Security Assessment of Electricity Distribution Networks Under DER Node Compromises

This paper focuses on the security assessment of electricity distribution networks (DNs) with vulnerable distributed energy resource (DER) nodes. The adversary model is a simultaneous compromise of DER nodes by strategic manipulation of generation setpoints. The loss to the defender (DN operator) in...

Full description

Bibliographic Details
Main Authors: Shelar, Devendra Anil, Amin, Saurabh
Other Authors: Massachusetts Institute of Technology. Department of Civil and Environmental Engineering
Format: Article
Language:en_US
Published: Institute of Electrical and Electronics Engineers (IEEE) 2017
Online Access:http://hdl.handle.net/1721.1/110203
https://orcid.org/0000-0002-6549-131X
https://orcid.org/0000-0003-1554-015X
_version_ 1811072010801905664
author Shelar, Devendra Anil
Amin, Saurabh
author2 Massachusetts Institute of Technology. Department of Civil and Environmental Engineering
author_facet Massachusetts Institute of Technology. Department of Civil and Environmental Engineering
Shelar, Devendra Anil
Amin, Saurabh
author_sort Shelar, Devendra Anil
collection MIT
description This paper focuses on the security assessment of electricity distribution networks (DNs) with vulnerable distributed energy resource (DER) nodes. The adversary model is a simultaneous compromise of DER nodes by strategic manipulation of generation setpoints. The loss to the defender (DN operator) includes loss of voltage regulation and cost of induced load control under supply-demand mismatch caused by the attack. A three-stage defender-attacker-defender (DAD) game is formulated: in Stage 1, the defender chooses a security strategy to secure a subset of DER nodes; in Stage 2, the attacker compromises a set of vulnerable DERs and injects false generation setpoints; in Stage 3, the defender responds by controlling loads and non-compromised DERs. Solving this trilevel optimization problem is hard due to nonlinear power flows and mixed-integer decision variables. To address this challenge, the problem is approximated by a tractable formulation based on an ε-linear power-flow model. The set of critical DER nodes and the setpoint manipulations characterizing the optimal attack strategy are computed. An iterative greedy approach to computing attacker-defender strategies for the original nonlinear problem is proposed. These results provide guidelines for optimal security investment and defender response in preattack and postattack conditions, respectively.
first_indexed 2024-09-23T08:59:29Z
format Article
id mit-1721.1/110203
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T08:59:29Z
publishDate 2017
publisher Institute of Electrical and Electronics Engineers (IEEE)
record_format dspace
spelling mit-1721.1/1102032022-09-26T09:42:31Z Security Assessment of Electricity Distribution Networks Under DER Node Compromises Shelar, Devendra Anil Amin, Saurabh Massachusetts Institute of Technology. Department of Civil and Environmental Engineering Shelar, Devendra Anil Amin, Saurabh This paper focuses on the security assessment of electricity distribution networks (DNs) with vulnerable distributed energy resource (DER) nodes. The adversary model is a simultaneous compromise of DER nodes by strategic manipulation of generation setpoints. The loss to the defender (DN operator) includes loss of voltage regulation and cost of induced load control under supply-demand mismatch caused by the attack. A three-stage defender-attacker-defender (DAD) game is formulated: in Stage 1, the defender chooses a security strategy to secure a subset of DER nodes; in Stage 2, the attacker compromises a set of vulnerable DERs and injects false generation setpoints; in Stage 3, the defender responds by controlling loads and non-compromised DERs. Solving this trilevel optimization problem is hard due to nonlinear power flows and mixed-integer decision variables. To address this challenge, the problem is approximated by a tractable formulation based on an ε-linear power-flow model. The set of critical DER nodes and the setpoint manipulations characterizing the optimal attack strategy are computed. An iterative greedy approach to computing attacker-defender strategies for the original nonlinear problem is proposed. These results provide guidelines for optimal security investment and defender response in preattack and postattack conditions, respectively. National Science Foundation (U.S.) (Award CNS-1238959) National Science Foundation (U.S.) (Award CNS-1238962) National Science Foundation (U.S.) (Award CNS- 1239054) National Science Foundation (U.S.) (Award CNS-1239166) Sandia National Laboratories United States. Air Force. Research Laboratory (Award FA8750-14-2-0180) 2017-06-23T14:03:03Z 2017-06-23T14:03:03Z 2016-08 Article http://purl.org/eprint/type/JournalArticle 2325-5870 http://hdl.handle.net/1721.1/110203 Shelar, Devendra, and Saurabh Amin. “Security Assessment of Electricity Distribution Networks Under DER Node Compromises.” IEEE Transactions on Control of Network Systems 4.1 (2017): 23–36. https://orcid.org/0000-0002-6549-131X https://orcid.org/0000-0003-1554-015X en_US http://dx.doi.org/10.1109/tcns.2016.2598427 IEEE Transactions on Control of Network Systems Creative Commons Attribution-Noncommercial-Share Alike http://creativecommons.org/licenses/by-nc-sa/4.0/ application/pdf Institute of Electrical and Electronics Engineers (IEEE) arXiv
spellingShingle Shelar, Devendra Anil
Amin, Saurabh
Security Assessment of Electricity Distribution Networks Under DER Node Compromises
title Security Assessment of Electricity Distribution Networks Under DER Node Compromises
title_full Security Assessment of Electricity Distribution Networks Under DER Node Compromises
title_fullStr Security Assessment of Electricity Distribution Networks Under DER Node Compromises
title_full_unstemmed Security Assessment of Electricity Distribution Networks Under DER Node Compromises
title_short Security Assessment of Electricity Distribution Networks Under DER Node Compromises
title_sort security assessment of electricity distribution networks under der node compromises
url http://hdl.handle.net/1721.1/110203
https://orcid.org/0000-0002-6549-131X
https://orcid.org/0000-0003-1554-015X
work_keys_str_mv AT shelardevendraanil securityassessmentofelectricitydistributionnetworksunderdernodecompromises
AT aminsaurabh securityassessmentofelectricitydistributionnetworksunderdernodecompromises