Time-frequency based cyber security defense of wide-area control system for fast frequency reserve

https://doi.org/10.1016/j.ijepes.2021.107151Get rights and content

Highlights

  • Impact and threat of cyber security are analyzed in WAMS-based FFR control system.

  • Novel dual-frequency scale CNN for processing the spoofing data from two scales.

  • Time-frequency based cyber security defense framework for WAMS-based FFR system.

  • The result shows higher accuracy and robustness with actual synchrophasor data.

Abstract

Global power systems are transiting from conventional fossil fuel energy to renewable energies due to their environmental benefits. The increasing penetration of renewable energies presents challenges for power system operation. The efficiency and sufficiency of responsive reserves have become increasingly important for power systems with a high proportion of renewable energies. The Fast Frequency Reserve (FFR), especially the Wide-area Monitoring System (WAMS)-based FFR, is a promising and effective solution to secure and enhance the stability of power systems. However, cyber security has become a new challenge for the WAMS-based FFR system. Cyber attacks on the FFR control system may threaten the safety of power system operation due to the rapid power controllability requirement of FFR. To address this problem, a time-frequency based cyber security defense framework is proposed to detect the cyber spoofing of synchrophasor data in WAMS-based FFR control systems. This paper first introduces the Continuous Wavelet Transforms (CWTs) to decompose spoofing signals. Then, the Dual-frequency Scale Convolutional Neural Networks (DSCNN) is proposed to identify the time-frequency domains matrix from two frequency scales. Integrating CWTs and DSCNN, an identification framework called CWTs-DSCNN is further proposed to detect the spoofing attacks in the WAMS-based FFR system. Multiple experiments using the actual data from FNET/GridEye are performed to verify the effectiveness of the framework in securing WAMS-based FFR systems.

Introduction

The transition of global energy from fossil fuel energy to renewable energy has significantly accelerated in the past decade [1], [2]. According to 2020 Renewable Global Status Report, the newly installed capacity of renewable energies is record-breaking in 2019, growing by more than 200 gigawatts (GW), which is the largest installation capacity increase in history [3]. Additionally, as research and development efforts and energy policies in almost all countries are increasingly focusing on renewable energy development, it is clear that the renewable penetration in power systems will continually increase in the foreseeable future [4].

Due to the physical characteristics of renewable energies, renewable generation is usually integrated into power systems through Grid-connected Converters (GCCs) [5]. As is well known, system inertia is provided by generators and motors rotating at the same frequency, which forms the power grid frequency [6], [7]. However, the GCC connection decouples generator rotors to power grids, and some even do not have mechanical rotors. Therefore, most renewable energies can not provide the necessary grid services [8]. With the increasing penetration of renewable energies, the system inertia decreases inevitably. When an event occurs (e.g., generator trip or load loss), the stability of the power system with a high proportion of renewable energies will be more vulnerable. For example, the Rate of Change of Frequency (RoCoF) and the frequency deviation would be larger for the same amount of power imbalance, and finally leads to the tripping of protection relays [9]. As the generation mix changes, maintaining the system frequency at acceptable levels becomes a thorny issue [10].

To handle the emergency operating situations of low inertia systems, Fast Frequency Reserve (FFR) has received much attention in recent years [11], [12]. According to the definition by the North American Electric Reliability Corporation (NERC), FFR is designed to provide a fast power response to changes in the measured or observed frequency during a frequency excursion event [13]. In the past, the inertial response from synchronous generators is the dominant FFR in the system. With the conventional generator retired and replaced by renewable energies, system operators proposed higher response requirements [14]. In the frequency response requirement of the California Independent System Operator (CAISO), FFRs need to act within the first few seconds. The frequency response of synchronous generators cannot meet the operating requirement [15], [16]. The FFR provided by energy storage devices and fast-responding controls from renewable energies, such as batteries, flywheels, and kinetic energy extraction from Wind Generators (WGs), has become the mainstream in recent years [17], [18].

Due to its fast response capability to the frequency deviation, the FFR has been widely recognized as the primary response to the frequency excursion of low-inertia systems. Some frequency regulation methods based on the FFR response have been studied, including using the rotating kinetic energy from WG [19], [20], and extracting energy stored in DC links [21]. The demand-side response has also been studied, such as the aggregation of refrigerators [22], smart loads [23], and PV panel control [24].

So far, most control methods for FFRs are based on local frequency measurement. Due to its dependence on the geographical distribution of renewable resources and grid infrastructure, the location of renewable generation is typically distributed non-uniformly [25]. The local measurement-based FFRs cannot exactly match the power requirement and FFRs response. As a result, the output from the FFRs may not improve frequency performance and even cause inter-regional power oscillations [26]. With the advancement of the phasor measurement unit (PMU) in accuracy and the reporting rate, wide-area monitoring system (WAMS) provides system operators with an unprecedented way to monitor and control power systems. In [27], a WAMS-based FFR control system is presented, which uses real-time data from PMUs to determine the required responses and allocate them to FFRs. Compared to the conventional FFR control, this WAMS-based control could realize the coordination and optimization of FFR in the system, improving the system stability. With the increasing need of FFRs, the WAMS-based FFR is a promising solution for system stability enhancement.

However, the data security of PMUs has always been vulnerable as evidenced by the increasing reported cases of cyber attacks. Owing to their operating principle and communication methods, PMUs are easy to be penetrated [28]. In various attack methods, the network-based false data injection (NFDI) attack may seriously influence the authenticity of data, causing malfunction of FFRs, which is even worse than the case without FFRs. Considering the fast response capability of FFRs, the risk of the reverse direction regulation of FFRs could be a potential disaster to the system stability. Therefore, cyber-attack detection becomes essential for the FFR response.

Due to its importance, there has been some research on the defense against power grid attacks. In [29], the hijacking attacks are detected in DC microgrids using the distributed screening method. The attack on the AC/HVDC interconnected system has also been studied in [30] through manipulating the system measurements of frequencies. However, these methods require the values of other parameters of the circuit, such as the current, to achieve accurate detection. This limits its application to the FFR control circuits. Meanwhile, from the energy perspective, the attack will deplete the available energy, including the batteries and photovoltaic [31]. A two-stage robust optimization is proposed to mitigate the uncertainties and adverse impacts caused by NFDI attacks in [32].

For the attack detection in frequency control systems, some research has also investigated the defense strategies for the cyber attack. [33] develops an approach based on a novel stochastic unknown input estimator to detect the attack in the AGC. The proposed method does not need information about real-time load changes, which significantly improve state estimation accuracy. Based on the state estimation accuracy, [34] analysis four different attack strategies and their impact on load frequency control. Based on the analysis results, a detection method based on a Multilayer perception classifier-based approach is proposed to extract the differences between the normal signal and compromised signals. Based on the passive fault attenuation principle, [35] design a new distributed cyber-attack-tolerant frequency control to improve the frequency performance and the tolerance under cyber attack. [36] develops a new virtual inertia control strategy that adopting the virtual damper to enhance the conventional virtual inertia control so that improve the frequency response performance such as frequency nadir and oscillation under the time delay attacks. One common feature of these attacks is the modification of the measurement data. In the NFDI attack, such measurements are tampered behaviors that can be considered as a replay attack. The replacement signal in these attacks can be very similar to the raw measurement, bringing challenges for accurate attack detection.

Depending on the robustness of attack detection, cyber security defense methods can be divided into model-based methods and model-free methods. Model-based methods usually establish state equations to detect the attack [37]. Changes in measured values will cause changes in state variables. Then, attacks can be detected based on the measurement residual vector or state variables [38]. These model-based methods build equations based on the system structure. Therefore, the configuration information on the previous state is needed, which sacrifices its generality and adaptability.

Model-free methods include traditional machine learning methods and deep learning methods [39]. They also belong to data-driven methods, which make full use of the PMU data in the FFR control system. For example, the Random Forest Classification (RFC) and gcForest are used to detect the spoofing attack by extracting the spatio-temporal characteristics from the synchrophasor data [40], [41]. Additionally, the data authentication method is proposed to detect the data spoofing based on ensemble empirical mode decomposition (EEMD) and back propagation (BP) neural network [42]. These methods are based on the frequency domain features of the signal, because the frequency domain information is considered to be consistent during a short time [43]. However, the period of this frequency information retention is not considered. In [44], the support vector machine is introduced for spoofing events recognition, and the handcrafted correlation vectors are designed for detecting spoofing attacks. However, the time domain-based recognition method is only applicable when the shape of the attack differs from the original measurement value. The above model-free methods either only contain frequency information or only contain time domain information, resulting in an insufficient response to complex attacks. Meanwhile, the simulated data is used in some research. For example, the intentional injections of false synchrophasor measurements detection method is verified based on the IEEE 39-Bus system [45]. Compared with the simulated data and the actual data, the components such as the noise level and frequency components are different. Massive measurement data increases the demand for deep learning methods, which have strong feature extraction capabilities.

Considering the big data in WAMS and the fast response requirement of FFR application, deep learning methods have been introduced for attack detection. In [46], the deep autoencoder is deployed to detect the data manipulation attacks, assuming that the data packets of PMU data can be modified. Besides, a recurrent neural network is proposed to identify the replaced false data in DC microgrids [47]. Nevertheless, the recurrent network is only suitable for the data with a certain trend, while synchrophasor measurement data is often random, especially frequency measurement values. Therefore, the convolutional neural networks (CNN), longshort-term memory (LSTM), and SVM are combined to for detecting tampering attacks using the raw signals in [48], which also demonstrated the profound feature extraction capabilities of deep learning. However, this combination makes this method very complicated and difficult to train. It can be seen from the results of the existing research that the optimized input space is worthy of further mining to improve the attack detection performance in the FFR control system, so that the response speed can be guaranteed and the FFR control reliability can be improved.

To increase the amount of input information and improve the performance of cyber-attacks detection, a cyber-security defense method is proposed in the WAMS-based FFR control systems. The proposed method includes the following innovations.

  • 1.

    To extract the information of the attack signal from multiple scales in the WAMS-based FFR control system, the Continuous Wavelet Transforms (CWTs) is applied to transform the spoofing signal and obtain features from the time and frequency domains to enhance feature diversity.

  • 2.

    To enhance the attack detection ability in the WAMS-based FFR control system, the Dual-frequency Scale CNN (DSCNN) is proposed to process the input data from two frequency scales. This scaling feature improves the detection ability of the spoofing attack.

  • 3.

    A spoofing attack identification framework of synchrophasor data is developed based on the CWTs and DSCNN. Particularly, the handcrafted feature design steps can be avoided.

  • 4.

    Importantly, the time-sensitivity experiment of the spoofing attack detection is first performed in this paper. Compared with some deep learning and advanced attack detection methods, the experimental results verify that the proposed CWTs-DSCNN framework has higher accuracy and better robustness.

The main contribution of this paper is the proposed CWTs-DSCNN, which provides a rapid and reliably cyber security defense mechanism for the WAMS-based FFR control system. The proposed method breaks through the speed and accuracy limitations of the traditional detection methods, significantly improving the operating security of the WAMS-based FFR control system. Additionally, the proposed method has been evaluated with actual synchrophasor data from the Western Interconnection (WECC) system, which verified its practical value in the WAMS-based FFR control system.

The rest of the paper is organized as follows. Section 2 describes the potential impact of the spoofing on the power system. Section 3 presents the time-frequency based signatures extraction using CWTs. And the proposed DSCNN is introduced in Section 4. Next, the proposed CWTs-DSCNN framework is listed in Section 5. Different experiments are conducted in Section 6. Finally, the results and conclusion are discussed in Section 7.

Section snippets

The WAMS-based FFR control system under cyber attack

To demonstrate the impact of the attack on FFR control, the control framework of the WAMS-based FFR control system is first introduced, as shown in Fig. 1, where fref is the nominal frequency, flocal-measurement is the measured frequency from Local PMU, f,θ, and V are measured frequency, angle, and voltage, respectively. Δθ is the phase angle difference during pre-disturbance and post-disturbance steady states, ΔPorder-θ is the power order calculated from the transient stability control in

Data detrending

The objective of this section is to detect the source ID cyber spoofing from multiple PMU units. The definition of the source ID cyber spoofing is as follows. Denoted the vector Si={si,1,si,2,,sj,n} as the measurement data in the i-th PMU in the time 1ton. For any unknow synchrophasor data segment Ss={s1,s2,,ss}where 1sn, the source ID cyber spoofing will happen when the data in Siis replaced by Sswith a certain time window of the same length [52]. It also should be notable that the playing

Cyber spoofing detection using Dual-frequency Scale CNN

WAMS systems usually have hundreds to thousands of synchrophasor measurement Units. Therefore, it is necessary to use the big data processing method to defend against cyber spoofing. CNN has been developed to learn useful information from massive input data. Compared with some classic machine learning methods, such as ANN, it has higher computing requirements but also higher efficiency [54]. However, its performance suffers from the single convolution method and redundancy. To overcome this

Cyber security defense and identification framework

Using the proposed CWTs and DSCNN, this section further proposes a cyber spoofing defense framework CWTs-DSCNN for spoofing data detection in WAMS-based FFR control system. As shown in Fig. 8, this framework can be summarized as the following steps

  • Time-frequency based power spectrum calculation: Performing data detrending to the synchrophasor data of the WAMS-based FFR control system using the high pass filter. Then the CWTs is applied to the filtered data to obtain the time-frequency features

Experiments

In this section, several experiments are used to verify the accuracy of the proposed method in detecting cyber spoofing attacks in the WAMS-based FFR control system. To make the attack signal closer to the real scene, the synchrophasor data collected from ten PMU units in WECC are used to simulate the cyber attack. It is more secretive if the real-time measured data of the power system is used to attack the original measurement data in the same WAMS. As shown in Fig. 9, the synchrophasor

Conclusion

To enhance the stable operation of the WAMS-based FFR control system under various cyber attacks, in this paper, a time-frequency based cyber security defense framework called CWTs-DSCNN is proposed to detect the cyber spoofing of synchrophasor data in the WAMS-based FFR control system. In the defense framework, the time-frequency matrix is first transformed using CWTs. The normal and spoofing time-frequency information of CWTs shows that unique signatures can be extracted efficiently. Then,

CRediT authorship contribution statement

Wei Qiu: Conceptualization, Data curation, Methodology, writing - original draft. Kaiqi Sun: Conceptualization, Methodology, Visualization, writing - original draft. Wenxuan Yao: Formal analysis, Investigation, Resources. Shutang You: Writing – review & editing, Formal analysis. He Yin: Data curation, Formal analysis, writing – review & editing. Xiaoyang Ma: Writing – review & editing, Visualization. Yilu Liu: Writing – review & editing, Supervision.

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgment

This work was also supported by the NSF Cyber-Physical Systems (CPS) Program (#1931975).

References (64)

  • S. Wang et al.

    A novel deep learning method for the classification of power quality disturbances using deep convolutional neural network

    Appl Energy

    (2019)
  • REN21. Renewables 2020 global status report. Rep. Paris: REN20;...
  • IRENA, Untapped potential for climate action: renewable energy in nationally determined contributions...
  • J. Zhu et al.

    Inertia emulation control strategy for vsc-hvdc transmission systems

    IEEE Trans Power Syst

    (2013)
  • K. Sun et al.

    A review of clean electricity policies–from countries to utilities

    Sustainability

    (2020)
  • Y. Kim et al.

    Analysis and experimental implementation of grid frequency regulation using behind-the-meter batteries compensating for fast load demand variations

    IEEE Trans Power Syst

    (2017)
  • NERC. Fast frequency response concepts and bulk power system reliability needs; 2020....
  • S. You et al.

    Energy storage for frequency control in high photovoltaic power grids, in

  • CAISO. Frequency response phase 2 issue paper; 2016....
  • J. Neely et al.

    Evaluation of pv frequency-watt function for fast frequency reserves

  • L. Peltonen et al.

    Distributed small loads as fast frequency reserves: Impact on system performance, in

  • A. Junyent-Ferr et al.

    Blending hvdc-link energy storage and offshore wind turbine inertia for fast frequency response

    IEEE Trans Sustain Energy

    (2015)
  • O.D. Adeuyi et al.

    Fast frequency response from offshore multiterminal vsc–hvdc schemes

    IEEE Trans Power Deliv

    (2017)
  • E. Vrettos et al.

    Fast and reliable primary frequency reserves from refrigerators with decentralized stochastic control

    IEEE Trans Power Syst

    (2017)
  • D. Chakravorty et al.

    Rapid frequency response from smart loads in great britain power system

    IEEE Trans Smart Grid

    (2017)
  • B. Craciun et al.

    Frequency support functions in large pv power plants with active power reserves

    IEEE J Emerg Sel Top Power Electron

    (2014)
  • S. You et al.

    Non-invasive identification of inertia distribution change in high renewable systems using distribution level pmu

    IEEE Trans Power Syst

    (2018)
  • Y. Liu et al.

    Study of wind and pv frequency control in u.s. power grids–ei and ti case studies

    IEEE Power Energy Technol Syst J

    (2017)
  • Q. Hong et al.

    Design and validation of a wide area monitoring and control system for fast frequency response

    IEEE Trans Smart Grid

    (2020)
  • W. Wang et al.

    Information and Communication Infrastructures in Modern Wide-Area Systems

    (2021)
  • S. Sahoo et al.

    Distributed screening of hijacking attacks in dc microgrids

    IEEE Trans Power Electron

    (2020)
  • K. Pan et al.

    False data injection attacks on hybrid ac/hvdc interconnected systems with virtual inertia–vulnerability, impact and detection

    IEEE Access

    (2020)
  • Cited by (19)

    • Cost-effective synchrophasor data source authentication based on multiscale adaptive coupling correlation detrended analysis

      2023, International Journal of Electrical Power and Energy Systems
      Citation Excerpt :

      Then 1000 short fragments are collected from each location with 80 % and 20 % of the samples being randomly assigned to the computational intelligence algorithm for training and testing purposes. To make a reasonable comparison, six “state-of-the-art” computational intelligence algorithms are selected for performance evaluation including both shallow learning algorithms (i.e., ANN [11], SVM [12–14], RFC [15]) and a deep learning algorithm (i.e., CNN [16]). The whole SDSA is performed on a general desktop with an i7-11700 CPU and 32 GB RAM.

    • Alternative multi-label imitation learning framework monitoring tool wear and bearing fault under different working conditions

      2022, Advanced Engineering Informatics
      Citation Excerpt :

      In Case 2 with a practical engineering dataset, the compound fault composed of bearing fault and tool wear is distinguished, and each sample is labeled with two sublabels consisting of bearing fault sublabel and tool wear sublabel. Moreover, in the recently published literature [45–47] related to the prognostics and health management (PHM), the CWT with the “cgau8” is regarded as a significant data processing method. For instance, the paper [46] compares the “cgau8” with the other wavelets, including the Morlet wavelet, and Mexican hat wavelet.

    • Timber damage identification using dynamic broad network and ultrasonic signals

      2022, Engineering Structures
      Citation Excerpt :

      As one of the most important research tools in one-dimensional signals, time–frequency analysis can often assist various algorithms to accomplish damage identification with higher accuracy [42-44]. Therefore, the Complex Gaussian wavelets (cgau8) [45] was used to obtain time–frequency features from the ultrasonic signals, which were then used as input to various types of networks. To reduce the computational demand, the size of the time–frequency feature matrix was first resized to (28,28) and then expanded to a 784-dimensional vector.

    • A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments

      2021, Energy Reports
      Citation Excerpt :

      Botnets are also referred to as electronic soldiers (Kharlamova et al., 2021). Qiu et al. (2021) analyzed the impact and threat of cyber security in WAMS-based FFR (Fractional flow reserve) control with novel scale CNN for processing the spoofing data from two scales. They also investigated the time–frequency based cyber-security defense framework for FFR system.

    View all citing articles on Scopus

    Postgraduate Scientific Research Innovation Project of Hunan Province under Grant CX20200426.

    View full text