论文标题
关于COVID-19大流行期间电力系统中负载改变攻击的可行性
On the Feasibility of Load-Changing Attacks in Power Systems during the COVID-19 Pandemic
论文作者
论文摘要
电力电网是一个复杂的网络物理能源系统(CPE),其中信息和通信技术(ICT)集成到电网基础架构的运营和服务中。越来越多的物质(IoT)高战斗设备(例如空调和电动汽车)连接到电网,以及ICT和控制接口的高依赖性,使CPES使CPES容易受到高影响力,低探针的负载负载的网络攻击。此外,COVID-19大流行的副作用表明了用电模式的修改,实用程序经历了明显的净负荷和峰值减少。这些不寻常的持续低负荷需求条件可以通过对手来利用,从而通过损害数十万个物联网相互连接的高战时载荷来导致CPE中的频率不稳定性。本文提出了一项可行性研究,该研究是在COVID-19大流行期间实施的锁定措施引起的低负载条件下对CPE的影响的影响。使用动态模式分解(DMD)分析了由锁定措施引起的负载需求减少,重点是2020年3月至7月的期间,而纽约地区则是由于锁定量完全执行而导致的负载降低,这是受影响最大的时间段和位置。我们的可行性研究使用来自纽约独立系统操作员(NYISO)的真实负载消耗数据评估了减轻负载的攻击方案,并表明,具有足够知识和资源的攻击者可以产生频率稳定性问题,而频率偏移量则达到60.5 Hz和63.4 Hz,而无需采取缓和措施。
The electric power grid is a complex cyberphysical energy system (CPES) in which information and communication technologies (ICT) are integrated into the operations and services of the power grid infrastructure. The growing number of Internet-of-things (IoT) high-wattage appliances, such as air conditioners and electric vehicles, being connected to the power grid, together with the high dependence of ICT and control interfaces, make CPES vulnerable to high-impact, low-probability load-changing cyberattacks. Moreover, the side-effects of the COVID-19 pandemic demonstrate a modification of electricity consumption patterns with utilities experiencing significant net-load and peak reductions. These unusual sustained low load demand conditions could be leveraged by adversaries to cause frequency instabilities in CPES by compromising hundreds of thousands of IoT-connected high-wattage loads. This paper presents a feasibility study of the impacts of load-changing attacks on CPES during the low loading conditions caused by the lockdown measures implemented during the COVID-19 pandemic. The load demand reductions caused by the lockdown measures are analyzed using dynamic mode decomposition (DMD), focusing on the March-to-July 2020 period and the New York region as the most impacted time period and location in terms of load reduction due to the lockdowns being in full execution. Our feasibility study evaluates load-changing attack scenarios using real load consumption data from the New York Independent System Operator (NYISO) and shows that an attacker with sufficient knowledge and resources could be capable of producing frequency stability problems, with frequency excursions going up to 60.5 Hz and 63.4 Hz, when no mitigation measures are taken.