<<

Cyber Attack Resilient High (HVDC) Systems Securing HVDC transmission infrastructure by ensuring received commands do not jeopardize grid stability

Background the consistency with sound engineering Benefits principles and the real-time physical state of Because of grid modernization efforts, the underlying mixed AC-DC system. • Detects and mitigates cyber- HVDC is expected to grow far beyond its attacks, in real-time, that seek to traditional position as a supplement to Objectives destabilize HVDC systems (AC) transmission. The project team will develop algorithms • Anticipates how the grid would HVDC is now the becoming the method of that defend against cyber-attacks intended to react should a received command choice for interconnecting asynchronous AC disrupt electric service by maliciously be executed and avoids taking any grids, providing efficient, stable changing HVDC set points, spoofing action that would jeopardize grid transmission and control capability. HVDC spurious power system control commands, stability while still executing can also be used for long-distance bulk legitimate commands in time or altering a device configuration, even if power transmission, able to send large commands and data are compliant with • Firmware enhancements to HVDC amounts of over very long respect to syntax, protocol, and the targeted controllers, SCADA/EMS and distances with low electrical losses. HVDC WAMPAC servers device. The team will design, improve, and is a key technology in overcoming problems test the defense system to achieve robust • Publications and standards with renewable generation like wind, solar capability in performance with component- recommendations available to the and hydro – that these resources are seldom level validation in a laboratory setting using community as a whole located near the population centers that need real time digital simulators. Upon them. Partners completion, the team will then demonstrate HVDC transmission owners and operators the system in a utility environment and • ABB, Inc. (lead) must secure these new assets with up-to-date validate the timing and security aspects. • University of Illinois at Urbana- cybersecurity technologies. To do this, the Project Description Champaign (UIUC) defense of industrial control system devices within an HVDC station and the power The project will develop a security domain • Bonneville Power Administration system control center should be enhanced. layer that enables HVDC systems to defend • Argonne National Laboratory (ANL) This will require fast, secure inter-device against cyber-attacks. Detection is based not communication (within and between HVDC on conventional cyber network defense, but • University of Idaho (UI) substations and control centers), a decision on the controllers assessing correctness in framework that cross-checks device actions the context of a physical power system state, Period of Performance for correctness in a particular system state, with application of physical laws and October 2016 – September 2019 and swift response to maintain system engineering principles. The demonstration stability and safety in the presence of will include a cyber-attack resilient HVDC Project Cost malicious or erroneous commands. The system defense scheme in a laboratory determination that a command is malicious environment, and then integrated in a Total: $3,018,089 or incorrect depends not on conventional realistic utility test bed. Federal: $2,302,831 cyber intrusion detection methods, but on Cost Share: $715,258

Cybersecurity for Delivery Systems (CEDS) Contact Information: For More Information:

CEDS projects are funded through the Department of Energy’s (DOE) Carol Hawk Reynaldo Nuqui http://energy.gov/oe/technology- Office of and Energy Reliability (OE) research and Program Manager Principal Investigator development/energy-delivery-systems- development (R&D) program, which aims to enhance the reliability and DOE OE ABB, Inc. cybersecurity resilience of the nation’s energy infrastructure by reducing the risk of 202-586-3247 (919) 807-5039 energy disruptions due to cyber-attacks. [email protected] [email protected]

Figure 1. HVDC Diagram. (1) HVDC converter station , (2) HVDC converter station inverter, (3) AC, (4) DC

Technical Approach principles; and validate soundness of the concepts in a simulation environment that Anticipated Results The U.S. national electric grid has more than captures the dynamics of the HVDC system. 20 HVDC installations composed of Project results will include the following: transmission links and back-to-back Phase 2: Design and Prototyping • Power system state aware HVDC systems. Therefore, cybersecurity of HVDC In Phase 2, the defense system will be cybersecurity. systems and the utility control systems designed, improved, and tested to achieve • Implemented and prototyped HVDC, interacting with them is critical to the robust performance capability. This phase WAMPAC, and SCADA / EMS reliable delivery of energy in the nation’s culminates with component-level validation system security layer. energy infrastructure. in a laboratory setting with real time digital • Enhanced HVDC controllers, SCADA Project innovations include detection of simulators. HVDC controllers, supervisory / EMS servers, and other devices with adversarial manipulation by cross-checking control and data acquisition (SCADA)/ new firmware to support cyber commands and configuration changes for energy management system (EMS) servers, defense mechanisms. consistency with the physical state of the and other devices will be enhanced with new system. This approach does not require firmware to support the defense mechanism. additional instrumentation, will be Phase 3: Demonstration deployable in existing installations, and will be interoperable with communication In Phase 3, the HVDC controllers, wide area standards. This project implements a fast, monitoring protection and control distributed security framework that (WAMPAC) and SCADA/EMS servers, and intelligently incorporates the physical state necessary attack and monitoring of the defended system and blocks incorrect infrastructure will be integrated into a utility HVDC device actions. facility for testing. The demonstration will focus on cyber-attacks that result in Project Phases maliciously changed control commands such The project will be conducted in four as dispatcher’s power orders, spoofed phases: concept development and validation, HVDC converter control data, or an design and prototyping, demonstration, and intentionally misconfigured HVDC commercialization planning. controller. Phase 1: Concept Development and Phase 4: Commercialization Planning Validation In Phase 4, the team will build firmware In Phase 1, the team will specify the threat prototypes into commercially available models that the HVDC system provides a devices to implement the HVDC system defense against; develop the defense defense solution. Research results will be mechanisms using domain-based disseminated to standards organizations.

May 2017