, being more “conservative” in constraints, led to the commitment of more power from dispatching units.

3. Cyberattacks on the Power System

The UC models will be demonstrated on dry-run scenarios of the IEE-RTS96 power system. The prototype will provide a set of different scenarios concerning cybersecurity threats. This section describes potential threats for the power systems. In order to identify the threats, it is important to describe the different Information and Communication Technologies (ICT), integrated within the power systems, with special focus on the TSO, which is responsible for the reliable operation of the transmission system.
Cybersecurity threats affect the capability of the Electrical Power System Operators to guarantee resilience, reliability, stability, security of supply, and power quality to the final users of electricity. Essential system functions at risk of cyberattacks for this demonstration include:
  • electricity supply (generation) stability and reliability;
  • electricity transmission stability and reliability;
  • communication between systems or equipment;
  • information on the operating conditions of generation, transmission equipment;
  • black start capability.
More specifically, potential cybersecurity threats are:
  • smart meters may be used by hackers as entry points into the broader power system;
  • unauthorized interference on the measurement of electricity consumption (end-users);
  • trip a power-generating unit or modify its schedule;
  • cause a blackout in a big area of the grid;
  • attack on the electricity market;
  • disrupt the proper functioning of the system;
  • attacks through the power system on civil infrastructure.
TSOs are responsible for the operation, maintenance, and expansion of the transmission systems. TSOs use Supervisory Control and Data Acquisition System (SCADA) for the high-level process supervisory management of transmission system facilities. SCADA systems are vital for system operators to monitor and control the electricity network. The fact that SCADA/EMS systems are now being interconnected and integrated with external systems creates new possibilities and threats. Those issues have been emphasized in the CIGRÉ joint working groups (JWG) D2/B3/C2.01 and D2.22 [37,38]. As part of the JWG efforts, the various interconnections of a substation were investigated [39]. An emerging challenge of the Transmission System Operators (TSOs) is to identify the vulnerabilities in the power systems, as well as how each cybersecurity threat affects independently and cumulatively those aims. This will help with the design of adequate security measures to ensure a cyber-secure system, which concerns the design of appropriate procedures and policies to tackle each threat, considering the relevant clauses of the ISO/IEC 27032:2012 and ISO 27001 standards.
The power units have installed Remote Terminal Units (RTU), using PLCs for their communication with the system operator. The communication protocols are based on international standards IEC60870-101 and IEC60870-104. The international standard IEC61850, which defines communication protocols for intelligent electronic devices at electrical substations, is an innovative standard, especially as it tackles multi-vendor interoperability [25]. The renewable units’ RTUs communicate through ISDN or PSTN telecommunication services. Distributed generation units, such as photovoltaic units, are usually obliged to install a GSM/GPRS modem for communication purposes, while wind parks have an RTU for their communication with the dispatcher. Although the renewables do not participate in real-time dispatching in the same way with conventional thermal units, due to their stochastic nature, their rapidly growing share raises issues about the scaling-up of potential cybersecurity threats that could affect power systems reliability, security, and overall costs. Therefore, the identification of cybersecurity threats for relevant technologies for the main energy carriers of the future power system, namely natural gas, wind, and solar energy, is an important challenge. The same concerns are relevant in the identification of threats on indicative customers from different consumer types, using different telemetering devices (mainly for billing and profile patterns aims, rather than for dispatching purposes). The structure and communication protocol of power systems identify the potential threats. In case of the evolution of power line communication as a dominant communication method, or the transformation of a power system as an Internet-of-Things place, every device, plug, or connection point of the grid becomes vulnerable to potential cyberattack. This further enhances the importance of cybersecurity as a major challenge for a power system, as the threat is distributed at many levels and points, compared to the top-down consideration of cybersecurity that mainly focuses on attacks on power plants, central control systems, and high-voltage substations. The approach implemented in this paper, using the unit commitment model for assessing cyberthreats, can be robust for tackling top-down threats that affect system stability; however, the consideration of threats in a distributed manner would require considerable model improvements or use complementary approaches to tackle those challenges in more detail.
The communication of the thermal power plant with the central dispatching of the TSO is done through special software, called Real-Time Dispatching (RTD), providing instruction every 5 min, and the Automatic Generation Control system (AGC), which enables the provision of the required ancillary services in seconds, as depicted in Figure 4. The thermal units also have a Digital Control System (DCS), which provides several checks concerning its operation and communication with the substation and the dispatching center.
Several types of cyberattacks can take place. This work focuses on attacks on big plants that are dispatched by the Transmission System Operator (TSO), monitored through SCADA systems, and linked to the TSO-operated Automatic Generation Control system (AGC). The examined scenarios are described and discussed in the next section.

4. Results and Discussion

This section provides the results from the simulations. The examined scenarios focus on providing a comparison among the different UC models and secondly on the comparison among the different cybersecurity attacks.
Firstly, the different UC models have been run without any cyberattack, leading to baseline scenarios, entitled DCU_BAS, SUC_BAS, IIUC_BAS, and RUC_BAS for the deterministic, stochastic, improved internal, and robust UC models, respectively.
Secondly, we examined a Cyberattack 1 case with cyberattacks on three thermal units, 400 MW each, so 1200 MW in total. All three units have been scheduled to operate with the baseline scenarios, while the cyberattack was set to take place in the first hour of day, not enabling those units to operate for the whole examined day. A comparison among the first and second set of scenarios enables the provision of price signals on the cost of cyberattacks, as well as a comparison among the different UC models, incorporating a different level of robustness for tackling the stochastic and uncertain nature of the renewables.
Thirdly, another set of scenarios was examined using the RUC model, which is a robust model enabling the provision of price signals in cases where the transmission system operator (TSO) adopts a more conservative approach toon tackling uncertainties in the power system. This set of scenarios, Cyberattacks 1–4, examines different cases of cyberattacks. More specifically, the following cyberattack cases where examined: (1) cyberattacks in three thermal units, with 1200 MW total capacity, (2) cyberattacks in six thermal units, with 2400 MW total capacity, (3) cyberattacks in three wind farms, with 1200 MW total capacity, (4) cyberattacks in three thermal units, of 1200 MW, and three wind farms, of 1200 MW, with 2400 MW total capacity. In all cases, the thermal units and wind farms were scheduled to operate in the baseline scenarios. Figure 5 provides the evolution of hourly demand in the examined day, deviating between 4.3 and 7.4 GW.
Therefore, the examined cybersecurity attacks concern a considerable share of the generating capacity that is unable to meet the load. However, the examined system has 10.2 GW installed thermal plants, as well as 6.9 GW of wind farms; therefore, the examined cyberattacks are crucial to the power system stability and operating costs, but there is still spare capacity, with flexible ramping capability to meet such events. However, considering that the cyberattacks take place on dispatched thermal and RES plants, those attacks lead to increased operating costs, due to a change in the energy mix, as well as to start-up and shutdown costs for switching off the cyberattacked units and switching on new and more expensive units.
Table 1 shows the evolution of the overall cost, as optimized in the objective function. The comparison among the different models shows that the incorporation of more technical constraints, as in the robust and stochastic models, compared to the deterministic solution, leads to a considerable increase in the cost. Through the implementation of the cyberattacks—in the case of Cyberattack 1 scenario, with attacks on three thermal units—the cost is further and considerably increased for all scenarios, especially for the stochastic and robust UC models. Results are from the interval UC models, as those models experienced difficulty in finding feasible solutions. The examined scenarios have also led to a considerable increase in the total computational time, especially in the case of the stochastic UC model. This has led the author to increase the convergence gap, which has led to a possible local minimum solution, rather than a global optimum, as can be seen in the increased cost compared to the robust UC model.
We further focused on the RUC model, examining different cyberattacks’ scenarios. Table 1 shows that cyberattacks on thermal plants lead to considerably higher costs compared to attacks on wind plants. This is attributed to the fact that the attacked thermal plants were set to operate at their nominal capacity, due to their comparable cost, constituting base load plants. The enforced switching-off of those units, with a high capacity factor compared to renewables, led to the need for dispatching further units, as well as increasing the operation of more expensive units. Dispatching of units does not take place only for generating purposes, but also for providing the requested ancillary services for the system stability. Especially in more robust UC models, such constraints lead to higher costs, as shown in Table 1, where Cyberattack 1, in the case of the deterministic model, is considerably less costly compared to the robust and stochastic UC models. Table 2 shows that different cyberattacks affect the dispatched units, leading to a different number of units that operate each hour. The importance of thermal plants is depicted in Figure 6, which shows the limited power generation from wind plants, which can justify the limited effect on the operational cost, compared to the thermal plants. However, in the case of different renewables generating profile, i.e., with photovoltaics that operate at peak hours with a high capacity factor and create a sunset effect, cyberattacks on their inverters could lead to considerable ramping needs.
Therefore, cyberattacks on thermal units affect both start-up and shutdown costs, as well as generating and ancillary services costs. However, we cannot provide a generic conclusion that cyberattacks always have a higher impact on total operating costs, as renewables have a low operating cost, and therefore the decommissioning of those units might lead to a more expensive energy mix. However, the examined cases quantitate a higher impact on attacks on thermal units. Moreover, the examined cases using the RUC model show that they also affect the energy mix,—not only the dispatching of thermal plants but also the curtailment of wind plants. This is depicted indirectly in Table 3, which shows that the energy mix is changed as the curtailment of wind production changes. This can also be seen in Figure 7, which shows small but evident changes in the energy mix. However, those changes also depend on the topology of the network, the nodes of the cyberattacked units, their operating condition, and the interconnections among different nodes. Therefore, the operating cost, unit dispatching, and energy mix evolution show a non-linear trend on the effect of different scenarios. A clear outcome from the analysis is that each TSO should examine different combinations of cyberattacks with different operating conditions to identify cases that are more crucial for the system stability and the overall power system cost operation. The examined attacks show an increased cost for the power system operation and reveal the importance of base load plants. However, in the case of power system operation in marginal conditions, namely with limited available capacity, the importance of flexible units with high ramping capacity might be more important.

5. Conclusions

This paper aims at assessing the impact of cybersecurity attacks on power systems. It uses different mixed-integer linear programming unit commitment models, which apply different methodologies to incorporate high levels of renewable energy production. The UC models, applying different methods to integrate the uncertainty from the renewables, are further extended to integrate cybersecurity threats, aiming to compare the UC models but also the effect of cybersecurity threats on different power capacity mixes and reliability uncertainty. Our focus is on the effects on the production side, hence the total operational cost, the average energy cost, the dispatch of power units, as well as the power grid adequacy to handle the cybersecurity threats. The selected power system is IEEE RTS 96.
The examined scenarios focus on providing a comparison of the different UC models and the different cybersecurity attacks. The comparison between the UC models confirmed our theoretical assumptions that more robust UC models mean higher total operating costs, due to the more conservative approach to tackle uncertain renewable electricity generation and the consideration of ancillary services. The examined cyberattacks take place on dispatched thermal and RES plants, leading to increased operating costs. This is attributed to the commissioning of more expensive units as well as the increased start-up and shutdown costs, due to the switching on new and more expensive units and the switching off the cyberattacked units. Moreover, the scenarios lead to an increase in the total computational time for finding the optimum solution. The results show that cyberattacks on thermal units affect both start-up and shutdown costs, as well as generating and ancillary services costs, leading to a higher impact compared to attacks on wind plants. However, the paper cannot provide a generic conclusion that cyberattacks on thermal plants always have a higher impact on total operating costs, as renewables have a low operating cost, and therefore the decommissioning of those units might lead to a more expensive energy mix.
The effects depend on the topology of the network, the nodes of the cyberattacked units, their operating condition, the interconnections among different nodes, and the ramping capacity of the available units. The cost, unit dispatching, and energy mix evolution have a non-linear trend that depends on the power system characteristics. The examined cases lead to considerable price signals on the potential effects of cyberattacks. However, each TSO should examine different combinations of cyberattacks in different operating conditions to identify cases that are more crucial for the system stability and the overall power system operational costs. The approach implemented is useful for assessing cyberattacks at a system level. However, unit commitment modeling cannot quantify threats at the distributed level, unless considerable model developments are made and/or more detailed approaches are elaborated. This creates challenges for further research at the distribution level, which could be scaled up to be integrated at system level.

Funding

This work has been supported by the Horizon 2020 research project INTERFACE: TSO-DSO-Consumer INTERFACE architecture to provide innovative grid services for an efficient power system (Project Grant Agreement No. 824330).

Conflicts of Interest

The author declares no conflict of interest.

Nomenclature

A. Sets
BIndex of generating unit cost curve segments, 1-B
IIndex of generating units, 1-I
JIndex of generating unit start-up cost, 1-J
LIndex of transmission lines, 1-L
SIndex of bus bars, 1-S
TIndex of hours, 1-T
B. Parameters
a i Fixed production cost of unit i ($)
B s m Admittance of transmission line between nodes s and m (S)
d s ( t ) Load demand at bus s (MW)
g i d o w n Minimum downtime of unit i (h)
g i u p Minimum up time of unit i (h)
g i d o w n , i n i t Time that unit i has been down before t = 0 (h)
g i u p , i n i t Time that unit i has been up before t = 0 (h)
g i 0 Output of unit i at t = 0 (MW)
g i m a x Rated capacity of unit i (MW)
g i m i n Minimum output of unit i (MW)
g i , b m a x Capacity of segment b of the cost curve of unit i (MW)
g i o n o f f On off   status   of   unit   i   at   t = 0 ,   equal   to   1   if   g i u p , i n i t > 0 , otherwise 0
k i , b Slope of the segment b of the cost curve of unit i ($/MW)
l s m m a x Capacity of the transmission line between nodes s and m (MW)
L i d o w n , m i n Length of time that unit i has to be off at the start of the planning horizon (h)
L i u p , m i n Length of time that unit i has to be on at the start of the planning horizon (h)
M Large number used for linearization
r a m p i d o w n Ramp-down limit of unit i (MW/h)
r a m p i u p Ramp-up limit of unit i (MW/h)
s u c i , j c o s t Cost steps in start-up cost curve of unit i ($)
s u c i , j l i m Time steps in start-up cost curve of unit i (h)
C. Variables
C i ( t ) Operating cost of unit i at time t ($)
c o u n t i d o w n Unit i downtime period counter
g i ( t ) Output power of unit i at time t (MW)
g i , b ( t ) Output power of unit i on segment b at time t (MW)
s u c i ( t ) Start-up cost of unit i at time t ($)
w i , j ( t ) Binary variable equal to 1 if unit i is started at time t after being out for j hours, otherwise 0
x i ( t ) Binary variable equal to 1 if unit i is producing at time t, otherwise 0
y i ( t ) Binary variable equal to 1 if unit i is started at the beginning of time t, otherwise 0
z i ( t ) Binary variable equal to 1 if unit i is shutdown at the beginning of time t, otherwise 0
θ s ( t ) Voltage angle at bus s (rad)

Appendix A. Basic Formulation of the REAL UC Models

Formulation
The aim is to minimize the total generation cost of the thermal power plants, which is described in the following objective function [33]:
t = 1 T i = 1 I C i ( t ) .
Equations (A2) and (A3) describe the binary logic. Specifically, Equation (A3) prohibits a unit starting up from being simultaneously shut down. Equation (A2) implements the logic that if a unit is starting up at time t, it cannot be on at time t ‒ 1.
y i ( t ) z i ( t ) = x i ( t ) x i ( t 1 ) ,      1 t T ,   i I
y i ( t ) + z i ( t ) 1 ,      t T ,   i I
Equation (A4) defines the total cost for each unit i. The total cost is the summation of the startup cost of the units (if needed), the fixed cost, and the variable cost:
C i ( t ) = α · x i ( t ) + b = 1 B k b · g i , b ( t ) + s u c i ( t ) ,      t T ,   i I .
The total unit output is equal to the sum of the generation in each segment of the cost curve:
g i ( t ) = b = 1 B g i , b ( t ) ,       t T ,   i I
Minimum unit output must be higher than the minimum output of unit i:
g i ( t ) g i m i n · x i ( t ) ,       t T ,   i I .
Unit output for each generation level:
g i , b ( t ) g i , b m a x · x i ( t ) ,       t T ,   i I ,   b B .
Minimum up time constraints:
t = 1 L i u p , m i n ( 1 x i ( t ) ) = 0 ,       i I
t t = t t + g i u p 1 x i ( t t ) g i u p · y i ( t )         L i u p , m i n + 1 t T g i u p + 1 ,     i I
t t = t T ( x i ( t t ) y i ( t ) ) 0         T g i u p + 2 t T ,   i I ,
where L i u p , m i n = m a x { 0 ,   m i n { T , ( g i u p g i u p , i n i t ) · g i o n o f f } }
Minimum downtime constraints:
t = 1 L i d o w n , m i n x i ( t ) = 0   ,       i I
t t = t t + g i d o w n 1 ( 1 x i ( t t ) ) g i d o w n · z i ( t )         L i d o w n , m i n + 1 t T g i d o w n + 1 ,     i I
t t = t T ( 1 x i ( t t ) z i ( t ) ) 0         T g i d o w n + 2 t T ,     i I ,
where L i d o w n , m i n = m a x { 0 ,   m i n { T , ( g i d o w n g i d o w n , i n i t ) · ( 1 g i o n o f f ) } }
Ramp-up and ramp-down constraints:
r a m p i d o w n g i ( t ) g i ( t 1 )     ,       2 t T ,   i I
r a m p i u p g i ( t ) g i ( t 1 )     ,       2 t T ,   i I
r a m p i d o w n g i ( t 1 ) g i 0 ,       i I
r a m p i u p g i ( t 1 ) g i 0 ,       i I .
Equations (A18)–(A20) impose the constraints and calculate the startup cost of each unit i. Specifically, Equation (A18) sets the limitations for the calculation of the value of variable w i j ( t ) , taking into account the initial conditions.
w i , j ( t ) t t = s u c i , j l i m m i n { t 1 , s u c i , j + 1 l i m 1 } z i ( t j ) + 1   I F   { j J 1 s u c i , j l i m g i d o w n , i n i t + t 1 < s u c i , j + 1 l i m } + 1   I F   { j = J s u c i , j l i m g i d o w n , i n i t + t 1 } ,       t T ,   i I ,   j J
j = 1 J w i , j ( t ) = y i ( t ) ,       t T ,   i I
s u c i ( t ) = j = 1 J s u c i , j c o s t · w i , j ( t ) ,           t T ,   i I ,
where symbol IF represents logical IF and symbol symbolizes logical AND.
Equations (A21)–(A24) provide the transmission constraints of the power system. Equation (A21) defines the power balance in the electrical system. Equation (A22) provides the line flow limits. Equation (A23) provides the limits of the voltage angles, while Equation (A24) sets the voltage angle to zero at the reference bus.
i = 1 I g i ( t ) { s , m } L | m s B s m · ( θ s ( t ) θ m ( t ) ) { s , m } L | m < s B s m · ( θ m ( t ) θ s ( t ) )     t T ,     s S
l s m m a x B s m · ( θ s ( t ) θ m ( t ) ) l s m m a x ,     t T ,   { s , m } L
π θ s ( t ) π ,     t T ,   s S
θ s ( t ) = 0 ,     t T

Appendix B. Input Data for the IEEE-RTS96 System

All five models use the same Excel file as a data input file. That file includes all the tables needed for the calculations. GAMS read the input data through a small program, which provides the users with options to change some parameters before running the unit commitment model. In the following paragraph, we present briefly the options available and the data loaded from the Data input code (Renewable Energy Analysis Lab Library, 2017).
The following tables show the form of the input data as they are inserted into the model.
Thermal unit data:
Table A1. Units map gen_map(i,s): includes the position of each unit in the power system.
Table A1. Units map gen_map(i,s): includes the position of each unit in the power system.
s101s102s103s104s105
i110000
i210000
i310000
Table A2. The capacity of segment b of the cost curve of unit i (MW): g_max(i,b).
Table A2. The capacity of segment b of the cost curve of unit i (MW): g_max(i,b).
Output Block (MW):
b1b2b3
i16.6666676.6666676.666667
i26.6666676.6666676.666667
i325.3333325.3333325.33333
Table A3. The slope of segment b of the cost curve for unit i ($/MW): k(i,b).
Table A3. The slope of segment b of the cost curve for unit i ($/MW): k(i,b).
Cost ($/MW):
tr4
b128.967
b229.243
b329.703
b128.957
b229.233
b329.693
Table A4. Cost steps in start-up cost curve of unit i ($) suc_sw(i,j).
Table A4. Cost steps in start-up cost curve of unit i ($) suc_sw(i,j).
Start-up Cost ($):
tr4
j125
j228
j331
j434
j537
j640
j743
j846
j125
j228
j331
j434
j537
j640
j743
j846
Table A5. Time steps on start-up cost curve of unit i (h) suc_sl(i,j).
Table A5. Time steps on start-up cost curve of unit i (h) suc_sl(i,j).
Start-up Blocks (h):
j1j2j3j4j5j6j7j8
i112345678
i212345678
i312345678
Table A6. Time periods that unit i has been down before t = 0 (h): count_off_init(i).
Table A6. Time periods that unit i has been down before t = 0 (h): count_off_init(i).
Count “off” Init (h)
column1
i10
i20
i30
i41
i517
i64
Table A7. Time that unit i has been up before t = 0 (h): count_on_init(i).
Table A7. Time that unit i has been up before t = 0 (h): count_on_init(i).
Count “on” Init (h)
column1
i11
i2400
i3220
i40
Table A8. Fixed production cost for unit i ($): a(i)
Table A8. Fixed production cost for unit i ($): a(i)
No Load Cost ($)
tr4
i1454.572
i2454.562
i3263.419
Table A9. Ramp-up limit of unit i (MW/h): ramp_up(i).
Table A9. Ramp-up limit of unit i (MW/h): ramp_up(i).
Ramp-Up Limit (MW/h)
tr4
i130.5
i230.5
i338.5
Table A10. Ramp-down limit of unit i (MW/h): ramp_down(i).
Table A10. Ramp-down limit of unit i (MW/h): ramp_down(i).
Ramp-Down Limit (MW/h)
tr4
i170
i270
i380
Table A11. Minimum time unit i has to be shut down (h): g_down(i).
Table A11. Minimum time unit i has to be shut down (h): g_down(i).
Min. Down Time (h)
tr4
i11
i21
i32
Table A12. Minimum time unit i has to be up (h): g_up(i).
Table A12. Minimum time unit i has to be up (h): g_up(i).
Min. Up Time (h)
tr4
i11
i21
i33
Table A13. Minimum output capacity of unit i (MW): g_min(i).
Table A13. Minimum output capacity of unit i (MW): g_min(i).
Min. Output (MW)
tr4
i14.0
i24.0
i315.2
Table A14. Output power of unit i at t = 0 (MW): g_0(i).
Table A14. Output power of unit i at t = 0 (MW): g_0(i).
Output at t = 0 (MW)
column1
i120
i220
i370
i40
i50
Transmission line data
Table A15. Admittance of transmission line between nodes s and m (S): admittance(l).
Table A15. Admittance of transmission line between nodes s and m (S): admittance(l).
1/X
column1
l17142.8570
l2473.9336
l31176.4710
Table A16. Line map, line_map(l,s).
Table A16. Line map, line_map(l,s).
s101s102s103s104s105
l11‒1000
l210‒100
l31000‒1
l4010‒10
Table A17. Capacity of transmission line between nodes s and m (MW): l_max(l).
Table A17. Capacity of transmission line between nodes s and m (MW): l_max(l).
Capacity
l1175
l2175
l3175
l4175
Demand load data
Table A18. Demand load on bus s (MW): d(t,s).
Table A18. Demand load on bus s (MW): d(t,s).
s101s102s103s104
t163.9861857.25079106.082343.78002
t260.1661153.8328399.7490741.16628
t357.3010551.2693694.9991139.20598
Wind plants data
Table A19. Wind plants map w_map(w,s).
Table A19. Wind plants map w_map(w,s).
s116s117s118s119
w31
w4 1
w5 1
w6 1
w7
Table A20. Capacity of wind plants (MW): w_capacity(w).
Table A20. Capacity of wind plants (MW): w_capacity(w).
Capacity
w1300
w2300
w3600
w4600
Table A21. Probabilities for each of the wind scenarios: prob(scen).
Table A21. Probabilities for each of the wind scenarios: prob(scen).
Capacity
scen10.020000
scen20.160000
scen30.107273
scen40.241818
scen50.107273
scen60.150000
scen70.086364
scen80.000909
scen90.125455
scen100.000909
Earlier we mentioned that we have the option to select between a favorable and an unfavorable wind profile. The input data program selects the appropriate table each time according to our selection. The procedure is the same for both wind patterns.
Table A22. w_det_pu_1(t,w): includes the available wind power for each unit i calculated in per unit values.
Table A22. w_det_pu_1(t,w): includes the available wind power for each unit i calculated in per unit values.
Favorable
Deterministic
Capacity300300600600300600
w1w2w3w4w5w6
t10.0863800.2110120.1530270.1545250.0269730.485740
t20.0436970.1393270.1398530.1311910.0768860.431102
t30.0890330.1518540.1549400.1791270.0959840.370302
t40.3046600.2991340.2734810.2499780.0640530.176555
t50.3961270.2994140.3434530.1787070.0256510.066776
Table A23. Lower and upper bound of wind production: wind_robust_pu_1(t,w,robust) per unit values.
Table A23. Lower and upper bound of wind production: wind_robust_pu_1(t,w,robust) per unit values.
UPDOWN
col1col2
t1w10.2368720.000000
t1w20.3370080.109605
t1w30.2782990.042769
t1w40.2711150.030279
t1w50.0849810.000000
t1w60.7492220.254945
Table A24. Stochastic ramp-up and ramp-down rates of wind production: w_stoch_max_1(t,w,robust).
Table A24. Stochastic ramp-up and ramp-down rates of wind production: w_stoch_max_1(t,w,robust).
STOCHASTIC RAMPS
UPDOWN
col1col2
w10.000000‒0.089880
w2‒0.012230‒0.065270
w30.121853‒0.117670
w40.001779‒0.104180
w50.1314160.003539
w6‒0.032410‒0.312890
w70.010194‒0.025100
w80.0339260.000792
Table A25. Probability for each scenario for each wind unit: wind_scenarios_1(t,w,scen).
Table A25. Probability for each scenario for each wind unit: wind_scenarios_1(t,w,scen).
scen1scen2scen3scen4scen5scen6scen7
t1w10.1008620.0720620.0990230.0801630.1323680.0618890.127721
t1w20.1814670.2202130.1875130.2404980.1910130.1709660.213342
t1w30.1587850.1213930.1606440.1448370.2014590.1288300.161325
t1w40.1693630.1332670.1762700.1163730.1638920.0711130.171963
t1w50.0210530.0000000.0271470.0000000.0105170.0000000.013856
t1w60.4884060.5025840.4421720.5049390.4841600.5478800.481501
t1w70.5461990.5931010.5164200.6154200.5056180.5498480.505922

References

  1. SGTF EG2. Recommendations for the European Commission on Implementation of a Network Code on Cybersecurity, Second Interim Report, Smart Grid Task Force Expert Group. 2018. Available online: https://ec.europa.eu/energy/sites/ener/files/sgtf_eg2_2nd_interim_report_final.pdf (accessed on 29 January 2019).
  2. EECSP. Recommendations for the European Commission on a European Strategic Framework and Potential Future Legislative Acts for the Energy Sector, EECSP Expert Group. 2017. Available online: https://ec.europa.eu/energy/sites/ener/files/documents/eecsp_report_final.pdf (accessed on 29 January 2019).
  3. European Commission. Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, Report. 2013. Available online: https://eeas.europa.eu/archives/docs/policies/eu-cyber-security/cybsec_comm_en.pdf (accessed on 29 January 2019).
  4. INL. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector; Idaho National laboratory: Idaho Falls, ID, USA, 2016. [Google Scholar]
  5. ENISA. Smart Grid Threat Landscape and Good Practice Guide. 2013. Available online: https://www.enisa.europa.eu/publications/smart-grid-threat-landscape-and-good-practice-guide (accessed on 29 January 2019).
  6. ANL-GSS 15/4. Analysis of Critical Infrastructure Dependencies and Interdependencies, Argonne-Risk and Infrastructure Science Center, Argone National Lanoratory. 2015. Available online: http://www.ipd.anl.gov/anlpubs/2015/06/111906.pdf (accessed on 29 January 2019).
  7. National Institute of Standards and Technology. Guidelines for Smart Grid Cybersecurity—Smart Grid Cybersecurity Strategy—Architecture and High-Level Requirements, Volume 1. 2014. Available online: https://nvlpubs.nist.gov/nistpubs/ir/2014/NIST.IR.7628r1.pdf (accessed on 29 January 2019).
  8. Sun, C.C.; Hahn, A.; Liu, C.C. Cyber security of a power grid: State-of-the-art. Int. J. Electr. Power Energy Syst. 2018, 99, 45–56. [Google Scholar] [CrossRef]
  9. Mrabet, Z.E.; Kaabouch, N.; Ghazi, H.E.; Ghazi, H.E. Cyber-security in smart grid: Survey and challenges. Comput. Electr. Eng. 2018, 67, 469–482. [Google Scholar] [CrossRef]
  10. Jarmakiewicz, J.; Maślanka, K.; Parobczak, K. Development of Cyber Security Testbed for Critical Infrastructure. In Proceedings of the 2015 International Conference on Military Communications and Information Systems, Cracow, Poland, 18–19 May 2015. [Google Scholar]
  11. Shi, L.; Dai, Q.; Ni, Y. Cyber–physical interactions in power systems: A review of models, methods, and applications. Electr. Power Syst. Res. 2018, 163, 396–412. [Google Scholar] [CrossRef]
  12. Poudel, S.; Ni, Z.; Malla, N. Real-time cyber physical system testbed for power system security and control. Int. J. Electr. Power Energy Syst. 2017, 90, 124–133. [Google Scholar] [CrossRef]
  13. Hammad, E.; Ezeme, M.; Farraj, A. Implementation and development of an offline co-simulation testbed for studies of power systems cyber security and control verification. Int. J. Electr. Power Energy Syst. 2019, 104, 817–826. [Google Scholar] [CrossRef]
  14. Liu, W.; Gong, Q.; Han, H.; Wang, Z.; Wang, L. Reliability Modeling and Evaluation of Active Cyber Physical Distribution System. IEEE Trans. Power Syst. 2018, 33, 7096–7108. [Google Scholar] [CrossRef]
  15. Park, J.K.; Suh, Y.S.; Park, C. Implementation of cyber security for safety systems of nuclear facilities. Prog. Nucl. Energy 2016, 88, 88–94. [Google Scholar] [CrossRef]
  16. Gunduz, H.; Jayaweera, D. Reliability assessment of a power system with cyber-physical interactive operation of photovoltaic systems. Int. J. Electr. Power Energy Syst. 2018, 101, 371–384. [Google Scholar] [CrossRef]
  17. Sundararajan, A.; Chavan, A.; Saleem, D.; Sarwat, A.I. A Survey of Protocol-Level Challenges and Solutions for Distributed Energy Resource Cyber-Physical Security. Energies 2018, 11, 2360. [Google Scholar] [CrossRef]
  18. Tellbach, D.; Li, Y.F. Cyber-Attacks on Smart Meters in Household Nanogrid: Modeling, Simulation and Analysis. Energies 2018, 11, 316. [Google Scholar] [CrossRef]
  19. Ye, X.; Zhao, J.; Zhang, Y.; Wen, F. Quantitative Vulnerability Assessment of Cyber Security for Distribution Automation Systems. Energies 2015, 8, 5266–5286. [Google Scholar] [CrossRef] [Green Version]
  20. Venkatachary, S.K.; Prasad, J.; Samikannu, R. Economic Impacts of Cyber Security in Energy Sector: A Review. Int. J. Energy Econ. Policy 2017, 7, 250–262. [Google Scholar]
  21. Liu, X.; Li, Z.; Shuai, Z.; Wen, Y. Cyber Attacks Against the Economic Operation of Power Systems: A Fast Solution. IEEE Trans. Smart Grid 2017, 8, 1023–1025. [Google Scholar] [CrossRef]
  22. Liu, R.; Vellaithurai, C.; Biswas, S.S.; Gamage, T.T.; Srivastava, A.K. Analyzing the Cyber-Physical Impact of Cyber Events on the Power Grid. IEEE Trans. Smart Grid 2015, 6, 2444–2453. [Google Scholar] [CrossRef]
  23. Poudineh, R.; Jamasb, T. Electricity Supply Interruptions: Sectoral Interdependencies and the Cost of Energy Not Served for the Scottish Economy. Energy J. 2017, 38, 51–76. [Google Scholar] [CrossRef]
  24. Leszczyna, R. A review of standards with cybersecurity requirements for smart grid. Comput. Secur. 2018, 77, 262–276. [Google Scholar] [CrossRef]
  25. Mackiewicz, R.; Heights, S. Technical Overview and Benefits of the IEC 61850 Standard for Substation Automation. In Proceedings of the 2006 IEEE PES Power Systems Conference and Exposition (PSCE), Atlanta, GA, USA, 29 October–1 November 2006. [Google Scholar]
  26. Jarmakiewicz, J.; Parobczak, K.; Maślanka, K. Cybersecurity protection for power grid control infrastructures. Int. J. Crit. Infrastruct. Prot. 2017, 18, 20–33. [Google Scholar] [CrossRef]
  27. de Gusmão, A.P.H.; Silva, M.M.; Poleto, T.; Silva, L.C.; Costa, A.P.C.S. Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory. Int. J. Inf. Manag. 2018, 43, 248–260. [Google Scholar] [CrossRef]
  28. Zarreh, A.; Saygin, C.; Wan, H.D.; Lee, Y.; Bracho, A. A game theory based cybersecurity assessment model for advanced manufacturing systems. Procedia Manuf. 2018, 26, 1255–1264. [Google Scholar] [CrossRef]
  29. Dagoumas, A.; Polemis, M. An integrated model for assessing electricity retailer’s profitability with demand response. Appl. Energy 2017, 198, 49–64. [Google Scholar] [CrossRef]
  30. Dagoumas, A.; Koltsaklis, N.; Panapakidis, I. An integrated model for risk management in electricity trade. Energy 2017, 124, 350–363. [Google Scholar] [CrossRef]
  31. Koltsaklis, N.; Dagoumas, A.; Panapakidis, I. Impact of the penetration of renewables on flexibility need. Energy Policy 2017, 109, 360–369. [Google Scholar] [CrossRef]
  32. Renewable Energy Analysis Lab—Library. 2017. Available online: http://www2.ee.washington.edu/research/real/index.html (accessed on 29 January 2019).
  33. Pandzic, H.; Dvorkin, Y.; Qiu, T.; Wang, Y.; Kirschen, D. Unit Commitment under Uncertainty—GAMS Models; Library of the Renewable Energy Analysis Lab (REAL), University of Washington: Seattle, WA, USA, 2017; Available online: http://www.ee.washington.edu/research/real/gams_code.html (accessed on 29 January 2019).
  34. Dvorkin, Y.; Pandžić, H.; Ortega-Vazquez, M.A.; Kirschen, D.S. A Hybrid Stochastic/Interval Approach to Transmission-Constrained Unit Commitment. IEEE Trans. Power Syst. 2015, 30, 621–631. [Google Scholar] [CrossRef]
  35. Bertsimas, D.; Litvinov, E.; Sun, X.A.; Zhao, J.; Zheng, T. Adaptive Robust Optimization for the Security Constrained Unit Commitment Problem. IEEE Trans. Power Syst. 2013, 28, 52–63. [Google Scholar] [CrossRef] [Green Version]
  36. Kirschen, D. Variants of Stochastic Unit Commitment. 2014. Available online: http://gridoptics.org/fpgws14/files/workshop/Kirschen- SCUCVariantsSoftwareSession_GOWS_FY14.pdf (accessed on 29 January 2019).
  37. CIGRÉ. Security for Information Systems and Intranets in Electric Power Systems; CIGRÉ joint working group JWG D2/B3/C2.01; CIGRÉ: Paris, France, 2007. [Google Scholar]
  38. CIGRÉ. Treatment of Information Security for Electric Power Systems; CIGRÉ joint working group JWG D2.22; CIGRÉ: Paris, France, 2010. [Google Scholar]
  39. Roche, P. Cyber Security Considerations in Power System Operations; CIGRÉ: Paris, France, 2005. [Google Scholar]
Figure 1. Typical structure of an electric power system (source: INL, 2016).
Figure 1. Typical structure of an electric power system (source: INL, 2016).
Energies 12 00725 g001
Figure 2. The electrical system IEEE RTS-96.
Figure 2. The electrical system IEEE RTS-96.
Energies 12 00725 g002
Figure 3. Committed capacity using different UC models and different wind profile (favorable for the upper group of lines and unfavorable for the lower group of values), source: Kirschen [34].
Figure 3. Committed capacity using different UC models and different wind profile (favorable for the upper group of lines and unfavorable for the lower group of values), source: Kirschen [34].
Energies 12 00725 g003
Figure 4. Frequency deviation following of activation of dynamic and non-dynamic ancillary services by a thermal power plant, linked to the AGC.
Figure 4. Frequency deviation following of activation of dynamic and non-dynamic ancillary services by a thermal power plant, linked to the AGC.
Energies 12 00725 g004
Figure 5. Evolution of hourly demand of the examined typical day.
Figure 5. Evolution of hourly demand of the examined typical day.
Energies 12 00725 g005
Figure 6. Evolution of hourly energy mix of the examined typical day for the RUC_BAS scenario.
Figure 6. Evolution of hourly energy mix of the examined typical day for the RUC_BAS scenario.
Energies 12 00725 g006
Figure 7. Evolution of hourly energy mix (in %) of the examined typical day for the (a) RUC_BAS, (b) RUC_Cyber1, (c) RUC_Cyber2, (d) RUC_Cyber3, and (e) RUC_Cyber4 scenarios.
Figure 7. Evolution of hourly energy mix (in %) of the examined typical day for the (a) RUC_BAS, (b) RUC_Cyber1, (c) RUC_Cyber2, (d) RUC_Cyber3, and (e) RUC_Cyber4 scenarios.
Energies 12 00725 g007aEnergies 12 00725 g007b
Table 1. Objective function cost (in USD) for different scenarios.
Table 1. Objective function cost (in USD) for different scenarios.
Objective Function Cost
DUC_BAS1,019,770
SUC_BAS2,056,180
RUC_BAS2,056,184
DUC_Cyber11,276,210
SUC_Cyber12,548,230
RUC_Cyber12,423,626
RUC_Cyber22,952,878
RUC_Cyber32,207,915
RUC_Cyber42,548,225
Table 2. Number of thermal units dispatched for different scenarios using the RUC model.
Table 2. Number of thermal units dispatched for different scenarios using the RUC model.
Units Committed
RUC_BASRUC_Cyber1RUC_Cyber2RUC_Cyber3RUC_Cyber4
13027263129
21112171616
3910171315
471215813
5715161014
61420231520
73132413236
83544454142
94246464247
104346534347
114348584548
124346514347
134346534346
144346564346
154346524346
164346534346
174446564647
184550564647
194756644649
204546514647
213444453844
222528362630
231117212123
247712913
Table 3. Energy mix for different scenarios with the RUC model.
Table 3. Energy mix for different scenarios with the RUC model.
RUC_BASRUC_Cyber1RUC_Cyber2RUC_Cyber3RUC_Cyber4
RES20.20%21.29%20.63%19.52%19.83%
Thermal79.80%78.71%79.37%80.48%80.17%
Total100.00%100.00%100.00%100.00%100.00%

Share and Cite

MDPI and ACS Style

Dagoumas, A. Assessing the Impact of Cybersecurity Attacks on Power Systems. Energies 2019, 12, 725. https://doi.org/10.3390/en12040725

AMA Style

Dagoumas A. Assessing the Impact of Cybersecurity Attacks on Power Systems. Energies. 2019; 12(4):725. https://doi.org/10.3390/en12040725

Chicago/Turabian Style

Dagoumas, Athanasios. 2019. "Assessing the Impact of Cybersecurity Attacks on Power Systems" Energies 12, no. 4: 725. https://doi.org/10.3390/en12040725

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop