Cyber Security of Smart Grid Systems Usi
Cyber Security of Smart Grid Systems Usi
∆z = H∆x + e (1)
Current magnitude
400
350
approximation coefficients are the high scale, low 300
200
100
signal is passed through a series of high pass and 50
0 100 200 300 400 500
Time stamp
low pass filters to analyze respective functions at Figure 6. Original and corrupted data of current signal
each level. Wavelet analysis starts by selecting
We employ Haar filter and compute the one-
basic wavelet function, called the mother wavelet.
dimensional discrete wavelet transform up to 5
The Haar wavelet is chosen as the mother wavelet,
levels. In order to obtain the thresholds for
the corresponding scaling function and wavelet
anomaly-based intrusion detection the
function are calculated. We can express these
distribution of the wavelet reconstructed signal
functions as a linear combination of low-pass filter
without anomaly should be analyzed. Then,
and high-pass filter. For a given signal,
normality is verified by Lilliefors test for
approximation and detail coefficients can be
goodness of fit to normal distribution [16-18].
obtained by convolving low-pass filter and high-
This has a normal distribution at 5%
pass filter followed by down sampler,
significance level. We can detect anomaly-
respectively. Anomaly detection of malicious data
based intrusion by choosing some of the levels
consists of three parts as shown in Figure 4. The
through selective reconstruction. Table 4 and
first part is the PMU signal from the power
Table 5 show some statistical properties of
system. The second part consists of discrete
original and corrupted data of voltage and
wavelet transformation to analyze the signal [13-
current signal. It should be noted that the
15]. In the third part, the threshold values are
original data could be considered as Gaussian
compared for the determination of the anomalies
white noise, and anomaly could be considered
in the signal.
as random signal. For any random variable,
choosing ±3 confidence interval yields to:
The benchmark and corrupted data of voltage This interval corresponds to 99.7% confidence
and current are shown in Figures 5 and 6, level, which means that we can detect
respectively. Discrete wavelet transform is used anomalies with 0.3% error rate.
to analyze the measured signal, by calculating
the statistical properties of the signal.
4
x 10
1.1
Corrupted Signal
Original Signal
1.09
Voltage magnitude
1.08
1.07
1.06
1.05
1.04
0 100 200 300
Time stamp
400 500
Figure 7. Wavelet decomposition of original voltage
Figure 5. Original and corrupted data of voltage signal signal
Standard Standard
Level Threshold Level
deviation
deviation
Original data of current Corrupted data of Wide-area monitoring and control that coordinates
magnitude current magnitude the various devices of the power system to
improve system-wide dynamic performance and
Standard stability is being implemented in the smart grids.
Standard
Level Threshold Level
deviation These critical devices usually have the most
deviation
significant impacts on power system oscillation,
1 5.122 15.36 1 13.57 damping, performance and stability. The cyber
security and the data integrity are very important
2 4.84 14.52 2 14.94
for successful integration of phasor measurement
3 17.86 53.58 3 19.47 units for automatic control of electric power
4 42.86 128.58 4 43.44 systems. In this paper a cyber security tool is
developed and presented for intrusion detection.
5 111.4 334.2 5 110
We have simulated an IEEE benchmark 14-bus
system using RTDS system. The bench mark and
malicious data has been generated in our
laboratory. The proposed cyber security tool for
the detection of intrusion detection has been
successfully employed on this data. The results are
very satisfactory. The detection method depends
on the selection of threshold values. In the future
we will be comparing this method with the
methods based on measurement residual detection
methods.