You are on page 1of 212

University of South Florida

Digital Commons @ University of


South Florida

USF Tampa Graduate Theses and Dissertations USF Graduate Theses and Dissertations

June 2023

Enhancing Smart Grid Security and Reliability through Graph


Signal Processing and Energy Data Analytics
Md Abul Hasnat
University of South Florida

Follow this and additional works at: https://digitalcommons.usf.edu/etd

Part of the Electrical and Computer Engineering Commons

Scholar Commons Citation


Hasnat, Md Abul, "Enhancing Smart Grid Security and Reliability through Graph Signal Processing and
Energy Data Analytics" (2023). USF Tampa Graduate Theses and Dissertations.
https://digitalcommons.usf.edu/etd/10118

This Dissertation is brought to you for free and open access by the USF Graduate Theses and Dissertations at
Digital Commons @ University of South Florida. It has been accepted for inclusion in USF Tampa Graduate Theses
and Dissertations by an authorized administrator of Digital Commons @ University of South Florida. For more
information, please contact digitalcommons@usf.edu.
List of Tables ................................................................................................................. vi

List of Figures .............................................................................................................. vii

Abstract ......................................................................................................................... xi

Chapter 1: Introduction ................................................................................................ 1


1.1 Research Problems in Situational Awareness . ......................................... 2
1.2 Situational Awareness-Related Problems................................................... 3
1.3 An Introduction to Graph Signal Processing .............................................. 5
1.4 Overview of Energy Data Analytics ............................................................ 6
1.5 Key Contributions of this Dissertation ....................................................... 6
1.5.1 Data Sources ................................................................................. 7
1.5.2 An Overview of Technical Approaches ........................................ 7
1.5.3 Contributions Toward Enhancing Situational
Awareness in Power Grids ................................................................ 8
1.5.3.1 Detection and Location Identification of
Cyber and Physical Stresses ................................................... 8
1.5.3.2 Characterization and Classification of
Cyber and Physical Stresses ................................................... 9
1.5.3.3 Recovery of the Unobservable States and
Optimum Placement of Measurement Devices .................... 10
1.5.3.4 Characterization of Single Bus
Perturbation in Smart Grids ................................................ 11
1.6 Structure of this Dissertation .................................................................. 12

Chapter 2: Fundamentals of Grid-GSP ..................................................................... 15


2.1 GSP Literature Review .............................................................................. 15
2.2 Review of GSP and Energy Graph Signals ............................................... 17
2.2.1 Defining Graph Domain for Power Grids .................................... 17
2.2.2 Representation of Power System Measurements as
Graph Signals: Vertex Domain ........................................................ 19
2.2.3 Spectral Characteristics of Power Grid’s Graph
Signal - Graph-Frequency Domain................................................... 20
2.2.4 Global Smoothness of Graph Signals........................................... 21
2.2.5 Local Smoothness of Graph Signals ............................................. 22
2.2.6 Joint Vertex-Frequency Representations .................................... 22
i
2.2.7 Time-Varying Graph Signals ....................................................... 23
2.2.8 Amount of High Graph-Frequency Components .......................... 23
2.3 Reflection of Smart Grid Stresses on Their Graph Signals ..................... 24
2.3.1 Cyber Attack Models .................................................................... 24
2.3.1.1 Denial-of-service (DoS Attack) ....................................... 24
2.3.1.2 False Data Injection Attack (FDIA) ............................... 25
2.3.1.3 Ramp Attack ................................................................... 26
2.3.1.4 Replay Attack.................................................................. 27
2.3.1.5 Delay Attack ................................................................... 27
2.3.2 Reflection of Cyber Attacks on Graph Spectra............................ 28
2.3.3 Effects of Node-degree of Stressed Buses on
Graph Spectra ................................................................................... 30
2.3.4 Comparative Analyses of Effects of Cyber and
Physical Stresses ............................................................................... 31
2.4 Effects of Cyber Attacks Patterns on Local Smoothness of Graph
Signals .......................................................................................................... 32
2.5 Graph Signal Sampling Overview ............................................................. 35
2.5.1 The Concept of Graph Spectral Bandwidth ................................ 35
2.5.2 Sampling and Reconstruction of Band-limited Graph
Signals ............................................................................................... 36
2.6 Learning of Graph Signals ........................................................................ 39

Chapter 3: Detection and Location Identification of Cyber and Physical


Stresses in the Smart Grid: Part I: State Correlation Approach ......................... 40
3.1 Related Work .............................................................................................. 41
3.2 Effects of Cyber and Physical Stresses on Instantaneous
Correlations .................................................................................................. 44
3.2.1 Instantaneous Correlation Matrix............................................... 44
3.2.2 Visualizing Cyber Stresses Using Instantaneous
Correlation Matrix Image ................................................................. 46
3.2.2.1 DoS Attack ...................................................................... 47
3.2.2.2 Data Replay Attack ........................................................ 48
3.2.2.3 Ramp Attack ................................................................... 50
3.2.2.4 Multiple Cyber Attacks .................................................. 50
3.2.3 Effects of Physical Stresses on Instantaneous
Correlation Matrix Image ................................................................. 51
3.3 Detection and Location Identification Using Image Processing
on Instantaneous State Correlation Matrix Image .................................... 53
3.3.1 Detection and Location Identification Technique ....................... 53
3.3.2 Simulation and Performance Analysis ........................................ 57
3.3.3 Detecting and Locating Physical Stresses................................... 58
3.4 Detection and Location Identification Using the k-Nearest
Neighbor Analysis of Instantaneous State Correlation ............................. 58
3.4.1 Aggregated Instantaneous Correlation Vectors .......................... 59

ii
3.4.2 Feature Extraction and Classification for Stress Detection ....... 62
3.2.2.1 k-NN Method for Classification ..................................... 64
3.4.3 Locating Stresses in the System .................................................. 65
3.4.4 Computational Complexity .......................................................... 66
3.4.5 Simulation and Results ................................................................ 67
3.4.5.1 Generating State Attribute Time Series ....................... 67
3.4.5.2 Detection and Locating Performance ............................. 68

Chapter 4: Detection and Location Identification of Cyber and Physical


Stresses in the Smart Grid: Part II: GSP Approach ............................................. 71
4.1 Related Works ............................................................................................ 73
4.2 Stress Models ............................................................................................. 74
4.2.1 Cyber Attack Models .................................................................... 74
4.2.2 Physical Stress Model .................................................................. 74
4.3 GSP-based Detection and Localization ..................................................... 75
4.3.1 Stresses Detection Using GFT ..................................................... 75
4.3.2 Detecting and Locating Stresses Using VFED ........................... 77
4.3.3 Detecting and Locating Stresses Using Local
Smoothness ....................................................................................... 78
4.4 Performance Evaluation ............................................................................ 81
4.4.1 Simulating Stress Scenarios ........................................................ 81
4.4.2 Performance Metrics .................................................................... 82
4.4.3 Analyses of the Results ................................................................ 83
4.4.4 Comparison with Existing Methods ............................................ 85
4.4.4.1 Candidate Techniques for Comparison .......................... 85
4.4.4.2 Comparison of Detection Accuracy ................................ 86
4.4.4.3 Performance of Location Accuracy ................................. 88
4.4.4.4 Further Discussions ........................................................ 88
4.4.5 Computational Complexity .......................................................... 89

Chapter 5: Classification and Characterization of Cyber and Physical


Stresses in the Smart Grid Using Graph Signal Learning................................... 91
5.1 Related Works ............................................................................................ 92
5.2 Problem Formulations ............................................................................... 93
5.2.1 Classification Problem Formulation ............................................ 93
5.2.1.1 A Short Review of GSP Concepts ................................... 93
5.2.1.2 Classification Models ...................................................... 93
5.2.2 Characterization of Cyber Attacks .............................................. 95
5.2.1.1 Determining the Number of Cyber Attacks................... 95
5.2.1.2 Determining Attack Center and Attack
Radius in Clustered Cyber Attacks........................................ 95
5.3 Feature Extraction Using GSP .................................................................. 96
5.3.1 Different Types of GSP-based Features ...................................... 96
5.3.1.1 Features Extracted from the Moment of

iii
Detection, ............................................................................ 96
5.3.1.2 Features Extracted Using GFT of Temporal
Statistics ................................................................................. 97
5.3.1.3 Features Extracted by Taking Temporal
Statistics of the Time-Varying GFT Values .......................... 98
5.3.2 Dimensionality Reduction of the GFT-based Features .............. 98
5.4 Simulation Details ..................................................................................... 99
5.4.1 Two-stage Classification .............................................................. 99
5.4.2 Characterization ........................................................................... 99
5.5 Performance Evaluation .......................................................................... 100
5.5.1 Performance of the Two-stage Classification ............................ 100
5.5.1.1 Noise Sensitivity of Classification Performance ......... 102
5.5.1.2 Classification Performance with a Reduced
Number of Features .............................................................. 103
5.5.2 Classification Performance for Multiple Random Vs.
Clustered Cyber Attacks................................................................. 104
5.5.3 Determining and in Clustered Cyber Attacks .................. 105

Chapter 6: Recovery of Missing States and Optimum Meter Placement in


Smart Grid Using Correlation of States and Graph Signal Sampling............... 107
6.1 Related Work ............................................................................................ 109
6.2 State Recovery Using Graph Signal Sampling ....................................... 110
6.2.1 Problem Formulation ................................................................. 110
6.2.2 State Recovery Using Graph Signal Sampling ......................... 112
6.3 State Recovery Using Global and Local Smoothness Graph Signal ...... 112
6.3.1 Recovery Technique.................................................................... 113
6.3.2 Simulation and Results .............................................................. 114
6.3.2.1 Experimental Setup...................................................... 114
6.3.2.2 Estimating the Probability Distributions of the
Local Smoothness ................................................................. 115
6.3.2.3 Solving the Optimization Problem ............................... 115
6.3.2.4 State Recovery Performance Analysis ......................... 116
6.3.2.5 Comparison with Other Reconstruction Methods ....... 117
6.4 Optimum Measurement Device Placement ............................................ 119
6.4.1 Sampling Set Selection in Power System Graph Signal
Sampling ......................................................................................... 119
6.4.1.1 Random Selection of .................................................. 120
6.4.1.2 Degree-based Selection of ......................................... 120
6.4.1.3 Page-rank-based Selection of .................................... 120
6.4.1.4 Load Demand-based Selection of .............................. 121
6.4.1.5 Anti-Aliasing Filter Error-based Selection of ........... 121
6.4.2 Optimum PMU Placement as an Optimization Problem ......... 122
6.4.3 Results ........................................................................................ 123
6.5 State Recovery Using State Correlation .................................................. 124

iv
6.5.1 System and Attack Models......................................................... 124
6.5.1.1 Power System Model .................................................... 124
6.5.1.2 DoS Attack Model ......................................................... 124
6.5.2 Method ........................................................................................ 125
6.5.3 Simulations and Results ............................................................ 127
6.5.3.1 Correlation Among PMU Time Series ......................... 128
6.5.3.2 Estimation of PMU Time Series Under Single
and Multiple DoS Attacks .................................................... 128
6.5.3.3 Most Vulnerable Combination of Attacks.................... 131
6.5.3.4 Parameter Values ..................................................... 132
6.5.3.5 Most Vulnerable Time for the DoS Attack .................. 132

Chapter 7: GSP-based Grid Perturbation Analysis ................................................ 134


7.1 Related Work ............................................................................................ 137
7.2 Mathematical Representation of Perturbation and Associated
Electrical Attributes .................................................................................. 138
7.2.1 Power System Graph Signals .................................................... 138
7.2.2 DC Power Flow Model ................................................................ 140
7.2.3 Smoothness of Graph Signals .................................................... 140
7.2.4 Single Bus Perturbation ............................................................. 142
7.3 Effects of Single Bus Perturbation .......................................................... 144
7.3.1 Spreadability of Single Bus Perturbation ................................. 144

Chapter 8: Conclusion and Future Work ................................................................. 157


8.1 Concluding Remarks ................................................................................. 157
8.2 Future Work ............................................................................................. 160
8.2.1 Detection and Location Identification of Cyber
and Physical Stresses ..................................................................... 161
8.2.2 Characterization and Classification of Cyber
and Physical Stresses ..................................................................... 161
8.2.3 Recovery of the Unobservable States and Optimum
Placement of Measurement Devices .............................................. 161
8.2.4 Characterization of Single Bus Perturbation
in Smart Grids ................................................................................. 162

References .................................................................................................................. 163

Appendix A: Copyright Permissions ......................................................................... 181

v
Replay
Attack

FDIA Delay
DoS Attack
Attack

Ramp
Attack
Error caused by the Anti-Aliaing Filter
Error caused by the Reconstruction using Matrix Operations
Total Error of Sampling-Reconstruction
Mean squared Error

Number of Sampled Nodes


Replay
Attack

FDIA Delay
DoS Attack
Attack

Ramp
Attack
1

0.8
Accuracy

0.6

0.4

0.2 Random Vs. Clustered


Attack Center Locating
Attack Radius Estimation
0
-0.02 -0.01 0 0.01
Amount of change in FDIA
1

0.95

Accuracy 0.9

0.85
Random Vs. Clustered Classification
Attack Center Locating (Clustered)
Attack Radius Estimation (Clustered)
0.8
1 2 3 4 5
Amount of delay (samples)
Mean Absolute Error of Recovery (in dB)

Clustered Cyber-Attack
Random Cyber-Attack

Number of buses under cyber-attak


1.2
Recovery Error (in degree)

Mean Absolute Error


1 Maximum Absolute Error

0.8

0.6

0.4

0.2

0
5 10 15 20
Number of Unobservable Buses
Random

Mean Absolute Error (in dB)


Degree-based
Pagerank-Based
Load Demand-Based
Proposed Anti-aliasing Filter Error Based

Number of Sampled Vertices


Anti-aliasing Filter Error Based Selection
Mean Absolute error (in degree)

PMU setting

Number of Sampled Vertices / Number of PMUs


32.5
Original Voltage Angle
Estimated Voltage Angle
The DoS Attack Moment
32

Voltage Angle (in Degree)


31.5

31

30.5

30
0 5 10 15 20 25
Time (Hours)

-12
Original Voltage Angle
Estimated Voltage Angle
The DoS Attack Moment
-12.5
Voltage Angle (in Degree)

-13

-13.5

-14

-14.5
0 5 10 15 20 25
Time (Hours)
0.99
Original Voltage Magnitude
Estimated Voltage Magnitude
The DoS Attack Moment

Voltage Magnitude (in per unit)


0.9895

0.989

0.9885

0.988
0 5 10 15 20 25
Time (Hours)

33 Estimation for 2 DoS Attacks


Estimation for 8 DoS Attacks
Estimation for 16 DoS Attacks
32.5 Estimation for 32 DoS Attacks
Voltage Angle (in Degree)

Original Bus Voltage Angle


The Moment of DoS Attack
32

31.5

31

30.5

30
0 5 10 15 20 25
Time (Hours)
0.25
Uniform
Clustered
Inhibition
0.2

Mean squared error


0.15

0.1

0.05

0
0 20 40 60 80 100 120
Number of Attackeded PMUs
29.5 a=1
a=5
a=100
29 a=200
Voltage Angle (in Degree)

a=500
a=700
28.5 Original Bus Voltage Angle
The Moment of DoS Attack

28

27.5

27

26.5
0 5 10 15 20 25
Time (Hours)
0.1
Day 1
Day 2

0.08
Mean squared error

0.06

0.04

0.02

0
0 5 10 15 20 25
Time of the day (Hour)

You might also like