Development and Implementation of Secure Power Systems operating in Cyber Physical Systems
Since industry is moving to its new version ?Industry 4.0?, the employment of Cyber-Physical systems is increasing gradually due to its autonomy and efficiency. But they are more vulnerable to cyber-attacks due to the networking element present in them. These attacks can be fatal if the immediate ac
2025-06-28 16:32:02 - Adil Khan
Development and Implementation of Secure Power Systems operating in Cyber Physical Systems
Project Area of Specialization Electrical/Electronic EngineeringProject SummarySince industry is moving to its new version “Industry 4.0”, the employment of Cyber-Physical systems is increasing gradually due to its autonomy and efficiency. But they are more vulnerable to cyber-attacks due to the networking element present in them. These attacks can be fatal if the immediate action is not taken especially in case of power systems. Therefore, it is the utmost need to protect power systems from such cyber-attacks. It can be accomplished if we detect these attacks on the system and separate it from other systems as soon as possible. To develop such detection schemes, we took a synchronous generator model as a cyber-physical system. State-space approach was used while developing its mathematical model. We introduced cyber-attacks like false data injection, denial of service attack, replay attack and observed its behavior. Simulations were carried out and different schemes were implemented to make the synchronous generator model secure towards cyber-attacks.
Project ObjectivesReliable operation of power systems is a primary challenge for the system operators. With the advancement in technology and grid automation, power systems are becoming more vulnerable to cyber-attacks. This project is aimed at designing and developing of Secure Power System Operating in Cyber Physical domain. The Objectives of this project are listed below:
- Comprehensive Literature study of Secure Power Systems and their Failure.
- Understanding different types of Cyber Attacks and their impact on Power Systems.
- Identify and Implement Detection Schemes of Cyber Attacks.
- State Space Modelling of Cyber Physical System.
- To identify the behavior of system under False Data Injection attack.
- To identify the behavior of system under Denial of Service attack.
- To identify the behavior of system under Replay attack.
In order to develop the understanding of secure power systems, a comprehensive literature study was performed. After developing a thorough understanding, close/open loop systems were designed on LABVIEW. We took a non-linear model of third order synchronous generator then converted it into linearized model for easy computation. We kept our model generic so that different systems can be incorporated. We made its state space matrix and modelled it in LabVIEW simulation software. In order to estimate the state of system, observer was designed. The purpose of observer is to look over the outputs of the system and then cross match these outputs of the system with the reference values. Faults like false data injection (FDI), denial of service (DoS) and replay attack were introduced in the system and their effects were studied in order to design secure power system.
Benefits of the ProjectFollowing are the benefits of this project:
1- To secure cyber-physical systems especially power systems against different cyber attacks.
2- To make power systems more reliable.
3- To detect any attempt of cyber attack on the system.
Technical Details of Final DeliverableFirst a complete mathematical model along with observer of a cyber-physical system is designed on simulation software "LabVIEW". After verifying its normal operation, different types of cyber attacks are introduced and observed the change in behviour due to attacks. After that, different implementation schemes are desgined to detect such cyber attacks on the system.
For hardware system, different sensors and actuators are installed on the plant to transmit the data to the embedded system. Then the detection schemes are implemented on the embedded system to counter that cyber attack.
Final Deliverable of the Project HW/SW integrated systemCore Industry SecurityOther Industries Energy Core Technology Internet of Things (IoT)Other Technologies Cloud InfrastructureSustainable Development Goals Industry, Innovation and InfrastructureRequired Resources| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Total in (Rs) | 39000 | |||
| Sensors | Equipment | 4 | 3000 | 12000 |
| Actuators | Equipment | 2 | 5000 | 10000 |
| Display | Equipment | 1 | 7000 | 7000 |
| Overheads | Miscellaneous | 1 | 10000 | 10000 |