Blocking microgrid cyberattacks to keep the power flowing

1 min read ·

About

Power grids have become far more complex in recent decades due to energy demands, environmental regulations and small-scale renewable energy systems that turn businesses and individuals into combined consumer-producers. One way to ensure that power supplies remain resilient is to create small groups of sources and loads called microgrids. Microgrids can operate independently of the main grid when required, such as supporting hospitals during natural disasters, for example.

As microgrids grow more complex, they require sophisticated computer networks to coordinate, control and distribute different sources of power. Like any network, they are vulnerable to cyberattacks. To prepare for such events, KAUST researchers have been running simulations of possible attacks, assessing the impact that they might have and developing methods to detect and suppress malicious behavior.

“The microgrid system that we considered was the Canadian urban distribution model, comprised of four inverter-based distributed generations (DGs),” says Ph.D. student Ioannis Zografopoulos, who worked on the project alongside Charalambos Konstantinou, assistant professor of computer science. “The Canadian model is ideal to effectively capture the system dynamics and interdependencies between the four DGs and exhibit how a malicious event affecting one DG can propagate to the rest of the system.”

While previous studies into microgrid attacks assumed that attackers have a good knowledge of the power grid’s internal components and structure, Zografopoulos and Konstantinou took a more realistic approach. Instead, they adopted a model where the attacker has limited knowledge but is able to design attacks based on historical measured data about the grid’s performance.

Read the full text