Loading…

Critical Data Visualization to Enhance Protection Schemes for State Estimation

Intelligent electrical power grids, widely referred to as smart grids (SGs), rely on digital technology resources, especially communication and measurement devices, becoming a cyber-physical energy system. Massive data flow between grid elements makes smart grids more vulnerable to cyber-attacks. Po...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on smart grid 2023-03, Vol.14 (2), p.1-1
Main Authors: Flor, Vinicius B. Braga, Filho, Milton B. Do Coutto, de Souza, Julio C. Stacchini, Vergara, Pedro P.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Intelligent electrical power grids, widely referred to as smart grids (SGs), rely on digital technology resources, especially communication and measurement devices, becoming a cyber-physical energy system. Massive data flow between grid elements makes smart grids more vulnerable to cyber-attacks. Power system state estimation (SE)-an essential function of energy management systems-is one of these data integrity attacks' targets. Integrity validation routines can fail when insufficient redundancy levels are reached, and spurious data occur. These levels are associated with critical data, i.e., those whose unavailability makes the grid unobservable. Data redundancy is a metric that gives a precarious indication that SE can run. Alternatively, it is more appropriate to quantify this function strength concerning its results' reliability, which can be achieved by criticality analysis (CA). This paper proposes a novel approach to visualize the results of an extensive CA through representative graphs; they facilitate understanding the usefulness of CA. Critical sets of measurements are generalized, and several metrics are proposed to reveal measuring system vulnerabilities, assisting the design of protection schemes to resist cyber-attacks. Simulations attained on the IEEE-30bus system evince significant improvements in the interpretation/use of CA.
ISSN:1949-3053
1949-3061
DOI:10.1109/TSG.2022.3203404