Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective

Optimal placement of flexible AC transmission systems (FACTS) devices and the cyber-security of associated data exchange are crucial for the controllability of wide area power networks. The placement of FACTS devices is studied in this paper from a novel graph theoretic perspective, which unlike the...

Full description

Bibliographic Details
Main Authors: Hossein Parastvand, Octavian Bass, Mohammad A. S. Masoum, Airlie Chapman, Stefan Lachowicz
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9113302/
_version_ 1831527736434229248
author Hossein Parastvand
Octavian Bass
Mohammad A. S. Masoum
Airlie Chapman
Stefan Lachowicz
author_facet Hossein Parastvand
Octavian Bass
Mohammad A. S. Masoum
Airlie Chapman
Stefan Lachowicz
author_sort Hossein Parastvand
collection DOAJ
description Optimal placement of flexible AC transmission systems (FACTS) devices and the cyber-security of associated data exchange are crucial for the controllability of wide area power networks. The placement of FACTS devices is studied in this paper from a novel graph theoretic perspective, which unlike the existing approaches, purely relies on topological characteristics of the underlying physical graphs of power networks. To this end, the maximum matching principle (MMP) is used to find the set of required FACTS devices for the grid controllability. In addition, the cyber-security of the most critical data related to the FACTS controllers is guaranteed by introducing the concept of moderated-k-security where k is a measure of data obscurity from the adversary perspective. The idea of moderated-k-symmetry is proposed to facilitate the arrangement of the published cyber graph based on a permutation of nodes within the symmetry group of the grid, called generator of automorphism. It is then verified that the published cyber-graph can significantly obscure the data exchange over the cyber graph for adversaries. Finally, a similarity is observed and demonstrated between the set of critical nodes attained from the symmetry analysis and the solution of the FACTS devices placement that further highlights the importance of symmetry for the analysis and design of complex power networks. Detailed simulations are applied to three power networks and analyzed to demonstrate the performance and eligibility of the proposed methods and results.
first_indexed 2024-12-16T17:41:35Z
format Article
id doaj.art-9a72dbb2c6274ca09c4a8ce1a357a38c
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-16T17:41:35Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-9a72dbb2c6274ca09c4a8ce1a357a38c2022-12-21T22:22:36ZengIEEEIEEE Access2169-35362020-01-01810820110821510.1109/ACCESS.2020.30013089113302Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological PerspectiveHossein Parastvand0https://orcid.org/0000-0001-8169-7097Octavian Bass1Mohammad A. S. Masoum2https://orcid.org/0000-0001-7513-313XAirlie Chapman3Stefan Lachowicz4Smart Energy Systems Research Group, School of Engineering, Edith Cowan University, Joondalup, WA, AustraliaSmart Energy Systems Research Group, School of Engineering, Edith Cowan University, Joondalup, WA, AustraliaDepartment of Engineering, Utah Valley University, Orem, UT, USADepartment of Mechanical Engineering, School of Engineering, The University of Melbourne, Melbourne, VIC, AustraliaSmart Energy Systems Research Group, School of Engineering, Edith Cowan University, Joondalup, WA, AustraliaOptimal placement of flexible AC transmission systems (FACTS) devices and the cyber-security of associated data exchange are crucial for the controllability of wide area power networks. The placement of FACTS devices is studied in this paper from a novel graph theoretic perspective, which unlike the existing approaches, purely relies on topological characteristics of the underlying physical graphs of power networks. To this end, the maximum matching principle (MMP) is used to find the set of required FACTS devices for the grid controllability. In addition, the cyber-security of the most critical data related to the FACTS controllers is guaranteed by introducing the concept of moderated-k-security where k is a measure of data obscurity from the adversary perspective. The idea of moderated-k-symmetry is proposed to facilitate the arrangement of the published cyber graph based on a permutation of nodes within the symmetry group of the grid, called generator of automorphism. It is then verified that the published cyber-graph can significantly obscure the data exchange over the cyber graph for adversaries. Finally, a similarity is observed and demonstrated between the set of critical nodes attained from the symmetry analysis and the solution of the FACTS devices placement that further highlights the importance of symmetry for the analysis and design of complex power networks. Detailed simulations are applied to three power networks and analyzed to demonstrate the performance and eligibility of the proposed methods and results.https://ieeexplore.ieee.org/document/9113302/ControllabilityplacementFACTS devicesgraph theorypower system securitycyber-security
spellingShingle Hossein Parastvand
Octavian Bass
Mohammad A. S. Masoum
Airlie Chapman
Stefan Lachowicz
Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective
IEEE Access
Controllability
placement
FACTS devices
graph theory
power system security
cyber-security
title Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective
title_full Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective
title_fullStr Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective
title_full_unstemmed Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective
title_short Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective
title_sort cyber security constrained placement of facts devices in power networks from a novel topological perspective
topic Controllability
placement
FACTS devices
graph theory
power system security
cyber-security
url https://ieeexplore.ieee.org/document/9113302/
work_keys_str_mv AT hosseinparastvand cybersecurityconstrainedplacementoffactsdevicesinpowernetworksfromanoveltopologicalperspective
AT octavianbass cybersecurityconstrainedplacementoffactsdevicesinpowernetworksfromanoveltopologicalperspective
AT mohammadasmasoum cybersecurityconstrainedplacementoffactsdevicesinpowernetworksfromanoveltopologicalperspective
AT airliechapman cybersecurityconstrainedplacementoffactsdevicesinpowernetworksfromanoveltopologicalperspective
AT stefanlachowicz cybersecurityconstrainedplacementoffactsdevicesinpowernetworksfromanoveltopologicalperspective