Vulnerability of synchrophasor-based WAMPAC applications' to time synchronization spoofing

M.S. Almas, L. Vanfretti, Ravi S. Singh, Gudrun M. Jonsdottir

Research output: Contribution to journalArticleAcademicpeer-review

6 Citations (Scopus)

Abstract

This paper experimentally assesses the impact of time synchronization spoofing attacks (TSSA) on synchrophasor-based wide-area monitoring, protection and control (WAMPAC) applications. Phase angle monitoring, anti-islanding protection, and power oscillation damping applications are investigated. TSSA are created using a real-time (RT) IRIG-B signal generator and power system models are executed using an RT simulator with commercial phasor measurement units (PMUs) coupled to them as hardware-in-the-loop. Because PMUs utilize time synchronization signals to compute synchrophasors, an error in the PMUs' time input introduces a proportional phase error in the voltage or current phase measurements provided by the PMU. The experiments conclude that a phase angle monitoring application will show erroneous power transfers, whereas the anti-islanding protection mal-operates and the damping controller introduces negative damping in the system as a result of the time synchronization error incurred in the PMUs due to TSSA. The proposed test-bench and TSSA approach can be used to investigate the impact of TSSA on any WAMPAC application and to determine the time synchronization error threshold that can be tolerated by these WAMPAC applications.

Original languageEnglish
Article number7845713
Pages (from-to)4601-4612
Number of pages12
JournalIEEE Transactions on Smart Grid
Volume9
Issue number5
DOIs
Publication statusPublished - 1 Sep 2018

Fingerprint

Phasor measurement units
Synchronization
Monitoring
Damping
Signal generators
Phase measurement
Electric current measurement
Simulators
Hardware
Controllers
Electric potential

Keywords

  • Phasor measurement unit (PMU)
  • Power system protection
  • Smart grid
  • Spoofing
  • Synchrophasors
  • Time synchronization attack

Cite this

Almas, M.S. ; Vanfretti, L. ; Singh, Ravi S. ; Jonsdottir, Gudrun M. / Vulnerability of synchrophasor-based WAMPAC applications' to time synchronization spoofing. In: IEEE Transactions on Smart Grid. 2018 ; Vol. 9, No. 5. pp. 4601-4612.
@article{c9a6fb447ae54a48b2e65e867f50d48c,
title = "Vulnerability of synchrophasor-based WAMPAC applications' to time synchronization spoofing",
abstract = "This paper experimentally assesses the impact of time synchronization spoofing attacks (TSSA) on synchrophasor-based wide-area monitoring, protection and control (WAMPAC) applications. Phase angle monitoring, anti-islanding protection, and power oscillation damping applications are investigated. TSSA are created using a real-time (RT) IRIG-B signal generator and power system models are executed using an RT simulator with commercial phasor measurement units (PMUs) coupled to them as hardware-in-the-loop. Because PMUs utilize time synchronization signals to compute synchrophasors, an error in the PMUs' time input introduces a proportional phase error in the voltage or current phase measurements provided by the PMU. The experiments conclude that a phase angle monitoring application will show erroneous power transfers, whereas the anti-islanding protection mal-operates and the damping controller introduces negative damping in the system as a result of the time synchronization error incurred in the PMUs due to TSSA. The proposed test-bench and TSSA approach can be used to investigate the impact of TSSA on any WAMPAC application and to determine the time synchronization error threshold that can be tolerated by these WAMPAC applications.",
keywords = "Phasor measurement unit (PMU), Power system protection, Smart grid, Spoofing, Synchrophasors, Time synchronization attack",
author = "M.S. Almas and L. Vanfretti and Singh, {Ravi S.} and Jonsdottir, {Gudrun M.}",
year = "2018",
month = "9",
day = "1",
doi = "10.1109/TSG.2017.2665461",
language = "English",
volume = "9",
pages = "4601--4612",
journal = "IEEE Transactions on Smart Grid",
issn = "1949-3053",
publisher = "Institute of Electrical and Electronics Engineers",
number = "5",

}

Vulnerability of synchrophasor-based WAMPAC applications' to time synchronization spoofing. / Almas, M.S.; Vanfretti, L.; Singh, Ravi S.; Jonsdottir, Gudrun M.

In: IEEE Transactions on Smart Grid, Vol. 9, No. 5, 7845713, 01.09.2018, p. 4601-4612.

Research output: Contribution to journalArticleAcademicpeer-review

TY - JOUR

T1 - Vulnerability of synchrophasor-based WAMPAC applications' to time synchronization spoofing

AU - Almas, M.S.

AU - Vanfretti, L.

AU - Singh, Ravi S.

AU - Jonsdottir, Gudrun M.

PY - 2018/9/1

Y1 - 2018/9/1

N2 - This paper experimentally assesses the impact of time synchronization spoofing attacks (TSSA) on synchrophasor-based wide-area monitoring, protection and control (WAMPAC) applications. Phase angle monitoring, anti-islanding protection, and power oscillation damping applications are investigated. TSSA are created using a real-time (RT) IRIG-B signal generator and power system models are executed using an RT simulator with commercial phasor measurement units (PMUs) coupled to them as hardware-in-the-loop. Because PMUs utilize time synchronization signals to compute synchrophasors, an error in the PMUs' time input introduces a proportional phase error in the voltage or current phase measurements provided by the PMU. The experiments conclude that a phase angle monitoring application will show erroneous power transfers, whereas the anti-islanding protection mal-operates and the damping controller introduces negative damping in the system as a result of the time synchronization error incurred in the PMUs due to TSSA. The proposed test-bench and TSSA approach can be used to investigate the impact of TSSA on any WAMPAC application and to determine the time synchronization error threshold that can be tolerated by these WAMPAC applications.

AB - This paper experimentally assesses the impact of time synchronization spoofing attacks (TSSA) on synchrophasor-based wide-area monitoring, protection and control (WAMPAC) applications. Phase angle monitoring, anti-islanding protection, and power oscillation damping applications are investigated. TSSA are created using a real-time (RT) IRIG-B signal generator and power system models are executed using an RT simulator with commercial phasor measurement units (PMUs) coupled to them as hardware-in-the-loop. Because PMUs utilize time synchronization signals to compute synchrophasors, an error in the PMUs' time input introduces a proportional phase error in the voltage or current phase measurements provided by the PMU. The experiments conclude that a phase angle monitoring application will show erroneous power transfers, whereas the anti-islanding protection mal-operates and the damping controller introduces negative damping in the system as a result of the time synchronization error incurred in the PMUs due to TSSA. The proposed test-bench and TSSA approach can be used to investigate the impact of TSSA on any WAMPAC application and to determine the time synchronization error threshold that can be tolerated by these WAMPAC applications.

KW - Phasor measurement unit (PMU)

KW - Power system protection

KW - Smart grid

KW - Spoofing

KW - Synchrophasors

KW - Time synchronization attack

UR - http://www.scopus.com/inward/record.url?scp=85052748958&partnerID=8YFLogxK

U2 - 10.1109/TSG.2017.2665461

DO - 10.1109/TSG.2017.2665461

M3 - Article

AN - SCOPUS:85052748958

VL - 9

SP - 4601

EP - 4612

JO - IEEE Transactions on Smart Grid

JF - IEEE Transactions on Smart Grid

SN - 1949-3053

IS - 5

M1 - 7845713

ER -