On the optimization of energy storage system placement for protecting power transmission grids against dynamic load altering attacks
read more
Citations
Double Closed-loop Integral Terminal Sliding Mode for a Class of Underactuated Systems Based on Sliding Mode Observer
Some modified Hestenes-Stiefel conjugate gradient algorithms with application in image restoration
Reinforcement-learning-based dynamic defense strategy of multistage game against dynamic load altering attack
Ensuring the Stability of Power Systems Against Dynamic Load Altering Attacks: A Robust Control Scheme Using Energy Storage Systems
MPPT Adaptive Controller of DC-based DFIG in Resistances Uncertainty
References
Parallel and Distributed Computation: Numerical Methods
Sparse Approximate Solutions to Linear Systems
False data injection attacks against state estimation in electric power grids
Attack Detection and Identification in Cyber-Physical Systems
Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations
Related Papers (5)
Static Optimization of Reactive Power Sources by use of Sensitivity Parameters
Frequently Asked Questions (12)
Q2. What are the future works mentioned in the paper "On the optimization of energy storage system placement for protecting power transmission grids against dynamic load altering attacks" ?
Moreover, future works will consider the placement of energy storage systems for reducing the possibility of designing undetectable attacks as well as for their usage in support of secondary regulation services. The authors are also carrying out further studies with the aim of applying the methodologies discussed in [ 52 ] - [ 54 ] to the problem of QoE-aware smart grid protection against cyber-physical attacks.
Q3. What is the purpose of this paper?
In this paper a protection scheme making use of energy storage systems for improving power system reaction to closed-loop dynamic load altering attacks is presented.
Q4. What is the purpose of a D-LAA?
By definition, a D-LAA is aimed at compromising a certain amount of vulnerable load in specific grid areas and at controlling its evolution over time so that the overall interconnected system is considerably altered and damaged.
Q5. What is the complete linear state-space descriptor model for the IEEE 39-bus test?
𝑇 as the vector of the load frequency deviations, and considering 𝛿, 𝜃, 𝜔, and 𝜙 as state variables, the complete linear state-space descriptor model for the IEEE 39-bus test system is[
Q6. What is the resulting power consumption PL in (9)?
Neglecting the 𝐾𝐿𝐿𝜙 term due to the assumption on the sensor bus, the power consumption 𝑃𝐿 in (9) can be then rewritten as𝑃𝐿 = (𝐾𝐿𝑆 − 𝐾𝐿𝐺)𝜔. (12)The resulting closed-loop system dynamics – modelling the power grid subject to the D-LAA and to ESS control for attack mitigation – is obtained by substituting (12) into (8) so as to have[
Q7. What is the way to solve a nonconvex optimization problem?
In order to overtake nonconvexity, the authors exploit a two-step solution approach, adapted from [6] and inspired by the coordinate descent method whose convergence is guaranteed [49].
Q8. What is the purpose of the simulations?
Since the authors intend to determine the minimum number of ESSs and their exact location in the power grid, the obtained simulation results claim that, by introducing one ESS located at load bus no. 19 with storage capacity equal to 5.6 p.u., the power grid remains stable under the considered D-LAA.
Q9. What is the common choice for a non-convex optimization problem?
a non-convex optimization problem may have multiple solutions, it may be infeasible or it can take exponential time to determine the global minimum across all admissible solution regions.
Q10. What is the way to solve the problem?
note that a solution to this problem is not easily found, because solving a cardinality minimization problem is NP-hard [47], and due to the presence of the non-convex quadratic constraint defined by (15).
Q11. what is the purpose of the study?
The authors are also carrying out further studies with the aim of applying the methodologies discussed in [52]-[54] to the problem of QoE-aware smart grid protection against cyber-physical attacks.
Q12. What is the simplest solution to the problem?
Starting from control gains initialized to the maximum admissible values, the iterative algorithm discussed in Section III is run so as to solve this instance of Problem 1.