Abstract

Cyber-Physical System (CPS) is a new kind of digital technology that increases its attention across academia, government, and industry sectors and covers a wide range of applications like agriculture, energy, medical, transportation, etc. The traditional power systems with physical equipment as a core element are more integrated with information and communication technology, which evolves into the Cyber-Physical Power System (CPPS). The CPPS consists of a physical system tightly integrated with cyber systems (control, computing, and communication functions) and allows the two-way flows of electricity and information for enabling smart grid technologies. Even though the digital technologies monitoring and controlling the electric power grid more efficiently and reliably, the power grid is vulnerable to cybersecurity risk and involves the complex interdependency between cyber and physical systems. Analyzing and resolving the problems in CPPS needs the modelling methods and systematic investigation of a complex interaction between cyber and physical systems. The conventional way of modelling, simulation, and analysis involves the separation of physical domain and cyber domain, which is not suitable for the modern CPPS. Therefore, an integrated framework needed to analyze the practical scenario of the unification of physical and cyber systems. A comprehensive review of different modelling, simulation, and analysis methods and different types of cyber-attacks, cybersecurity measures for modern CPPS is explored in this paper. A review of different types of cyber-attack detection and mitigation control schemes for the practical power system is presented in this paper. The status of the research in CPPS around the world and a new path for recommendations and research directions for the researchers working in the CPPS are finally presented.

Highlights

  • In the past years, the power and control system engineers are working very hard to develop the tools and techniques for improving the performance of monitoring and control of the physical power system

  • Just as the Internet facilitates a way for the humans to interact with each other, cyber-physical power system (CPPS) will transform in a way, how we interact with the physical power system world around us

  • The hybrid dynamical system theory is used to model the CPPS, which consists of differential equations to represent the continuous-time behaviour of the physical system and difference equations to represent the discrete behaviour of cyber systems, converters, and digital networks [58]

Read more

Summary

INTRODUCTION

The power and control system engineers are working very hard to develop the tools and techniques for improving the performance of monitoring and control of the physical power system. Substantial work on cyber-attack detection and mitigation for CPPS by monitoring the network traffic of the Supervisory Control and Data Acquisition(SCADA)/Phasor Measurement Unit(PMU) system in the power system control centre was performed in [49,50,51,52] It forms the overall cybersecurity feature for the CPPS, which is entirely different from the traditional information security with advanced data analytics and machine learning algorithms. It is necessary to analyze the electric power grid as a whole cyber-physical social system, i.e., integrated physical and cyber (control, communication, and computing) part with cybersecurity features. The traditional method of modelling, simulation, and analysis of electric power system operation is entirely based on the physical part of the power grid This no longer supports the future CPPS research and development.

MODELLING OF CPPS
10. Event Synchronization
Aim
14. Incremental Flow Graph
Objectives
CYBER ATTACKS AND CYBER SECURITY IN CPPS
Control Action
CPPS IN THE DEVELOPED COUNTRIES
Metering Project NETZGMBH
37. Gotland- Smart Grid AB and Swedish SE
41. Time-Varying
49. Smart Grid Project County Department USA
62. Manheim
64. Company’s Smart Electric
OUTLOOK OF THE FUTURE CPPS
CURRENT ISSUES AND RESEARCH DIRECTIONS
Findings
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call