期刊论文详细信息
Energies
Effects of Cyber Attacks on AC and High-Voltage DC Interconnected Power Systems with Emulated Inertia
Jingwei Dong1  Peter Palensky1  Kaikai Pan1  Elyas Rakhshani1 
[1] Department of Electrical Sustainable Energy, Delft University of Technology, 2600 GA Delft, The Netherlands;
关键词: AC/HVDC interconnections;    load frequency control;    virtual inertia;    Denial of Service;    false data injection;    attack impact;   
DOI  :  10.3390/en13215583
来源: DOAJ
【 摘 要 】

The high penetration of renewable energy resources and power electronic-based components has led to a low-inertia power grid which would bring challenges to system operations. The new model of load frequency control (LFC) must be able to handle the modern scenario where controlled areas are interconnected by parallel AC/HVDC links and storage devices are added to provide virtual inertia. Notably, vulnerabilities within the communication channels for wide-area data exchange in LFC loops may make them exposed to various cyber attacks, while it still remains largely unexplored how the new LFC in the AC/HVDC interconnected system with emulated inertia would be affected under malicious intrusions. Thus, in this article, we are motivated to explore possible effects of the major types of data availability and integrity attacks—Denial of Service (DoS) and false data injection (FDI) attacks—on such a new LFC system. By using a system-theoretic approach, we explore the optimal strategies that attackers can exploit to launch DoS or FDI attacks to corrupt the system stability. Besides, a comparison study is performed to learn the impact of these two types of attacks on LFC models of power systems with or without HVDC link and emulated inertia. The simulation results on the the exemplary two-area system illustrate that both DoS and FDI attacks can cause large frequency deviations or even make the system unstable; moreover, the LFC system with AC/HVDC interconnections and emulated inertia could be more vulnerable to these two types of attacks in many adversarial scenarios.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:2次