Cyber-Based Contingency Analysis

ECE Seminar: Cyber-Based Contingency Analysis


Starts at: December 10, 2015 4:30 PM

Ends at: 6:00 PM

Location: Scaife 125

Speaker: Dr. Chee-Wooi Ten

Affiliation: Michigan Technological University

Refreshments provided: Yes

Link to Poster

Link to Video (1), Link to Video (2)

Details:

Abstract:
Cyber-contingency is a new concept introduced in this seminar to explore combinatorial challenges. The exhaustive enumeration of combinations is the hypothesized attack scenarios corresponding to multiple component outages associated under each substation. In the past, single component outage (also referred to N-1 contingency) has been widely implemented to ensure system falls within its operating limits caused by a single component outage, such as a line/transformer/generator is isolated from a power system. This was designed to oversee and predict if the system may be potentially unstable when severe weather conditions or equipment failure situations that electrically disconnect component(s). As time goes by, the evolution of system protection has been gradually replaced by the microprocessor-based relays with Internet protocol (IP)-based communication features. Often, the cyber-physical relation is tightly coupled between the intelligent electronic devices (IEDs) and the physical facilities in substations. This incurs a high risk of potential electronic intrusions to substations. Depending on the number of components connected in a substation, such as lines, generators, or loads, the conventional way of looking the system security problem is no longer robust. This seminar proposes a systematic approach to eliminate the combinations of hypothesized substation/component outages based on topological information and system loading conditions. The reverse pyramid model (RPM) is introduced to eliminate combinations of insignificant components outages. The proposed algorithms include assessment of substation vulnerabilities and cyber risk evaluation, which can be implemented in the control room to assist operator identifying critical substation combinations under the specific time frame. Depth- first search (DFS), breadth-first search (BFS) and random selection methods are applied to evaluate the proposed model and validated using IEEE 118- and 30-bus systems in this study

Bio:
Chee-Wooi Ten received the BSEE and MSEE degrees from Iowa State University, Ames, in 1999 and 2001, respectively. He was an Application Engineer with Siemens Energy Management and Information System (SEMIS) in Singapore from 2002 to 2006. He later received the Ph.D. degree in 2009 from University College Dublin (UCD), National University of Ireland.
He is currently an Assistant Professor at Michigan Technological University. His primary research interests are modeling for critical cyberinfrastructures and SCADA automation applications for power grids. Dr. Ten is a senior member of the IEEE.