Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective
Optimal placement of flexible AC transmission systems (FACTS) devices and the cyber-security of associated data exchange are crucial for the controllability of wide area power networks. The placement of FACTS devices is studied in this paper from a novel graph theoretic perspective, which unlike the...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9113302/ |
_version_ | 1831527736434229248 |
---|---|
author | Hossein Parastvand Octavian Bass Mohammad A. S. Masoum Airlie Chapman Stefan Lachowicz |
author_facet | Hossein Parastvand Octavian Bass Mohammad A. S. Masoum Airlie Chapman Stefan Lachowicz |
author_sort | Hossein Parastvand |
collection | DOAJ |
description | Optimal placement of flexible AC transmission systems (FACTS) devices and the cyber-security of associated data exchange are crucial for the controllability of wide area power networks. The placement of FACTS devices is studied in this paper from a novel graph theoretic perspective, which unlike the existing approaches, purely relies on topological characteristics of the underlying physical graphs of power networks. To this end, the maximum matching principle (MMP) is used to find the set of required FACTS devices for the grid controllability. In addition, the cyber-security of the most critical data related to the FACTS controllers is guaranteed by introducing the concept of moderated-k-security where k is a measure of data obscurity from the adversary perspective. The idea of moderated-k-symmetry is proposed to facilitate the arrangement of the published cyber graph based on a permutation of nodes within the symmetry group of the grid, called generator of automorphism. It is then verified that the published cyber-graph can significantly obscure the data exchange over the cyber graph for adversaries. Finally, a similarity is observed and demonstrated between the set of critical nodes attained from the symmetry analysis and the solution of the FACTS devices placement that further highlights the importance of symmetry for the analysis and design of complex power networks. Detailed simulations are applied to three power networks and analyzed to demonstrate the performance and eligibility of the proposed methods and results. |
first_indexed | 2024-12-16T17:41:35Z |
format | Article |
id | doaj.art-9a72dbb2c6274ca09c4a8ce1a357a38c |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-16T17:41:35Z |
publishDate | 2020-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-9a72dbb2c6274ca09c4a8ce1a357a38c2022-12-21T22:22:36ZengIEEEIEEE Access2169-35362020-01-01810820110821510.1109/ACCESS.2020.30013089113302Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological PerspectiveHossein Parastvand0https://orcid.org/0000-0001-8169-7097Octavian Bass1Mohammad A. S. Masoum2https://orcid.org/0000-0001-7513-313XAirlie Chapman3Stefan Lachowicz4Smart Energy Systems Research Group, School of Engineering, Edith Cowan University, Joondalup, WA, AustraliaSmart Energy Systems Research Group, School of Engineering, Edith Cowan University, Joondalup, WA, AustraliaDepartment of Engineering, Utah Valley University, Orem, UT, USADepartment of Mechanical Engineering, School of Engineering, The University of Melbourne, Melbourne, VIC, AustraliaSmart Energy Systems Research Group, School of Engineering, Edith Cowan University, Joondalup, WA, AustraliaOptimal placement of flexible AC transmission systems (FACTS) devices and the cyber-security of associated data exchange are crucial for the controllability of wide area power networks. The placement of FACTS devices is studied in this paper from a novel graph theoretic perspective, which unlike the existing approaches, purely relies on topological characteristics of the underlying physical graphs of power networks. To this end, the maximum matching principle (MMP) is used to find the set of required FACTS devices for the grid controllability. In addition, the cyber-security of the most critical data related to the FACTS controllers is guaranteed by introducing the concept of moderated-k-security where k is a measure of data obscurity from the adversary perspective. The idea of moderated-k-symmetry is proposed to facilitate the arrangement of the published cyber graph based on a permutation of nodes within the symmetry group of the grid, called generator of automorphism. It is then verified that the published cyber-graph can significantly obscure the data exchange over the cyber graph for adversaries. Finally, a similarity is observed and demonstrated between the set of critical nodes attained from the symmetry analysis and the solution of the FACTS devices placement that further highlights the importance of symmetry for the analysis and design of complex power networks. Detailed simulations are applied to three power networks and analyzed to demonstrate the performance and eligibility of the proposed methods and results.https://ieeexplore.ieee.org/document/9113302/ControllabilityplacementFACTS devicesgraph theorypower system securitycyber-security |
spellingShingle | Hossein Parastvand Octavian Bass Mohammad A. S. Masoum Airlie Chapman Stefan Lachowicz Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective IEEE Access Controllability placement FACTS devices graph theory power system security cyber-security |
title | Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective |
title_full | Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective |
title_fullStr | Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective |
title_full_unstemmed | Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective |
title_short | Cyber-Security Constrained Placement of FACTS Devices in Power Networks From a Novel Topological Perspective |
title_sort | cyber security constrained placement of facts devices in power networks from a novel topological perspective |
topic | Controllability placement FACTS devices graph theory power system security cyber-security |
url | https://ieeexplore.ieee.org/document/9113302/ |
work_keys_str_mv | AT hosseinparastvand cybersecurityconstrainedplacementoffactsdevicesinpowernetworksfromanoveltopologicalperspective AT octavianbass cybersecurityconstrainedplacementoffactsdevicesinpowernetworksfromanoveltopologicalperspective AT mohammadasmasoum cybersecurityconstrainedplacementoffactsdevicesinpowernetworksfromanoveltopologicalperspective AT airliechapman cybersecurityconstrainedplacementoffactsdevicesinpowernetworksfromanoveltopologicalperspective AT stefanlachowicz cybersecurityconstrainedplacementoffactsdevicesinpowernetworksfromanoveltopologicalperspective |