Cyber attacks in smart grid – dynamic impacts, analyses and recommendations
File version
Version of Record (VoR)
Author(s)
Taghizadeh, Seyedfoad
Rahman, Md Shihanur
Hossain, Md Jahangir
Varadharajan, Vijay
Chen, Zhiyong
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
Size
File type(s)
Location
Abstract
Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems. As a well-known practice, steady-state analysis is commonly used to identify cyber attacks and provide effective solutions. However, it cannot fully cover non-linear behaviours and cascaded blackouts of the system caused by dynamic perturbations, as well as provide a post-disturbance operating point. This study presents a novel approach based on dynamic analysis that excludes the limitations of the steady-state analysis and can be used in the events of various cyber attacks. Four types of common attacks are reviewed, and their dynamic impacts are shown on the IEEE benchmark model of the Western System Coordinating Council system implemented in MATLAB Simulink. Then, recommendations are provided to enhance the security of the future smart power grids from the possible cyber attacks.
Journal Title
IET Cyber-Physical Systems: Theory & Applications
Conference Title
Book Title
Edition
Volume
5
Issue
4
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
© The Authors 2020. This is an open access article published by the IET under the Creative Commons Attribution-NonCommercial-NoDerivs License (http://creativecommons.org/licenses/by-nc-nd/3.0/)
Item Access Status
Note
Access the data
Related item(s)
Subject
Information and computing sciences
Persistent link to this record
Citation
Amin, BMR; Taghizadeh, S; Rahman, MS; Hossain, MJ; Varadharajan, V; Chen, Z, Cyber attacks in smart grid – dynamic impacts, analyses and recommendations, IET Cyber-Physical Systems: Theory & Applications, 2020, 5 (4), pp. 321-329