Matching Items (8)
Filtering by

Clear all filters

153544-Thumbnail Image.png
Description
The electric power system is one of the largest, most complicated, and most important cyber-physical systems in the world. The link between the cyber and physical level is the Supervisory Control and Data Acquisition (SCADA) systems and Energy Management Systems (EMS). Their functions include monitoring the real-time system operation

The electric power system is one of the largest, most complicated, and most important cyber-physical systems in the world. The link between the cyber and physical level is the Supervisory Control and Data Acquisition (SCADA) systems and Energy Management Systems (EMS). Their functions include monitoring the real-time system operation through state estimation (SE), controlling the system to operate reliably, and optimizing the system operation efficiency. The SCADA acquires the noisy measurements, such as voltage angle and magnitude, line power flows, and line current magnitude, from the remote terminal units (RTUs). These raw data are firstly sent to the SE, which filters all the noisy data and derives the best estimate of the system state. Then the estimated states are used for other EMS functions, such as contingency analysis, optimal power flow, etc.

In the existing state estimation process, there is no defense mechanism for any malicious attacks. Once the communication channel between the SCADA and RTUs is hijacked by the attacker, the attacker can perform a man-in-middle attack and send data of its choice. The only step that can possibly detect the attack during the state estimation process is the bad data detector. Unfortunately, even the bad data detector is unable to detect a certain type of attack, known as the false data injection (FDI) attacks.

Diagnosing the physical consequences of such attacks, therefore, is very important to understand system stability. In this thesis, theoretical general attack models for AC and DC attacks are given and an optimization problem for the worst-case overload attack is formulated. Furthermore, physical consequences of FDI attacks, based on both DC and AC model, are addressed. Various scenarios with different attack targets and system configurations are simulated. The details of the research, results obtained and conclusions drawn are presented in this document.
ContributorsLiang, Jingwen (Author) / Sankar, Lalitha (Thesis advisor) / Kosut, Oliver (Thesis advisor) / Hedman, Kory (Committee member) / Arizona State University (Publisher)
Created2015
150671-Thumbnail Image.png
Description
Contemporary methods for dynamic security assessment (DSA) mainly re-ly on time domain simulations to explore the influence of large disturbances in a power system. These methods are computationally intensive especially when the system operating point changes continually. The trajectory sensitivity method, when implemented and utilized as a complement to the

Contemporary methods for dynamic security assessment (DSA) mainly re-ly on time domain simulations to explore the influence of large disturbances in a power system. These methods are computationally intensive especially when the system operating point changes continually. The trajectory sensitivity method, when implemented and utilized as a complement to the existing DSA time domain simulation routine, can provide valuable insights into the system variation in re-sponse to system parameter changes. The implementation of the trajectory sensitivity analysis is based on an open source power system analysis toolbox called PSAT. Eight categories of sen-sitivity elements have been implemented and tested. The accuracy assessment of the implementation demonstrates the validity of both the theory and the imple-mentation. The computational burden introduced by the additional sensitivity equa-tions is relieved by two innovative methods: one is by employing a cluster to per-form the sensitivity calculations in parallel; the other one is by developing a mod-ified very dishonest Newton method in conjunction with the latest sparse matrix processing technology. The relation between the linear approximation accuracy and the perturba-tion size is also studied numerically. It is found that there is a fixed connection between the linear approximation accuracy and the perturbation size. Therefore this finding can serve as a general application guide to evaluate the accuracy of the linear approximation. The applicability of the trajectory sensitivity approach to a large realistic network has been demonstrated in detail. This research work applies the trajectory sensitivity analysis method to the Western Electricity Coordinating Council (WECC) system. Several typical power system dynamic security problems, in-cluding the transient angle stability problem, the voltage stability problem consid-ering load modeling uncertainty and the transient stability constrained interface real power flow limit calculation, have been addressed. Besides, a method based on the trajectory sensitivity approach and the model predictive control has been developed for determination of under frequency load shedding strategy for real time stability assessment. These applications have shown the great efficacy and accuracy of the trajectory sensitivity method in handling these traditional power system stability problems.
ContributorsHou, Guanji (Author) / Vittal, Vijay (Thesis advisor) / Heydt, Gerald (Committee member) / Tylavsky, Daniel (Committee member) / Si, Jennie (Committee member) / Arizona State University (Publisher)
Created2012
151214-Thumbnail Image.png
Description
In electric power systems, phasor measurement units (PMUs) are capable of providing synchronized voltage and current phasor measurements which are superior to conventional measurements collected by the supervisory control and data acquisition (SCADA) system in terms of resolution and accuracy. These measurements are known as synchrophasor measurements. Considerable research work

In electric power systems, phasor measurement units (PMUs) are capable of providing synchronized voltage and current phasor measurements which are superior to conventional measurements collected by the supervisory control and data acquisition (SCADA) system in terms of resolution and accuracy. These measurements are known as synchrophasor measurements. Considerable research work has been done on the applications of PMU measurements based on the as-sumption that a high level of accuracy is obtained in the field. The study in this dissertation is conducted to address the basic issue concerning the accuracy of actual PMU measurements in the field. Synchronization is one of the important features of PMU measurements. However, the study presented in this dissertation reveals that the problem of faulty synchronization between measurements with the same time stamps from different PMUs exists. A Kalman filter model is proposed to analyze and calcu-late the time skew error caused by faulty synchronization. In order to achieve a high level of accuracy of PMU measurements, inno-vative methods are proposed to detect and identify system state changes or bad data which are reflected by changes in the measurements. This procedure is ap-plied as a key step in adaptive Kalman filtering of PMU measurements to over-come the insensitivity of a conventional Kalman filter. Calibration of PMU measurements is implemented in specific PMU instal-lation scenarios using transmission line (TL) parameters from operation planning data. The voltage and current correction factors calculated from the calibration procedure indicate the possible errors in PMU measurements. Correction factors can be applied in on-line calibration of PMU measurements. A study is conducted to address an important issue when integrating PMU measurements into state estimation. The reporting rate of PMU measurements is much higher than that of the measurements collected by the SCADA. The ques-tion of how to buffer PMU measurements is raised. The impact of PMU meas-urement buffer length on state estimation is discussed. A method based on hy-pothesis testing is proposed to determine the optimal buffer length of PMU meas-urements considering the two conflicting features of PMU measurements, i. e. un-certainty and variability. Results are presented for actual PMU synchrophasor measurements.
ContributorsZhang, Qing (Author) / Heydt, Gerald (Thesis advisor) / Vittal, Vijay (Thesis advisor) / Ayyanar, Raja (Committee member) / Si, Jennie (Committee member) / Arizona State University (Publisher)
Created2012
153914-Thumbnail Image.png
Description
The large distributed electric power system is a hierarchical network involving the

transportation of power from the sources of power generation via an intermediate

densely connected transmission network to a large distribution network of end-users

at the lowest level of the hierarchy. At each level of the hierarchy (generation/ trans-

mission/ distribution), the system

The large distributed electric power system is a hierarchical network involving the

transportation of power from the sources of power generation via an intermediate

densely connected transmission network to a large distribution network of end-users

at the lowest level of the hierarchy. At each level of the hierarchy (generation/ trans-

mission/ distribution), the system is managed and monitored with a combination of

(a) supervisory control and data acquisition (SCADA); and (b) energy management

systems (EMSs) that process the collected data and make control and actuation de-

cisions using the collected data. However, at all levels of the hierarchy, both SCADA

and EMSs are vulnerable to cyber attacks. Furthermore, given the criticality of the

electric power infrastructure, cyber attacks can have severe economic and social con-

sequences.

This thesis focuses on cyber attacks on SCADA and EMS at the transmission

level of the electric power system. The goal is to study the consequences of three

classes of cyber attacks that can change topology data. These classes include: (i)

unobservable state-preserving cyber attacks that only change the topology data; (ii)

unobservable state-and-topology cyber-physical attacks that change both states and

topology data to enable a coordinated physical and cyber attack; and (iii) topology-

targeted man-in-the-middle (MitM) communication attacks that alter topology data

shared during inter-EMS communication. Specically, attack class (i) and (ii) focus on

the unobservable attacks on single regional EMS while class (iii) focuses on the MitM

attacks on communication links between regional EMSs. For each class of attacks,

the theoretical attack model and the implementation of attacks are provided, and the

worst-case attack and its consequences are exhaustively studied. In particularly, for

class (ii), a two-stage optimization problem is introduced to study worst-case attacks

that can cause a physical line over

ow that is unobservable in the cyber layer. The long-term implication and the system anomalies are demonstrated via simulation.

For attack classes (i) and (ii), both mathematical and experimental analyses sug-

gest that these unobservable attacks can be limited or even detected with resiliency

mechanisms including load monitoring, anomalous re-dispatches checking, and his-

torical data comparison. For attack class (iii), countermeasures including anomalous

tie-line interchange verication, anomalous re-dispatch alarms, and external contin-

gency lists sharing are needed to thwart such attacks.
ContributorsZhang, Jiazi (Author) / Sankar, Lalitha (Thesis advisor) / Hedman, Kory (Committee member) / Kosut, Oliver (Committee member) / Arizona State University (Publisher)
Created2015
149306-Thumbnail Image.png
Description
Many methods have been proposed to estimate power system small signal stability, for either analysis or control, through identification of modal frequencies and their damping levels. Generally, estimation methods have been employed to assess small signal stability from collected field measurements. However, the challenge to using these methods in assessing

Many methods have been proposed to estimate power system small signal stability, for either analysis or control, through identification of modal frequencies and their damping levels. Generally, estimation methods have been employed to assess small signal stability from collected field measurements. However, the challenge to using these methods in assessing field measurements is their ability to accurately estimate stability in the presence of noise. In this thesis a new method is developed which estimates the modal content of simulated and actual field measurements using orthogonal polynomials and the results are compared to other commonly used estimators. This new method estimates oscillatory performance by fitting an associate Hermite polynomial to time domain data and extrapolating its spectrum to identify small signal power system frequencies. Once the frequencies are identified, damping assessment is performed using a modified sliding window technique with the use of linear prediction (LP). Once the entire assessment is complete the measurements can be judged to be stable or unstable. Collectively, this new technique is known as the associate Hermite expansion (AHE) algorithm. Validation of the AHE method versus results from four other spectral estimators demonstrates the method's accuracy and modal estimation ability with and without the presence of noise. A Prony analysis, a Yule-Walker autoregressive algorithm, a second sliding window estimator and the Hilbert-Huang Transform method are used in comparative assessments in support of this thesis. Results from simulated and actual field measurements are used in the comparisons, as well as artificially generated simple signals. A search for actual field testing results performed by a utility was undertaken and a request was made to obtain the measurements of a brake insertion test. Comparison results show that the AHE method is accurate as compared to the other commonly used spectral estimators and its predictive capability exceeded the other estimators in the presence of Gaussian noise. As a result, the AHE method could be employed in areas including operations and planning analysis, post-mortem analysis, power system damping scheme design and other analysis areas.
ContributorsKokanos, Barrie Lee (Author) / Karady, George G. (Thesis advisor) / Heydt, Gerald (Committee member) / Farmer, Richard G (Committee member) / Ayyanar, Raja (Committee member) / Karam, Lina (Committee member) / Arizona State University (Publisher)
Created2010
149406-Thumbnail Image.png
Description
After a power system blackout, system restoration is the most important task for the operators. Most power systems rely on an off&ndashline; restoration plan and the experience of operators to select scenarios for the black start path. Using an off&ndashline; designed restoration plan based on past experience may not be

After a power system blackout, system restoration is the most important task for the operators. Most power systems rely on an off&ndashline; restoration plan and the experience of operators to select scenarios for the black start path. Using an off&ndashline; designed restoration plan based on past experience may not be the most reliable approach under changing network configurations and loading levels. Hence, an objective restoration path selection procedure, including the option to check constraints, may be more responsive in providing directed guidance to the operators to identify the optimal transmission path to deliver power to other power plants or to pick up load as needed. After the system is subjected to a blackout, parallel restoration is an efficient way to speed up the restoration process. For a large scale power system, this system sectionalizing problem is quite complicated when considering black&ndashstart; constraints, generation/load balance constraints and voltage constraints. This dissertation presents an ordered binary decision diagram (OBDD) &ndashbased; system sectionalizing method, by which the splitting points can be quickly found. The simulation results on the IEEE 39 and 118&ndashbus; system show that the method can successfully split the system into subsystems satisfying black&ndashstart; constraints, generation/load balance constraints and voltage constraints. A power transfer distribution factor (PTDF)&ndashbased; approach will be described in this dissertation to check constraints while restoring the system. Two types of restoration performance indices are utilized considering all possible restoration paths, which are then ranked according to their expected performance characteristics as reflected by the restoration performance index. PTDFs and weighting factors are used to determine the ordered list of restoration paths, which can enable the load to be picked up by lightly loaded lines or relieve stress on heavily loaded lines. A transmission path agent can then be formulated by performing the automatic path selection under different system operating conditions. The proposed restoration strategy is tested on the IEEE&ndash39; bus system and on the Western region of the Entergy system. The testing results reveal that the proposed strategy can be used in real time.
ContributorsWang, Chong (Author) / Vittal, Vijay (Thesis advisor) / Tylavsky, Daniel (Committee member) / Heydt, Gerald (Committee member) / Farmer, Richard (Committee member) / Arizona State University (Publisher)
Created2010
147972-Thumbnail Image.png
Description

Lossy compression is a form of compression that slightly degrades a signal in ways that are ideally not detectable to the human ear. This is opposite to lossless compression, in which the sample is not degraded at all. While lossless compression may seem like the best option, lossy compression, which

Lossy compression is a form of compression that slightly degrades a signal in ways that are ideally not detectable to the human ear. This is opposite to lossless compression, in which the sample is not degraded at all. While lossless compression may seem like the best option, lossy compression, which is used in most audio and video, reduces transmission time and results in much smaller file sizes. However, this compression can affect quality if it goes too far. The more compression there is on a waveform, the more degradation there is, and once a file is lossy compressed, this process is not reversible. This project will observe the degradation of an audio signal after the application of Singular Value Decomposition compression, a lossy compression that eliminates singular values from a signal’s matrix.

ContributorsHirte, Amanda (Author) / Kosut, Oliver (Thesis director) / Bliss, Daniel (Committee member) / Electrical Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
154325-Thumbnail Image.png
Description
Constraint relaxation by definition means that certain security, operational, or financial constraints are allowed to be violated in the energy market model for a predetermined penalty price. System operators utilize this mechanism in an effort to impose a price-cap on shadow prices throughout the market. In addition, constraint relaxations can

Constraint relaxation by definition means that certain security, operational, or financial constraints are allowed to be violated in the energy market model for a predetermined penalty price. System operators utilize this mechanism in an effort to impose a price-cap on shadow prices throughout the market. In addition, constraint relaxations can serve as corrective approximations that help in reducing the occurrence of infeasible or extreme solutions in the day-ahead markets. This work aims to capture the impact constraint relaxations have on system operational security. Moreover, this analysis also provides a better understanding of the correlation between DC market models and AC real-time systems and analyzes how relaxations in market models propagate to real-time systems. This information can be used not only to assess the criticality of constraint relaxations, but also as a basis for determining penalty prices more accurately.

Constraint relaxations practice was replicated in this work using a test case and a real-life large-scale system, while capturing both energy market aspects and AC real-time system performance. System performance investigation included static and dynamic security analysis for base-case and post-contingency operating conditions. PJM peak hour loads were dynamically modeled in order to capture delayed voltage recovery and sustained depressed voltage profiles as a result of reactive power deficiency caused by constraint relaxations. Moreover, impacts of constraint relaxations on operational system security were investigated when risk based penalty prices are used. Transmission lines in the PJM system were categorized according to their risk index and each category was as-signed a different penalty price accordingly in order to avoid real-time overloads on high risk lines.

This work also extends the investigation of constraint relaxations to post-contingency relaxations, where emergency limits are allowed to be relaxed in energy market models. Various scenarios were investigated to capture and compare between the impacts of base-case and post-contingency relaxations on real-time system performance, including the presence of both relaxations simultaneously. The effect of penalty prices on the number and magnitude of relaxations was investigated as well.
ContributorsSalloum, Ahmed (Author) / Vittal, Vijay (Thesis advisor) / Hedman, Kory (Thesis advisor) / Heydt, Gerald (Committee member) / Ayyanar, Raja (Committee member) / Arizona State University (Publisher)
Created2016