Skip to main content

Showing 1–19 of 19 results for author: Kosut, O

Searching in archive eess. Search in all archives.
.
  1. arXiv:2405.02813  [pdf, ps, other

    eess.SY math.OC

    Model Predictive Control for Joint Ram** and Regulation-Type Service from Distributed Energy Resource Aggregations

    Authors: Joel Mathias, Rajasekhar Anguluri, Oliver Kosut, Lalitha Sankar

    Abstract: Distributed energy resources (DERs) such as grid-responsive loads and batteries can be harnessed to provide ram** and regulation services across the grid. This paper concerns the problem of optimal allocation of different classes of DERs, where each class is an aggregation of similar DERs, to balance net-demand forecasts. The resulting resource allocation problem is solved using model-predictive… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

    Comments: 10 pages, 3 figures, to be presented at IEEE PES GM 2024

  2. arXiv:2402.12338  [pdf, other

    eess.SY cs.CR cs.LG

    An Adversarial Approach to Evaluating the Robustness of Event Identification Models

    Authors: Obai Bahwal, Oliver Kosut, Lalitha Sankar

    Abstract: Intelligent machine learning approaches are finding active use for event detection and identification that allow real-time situational awareness. Yet, such machine learning algorithms have been shown to be susceptible to adversarial attacks on the incoming telemetry data. This paper considers a physics-based modal decomposition method to extract features for event classification and focuses on int… ▽ More

    Submitted 22 April, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

  3. arXiv:2309.10095  [pdf, other

    cs.LG eess.SY

    A Semi-Supervised Approach for Power System Event Identification

    Authors: Nima Taghipourbazargani, Lalitha Sankar, Oliver Kosut

    Abstract: Event identification is increasingly recognized as crucial for enhancing the reliability, security, and stability of the electric power system. With the growing deployment of Phasor Measurement Units (PMUs) and advancements in data science, there are promising opportunities to explore data-driven event identification via machine learning classification techniques. However, obtaining accurately-lab… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  4. arXiv:2208.04471  [pdf, other

    eess.SY math.OC stat.AP

    Parameter Estimation in Ill-conditioned Low-inertia Power Systems

    Authors: Rajasekhar Anguluri, Lalitha Sankar, Oliver Kosut

    Abstract: This paper examines model parameter estimation in dynamic power systems whose governing electro-mechanical equations are ill-conditioned or singular. This ill-conditioning is because of converter-interfaced power systems generators' zero or small inertia contribution. Consequently, the overall system inertia decreases, resulting in low-inertia power systems. We show that the standard state-space m… ▽ More

    Submitted 8 August, 2022; originally announced August 2022.

    Comments: Submitted to 2022 IEEE North American Power Symposium (NAPS)

  5. A Machine Learning Framework for Event Identification via Modal Analysis of PMU Data

    Authors: Nima T. Bazargani, Gautam Dasarathy, Lalitha Sankar, Oliver Kosut

    Abstract: Power systems are prone to a variety of events (e.g. line trips and generation loss) and real-time identification of such events is crucial in terms of situational awareness, reliability, and security. Using measurements from multiple synchrophasors, i.e., phasor measurement units (PMUs), we propose to identify events by extracting features based on modal dynamics. We combine such traditional phys… ▽ More

    Submitted 3 October, 2022; v1 submitted 14 February, 2022; originally announced February 2022.

    Comments: 12 pages, Accepted for the publication in the IEEE Transactions on Power Systems

    Journal ref: IEEE Transactions on Power Systems, 2022

  6. arXiv:2107.03547  [pdf, other

    eess.SY

    Generation of Synthetic Multi-Resolution Time Series Load Data

    Authors: Andrea Pinceti, Lalitha Sankar, Oliver Kosut

    Abstract: The availability of large datasets is crucial for the development of new power system applications and tools; unfortunately, very few are publicly and freely available. We designed an end-to-end generative framework for the creation of synthetic bus-level time-series load data for transmission networks. The model is trained on a real dataset of over 70 Terabytes of synchrophasor measurements spann… ▽ More

    Submitted 24 July, 2022; v1 submitted 7 July, 2021; originally announced July 2021.

  7. arXiv:2107.03545  [pdf, other

    eess.SY

    Synthetic Time-Series Load Data via Conditional Generative Adversarial Networks

    Authors: Andrea Pinceti, Lalitha Sankar, Oliver Kosut

    Abstract: A framework for the generation of synthetic time-series transmission-level load data is presented. Conditional generative adversarial networks are used to learn the patterns of a real dataset of hourly-sampled week-long load profiles and generate unique synthetic profiles on demand, based on the season and type of load required. Extensive testing of the generative model is performed to verify that… ▽ More

    Submitted 7 July, 2021; originally announced July 2021.

  8. arXiv:2104.13908  [pdf, other

    eess.SY

    A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid

    Authors: Zhigang Chu, Andrea Pinceti, Ramin Kaviani, Roozbeh Khodadadeh, Xingpeng Li, Jiazi Zhang, Karthik Saikumar, Mostafa Sahraei-Ardakani, Christopher Mosier, Robin Podmore, Kory Hedman, Oliver Kosut, Lalitha Sankar

    Abstract: In this paper, we investigate the feasibility and physical consequences of cyber attacks against energy management systems (EMS). Within this framework, we have designed a complete simulation platform to emulate realistic EMS operations: it includes state estimation (SE), real-time contingency analysis (RTCA), and security constrained economic dispatch (SCED). This software platform allowed us to… ▽ More

    Submitted 28 April, 2021; originally announced April 2021.

  9. arXiv:2003.07699  [pdf, other

    eess.SY

    $N-1$ Reliability Makes It Difficult for False Data Injection Attacks to Cause Physical Consequences

    Authors: Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar

    Abstract: This paper demonstrates that false data injection (FDI) attacks are extremely limited in their ability to cause physical consequences on $N-1$ reliable power systems operating with real-time contingency analysis (RTCA) and security constrained economic dispatch (SCED). Prior work has shown that FDI attacks can be designed via an attacker-defender bi-level linear program (ADBLP) to cause physical o… ▽ More

    Submitted 13 March, 2020; originally announced March 2020.

    Comments: 8 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:1903.07781

  10. arXiv:2003.06543  [pdf, other

    eess.SY

    Detecting Load Redistribution Attacks via Support Vector Models

    Authors: Zhigang Chu, Oliver Kosut, Lalitha Sankar

    Abstract: A machine learning-based detection framework is proposed to detect a class of cyber-attacks that redistribute loads by modifying measurements. The detection framework consists of a multi-output support vector regression (SVR) load predictor that predicts loads by exploiting both spatial and temporal correlations, and a subsequent support vector machine (SVM) attack detector to determine the existe… ▽ More

    Submitted 13 March, 2020; originally announced March 2020.

    Comments: 9 pages, 6 figures

  11. arXiv:1912.09453  [pdf, other

    eess.SY

    Detection and Localization of Load Redistribution Attacks on Large Scale Systems

    Authors: Andrea Pinceti, Lalitha Sankar, Oliver Kosut

    Abstract: A nearest neighbor-based detection scheme against load redistribution attacks is presented. The detector is designed to scale from small to very large systems while guaranteeing consistent detection performance. Extensive testing is performed on a realistic, large scale system to evaluate the performance of the proposed detector against a wide range of attacks, from simple random noise attacks to… ▽ More

    Submitted 15 June, 2020; v1 submitted 19 December, 2019; originally announced December 2019.

    Comments: 9 pages, 10 figures

  12. arXiv:1905.02271  [pdf, other

    eess.SY

    Can Predictive Filters Detect Gradually Ram** False Data Injection Attacks Against PMUs?

    Authors: Zhigang Chu, Andrea Pinceti, Reetam Sen Biswas, Oliver Kosut, Anamitra Pal, Lalitha Sankar

    Abstract: Intelligently designed false data injection (FDI) attacks have been shown to be able to bypass the $χ^2$-test based bad data detector (BDD), resulting in physical consequences (such as line overloads) in the power system. In this paper, it is shown that if an attack is suddenly injected into the system, a predictive filter with sufficient accuracy is able to detect it. However, an attacker can gra… ▽ More

    Submitted 6 May, 2019; originally announced May 2019.

    Comments: 6 pages, 5 figures, submitted to SmartGridComm 2019

  13. arXiv:1903.07781  [pdf, other

    eess.SY

    Vulnerability Assessment of N-1 Reliable Power Systems to False Data Injection Attacks

    Authors: Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar

    Abstract: This paper studies the vulnerability of large-scale power systems to false data injection (FDI) attacks through their physical consequences. Prior work has shown that an attacker-defender bi-level linear program (ADBLP) can be used to determine the worst-case consequences of FDI attacks aiming to maximize the physical power flow on a target line. Understanding the consequences of these attacks req… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

    Comments: 8 pages, 5 figures, 1 table. arXiv admin note: text overlap with arXiv:1705.04218

  14. arXiv:1806.05057  [pdf, other

    eess.SY

    Unobservable False Data Injection Attacks against PMUs: Feasible Conditions and Multiplicative Attacks

    Authors: Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar

    Abstract: This paper studies false data injection (FDI) attacks against phasor measurement units (PMUs). As compared to the conventional bad data detector (BDD), an enhanced BDD utilizing the effect of zero injection buses is proposed. Feasible conditions under which FDI attacks are unobservable to this enhanced BDD are discussed. In addition, a class of multiplicative FDI attacks that maintain the rank of… ▽ More

    Submitted 13 September, 2018; v1 submitted 11 June, 2018; originally announced June 2018.

    Comments: 6 pages, 6 figures

  15. arXiv:1705.04218  [pdf, other

    eess.SY

    Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks

    Authors: Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar

    Abstract: This paper studies the vulnerability of large-scale power systems to false data injection (FDI) attacks through their physical consequences. Prior work has shown that an attacker-defender bi-level linear program (ADBLP) can be used to determine the worst-case consequences of FDI attacks aiming to maximize the physical power flow on a target line. This ADBLP can be transformed into a single-level m… ▽ More

    Submitted 1 November, 2020; v1 submitted 10 May, 2017; originally announced May 2017.

    Comments: 6 pages, 5 figures

  16. arXiv:1705.02038  [pdf, other

    eess.SY

    False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition

    Authors: Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut

    Abstract: This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be identified by detector based on low-rank decomposition (LD). In this work, a class of more sophisticated FDI attacks that captures the temporal correl… ▽ More

    Submitted 4 May, 2017; originally announced May 2017.

    Comments: 6 pages, 4 figures, submitted to 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)

  17. arXiv:1703.07500  [pdf, other

    eess.SY

    Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems?

    Authors: Jiazi Zhang, Zhigang Chu, Lalitha Sankar, Oliver Kosut

    Abstract: This paper studies physical consequences of unobservable false data injection (FDI) attacks designed only with information inside a sub-network of the power system. The goal of this attack is to overload a chosen target line without being detected via measurements. To overcome the limited information, a multiple linear regression model is developed to learn the relationship between the external ne… ▽ More

    Submitted 1 May, 2018; v1 submitted 21 March, 2017; originally announced March 2017.

    Comments: 12 pages, 7 figures, accepted by IEEE Transactions on Power Systems

    Journal ref: J. Zhang, Z. Chu, L. Sankar and O. Kosut, "Can Attackers with Limited Information Exploit Historical Data to Mount Successful False Data Injection Attacks on Power Systems?," in IEEE Transactions on Power Systems, 2018

  18. arXiv:1605.06557  [pdf, ps, other

    eess.SY

    Evaluating Power System Vulnerability to False Data Injection Attacks via Scalable Optimization

    Authors: Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar

    Abstract: Physical consequences to power systems of false data injection cyber-attacks are considered. Prior work has shown that the worst-case consequences of such an attack can be determined using a bi-level optimization problem, wherein an attack is chosen to maximize the physical power flow on a target line subsequent to re-dispatch. This problem can be solved as a mixed-integer linear program, but it i… ▽ More

    Submitted 20 May, 2016; originally announced May 2016.

  19. Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation

    Authors: **gwen Liang, Lalitha Sankar, Oliver Kosut

    Abstract: An unobservable false data injection (FDI) attack on AC state estimation (SE) is introduced and its consequences on the physical system are studied. With a focus on understanding the physical consequences of FDI attacks, a bi-level optimization problem is introduced whose objective is to maximize the physical line flows subsequent to an FDI attack on DC SE. The maximization is subject to constrain… ▽ More

    Submitted 11 June, 2015; originally announced June 2015.

    Comments: 9 pages, 7 figures. A version of this manuscript was submitted to the IEEE Transactions on Power Systems