Next Article in Journal
Comparison of Wind Lidar Data and Numerical Simulations of the Low-Level Jet at a Grassland Site
Previous Article in Journal
To What Extent Is Manure Produced, Distributed, and Potentially Available for Bioenergy? A Step toward Stimulating Circular Bio-Economy in Poland
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Contingency Analysis to Evaluate the Robustness in Large-Scale Smart Grids: Based on Information Security Objectives and Frequency Stability

1
Electrical Safety Research Institute, Korea Electrical Safety Coporation, Seoul 55365, Korea
2
Department of Electronic and Electrical Engineering, Hongik University, Seoul 04066, Korea
*
Author to whom correspondence should be addressed.
Energies 2020, 13(23), 6267; https://doi.org/10.3390/en13236267
Submission received: 5 October 2020 / Revised: 13 November 2020 / Accepted: 25 November 2020 / Published: 27 November 2020
(This article belongs to the Section A1: Smart Grids and Microgrids)

Abstract

:
Smart grids (SGs) are attracting attention as high value-added platforms, which mass-produce new business models through real-time information sharing. However, the open-ended information structure of SGs increases the risk of exposure to cyberattacks through the creation of multiple communication access points. In a power system where a real-time balance of supply and demand is essential, cyberattacks result in cascading failures leading to power outages. Therefore, this paper proposes a method to evaluate the robustness of large-scale SGs against cybersecurity disturbances. The proposed evaluation method established a hierarchy quantification technique considering the structural characteristics of SGs. With respect to the cyber hierarchy, relevant standards (NERC CIP, NIST FIPS) were applied to classify the grades of information security risk. In the case of physical hierarchy, the power system was calculated by using optimal power flow and analyzed the frequency stability. This study was aimed at identifying the vulnerabilities in the physical topology aspect of intelligent power systems due to cybersecurity disturbances.

1. Introduction

A smart grid (SG) is a representative convergence technology that provides various services and high-value through the advancement of power infrastructure. However, due to the physical characteristics of electricity (maintaining a balance of real-time supply and demand, etc.), this industry faces complex and diverse challenges compared with other convergence industries. A typical example is the uncertainty of a stable power supply due to cyber terrorism in the power system. On 14 August 2003, a massive blackout in nine areas in the United States and Canada caused more than $6 billion in monetary losses [1]. Although this incident is not a direct case of cyber terrorism in the power system, it indicates that control system malfunctions in the power industry can lead to national damage. In the United States and Europe, information and communications technology (ICT) has been used owing to the vastness of the geographic area and the advancement of the power market and there have been various cyber-attacks [2,3,4]. Moreover, related international conferences (Black Hat) have also proven the technical possibility of cybersecurity threats to SGs [5].
Recently, with the emergence of security issues due to the active deployment of SGs, various studies have been conducted on the optimized security solutions of SGs. The Illinois Institute of Technology has conducted a study on a contingency-based power system reliability evaluation algorithm for the malfunction of WAMS [6]. In addition, the Schweitzer Engineering Lab has analyzed the CPS modeling-based vulnerabilities of the power infrastructure [7]. Furthermore, SG security studies have been reported from various perspectives, such as the analysis of the impact of cyber disturbances on the power market [8,9,10]. In recent years, related studies have been actively conducted on SG security reflecting cyber disturbances for the power-system-analysis techniques such as optimal power-flow-calculation normalization according to cyber-attacks [11,12].
In this study, the organic relationship of the SG infrastructure was analyzed, and a robustness-evaluation technique was proposed in terms of the physical topology based on the contingency analysis of cyber disturbances. To this end, Section 2 presents the analysis of the structural characteristics and infrastructure elements of the SG, and Section 3 introduces a physical robustness-evaluation method for a large-scale SG with respect to cyber disturbances. Particularly, for the evaluation, the cyber and physical hierarchies are quantified to reflect the structural characteristics of SGs. Section 4 validates the proposed evaluation method through a case study for the modified IEEE RTS 39-bus.

2. Structural Characteristics of SG

An SG is a convergence of power systems and information systems. Hence, the relationship between different fields needs to be analyzed. In this study, the correlation between the physical hierarchy (power system) and cyber hierarchy (information system) is analyzed considering a cybersecurity disturbance based on the power system in Korea. The power system is organically connected to the system of power generation, transmission, and distribution, centered on the energy management system (EMS) to maintain a real-time balance of power supply and demand. The EMS is a core system for the optimal operation of the power system and various optimization programs are installed to control the overall process from the power generation plan to subsystem analysis. The communication system of the EMS is based on IEC 61850 and 60870 and it transmits and receives data to/from power generators exceeding 20 MW and substations of 345/765 kV through a dedicated remote terminal unit (RTU). Substations below 154 kV acquire data through the regional control center (RCC) [13].
The power generation system maintains the specified frequency (60 ± 0.2 Hz in Korea) by adjusting the output reference point for each generator through the automatic generation control (AGC) function of the EMS as a synchronous power generation method [14]. The control system of a power generator over 20 MW periodically measures and controls approximately 3000 to 50,000 data elements on generator components (boiler, turbine, condenser, etc.) through the distributed control system (DCS) [15].
The transmission system monitors and controls various types of information on transmission and substation facilities through supervisory control and data acquisition (SCADA) and communicates based on IEC 61850, in connection with wide-area monitoring and control (WAMAC). WAMAC minimizes the spread of failures by adjusting the power distribution with an interruptible load shedding (ILS) in case of sudden disturbance [16].
These structural characteristics of SGs and the real-time two-way information-sharing system increase the information access points and, thus, these systems become exposed to cybersecurity threats. Therefore, the analysis of the correlation between hierarchies according to the occurrence of disturbances in an SG is as follows.
Figure 1 shows the structural and functional aspects of the SG, categorized into physical, cyber, and applied hierarchies. The figure also represents the correlation of each hierarchy based on the state change (steady, transient, and collapse) of the power system. Abnormal conditions in the cyber and application layers are directly connected to system malfunction, disabling the functions of each hierarchy, and a failure of the communication system is likely to cause a wide-area power outage.

3. Evaluation Methodology on Risk Impact of Cybersecurity Threats in Large-Scale SGs

3.1. Definition of Risk Impact of Cybersecurity Threats

NIST and NERC have announced strategies and technical standards for securing the cybersecurity of integrated power and information systems for the reliable operation of SGs [17,18,19,20]. In particular, NERC stipulated bulk electric system (BES) operators to evaluate the effect of the power system periodically due to cyber disturbances [19]. This study defines the concept of the risk impact of cybersecurity threats specialized in SGs based on related previous studies.
First, the power system at the physical hierarchy adheres to the reliability, adequacy, and security evaluation to secure soundness [21]. Reliability encompasses adequacy, security, and the ability to provide quality power to consumers via normal operation of the related facilities according to the power system regulations [21,22]. Security is the ability of the electric system to withstand sudden disturbances, such as electric short circuits or unanticipated loss of system elements. For this, the stability of frequency, voltage, etc., due to contingency is analyzed [21,22].
Next, securing cybersecurity at the cyber hierarchy refers to a series of technologies that satisfy the three elements of security objectives (confidentiality, integrity, and availability) for the information and communication infrastructure [17]. Confidentiality prevents information from being disclosed to unauthorized devices or users. Integrity ensures that information has not been altered by unauthorized actions during data processing. Availability only allows timely access and the use of data and information systems to authorized users.
Accordingly, the risk impact of cybersecurity threats in SGs is the integration of the concepts of power system security and cybersecurity and is defined as identifying vulnerable points from the perspective of physical topology due to cyber contingency in a large-scale intelligent power system.

3.2. Evaluation of Risk Impact of Cybersecurity Threats

In this study, the evaluation of the robustness of cybersecurity threats was established in six steps, as shown in Figure 2, focusing on quantitatively deriving vulnerable points in terms of physical topology.
Step 1 is the basic work to identify the evaluation targets of risk impact. It defines the components of the physical hierarchy (power system) and cyber hierarchy (information system).
Step 2 is a quantification technique from the aspect of cyber hierarchy, and the potential damage size based on the three elements of security objectives (confidentiality, integrity, availability) is determined to estimate the information security risk. The security objectives were applied to the FIPS 199 of the NIST and CIP technical standards of the NERC [19,23]. FIPS 199 defines the potential damage size based on the three elements of security objectives, as shown in Table 1. CIP-002-5.1a (critical cyber asset categorization) is a standard for estimating the values for the power facility and classifies the values grade of each component of the SG. In other words, for the information security risk, the values of the components of the SG are calculated, and then the potential damage size is determined with respect to the malfunction of the corresponding equipment. Eleven security threat elements were considered for the SG infrastructure [24]; however, in the case of the occurrence of any one of these security threats, it is simplified as a malfunction of the corresponding equipment. Here, the simplification is identical in the contingency analysis of the power system (step 4), and accordingly, the robustness-evaluation result of SG comprising two hierarchies (information and physical hierarchies) is finally derived.
Step 3 estimates the optimal state of the power system by using the interior point method-based optimal power flow (IPM-OPF) to analyze the physical topology. The objective function of the IPM-OPF is to minimize the power generation costs and the AC power flow is considered as a constraint [25,26].
Objective function
Min .   F = i I m M i f im ,   m M i f im = α im + β im PG im + γ im PG im 2
Constraints
m M i PG im + j I PF ij = PL i , i I
m M i QG im + j I QF ij = QL i , i I
PF ij = V i V j G l cos δ i δ j + B l sin δ i δ j + V i 2 G l , l
QF ij = V i V j G l sin δ i δ j + B l cos δ i δ j + V i 2 B l B c   a   p / 2 , l
PF ij TP l , l
QF ij TQ l , l
PG im min PG im PG im max , m M i
QG im min QG im QG im max , m M i
V i min V i V i max , i I
Step 4 analyzes the physical state of the power system in response to a contingency. The frequency of the power system and the voltage of each bus are profiled based on the malfunction of power facilities, such as generators and transformers, owing to cyber disturbance.
Step 5 evaluates the robustness and vulnerability of SGs by indexing the quantification results for each hierarchy. Information security risk indexing applies the result of Step 2. Frequency stability indexing rates the nadir and steady-state frequencies in the primary frequency response of the power system, as shown in Figure 3 [27]. The rating criteria (Table 2) are defined based on the electricity market regulations of Korea [14].
Step 6 establishes a security strategy for the result of step 5 (vulnerability analysis) from the perspective of the national SG operator. However, as security strategies are a separate research field, in which technical and economic matters must be considered, the usual level of physical security countermeasures are presented according to the simulation results in this study.

4. Case Study

4.1. Simulation System Modeling and Prerequisites

This study performed a simulation by partially modifying the IEEE RTS 39-bus [28] to verify the evaluation methodology on the risk impact of cybersecurity threats in large-scale SGs. As a modification, the generators (10 units) of the simulation system were modeled as a 560 MW thermal power generator with the same mechanical characteristics (Table 3) [29]. The load of the simulation system (modified IEEE RTS 39-bus) is summarized in Appendix A (Table A1). The simulation system for the case study is shown in Figure 4. For the quantification of the power system, this study utilizes the Fortran-based IPM-OPF computation model and the power system analysis tool PSS/E.
① The main premise is as follows. In the simulation system, the SG components are limited to EMS and DCS, as shown in Table 4.
② The SG security standard (FIPS 119, SGSF-121-1-1) and the reliability standard (NERC’s CIP-002) are applied for threat identification and information security risk calculation for each SG component.
③ A contingency is an N-1 level generator trip in the case of a cyber disturbance.
④ The reference frequency of the power system is the center of inertia (COI) frequency [30].
F COI =   i = 1 n H i · f i i = 1 n H i
⑤ The frequency stability assessment is shown in Table 2.

4.2. Simulation Results and Analysis

The information security risk by the SG component is listed in Table 5 by applying prerequisites ① and ②. Table 5 shows the result of applying the security risk (Table 1) based on NERC’s CIP-002 (Influence on the power system by the capacity of power facilities) after identifying the security threats defined in the SG security standard (SGSF-121-1) for SG components.
The optimal power generation of the simulation system and the frequency response characteristics due to the contingency analysis are listed in Table 6. The optimal power generation for each generator was calculated using the Fortran-based IPM-OPF computation model. The optimal power flow result is covered in the Appendix A (Table A2). For the contingency analysis, the frequency stability for each tripped generator (N-1) was evaluated according to the prerequisites ③, ④, and ⑤. In the case of the generators G1, G4, G5, G6, G7, and G8 failing, the nadir frequency of the simulation system is less than 59.3 Hz and the frequency stability is grade H severity.
The evaluation results of robustness for the simulation system are shown in Table 7. In the tables, all DCSs except those of the EMS were calculated to be an identical grade of M for the information security risk assessment of the cyber hierarchy. This is because of the capacity-oriented potential impact assessment of the power facility. However, when the results of the frequency stability, as given in Table 6 are applied, the evaluation shows that generators G2, G3, G9, and G10 correspond to grade M, and the other generators (G1, G4, G5, G6, G7, and G8) correspond to grade H. In addition, when a generator of grade H is tripped, the imbalance in the supply and demand is larger than that in the case of grade M generators, as shown in Figure 5. The supply and demand balance graphs of the power system for the remaining generator trips are included in the Appendix A. Through this case study, we confirmed that the impact on the power system differs depending on the geographical location of the generator and transmission line configuration, even for the contingency of the generator with the same specification.

5. Conclusions

The power industry is discussing ways to strengthen cybersecurity as a global agenda. Accordingly, the SG infrastructure was analyzed in this study, and a method to evaluate the robustness of large-scale SGs was proposed, in terms of physical topology by cyber disturbances.
The evaluation technique for the risk impact of cybersecurity threats proposed in this paper focused on analyzing the correlation between the cyber hierarchy (information system) and the physical hierarchy (power system) and deriving the vulnerability from the perspective of physical topology through the quantification of each hierarchy. Regarding the quantification methodology for each hierarchy, a potential impact assessment based on three elements of information security, optimal state estimation based on optimal power flow, and frequency stability analysis were used. Additionally, the objectivity and effectiveness of the study results are improved by applying technical standards (NERC CIP, FIPS) to the evaluation criteria and conducting case studies based on the Modified IEEE RTS 39-bus. This study aims to present a basis for optimal decision-making when establishing security countermeasures from the point of view of the national SG operator. A follow-up study requires specific correlation analysis of various security threats and SG infrastructure as well as case studies based on a testbed. This is expected to produce more significant results.

Author Contributions

Conceptualization, P.-S.W. and B.H.K.; methodology, software, and writing—original draft, P.-S.W.; supervision, B.H.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Research Foundation (NRF) grant funded by the Korea government (MSIT; Ministry of Science and ICT), grant number 2019R1F1A1059824.

Conflicts of Interest

The authors declare no conflict of interest.

Nomenclature

M i Set of generators in bus i
I Set of buses
i , j Bus No.
l Transmission line No.
m Generator No.
PL i Active power of bus i
QL i Reactive power of bus i
G l Conductance of line l
B l Susceptance of line l
B cap Shunt capacitance of line l
TP l Capacity of active power in transmission line l
TQ l Capacity of reactive power in transmission line l
PG im Active power of generator m in bus i
QG im Reactive power of generator m in bus i
δ i Phase angle of bus i
V i Voltage level of bus i
F im Cost function of generator m in bus i
F COI Center of inertia frequency (reference frequency of the power system)
H i Inertia constant of generator i (H = 3.141)
F i Frequency of generator i Hz

Appendix A

Table A1. Load data of modified IEEE RTS 39-bus.
Table A1. Load data of modified IEEE RTS 39-bus.
Bus No.LoadBus No.Load
Active Power MWReactive Power MvarActive Power MWReactive Power Mvar
Bus 33002.4Bus 2320084.6
Bus 4400184Bus 24300−92.2
Bus 710084Bus 2520047.2
Bus 8400153Bus 2610017
Bus 121088Bus 2730075.5
Bus 15300153Bus 2820027.6
Bus 1630032.3Bus 2930026.9
Bus 1810030Bus 31104.6
Bus 20400103Bus 39500250
Bus 21200115
Table A2. Optimal power flow result.
Table A2. Optimal power flow result.
Bus iBus jCapacity MWPower Flow MWBus iBus jCapacity MWPower Flow MWBus iBus jCapacity MWPower Flow MW
12600−65.66939900−35.891933900−455.63
139100065.661011600204.392034900−453.78
23500406.531013600262.482122900−445.55
225500−4.711032900−466.87222360016.15
230900−467.691112500−7.862235900−463.25
3450040.151213500−2.142324600275.85
31850064.321314600260.032336900−459.71
45600−189.86141560089.072526600257.58
414500−170.121516600−211.072537900−462.37
561200−388.481617600213.252627600123.92
58900198.341619600−505.52262860040.12
67900266.811621600−245.092629600−8.45
611480−196.04162460025.732829600−159.95
6311800−459.57171860035.7429381200−468.75
78900166.311727600176.73
89900−35.861920900−53.75
Figure A1. Balance of supply and demand based on the tripping of generators.
Figure A1. Balance of supply and demand based on the tripping of generators.
Energies 13 06267 g0a1aEnergies 13 06267 g0a1b

References

  1. U.S.-Canada Power System Outage Task Force. Blackout in the United States and Canada: Causes and Recommendations; Final Report; The U.S. Department of Energy: Washington, DC, USA; Naural Rescources Canada: Ottawa, ON, Canada, April 2004. [Google Scholar]
  2. National Intelligence Service; Ministry of Science and ICT; Ministry of the Interior and Safety; Korea Communications Commission; Financial Services Commission. National Information Protection White Paper; Korea, June 2019; Volume 2019, pp. 141–143. [Google Scholar]
  3. FireEye, Inc. Cyber Defense Live 2019. Available online: http://www.fireeyeday.com/ (accessed on 3 June 2020).
  4. Woo, P.-S.; Kim, B.H. An Evaluation Methodology of Security Concerning Cyber Risk for Smart Grid Based on OPF. In Proceedings of the 50th KIEE Summer Conference, Goseong, Korea, 10–13 July 2019; Volume 2019. [Google Scholar]
  5. Black Hat. Black Hat USA 201. Available online: https://www.blackhat.com/ (accessed on 8 June 2020).
  6. Aminifar, F.; Fotuhi-Firuzabad, M.; Shahidehpour, M.; Safdarian, A. Impact of WAMS Malfunction on Power System Reliability Assessment. IEEE Trans. Smart Grid 2012, 3, 1302–1309. [Google Scholar] [CrossRef]
  7. Hahn, A.; Ashok, A.; Sridhar, S.; Govindarasu, M. Cyber-Physical Security Testbeds: Architecture, Application, and Evalutiaon for Smar Grid. IEEE Trans. Smart Grid 2013, 4, 847–855. [Google Scholar] [CrossRef]
  8. Davis, K.R.; Davis, C.M.; Zonouz, S.A.; Bobba, R.B.; Berthier, R.; Garcia, L.; Sauer, P.W. A Cyber-Phsysical Modeling and Assessment Framework for Power Grid Infrastructures. IEEE Trans. Smart Grid 2015, 6, 2464–2475. [Google Scholar] [CrossRef]
  9. Xie, L.; Mo, Y.; Sinopoli, B. Integrity Data Attacks in Power Market Operations. IEEE Trans. Smart Grid. 2011, 2, 659–666. [Google Scholar] [CrossRef]
  10. Adhikari, U.; Morris, T.; Pan, S. WAMS Cyber-Physical Test Bed for Power System, Cybersecurity Study, and Data Mining. IEEE Trans. Smart Grid 2017, 8, 2744–2753. [Google Scholar] [CrossRef]
  11. Huang, G.; Chen, C.; Guo, C. Cyber-Constrained Optimal Power Flow Model for Smart Grid Resilience Enhancement. IEEE Trans. Smart Grid 2019, 10, 5547–5555. [Google Scholar] [CrossRef]
  12. Shayan, H.; Amraee, T. Network Constrained Unit Commitment Under Cyber Attacks Driven Overloads. IEEE Trans. Smart Grid 2019, 10, 6449–6460. [Google Scholar] [CrossRef]
  13. Woo, P.-S.; Kim, B.H. Establishment for Cyber Security Countermeasure about Structure of Power Control System. Trans. Korean Inst. Electr. Eng. 2018, 67, 1577–1586. [Google Scholar]
  14. Korea Power Exchange. Electricity Market Rule 2020; Korea Power Exchange: Naju, Korea, 2020. [Google Scholar]
  15. Korea Electrotechnology Research Institute. A Study on Estimation of Generator Start-up Cost and Improvement of Application Standard; Korea Power Exchange: Seoul, Korea, 2012. [Google Scholar]
  16. Zhu, K.; Nordstrom, C.L. ICT Architecture Impact on Wide Area Monitoring and Control Systems’ Reliability. IEEE Trans. Power Deliv. 2011, 26, 2801–2808. [Google Scholar] [CrossRef]
  17. National Institute of Standards and Technology. NISTIR 7628-Guidelines for Smart Grid Cyber Security; U.S. Deparment of Commerce: Washington, DC, USA, 2010. [Google Scholar]
  18. National Institute of Standards and Technology. NIST Framework and Road Map for Smart Grid.Interoperability Standards; Release 1.0.; U.S. Deparment of Commerce: Washington, DC, USA, 2010. [Google Scholar]
  19. The North American Electric Reliability Council. NERC CIP(Critical Infrastructure Protection); Atlanta, GA, USA, 2020. [Google Scholar]
  20. The Energy Sector Control System Working Group. Roadmap to Achieve Energy Delivery Systems.Cybersecurity; U.S. Department of Energy: Washington, DC, USA, 2011. [Google Scholar]
  21. Wood, A.J.; Woollenberg, B.F.; Sheblé, G.B. Power, Generation, Operation, and Control, 3rd ed.; Wiley: Hoboken, NJ, USA, 2013. [Google Scholar]
  22. Kim, Y.-C.; Jae-Kook, Y. Blackout and Power System Operation; Book Korea: Gyeonggi-do, Korea, 2015. [Google Scholar]
  23. National Institute of Standards and Technology. Standards for Security Categorization of Federal Information and Information Systems (FIPS 199); U.S. Deparment of Commerce: Washington, DC, USA, 2004. [Google Scholar]
  24. Korea Smart Grid Association. Requirements for Ensuring of Smart Grid Standards (SGSF-121-1); Korea Smart Grid Association: Seoul, Korea, 2014. [Google Scholar]
  25. Kim, B.H. A Study on Optimal Power Flow Using Interior Point Method. Trans. Korean Inst. Electr. Eng. 2005, 54, 457–460. [Google Scholar]
  26. Cain, M.B.; O’Neill, R.P.; Castillo, A. History of Optimal Power Flow and Formulations; Federal Energy Regulatory Commission: Washington, DC, USA, 2012. [Google Scholar]
  27. Park, M.-S.; Kim, W.-J.; Chun, Y.-H. Calculation of Primary Reserve Requirements Based on Measurements. of Frequency Trajectories of Korean Power System. Trans. Korean Inst. Electr. Eng. 2019, 68, 399–404. [Google Scholar] [CrossRef]
  28. Athay, T.; Podmore, R.; Virmani, S. A Practical Method for the Direct Analysis of Transient Stability. IEEE Trans. Power Appar. Syst. 1979, PAS-98, 573–987. [Google Scholar] [CrossRef]
  29. Siemens Industry, Inc. PSS/E Model. Library; Siemens Power Technology International: New York, NY, USA, 2009. [Google Scholar]
  30. Ørum, E.; Kuivaniemi, M.; Laasonen, M.; Bruseth, A.I.; Jansson, E.A.; Danell, A.; Elkington, K.; Modig, N. Future System Inertia. ENTSO-E; European Commission: Brussels, Belgium, 2015. [Google Scholar]
Figure 1. Correlation by SG hierarchy.
Figure 1. Correlation by SG hierarchy.
Energies 13 06267 g001
Figure 2. Evaluation process on risk impact of cybersecurity threats.
Figure 2. Evaluation process on risk impact of cybersecurity threats.
Energies 13 06267 g002
Figure 3. Frequency response during a disturbance in a power system
Figure 3. Frequency response during a disturbance in a power system
Energies 13 06267 g003
Figure 4. IEEE RTS 39-bus.
Figure 4. IEEE RTS 39-bus.
Energies 13 06267 g004
Figure 5. (a) The tripping of generator 1. (b) The tripping of generator 2.
Figure 5. (a) The tripping of generator 1. (b) The tripping of generator 2.
Energies 13 06267 g005
Table 1. The potential impact criteria for security objectives [17].
Table 1. The potential impact criteria for security objectives [17].
Security ObjectivePotential Impact
Low (L)Medium (M)High (H)
ConfidentialityThe unauthorized disclosure of information could be expected to have a limited adverse effect on organizational operations, assets, or individuals.The unauthorized disclosure of information could be expected to have a serious adverse effect on organizational operations, assets, or individuals.The unauthorized disclosure of information could be expected to have a severe or catastrophic adverse effect on organizational operations, assets, or individuals.
IntegrityThe unauthorized modification or destruction of information could be expected to have a limited adverse effect on organizational operations, assets, or individuals.The unauthorized modification or destruction of information could be expected to have a serious adverse effect on organizational operations, assets, or individuals.The unauthorized modification or destruction of information could be expected to have a severe or catastrophic adverse effect on organizational operations, assets, or individuals.
AvailabilityThe disruption of access to, use of information, or an information system could be expected to have a limited adverse effect on organizational operations, assets, or individuals.The disruption of access to, use of information, or an information system could be expected to have a serious adverse effect on organizational operations, assets, or individuals.The disruption of access to, use of information, or an information system could be expected to have a severe or catastrophic adverse effect on organizational operations, assets, or individuals.
Table 2. Risk criteria of frequency stability.
Table 2. Risk criteria of frequency stability.
TimeRiskFrequency Response
60 s
(Primary response)
L (caution)Nadir: 59.7 Hz or above (able to recover 59.8 within 1 min)
M (warning)Nadir: 59.3 Hz or above (able to recover 59.5 within 1 min)
H (severe)Nadir: below 59.3 Hz (unable to recover 59.5 within 1 min)
Table 3. Cost coefficient and model of generator.
Table 3. Cost coefficient and model of generator.
Cost Coefficient
(a + bX + cX2)
Generator Model
(PSS/E Standard)
abcGeneratorExciterGovernor
103.822.10.001GENROUIEEET1IEEEG1
Table 4. Definition of a generator in the simulated system.
Table 4. Definition of a generator in the simulated system.
Bus No.Generator No.Control System
Bus30G1DCS1
Bus31G2DCS2
Bus32G3DCS3
Bus33G4DCS4
Bus34G5DCS5
Bus35G6DCS6
Bus36G7DCS7
Bus37G8DCS8
Bus38G9DCS9
Bus39G10DCS10
Table 5. Information security risk by SG component.
Table 5. Information security risk by SG component.
Information SecurityEMSDCS
AvailabilityHM
IntegrityHM
ConfidentialityHM
Table 6. IPM-OPF based optimal power generation and frequency response for contingency.
Table 6. IPM-OPF based optimal power generation and frequency response for contingency.
Gen.Optimal Power Generation MWCOI Frequency HzRisk
G1467.69Nadir frequency: 59.22667
Steady-state frequency: 59.78536
H
G2469.57Nadir frequency: 59.35164
Steady-state frequency: 59.80185
M
G3466.87Nadir frequency: 59.31843
Steady-state frequency: 59.79653
M
G4457.01Nadir frequency: 59.25537
Steady-state frequency: 59.79105
H
G5455.54Nadir frequency: 59.27007
Steady-state frequency: 59.79313
H
G6463.25Nadir frequency: 59.25750
Steady-state frequency: 59.79028
H
G7460.69Nadir frequency: 59.21126
Steady-state frequency: 59.78463
H
G8463.58Nadir frequency: 59.19435
Steady-state frequency: 59.78056
H
G9470.43Nadir frequency: 59.31809
Steady-state frequency: 59.79630
M
G10470.47Nadir frequency: 59.37225
Steady-state frequency: 59.80436
M
Table 7. Result on evaluating risk impact.
Table 7. Result on evaluating risk impact.
SG ComponentRisk of Information SecurityFrequency Stability
AvailabilityIntegrityConfidentiality
EMSHHHSystem collapse
DCS1MMMH
DCS2MMMM
DCS3MMMM
DCS4MMMH
DCS5MMMH
DCS6MMMH
DCS7MMMH
DCS8MMMH
DCS9MMMM
DCS10MMMM
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Woo, P.-S.; Kim, B.H. Contingency Analysis to Evaluate the Robustness in Large-Scale Smart Grids: Based on Information Security Objectives and Frequency Stability. Energies 2020, 13, 6267. https://doi.org/10.3390/en13236267

AMA Style

Woo P-S, Kim BH. Contingency Analysis to Evaluate the Robustness in Large-Scale Smart Grids: Based on Information Security Objectives and Frequency Stability. Energies. 2020; 13(23):6267. https://doi.org/10.3390/en13236267

Chicago/Turabian Style

Woo, Pil-Sung, and Balho H. Kim. 2020. "Contingency Analysis to Evaluate the Robustness in Large-Scale Smart Grids: Based on Information Security Objectives and Frequency Stability" Energies 13, no. 23: 6267. https://doi.org/10.3390/en13236267

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop