TY - JOUR
T1 - Public Plug-in Electric Vehicles + Grid Data
T2 - Is a New Cyberattack Vector Viable?
AU - Acharya, Samrat
AU - Dvorkin, Yury
AU - Karri, Ramesh
N1 - Publisher Copyright:
© 2010-2012 IEEE.
PY - 2020/11
Y1 - 2020/11
N2 - High-wattage demand-side appliances such as Plug-in Electric Vehicles (PEVs) are proliferating. As a result, information on the charging patterns of PEVs is becoming accessible via smartphone applications, which aggregate real-time availability and historical usage of public PEV charging stations. Moreover, information on the power grid infrastructure and operations has become increasingly available in technical documents and real-time dashboards of the utilities, affiliates, and the power grid operators. The research question that this study explores is: Can one combine high-wattage demand-side appliances with public information to launch cyberattacks on the power grid? To answer this question and report a proof of concept demonstration, the study scrapes data from public sources for Manhattan, NY, USA using the electric vehicle charging station smartphone application and the power grid data circulated by the U.S. Energy Information Administration, New York Independent System Operator, and the local utility in New York. It then designs a novel data-driven cyberattack strategy using state-feedback based partial eigenvalue relocation, which targets frequency stability of the power grid. The study establishes that while such an attack is not possible at the current penetration level of PEVs, it will be practical once the number of PEVs increases.
AB - High-wattage demand-side appliances such as Plug-in Electric Vehicles (PEVs) are proliferating. As a result, information on the charging patterns of PEVs is becoming accessible via smartphone applications, which aggregate real-time availability and historical usage of public PEV charging stations. Moreover, information on the power grid infrastructure and operations has become increasingly available in technical documents and real-time dashboards of the utilities, affiliates, and the power grid operators. The research question that this study explores is: Can one combine high-wattage demand-side appliances with public information to launch cyberattacks on the power grid? To answer this question and report a proof of concept demonstration, the study scrapes data from public sources for Manhattan, NY, USA using the electric vehicle charging station smartphone application and the power grid data circulated by the U.S. Energy Information Administration, New York Independent System Operator, and the local utility in New York. It then designs a novel data-driven cyberattack strategy using state-feedback based partial eigenvalue relocation, which targets frequency stability of the power grid. The study establishes that while such an attack is not possible at the current penetration level of PEVs, it will be practical once the number of PEVs increases.
KW - Cybersecurity
KW - electric vehicles
KW - electric vehicles charging stations
KW - public information
UR - http://www.scopus.com/inward/record.url?scp=85094867546&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85094867546&partnerID=8YFLogxK
U2 - 10.1109/TSG.2020.2994177
DO - 10.1109/TSG.2020.2994177
M3 - Article
AN - SCOPUS:85094867546
SN - 1949-3053
VL - 11
SP - 5099
EP - 5113
JO - IEEE Transactions on Smart Grid
JF - IEEE Transactions on Smart Grid
IS - 6
M1 - 9091609
ER -