-
Infinite Impulse Response Graph Neural Networks for Cyberattack Localization in Smart Grids
Authors:
Osman Boyaci,
M. Rasoul Narimani,
Katherine Davis,
Erchin Serpedin
Abstract:
This study employs Infinite Impulse Response (IIR) Graph Neural Networks (GNN) to efficiently model the inherent graph network structure of the smart grid data to address the cyberattack localization problem. First, we numerically analyze the empirical frequency response of the Finite Impulse Response (FIR) and IIR graph filters (GFs) to approximate an ideal spectral response. We show that, for th…
▽ More
This study employs Infinite Impulse Response (IIR) Graph Neural Networks (GNN) to efficiently model the inherent graph network structure of the smart grid data to address the cyberattack localization problem. First, we numerically analyze the empirical frequency response of the Finite Impulse Response (FIR) and IIR graph filters (GFs) to approximate an ideal spectral response. We show that, for the same filter order, IIR GFs provide a better approximation to the desired spectral response and they also present the same level of approximation to a lower order GF due to their rational type filter response. Second, we propose an IIR GNN model to efficiently predict the presence of cyberattacks at the bus level. Finally, we evaluate the model under various cyberattacks at both sample-wise (SW) and bus-wise (BW) level, and compare the results with the existing architectures. It is experimentally verified that the proposed model outperforms the state-of-the-art FIR GNN model by 9.2% and 14% in terms of SW and BW localization, respectively.
△ Less
Submitted 24 June, 2022;
originally announced June 2022.
-
Spatio-Temporal Failure Propagation in Cyber-Physical Power Systems
Authors:
Osman Boyaci,
M. Rasoul Narimani,
Katherine Davis,
Erchin Serpedin
Abstract:
Cascading failure in power systems is triggered by a small perturbation that leads to a sequence of failures spread through the system. The interconnection between different components in a power system causes failures to easily propagate across the system. The situation gets worse by considering the interconnection between cyber and physical layers in power systems. A plethora of work has studied…
▽ More
Cascading failure in power systems is triggered by a small perturbation that leads to a sequence of failures spread through the system. The interconnection between different components in a power system causes failures to easily propagate across the system. The situation gets worse by considering the interconnection between cyber and physical layers in power systems. A plethora of work has studied the cascading failure in power systems to calculate its impact on the system. Understanding how failures propagate into the system in time and space can help the system operator to take preventive actions and upgrade the system accordingly. Due to the nonlinearity of the power flow equation as well as the engineering constraints in the power system, it is essential to understand the spatio-temporal failure propagation in cyber-physical power systems (CPPS). This paper proposes an asynchronous algorithm for investigating failure propagation in CPPS. The physics of the power system is addressed by the full AC power flow equations. Various practical constraints including load shedding, load-generation balance, and island operation are considered to address practical constraints in power system operation. The propagation of various random initial attacks of different sizes is analyzed and visualized to elaborate on the applicability of the proposed approach. Our findings shed light on the cascading failure evolution in CPPS.
△ Less
Submitted 5 February, 2022;
originally announced February 2022.
-
Generating Connected, Simple, and Realistic Cyber Graphs for Smart Grids
Authors:
Osman Boyaci,
M. Rasoul Narimani,
Katherine Davis,
Erchin Serpedin
Abstract:
Smart grids integrate communication systems with power networks to enable power grids operation and command through real-time data collection and control signals. Designing, analyzing, and simulating smart grid infrastructures as well as predicting the impact of power network failures strongly depend on the topologies of the underlying power network and communication system. Despite the substantia…
▽ More
Smart grids integrate communication systems with power networks to enable power grids operation and command through real-time data collection and control signals. Designing, analyzing, and simulating smart grid infrastructures as well as predicting the impact of power network failures strongly depend on the topologies of the underlying power network and communication system. Despite the substantial impact that the communication systems bring to smart grid operation, the topology of communication systems employed in smart grids was less studied. The power community lacks realistic generative communication system models that can be calibrated to match real-world data. To address this issue, this paper proposes a framework to generate the underlying topological graphs for the communication systems deployed in smart grids by mimicking the topology of real-world smart grids. In this regard, we have updated the Chung-Lu algorithm to guarantee the communication network connectivity and to match the degree distribution of a real-world smart grid rather than following an expected degree distribution. In addition, key characteristics of communication systems such as diameter, average shortest paths, clustering coefficients, assortativity, and spectral gap were taken into consideration to generate the most similar real-world communication network for smart grid studies. We believe that the proposed algorithm to generate realistic cyber graphs for smart grid studies will benefit the power community.
△ Less
Submitted 11 January, 2022;
originally announced January 2022.
-
Cyberattack Detection in Large-Scale Smart Grids using Chebyshev Graph Convolutional Networks
Authors:
Osman Boyaci,
Mohammad Rasoul Narimani,
Katherine Davis,
Erchin Serpedin
Abstract:
As a highly complex and integrated cyber-physical system, modern power grids are exposed to cyberattacks. False data injection attacks (FDIAs), specifically, represent a major class of cyber threats to smart grids by targeting the measurement data's integrity. Although various solutions have been proposed to detect those cyberattacks, the vast majority of the works have ignored the inherent graph…
▽ More
As a highly complex and integrated cyber-physical system, modern power grids are exposed to cyberattacks. False data injection attacks (FDIAs), specifically, represent a major class of cyber threats to smart grids by targeting the measurement data's integrity. Although various solutions have been proposed to detect those cyberattacks, the vast majority of the works have ignored the inherent graph structure of the power grid measurements and validated their detectors only for small test systems with less than a few hundred buses. To better exploit the spatial correlations of smart grid measurements, this paper proposes a deep learning model for cyberattack detection in large-scale AC power grids using Chebyshev Graph Convolutional Networks (CGCN). By reducing the complexity of spectral graph filters and making them localized, CGCN provides a fast and efficient convolution operation to model the graph structural smart grid data. We numerically verify that the proposed CGCN based detector surpasses the state-of-the-art model by 7.86 in detection rate and 9.67 in false alarm rate for a large-scale power grid with 2848 buses. It is notable that the proposed approach detects cyberattacks under 4 milliseconds for a 2848-bus system, which makes it a good candidate for real-time detection of cyberattacks in large systems.
△ Less
Submitted 24 December, 2021;
originally announced December 2021.
-
Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Authors:
Osman Boyaci,
Mohammad Rasoul Narimani,
Katherine Davis,
Muhammad Ismail,
Thomas J Overbye,
Erchin Serpedin
Abstract:
False data injection attacks (FDIA) are a main category of cyber-attacks threatening the security of power systems. Contrary to the detection of these attacks, less attention has been paid to identifying the attacked units of the grid. To this end, this work jointly studies detecting and localizing the stealth FDIA in power grids. Exploiting the inherent graph topology of power systems as well as…
▽ More
False data injection attacks (FDIA) are a main category of cyber-attacks threatening the security of power systems. Contrary to the detection of these attacks, less attention has been paid to identifying the attacked units of the grid. To this end, this work jointly studies detecting and localizing the stealth FDIA in power grids. Exploiting the inherent graph topology of power systems as well as the spatial correlations of measurement data, this paper proposes an approach based on the graph neural network (GNN) to identify the presence and location of the FDIA. The proposed approach leverages the auto-regressive moving average (ARMA) type graph filters (GFs) which can better adapt to sharp changes in the spectral domain due to their rational type filter composition compared to the polynomial type GFs such as Chebyshev. To the best of our knowledge, this is the first work based on GNN that automatically detects and localizes FDIA in power systems. Extensive simulations and visualizations show that the proposed approach outperforms the available methods in both detection and localization of FDIA for different IEEE test systems. Thus, the targeted areas can be identified and preventive actions can be taken before the attack impacts the grid.
△ Less
Submitted 9 October, 2021; v1 submitted 23 April, 2021;
originally announced April 2021.
-
Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Authors:
Osman Boyaci,
Amarachi Umunnakwe,
Abhijeet Sahu,
Mohammad Rasoul Narimani,
Muhammad Ismail,
Katherine Davis,
Erchin Serpedin
Abstract:
False data injection attacks (FDIAs) represent a major class of attacks that aim to break the integrity of measurements by injecting false data into the smart metering devices in power grids. To the best of authors' knowledge, no study has attempted to design a detector that automatically models the underlying graph topology and spatially correlated measurement data of the smart grids to better de…
▽ More
False data injection attacks (FDIAs) represent a major class of attacks that aim to break the integrity of measurements by injecting false data into the smart metering devices in power grids. To the best of authors' knowledge, no study has attempted to design a detector that automatically models the underlying graph topology and spatially correlated measurement data of the smart grids to better detect cyber attacks. The contributions of this paper to detect and mitigate FDIAs are twofold. First, we present a generic, localized, and stealth (unobservable) attack generation methodology and publicly accessible datasets for researchers to develop and test their algorithms. Second, we propose a Graph Neural Network (GNN) based, scalable and real-time detector of FDIAs that efficiently combines model-driven and data-driven approaches by incorporating the inherent physical connections of modern AC power grids and exploiting the spatial correlations of the measurement. It is experimentally verified by comparing the proposed GNN based detector with the currently available FDIA detectors in the literature that our algorithm outperforms the best available solutions by 3.14%, 4.25%, and 4.41% in F1 score for standard IEEE testbeds with 14, 118, and 300 buses, respectively.
△ Less
Submitted 10 October, 2021; v1 submitted 5 April, 2021;
originally announced April 2021.
-
Toward Efficient Wide-Area Identification of Multiple Element Contingencies in Power Systems
Authors:
Hao Huang,
Zeyu Mao,
Mohammad Rasoul Narimani,
Katherine R. Davis
Abstract:
Power system N-x contingency analysis has inherent challenges due to its combinatorial characteristic where outages grow exponentially with the increase of x and N. To address these challenges, this paper proposes a method that utilizes Line Outage Distribution Factors (LODFs) and group betweenness centrality to identify subsets of critical branches. The proposed LODF metrics are used to select th…
▽ More
Power system N-x contingency analysis has inherent challenges due to its combinatorial characteristic where outages grow exponentially with the increase of x and N. To address these challenges, this paper proposes a method that utilizes Line Outage Distribution Factors (LODFs) and group betweenness centrality to identify subsets of critical branches. The proposed LODF metrics are used to select the high-impact branches. Based on each selected branch, the approach constructs the subgraph with parameters of distance and search level, while using branches' LODF metrics as the weights. A key innovation of this work is the use of the distance and search level parameters, which allow the subgraph to identify the most coupled critical elements that may be far away from a selected branch. The proposed approach is validated using the 200- and 500-bus test cases, and results show that the proposed approach can identify multiple N-x contingencies that cause violations.
△ Less
Submitted 6 July, 2021; v1 submitted 16 February, 2021;
originally announced February 2021.
-
Mixed-Integer Optimization for Bio-Inspired Robust Power Network Design
Authors:
Hao Huang,
Varuneswara Panyam,
Mohammad Rasoul Narimani,
Astrid Layton,
Katherine R. Davis
Abstract:
Power systems are susceptible to natural threats including hurricanes and floods. Modern power grids are also increasingly threatened by cyber attacks. Existing approaches that help improve power system security and resilience may not be sufficient; this is evidenced by the continued challenge to supply energy to all customers during severe events. This paper presents an approach to address this c…
▽ More
Power systems are susceptible to natural threats including hurricanes and floods. Modern power grids are also increasingly threatened by cyber attacks. Existing approaches that help improve power system security and resilience may not be sufficient; this is evidenced by the continued challenge to supply energy to all customers during severe events. This paper presents an approach to address this challenge through bio-inspired power system network design to improve system reliability and resilience against disturbances. Inspired by naturally robust ecosystems, this paper considers the optimal ecological robustness that recognizes a unique balance between pathway efficiency and redundancy to ensure the survivability against disruptive events for given networks. This paper presents an approach that maximizes ecological robustness in transmission network design by formulating a mixed-integer nonlinear programming optimization problem with power system constraints. The results show the increase of the optimized power system's robustness and the improved reliability with less violations under N-x contingencies.
△ Less
Submitted 6 July, 2021; v1 submitted 29 October, 2020;
originally announced October 2020.
-
Demand Side Management for Homes in Smart Grids
Authors:
Mohammad Rasoul Narimani
Abstract:
Electricity usage is a major portion of utility bills and the best place to start lowering them. An effective home energy management approach is introduced to decrease customers' electricity bills by determining the optimal appliance scheduling under hourly pricing based demand response (DR) strategies. The proposed approach specifically addresses consumer comfort through acceptable appliance defe…
▽ More
Electricity usage is a major portion of utility bills and the best place to start lowering them. An effective home energy management approach is introduced to decrease customers' electricity bills by determining the optimal appliance scheduling under hourly pricing based demand response (DR) strategies. The proposed approach specifically addresses consumer comfort through acceptable appliance deferral times, within which their consumption can be shifted from the normal schedules. Electric vehicles (EVs), with vehicle to grid (V2G) and vehicle-to-home (V2H) abilities, Energy storage systems (ESS), and Renewable Energy Resource as a distributed generation are considered at the end-user premises to improve the energy management efficiency. A mixed-integer linear programming (MILP) framework is implemented to solve the proposed problem. Numerical results show that the proposed approach can reduce customers' electricity bill without sacrificing their comfort and fully exploit EVs and ESS capacities.
△ Less
Submitted 25 November, 2019;
originally announced November 2019.
-
An Efficient Scenario-based Stochastic Energy Management of Distribution Networks with Distributed Generation, PV Module, and Energy Storage
Authors:
Mohammad Rasoul Narimani,
Ali Azizivahed,
Ehsan Naderi
Abstract:
Incorporating Renewable Energy Sources (RES) incurs a high level of uncertainties to electric power systems. This level of uncertainties makes the conventional energy management methods inefficient and jeopardizes the security of distribution systems. In this connection, a scenario-based stochastic programming is introduced to harness uncertainties in the load, electricity price, and photovoltaic…
▽ More
Incorporating Renewable Energy Sources (RES) incurs a high level of uncertainties to electric power systems. This level of uncertainties makes the conventional energy management methods inefficient and jeopardizes the security of distribution systems. In this connection, a scenario-based stochastic programming is introduced to harness uncertainties in the load, electricity price, and photovoltaic generation. Further, a hybrid evolutionary algorithm based on Grey Wolf Optimizer and Particle Swarm Optimisation algorithm is proposed to find the best operation cost, and Energy Not Supplied (ENS) as two important objective functions, which almost always are in stark contrast with each other. The proposed algorithm is applied to the modified IEEE 69-bus test system and the results are validated in terms of efficiency, which indicates a cogent trade-off between the fitness functions addressed above.
△ Less
Submitted 15 October, 2019;
originally announced October 2019.