Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Cyber-Physical Testbed Integrating RTAC with RTDS for Game-Theoretic Topology Control Under Load Altering Attacks (2312.05727v1)

Published 10 Dec 2023 in eess.SY and cs.SY

Abstract: This paper introduces a cyber-physical testbed that integrates the Real-Time Digital Simulator (RTDS) with the Real-Time Automation Controller (RTAC) to enhance cybersecurity in electrical distribution networks. Focused on addressing vulnerabilities to cyber attacks, our testbed employs an advanced control algorithm developed in Python and executed through real-time controllers. Key to our approach is the seamless integration of the host PC machine, RTDS, and RTAC via the Modbus protocol. We present a game theory-based topology control strategy as an effective response to cyber attacks, specifically targeting smart meters. This testbed validates the efficacy of our method in fully eliminating voltage violations due to load altering attacks, showcasing substantial advancements in smart grid cybersecurity via the innovative use of RTDS and RTAC to simulate and counteract complex cyber threats.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (16)
  1. S. Raschka, J. Patterson, and C. Nolet, “Machine learning in python: Main developments and technology trends in data science, machine learning, and artificial intelligence,” Information, vol. 11, no. 4, p. 193, 2020.
  2. D. Kornienko, S. Mishina, S. Shcherbatykh, and M. Melnikov, “Principles of securing restful api web services developed with python frameworks,” in Journal of Physics: Conference Series, vol. 2094, p. 032016, IOP Publishing, 2021.
  3. M. Xue and C. Zhu, “The socket programming and software design for communication based on client/server,” in 2009 Pacific-Asia Conference on Circuits, Communications and Systems, pp. 775–777, IEEE, 2009.
  4. N. Goldenberg and A. Wool, “Accurate modeling of modbus/tcp for intrusion detection in scada systems,” international journal of critical infrastructure protection, vol. 6, no. 2, pp. 63–75, 2013.
  5. M. M. S. Khan, A. Palomino, J. Brugman, J. Giraldo, S. K. Kasera, and M. Parvania, “The cyberphysical power system resilience testbed: Architecture and applications,” Computer, vol. 53, no. 5, pp. 44–54, 2020.
  6. H. Huang, C. M. Davis, and K. R. Davis, “Real-time power system simulation with hardware devices through dnp3 in cyber-physical testbed,” in 2021 IEEE Texas Power and Energy Conference (TPEC), pp. 1–6, IEEE, 2021.
  7. B. Xiao, M. Starke, G. Liu, B. Ollis, P. Irminger, A. Dimitrovski, K. Prabakar, K. Dowling, and Y. Xu, “Development of hardware-in-the-loop microgrid testbed,” in 2015 IEEE energy conversion congress and exposition (ECCE), pp. 1196–1202, IEEE, 2015.
  8. I. A. Oyewumi, A. A. Jillepalli, P. Richardson, M. Ashrafuzzaman, B. K. Johnson, Y. Chakhchoukh, M. A. Haney, F. T. Sheldon, and D. C. de Leon, “Isaac: The idaho cps smart grid cybersecurity testbed,” in 2019 IEEE Texas Power and Energy Conference (TPEC), pp. 1–6, IEEE, 2019.
  9. F. Shariatzadeh, C. B. Vellaithurai, S. S. Biswas, R. Zamora, and A. K. Srivastava, “Real-time implementation of intelligent reconfiguration algorithm for microgrid,” IEEE Trans. sustainable energy, vol. 5, no. 2, pp. 598–607, 2014.
  10. S. S. Biswas, F. Shariatzadeh, R. Beckstrom, and A. K. Srivastava, “Real time testing and validation of smart grid devices and algorithms,” in 2013 IEEE Power & Energy Society General Meeting, pp. 1–5, IEEE, 2013.
  11. J. Kim and L. Tong, “On topology attack of a smart grid: Undetectable attacks and countermeasures,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, pp. 1294–1305, 2013.
  12. A. Selim, J. Zhao, F. Ding, F. Miao, and S.-Y. Park, “Deep reinforcement learning for distribution system cyber attack defense with ders,” in 2023 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp. 1–5, IEEE, 2023.
  13. Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 1, pp. 1–33, 2011.
  14. McGraw-Hill New York, 2007.
  15. “Pymodbus documentation.” https://pymodbus.readthedocs.io/en/latest/, 2023. Accessed: 2023-12-03.
  16. J. Brugman, M. Khan, S. Kasera, and M. Parvania, “Cloud based intrusion detection and prevention system for industrial control systems using software defined networking,” in 2019 Resilience Week (RWS), vol. 1, pp. 98–104, IEEE, 2019.

Summary

We haven't generated a summary for this paper yet.