Cyber Restoration of Power Systems: Concept and Methodology for Resilient Observability

Shamsun Nahar Edib, Yuzhang Lin, Vinod M. Vokkarane, Feng Qiu, Rui Yao, Bo Chen

Research output: Contribution to journalArticlepeer-review

Abstract

In order to have a properly functioning cyber-physical power system, the operational data need to be properly measured, transmitted, and processed. In case of a malicious event on the cyber layer of the power system, such as the wide-area monitoring system, cyber components, such as phasor measurement units (PMUs), communication routers, and phasor data concentrators (PDCs) may be compromised, leading to an unobservable power system. This article proposes the concept of cyber restoration of power systems, and an optimal restoration scheme to recover the system observability swiftly after massive interruptions. The cyber restoration problem is formulated as a mixed integer linear programming (MILP) problem considering PMU measurability, communication network connectivity, and PDC processability conditions, as well as cyber restoration resources as constraints. Results in the IEEE 57-bus system validate that the proposed optimization method can provide solutions that recover system observability much faster than heuristic methods, demonstrating the need for systematic cyber restoration planning research and implementation.

Original languageEnglish (US)
Pages (from-to)5185-5198
Number of pages14
JournalIEEE Transactions on Systems, Man, and Cybernetics: Systems
Volume53
Issue number8
DOIs
StatePublished - Aug 1 2023

Keywords

  • Cyber - physical system
  • observability
  • phasor measurement unit (PMU)
  • power system restoration
  • resilience
  • situational awareness

ASJC Scopus subject areas

  • Software
  • Control and Systems Engineering
  • Human-Computer Interaction
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Cyber Restoration of Power Systems: Concept and Methodology for Resilient Observability'. Together they form a unique fingerprint.

Cite this