Reliability Considerations in Cyber-Power Dependent Systems

Similar documents
Reliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage

Chanan Singh Texas A&M University PSERC Webinar November 22, 2016

Lesson 12: Angles Associated with Parallel Lines

AMI: Communications and Integration Options

Similar Polygons Date: Per:

Stacks & Queues. Kuan-Yu Chen ( 陳冠宇 ) TR-212, NTUST

Eureka Math. Grade 7, Module 6. Student File_A. Contains copy-ready classwork and homework

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks

Resilient Smart Grids

Visit MathNation.com or search "Math Nation" in your phone or tablet's app store to watch the videos that go along with this workbook!

6.2 OPTIONAL SECURITY SERVICES

FINAL EXAM REVIEW CH Determine the most precise name for each quadrilateral.

Multi-view object segmentation in space and time. Abdelaziz Djelouah, Jean Sebastien Franco, Edmond Boyer

Section 6: Triangles Part 1

Queues. Kuan-Yu Chen ( 陳冠宇 ) TR-212, NTUST

Copy Material. Geometry Unit 1. Congruence, Proof, and Constructions. Eureka Math. Eureka Math

Lesson 21: Surface Area

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

Math 96--Radicals #1-- Simplify; Combine--page 1

T.4 Applications of Right Angle Trigonometry

"Charting the Course... MOC A Planning, Deploying and Managing Microsoft Forefront TMG Course Summary

Solano Community College Academic Senate CURRICULUM COMMITTEE AGENDA Tuesday, May 1, :30 p.m., Room 503

Title. Author(s)Nguyen, Thi Xuan My; Saivichit, Chaiyachet; Miyanaga. Issue Date Doc URL. Type. Note. File Information

QUALITY OF SERVICE INDICATORS UNDER CYBER ATTACKS BY RAO SIMULATOR

Lecture 3.3 Robust estimation with RANSAC. Thomas Opsahl

A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid

Eureka Math. Geometry, Module 4. Student File_B. Contains Exit Ticket, and Assessment Materials

Development of an Intelligent Fault Indicator for Smart Grids

Eureka Math. Grade 7, Module 6. Student File_B Contains Exit Tickets, and Assessment Materials

recruitment Logo Typography Colourways Mechanism Usage Pip Recruitment Brand Toolkit

Automation of Distribution Grid with FLISR using ZigBee Communication

November 25, Mr. Paul Kaspar, PE City Engineer City of Bryan Post Office Box 1000 Bryan, Texas 77802

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks

April Oracle Spatial User Conference

BRAND BOOK. Copyright 2016 WashU Student Union Student Union Brand Guidebook 1

The Application Analysis and Network Design of wireless VPN for power grid. Wang Yirong,Tong Dali,Deng Wei

Performance Analysis of the Different Null Steering Techniques in the Field of Adaptive Beamforming

Why Security Fails in Federated Systems

Introduction to Deep Learning

Section 1: Introduction to Geometry Points, Lines, and Planes

Wisconsin Retirement Testing Preparation

Syntax Analysis Top Down Parsing

OPTIMAL DESIGN OF A STEPPER-DRIVEN PLANAR LINKAGE USING ENTROPY METHODS

COMPUTER GRAPHICS COURSE. LuxRender. Light Transport Foundations

Eureka Math. Geometry, Module 5. Student File_A. Contains copy-ready classwork and homework

The TiGL Geometry Library and its Current Mathematical Challenges

Transform Extreme Point Multi-Objective Linear Programming Problem to Extreme Point Single Objective Linear Programming Problem by Using Harmonic Mean

Failure Diagnosis and Cyber Intrusion Detection in Transmission Protection System Assets Using Synchrophasor Data

For more information, visit: 3M Cold Shrink QS-III Splice a one-piece joint with wide range and geometric stress control

CONTENTS 05 DYNICS BRAND 06 LOGO 08 SOFTWARE 12 PRODUCT BRANDS 16 ICONS 17 TYPEFACE 19 E SQUAD 20 CONTACT INFORMATION COPYRIGHT NOTICE

Progress Report No. 15. Shared Segments Protection

Cybersecurity Test and Evaluation Facilities at Texas A&M

Growing Our Own Through Collaboration

The ABC s of Web Site Evaluation

Cryptography CS 555. Topic 8: Modes of Encryption, The Penguin and CCA security

"Charting the Course... VMware vsphere 6.5 Optimize, Upgrade, Troubleshoot. Course Summary

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices

CS3600 SYSTEMS AND NETWORKS

BRAND STANDARD GUIDELINES 2014

Bitty Rover. Recommended Age: 12 and up Difficulty Level: 3/5 (Soldering Required, programming, connecting wires, small parts choking hazard)

Dan Murray, Siemens Energy Management Division

Reminder: Homework 4. Due: Friday at the beginning of class

"Charting the Course... CA-View Administration. Course Summary

Model NM512. TS1 Conflict Monitor Standard 12 Channel Unit. Naztec Operations Manual. For. Published by

T.5 The Law of Sines and Cosines and Its Applications

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015)

HIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM

"Dynamic Distribution System, a new Architecture for the Integrated Grid"

Industrial Control. 50 to 5,000 VA. Applications. Specifications. Standards. Options and Accessories. Features, Functions, Benefits.

Industrial Control. 50 to 5,000 VA. Applications. Specifications. Standards. Options and Accessories. Features, Functions, Benefits.

Optimization Frameworks for Wireless Network Coding Under Multi-hop Node Interference

International Journal of Industrial Engineering Computations

Cyber Security of Power Grids

Analysis of End-to-End Delay Characteristics among Various Packet Sizes in Modern Substation Communication Systems based on IEC 61850

Connection Guide (RS-232C)

Lesson 1: Construct an Equilateral Triangle

TRIGONOMETRY. T.1 Angles and Degree Measure

Digital Transformation of Power Delivery

Enabling Smart Energy as a Service via 5G Mobile Network advances

T&D Technology Research Stem

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

Chapter 8: Smart Grid Communication and Networking

Automated Threat Management - in Real Time. Vectra Networks

Communications in the Utility Industry Trends and Examples

Graphs and Linear Functions

Have students complete the summary table, and then share as a class to make sure students understand concepts.

Technical Spotlight DEMO6-S6

Cyber Physical System Security

How to Register for Summer Camp. A Tutorial

Aerodynamic optimization of low pressure axial fans with OpenFOAM

Texture Mapping. Michael Kazhdan ( /467) HB Ch. 14.8,14.9 FvDFH Ch. 16.3, , 16.6

Teacher Assignment and Transfer Program (TATP) On-line Teacher Application Quick Sheets

Virtualization And Self-organization For Utility Computing

Secure Mission-Centric Operations in Cloud Computing

Dependability Modeling Based on AADL Description (Architecture Analysis and Design Language)

Probabilistic Formal Verification of Communication Network-based Fault Detection, Isolation and Service Restoration System in Smart Grid

Transcription:

Reliability Considerations in Cyber-Power Dependent Systems Visvakumar Aravinthan Wichita State University (visvakumar.aravinthan@wichita.edu) PSERC Webinar April 17, 2018 1

Acknowledgement This work was part of PSERC project T-53 Reliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage Collaborative work between Texas A&M & Wichita State The following students contributed to this work Mohammad Heidari Mojtaba Sepehry Thanatheepan Balachandran Suvagata Chakraborty 2

Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 3

Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 4

Background & Motivation 5

Background & Motivation A simple example of cyber-power system Automated fault isolation as the example This process depends on Communication Automatic decision 6

Background & Motivation The cyber-power system can be modeled as A three layer system 7

Background & Motivation Three layer system 8

Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 9

Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Traditional equipment failure management t 2 Corrective Action Improve Detection Isolation Restoration Repair rate (µ) M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc. 2013 North American Power Symposium 10

Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Preventive equipment failure management Preventive Action t 2 Corrective Action Improve Monitoring Failure rate (λ) Improve Detection Isolation Restoration Repair rate (µ) M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc. 2013 North American Power Symposium 11

Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Smart component: Combination of electrical & monitoring Electrical equipment Normal Preventive action Failure Scheduled maintenance Monitoring Normal Failure Scheduled maintenance M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc. 2013 North American Power Symposium 12

Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Smart component: State transition model for reliability evaluation Up μμ λλ Down M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc. 2013 North American Power Symposium 13

Monitoring & Preventive Maintenance A simple example for motivation Improved monitoring Smart component: Failure rate of the smart component (Markov Model) State transition State 0: pp 0 θθ ssss + λλ ssss + λλ pppp = pp 2 μμ pppp + pp 3 μμ ssss + PP 5 μμ 0 State 1: pp 1 θθ pppp = pp 0 (λλ pppp ) State 2: pp 2 λλ dd + μμ pppp = pp 1 θθ pppp State 3: pp 3 λλ cc + μμ ssss = pp 0 θθ ssss + pp 4 θθ ssss State 4: pp 4 λλ cc + θθ ssss = pp 0 λλ ssss State 5: pp 5 μμ 0 = pp λλ dd + pp 3 λλ cc + pp 4 (λλ cc ) Smart component failure rate λλ ssssss = λλ dd pp 2 + λλ cc pp 3 + λλ cc pp 4 Can be shown that iiii pp 0 > 0 λλ ssssss < λλ cc Failure rate decreases M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc. 2013 North American Power Symposium 14

Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 15

Effect of Communication Communication network Successful data received rate 16

Effect of Communication Communication network Failure data: Data Availability Missing Data Rate Recovery Rate 0.9582 3.2212 failures per day 0.3555 second 17

Effect of Communication Communication network How communication failure affects power system: Example: Event driven communication Application: Automatic switches Critical to understand the dependency M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc. 2013 North American Power Symposium 18

Effect of Communication Communication network How communication failure affects power system: Example: Event driven communication Application: Automatic switches Communication enabled switches Time sequential Monte-Carlo simulation Unavailability based approach M. Heidari and V. Aravinthan, Component Reliability Evaluation in the Presence of Smart Monitoring, in Proc. 2013 North American Power Symposium 19

Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 20

Cyber System Failure Modeling Failure of cyber system Scenario 1: Data unavailability Decision is made based on the information received from fault indicators Communication failure can be modeled based on the network behavior M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March 2018 21

Cyber System Failure Modeling Failure of cyber system Scenario 1: Data unavailability Fault detector Remote controlled switch si ii PP ffii = PP ffff i cf ii + 1 PP ffff i cf i sw ii PP ffff i cf i sw P = P + ( 1 P ) P + (1 P )(1 P ) P i ak M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March 2018 22

Cyber System Failure Modeling Network availability modeling Cyber network with single path Graph r 0 =S r 1 r 2 r h 2 r h 1 r h = D Probability of transmitted data from S received at D PP ss = PP ss rr 0 rr 1 PP ss rr 1 rr 2 PP ss rr h 1 rr h S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 23

Cyber System Failure Modeling Network availability modeling Physical network model with multiple paths Graph of the above model S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 24

Cyber System Failure Modeling Network availability modeling Reliability computation for multipath network Multiple paths between source and destination AA CC EE AA BB FF HH AA BB DD AA CC GG HH AA BB FF GG EE Successful data transmission PP ss = PP AA CC EE PP AA BB FF HH PP AA BB DD PP AA CC GG HH PP AA BB FF GG EE S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 25

Cyber System Failure Modeling Reliability computation R(A) = 0.9 R(B) = 0.6 R(C) = 0.8 R(C) = 0.7 Series parallel approach: RR ss = 1 1 RR AA RR BB 1 RR CC RR DD = 0.7976 Simple approach but limited to either series or parallel combinations. Concern: Cyber network more complicated S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 26

Cyber System Failure Modeling Reliability computation R(A) = 0.9 R(B) = 0.6 R(C) = 0.8 R(C) = 0.7 Minimal cut set approach: Minimal cut sets: AAAA AAAA BBBB BBBB System structure function: ψψ XX AA, XX BB, XX CC, XX DD = 1 1 XX AA 1 XX CC 1 1 XX AA 1 XX DD 1 1 XX BB 1 XX CC 1 1 XX BB 1 XX DD = XX AA + XX cc XX AA XX CC XX AA + XX DD XX AA XX DD XX BB + XX CC XX BB XX CC XX BB + XX DD XX BB XX DD = XX AA XX BB + XX CC XX DD XX AA XX BB XX CC XX DD Reliability of the network RR ss = EE ψψ XX AA, XX BB, XX CC, XX DD = EE[XX AA XX BB ] + EE[XX CC XX DD ] EE[XX AA XX BB XX CC XX DD ] = RR AA RR BB + RR CC RR DD RR AA RR BB RR CC RR DD = 0.7976 S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 27

Cyber System Failure Modeling Network availability modeling For the given simple network Minimal cut sets CCCCCC AAAAAA BBBBBB {BBBBBB} CCCCCC, AAAAAA Structure function is given by ψψ (3,4) = 1 [ 1 1 XX BB 1 XX DD 1 XX EE 1 1 XX CC 1 XX DD 1 XX FF 1 1 XX BB 1 XX DD 1 XX FF 1 1 XX CC 1 XX DD 1 XX EE 1 1 XX AA 1 XX DD 1 XX FF { 1 XX AA 1 XX DD 1 XX E } Calculations becomes tedious as network gets larger S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 28

Cyber System Failure Modeling Network availability modeling For effective computation Lower bound for the link reliability can be determined Reasonable lower bound Place minimal cut-sets in series Total number of cut sets RR LLLL llllllll cc = ii=1 1 kkεεss ii 1 RR kk Reliability of element i Set of elements in cut set i S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 29

Cyber System Failure Modeling Network availability modeling Example: Communication links can be: Decisions can be: centralized or decentralized Simple network: S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 30

Cyber System Failure Modeling Network availability modeling Example: Worst case Expected Energy Not Served (WEENS): DR level 1: Partial load curtailment DR level 2: Complete load curtailment S. Chakraborty, B. Thanatheepan, and V. Aravinthan, Worst-Case Reliability Modeling and Evaluation in Cyber-Enabled Power Distribution Systems, 2017 North American Power Symposium 31

Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 32

Cyber System Failure Modeling Failure of cyber system Scenario 2: Information manipulation Any of the following can be compromised Control Center network Corporate network Substation network Device level network M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March 2018 33

Cyber System Failure Modeling Failure of cyber system Scenario 2: Information manipulation Compromise of any one network will result in all the associated networks being compromised For reliability analysis series connected elements (if no firewall) Control Center Network Substation Network Device Network M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March 2018 34

Cyber System Failure Modeling Failure of cyber system Scenario 2: Effect of cyber attack Challenge: Attack and recovery model Needs human behavior based modeling If known then could be modeled using common mode failure approach M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March 2018 35

Cyber System Failure Modeling Failure of cyber system Scenario 2: Effect of cyber attack Automatic switch operation time Manual switching time Time to recover from cyber attack Based on availability of alternative path time for reconfiguration Fault detectors Manual switch Automated switch M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March 2018 36

Cyber System Failure Modeling Failure of cyber system A single effect (attack) can affect multiple parts (network) Common cause failure (CCF) model: A group of components fail due to a shared cause The reason behind the failure (root cause) Which parts are affected and why (coupling factor) An event that causes a set of components to fail is known as common cause event (CCE). Components that could fail for the same cause(s) are grouped together; common cause component group (CCCG) M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March 2018 37

Cyber System Failure Modeling Failure of cyber system Common cause failure (CCF) model: Example: Switching Operation in one frequency Sensors in another frequency M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March 2018 38

Dependent failures Step 1: Determine the common cause component group (CCCG) Step 2: Determine basic event probabilities All possible ways αα kk = Cyber System Failure Modeling For example alpha factor method can be used A component can fail due to mm kk mm jj=1 Independent failure of the given component Dependent failure due to k out of m components Assume equal probability of occurrence mm jj PP kk PP jj Probability Dependent failure probability PP kk (mm) = kk mm 1 kk 1 Total failure probability of component k αα kk mm jj=1 jjαα jj PP tt(kk) M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March 2018 39

Cyber System Failure Modeling Fault detector & automatic switch placement based on the cost Objective: minimize Investment cost (switch and fault detectors) Expected interruption cost for customers M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March 2018 40

Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 41

Dependent System Modeling Tools: A Need Required approach Power System Failures (Random) Cyber Component Failure (Random) Message failure Message delay Cyber attack Interdependent System Reliability Evaluation Cyber Failure Impact on Power System Direct impact - Power component failure Indirect impact - Failure may impact - Not operate in safe state 42

Dependent System Modeling Tools: A Need Failure modes Power component Communication and coupling Decision 43

Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs 44

Final Remarks Cyber system benefits are correlated with power system operational needs A three layer approach can be utilized by separating Power components Communication and coupling components Decision components Dependent system based modeling increases possible states of operations Adjustments to reliability analysis is required with Understanding of communication link failure Understanding cyber attack 45

Future Needs A unified analytical framework for cyber-power system needs to be better established. Effective modeling of cyber-unavailability and cyber-manipulation is a prerequisite. A human behavior based modeling for cyber attack can provide better insight Propagation of cyber failure on power system application (similar to cascading failure) needs to be further studied. 46

Final-Final Remarks Cyber solutions become more effective if: Power system applications are more identified Dependent effects of cyber and power systems are better understood Solutions utilize the properties of both cyber & power An appropriate performance evaluation tool is used to assess the benefits against the cost and adaptability. 47

Questions? Visvakumar Aravinthan (Visvakumar.aravinthan@wichita.edu) 48

Presentation Outline Background and Motivation Monitoring & Preventive Maintenance Effect of Communication Cyber System Failure Modeling Scenario 1: Cyber unavailability Scenario 2: Cyber attack Dependent System Modeling Tools: A Need Final Remarks and Future Needs System Properties Based Communication 49

System Properties Based Communication Cyber infrastructure can improve reliability How to enhance the benefits One of the options Distributed Sensor Network at feeder level. Event driven communication protocol for distribution Communicate upon an event Not communicate periodically One application Use power system properties in communication protocol in anomaly detection applications. M. Heidari, M. Sepehry, and V. Aravinthan, Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network, IEEE Trans. Smart Grids, Vol: 9, Iss: 2, March 2018 50

System Properties Based Communication Distributed sensor network Hierarchical communication architecture. Lower level - WiMax, Upper Level Wired. Use mesh network architecture between the control centers and the substation level communication M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug. 2016 51

System Properties Based Communication Communication Delay lost packets Identify a protocol that will prioritize time sensitive data M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug. 2016 52

System Properties Based Communication Communication Delay lost packets Allocate the first slot for time sensitive data Problem: Solution: M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug. 2016 53

System Properties Based Communication Communication Delay lost packets Allocate based on the location Or incorporate power system properties Z line,1 Z line,2 Z line,i Fault Substation Z load,1 Z load,2 Z load,i-1 Z load,i Z fault = 0 M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug. 2016 54

System Properties Based Communication Communication Delay lost packets Specific node communicating 100% of the time Latency M. Heidari, T. Balachandran, V. Aravinthan, V. Namboodiri, and G. Chen, ALARM: Average Low-Latency Medium Access Control Communication Protocol for Smart Feeders, IET Generation, Transmission & Distribution, Vol: 10, Iss.: 11, Aug. 2016 55