12
ResearchArticle Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks Jiaqi Liang, 1 Yibei Wu, 2 Jun’e Li , 1 Xiong Chen, 3,4,5 Heqin Tong, 3,4,5 and Ming Ni 3,4,5 1 KeyLaboratoryofAerospaceInformationSecurityandTrustedComputing,MinistryofEducation, SchoolofCyberScienceandEngineering,WuhanUniversity,Wuhan430072,China 2 ElectricPowerResearchInstituteofStateGridJiangsuElectricPowerCo.,Ltd.,Nanjing211106,China 3 NARIGroupCorporation(StateGridElectricPowerResearchInstitute),Nanjing211106,China 4 NARITechnologyCo.,Ltd.,Nanjing211106,China 5 StateKeyLaboratoryofSmartGridProtectionandControl,Nanjing211106,China Correspondence should be addressed to Jun’e Li; [email protected] Received 23 November 2020; Revised 20 January 2021; Accepted 9 February 2021; Published 20 February 2021 Academic Editor: Xin Li Copyright © 2021 Jiaqi Liang et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. Hence, the large-scale loads may produce abnormal operation performance, such as load casting/dropping syn- chronously or frequent and synchronous casting and dropping, and hence, it can threaten the security and stable operation of the distribution networks. First, we analyze the security threats faced by industrial controllable load, civil controllable load, and the gains and losses of attacks on the distribution networks. Considering the factors of cyber attacks, we propose a control model and cyber attack model in active distribution networks (ADNs). And, three types of attacks that the target suffered are defined on the basis of “on” and “off” modes for control. en, the controllable load was maliciously controlled as the research object, and a suitable scenario is selected. e impact of malicious control of the controllable load on the power supply reliability and power quality of the distribution networks are simulated and analyzed, and risk consequences for different types of attacks are provided. 1. Introduction With the development of power grid, distributed generation (DG) provided to the distribution networks and suppling the power for surrounding users is an inevitable trend [1, 2]. Hence, the development of distributed energy storage (DES) and controllable load (CL) has greatly promoted the con- sumption of DG in the distribution networks. e DG, DES, and CL constitute the distributed energy objects in the ADNs. e coordinated control of distributed energy objects through the communication method greatly increases the flexibility and initiative of the distribution networks [3, 4]. However, it also introduces new security risks in the stable operation of the distribution networks. In the meantime, the development of the Internet of things (IoT) enables more and more distributed energy objects to be controlled by the users [5]. For example, DG can be owned by users or third- party companies. Smart homes are moving towards remote control via the Internet. Electric vehicle charging and dis- charging stations and the terminals of controllable industrial load may be physically touched by users [6]. erefore, the vulnerability or deficiency of security measures on the user side may make distributed energy objects easier to be controlled by the attackers, which affects the security and stable operation of the distribution networks. If the DG is abnormally started or stopped due to malicious intrusion, the large-scale CLs are synchronously casted/dropped, there is frequent and synchronous casting/dropping caused by malicious controlling, or the DES has abnormal behavior because of cyber attacks, which will break the balance be- tween the electricity supply and demand in the distribution networks. It also disrupts the security and stable operation of Hindawi Complexity Volume 2021, Article ID 6659879, 12 pages https://doi.org/10.1155/2021/6659879

Security Risk Analysis of Active Distribution Networks

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security Risk Analysis of Active Distribution Networks

Research ArticleSecurity Risk Analysis of Active Distribution Networks withLarge-Scale Controllable Loads under Malicious Attacks

Jiaqi Liang1 Yibei Wu2 Junrsquoe Li 1 Xiong Chen345 Heqin Tong345 and Ming Ni345

1Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and Engineering Wuhan University Wuhan 430072 China2Electric Power Research Institute of State Grid Jiangsu Electric Power Co Ltd Nanjing 211106 China3NARI Group Corporation (State Grid Electric Power Research Institute) Nanjing 211106 China4NARI Technology Co Ltd Nanjing 211106 China5State Key Laboratory of Smart Grid Protection and Control Nanjing 211106 China

Correspondence should be addressed to Junrsquoe Li jeliwhueducn

Received 23 November 2020 Revised 20 January 2021 Accepted 9 February 2021 Published 20 February 2021

Academic Editor Xin Li

Copyright copy 2021 Jiaqi Liang et al +is is an open access article distributed under the Creative Commons Attribution Licensewhich permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited

With the development of distributed networks the remote controllability of the distributed energy objects and the vulnerability ofuser-side information security protection measures make distributed energy objects extremely vulnerable to malicious control byattackers Hence the large-scale loads may produce abnormal operation performance such as load castingdropping syn-chronously or frequent and synchronous casting and dropping and hence it can threaten the security and stable operation of thedistribution networks First we analyze the security threats faced by industrial controllable load civil controllable load and thegains and losses of attacks on the distribution networks Considering the factors of cyber attacks we propose a control model andcyber attack model in active distribution networks (ADNs) And three types of attacks that the target suffered are defined on thebasis of ldquoonrdquo and ldquooffrdquo modes for control +en the controllable load was maliciously controlled as the research object and asuitable scenario is selected +e impact of malicious control of the controllable load on the power supply reliability and powerquality of the distribution networks are simulated and analyzed and risk consequences for different types of attacks are provided

1 Introduction

With the development of power grid distributed generation(DG) provided to the distribution networks and suppling thepower for surrounding users is an inevitable trend [1 2]Hence the development of distributed energy storage (DES)and controllable load (CL) has greatly promoted the con-sumption of DG in the distribution networks +e DG DESand CL constitute the distributed energy objects in theADNs+e coordinated control of distributed energy objectsthrough the communication method greatly increases theflexibility and initiative of the distribution networks [3 4]However it also introduces new security risks in the stableoperation of the distribution networks In the meantime thedevelopment of the Internet of things (IoT) enables moreand more distributed energy objects to be controlled by the

users [5] For example DG can be owned by users or third-party companies Smart homes are moving towards remotecontrol via the Internet Electric vehicle charging and dis-charging stations and the terminals of controllable industrialload may be physically touched by users [6] +erefore thevulnerability or deficiency of security measures on the userside may make distributed energy objects easier to becontrolled by the attackers which affects the security andstable operation of the distribution networks If the DG isabnormally started or stopped due to malicious intrusionthe large-scale CLs are synchronously casteddropped thereis frequent and synchronous castingdropping caused bymalicious controlling or the DES has abnormal behaviorbecause of cyber attacks which will break the balance be-tween the electricity supply and demand in the distributionnetworks It also disrupts the security and stable operation of

HindawiComplexityVolume 2021 Article ID 6659879 12 pageshttpsdoiorg10115520216659879

the distribution networks even causing power-grid cas-cading failures collapses and large-scale outages [7] +isimpact may be amplified in ADNs with deep penetration ofdistributed energy objects

With the increasing number of incidents of hostile forcesattack on critical infrastructure through cyber space itshows that the cyber attack through the intrusion of cyberspace may have a serious impact on the physical system suchas the Iranian nuclear power plant uranium centrifugedamage in 2010 and the Ukrainian power grid outage in 2015[8] +erefore when distributed energy objects suffer fromattacks how to ensure the security and stable operation ofADNs is an urgent problem

+e impact of cyber security risk on power grid oper-ation has been paid more attention Langner et al [9]reviewed the process of malware intrusion from cybertechnology layer and finally have studied the destructiveeffects on the physical layer+e Iranian nuclear power plantSTUXNET incident is taken as an example which illustratesthe ldquocyber physical warfarerdquo and related technologymechanism +e studies in [8 10 11] analyze the process oflarge-scale power-grid paralysis caused by hacker attack inUkraine and put forward some thoughts on power-gridcyber security protection Sun et al [12] take the Ukrainianoutage as an example and define a cyber-coordinated attackon the power system which is characterized by deviceslaunched from the cyber space and acting on the physicalspace Dan et al [13] pointed out that with the developmentof control and communication technology the primarypower system and the secondary power system deeply in-teract with the cyber physical power system When certain(some) equipment of the primary power system or thesecondary power system is out of order (due to networkattacks natural disasters etc) the impacts caused by it arevery likely to spread to the other partyrsquos network causingcascading failure that can seriously impact the safe and stableoperation of the power system and causing significanteconomic losses Sridhar et al [2] emphasize the importanceof studying the potential impact of cyber attacks and inorder to ensure cyber security it is necessary to study thecyber-physical relationship of smart grid and the possibleattack paths Rasim et al [14] illustrate the transmissionmechanism of cyber security risks in ECPS and explain thecyber security risks in ECPS and the role of cyber space inphysical space with the characteristics of cross-spacetransmission Dong et al [15] analyze the attack modes onECPS from the perspective of attackers including attackmodes and their harms selected to achieve different goalsHowever this kind of research is still relatively preliminaryand focuses on general issues +e specific modes of cybersecurity attacks and their effects on the stable operation ofthe power grid have not been excavated and hence targetedsecurity defense strategies cannot be established Komninoset al [16] investigated a number of attacks on smart gridfrom direct load shifting to smart meter data manipulationSpecifically in single small-scale attacks adversaries cancontrol certain IoTdevices such as smart homes in the smartgrid Using their control an adversary can induce an ab-normal working state in the device increasing the power

usage of the household In certain cases aggressive adver-saries can cause damage to the devices and their sur-roundings and even threaten the personal safety of users[17ndash20] In terms of large-scale cyber attacks adversaries cancompromise many high-wattage IoT devices to manipulatethe power demand in a larger smart grid For example Salehet al [21] demonstrated a large-scale attack model on real-world grids using a botnet to turn on and off a large numberof IoT devices synchronously resulting in massive powerfluctuations with the potential to cause a large-scaleblackout

At present there are few studies on the risk of distributedenergy objects being maliciously controlled by the attackersIn the research of distributed energy objects in distributionnetworks most of the research is on DG but little aboutcyber security and cyber attacks [22 23] Murty et al [24]study the impact of DG connection to the distributionnetworks which is mainly due to the random fluctuation ofDG and has nothing to do with malicious control Nikolaidiset al [25] design the protection schemes of the distributionnetworks with DG and these schemes are mainly based onthe conventional failure of power grid without consideringcyber attacks from the cyber space Clement-Nyns et al [26]study the impacts of a large scale of electric vehicle power-charging connection to the distribution networks andpropose intelligent charging strategies to optimize the dis-tribution networksrsquo operation but the study does notconsider the situation of charging stations under the cyberattacks Munkhammar et al [27] propose the residentialelectricity-consumption probability model based on resi-dentsrsquo habits and formulate a load demand response plan sothat residential loads can become participants in optimizingthe operation of the distribution networks Although thisbehavior may have an impact on the distribution networkunlike the load being maliciously controlled such impactcan be reduced through the policy guidance of the powercompany [28 29]

It can be seen that the current research is mainly focusedon the active application of communication control methodsin the distribution networks such as demand-side man-agement (DSM) ldquosourcerdquo and ldquoloadrdquo optimization controland microgrid control strategies +e security risk intro-duced to the distribution networks by the popularization ofcommunication technology is seldom considered from theperspective of the attackers +e diversity of access com-ponents for the distribution networks increases the difficultyof unified management Generally the operating status ofthe distribution networks is determined by the regulation ofthe power grid side and the load usage of the user sideMohsenian-Rad et al [17] pointed out that the attackerwould break the normal order of power grid load man-agement but this research only considered the attacks on theload management system by penetrating the cyber networkand did not consider the security risk of the load beingmaliciously controlled Adrian et al [30] analyzed the risk oflarge-scale controllable loads in the malicious attack sce-nario but they did not analyze the response characteristics ofcontrollable loads Zhang et al [31] used ultrasound toactivate the voice recognition system of the smart homes and

2 Complexity

remotely manipulate voice assistants such as Siri andHivoice in order to disrupt the distribution network oper-ation +e studies in [30 31] show that if the attackers canmaliciously control cell phones and send turn ldquoonrdquoldquooffrdquocommands to smart homes successfully it can result in aserious imbalance of the power flow in the 10 kV feeder lineand bring serious security risks to the safety and stableoperation of the distribution network To sum up there arefew literature works on the impacts of cyber attacks from theuser side on distribution networks

+rough the analysis of the above research status it canbe seen that there are few literature works considering thecyber security on the ADNs [32] +e large-scale access ofCLs and high-permeability access of DGs are inevitabletrends in the development of the distribution networks+erefore this paper analyzes the security threats faced bydistributed energy objects in ADNs and establishes controlmodels and attack models within ADNs +en we focus onthis problem through analyzing the impact of large-scale CLsbeing maliciously controlled on the ADNs and exploreabnormal operating characteristics of the ADNs caused bythe CLs being maliciously controlled Hence this paperdiscovers the risks of ADNs and provides a basis for theresearch of ADNsrsquo security control methods in order to helpthe further development of smart grids

+e rest of this paper is organized as follows In Section2 the security threat analysis is introduced Section 3considers cyber attacks with the control model and thecyber attack model in ADNs are proposed In Section 4 theimpact of large-scale CL attacks on ADNs is analyzed Fi-nally some conclusions are drawn in Section 5

2 Security Threat Analysis

According to types of load application CLs are divided intoindustrial controllable load and civil controllable loadSpecifically the industrial load is mainly controlled by theindustrial control system of the load side and the civil load ismainly controlled and used by residential users according todemand behavior

21 Safety 3reats to Industrial Controllable LoadIndustry is of great significance in Chinarsquos national econ-omy It is mainly engaged in large-scale production activ-ities and its electricity consumption accounts for about 70of the total social electricity consumption +e scale of in-dustrial load is very large and the concentration ratio is veryhigh In fact there is a corresponding control system whichis the industrial control system

A typical industrial control system is shown in Figure 1which consists of an enterprise information network pro-cess control network and field control network +e en-terprise information network has traditional IT networkattributes such as mail sending and receiving feature webbrowsing feature enterprise resource planning (ERP) andmanufacturing execution system (MES) +e middle processcontrol network is the bridge and link connecting the upperand lower layers of the network On the one hand it controls

and dispatches the field control equipment at the bottomaccording to the upper-level production instructions and onthe other hand it conducts real-time monitoring and datastatistics on the production situation of the industrial siteand provides information feedback for upper-level regula-tion+e field control network is located at the bottom of theindustrial control system which includes PLC (program-mable logic controller) PAC (programmable automationcontroller) RTU (remote terminal unit) IED (intelligentelectronic device) actuator and other control equipment

In the past industrial control systems were physicallyisolated from external networks +e development andpopularization of information communication technology(ICT) has made the field of industrial control increasinglyopen and its degree of interaction with the information fieldhas also increased However the internal network of theindustrial control system does not perform encryptioncontrol on the data flow Usually as long as the user entersthe internal network any of the network equipment can beaccessed which also leads to a drop in network security [33]In addition because industrial control mainly considersfunctionality the system behavior characteristics based onthis principle and the role characteristics of behavior controlpersonnel are more likely to become the entry point forattackers to intrude into the control system

+e requirement of industrial intelligence has pro-moted the development of open control systems withmodular reconfigurable and expandable characteristics+e control network of the open control system has theopening characters For example the core components ofthe open control system are the industrial PC which arebased on the Windows-Intel platform And the industrialethernet is widely used for communication between thecomponents At the same time the BUS technologyapplies embedded systems to field control instruments[34] In the abovementioned cases there are loopholes inmany systems such as PC operation system communi-cation protocol with TCPIP and the embedded opera-tion system Meanwhile the security protection measureof the industrial control system is mainly based on iso-lation from other systems but the underlying security ismore vulnerable than other information systems and it isnot subject to the information security policy of the gridmanagement department +erefore the industrial con-trollable load is extremely vulnerable to be attacked byinternal workers or external attackers [35] and this inturn makes the stable operation of the distributionnetwork affected

22 Security 3reats to Civil Controllable Load +e civilcontrollable load is represented by smart homes Smarthome takes residential buildings as the platform uses theIoT technology (including integrated wiring technologynetwork communication technology and automatic controltechnology) to realize the interconnection of control ter-minals and smart homes and realizes information exchangethrough the control platform +e control core of the smarthome is the control platform which is implemented by an

Complexity 3

embeddedmicroprocessor and can be connected to a controlterminal (mobile phone or PC) via the Internet to achieveremote control +e control system of the smart homeadopts a three-layer structure design [36] As shown inFigure 2 the core is the control platform which is imple-mented by an embedded microprocessor It can be con-nected to the control terminal (mobile phone or PC) via theInternet for remote controlling [37] However the smarthome control system has almost few security protectionmeasures According to the characteristics of networkcomposition the attacker has two attack paths+e first pathis to use the loopholes of the embedded system implantmalicious codes into the control platform through the publicnetwork and directly attack the internal network of thecontrol system to make the smart home work in an ab-normal condition +e second path is to intrude the userrsquoscontrol terminal At this point the attackers implantmalicious codes into smart terminals such as mobile phonesand PCs and the terminal issues abnormal control com-mands to the control platform which eventually leads toabnormal behavior of the smart homesWhen the number ofthe maliciously controlled smart homes is large enough itleads to the change in load of the distribution networkssuddenly and it may affect the reliability of power supply andpower quality

In summary because the industry plays an importantrole in the national economy the information securityprotection requirements of industrial control systems arerelatively high which leads to the cost of attacks becomehigh accordingly Most of the civil CLs represented by smarthomes are not embedded with security mechanisms andthey can be connected to the public network with a longonline time Hence the cost of the attack becomes extremelylow and the purpose of the attack is easy to realizeCompared with industry load the security risk of CLs is verylow If a large-scale CL is subjected to malicious control andchanges due to the objective and unpredictable capacity itwill inevitably impact the normal operation of the distri-bution networks and may even cause cascading failures and

Enterprise information network

Process control network

Field control network

Historydatabase

server

Real-timedatabase

serverEngineerstation

Industrialfirewall

SCADAclient

Historylibraryclient

Enterprisemanagement

client

MES

PLC PAC RTU IED

Internet

Enterpriseadministration

SCADAserver

Engineering configuration

Enterprise firewall

Figure 1 Industrial control system

Controlplatform

PCmobilephone

Smartappliance

Internet

Homenetwork

Outsidenetwork

Figure 2 Smart home control system

4 Complexity

expand the scope of influence +erefore this paper selectsCLs as the object of cyber attack for subsequent research andanalysis

3 Considering Cyber Attack with the ControlModel and the Cyber Attack Model in ADNs

31 Control Model +e evaluation index of the distributionnetwork includes power supply reliability economy secu-rity and power quality which are called the controlledvariable and are represented by S In general these con-trolled variables are determined by the electric powercompany such as protection action dispatching controland user behavior +e connection of distributed energyobjects has increased the initiative of the distribution net-work and promoted the development of control methoddiversity Once large-scale distributed energy objects arecontrolled by the attackers the dynamic balance of thedistribution network may be disrupted which can affect thenormal operation of the distribution network Attack be-havior is different from normal dispatching protection anduser behavior because it is unpredictable +erefore thedistribution network control model with CL is shown inFigure 3 and the controlled variable is as follows

S f(g d u A) (1)

Here g is the protection action d isthe dispatchingcontrol u is the normal user behavior and A is an attackbehavior

Equation (1) is a nonlinear equation +e solution of theequation is related to the input (g d u A) and the initialstate of the distribution network In the traditional distri-bution network there is no attack behavior against load anduser behavior is reflected in daily life and production ac-tivities It is a random variable that conforms to a certain lawIn the meantime the distribution network is mainly con-trolled by dispatching and protection action According tothe state-detection variable the dispatching system andprotection device control the distribution network whichensures that the controlled variable Smeets the requirementsof the stable operation of the distribution network In thedistribution network with CLs the added attack behavior isissued by the attackers and the distributed energy object isused as the attack object +erefore the DG and load dy-namic balance are broken and it is also not regulated by thepower company Finally it may cause the controlledquantity S to deviate from the requirements of security andstable operation of the distribution network causing safeand stable accidents

32 Attack Model +e cyber attack model contains cyberelement M T and physical element P(t) and is defined as adouble set Au which represents the impact mechanism ofthe attack from the cyber space and acts on the physicalspace +e attack model in which the CLs are maliciouslycontrolled can be expressed as follows

Au M T ⟶ P(t) (2)

Here M is the control command which is sent by theattackers such as ldquoonrdquoldquooffrdquo represented as command MonMoff namelyM MonMoff Next T is the sending timeof the control command because the sending time of thecyber command has discrete characteristics so let T t[n]where n 0 1 2 n and t[n] could be the sequence of timewhich is sent from the control command When large-scaleCLs are maliciously controlled by cyber attacks they aredirectly manifested as changes in the distribution networkload P(t) is used to represent the load of the distributionnetwork and the symbol ldquo⟶rdquo represents the mappingrelationship between the cyber attack of the informationsystem and the load change of the power system

Consider that after the malicious control commands areissued some loads do not change the operating state So theeffective load control rate α is introduced consider that thenetwork delay and other factors may cause some controlcommands to be invalid and an effective attack rate β isintroduced So P(t) is composed of the normal operatingload P0(t) and abnormal operating load ΔP(t) Hence theabnormal operating load ΔP(t) can be expressed as follows

ΔP(t) αβP0(t) (3)

In this paper we consider the abnormal operationperformance of CLs such as loads castingdropping syn-chronously or frequent and synchronous casting anddropping and based on these performances we classify theattacks into three categories accordingly +e details are asfollows

321 Attack of Loads Casting Synchronously At a certainpoint attackers send Mon (synchronously ldquoonrdquo MMon)commands to massive CLs And attack behavior can beexpressed asAI

u In the meantime P(t) increases immedi-ately which can be expressed as follows

P(t) P0(t) + ΔP(t) P0(t) + αβP0(t) (4)

In the sequence t[n] of control command-sending timen 0 is the simplest form of attack of loads casting syn-chronously when nne 0 the attack is to keep sending theMon

Distributedenergy storage

Controllableload

UsersGuidance

Attacker

Activedistribution

network

Dispatching

g u A

Electric power company

Protection

Distributedgeneration

d

Figure 3 Distribution network control model with CLs

Complexity 5

command and the ADN is kept in a high-load state for a longtime

322 Attack of Loads Dropping Synchronously At a certainpoint attackers send Moff (synchronously ldquooffrdquo MMoff)commands to massive CLs And attack behavior can beexpressed as AII

u In the meantime P(t) reduces immedi-ately which can be expressed as follows

P(t) P0(t) minus ΔP(t) P0(t) minus αβP0(t) (5)

In the sequence t[n] of control command-sending timen 0 is the simplest form of attack of loads dropping syn-chronously when nne 0 the attack is to keep sending theldquoMoffrdquo command and the ADN is kept in a low-load state fora long time

323 Attack of Loads of Frequent and Synchronous Castingand Dropping Attackers sendMon andMoff (frequently andsynchronously ldquoon and offrdquo MMon and Moff) commandsperiodically to massiv CLs which leads to frequent andsynchronous casting and dropping of loads And attackbehavior can be expressed as AIII

u In the meantime P(t)

increases and drops frequently and synchronously If wedefine Mon command at t [2i] and send Moff commandwhile t [2i + 1] the control command M can be expressedas follows

M Mon T [2i]

Moff T t[2i + 1]1113896 i 0 1 2 (6)

At first attackers send Mon command at t [2i] and theP(t) will be increased αβP0(t) +en attackers send Moffcommand while t [2i+1] and P(t) will be increasedαβP0(t) because CLs can be controlled by attackers AtMoffcommand α 1 and P(t) will be reduced toβP0(t)+erefore P(t) can be expressed as follows

P(t) P0(t) + αβP0(t) t isin (t[2i])

P0(t) + αβP0(t) minus βP0(t) t isin (t[2i + 1])1113896 i 0 1 2

(7)

+e attackers through setting the time interval τ (τ t[n]minus t[nminus 1] n 1 2 3 ) in the attack command M canchange the casting and dropping frequency of CLs and leadto abnormal performance of those CLs It may also causeproblems such as resonance in serious cases

4 Analysis on the Impact of Large-Scale CLAttacks on ADNs

+e risk of the ADNs was greatly increased when the large-scale CLs were controlled by attackers and the power qualitymay also be affected +e attack also resulted in abnormalpower consumption of the users and damaged the powersupply equipment in severe cases +erefore we take theimpact of attacks on power quality as an example and the10KV IEEE 33-bus standard distribution system was used asthe study case as shown in Figure 4 Finally we consider a

single DG connected at the end of the line and analyze theimpact of the malicious attacks

41 Impact of Load-Casting Attack on Power QualityScenario 1 node 18 of the IEEE 33-bus standard distributionsystem is connected to the DG and the penetration rate is100 Nodes 18 20 25 and 30 suffered AI

u attacks (n 0and ΔPP0 1)

+e node branchmodel in the ADN is shown in Figure 5+e power flow of branch bij is from node i to node j Basedon power flow calculation the voltage of node j can beexpressed as follows

Vj Vi minus ΔV Vi minusPjRij + QjXij

VN

(8)

Here ΔV is the branch voltage drop and VNis thenominal voltage Pj and Qj are the active and reactive powerof node j respectively Rij and Xij are the resistance andreactance of the branch (i j) respectively According to thestructural parameters of the ADN and the voltage of thepower supply terminal the voltage of each node can becalculated When the ADN suffered AI

u attacks and lead toincrease of the node load the line voltage dropped very fastand the receiving terminal voltage would also be decreasingand so low-voltage overruns may occur According to powerquality specifications the allowable deviation of 10 kV uservoltage is plusmn7 of the system nominal voltage

We assume that the load is twice the normal operatingstate after the attacks and PPN 065 at this moment Asshown in Figure 6 we obtain the node voltage situationcurves which represent the suffered distribution networkbefore and after the attacks According to the analysis of thenode voltage situation curves due to the increase of the loadcaused by the malicious attacks the voltage of each node hasdropped and caused addition of four new low-voltageoverlimit nodes and the power quality had been dropped aswell After further calculation when PPN gt 052 after theattacks which led to the increase in the low-voltage out-of-limit node number the power quality of these nodes doesnot meet the standard power quality

Compared with the attack scenario of DG connected tothe standard distribution system the attackers need to attacka large-scale CL to make the voltage deviation go beyond thestandard range In addition the newly added low-voltageoverlimit nodes are on branches that do not include DGBecause the voltage is increased by the DG after the cyberattacks the voltage of the nodes with DG supply branches isat the allowable range of deviation

We compare the node voltage distribution of the sufferedbranch before and after the attacks with the traditionaldistribution network under the same type of the attack Asshown in Figure 7 the conclusions can be drawn as follows

(1) If the power line already contains DG and not con-sidering the off-grid status when it is subjected to AI

u

attack against CLs the DG can be leveraged to improvethe power quality of the distribution network and theline is not prone to low-voltage phenomenon

6 Complexity

(2) If the line contains DG and considering the off-linestatus when it is subjected to AI

u attack against CLsDGmay be out of operation after the attacks becauseof poor operation environment and it can exacer-bate voltage dropping and reduce power quality

(3) If a DG is not connected to the power line when it issubjected to AI

u attack against CLs the operation ofthe DG can be used as an adjustment strategy toimprove power quality

42 Impact of LoadDroppingAttack onPowerQuality In thetraditional distribution network the voltage rise is causedby load dropping However there is only one power supplynode on the power side and it is also limited by the ref-erence voltage In the ADNs DG can also provide electricalenergy if the voltage rise caused by the load dropping itmay cause high voltage to exceed the limit and reducepower quality

Scenario 2 node 18 of the IEEE 33-bus standard dis-tribution system is connected to the DG and the penetrationrate is 100 Nodes 18 20 25 and 30 have suffered AII

u

attacks (n 0 ΔPP0 1)In order to ensure the normal operation of the ADN the

load balance of each phase should be considered when we setup distribution lines for users If there is load suffer due toAII

u attack in this area and it is not evenly distributed on eachphase line it will cause unhomogeneous load distribution oneach phase line and increases the degree of the three-phaseimbalance and while those disruptions are serious it willalso reduce the power quality

+e calculation of the three-term imbalance can beexpressed as follows

ε I2

I1times 100 (9)

Here I1 is the effective value of the positive sequencecomponent of the three-phase current and I2 is the effectivevalue of the negative sequence component of the three-phase

21 3 54 6 87 9 1110 12 13 14 1615 17 18

2019 21 22

26 27 28 29 3130 32 33

23 24 25

Figure 4 Diagram of IEEE 33-node standard distribution system

i j

Pi + jQi Pj + jQi

Vi Vj

Figure 5 +e node branch model

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34078080082084086088090092094096098100102

The voltage of ADNsrsquo nodes before attacksThe voltage of ADNsrsquo nodes after attacks

Node

Volta

ge p

er u

int

Figure 6 +e voltage unit value of ADN nodes before and after AIu

attack

Volta

ge p

er u

int

Node1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

11

105

1

095

09

085

08

Before suffering attack of ADNS

After suffering attack of ADNS

Before suffering attack of traditional distribution

After suffering attack of traditional distribution

Figure 7 +e voltage unit value of traditional ADN nodes beforeand after AI

u attack

Complexity 7

current In the low-voltage power distribution system theimbalance of the three-phase load current at the outlet of thedistribution transformer should be less than 10 For theconvenience of quantification assume that the attacked loadis concentrated in one phase that is single phase

In scenario 2 three-phase current on the secondary side ofthe transformer before and after the AII

uattack is obtainedthrough simulation as shown in Figure 8 Before the attack theeffective value of the three-phase current Ia Ib Ic 850A andthe degree of three-phase imbalance is 0 after the attack thethree-phase load is unbalanced Ia Ib 850A and Ic 525Aand the three-phase imbalance is 148 It can be seen that thethree-phase balance before and after the attack exceeds thestandard and the power quality does not meet the standardFurther calculation can be obtained when single-phaseΔPP0 01 and ε 10 It can be obtained that when single-phase ΔPP0 gt 01 the three-phase imbalance degree exceedsthe standard

If the imbalance degree of three-phase voltage becomesvery serious it will increase line and transformer loss si-multaneously and affect the safe operation of electricalequipment Supplying power under unbalanced voltageconditions may easily cause the userrsquos electrical equipmentwith a high-voltage one-phase connection to burn out whilethe userrsquos electrical equipment with a low-voltage one-phaseconnection may show abnormal work

+e suffered attack nodes dropped on a large scale in thedistribution network +e voltage distribution of each nodeis shown in Figure 9 It can be seen that after the AII

u attacksthe voltage of each node is increasing and the voltage perunit value of node 18 increases from 1057 to 1074 whichhas exceeded the allowable range of power quality voltagedeviation and results in reduced power quality

For the distribution network transformer the excessivevoltage not only reduced service life of transformers but itmay also cause resonance phenomena and harmonic pol-lution and disrupt other normally operating equipment Forelectrical equipment the excessive voltage can affect thenormal operation while the electrical equipment operatedwith high voltage for a long time would show reduction inservice life and increase in power consumption

To change the attack intensity the voltage of each node isshown in Figure 10 where the corresponding attack modesfrom decentralized attacks to no attacks of the curve aredescribed as follows

(1) +e decentralized attacks all the nodes with half ofthe load suffered the AII

u attacks(2) +e centralized large-scale attacks nodes 18 20 25

and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in large-scale load of attacked nodes tripping from the linePPN 0

(3) +e centralized small-scale attacks nodes 18 20 25and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in 50load of attacked nodes tripping from the line

(4) No attacks

Among them attack modes (1) and (2) caused thevoltage to exceed the limits and reduced the power qualityAlthough attack mode (3) raised the node voltage thevoltage deviation index of the power quality still satisfied thespecified range

If the ADNs within a certain attack scenario where thenode 22 is connected to the DG take this branch line as theanalysis object the voltage distribution of those nodes areshown in Figure 11 Although the node voltage increases arecaused by the synchronous dropping attacks the deviationindex of the voltage still satisfied the specified range

It can be seen that the deviation impact of AIIu attacks on

the load voltage of the distribution network is not onlyrelated to the attack intensity but also related to the topologyof the distribution network

43 Impact of Frequent Casting and Dropping of Load AttacksonPowerQuality Due to the DGs the power systemmay besubjected to periodic disturbance of the load and it wouldcause power oscillation that is compelled resonance

Attack pointTime (s)

Curr

ent (

A)

15001000

5000

ndash1500ndash1000

ndash500

Ia Ib Ic

0 001 002 003 004 005 006

Figure 8 +ree-phase current on the secondary side of thetransformer before and after the AII

u attack

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34090

092

094

096

098

100

102

104

106

108

Volta

ge p

er u

int

Node

The voltage of ADNs nodes before attacksThe voltage of ADNs nodes aer attacks

Figure 9 +e voltage value of ADNsrsquo nodes before and after AIIu

attack

8 Complexity

low-frequency oscillation +e theory of compelled reso-nance low-frequency oscillation points out that regular smallperiodic disturbance in the system will cause the poweroscillation If the frequency of the disturbance is consistentwith the natural frequency of the system it will cause res-onance and the compelled oscillation amplitude of thesystem is the largest at this period

Assume that the DG is directly connected to the powergrid through the generator and select the connection node asa malicious attack object to construct a single-machineinfinite system As shown in Figure 12 the DG is connectedinto the distribution system through a 04 kV10 kV boostertransformer

To cast small-scale load while the system is runningstably with light load we can get the generator speed curveas shown in Figure 13 and the natural oscillation frequencyof the system is 167Hz

Scenario 3 the connection point of the DG suffered theAIII

u attack (t[0] 6 s and ΔPP0 1)To change the frequency of ldquocastingrdquoldquodroppingrdquo of the

load while the same-scale load is attacked we can obtainthe line power curve as shown in Figure 14 When thecommand ldquoonrdquoldquooffrdquo is sent at τ 03 s intervals as shownin Figure 14(a) the disturbance frequency is 167Hz Whenthe command ldquoonrdquoldquooffrdquo is sent at τ 026 s intervals as

shown in Figure 14(b) the disturbance frequency is187Hz When the command ldquoonrdquoldquooffrdquo is sent at τ 034 sintervals as shown in Figure 14(c) the disturbance fre-quency is 147Hz

Due to the disturbance frequency being equal to thenatural frequency of the system it results in the largestamplitude of the power fluctuation when the deviationbetween the disturbance frequency and the natural fre-quency of the system increases the power oscillationcurves can also be obtained but the amplitude of this oneis relatively small And the amplitude of power oscilla-tions is also related to the scales of the attack loadCompared with Figure 14(a) While the scale of the attackload becomes 50 the frequency of periodic disturbanceis still 167 Hz and the oscillation amplitude becomesrelatively small as shown in Figure 15

Node

Volta

ge p

er u

int

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

112

11

108

106

104

102

1

098

096

094

092

Centralized small-scale attacksNo attacks

Decentralized attacksCentralized large-scale attacks

Figure 10 +e voltage value of nodes before and after AIIu attack under different attack modes

Node

Volta

ge p

er u

int

1008100610041002

10998099609940992

1 2 19 20 21 22

After attack of ADNBefore attack of ADN

Figure 11 +e partial node voltage before and after AIIu attack

DG

Infinite power system

Figure 12 Single-machine (DG) infinite power system

1001

10005

1

09995

0999

6 65 7 75 8 85Ts

ltRotor speed wm (pu)gt

Figure 13 Rotation speed fluctuation after small disturbance

Complexity 9

In the traditional distribution network the load mainlyconsumes electrical energy passively and it is usually faraway from the generator with relatively scattered distri-bution and it is not easy to have large-scale synchronousldquocastingrdquoldquodroppingrdquo However with the development ofDG connected to the power grid and CLs it makes thedistance between the load and the generator become closerand the load would be maliciously controlled by the at-tackers If the large-scale CLs are maliciously controlled andthe frequency of periodic ldquocastingrdquo and ldquodroppingrdquo is closeto the natural frequency of the system it may amplify theimpact of power fluctuation and affect the power quality ofthe distribution network

44 Summary on the Influence of CLs byMalicious Control onADNs +e power quality impact of CLs maliciously con-trolled by attackers on ADNs can be summarized in Table 1Compared with the power quality of the distribution net-work without DG the DG connected to the power grid canbe leveraged to improve the power quality of the distributionnetworks such as improving the condition of low-voltagecross-limits However while the CLs suffered unpredictablecyber attacks it can result in dropping or casting of the large-scale CLs frequently and synchronously and the reliability ofthe distribution network is also reduced In summary thoseimpacts can cause power quality problems such as voltagedeviation and voltage fluctuation and even introduce new

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(a)

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(b)Ac

tive p

ower

uni

te v

alue

(pu)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(c)

Figure 14 +e active power oscillation curve of the line under different disturbance frequencies of (a) 167Hz (b) 187Hz and (c) 147Hz

Activ

e pow

er u

nite

val

ue (p

u)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

Figure 15 +e active power oscillation curve of line under small-scale load attack with a disturbance frequency of 167Hz

10 Complexity

power quality issues (such as forced resonance at low fre-quencies) In addition the impact of cyber attacks on thepower supply quality of ADNs is not only related to theattack modes but also related to the topology of the dis-tribution network (such as the connection points of DG) Inorder to ensure the normal operation of the ADNs the risksintroduced by cyber attacks must be considered

5 Conclusions

+e introduction of distributed energy objects and the fullapplication of communication technologies make distribu-tion networks face new security risks In this paper weanalyze the security risks of industrial CLs and civil CLs inthe distribution networks and compare the revenue and costof attacks from the perspective of attackers It can be seenthat the cyber attack against civil CLs can obtain a largeattack revenues with a small attack cost +en an ADNcontrol model considering cyber attacks is established andat the same time the attack behavior model is also estab-lished In these models it provides a clear representation ofthe attack object the attack method and the across-spaceimpact mechanism Taking power quality as an example theimpacts of AI

U AIIU and AIII

U attacks on ADNs are analyzedIn summary the result shows that DG connected to thepower grid can improve power quality but once large-scaleCLs are suffered by cyber attacks it may also cause powerquality problems and may introduce new problems such aslow-frequency compelled oscillation

In the future there is still a lot of work to be done againstthe potential security risks of the ADNs introduced bydistributed energy objects Based on the existing researchresults we can continue to study the impacts of cyber attacksagainst civil CL on the security and stable operation of theADNs such as refining attack models enriching attackscenarios and exploring the ADN operation characteristicsafter the attacks In order to provide a reference for thepower grid to improve its operation control strategy andformulate user-side cyber security standards we should fullygrasp the risks introduced by the CL to the ADNs In otherwords we can refer to the ADN security risk analysis of thescenario where the CLs have suffered malicious control andcarry out research on other energy objects in the ADNs asthe attack object In addition further research on the powergrid cascading failures caused by cyber attacks on distributedenergy objects can provide a reference for the security andstable operation of the entire power grid

Data Availability

+e data used to support the findings of this study arecurrently under embargo while the research findings arecommercialized Requests for data after publication of thisarticle will be considered by the corresponding author

Conflicts of Interest

+e authors declare that there are no conflicts of interestregarding the publication of this manuscript

Acknowledgments

+is work was supported by the Science and TechnologyProject of State Grid Corporation of China (Research onCooperative Situation Awareness and Active DefenseMethod of Cyber-Physical Power System for Cyber Attackno SGJSDK00KJJS1800315)

References

[1] QWangW Tai Y Tang andM Ni ldquoReview of the false datainjection attack against the cyber-physical power systemrdquo IETCyber-Physical Systems 3eory amp Applications vol 4 no 2pp 101ndash107 2019

[2] S Sridhar A Hahn and M Govindarasu ldquoCyber-physicalsystem security for the electric power gridrdquo Proceedings of theIEEE vol 100 no 1 pp 210ndash224 2012

[3] M S Mahmoud M M Hamdan and U A BaroudildquoModeling and control of cyber-physical systems subject tocyber attacks a survey of recent advances and challengesrdquoNeurocomputing vol 338 no 2 pp 101ndash115 2019

[4] R Liu C Vellaithurai S S Biswas T T Gamage andA K Srivastava ldquoAnalyzing the cyber-physical impact ofcyber events on the power gridrdquo IEEE Transactions on SmartGrid vol 6 no 5 pp 2444ndash2453 2015

[5] Y Cai Y Cao Y Li T Huang and B Zhou ldquoCascadingfailure analysis considering interaction between power gridsand communication networksrdquo IEEE Transactions on SmartGrid vol 7 no 1 pp 530ndash538 2016

[6] F Liang W Yu X Liu D Griffith and N Golmie ldquoTowardedge-based deep learning in industrial Internet of thingsrdquoIEEE Internet of 3ings Journal vol 7 no 5 pp 4329ndash43412020

[7] Z Wang M Rahnamay-Naeini J M Abreu et al ldquoImpacts ofoperatorsrsquo behavior on reliability of power grids duringcascading failuresrdquo IEEE Transactions on Power Systemsvol 33 no 6 pp 6013ndash6024 2018

[8] D E Whitehead K Owens D Gammel and J SmithldquoUkraine cyber-induced power outage analysis and practical

Table 1 Distribution network control model with CLs

Attack behaviors (A)Risk

Scenarios Attack object Type of attack Scale

IEEE 33-bus standard distribution system Node 18202530 AI

U 12gtPPN gt 042 Low-voltage exceeding limits

IEEE 33-bus standard distribution system Node 18202530 AII

U

Single-phaseΔPP0 gt 01 High-voltage exceeding limits

Single-machine (DG) infinite powersystem DG access node AIII

U 12gtPPN gt 05 Power fluctuation andresonance

Complexity 11

mitigation strategiesrdquo in Proceedings of the 2017 70th AnnualConference for Protective Relay Engineers (CPRE) pp 1ndash8College Station TX USA April 2017

[9] R Langner ldquoTo kill a centrifuge a technical analysis of whatStuxnetrsquos creators tried to achieverdquo Technical Report LangnerCommunications Norderstedt Germany 2013

[10] J E Sullivan and D Kamensky ldquoHow cyber-attacks inUkraine show the vulnerability of the US power gridrdquo 3eElectricity Journal vol 30 no 3 pp 30ndash35 2017

[11] R M Lee M J Assante and T Conway Analysis of the CyberAttack on the Ukrainian Power Grid SANS Industrial ControlSystems Bethesda MD USA 2016

[12] C-C Sun A Hahn and C-C Liu ldquoCyber security of a powergrid state-of-the-artrdquo International Journal of ElectricalPower amp Energy Systems vol 99 no 4 pp 45ndash56 2018

[13] G Dan H Sandberg M Ekstedt and G Bjorkman ldquoChal-lenges in power system information securityrdquo IEEE SecurityPrivacy vol 10 no 4 pp 62ndash70 2012

[14] A Rasim I Yadigar and S Lyudmila ldquoCyber-physical sys-tems and their security issuesrdquo Computers in Industryvol 100 no 4 pp 212ndash223 2018

[15] P Dong Y Han X Guo and F Xie ldquoA systematic review ofstudies on cyber physical system securityrdquo InternationalJournal of Security and Its Applications vol 9 no 1pp 155ndash164 2015

[16] N Komninos E Philippou and A Pitsillides ldquoSurvey insmart grid and smart home security issues challenges andcountermeasuresrdquo IEEE Communications Surveys amp Tuto-rials vol 16 no 4 pp 1933ndash1954 2014

[17] A-H Mohsenian-Rad and A Leon-Garcia ldquoDistributed in-ternet-based load altering attacks against smart power gridsrdquoIEEE Transactions on Smart Grid vol 2 no 4 pp 667ndash6742011

[18] R Chen X Li and H Zhong ldquonovel online detection methodof data injection attack against dynamic state estimation insmart gridrdquo Neurocomputing vol 344 no 7 pp 73ndash81 2019

[19] C Fei C Patsios P C Taylor and Z Pourmirza ldquoUsing self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemesrdquo IEEE Transactionson Smart Grid vol 10 no 3 pp 3010ndash3019 2019

[20] S Khan R Khan and A H Al-Bayatti ldquoSecure communi-cation architecture for dynamic energy management in smartgridrdquo IEEE Power and Energy Technology Systems Journalvol 6 no 1 pp 47ndash58 2019

[21] S Saleh M Prateek and P H Vincent ldquoBlackIoT IoT botnetof high wattage devices can disrupt the power gridrdquo inProceedings of the 27th USENIX Security Symposium(USENIX Security 18) pp 15ndash32 Baltimore MD USA May2018

[22] Z Dong M Tian and L Ding ldquoA framework for modelingand structural vulnerability analysis of spatial cyber-physicalpower systems from an attack-defense perspectiverdquo IEEESystems Journal pp 1ndash12 2020

[23] T N Boutsika and S A Papathanassiou ldquoShort-circuit cal-culations in networks with distributed generationrdquo ElectricPower Systems Research vol 78 no 7 pp 1181ndash1191 2008

[24] V V S N Murty and A Kumar ldquoOptimal placement of DGin radial distribution systems based on new voltage stabilityindex under load growthrdquo International Journal of ElectricalPower amp Energy Systems vol 69 no 3 pp 246ndash256 2015

[25] V C Nikolaidis E Papanikolaou and A S Safigianni ldquoAcommunication-assisted overcurrent protection scheme forradial distribution systems with distributed generationrdquo IEEETransactions on Smart Grid vol 7 no 1 pp 114ndash123 2016

[26] K Clement-Nyns E Haesen and J Driesen ldquo+e impact ofcharging plug-in hybrid electric vehicles on a residentialdistribution gridrdquo IEEE Transactions on Power Systemsvol 25 no 1 pp 371ndash380 2010

[27] J Munkhammar P Grahn and J Widen ldquoQuantifying self-consumption of on-site photovoltaic power generation inhouseholds with electric vehicle home chargingrdquo Solar En-ergy vol 97 no 6 pp 208ndash216 2013

[28] M Singh P Kumar and I Kar ldquoA multi charging station forelectric vehicles and its utilization for load management andthe grid supportrdquo IEEE Transactions on Smart Grid vol 4no 2 pp 1026ndash1037 2013

[29] M P Moghaddam A Abdollahi and M RashidinejadldquoFlexible demand response programs modeling in competi-tive electricity marketsrdquo Applied Energy vol 88 no 9pp 3257ndash3269 2011

[30] D Adrian J Ullrich and E R Weippl ldquoGrid shock coor-dinated load-changing attacks on power grids the non-smartpower grid is vulnerable to cyber attacks as wellrdquo in Pro-ceedings of the 33rd Annual Computer Security ApplicationsConference pp 303ndash314 Orlando FL USA September 2017

[31] G M Zhang et al ldquoDolphinattack inaudible voice com-mandsrdquo in Proceedings of the 2017 ACM SIGSAC Conferenceon Computer and Communications Security pp 103ndash117Dallas TX USA November 2017

[32] E Bou-Harb C Fachkha M Pourzandi M Debbabi andC Assi ldquoCommunication security for smart grid distributionnetworksrdquo IEEE Communications Magazine vol 51 no 1pp 42ndash49 2013

[33] X Chen ldquoIndustrial control network information securitythreats and vulnerability analysis and researchrdquo ComputerScience vol 39 no 10 pp 4188ndash4190 2012

[34] W Knowles D Prince D Hutchison and K Jones ldquoA surveyof cyber security management in industrial control systemsrdquoInternational Journal of Critical Infrastructure Protectionvol 9 no 1 pp 52ndash80 2015

[35] C-W Disso C-C Liu and G Manimaran ldquoVulnerabilityassessment of cybersecurity for SCADA systemsrdquo IEEETransactions on Power Systems vol 23 no 4 pp 1836ndash18462008

[36] L Sankar S R Rajagopalan S Mohajer and H V PoorldquoSmart meter privacy a theoretical frameworkrdquo IEEETransactions on Smart Grid vol 4 no 2 pp 837ndash846 2013

[37] M Li and H-J Lin ldquoDesign and implementation of smarthome control systems based on wireless sensor networks andpower line communicationsrdquo IEEE Transactions on IndustrialElectronics vol 62 no 7 pp 4430ndash4442 2015

12 Complexity

Page 2: Security Risk Analysis of Active Distribution Networks

the distribution networks even causing power-grid cas-cading failures collapses and large-scale outages [7] +isimpact may be amplified in ADNs with deep penetration ofdistributed energy objects

With the increasing number of incidents of hostile forcesattack on critical infrastructure through cyber space itshows that the cyber attack through the intrusion of cyberspace may have a serious impact on the physical system suchas the Iranian nuclear power plant uranium centrifugedamage in 2010 and the Ukrainian power grid outage in 2015[8] +erefore when distributed energy objects suffer fromattacks how to ensure the security and stable operation ofADNs is an urgent problem

+e impact of cyber security risk on power grid oper-ation has been paid more attention Langner et al [9]reviewed the process of malware intrusion from cybertechnology layer and finally have studied the destructiveeffects on the physical layer+e Iranian nuclear power plantSTUXNET incident is taken as an example which illustratesthe ldquocyber physical warfarerdquo and related technologymechanism +e studies in [8 10 11] analyze the process oflarge-scale power-grid paralysis caused by hacker attack inUkraine and put forward some thoughts on power-gridcyber security protection Sun et al [12] take the Ukrainianoutage as an example and define a cyber-coordinated attackon the power system which is characterized by deviceslaunched from the cyber space and acting on the physicalspace Dan et al [13] pointed out that with the developmentof control and communication technology the primarypower system and the secondary power system deeply in-teract with the cyber physical power system When certain(some) equipment of the primary power system or thesecondary power system is out of order (due to networkattacks natural disasters etc) the impacts caused by it arevery likely to spread to the other partyrsquos network causingcascading failure that can seriously impact the safe and stableoperation of the power system and causing significanteconomic losses Sridhar et al [2] emphasize the importanceof studying the potential impact of cyber attacks and inorder to ensure cyber security it is necessary to study thecyber-physical relationship of smart grid and the possibleattack paths Rasim et al [14] illustrate the transmissionmechanism of cyber security risks in ECPS and explain thecyber security risks in ECPS and the role of cyber space inphysical space with the characteristics of cross-spacetransmission Dong et al [15] analyze the attack modes onECPS from the perspective of attackers including attackmodes and their harms selected to achieve different goalsHowever this kind of research is still relatively preliminaryand focuses on general issues +e specific modes of cybersecurity attacks and their effects on the stable operation ofthe power grid have not been excavated and hence targetedsecurity defense strategies cannot be established Komninoset al [16] investigated a number of attacks on smart gridfrom direct load shifting to smart meter data manipulationSpecifically in single small-scale attacks adversaries cancontrol certain IoTdevices such as smart homes in the smartgrid Using their control an adversary can induce an ab-normal working state in the device increasing the power

usage of the household In certain cases aggressive adver-saries can cause damage to the devices and their sur-roundings and even threaten the personal safety of users[17ndash20] In terms of large-scale cyber attacks adversaries cancompromise many high-wattage IoT devices to manipulatethe power demand in a larger smart grid For example Salehet al [21] demonstrated a large-scale attack model on real-world grids using a botnet to turn on and off a large numberof IoT devices synchronously resulting in massive powerfluctuations with the potential to cause a large-scaleblackout

At present there are few studies on the risk of distributedenergy objects being maliciously controlled by the attackersIn the research of distributed energy objects in distributionnetworks most of the research is on DG but little aboutcyber security and cyber attacks [22 23] Murty et al [24]study the impact of DG connection to the distributionnetworks which is mainly due to the random fluctuation ofDG and has nothing to do with malicious control Nikolaidiset al [25] design the protection schemes of the distributionnetworks with DG and these schemes are mainly based onthe conventional failure of power grid without consideringcyber attacks from the cyber space Clement-Nyns et al [26]study the impacts of a large scale of electric vehicle power-charging connection to the distribution networks andpropose intelligent charging strategies to optimize the dis-tribution networksrsquo operation but the study does notconsider the situation of charging stations under the cyberattacks Munkhammar et al [27] propose the residentialelectricity-consumption probability model based on resi-dentsrsquo habits and formulate a load demand response plan sothat residential loads can become participants in optimizingthe operation of the distribution networks Although thisbehavior may have an impact on the distribution networkunlike the load being maliciously controlled such impactcan be reduced through the policy guidance of the powercompany [28 29]

It can be seen that the current research is mainly focusedon the active application of communication control methodsin the distribution networks such as demand-side man-agement (DSM) ldquosourcerdquo and ldquoloadrdquo optimization controland microgrid control strategies +e security risk intro-duced to the distribution networks by the popularization ofcommunication technology is seldom considered from theperspective of the attackers +e diversity of access com-ponents for the distribution networks increases the difficultyof unified management Generally the operating status ofthe distribution networks is determined by the regulation ofthe power grid side and the load usage of the user sideMohsenian-Rad et al [17] pointed out that the attackerwould break the normal order of power grid load man-agement but this research only considered the attacks on theload management system by penetrating the cyber networkand did not consider the security risk of the load beingmaliciously controlled Adrian et al [30] analyzed the risk oflarge-scale controllable loads in the malicious attack sce-nario but they did not analyze the response characteristics ofcontrollable loads Zhang et al [31] used ultrasound toactivate the voice recognition system of the smart homes and

2 Complexity

remotely manipulate voice assistants such as Siri andHivoice in order to disrupt the distribution network oper-ation +e studies in [30 31] show that if the attackers canmaliciously control cell phones and send turn ldquoonrdquoldquooffrdquocommands to smart homes successfully it can result in aserious imbalance of the power flow in the 10 kV feeder lineand bring serious security risks to the safety and stableoperation of the distribution network To sum up there arefew literature works on the impacts of cyber attacks from theuser side on distribution networks

+rough the analysis of the above research status it canbe seen that there are few literature works considering thecyber security on the ADNs [32] +e large-scale access ofCLs and high-permeability access of DGs are inevitabletrends in the development of the distribution networks+erefore this paper analyzes the security threats faced bydistributed energy objects in ADNs and establishes controlmodels and attack models within ADNs +en we focus onthis problem through analyzing the impact of large-scale CLsbeing maliciously controlled on the ADNs and exploreabnormal operating characteristics of the ADNs caused bythe CLs being maliciously controlled Hence this paperdiscovers the risks of ADNs and provides a basis for theresearch of ADNsrsquo security control methods in order to helpthe further development of smart grids

+e rest of this paper is organized as follows In Section2 the security threat analysis is introduced Section 3considers cyber attacks with the control model and thecyber attack model in ADNs are proposed In Section 4 theimpact of large-scale CL attacks on ADNs is analyzed Fi-nally some conclusions are drawn in Section 5

2 Security Threat Analysis

According to types of load application CLs are divided intoindustrial controllable load and civil controllable loadSpecifically the industrial load is mainly controlled by theindustrial control system of the load side and the civil load ismainly controlled and used by residential users according todemand behavior

21 Safety 3reats to Industrial Controllable LoadIndustry is of great significance in Chinarsquos national econ-omy It is mainly engaged in large-scale production activ-ities and its electricity consumption accounts for about 70of the total social electricity consumption +e scale of in-dustrial load is very large and the concentration ratio is veryhigh In fact there is a corresponding control system whichis the industrial control system

A typical industrial control system is shown in Figure 1which consists of an enterprise information network pro-cess control network and field control network +e en-terprise information network has traditional IT networkattributes such as mail sending and receiving feature webbrowsing feature enterprise resource planning (ERP) andmanufacturing execution system (MES) +e middle processcontrol network is the bridge and link connecting the upperand lower layers of the network On the one hand it controls

and dispatches the field control equipment at the bottomaccording to the upper-level production instructions and onthe other hand it conducts real-time monitoring and datastatistics on the production situation of the industrial siteand provides information feedback for upper-level regula-tion+e field control network is located at the bottom of theindustrial control system which includes PLC (program-mable logic controller) PAC (programmable automationcontroller) RTU (remote terminal unit) IED (intelligentelectronic device) actuator and other control equipment

In the past industrial control systems were physicallyisolated from external networks +e development andpopularization of information communication technology(ICT) has made the field of industrial control increasinglyopen and its degree of interaction with the information fieldhas also increased However the internal network of theindustrial control system does not perform encryptioncontrol on the data flow Usually as long as the user entersthe internal network any of the network equipment can beaccessed which also leads to a drop in network security [33]In addition because industrial control mainly considersfunctionality the system behavior characteristics based onthis principle and the role characteristics of behavior controlpersonnel are more likely to become the entry point forattackers to intrude into the control system

+e requirement of industrial intelligence has pro-moted the development of open control systems withmodular reconfigurable and expandable characteristics+e control network of the open control system has theopening characters For example the core components ofthe open control system are the industrial PC which arebased on the Windows-Intel platform And the industrialethernet is widely used for communication between thecomponents At the same time the BUS technologyapplies embedded systems to field control instruments[34] In the abovementioned cases there are loopholes inmany systems such as PC operation system communi-cation protocol with TCPIP and the embedded opera-tion system Meanwhile the security protection measureof the industrial control system is mainly based on iso-lation from other systems but the underlying security ismore vulnerable than other information systems and it isnot subject to the information security policy of the gridmanagement department +erefore the industrial con-trollable load is extremely vulnerable to be attacked byinternal workers or external attackers [35] and this inturn makes the stable operation of the distributionnetwork affected

22 Security 3reats to Civil Controllable Load +e civilcontrollable load is represented by smart homes Smarthome takes residential buildings as the platform uses theIoT technology (including integrated wiring technologynetwork communication technology and automatic controltechnology) to realize the interconnection of control ter-minals and smart homes and realizes information exchangethrough the control platform +e control core of the smarthome is the control platform which is implemented by an

Complexity 3

embeddedmicroprocessor and can be connected to a controlterminal (mobile phone or PC) via the Internet to achieveremote control +e control system of the smart homeadopts a three-layer structure design [36] As shown inFigure 2 the core is the control platform which is imple-mented by an embedded microprocessor It can be con-nected to the control terminal (mobile phone or PC) via theInternet for remote controlling [37] However the smarthome control system has almost few security protectionmeasures According to the characteristics of networkcomposition the attacker has two attack paths+e first pathis to use the loopholes of the embedded system implantmalicious codes into the control platform through the publicnetwork and directly attack the internal network of thecontrol system to make the smart home work in an ab-normal condition +e second path is to intrude the userrsquoscontrol terminal At this point the attackers implantmalicious codes into smart terminals such as mobile phonesand PCs and the terminal issues abnormal control com-mands to the control platform which eventually leads toabnormal behavior of the smart homesWhen the number ofthe maliciously controlled smart homes is large enough itleads to the change in load of the distribution networkssuddenly and it may affect the reliability of power supply andpower quality

In summary because the industry plays an importantrole in the national economy the information securityprotection requirements of industrial control systems arerelatively high which leads to the cost of attacks becomehigh accordingly Most of the civil CLs represented by smarthomes are not embedded with security mechanisms andthey can be connected to the public network with a longonline time Hence the cost of the attack becomes extremelylow and the purpose of the attack is easy to realizeCompared with industry load the security risk of CLs is verylow If a large-scale CL is subjected to malicious control andchanges due to the objective and unpredictable capacity itwill inevitably impact the normal operation of the distri-bution networks and may even cause cascading failures and

Enterprise information network

Process control network

Field control network

Historydatabase

server

Real-timedatabase

serverEngineerstation

Industrialfirewall

SCADAclient

Historylibraryclient

Enterprisemanagement

client

MES

PLC PAC RTU IED

Internet

Enterpriseadministration

SCADAserver

Engineering configuration

Enterprise firewall

Figure 1 Industrial control system

Controlplatform

PCmobilephone

Smartappliance

Internet

Homenetwork

Outsidenetwork

Figure 2 Smart home control system

4 Complexity

expand the scope of influence +erefore this paper selectsCLs as the object of cyber attack for subsequent research andanalysis

3 Considering Cyber Attack with the ControlModel and the Cyber Attack Model in ADNs

31 Control Model +e evaluation index of the distributionnetwork includes power supply reliability economy secu-rity and power quality which are called the controlledvariable and are represented by S In general these con-trolled variables are determined by the electric powercompany such as protection action dispatching controland user behavior +e connection of distributed energyobjects has increased the initiative of the distribution net-work and promoted the development of control methoddiversity Once large-scale distributed energy objects arecontrolled by the attackers the dynamic balance of thedistribution network may be disrupted which can affect thenormal operation of the distribution network Attack be-havior is different from normal dispatching protection anduser behavior because it is unpredictable +erefore thedistribution network control model with CL is shown inFigure 3 and the controlled variable is as follows

S f(g d u A) (1)

Here g is the protection action d isthe dispatchingcontrol u is the normal user behavior and A is an attackbehavior

Equation (1) is a nonlinear equation +e solution of theequation is related to the input (g d u A) and the initialstate of the distribution network In the traditional distri-bution network there is no attack behavior against load anduser behavior is reflected in daily life and production ac-tivities It is a random variable that conforms to a certain lawIn the meantime the distribution network is mainly con-trolled by dispatching and protection action According tothe state-detection variable the dispatching system andprotection device control the distribution network whichensures that the controlled variable Smeets the requirementsof the stable operation of the distribution network In thedistribution network with CLs the added attack behavior isissued by the attackers and the distributed energy object isused as the attack object +erefore the DG and load dy-namic balance are broken and it is also not regulated by thepower company Finally it may cause the controlledquantity S to deviate from the requirements of security andstable operation of the distribution network causing safeand stable accidents

32 Attack Model +e cyber attack model contains cyberelement M T and physical element P(t) and is defined as adouble set Au which represents the impact mechanism ofthe attack from the cyber space and acts on the physicalspace +e attack model in which the CLs are maliciouslycontrolled can be expressed as follows

Au M T ⟶ P(t) (2)

Here M is the control command which is sent by theattackers such as ldquoonrdquoldquooffrdquo represented as command MonMoff namelyM MonMoff Next T is the sending timeof the control command because the sending time of thecyber command has discrete characteristics so let T t[n]where n 0 1 2 n and t[n] could be the sequence of timewhich is sent from the control command When large-scaleCLs are maliciously controlled by cyber attacks they aredirectly manifested as changes in the distribution networkload P(t) is used to represent the load of the distributionnetwork and the symbol ldquo⟶rdquo represents the mappingrelationship between the cyber attack of the informationsystem and the load change of the power system

Consider that after the malicious control commands areissued some loads do not change the operating state So theeffective load control rate α is introduced consider that thenetwork delay and other factors may cause some controlcommands to be invalid and an effective attack rate β isintroduced So P(t) is composed of the normal operatingload P0(t) and abnormal operating load ΔP(t) Hence theabnormal operating load ΔP(t) can be expressed as follows

ΔP(t) αβP0(t) (3)

In this paper we consider the abnormal operationperformance of CLs such as loads castingdropping syn-chronously or frequent and synchronous casting anddropping and based on these performances we classify theattacks into three categories accordingly +e details are asfollows

321 Attack of Loads Casting Synchronously At a certainpoint attackers send Mon (synchronously ldquoonrdquo MMon)commands to massive CLs And attack behavior can beexpressed asAI

u In the meantime P(t) increases immedi-ately which can be expressed as follows

P(t) P0(t) + ΔP(t) P0(t) + αβP0(t) (4)

In the sequence t[n] of control command-sending timen 0 is the simplest form of attack of loads casting syn-chronously when nne 0 the attack is to keep sending theMon

Distributedenergy storage

Controllableload

UsersGuidance

Attacker

Activedistribution

network

Dispatching

g u A

Electric power company

Protection

Distributedgeneration

d

Figure 3 Distribution network control model with CLs

Complexity 5

command and the ADN is kept in a high-load state for a longtime

322 Attack of Loads Dropping Synchronously At a certainpoint attackers send Moff (synchronously ldquooffrdquo MMoff)commands to massive CLs And attack behavior can beexpressed as AII

u In the meantime P(t) reduces immedi-ately which can be expressed as follows

P(t) P0(t) minus ΔP(t) P0(t) minus αβP0(t) (5)

In the sequence t[n] of control command-sending timen 0 is the simplest form of attack of loads dropping syn-chronously when nne 0 the attack is to keep sending theldquoMoffrdquo command and the ADN is kept in a low-load state fora long time

323 Attack of Loads of Frequent and Synchronous Castingand Dropping Attackers sendMon andMoff (frequently andsynchronously ldquoon and offrdquo MMon and Moff) commandsperiodically to massiv CLs which leads to frequent andsynchronous casting and dropping of loads And attackbehavior can be expressed as AIII

u In the meantime P(t)

increases and drops frequently and synchronously If wedefine Mon command at t [2i] and send Moff commandwhile t [2i + 1] the control command M can be expressedas follows

M Mon T [2i]

Moff T t[2i + 1]1113896 i 0 1 2 (6)

At first attackers send Mon command at t [2i] and theP(t) will be increased αβP0(t) +en attackers send Moffcommand while t [2i+1] and P(t) will be increasedαβP0(t) because CLs can be controlled by attackers AtMoffcommand α 1 and P(t) will be reduced toβP0(t)+erefore P(t) can be expressed as follows

P(t) P0(t) + αβP0(t) t isin (t[2i])

P0(t) + αβP0(t) minus βP0(t) t isin (t[2i + 1])1113896 i 0 1 2

(7)

+e attackers through setting the time interval τ (τ t[n]minus t[nminus 1] n 1 2 3 ) in the attack command M canchange the casting and dropping frequency of CLs and leadto abnormal performance of those CLs It may also causeproblems such as resonance in serious cases

4 Analysis on the Impact of Large-Scale CLAttacks on ADNs

+e risk of the ADNs was greatly increased when the large-scale CLs were controlled by attackers and the power qualitymay also be affected +e attack also resulted in abnormalpower consumption of the users and damaged the powersupply equipment in severe cases +erefore we take theimpact of attacks on power quality as an example and the10KV IEEE 33-bus standard distribution system was used asthe study case as shown in Figure 4 Finally we consider a

single DG connected at the end of the line and analyze theimpact of the malicious attacks

41 Impact of Load-Casting Attack on Power QualityScenario 1 node 18 of the IEEE 33-bus standard distributionsystem is connected to the DG and the penetration rate is100 Nodes 18 20 25 and 30 suffered AI

u attacks (n 0and ΔPP0 1)

+e node branchmodel in the ADN is shown in Figure 5+e power flow of branch bij is from node i to node j Basedon power flow calculation the voltage of node j can beexpressed as follows

Vj Vi minus ΔV Vi minusPjRij + QjXij

VN

(8)

Here ΔV is the branch voltage drop and VNis thenominal voltage Pj and Qj are the active and reactive powerof node j respectively Rij and Xij are the resistance andreactance of the branch (i j) respectively According to thestructural parameters of the ADN and the voltage of thepower supply terminal the voltage of each node can becalculated When the ADN suffered AI

u attacks and lead toincrease of the node load the line voltage dropped very fastand the receiving terminal voltage would also be decreasingand so low-voltage overruns may occur According to powerquality specifications the allowable deviation of 10 kV uservoltage is plusmn7 of the system nominal voltage

We assume that the load is twice the normal operatingstate after the attacks and PPN 065 at this moment Asshown in Figure 6 we obtain the node voltage situationcurves which represent the suffered distribution networkbefore and after the attacks According to the analysis of thenode voltage situation curves due to the increase of the loadcaused by the malicious attacks the voltage of each node hasdropped and caused addition of four new low-voltageoverlimit nodes and the power quality had been dropped aswell After further calculation when PPN gt 052 after theattacks which led to the increase in the low-voltage out-of-limit node number the power quality of these nodes doesnot meet the standard power quality

Compared with the attack scenario of DG connected tothe standard distribution system the attackers need to attacka large-scale CL to make the voltage deviation go beyond thestandard range In addition the newly added low-voltageoverlimit nodes are on branches that do not include DGBecause the voltage is increased by the DG after the cyberattacks the voltage of the nodes with DG supply branches isat the allowable range of deviation

We compare the node voltage distribution of the sufferedbranch before and after the attacks with the traditionaldistribution network under the same type of the attack Asshown in Figure 7 the conclusions can be drawn as follows

(1) If the power line already contains DG and not con-sidering the off-grid status when it is subjected to AI

u

attack against CLs the DG can be leveraged to improvethe power quality of the distribution network and theline is not prone to low-voltage phenomenon

6 Complexity

(2) If the line contains DG and considering the off-linestatus when it is subjected to AI

u attack against CLsDGmay be out of operation after the attacks becauseof poor operation environment and it can exacer-bate voltage dropping and reduce power quality

(3) If a DG is not connected to the power line when it issubjected to AI

u attack against CLs the operation ofthe DG can be used as an adjustment strategy toimprove power quality

42 Impact of LoadDroppingAttack onPowerQuality In thetraditional distribution network the voltage rise is causedby load dropping However there is only one power supplynode on the power side and it is also limited by the ref-erence voltage In the ADNs DG can also provide electricalenergy if the voltage rise caused by the load dropping itmay cause high voltage to exceed the limit and reducepower quality

Scenario 2 node 18 of the IEEE 33-bus standard dis-tribution system is connected to the DG and the penetrationrate is 100 Nodes 18 20 25 and 30 have suffered AII

u

attacks (n 0 ΔPP0 1)In order to ensure the normal operation of the ADN the

load balance of each phase should be considered when we setup distribution lines for users If there is load suffer due toAII

u attack in this area and it is not evenly distributed on eachphase line it will cause unhomogeneous load distribution oneach phase line and increases the degree of the three-phaseimbalance and while those disruptions are serious it willalso reduce the power quality

+e calculation of the three-term imbalance can beexpressed as follows

ε I2

I1times 100 (9)

Here I1 is the effective value of the positive sequencecomponent of the three-phase current and I2 is the effectivevalue of the negative sequence component of the three-phase

21 3 54 6 87 9 1110 12 13 14 1615 17 18

2019 21 22

26 27 28 29 3130 32 33

23 24 25

Figure 4 Diagram of IEEE 33-node standard distribution system

i j

Pi + jQi Pj + jQi

Vi Vj

Figure 5 +e node branch model

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34078080082084086088090092094096098100102

The voltage of ADNsrsquo nodes before attacksThe voltage of ADNsrsquo nodes after attacks

Node

Volta

ge p

er u

int

Figure 6 +e voltage unit value of ADN nodes before and after AIu

attack

Volta

ge p

er u

int

Node1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

11

105

1

095

09

085

08

Before suffering attack of ADNS

After suffering attack of ADNS

Before suffering attack of traditional distribution

After suffering attack of traditional distribution

Figure 7 +e voltage unit value of traditional ADN nodes beforeand after AI

u attack

Complexity 7

current In the low-voltage power distribution system theimbalance of the three-phase load current at the outlet of thedistribution transformer should be less than 10 For theconvenience of quantification assume that the attacked loadis concentrated in one phase that is single phase

In scenario 2 three-phase current on the secondary side ofthe transformer before and after the AII

uattack is obtainedthrough simulation as shown in Figure 8 Before the attack theeffective value of the three-phase current Ia Ib Ic 850A andthe degree of three-phase imbalance is 0 after the attack thethree-phase load is unbalanced Ia Ib 850A and Ic 525Aand the three-phase imbalance is 148 It can be seen that thethree-phase balance before and after the attack exceeds thestandard and the power quality does not meet the standardFurther calculation can be obtained when single-phaseΔPP0 01 and ε 10 It can be obtained that when single-phase ΔPP0 gt 01 the three-phase imbalance degree exceedsthe standard

If the imbalance degree of three-phase voltage becomesvery serious it will increase line and transformer loss si-multaneously and affect the safe operation of electricalequipment Supplying power under unbalanced voltageconditions may easily cause the userrsquos electrical equipmentwith a high-voltage one-phase connection to burn out whilethe userrsquos electrical equipment with a low-voltage one-phaseconnection may show abnormal work

+e suffered attack nodes dropped on a large scale in thedistribution network +e voltage distribution of each nodeis shown in Figure 9 It can be seen that after the AII

u attacksthe voltage of each node is increasing and the voltage perunit value of node 18 increases from 1057 to 1074 whichhas exceeded the allowable range of power quality voltagedeviation and results in reduced power quality

For the distribution network transformer the excessivevoltage not only reduced service life of transformers but itmay also cause resonance phenomena and harmonic pol-lution and disrupt other normally operating equipment Forelectrical equipment the excessive voltage can affect thenormal operation while the electrical equipment operatedwith high voltage for a long time would show reduction inservice life and increase in power consumption

To change the attack intensity the voltage of each node isshown in Figure 10 where the corresponding attack modesfrom decentralized attacks to no attacks of the curve aredescribed as follows

(1) +e decentralized attacks all the nodes with half ofthe load suffered the AII

u attacks(2) +e centralized large-scale attacks nodes 18 20 25

and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in large-scale load of attacked nodes tripping from the linePPN 0

(3) +e centralized small-scale attacks nodes 18 20 25and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in 50load of attacked nodes tripping from the line

(4) No attacks

Among them attack modes (1) and (2) caused thevoltage to exceed the limits and reduced the power qualityAlthough attack mode (3) raised the node voltage thevoltage deviation index of the power quality still satisfied thespecified range

If the ADNs within a certain attack scenario where thenode 22 is connected to the DG take this branch line as theanalysis object the voltage distribution of those nodes areshown in Figure 11 Although the node voltage increases arecaused by the synchronous dropping attacks the deviationindex of the voltage still satisfied the specified range

It can be seen that the deviation impact of AIIu attacks on

the load voltage of the distribution network is not onlyrelated to the attack intensity but also related to the topologyof the distribution network

43 Impact of Frequent Casting and Dropping of Load AttacksonPowerQuality Due to the DGs the power systemmay besubjected to periodic disturbance of the load and it wouldcause power oscillation that is compelled resonance

Attack pointTime (s)

Curr

ent (

A)

15001000

5000

ndash1500ndash1000

ndash500

Ia Ib Ic

0 001 002 003 004 005 006

Figure 8 +ree-phase current on the secondary side of thetransformer before and after the AII

u attack

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34090

092

094

096

098

100

102

104

106

108

Volta

ge p

er u

int

Node

The voltage of ADNs nodes before attacksThe voltage of ADNs nodes aer attacks

Figure 9 +e voltage value of ADNsrsquo nodes before and after AIIu

attack

8 Complexity

low-frequency oscillation +e theory of compelled reso-nance low-frequency oscillation points out that regular smallperiodic disturbance in the system will cause the poweroscillation If the frequency of the disturbance is consistentwith the natural frequency of the system it will cause res-onance and the compelled oscillation amplitude of thesystem is the largest at this period

Assume that the DG is directly connected to the powergrid through the generator and select the connection node asa malicious attack object to construct a single-machineinfinite system As shown in Figure 12 the DG is connectedinto the distribution system through a 04 kV10 kV boostertransformer

To cast small-scale load while the system is runningstably with light load we can get the generator speed curveas shown in Figure 13 and the natural oscillation frequencyof the system is 167Hz

Scenario 3 the connection point of the DG suffered theAIII

u attack (t[0] 6 s and ΔPP0 1)To change the frequency of ldquocastingrdquoldquodroppingrdquo of the

load while the same-scale load is attacked we can obtainthe line power curve as shown in Figure 14 When thecommand ldquoonrdquoldquooffrdquo is sent at τ 03 s intervals as shownin Figure 14(a) the disturbance frequency is 167Hz Whenthe command ldquoonrdquoldquooffrdquo is sent at τ 026 s intervals as

shown in Figure 14(b) the disturbance frequency is187Hz When the command ldquoonrdquoldquooffrdquo is sent at τ 034 sintervals as shown in Figure 14(c) the disturbance fre-quency is 147Hz

Due to the disturbance frequency being equal to thenatural frequency of the system it results in the largestamplitude of the power fluctuation when the deviationbetween the disturbance frequency and the natural fre-quency of the system increases the power oscillationcurves can also be obtained but the amplitude of this oneis relatively small And the amplitude of power oscilla-tions is also related to the scales of the attack loadCompared with Figure 14(a) While the scale of the attackload becomes 50 the frequency of periodic disturbanceis still 167 Hz and the oscillation amplitude becomesrelatively small as shown in Figure 15

Node

Volta

ge p

er u

int

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

112

11

108

106

104

102

1

098

096

094

092

Centralized small-scale attacksNo attacks

Decentralized attacksCentralized large-scale attacks

Figure 10 +e voltage value of nodes before and after AIIu attack under different attack modes

Node

Volta

ge p

er u

int

1008100610041002

10998099609940992

1 2 19 20 21 22

After attack of ADNBefore attack of ADN

Figure 11 +e partial node voltage before and after AIIu attack

DG

Infinite power system

Figure 12 Single-machine (DG) infinite power system

1001

10005

1

09995

0999

6 65 7 75 8 85Ts

ltRotor speed wm (pu)gt

Figure 13 Rotation speed fluctuation after small disturbance

Complexity 9

In the traditional distribution network the load mainlyconsumes electrical energy passively and it is usually faraway from the generator with relatively scattered distri-bution and it is not easy to have large-scale synchronousldquocastingrdquoldquodroppingrdquo However with the development ofDG connected to the power grid and CLs it makes thedistance between the load and the generator become closerand the load would be maliciously controlled by the at-tackers If the large-scale CLs are maliciously controlled andthe frequency of periodic ldquocastingrdquo and ldquodroppingrdquo is closeto the natural frequency of the system it may amplify theimpact of power fluctuation and affect the power quality ofthe distribution network

44 Summary on the Influence of CLs byMalicious Control onADNs +e power quality impact of CLs maliciously con-trolled by attackers on ADNs can be summarized in Table 1Compared with the power quality of the distribution net-work without DG the DG connected to the power grid canbe leveraged to improve the power quality of the distributionnetworks such as improving the condition of low-voltagecross-limits However while the CLs suffered unpredictablecyber attacks it can result in dropping or casting of the large-scale CLs frequently and synchronously and the reliability ofthe distribution network is also reduced In summary thoseimpacts can cause power quality problems such as voltagedeviation and voltage fluctuation and even introduce new

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(a)

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(b)Ac

tive p

ower

uni

te v

alue

(pu)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(c)

Figure 14 +e active power oscillation curve of the line under different disturbance frequencies of (a) 167Hz (b) 187Hz and (c) 147Hz

Activ

e pow

er u

nite

val

ue (p

u)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

Figure 15 +e active power oscillation curve of line under small-scale load attack with a disturbance frequency of 167Hz

10 Complexity

power quality issues (such as forced resonance at low fre-quencies) In addition the impact of cyber attacks on thepower supply quality of ADNs is not only related to theattack modes but also related to the topology of the dis-tribution network (such as the connection points of DG) Inorder to ensure the normal operation of the ADNs the risksintroduced by cyber attacks must be considered

5 Conclusions

+e introduction of distributed energy objects and the fullapplication of communication technologies make distribu-tion networks face new security risks In this paper weanalyze the security risks of industrial CLs and civil CLs inthe distribution networks and compare the revenue and costof attacks from the perspective of attackers It can be seenthat the cyber attack against civil CLs can obtain a largeattack revenues with a small attack cost +en an ADNcontrol model considering cyber attacks is established andat the same time the attack behavior model is also estab-lished In these models it provides a clear representation ofthe attack object the attack method and the across-spaceimpact mechanism Taking power quality as an example theimpacts of AI

U AIIU and AIII

U attacks on ADNs are analyzedIn summary the result shows that DG connected to thepower grid can improve power quality but once large-scaleCLs are suffered by cyber attacks it may also cause powerquality problems and may introduce new problems such aslow-frequency compelled oscillation

In the future there is still a lot of work to be done againstthe potential security risks of the ADNs introduced bydistributed energy objects Based on the existing researchresults we can continue to study the impacts of cyber attacksagainst civil CL on the security and stable operation of theADNs such as refining attack models enriching attackscenarios and exploring the ADN operation characteristicsafter the attacks In order to provide a reference for thepower grid to improve its operation control strategy andformulate user-side cyber security standards we should fullygrasp the risks introduced by the CL to the ADNs In otherwords we can refer to the ADN security risk analysis of thescenario where the CLs have suffered malicious control andcarry out research on other energy objects in the ADNs asthe attack object In addition further research on the powergrid cascading failures caused by cyber attacks on distributedenergy objects can provide a reference for the security andstable operation of the entire power grid

Data Availability

+e data used to support the findings of this study arecurrently under embargo while the research findings arecommercialized Requests for data after publication of thisarticle will be considered by the corresponding author

Conflicts of Interest

+e authors declare that there are no conflicts of interestregarding the publication of this manuscript

Acknowledgments

+is work was supported by the Science and TechnologyProject of State Grid Corporation of China (Research onCooperative Situation Awareness and Active DefenseMethod of Cyber-Physical Power System for Cyber Attackno SGJSDK00KJJS1800315)

References

[1] QWangW Tai Y Tang andM Ni ldquoReview of the false datainjection attack against the cyber-physical power systemrdquo IETCyber-Physical Systems 3eory amp Applications vol 4 no 2pp 101ndash107 2019

[2] S Sridhar A Hahn and M Govindarasu ldquoCyber-physicalsystem security for the electric power gridrdquo Proceedings of theIEEE vol 100 no 1 pp 210ndash224 2012

[3] M S Mahmoud M M Hamdan and U A BaroudildquoModeling and control of cyber-physical systems subject tocyber attacks a survey of recent advances and challengesrdquoNeurocomputing vol 338 no 2 pp 101ndash115 2019

[4] R Liu C Vellaithurai S S Biswas T T Gamage andA K Srivastava ldquoAnalyzing the cyber-physical impact ofcyber events on the power gridrdquo IEEE Transactions on SmartGrid vol 6 no 5 pp 2444ndash2453 2015

[5] Y Cai Y Cao Y Li T Huang and B Zhou ldquoCascadingfailure analysis considering interaction between power gridsand communication networksrdquo IEEE Transactions on SmartGrid vol 7 no 1 pp 530ndash538 2016

[6] F Liang W Yu X Liu D Griffith and N Golmie ldquoTowardedge-based deep learning in industrial Internet of thingsrdquoIEEE Internet of 3ings Journal vol 7 no 5 pp 4329ndash43412020

[7] Z Wang M Rahnamay-Naeini J M Abreu et al ldquoImpacts ofoperatorsrsquo behavior on reliability of power grids duringcascading failuresrdquo IEEE Transactions on Power Systemsvol 33 no 6 pp 6013ndash6024 2018

[8] D E Whitehead K Owens D Gammel and J SmithldquoUkraine cyber-induced power outage analysis and practical

Table 1 Distribution network control model with CLs

Attack behaviors (A)Risk

Scenarios Attack object Type of attack Scale

IEEE 33-bus standard distribution system Node 18202530 AI

U 12gtPPN gt 042 Low-voltage exceeding limits

IEEE 33-bus standard distribution system Node 18202530 AII

U

Single-phaseΔPP0 gt 01 High-voltage exceeding limits

Single-machine (DG) infinite powersystem DG access node AIII

U 12gtPPN gt 05 Power fluctuation andresonance

Complexity 11

mitigation strategiesrdquo in Proceedings of the 2017 70th AnnualConference for Protective Relay Engineers (CPRE) pp 1ndash8College Station TX USA April 2017

[9] R Langner ldquoTo kill a centrifuge a technical analysis of whatStuxnetrsquos creators tried to achieverdquo Technical Report LangnerCommunications Norderstedt Germany 2013

[10] J E Sullivan and D Kamensky ldquoHow cyber-attacks inUkraine show the vulnerability of the US power gridrdquo 3eElectricity Journal vol 30 no 3 pp 30ndash35 2017

[11] R M Lee M J Assante and T Conway Analysis of the CyberAttack on the Ukrainian Power Grid SANS Industrial ControlSystems Bethesda MD USA 2016

[12] C-C Sun A Hahn and C-C Liu ldquoCyber security of a powergrid state-of-the-artrdquo International Journal of ElectricalPower amp Energy Systems vol 99 no 4 pp 45ndash56 2018

[13] G Dan H Sandberg M Ekstedt and G Bjorkman ldquoChal-lenges in power system information securityrdquo IEEE SecurityPrivacy vol 10 no 4 pp 62ndash70 2012

[14] A Rasim I Yadigar and S Lyudmila ldquoCyber-physical sys-tems and their security issuesrdquo Computers in Industryvol 100 no 4 pp 212ndash223 2018

[15] P Dong Y Han X Guo and F Xie ldquoA systematic review ofstudies on cyber physical system securityrdquo InternationalJournal of Security and Its Applications vol 9 no 1pp 155ndash164 2015

[16] N Komninos E Philippou and A Pitsillides ldquoSurvey insmart grid and smart home security issues challenges andcountermeasuresrdquo IEEE Communications Surveys amp Tuto-rials vol 16 no 4 pp 1933ndash1954 2014

[17] A-H Mohsenian-Rad and A Leon-Garcia ldquoDistributed in-ternet-based load altering attacks against smart power gridsrdquoIEEE Transactions on Smart Grid vol 2 no 4 pp 667ndash6742011

[18] R Chen X Li and H Zhong ldquonovel online detection methodof data injection attack against dynamic state estimation insmart gridrdquo Neurocomputing vol 344 no 7 pp 73ndash81 2019

[19] C Fei C Patsios P C Taylor and Z Pourmirza ldquoUsing self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemesrdquo IEEE Transactionson Smart Grid vol 10 no 3 pp 3010ndash3019 2019

[20] S Khan R Khan and A H Al-Bayatti ldquoSecure communi-cation architecture for dynamic energy management in smartgridrdquo IEEE Power and Energy Technology Systems Journalvol 6 no 1 pp 47ndash58 2019

[21] S Saleh M Prateek and P H Vincent ldquoBlackIoT IoT botnetof high wattage devices can disrupt the power gridrdquo inProceedings of the 27th USENIX Security Symposium(USENIX Security 18) pp 15ndash32 Baltimore MD USA May2018

[22] Z Dong M Tian and L Ding ldquoA framework for modelingand structural vulnerability analysis of spatial cyber-physicalpower systems from an attack-defense perspectiverdquo IEEESystems Journal pp 1ndash12 2020

[23] T N Boutsika and S A Papathanassiou ldquoShort-circuit cal-culations in networks with distributed generationrdquo ElectricPower Systems Research vol 78 no 7 pp 1181ndash1191 2008

[24] V V S N Murty and A Kumar ldquoOptimal placement of DGin radial distribution systems based on new voltage stabilityindex under load growthrdquo International Journal of ElectricalPower amp Energy Systems vol 69 no 3 pp 246ndash256 2015

[25] V C Nikolaidis E Papanikolaou and A S Safigianni ldquoAcommunication-assisted overcurrent protection scheme forradial distribution systems with distributed generationrdquo IEEETransactions on Smart Grid vol 7 no 1 pp 114ndash123 2016

[26] K Clement-Nyns E Haesen and J Driesen ldquo+e impact ofcharging plug-in hybrid electric vehicles on a residentialdistribution gridrdquo IEEE Transactions on Power Systemsvol 25 no 1 pp 371ndash380 2010

[27] J Munkhammar P Grahn and J Widen ldquoQuantifying self-consumption of on-site photovoltaic power generation inhouseholds with electric vehicle home chargingrdquo Solar En-ergy vol 97 no 6 pp 208ndash216 2013

[28] M Singh P Kumar and I Kar ldquoA multi charging station forelectric vehicles and its utilization for load management andthe grid supportrdquo IEEE Transactions on Smart Grid vol 4no 2 pp 1026ndash1037 2013

[29] M P Moghaddam A Abdollahi and M RashidinejadldquoFlexible demand response programs modeling in competi-tive electricity marketsrdquo Applied Energy vol 88 no 9pp 3257ndash3269 2011

[30] D Adrian J Ullrich and E R Weippl ldquoGrid shock coor-dinated load-changing attacks on power grids the non-smartpower grid is vulnerable to cyber attacks as wellrdquo in Pro-ceedings of the 33rd Annual Computer Security ApplicationsConference pp 303ndash314 Orlando FL USA September 2017

[31] G M Zhang et al ldquoDolphinattack inaudible voice com-mandsrdquo in Proceedings of the 2017 ACM SIGSAC Conferenceon Computer and Communications Security pp 103ndash117Dallas TX USA November 2017

[32] E Bou-Harb C Fachkha M Pourzandi M Debbabi andC Assi ldquoCommunication security for smart grid distributionnetworksrdquo IEEE Communications Magazine vol 51 no 1pp 42ndash49 2013

[33] X Chen ldquoIndustrial control network information securitythreats and vulnerability analysis and researchrdquo ComputerScience vol 39 no 10 pp 4188ndash4190 2012

[34] W Knowles D Prince D Hutchison and K Jones ldquoA surveyof cyber security management in industrial control systemsrdquoInternational Journal of Critical Infrastructure Protectionvol 9 no 1 pp 52ndash80 2015

[35] C-W Disso C-C Liu and G Manimaran ldquoVulnerabilityassessment of cybersecurity for SCADA systemsrdquo IEEETransactions on Power Systems vol 23 no 4 pp 1836ndash18462008

[36] L Sankar S R Rajagopalan S Mohajer and H V PoorldquoSmart meter privacy a theoretical frameworkrdquo IEEETransactions on Smart Grid vol 4 no 2 pp 837ndash846 2013

[37] M Li and H-J Lin ldquoDesign and implementation of smarthome control systems based on wireless sensor networks andpower line communicationsrdquo IEEE Transactions on IndustrialElectronics vol 62 no 7 pp 4430ndash4442 2015

12 Complexity

Page 3: Security Risk Analysis of Active Distribution Networks

remotely manipulate voice assistants such as Siri andHivoice in order to disrupt the distribution network oper-ation +e studies in [30 31] show that if the attackers canmaliciously control cell phones and send turn ldquoonrdquoldquooffrdquocommands to smart homes successfully it can result in aserious imbalance of the power flow in the 10 kV feeder lineand bring serious security risks to the safety and stableoperation of the distribution network To sum up there arefew literature works on the impacts of cyber attacks from theuser side on distribution networks

+rough the analysis of the above research status it canbe seen that there are few literature works considering thecyber security on the ADNs [32] +e large-scale access ofCLs and high-permeability access of DGs are inevitabletrends in the development of the distribution networks+erefore this paper analyzes the security threats faced bydistributed energy objects in ADNs and establishes controlmodels and attack models within ADNs +en we focus onthis problem through analyzing the impact of large-scale CLsbeing maliciously controlled on the ADNs and exploreabnormal operating characteristics of the ADNs caused bythe CLs being maliciously controlled Hence this paperdiscovers the risks of ADNs and provides a basis for theresearch of ADNsrsquo security control methods in order to helpthe further development of smart grids

+e rest of this paper is organized as follows In Section2 the security threat analysis is introduced Section 3considers cyber attacks with the control model and thecyber attack model in ADNs are proposed In Section 4 theimpact of large-scale CL attacks on ADNs is analyzed Fi-nally some conclusions are drawn in Section 5

2 Security Threat Analysis

According to types of load application CLs are divided intoindustrial controllable load and civil controllable loadSpecifically the industrial load is mainly controlled by theindustrial control system of the load side and the civil load ismainly controlled and used by residential users according todemand behavior

21 Safety 3reats to Industrial Controllable LoadIndustry is of great significance in Chinarsquos national econ-omy It is mainly engaged in large-scale production activ-ities and its electricity consumption accounts for about 70of the total social electricity consumption +e scale of in-dustrial load is very large and the concentration ratio is veryhigh In fact there is a corresponding control system whichis the industrial control system

A typical industrial control system is shown in Figure 1which consists of an enterprise information network pro-cess control network and field control network +e en-terprise information network has traditional IT networkattributes such as mail sending and receiving feature webbrowsing feature enterprise resource planning (ERP) andmanufacturing execution system (MES) +e middle processcontrol network is the bridge and link connecting the upperand lower layers of the network On the one hand it controls

and dispatches the field control equipment at the bottomaccording to the upper-level production instructions and onthe other hand it conducts real-time monitoring and datastatistics on the production situation of the industrial siteand provides information feedback for upper-level regula-tion+e field control network is located at the bottom of theindustrial control system which includes PLC (program-mable logic controller) PAC (programmable automationcontroller) RTU (remote terminal unit) IED (intelligentelectronic device) actuator and other control equipment

In the past industrial control systems were physicallyisolated from external networks +e development andpopularization of information communication technology(ICT) has made the field of industrial control increasinglyopen and its degree of interaction with the information fieldhas also increased However the internal network of theindustrial control system does not perform encryptioncontrol on the data flow Usually as long as the user entersthe internal network any of the network equipment can beaccessed which also leads to a drop in network security [33]In addition because industrial control mainly considersfunctionality the system behavior characteristics based onthis principle and the role characteristics of behavior controlpersonnel are more likely to become the entry point forattackers to intrude into the control system

+e requirement of industrial intelligence has pro-moted the development of open control systems withmodular reconfigurable and expandable characteristics+e control network of the open control system has theopening characters For example the core components ofthe open control system are the industrial PC which arebased on the Windows-Intel platform And the industrialethernet is widely used for communication between thecomponents At the same time the BUS technologyapplies embedded systems to field control instruments[34] In the abovementioned cases there are loopholes inmany systems such as PC operation system communi-cation protocol with TCPIP and the embedded opera-tion system Meanwhile the security protection measureof the industrial control system is mainly based on iso-lation from other systems but the underlying security ismore vulnerable than other information systems and it isnot subject to the information security policy of the gridmanagement department +erefore the industrial con-trollable load is extremely vulnerable to be attacked byinternal workers or external attackers [35] and this inturn makes the stable operation of the distributionnetwork affected

22 Security 3reats to Civil Controllable Load +e civilcontrollable load is represented by smart homes Smarthome takes residential buildings as the platform uses theIoT technology (including integrated wiring technologynetwork communication technology and automatic controltechnology) to realize the interconnection of control ter-minals and smart homes and realizes information exchangethrough the control platform +e control core of the smarthome is the control platform which is implemented by an

Complexity 3

embeddedmicroprocessor and can be connected to a controlterminal (mobile phone or PC) via the Internet to achieveremote control +e control system of the smart homeadopts a three-layer structure design [36] As shown inFigure 2 the core is the control platform which is imple-mented by an embedded microprocessor It can be con-nected to the control terminal (mobile phone or PC) via theInternet for remote controlling [37] However the smarthome control system has almost few security protectionmeasures According to the characteristics of networkcomposition the attacker has two attack paths+e first pathis to use the loopholes of the embedded system implantmalicious codes into the control platform through the publicnetwork and directly attack the internal network of thecontrol system to make the smart home work in an ab-normal condition +e second path is to intrude the userrsquoscontrol terminal At this point the attackers implantmalicious codes into smart terminals such as mobile phonesand PCs and the terminal issues abnormal control com-mands to the control platform which eventually leads toabnormal behavior of the smart homesWhen the number ofthe maliciously controlled smart homes is large enough itleads to the change in load of the distribution networkssuddenly and it may affect the reliability of power supply andpower quality

In summary because the industry plays an importantrole in the national economy the information securityprotection requirements of industrial control systems arerelatively high which leads to the cost of attacks becomehigh accordingly Most of the civil CLs represented by smarthomes are not embedded with security mechanisms andthey can be connected to the public network with a longonline time Hence the cost of the attack becomes extremelylow and the purpose of the attack is easy to realizeCompared with industry load the security risk of CLs is verylow If a large-scale CL is subjected to malicious control andchanges due to the objective and unpredictable capacity itwill inevitably impact the normal operation of the distri-bution networks and may even cause cascading failures and

Enterprise information network

Process control network

Field control network

Historydatabase

server

Real-timedatabase

serverEngineerstation

Industrialfirewall

SCADAclient

Historylibraryclient

Enterprisemanagement

client

MES

PLC PAC RTU IED

Internet

Enterpriseadministration

SCADAserver

Engineering configuration

Enterprise firewall

Figure 1 Industrial control system

Controlplatform

PCmobilephone

Smartappliance

Internet

Homenetwork

Outsidenetwork

Figure 2 Smart home control system

4 Complexity

expand the scope of influence +erefore this paper selectsCLs as the object of cyber attack for subsequent research andanalysis

3 Considering Cyber Attack with the ControlModel and the Cyber Attack Model in ADNs

31 Control Model +e evaluation index of the distributionnetwork includes power supply reliability economy secu-rity and power quality which are called the controlledvariable and are represented by S In general these con-trolled variables are determined by the electric powercompany such as protection action dispatching controland user behavior +e connection of distributed energyobjects has increased the initiative of the distribution net-work and promoted the development of control methoddiversity Once large-scale distributed energy objects arecontrolled by the attackers the dynamic balance of thedistribution network may be disrupted which can affect thenormal operation of the distribution network Attack be-havior is different from normal dispatching protection anduser behavior because it is unpredictable +erefore thedistribution network control model with CL is shown inFigure 3 and the controlled variable is as follows

S f(g d u A) (1)

Here g is the protection action d isthe dispatchingcontrol u is the normal user behavior and A is an attackbehavior

Equation (1) is a nonlinear equation +e solution of theequation is related to the input (g d u A) and the initialstate of the distribution network In the traditional distri-bution network there is no attack behavior against load anduser behavior is reflected in daily life and production ac-tivities It is a random variable that conforms to a certain lawIn the meantime the distribution network is mainly con-trolled by dispatching and protection action According tothe state-detection variable the dispatching system andprotection device control the distribution network whichensures that the controlled variable Smeets the requirementsof the stable operation of the distribution network In thedistribution network with CLs the added attack behavior isissued by the attackers and the distributed energy object isused as the attack object +erefore the DG and load dy-namic balance are broken and it is also not regulated by thepower company Finally it may cause the controlledquantity S to deviate from the requirements of security andstable operation of the distribution network causing safeand stable accidents

32 Attack Model +e cyber attack model contains cyberelement M T and physical element P(t) and is defined as adouble set Au which represents the impact mechanism ofthe attack from the cyber space and acts on the physicalspace +e attack model in which the CLs are maliciouslycontrolled can be expressed as follows

Au M T ⟶ P(t) (2)

Here M is the control command which is sent by theattackers such as ldquoonrdquoldquooffrdquo represented as command MonMoff namelyM MonMoff Next T is the sending timeof the control command because the sending time of thecyber command has discrete characteristics so let T t[n]where n 0 1 2 n and t[n] could be the sequence of timewhich is sent from the control command When large-scaleCLs are maliciously controlled by cyber attacks they aredirectly manifested as changes in the distribution networkload P(t) is used to represent the load of the distributionnetwork and the symbol ldquo⟶rdquo represents the mappingrelationship between the cyber attack of the informationsystem and the load change of the power system

Consider that after the malicious control commands areissued some loads do not change the operating state So theeffective load control rate α is introduced consider that thenetwork delay and other factors may cause some controlcommands to be invalid and an effective attack rate β isintroduced So P(t) is composed of the normal operatingload P0(t) and abnormal operating load ΔP(t) Hence theabnormal operating load ΔP(t) can be expressed as follows

ΔP(t) αβP0(t) (3)

In this paper we consider the abnormal operationperformance of CLs such as loads castingdropping syn-chronously or frequent and synchronous casting anddropping and based on these performances we classify theattacks into three categories accordingly +e details are asfollows

321 Attack of Loads Casting Synchronously At a certainpoint attackers send Mon (synchronously ldquoonrdquo MMon)commands to massive CLs And attack behavior can beexpressed asAI

u In the meantime P(t) increases immedi-ately which can be expressed as follows

P(t) P0(t) + ΔP(t) P0(t) + αβP0(t) (4)

In the sequence t[n] of control command-sending timen 0 is the simplest form of attack of loads casting syn-chronously when nne 0 the attack is to keep sending theMon

Distributedenergy storage

Controllableload

UsersGuidance

Attacker

Activedistribution

network

Dispatching

g u A

Electric power company

Protection

Distributedgeneration

d

Figure 3 Distribution network control model with CLs

Complexity 5

command and the ADN is kept in a high-load state for a longtime

322 Attack of Loads Dropping Synchronously At a certainpoint attackers send Moff (synchronously ldquooffrdquo MMoff)commands to massive CLs And attack behavior can beexpressed as AII

u In the meantime P(t) reduces immedi-ately which can be expressed as follows

P(t) P0(t) minus ΔP(t) P0(t) minus αβP0(t) (5)

In the sequence t[n] of control command-sending timen 0 is the simplest form of attack of loads dropping syn-chronously when nne 0 the attack is to keep sending theldquoMoffrdquo command and the ADN is kept in a low-load state fora long time

323 Attack of Loads of Frequent and Synchronous Castingand Dropping Attackers sendMon andMoff (frequently andsynchronously ldquoon and offrdquo MMon and Moff) commandsperiodically to massiv CLs which leads to frequent andsynchronous casting and dropping of loads And attackbehavior can be expressed as AIII

u In the meantime P(t)

increases and drops frequently and synchronously If wedefine Mon command at t [2i] and send Moff commandwhile t [2i + 1] the control command M can be expressedas follows

M Mon T [2i]

Moff T t[2i + 1]1113896 i 0 1 2 (6)

At first attackers send Mon command at t [2i] and theP(t) will be increased αβP0(t) +en attackers send Moffcommand while t [2i+1] and P(t) will be increasedαβP0(t) because CLs can be controlled by attackers AtMoffcommand α 1 and P(t) will be reduced toβP0(t)+erefore P(t) can be expressed as follows

P(t) P0(t) + αβP0(t) t isin (t[2i])

P0(t) + αβP0(t) minus βP0(t) t isin (t[2i + 1])1113896 i 0 1 2

(7)

+e attackers through setting the time interval τ (τ t[n]minus t[nminus 1] n 1 2 3 ) in the attack command M canchange the casting and dropping frequency of CLs and leadto abnormal performance of those CLs It may also causeproblems such as resonance in serious cases

4 Analysis on the Impact of Large-Scale CLAttacks on ADNs

+e risk of the ADNs was greatly increased when the large-scale CLs were controlled by attackers and the power qualitymay also be affected +e attack also resulted in abnormalpower consumption of the users and damaged the powersupply equipment in severe cases +erefore we take theimpact of attacks on power quality as an example and the10KV IEEE 33-bus standard distribution system was used asthe study case as shown in Figure 4 Finally we consider a

single DG connected at the end of the line and analyze theimpact of the malicious attacks

41 Impact of Load-Casting Attack on Power QualityScenario 1 node 18 of the IEEE 33-bus standard distributionsystem is connected to the DG and the penetration rate is100 Nodes 18 20 25 and 30 suffered AI

u attacks (n 0and ΔPP0 1)

+e node branchmodel in the ADN is shown in Figure 5+e power flow of branch bij is from node i to node j Basedon power flow calculation the voltage of node j can beexpressed as follows

Vj Vi minus ΔV Vi minusPjRij + QjXij

VN

(8)

Here ΔV is the branch voltage drop and VNis thenominal voltage Pj and Qj are the active and reactive powerof node j respectively Rij and Xij are the resistance andreactance of the branch (i j) respectively According to thestructural parameters of the ADN and the voltage of thepower supply terminal the voltage of each node can becalculated When the ADN suffered AI

u attacks and lead toincrease of the node load the line voltage dropped very fastand the receiving terminal voltage would also be decreasingand so low-voltage overruns may occur According to powerquality specifications the allowable deviation of 10 kV uservoltage is plusmn7 of the system nominal voltage

We assume that the load is twice the normal operatingstate after the attacks and PPN 065 at this moment Asshown in Figure 6 we obtain the node voltage situationcurves which represent the suffered distribution networkbefore and after the attacks According to the analysis of thenode voltage situation curves due to the increase of the loadcaused by the malicious attacks the voltage of each node hasdropped and caused addition of four new low-voltageoverlimit nodes and the power quality had been dropped aswell After further calculation when PPN gt 052 after theattacks which led to the increase in the low-voltage out-of-limit node number the power quality of these nodes doesnot meet the standard power quality

Compared with the attack scenario of DG connected tothe standard distribution system the attackers need to attacka large-scale CL to make the voltage deviation go beyond thestandard range In addition the newly added low-voltageoverlimit nodes are on branches that do not include DGBecause the voltage is increased by the DG after the cyberattacks the voltage of the nodes with DG supply branches isat the allowable range of deviation

We compare the node voltage distribution of the sufferedbranch before and after the attacks with the traditionaldistribution network under the same type of the attack Asshown in Figure 7 the conclusions can be drawn as follows

(1) If the power line already contains DG and not con-sidering the off-grid status when it is subjected to AI

u

attack against CLs the DG can be leveraged to improvethe power quality of the distribution network and theline is not prone to low-voltage phenomenon

6 Complexity

(2) If the line contains DG and considering the off-linestatus when it is subjected to AI

u attack against CLsDGmay be out of operation after the attacks becauseof poor operation environment and it can exacer-bate voltage dropping and reduce power quality

(3) If a DG is not connected to the power line when it issubjected to AI

u attack against CLs the operation ofthe DG can be used as an adjustment strategy toimprove power quality

42 Impact of LoadDroppingAttack onPowerQuality In thetraditional distribution network the voltage rise is causedby load dropping However there is only one power supplynode on the power side and it is also limited by the ref-erence voltage In the ADNs DG can also provide electricalenergy if the voltage rise caused by the load dropping itmay cause high voltage to exceed the limit and reducepower quality

Scenario 2 node 18 of the IEEE 33-bus standard dis-tribution system is connected to the DG and the penetrationrate is 100 Nodes 18 20 25 and 30 have suffered AII

u

attacks (n 0 ΔPP0 1)In order to ensure the normal operation of the ADN the

load balance of each phase should be considered when we setup distribution lines for users If there is load suffer due toAII

u attack in this area and it is not evenly distributed on eachphase line it will cause unhomogeneous load distribution oneach phase line and increases the degree of the three-phaseimbalance and while those disruptions are serious it willalso reduce the power quality

+e calculation of the three-term imbalance can beexpressed as follows

ε I2

I1times 100 (9)

Here I1 is the effective value of the positive sequencecomponent of the three-phase current and I2 is the effectivevalue of the negative sequence component of the three-phase

21 3 54 6 87 9 1110 12 13 14 1615 17 18

2019 21 22

26 27 28 29 3130 32 33

23 24 25

Figure 4 Diagram of IEEE 33-node standard distribution system

i j

Pi + jQi Pj + jQi

Vi Vj

Figure 5 +e node branch model

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34078080082084086088090092094096098100102

The voltage of ADNsrsquo nodes before attacksThe voltage of ADNsrsquo nodes after attacks

Node

Volta

ge p

er u

int

Figure 6 +e voltage unit value of ADN nodes before and after AIu

attack

Volta

ge p

er u

int

Node1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

11

105

1

095

09

085

08

Before suffering attack of ADNS

After suffering attack of ADNS

Before suffering attack of traditional distribution

After suffering attack of traditional distribution

Figure 7 +e voltage unit value of traditional ADN nodes beforeand after AI

u attack

Complexity 7

current In the low-voltage power distribution system theimbalance of the three-phase load current at the outlet of thedistribution transformer should be less than 10 For theconvenience of quantification assume that the attacked loadis concentrated in one phase that is single phase

In scenario 2 three-phase current on the secondary side ofthe transformer before and after the AII

uattack is obtainedthrough simulation as shown in Figure 8 Before the attack theeffective value of the three-phase current Ia Ib Ic 850A andthe degree of three-phase imbalance is 0 after the attack thethree-phase load is unbalanced Ia Ib 850A and Ic 525Aand the three-phase imbalance is 148 It can be seen that thethree-phase balance before and after the attack exceeds thestandard and the power quality does not meet the standardFurther calculation can be obtained when single-phaseΔPP0 01 and ε 10 It can be obtained that when single-phase ΔPP0 gt 01 the three-phase imbalance degree exceedsthe standard

If the imbalance degree of three-phase voltage becomesvery serious it will increase line and transformer loss si-multaneously and affect the safe operation of electricalequipment Supplying power under unbalanced voltageconditions may easily cause the userrsquos electrical equipmentwith a high-voltage one-phase connection to burn out whilethe userrsquos electrical equipment with a low-voltage one-phaseconnection may show abnormal work

+e suffered attack nodes dropped on a large scale in thedistribution network +e voltage distribution of each nodeis shown in Figure 9 It can be seen that after the AII

u attacksthe voltage of each node is increasing and the voltage perunit value of node 18 increases from 1057 to 1074 whichhas exceeded the allowable range of power quality voltagedeviation and results in reduced power quality

For the distribution network transformer the excessivevoltage not only reduced service life of transformers but itmay also cause resonance phenomena and harmonic pol-lution and disrupt other normally operating equipment Forelectrical equipment the excessive voltage can affect thenormal operation while the electrical equipment operatedwith high voltage for a long time would show reduction inservice life and increase in power consumption

To change the attack intensity the voltage of each node isshown in Figure 10 where the corresponding attack modesfrom decentralized attacks to no attacks of the curve aredescribed as follows

(1) +e decentralized attacks all the nodes with half ofthe load suffered the AII

u attacks(2) +e centralized large-scale attacks nodes 18 20 25

and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in large-scale load of attacked nodes tripping from the linePPN 0

(3) +e centralized small-scale attacks nodes 18 20 25and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in 50load of attacked nodes tripping from the line

(4) No attacks

Among them attack modes (1) and (2) caused thevoltage to exceed the limits and reduced the power qualityAlthough attack mode (3) raised the node voltage thevoltage deviation index of the power quality still satisfied thespecified range

If the ADNs within a certain attack scenario where thenode 22 is connected to the DG take this branch line as theanalysis object the voltage distribution of those nodes areshown in Figure 11 Although the node voltage increases arecaused by the synchronous dropping attacks the deviationindex of the voltage still satisfied the specified range

It can be seen that the deviation impact of AIIu attacks on

the load voltage of the distribution network is not onlyrelated to the attack intensity but also related to the topologyof the distribution network

43 Impact of Frequent Casting and Dropping of Load AttacksonPowerQuality Due to the DGs the power systemmay besubjected to periodic disturbance of the load and it wouldcause power oscillation that is compelled resonance

Attack pointTime (s)

Curr

ent (

A)

15001000

5000

ndash1500ndash1000

ndash500

Ia Ib Ic

0 001 002 003 004 005 006

Figure 8 +ree-phase current on the secondary side of thetransformer before and after the AII

u attack

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34090

092

094

096

098

100

102

104

106

108

Volta

ge p

er u

int

Node

The voltage of ADNs nodes before attacksThe voltage of ADNs nodes aer attacks

Figure 9 +e voltage value of ADNsrsquo nodes before and after AIIu

attack

8 Complexity

low-frequency oscillation +e theory of compelled reso-nance low-frequency oscillation points out that regular smallperiodic disturbance in the system will cause the poweroscillation If the frequency of the disturbance is consistentwith the natural frequency of the system it will cause res-onance and the compelled oscillation amplitude of thesystem is the largest at this period

Assume that the DG is directly connected to the powergrid through the generator and select the connection node asa malicious attack object to construct a single-machineinfinite system As shown in Figure 12 the DG is connectedinto the distribution system through a 04 kV10 kV boostertransformer

To cast small-scale load while the system is runningstably with light load we can get the generator speed curveas shown in Figure 13 and the natural oscillation frequencyof the system is 167Hz

Scenario 3 the connection point of the DG suffered theAIII

u attack (t[0] 6 s and ΔPP0 1)To change the frequency of ldquocastingrdquoldquodroppingrdquo of the

load while the same-scale load is attacked we can obtainthe line power curve as shown in Figure 14 When thecommand ldquoonrdquoldquooffrdquo is sent at τ 03 s intervals as shownin Figure 14(a) the disturbance frequency is 167Hz Whenthe command ldquoonrdquoldquooffrdquo is sent at τ 026 s intervals as

shown in Figure 14(b) the disturbance frequency is187Hz When the command ldquoonrdquoldquooffrdquo is sent at τ 034 sintervals as shown in Figure 14(c) the disturbance fre-quency is 147Hz

Due to the disturbance frequency being equal to thenatural frequency of the system it results in the largestamplitude of the power fluctuation when the deviationbetween the disturbance frequency and the natural fre-quency of the system increases the power oscillationcurves can also be obtained but the amplitude of this oneis relatively small And the amplitude of power oscilla-tions is also related to the scales of the attack loadCompared with Figure 14(a) While the scale of the attackload becomes 50 the frequency of periodic disturbanceis still 167 Hz and the oscillation amplitude becomesrelatively small as shown in Figure 15

Node

Volta

ge p

er u

int

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

112

11

108

106

104

102

1

098

096

094

092

Centralized small-scale attacksNo attacks

Decentralized attacksCentralized large-scale attacks

Figure 10 +e voltage value of nodes before and after AIIu attack under different attack modes

Node

Volta

ge p

er u

int

1008100610041002

10998099609940992

1 2 19 20 21 22

After attack of ADNBefore attack of ADN

Figure 11 +e partial node voltage before and after AIIu attack

DG

Infinite power system

Figure 12 Single-machine (DG) infinite power system

1001

10005

1

09995

0999

6 65 7 75 8 85Ts

ltRotor speed wm (pu)gt

Figure 13 Rotation speed fluctuation after small disturbance

Complexity 9

In the traditional distribution network the load mainlyconsumes electrical energy passively and it is usually faraway from the generator with relatively scattered distri-bution and it is not easy to have large-scale synchronousldquocastingrdquoldquodroppingrdquo However with the development ofDG connected to the power grid and CLs it makes thedistance between the load and the generator become closerand the load would be maliciously controlled by the at-tackers If the large-scale CLs are maliciously controlled andthe frequency of periodic ldquocastingrdquo and ldquodroppingrdquo is closeto the natural frequency of the system it may amplify theimpact of power fluctuation and affect the power quality ofthe distribution network

44 Summary on the Influence of CLs byMalicious Control onADNs +e power quality impact of CLs maliciously con-trolled by attackers on ADNs can be summarized in Table 1Compared with the power quality of the distribution net-work without DG the DG connected to the power grid canbe leveraged to improve the power quality of the distributionnetworks such as improving the condition of low-voltagecross-limits However while the CLs suffered unpredictablecyber attacks it can result in dropping or casting of the large-scale CLs frequently and synchronously and the reliability ofthe distribution network is also reduced In summary thoseimpacts can cause power quality problems such as voltagedeviation and voltage fluctuation and even introduce new

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(a)

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(b)Ac

tive p

ower

uni

te v

alue

(pu)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(c)

Figure 14 +e active power oscillation curve of the line under different disturbance frequencies of (a) 167Hz (b) 187Hz and (c) 147Hz

Activ

e pow

er u

nite

val

ue (p

u)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

Figure 15 +e active power oscillation curve of line under small-scale load attack with a disturbance frequency of 167Hz

10 Complexity

power quality issues (such as forced resonance at low fre-quencies) In addition the impact of cyber attacks on thepower supply quality of ADNs is not only related to theattack modes but also related to the topology of the dis-tribution network (such as the connection points of DG) Inorder to ensure the normal operation of the ADNs the risksintroduced by cyber attacks must be considered

5 Conclusions

+e introduction of distributed energy objects and the fullapplication of communication technologies make distribu-tion networks face new security risks In this paper weanalyze the security risks of industrial CLs and civil CLs inthe distribution networks and compare the revenue and costof attacks from the perspective of attackers It can be seenthat the cyber attack against civil CLs can obtain a largeattack revenues with a small attack cost +en an ADNcontrol model considering cyber attacks is established andat the same time the attack behavior model is also estab-lished In these models it provides a clear representation ofthe attack object the attack method and the across-spaceimpact mechanism Taking power quality as an example theimpacts of AI

U AIIU and AIII

U attacks on ADNs are analyzedIn summary the result shows that DG connected to thepower grid can improve power quality but once large-scaleCLs are suffered by cyber attacks it may also cause powerquality problems and may introduce new problems such aslow-frequency compelled oscillation

In the future there is still a lot of work to be done againstthe potential security risks of the ADNs introduced bydistributed energy objects Based on the existing researchresults we can continue to study the impacts of cyber attacksagainst civil CL on the security and stable operation of theADNs such as refining attack models enriching attackscenarios and exploring the ADN operation characteristicsafter the attacks In order to provide a reference for thepower grid to improve its operation control strategy andformulate user-side cyber security standards we should fullygrasp the risks introduced by the CL to the ADNs In otherwords we can refer to the ADN security risk analysis of thescenario where the CLs have suffered malicious control andcarry out research on other energy objects in the ADNs asthe attack object In addition further research on the powergrid cascading failures caused by cyber attacks on distributedenergy objects can provide a reference for the security andstable operation of the entire power grid

Data Availability

+e data used to support the findings of this study arecurrently under embargo while the research findings arecommercialized Requests for data after publication of thisarticle will be considered by the corresponding author

Conflicts of Interest

+e authors declare that there are no conflicts of interestregarding the publication of this manuscript

Acknowledgments

+is work was supported by the Science and TechnologyProject of State Grid Corporation of China (Research onCooperative Situation Awareness and Active DefenseMethod of Cyber-Physical Power System for Cyber Attackno SGJSDK00KJJS1800315)

References

[1] QWangW Tai Y Tang andM Ni ldquoReview of the false datainjection attack against the cyber-physical power systemrdquo IETCyber-Physical Systems 3eory amp Applications vol 4 no 2pp 101ndash107 2019

[2] S Sridhar A Hahn and M Govindarasu ldquoCyber-physicalsystem security for the electric power gridrdquo Proceedings of theIEEE vol 100 no 1 pp 210ndash224 2012

[3] M S Mahmoud M M Hamdan and U A BaroudildquoModeling and control of cyber-physical systems subject tocyber attacks a survey of recent advances and challengesrdquoNeurocomputing vol 338 no 2 pp 101ndash115 2019

[4] R Liu C Vellaithurai S S Biswas T T Gamage andA K Srivastava ldquoAnalyzing the cyber-physical impact ofcyber events on the power gridrdquo IEEE Transactions on SmartGrid vol 6 no 5 pp 2444ndash2453 2015

[5] Y Cai Y Cao Y Li T Huang and B Zhou ldquoCascadingfailure analysis considering interaction between power gridsand communication networksrdquo IEEE Transactions on SmartGrid vol 7 no 1 pp 530ndash538 2016

[6] F Liang W Yu X Liu D Griffith and N Golmie ldquoTowardedge-based deep learning in industrial Internet of thingsrdquoIEEE Internet of 3ings Journal vol 7 no 5 pp 4329ndash43412020

[7] Z Wang M Rahnamay-Naeini J M Abreu et al ldquoImpacts ofoperatorsrsquo behavior on reliability of power grids duringcascading failuresrdquo IEEE Transactions on Power Systemsvol 33 no 6 pp 6013ndash6024 2018

[8] D E Whitehead K Owens D Gammel and J SmithldquoUkraine cyber-induced power outage analysis and practical

Table 1 Distribution network control model with CLs

Attack behaviors (A)Risk

Scenarios Attack object Type of attack Scale

IEEE 33-bus standard distribution system Node 18202530 AI

U 12gtPPN gt 042 Low-voltage exceeding limits

IEEE 33-bus standard distribution system Node 18202530 AII

U

Single-phaseΔPP0 gt 01 High-voltage exceeding limits

Single-machine (DG) infinite powersystem DG access node AIII

U 12gtPPN gt 05 Power fluctuation andresonance

Complexity 11

mitigation strategiesrdquo in Proceedings of the 2017 70th AnnualConference for Protective Relay Engineers (CPRE) pp 1ndash8College Station TX USA April 2017

[9] R Langner ldquoTo kill a centrifuge a technical analysis of whatStuxnetrsquos creators tried to achieverdquo Technical Report LangnerCommunications Norderstedt Germany 2013

[10] J E Sullivan and D Kamensky ldquoHow cyber-attacks inUkraine show the vulnerability of the US power gridrdquo 3eElectricity Journal vol 30 no 3 pp 30ndash35 2017

[11] R M Lee M J Assante and T Conway Analysis of the CyberAttack on the Ukrainian Power Grid SANS Industrial ControlSystems Bethesda MD USA 2016

[12] C-C Sun A Hahn and C-C Liu ldquoCyber security of a powergrid state-of-the-artrdquo International Journal of ElectricalPower amp Energy Systems vol 99 no 4 pp 45ndash56 2018

[13] G Dan H Sandberg M Ekstedt and G Bjorkman ldquoChal-lenges in power system information securityrdquo IEEE SecurityPrivacy vol 10 no 4 pp 62ndash70 2012

[14] A Rasim I Yadigar and S Lyudmila ldquoCyber-physical sys-tems and their security issuesrdquo Computers in Industryvol 100 no 4 pp 212ndash223 2018

[15] P Dong Y Han X Guo and F Xie ldquoA systematic review ofstudies on cyber physical system securityrdquo InternationalJournal of Security and Its Applications vol 9 no 1pp 155ndash164 2015

[16] N Komninos E Philippou and A Pitsillides ldquoSurvey insmart grid and smart home security issues challenges andcountermeasuresrdquo IEEE Communications Surveys amp Tuto-rials vol 16 no 4 pp 1933ndash1954 2014

[17] A-H Mohsenian-Rad and A Leon-Garcia ldquoDistributed in-ternet-based load altering attacks against smart power gridsrdquoIEEE Transactions on Smart Grid vol 2 no 4 pp 667ndash6742011

[18] R Chen X Li and H Zhong ldquonovel online detection methodof data injection attack against dynamic state estimation insmart gridrdquo Neurocomputing vol 344 no 7 pp 73ndash81 2019

[19] C Fei C Patsios P C Taylor and Z Pourmirza ldquoUsing self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemesrdquo IEEE Transactionson Smart Grid vol 10 no 3 pp 3010ndash3019 2019

[20] S Khan R Khan and A H Al-Bayatti ldquoSecure communi-cation architecture for dynamic energy management in smartgridrdquo IEEE Power and Energy Technology Systems Journalvol 6 no 1 pp 47ndash58 2019

[21] S Saleh M Prateek and P H Vincent ldquoBlackIoT IoT botnetof high wattage devices can disrupt the power gridrdquo inProceedings of the 27th USENIX Security Symposium(USENIX Security 18) pp 15ndash32 Baltimore MD USA May2018

[22] Z Dong M Tian and L Ding ldquoA framework for modelingand structural vulnerability analysis of spatial cyber-physicalpower systems from an attack-defense perspectiverdquo IEEESystems Journal pp 1ndash12 2020

[23] T N Boutsika and S A Papathanassiou ldquoShort-circuit cal-culations in networks with distributed generationrdquo ElectricPower Systems Research vol 78 no 7 pp 1181ndash1191 2008

[24] V V S N Murty and A Kumar ldquoOptimal placement of DGin radial distribution systems based on new voltage stabilityindex under load growthrdquo International Journal of ElectricalPower amp Energy Systems vol 69 no 3 pp 246ndash256 2015

[25] V C Nikolaidis E Papanikolaou and A S Safigianni ldquoAcommunication-assisted overcurrent protection scheme forradial distribution systems with distributed generationrdquo IEEETransactions on Smart Grid vol 7 no 1 pp 114ndash123 2016

[26] K Clement-Nyns E Haesen and J Driesen ldquo+e impact ofcharging plug-in hybrid electric vehicles on a residentialdistribution gridrdquo IEEE Transactions on Power Systemsvol 25 no 1 pp 371ndash380 2010

[27] J Munkhammar P Grahn and J Widen ldquoQuantifying self-consumption of on-site photovoltaic power generation inhouseholds with electric vehicle home chargingrdquo Solar En-ergy vol 97 no 6 pp 208ndash216 2013

[28] M Singh P Kumar and I Kar ldquoA multi charging station forelectric vehicles and its utilization for load management andthe grid supportrdquo IEEE Transactions on Smart Grid vol 4no 2 pp 1026ndash1037 2013

[29] M P Moghaddam A Abdollahi and M RashidinejadldquoFlexible demand response programs modeling in competi-tive electricity marketsrdquo Applied Energy vol 88 no 9pp 3257ndash3269 2011

[30] D Adrian J Ullrich and E R Weippl ldquoGrid shock coor-dinated load-changing attacks on power grids the non-smartpower grid is vulnerable to cyber attacks as wellrdquo in Pro-ceedings of the 33rd Annual Computer Security ApplicationsConference pp 303ndash314 Orlando FL USA September 2017

[31] G M Zhang et al ldquoDolphinattack inaudible voice com-mandsrdquo in Proceedings of the 2017 ACM SIGSAC Conferenceon Computer and Communications Security pp 103ndash117Dallas TX USA November 2017

[32] E Bou-Harb C Fachkha M Pourzandi M Debbabi andC Assi ldquoCommunication security for smart grid distributionnetworksrdquo IEEE Communications Magazine vol 51 no 1pp 42ndash49 2013

[33] X Chen ldquoIndustrial control network information securitythreats and vulnerability analysis and researchrdquo ComputerScience vol 39 no 10 pp 4188ndash4190 2012

[34] W Knowles D Prince D Hutchison and K Jones ldquoA surveyof cyber security management in industrial control systemsrdquoInternational Journal of Critical Infrastructure Protectionvol 9 no 1 pp 52ndash80 2015

[35] C-W Disso C-C Liu and G Manimaran ldquoVulnerabilityassessment of cybersecurity for SCADA systemsrdquo IEEETransactions on Power Systems vol 23 no 4 pp 1836ndash18462008

[36] L Sankar S R Rajagopalan S Mohajer and H V PoorldquoSmart meter privacy a theoretical frameworkrdquo IEEETransactions on Smart Grid vol 4 no 2 pp 837ndash846 2013

[37] M Li and H-J Lin ldquoDesign and implementation of smarthome control systems based on wireless sensor networks andpower line communicationsrdquo IEEE Transactions on IndustrialElectronics vol 62 no 7 pp 4430ndash4442 2015

12 Complexity

Page 4: Security Risk Analysis of Active Distribution Networks

embeddedmicroprocessor and can be connected to a controlterminal (mobile phone or PC) via the Internet to achieveremote control +e control system of the smart homeadopts a three-layer structure design [36] As shown inFigure 2 the core is the control platform which is imple-mented by an embedded microprocessor It can be con-nected to the control terminal (mobile phone or PC) via theInternet for remote controlling [37] However the smarthome control system has almost few security protectionmeasures According to the characteristics of networkcomposition the attacker has two attack paths+e first pathis to use the loopholes of the embedded system implantmalicious codes into the control platform through the publicnetwork and directly attack the internal network of thecontrol system to make the smart home work in an ab-normal condition +e second path is to intrude the userrsquoscontrol terminal At this point the attackers implantmalicious codes into smart terminals such as mobile phonesand PCs and the terminal issues abnormal control com-mands to the control platform which eventually leads toabnormal behavior of the smart homesWhen the number ofthe maliciously controlled smart homes is large enough itleads to the change in load of the distribution networkssuddenly and it may affect the reliability of power supply andpower quality

In summary because the industry plays an importantrole in the national economy the information securityprotection requirements of industrial control systems arerelatively high which leads to the cost of attacks becomehigh accordingly Most of the civil CLs represented by smarthomes are not embedded with security mechanisms andthey can be connected to the public network with a longonline time Hence the cost of the attack becomes extremelylow and the purpose of the attack is easy to realizeCompared with industry load the security risk of CLs is verylow If a large-scale CL is subjected to malicious control andchanges due to the objective and unpredictable capacity itwill inevitably impact the normal operation of the distri-bution networks and may even cause cascading failures and

Enterprise information network

Process control network

Field control network

Historydatabase

server

Real-timedatabase

serverEngineerstation

Industrialfirewall

SCADAclient

Historylibraryclient

Enterprisemanagement

client

MES

PLC PAC RTU IED

Internet

Enterpriseadministration

SCADAserver

Engineering configuration

Enterprise firewall

Figure 1 Industrial control system

Controlplatform

PCmobilephone

Smartappliance

Internet

Homenetwork

Outsidenetwork

Figure 2 Smart home control system

4 Complexity

expand the scope of influence +erefore this paper selectsCLs as the object of cyber attack for subsequent research andanalysis

3 Considering Cyber Attack with the ControlModel and the Cyber Attack Model in ADNs

31 Control Model +e evaluation index of the distributionnetwork includes power supply reliability economy secu-rity and power quality which are called the controlledvariable and are represented by S In general these con-trolled variables are determined by the electric powercompany such as protection action dispatching controland user behavior +e connection of distributed energyobjects has increased the initiative of the distribution net-work and promoted the development of control methoddiversity Once large-scale distributed energy objects arecontrolled by the attackers the dynamic balance of thedistribution network may be disrupted which can affect thenormal operation of the distribution network Attack be-havior is different from normal dispatching protection anduser behavior because it is unpredictable +erefore thedistribution network control model with CL is shown inFigure 3 and the controlled variable is as follows

S f(g d u A) (1)

Here g is the protection action d isthe dispatchingcontrol u is the normal user behavior and A is an attackbehavior

Equation (1) is a nonlinear equation +e solution of theequation is related to the input (g d u A) and the initialstate of the distribution network In the traditional distri-bution network there is no attack behavior against load anduser behavior is reflected in daily life and production ac-tivities It is a random variable that conforms to a certain lawIn the meantime the distribution network is mainly con-trolled by dispatching and protection action According tothe state-detection variable the dispatching system andprotection device control the distribution network whichensures that the controlled variable Smeets the requirementsof the stable operation of the distribution network In thedistribution network with CLs the added attack behavior isissued by the attackers and the distributed energy object isused as the attack object +erefore the DG and load dy-namic balance are broken and it is also not regulated by thepower company Finally it may cause the controlledquantity S to deviate from the requirements of security andstable operation of the distribution network causing safeand stable accidents

32 Attack Model +e cyber attack model contains cyberelement M T and physical element P(t) and is defined as adouble set Au which represents the impact mechanism ofthe attack from the cyber space and acts on the physicalspace +e attack model in which the CLs are maliciouslycontrolled can be expressed as follows

Au M T ⟶ P(t) (2)

Here M is the control command which is sent by theattackers such as ldquoonrdquoldquooffrdquo represented as command MonMoff namelyM MonMoff Next T is the sending timeof the control command because the sending time of thecyber command has discrete characteristics so let T t[n]where n 0 1 2 n and t[n] could be the sequence of timewhich is sent from the control command When large-scaleCLs are maliciously controlled by cyber attacks they aredirectly manifested as changes in the distribution networkload P(t) is used to represent the load of the distributionnetwork and the symbol ldquo⟶rdquo represents the mappingrelationship between the cyber attack of the informationsystem and the load change of the power system

Consider that after the malicious control commands areissued some loads do not change the operating state So theeffective load control rate α is introduced consider that thenetwork delay and other factors may cause some controlcommands to be invalid and an effective attack rate β isintroduced So P(t) is composed of the normal operatingload P0(t) and abnormal operating load ΔP(t) Hence theabnormal operating load ΔP(t) can be expressed as follows

ΔP(t) αβP0(t) (3)

In this paper we consider the abnormal operationperformance of CLs such as loads castingdropping syn-chronously or frequent and synchronous casting anddropping and based on these performances we classify theattacks into three categories accordingly +e details are asfollows

321 Attack of Loads Casting Synchronously At a certainpoint attackers send Mon (synchronously ldquoonrdquo MMon)commands to massive CLs And attack behavior can beexpressed asAI

u In the meantime P(t) increases immedi-ately which can be expressed as follows

P(t) P0(t) + ΔP(t) P0(t) + αβP0(t) (4)

In the sequence t[n] of control command-sending timen 0 is the simplest form of attack of loads casting syn-chronously when nne 0 the attack is to keep sending theMon

Distributedenergy storage

Controllableload

UsersGuidance

Attacker

Activedistribution

network

Dispatching

g u A

Electric power company

Protection

Distributedgeneration

d

Figure 3 Distribution network control model with CLs

Complexity 5

command and the ADN is kept in a high-load state for a longtime

322 Attack of Loads Dropping Synchronously At a certainpoint attackers send Moff (synchronously ldquooffrdquo MMoff)commands to massive CLs And attack behavior can beexpressed as AII

u In the meantime P(t) reduces immedi-ately which can be expressed as follows

P(t) P0(t) minus ΔP(t) P0(t) minus αβP0(t) (5)

In the sequence t[n] of control command-sending timen 0 is the simplest form of attack of loads dropping syn-chronously when nne 0 the attack is to keep sending theldquoMoffrdquo command and the ADN is kept in a low-load state fora long time

323 Attack of Loads of Frequent and Synchronous Castingand Dropping Attackers sendMon andMoff (frequently andsynchronously ldquoon and offrdquo MMon and Moff) commandsperiodically to massiv CLs which leads to frequent andsynchronous casting and dropping of loads And attackbehavior can be expressed as AIII

u In the meantime P(t)

increases and drops frequently and synchronously If wedefine Mon command at t [2i] and send Moff commandwhile t [2i + 1] the control command M can be expressedas follows

M Mon T [2i]

Moff T t[2i + 1]1113896 i 0 1 2 (6)

At first attackers send Mon command at t [2i] and theP(t) will be increased αβP0(t) +en attackers send Moffcommand while t [2i+1] and P(t) will be increasedαβP0(t) because CLs can be controlled by attackers AtMoffcommand α 1 and P(t) will be reduced toβP0(t)+erefore P(t) can be expressed as follows

P(t) P0(t) + αβP0(t) t isin (t[2i])

P0(t) + αβP0(t) minus βP0(t) t isin (t[2i + 1])1113896 i 0 1 2

(7)

+e attackers through setting the time interval τ (τ t[n]minus t[nminus 1] n 1 2 3 ) in the attack command M canchange the casting and dropping frequency of CLs and leadto abnormal performance of those CLs It may also causeproblems such as resonance in serious cases

4 Analysis on the Impact of Large-Scale CLAttacks on ADNs

+e risk of the ADNs was greatly increased when the large-scale CLs were controlled by attackers and the power qualitymay also be affected +e attack also resulted in abnormalpower consumption of the users and damaged the powersupply equipment in severe cases +erefore we take theimpact of attacks on power quality as an example and the10KV IEEE 33-bus standard distribution system was used asthe study case as shown in Figure 4 Finally we consider a

single DG connected at the end of the line and analyze theimpact of the malicious attacks

41 Impact of Load-Casting Attack on Power QualityScenario 1 node 18 of the IEEE 33-bus standard distributionsystem is connected to the DG and the penetration rate is100 Nodes 18 20 25 and 30 suffered AI

u attacks (n 0and ΔPP0 1)

+e node branchmodel in the ADN is shown in Figure 5+e power flow of branch bij is from node i to node j Basedon power flow calculation the voltage of node j can beexpressed as follows

Vj Vi minus ΔV Vi minusPjRij + QjXij

VN

(8)

Here ΔV is the branch voltage drop and VNis thenominal voltage Pj and Qj are the active and reactive powerof node j respectively Rij and Xij are the resistance andreactance of the branch (i j) respectively According to thestructural parameters of the ADN and the voltage of thepower supply terminal the voltage of each node can becalculated When the ADN suffered AI

u attacks and lead toincrease of the node load the line voltage dropped very fastand the receiving terminal voltage would also be decreasingand so low-voltage overruns may occur According to powerquality specifications the allowable deviation of 10 kV uservoltage is plusmn7 of the system nominal voltage

We assume that the load is twice the normal operatingstate after the attacks and PPN 065 at this moment Asshown in Figure 6 we obtain the node voltage situationcurves which represent the suffered distribution networkbefore and after the attacks According to the analysis of thenode voltage situation curves due to the increase of the loadcaused by the malicious attacks the voltage of each node hasdropped and caused addition of four new low-voltageoverlimit nodes and the power quality had been dropped aswell After further calculation when PPN gt 052 after theattacks which led to the increase in the low-voltage out-of-limit node number the power quality of these nodes doesnot meet the standard power quality

Compared with the attack scenario of DG connected tothe standard distribution system the attackers need to attacka large-scale CL to make the voltage deviation go beyond thestandard range In addition the newly added low-voltageoverlimit nodes are on branches that do not include DGBecause the voltage is increased by the DG after the cyberattacks the voltage of the nodes with DG supply branches isat the allowable range of deviation

We compare the node voltage distribution of the sufferedbranch before and after the attacks with the traditionaldistribution network under the same type of the attack Asshown in Figure 7 the conclusions can be drawn as follows

(1) If the power line already contains DG and not con-sidering the off-grid status when it is subjected to AI

u

attack against CLs the DG can be leveraged to improvethe power quality of the distribution network and theline is not prone to low-voltage phenomenon

6 Complexity

(2) If the line contains DG and considering the off-linestatus when it is subjected to AI

u attack against CLsDGmay be out of operation after the attacks becauseof poor operation environment and it can exacer-bate voltage dropping and reduce power quality

(3) If a DG is not connected to the power line when it issubjected to AI

u attack against CLs the operation ofthe DG can be used as an adjustment strategy toimprove power quality

42 Impact of LoadDroppingAttack onPowerQuality In thetraditional distribution network the voltage rise is causedby load dropping However there is only one power supplynode on the power side and it is also limited by the ref-erence voltage In the ADNs DG can also provide electricalenergy if the voltage rise caused by the load dropping itmay cause high voltage to exceed the limit and reducepower quality

Scenario 2 node 18 of the IEEE 33-bus standard dis-tribution system is connected to the DG and the penetrationrate is 100 Nodes 18 20 25 and 30 have suffered AII

u

attacks (n 0 ΔPP0 1)In order to ensure the normal operation of the ADN the

load balance of each phase should be considered when we setup distribution lines for users If there is load suffer due toAII

u attack in this area and it is not evenly distributed on eachphase line it will cause unhomogeneous load distribution oneach phase line and increases the degree of the three-phaseimbalance and while those disruptions are serious it willalso reduce the power quality

+e calculation of the three-term imbalance can beexpressed as follows

ε I2

I1times 100 (9)

Here I1 is the effective value of the positive sequencecomponent of the three-phase current and I2 is the effectivevalue of the negative sequence component of the three-phase

21 3 54 6 87 9 1110 12 13 14 1615 17 18

2019 21 22

26 27 28 29 3130 32 33

23 24 25

Figure 4 Diagram of IEEE 33-node standard distribution system

i j

Pi + jQi Pj + jQi

Vi Vj

Figure 5 +e node branch model

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34078080082084086088090092094096098100102

The voltage of ADNsrsquo nodes before attacksThe voltage of ADNsrsquo nodes after attacks

Node

Volta

ge p

er u

int

Figure 6 +e voltage unit value of ADN nodes before and after AIu

attack

Volta

ge p

er u

int

Node1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

11

105

1

095

09

085

08

Before suffering attack of ADNS

After suffering attack of ADNS

Before suffering attack of traditional distribution

After suffering attack of traditional distribution

Figure 7 +e voltage unit value of traditional ADN nodes beforeand after AI

u attack

Complexity 7

current In the low-voltage power distribution system theimbalance of the three-phase load current at the outlet of thedistribution transformer should be less than 10 For theconvenience of quantification assume that the attacked loadis concentrated in one phase that is single phase

In scenario 2 three-phase current on the secondary side ofthe transformer before and after the AII

uattack is obtainedthrough simulation as shown in Figure 8 Before the attack theeffective value of the three-phase current Ia Ib Ic 850A andthe degree of three-phase imbalance is 0 after the attack thethree-phase load is unbalanced Ia Ib 850A and Ic 525Aand the three-phase imbalance is 148 It can be seen that thethree-phase balance before and after the attack exceeds thestandard and the power quality does not meet the standardFurther calculation can be obtained when single-phaseΔPP0 01 and ε 10 It can be obtained that when single-phase ΔPP0 gt 01 the three-phase imbalance degree exceedsthe standard

If the imbalance degree of three-phase voltage becomesvery serious it will increase line and transformer loss si-multaneously and affect the safe operation of electricalequipment Supplying power under unbalanced voltageconditions may easily cause the userrsquos electrical equipmentwith a high-voltage one-phase connection to burn out whilethe userrsquos electrical equipment with a low-voltage one-phaseconnection may show abnormal work

+e suffered attack nodes dropped on a large scale in thedistribution network +e voltage distribution of each nodeis shown in Figure 9 It can be seen that after the AII

u attacksthe voltage of each node is increasing and the voltage perunit value of node 18 increases from 1057 to 1074 whichhas exceeded the allowable range of power quality voltagedeviation and results in reduced power quality

For the distribution network transformer the excessivevoltage not only reduced service life of transformers but itmay also cause resonance phenomena and harmonic pol-lution and disrupt other normally operating equipment Forelectrical equipment the excessive voltage can affect thenormal operation while the electrical equipment operatedwith high voltage for a long time would show reduction inservice life and increase in power consumption

To change the attack intensity the voltage of each node isshown in Figure 10 where the corresponding attack modesfrom decentralized attacks to no attacks of the curve aredescribed as follows

(1) +e decentralized attacks all the nodes with half ofthe load suffered the AII

u attacks(2) +e centralized large-scale attacks nodes 18 20 25

and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in large-scale load of attacked nodes tripping from the linePPN 0

(3) +e centralized small-scale attacks nodes 18 20 25and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in 50load of attacked nodes tripping from the line

(4) No attacks

Among them attack modes (1) and (2) caused thevoltage to exceed the limits and reduced the power qualityAlthough attack mode (3) raised the node voltage thevoltage deviation index of the power quality still satisfied thespecified range

If the ADNs within a certain attack scenario where thenode 22 is connected to the DG take this branch line as theanalysis object the voltage distribution of those nodes areshown in Figure 11 Although the node voltage increases arecaused by the synchronous dropping attacks the deviationindex of the voltage still satisfied the specified range

It can be seen that the deviation impact of AIIu attacks on

the load voltage of the distribution network is not onlyrelated to the attack intensity but also related to the topologyof the distribution network

43 Impact of Frequent Casting and Dropping of Load AttacksonPowerQuality Due to the DGs the power systemmay besubjected to periodic disturbance of the load and it wouldcause power oscillation that is compelled resonance

Attack pointTime (s)

Curr

ent (

A)

15001000

5000

ndash1500ndash1000

ndash500

Ia Ib Ic

0 001 002 003 004 005 006

Figure 8 +ree-phase current on the secondary side of thetransformer before and after the AII

u attack

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34090

092

094

096

098

100

102

104

106

108

Volta

ge p

er u

int

Node

The voltage of ADNs nodes before attacksThe voltage of ADNs nodes aer attacks

Figure 9 +e voltage value of ADNsrsquo nodes before and after AIIu

attack

8 Complexity

low-frequency oscillation +e theory of compelled reso-nance low-frequency oscillation points out that regular smallperiodic disturbance in the system will cause the poweroscillation If the frequency of the disturbance is consistentwith the natural frequency of the system it will cause res-onance and the compelled oscillation amplitude of thesystem is the largest at this period

Assume that the DG is directly connected to the powergrid through the generator and select the connection node asa malicious attack object to construct a single-machineinfinite system As shown in Figure 12 the DG is connectedinto the distribution system through a 04 kV10 kV boostertransformer

To cast small-scale load while the system is runningstably with light load we can get the generator speed curveas shown in Figure 13 and the natural oscillation frequencyof the system is 167Hz

Scenario 3 the connection point of the DG suffered theAIII

u attack (t[0] 6 s and ΔPP0 1)To change the frequency of ldquocastingrdquoldquodroppingrdquo of the

load while the same-scale load is attacked we can obtainthe line power curve as shown in Figure 14 When thecommand ldquoonrdquoldquooffrdquo is sent at τ 03 s intervals as shownin Figure 14(a) the disturbance frequency is 167Hz Whenthe command ldquoonrdquoldquooffrdquo is sent at τ 026 s intervals as

shown in Figure 14(b) the disturbance frequency is187Hz When the command ldquoonrdquoldquooffrdquo is sent at τ 034 sintervals as shown in Figure 14(c) the disturbance fre-quency is 147Hz

Due to the disturbance frequency being equal to thenatural frequency of the system it results in the largestamplitude of the power fluctuation when the deviationbetween the disturbance frequency and the natural fre-quency of the system increases the power oscillationcurves can also be obtained but the amplitude of this oneis relatively small And the amplitude of power oscilla-tions is also related to the scales of the attack loadCompared with Figure 14(a) While the scale of the attackload becomes 50 the frequency of periodic disturbanceis still 167 Hz and the oscillation amplitude becomesrelatively small as shown in Figure 15

Node

Volta

ge p

er u

int

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

112

11

108

106

104

102

1

098

096

094

092

Centralized small-scale attacksNo attacks

Decentralized attacksCentralized large-scale attacks

Figure 10 +e voltage value of nodes before and after AIIu attack under different attack modes

Node

Volta

ge p

er u

int

1008100610041002

10998099609940992

1 2 19 20 21 22

After attack of ADNBefore attack of ADN

Figure 11 +e partial node voltage before and after AIIu attack

DG

Infinite power system

Figure 12 Single-machine (DG) infinite power system

1001

10005

1

09995

0999

6 65 7 75 8 85Ts

ltRotor speed wm (pu)gt

Figure 13 Rotation speed fluctuation after small disturbance

Complexity 9

In the traditional distribution network the load mainlyconsumes electrical energy passively and it is usually faraway from the generator with relatively scattered distri-bution and it is not easy to have large-scale synchronousldquocastingrdquoldquodroppingrdquo However with the development ofDG connected to the power grid and CLs it makes thedistance between the load and the generator become closerand the load would be maliciously controlled by the at-tackers If the large-scale CLs are maliciously controlled andthe frequency of periodic ldquocastingrdquo and ldquodroppingrdquo is closeto the natural frequency of the system it may amplify theimpact of power fluctuation and affect the power quality ofthe distribution network

44 Summary on the Influence of CLs byMalicious Control onADNs +e power quality impact of CLs maliciously con-trolled by attackers on ADNs can be summarized in Table 1Compared with the power quality of the distribution net-work without DG the DG connected to the power grid canbe leveraged to improve the power quality of the distributionnetworks such as improving the condition of low-voltagecross-limits However while the CLs suffered unpredictablecyber attacks it can result in dropping or casting of the large-scale CLs frequently and synchronously and the reliability ofthe distribution network is also reduced In summary thoseimpacts can cause power quality problems such as voltagedeviation and voltage fluctuation and even introduce new

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(a)

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(b)Ac

tive p

ower

uni

te v

alue

(pu)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(c)

Figure 14 +e active power oscillation curve of the line under different disturbance frequencies of (a) 167Hz (b) 187Hz and (c) 147Hz

Activ

e pow

er u

nite

val

ue (p

u)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

Figure 15 +e active power oscillation curve of line under small-scale load attack with a disturbance frequency of 167Hz

10 Complexity

power quality issues (such as forced resonance at low fre-quencies) In addition the impact of cyber attacks on thepower supply quality of ADNs is not only related to theattack modes but also related to the topology of the dis-tribution network (such as the connection points of DG) Inorder to ensure the normal operation of the ADNs the risksintroduced by cyber attacks must be considered

5 Conclusions

+e introduction of distributed energy objects and the fullapplication of communication technologies make distribu-tion networks face new security risks In this paper weanalyze the security risks of industrial CLs and civil CLs inthe distribution networks and compare the revenue and costof attacks from the perspective of attackers It can be seenthat the cyber attack against civil CLs can obtain a largeattack revenues with a small attack cost +en an ADNcontrol model considering cyber attacks is established andat the same time the attack behavior model is also estab-lished In these models it provides a clear representation ofthe attack object the attack method and the across-spaceimpact mechanism Taking power quality as an example theimpacts of AI

U AIIU and AIII

U attacks on ADNs are analyzedIn summary the result shows that DG connected to thepower grid can improve power quality but once large-scaleCLs are suffered by cyber attacks it may also cause powerquality problems and may introduce new problems such aslow-frequency compelled oscillation

In the future there is still a lot of work to be done againstthe potential security risks of the ADNs introduced bydistributed energy objects Based on the existing researchresults we can continue to study the impacts of cyber attacksagainst civil CL on the security and stable operation of theADNs such as refining attack models enriching attackscenarios and exploring the ADN operation characteristicsafter the attacks In order to provide a reference for thepower grid to improve its operation control strategy andformulate user-side cyber security standards we should fullygrasp the risks introduced by the CL to the ADNs In otherwords we can refer to the ADN security risk analysis of thescenario where the CLs have suffered malicious control andcarry out research on other energy objects in the ADNs asthe attack object In addition further research on the powergrid cascading failures caused by cyber attacks on distributedenergy objects can provide a reference for the security andstable operation of the entire power grid

Data Availability

+e data used to support the findings of this study arecurrently under embargo while the research findings arecommercialized Requests for data after publication of thisarticle will be considered by the corresponding author

Conflicts of Interest

+e authors declare that there are no conflicts of interestregarding the publication of this manuscript

Acknowledgments

+is work was supported by the Science and TechnologyProject of State Grid Corporation of China (Research onCooperative Situation Awareness and Active DefenseMethod of Cyber-Physical Power System for Cyber Attackno SGJSDK00KJJS1800315)

References

[1] QWangW Tai Y Tang andM Ni ldquoReview of the false datainjection attack against the cyber-physical power systemrdquo IETCyber-Physical Systems 3eory amp Applications vol 4 no 2pp 101ndash107 2019

[2] S Sridhar A Hahn and M Govindarasu ldquoCyber-physicalsystem security for the electric power gridrdquo Proceedings of theIEEE vol 100 no 1 pp 210ndash224 2012

[3] M S Mahmoud M M Hamdan and U A BaroudildquoModeling and control of cyber-physical systems subject tocyber attacks a survey of recent advances and challengesrdquoNeurocomputing vol 338 no 2 pp 101ndash115 2019

[4] R Liu C Vellaithurai S S Biswas T T Gamage andA K Srivastava ldquoAnalyzing the cyber-physical impact ofcyber events on the power gridrdquo IEEE Transactions on SmartGrid vol 6 no 5 pp 2444ndash2453 2015

[5] Y Cai Y Cao Y Li T Huang and B Zhou ldquoCascadingfailure analysis considering interaction between power gridsand communication networksrdquo IEEE Transactions on SmartGrid vol 7 no 1 pp 530ndash538 2016

[6] F Liang W Yu X Liu D Griffith and N Golmie ldquoTowardedge-based deep learning in industrial Internet of thingsrdquoIEEE Internet of 3ings Journal vol 7 no 5 pp 4329ndash43412020

[7] Z Wang M Rahnamay-Naeini J M Abreu et al ldquoImpacts ofoperatorsrsquo behavior on reliability of power grids duringcascading failuresrdquo IEEE Transactions on Power Systemsvol 33 no 6 pp 6013ndash6024 2018

[8] D E Whitehead K Owens D Gammel and J SmithldquoUkraine cyber-induced power outage analysis and practical

Table 1 Distribution network control model with CLs

Attack behaviors (A)Risk

Scenarios Attack object Type of attack Scale

IEEE 33-bus standard distribution system Node 18202530 AI

U 12gtPPN gt 042 Low-voltage exceeding limits

IEEE 33-bus standard distribution system Node 18202530 AII

U

Single-phaseΔPP0 gt 01 High-voltage exceeding limits

Single-machine (DG) infinite powersystem DG access node AIII

U 12gtPPN gt 05 Power fluctuation andresonance

Complexity 11

mitigation strategiesrdquo in Proceedings of the 2017 70th AnnualConference for Protective Relay Engineers (CPRE) pp 1ndash8College Station TX USA April 2017

[9] R Langner ldquoTo kill a centrifuge a technical analysis of whatStuxnetrsquos creators tried to achieverdquo Technical Report LangnerCommunications Norderstedt Germany 2013

[10] J E Sullivan and D Kamensky ldquoHow cyber-attacks inUkraine show the vulnerability of the US power gridrdquo 3eElectricity Journal vol 30 no 3 pp 30ndash35 2017

[11] R M Lee M J Assante and T Conway Analysis of the CyberAttack on the Ukrainian Power Grid SANS Industrial ControlSystems Bethesda MD USA 2016

[12] C-C Sun A Hahn and C-C Liu ldquoCyber security of a powergrid state-of-the-artrdquo International Journal of ElectricalPower amp Energy Systems vol 99 no 4 pp 45ndash56 2018

[13] G Dan H Sandberg M Ekstedt and G Bjorkman ldquoChal-lenges in power system information securityrdquo IEEE SecurityPrivacy vol 10 no 4 pp 62ndash70 2012

[14] A Rasim I Yadigar and S Lyudmila ldquoCyber-physical sys-tems and their security issuesrdquo Computers in Industryvol 100 no 4 pp 212ndash223 2018

[15] P Dong Y Han X Guo and F Xie ldquoA systematic review ofstudies on cyber physical system securityrdquo InternationalJournal of Security and Its Applications vol 9 no 1pp 155ndash164 2015

[16] N Komninos E Philippou and A Pitsillides ldquoSurvey insmart grid and smart home security issues challenges andcountermeasuresrdquo IEEE Communications Surveys amp Tuto-rials vol 16 no 4 pp 1933ndash1954 2014

[17] A-H Mohsenian-Rad and A Leon-Garcia ldquoDistributed in-ternet-based load altering attacks against smart power gridsrdquoIEEE Transactions on Smart Grid vol 2 no 4 pp 667ndash6742011

[18] R Chen X Li and H Zhong ldquonovel online detection methodof data injection attack against dynamic state estimation insmart gridrdquo Neurocomputing vol 344 no 7 pp 73ndash81 2019

[19] C Fei C Patsios P C Taylor and Z Pourmirza ldquoUsing self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemesrdquo IEEE Transactionson Smart Grid vol 10 no 3 pp 3010ndash3019 2019

[20] S Khan R Khan and A H Al-Bayatti ldquoSecure communi-cation architecture for dynamic energy management in smartgridrdquo IEEE Power and Energy Technology Systems Journalvol 6 no 1 pp 47ndash58 2019

[21] S Saleh M Prateek and P H Vincent ldquoBlackIoT IoT botnetof high wattage devices can disrupt the power gridrdquo inProceedings of the 27th USENIX Security Symposium(USENIX Security 18) pp 15ndash32 Baltimore MD USA May2018

[22] Z Dong M Tian and L Ding ldquoA framework for modelingand structural vulnerability analysis of spatial cyber-physicalpower systems from an attack-defense perspectiverdquo IEEESystems Journal pp 1ndash12 2020

[23] T N Boutsika and S A Papathanassiou ldquoShort-circuit cal-culations in networks with distributed generationrdquo ElectricPower Systems Research vol 78 no 7 pp 1181ndash1191 2008

[24] V V S N Murty and A Kumar ldquoOptimal placement of DGin radial distribution systems based on new voltage stabilityindex under load growthrdquo International Journal of ElectricalPower amp Energy Systems vol 69 no 3 pp 246ndash256 2015

[25] V C Nikolaidis E Papanikolaou and A S Safigianni ldquoAcommunication-assisted overcurrent protection scheme forradial distribution systems with distributed generationrdquo IEEETransactions on Smart Grid vol 7 no 1 pp 114ndash123 2016

[26] K Clement-Nyns E Haesen and J Driesen ldquo+e impact ofcharging plug-in hybrid electric vehicles on a residentialdistribution gridrdquo IEEE Transactions on Power Systemsvol 25 no 1 pp 371ndash380 2010

[27] J Munkhammar P Grahn and J Widen ldquoQuantifying self-consumption of on-site photovoltaic power generation inhouseholds with electric vehicle home chargingrdquo Solar En-ergy vol 97 no 6 pp 208ndash216 2013

[28] M Singh P Kumar and I Kar ldquoA multi charging station forelectric vehicles and its utilization for load management andthe grid supportrdquo IEEE Transactions on Smart Grid vol 4no 2 pp 1026ndash1037 2013

[29] M P Moghaddam A Abdollahi and M RashidinejadldquoFlexible demand response programs modeling in competi-tive electricity marketsrdquo Applied Energy vol 88 no 9pp 3257ndash3269 2011

[30] D Adrian J Ullrich and E R Weippl ldquoGrid shock coor-dinated load-changing attacks on power grids the non-smartpower grid is vulnerable to cyber attacks as wellrdquo in Pro-ceedings of the 33rd Annual Computer Security ApplicationsConference pp 303ndash314 Orlando FL USA September 2017

[31] G M Zhang et al ldquoDolphinattack inaudible voice com-mandsrdquo in Proceedings of the 2017 ACM SIGSAC Conferenceon Computer and Communications Security pp 103ndash117Dallas TX USA November 2017

[32] E Bou-Harb C Fachkha M Pourzandi M Debbabi andC Assi ldquoCommunication security for smart grid distributionnetworksrdquo IEEE Communications Magazine vol 51 no 1pp 42ndash49 2013

[33] X Chen ldquoIndustrial control network information securitythreats and vulnerability analysis and researchrdquo ComputerScience vol 39 no 10 pp 4188ndash4190 2012

[34] W Knowles D Prince D Hutchison and K Jones ldquoA surveyof cyber security management in industrial control systemsrdquoInternational Journal of Critical Infrastructure Protectionvol 9 no 1 pp 52ndash80 2015

[35] C-W Disso C-C Liu and G Manimaran ldquoVulnerabilityassessment of cybersecurity for SCADA systemsrdquo IEEETransactions on Power Systems vol 23 no 4 pp 1836ndash18462008

[36] L Sankar S R Rajagopalan S Mohajer and H V PoorldquoSmart meter privacy a theoretical frameworkrdquo IEEETransactions on Smart Grid vol 4 no 2 pp 837ndash846 2013

[37] M Li and H-J Lin ldquoDesign and implementation of smarthome control systems based on wireless sensor networks andpower line communicationsrdquo IEEE Transactions on IndustrialElectronics vol 62 no 7 pp 4430ndash4442 2015

12 Complexity

Page 5: Security Risk Analysis of Active Distribution Networks

expand the scope of influence +erefore this paper selectsCLs as the object of cyber attack for subsequent research andanalysis

3 Considering Cyber Attack with the ControlModel and the Cyber Attack Model in ADNs

31 Control Model +e evaluation index of the distributionnetwork includes power supply reliability economy secu-rity and power quality which are called the controlledvariable and are represented by S In general these con-trolled variables are determined by the electric powercompany such as protection action dispatching controland user behavior +e connection of distributed energyobjects has increased the initiative of the distribution net-work and promoted the development of control methoddiversity Once large-scale distributed energy objects arecontrolled by the attackers the dynamic balance of thedistribution network may be disrupted which can affect thenormal operation of the distribution network Attack be-havior is different from normal dispatching protection anduser behavior because it is unpredictable +erefore thedistribution network control model with CL is shown inFigure 3 and the controlled variable is as follows

S f(g d u A) (1)

Here g is the protection action d isthe dispatchingcontrol u is the normal user behavior and A is an attackbehavior

Equation (1) is a nonlinear equation +e solution of theequation is related to the input (g d u A) and the initialstate of the distribution network In the traditional distri-bution network there is no attack behavior against load anduser behavior is reflected in daily life and production ac-tivities It is a random variable that conforms to a certain lawIn the meantime the distribution network is mainly con-trolled by dispatching and protection action According tothe state-detection variable the dispatching system andprotection device control the distribution network whichensures that the controlled variable Smeets the requirementsof the stable operation of the distribution network In thedistribution network with CLs the added attack behavior isissued by the attackers and the distributed energy object isused as the attack object +erefore the DG and load dy-namic balance are broken and it is also not regulated by thepower company Finally it may cause the controlledquantity S to deviate from the requirements of security andstable operation of the distribution network causing safeand stable accidents

32 Attack Model +e cyber attack model contains cyberelement M T and physical element P(t) and is defined as adouble set Au which represents the impact mechanism ofthe attack from the cyber space and acts on the physicalspace +e attack model in which the CLs are maliciouslycontrolled can be expressed as follows

Au M T ⟶ P(t) (2)

Here M is the control command which is sent by theattackers such as ldquoonrdquoldquooffrdquo represented as command MonMoff namelyM MonMoff Next T is the sending timeof the control command because the sending time of thecyber command has discrete characteristics so let T t[n]where n 0 1 2 n and t[n] could be the sequence of timewhich is sent from the control command When large-scaleCLs are maliciously controlled by cyber attacks they aredirectly manifested as changes in the distribution networkload P(t) is used to represent the load of the distributionnetwork and the symbol ldquo⟶rdquo represents the mappingrelationship between the cyber attack of the informationsystem and the load change of the power system

Consider that after the malicious control commands areissued some loads do not change the operating state So theeffective load control rate α is introduced consider that thenetwork delay and other factors may cause some controlcommands to be invalid and an effective attack rate β isintroduced So P(t) is composed of the normal operatingload P0(t) and abnormal operating load ΔP(t) Hence theabnormal operating load ΔP(t) can be expressed as follows

ΔP(t) αβP0(t) (3)

In this paper we consider the abnormal operationperformance of CLs such as loads castingdropping syn-chronously or frequent and synchronous casting anddropping and based on these performances we classify theattacks into three categories accordingly +e details are asfollows

321 Attack of Loads Casting Synchronously At a certainpoint attackers send Mon (synchronously ldquoonrdquo MMon)commands to massive CLs And attack behavior can beexpressed asAI

u In the meantime P(t) increases immedi-ately which can be expressed as follows

P(t) P0(t) + ΔP(t) P0(t) + αβP0(t) (4)

In the sequence t[n] of control command-sending timen 0 is the simplest form of attack of loads casting syn-chronously when nne 0 the attack is to keep sending theMon

Distributedenergy storage

Controllableload

UsersGuidance

Attacker

Activedistribution

network

Dispatching

g u A

Electric power company

Protection

Distributedgeneration

d

Figure 3 Distribution network control model with CLs

Complexity 5

command and the ADN is kept in a high-load state for a longtime

322 Attack of Loads Dropping Synchronously At a certainpoint attackers send Moff (synchronously ldquooffrdquo MMoff)commands to massive CLs And attack behavior can beexpressed as AII

u In the meantime P(t) reduces immedi-ately which can be expressed as follows

P(t) P0(t) minus ΔP(t) P0(t) minus αβP0(t) (5)

In the sequence t[n] of control command-sending timen 0 is the simplest form of attack of loads dropping syn-chronously when nne 0 the attack is to keep sending theldquoMoffrdquo command and the ADN is kept in a low-load state fora long time

323 Attack of Loads of Frequent and Synchronous Castingand Dropping Attackers sendMon andMoff (frequently andsynchronously ldquoon and offrdquo MMon and Moff) commandsperiodically to massiv CLs which leads to frequent andsynchronous casting and dropping of loads And attackbehavior can be expressed as AIII

u In the meantime P(t)

increases and drops frequently and synchronously If wedefine Mon command at t [2i] and send Moff commandwhile t [2i + 1] the control command M can be expressedas follows

M Mon T [2i]

Moff T t[2i + 1]1113896 i 0 1 2 (6)

At first attackers send Mon command at t [2i] and theP(t) will be increased αβP0(t) +en attackers send Moffcommand while t [2i+1] and P(t) will be increasedαβP0(t) because CLs can be controlled by attackers AtMoffcommand α 1 and P(t) will be reduced toβP0(t)+erefore P(t) can be expressed as follows

P(t) P0(t) + αβP0(t) t isin (t[2i])

P0(t) + αβP0(t) minus βP0(t) t isin (t[2i + 1])1113896 i 0 1 2

(7)

+e attackers through setting the time interval τ (τ t[n]minus t[nminus 1] n 1 2 3 ) in the attack command M canchange the casting and dropping frequency of CLs and leadto abnormal performance of those CLs It may also causeproblems such as resonance in serious cases

4 Analysis on the Impact of Large-Scale CLAttacks on ADNs

+e risk of the ADNs was greatly increased when the large-scale CLs were controlled by attackers and the power qualitymay also be affected +e attack also resulted in abnormalpower consumption of the users and damaged the powersupply equipment in severe cases +erefore we take theimpact of attacks on power quality as an example and the10KV IEEE 33-bus standard distribution system was used asthe study case as shown in Figure 4 Finally we consider a

single DG connected at the end of the line and analyze theimpact of the malicious attacks

41 Impact of Load-Casting Attack on Power QualityScenario 1 node 18 of the IEEE 33-bus standard distributionsystem is connected to the DG and the penetration rate is100 Nodes 18 20 25 and 30 suffered AI

u attacks (n 0and ΔPP0 1)

+e node branchmodel in the ADN is shown in Figure 5+e power flow of branch bij is from node i to node j Basedon power flow calculation the voltage of node j can beexpressed as follows

Vj Vi minus ΔV Vi minusPjRij + QjXij

VN

(8)

Here ΔV is the branch voltage drop and VNis thenominal voltage Pj and Qj are the active and reactive powerof node j respectively Rij and Xij are the resistance andreactance of the branch (i j) respectively According to thestructural parameters of the ADN and the voltage of thepower supply terminal the voltage of each node can becalculated When the ADN suffered AI

u attacks and lead toincrease of the node load the line voltage dropped very fastand the receiving terminal voltage would also be decreasingand so low-voltage overruns may occur According to powerquality specifications the allowable deviation of 10 kV uservoltage is plusmn7 of the system nominal voltage

We assume that the load is twice the normal operatingstate after the attacks and PPN 065 at this moment Asshown in Figure 6 we obtain the node voltage situationcurves which represent the suffered distribution networkbefore and after the attacks According to the analysis of thenode voltage situation curves due to the increase of the loadcaused by the malicious attacks the voltage of each node hasdropped and caused addition of four new low-voltageoverlimit nodes and the power quality had been dropped aswell After further calculation when PPN gt 052 after theattacks which led to the increase in the low-voltage out-of-limit node number the power quality of these nodes doesnot meet the standard power quality

Compared with the attack scenario of DG connected tothe standard distribution system the attackers need to attacka large-scale CL to make the voltage deviation go beyond thestandard range In addition the newly added low-voltageoverlimit nodes are on branches that do not include DGBecause the voltage is increased by the DG after the cyberattacks the voltage of the nodes with DG supply branches isat the allowable range of deviation

We compare the node voltage distribution of the sufferedbranch before and after the attacks with the traditionaldistribution network under the same type of the attack Asshown in Figure 7 the conclusions can be drawn as follows

(1) If the power line already contains DG and not con-sidering the off-grid status when it is subjected to AI

u

attack against CLs the DG can be leveraged to improvethe power quality of the distribution network and theline is not prone to low-voltage phenomenon

6 Complexity

(2) If the line contains DG and considering the off-linestatus when it is subjected to AI

u attack against CLsDGmay be out of operation after the attacks becauseof poor operation environment and it can exacer-bate voltage dropping and reduce power quality

(3) If a DG is not connected to the power line when it issubjected to AI

u attack against CLs the operation ofthe DG can be used as an adjustment strategy toimprove power quality

42 Impact of LoadDroppingAttack onPowerQuality In thetraditional distribution network the voltage rise is causedby load dropping However there is only one power supplynode on the power side and it is also limited by the ref-erence voltage In the ADNs DG can also provide electricalenergy if the voltage rise caused by the load dropping itmay cause high voltage to exceed the limit and reducepower quality

Scenario 2 node 18 of the IEEE 33-bus standard dis-tribution system is connected to the DG and the penetrationrate is 100 Nodes 18 20 25 and 30 have suffered AII

u

attacks (n 0 ΔPP0 1)In order to ensure the normal operation of the ADN the

load balance of each phase should be considered when we setup distribution lines for users If there is load suffer due toAII

u attack in this area and it is not evenly distributed on eachphase line it will cause unhomogeneous load distribution oneach phase line and increases the degree of the three-phaseimbalance and while those disruptions are serious it willalso reduce the power quality

+e calculation of the three-term imbalance can beexpressed as follows

ε I2

I1times 100 (9)

Here I1 is the effective value of the positive sequencecomponent of the three-phase current and I2 is the effectivevalue of the negative sequence component of the three-phase

21 3 54 6 87 9 1110 12 13 14 1615 17 18

2019 21 22

26 27 28 29 3130 32 33

23 24 25

Figure 4 Diagram of IEEE 33-node standard distribution system

i j

Pi + jQi Pj + jQi

Vi Vj

Figure 5 +e node branch model

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34078080082084086088090092094096098100102

The voltage of ADNsrsquo nodes before attacksThe voltage of ADNsrsquo nodes after attacks

Node

Volta

ge p

er u

int

Figure 6 +e voltage unit value of ADN nodes before and after AIu

attack

Volta

ge p

er u

int

Node1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

11

105

1

095

09

085

08

Before suffering attack of ADNS

After suffering attack of ADNS

Before suffering attack of traditional distribution

After suffering attack of traditional distribution

Figure 7 +e voltage unit value of traditional ADN nodes beforeand after AI

u attack

Complexity 7

current In the low-voltage power distribution system theimbalance of the three-phase load current at the outlet of thedistribution transformer should be less than 10 For theconvenience of quantification assume that the attacked loadis concentrated in one phase that is single phase

In scenario 2 three-phase current on the secondary side ofthe transformer before and after the AII

uattack is obtainedthrough simulation as shown in Figure 8 Before the attack theeffective value of the three-phase current Ia Ib Ic 850A andthe degree of three-phase imbalance is 0 after the attack thethree-phase load is unbalanced Ia Ib 850A and Ic 525Aand the three-phase imbalance is 148 It can be seen that thethree-phase balance before and after the attack exceeds thestandard and the power quality does not meet the standardFurther calculation can be obtained when single-phaseΔPP0 01 and ε 10 It can be obtained that when single-phase ΔPP0 gt 01 the three-phase imbalance degree exceedsthe standard

If the imbalance degree of three-phase voltage becomesvery serious it will increase line and transformer loss si-multaneously and affect the safe operation of electricalequipment Supplying power under unbalanced voltageconditions may easily cause the userrsquos electrical equipmentwith a high-voltage one-phase connection to burn out whilethe userrsquos electrical equipment with a low-voltage one-phaseconnection may show abnormal work

+e suffered attack nodes dropped on a large scale in thedistribution network +e voltage distribution of each nodeis shown in Figure 9 It can be seen that after the AII

u attacksthe voltage of each node is increasing and the voltage perunit value of node 18 increases from 1057 to 1074 whichhas exceeded the allowable range of power quality voltagedeviation and results in reduced power quality

For the distribution network transformer the excessivevoltage not only reduced service life of transformers but itmay also cause resonance phenomena and harmonic pol-lution and disrupt other normally operating equipment Forelectrical equipment the excessive voltage can affect thenormal operation while the electrical equipment operatedwith high voltage for a long time would show reduction inservice life and increase in power consumption

To change the attack intensity the voltage of each node isshown in Figure 10 where the corresponding attack modesfrom decentralized attacks to no attacks of the curve aredescribed as follows

(1) +e decentralized attacks all the nodes with half ofthe load suffered the AII

u attacks(2) +e centralized large-scale attacks nodes 18 20 25

and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in large-scale load of attacked nodes tripping from the linePPN 0

(3) +e centralized small-scale attacks nodes 18 20 25and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in 50load of attacked nodes tripping from the line

(4) No attacks

Among them attack modes (1) and (2) caused thevoltage to exceed the limits and reduced the power qualityAlthough attack mode (3) raised the node voltage thevoltage deviation index of the power quality still satisfied thespecified range

If the ADNs within a certain attack scenario where thenode 22 is connected to the DG take this branch line as theanalysis object the voltage distribution of those nodes areshown in Figure 11 Although the node voltage increases arecaused by the synchronous dropping attacks the deviationindex of the voltage still satisfied the specified range

It can be seen that the deviation impact of AIIu attacks on

the load voltage of the distribution network is not onlyrelated to the attack intensity but also related to the topologyof the distribution network

43 Impact of Frequent Casting and Dropping of Load AttacksonPowerQuality Due to the DGs the power systemmay besubjected to periodic disturbance of the load and it wouldcause power oscillation that is compelled resonance

Attack pointTime (s)

Curr

ent (

A)

15001000

5000

ndash1500ndash1000

ndash500

Ia Ib Ic

0 001 002 003 004 005 006

Figure 8 +ree-phase current on the secondary side of thetransformer before and after the AII

u attack

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34090

092

094

096

098

100

102

104

106

108

Volta

ge p

er u

int

Node

The voltage of ADNs nodes before attacksThe voltage of ADNs nodes aer attacks

Figure 9 +e voltage value of ADNsrsquo nodes before and after AIIu

attack

8 Complexity

low-frequency oscillation +e theory of compelled reso-nance low-frequency oscillation points out that regular smallperiodic disturbance in the system will cause the poweroscillation If the frequency of the disturbance is consistentwith the natural frequency of the system it will cause res-onance and the compelled oscillation amplitude of thesystem is the largest at this period

Assume that the DG is directly connected to the powergrid through the generator and select the connection node asa malicious attack object to construct a single-machineinfinite system As shown in Figure 12 the DG is connectedinto the distribution system through a 04 kV10 kV boostertransformer

To cast small-scale load while the system is runningstably with light load we can get the generator speed curveas shown in Figure 13 and the natural oscillation frequencyof the system is 167Hz

Scenario 3 the connection point of the DG suffered theAIII

u attack (t[0] 6 s and ΔPP0 1)To change the frequency of ldquocastingrdquoldquodroppingrdquo of the

load while the same-scale load is attacked we can obtainthe line power curve as shown in Figure 14 When thecommand ldquoonrdquoldquooffrdquo is sent at τ 03 s intervals as shownin Figure 14(a) the disturbance frequency is 167Hz Whenthe command ldquoonrdquoldquooffrdquo is sent at τ 026 s intervals as

shown in Figure 14(b) the disturbance frequency is187Hz When the command ldquoonrdquoldquooffrdquo is sent at τ 034 sintervals as shown in Figure 14(c) the disturbance fre-quency is 147Hz

Due to the disturbance frequency being equal to thenatural frequency of the system it results in the largestamplitude of the power fluctuation when the deviationbetween the disturbance frequency and the natural fre-quency of the system increases the power oscillationcurves can also be obtained but the amplitude of this oneis relatively small And the amplitude of power oscilla-tions is also related to the scales of the attack loadCompared with Figure 14(a) While the scale of the attackload becomes 50 the frequency of periodic disturbanceis still 167 Hz and the oscillation amplitude becomesrelatively small as shown in Figure 15

Node

Volta

ge p

er u

int

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

112

11

108

106

104

102

1

098

096

094

092

Centralized small-scale attacksNo attacks

Decentralized attacksCentralized large-scale attacks

Figure 10 +e voltage value of nodes before and after AIIu attack under different attack modes

Node

Volta

ge p

er u

int

1008100610041002

10998099609940992

1 2 19 20 21 22

After attack of ADNBefore attack of ADN

Figure 11 +e partial node voltage before and after AIIu attack

DG

Infinite power system

Figure 12 Single-machine (DG) infinite power system

1001

10005

1

09995

0999

6 65 7 75 8 85Ts

ltRotor speed wm (pu)gt

Figure 13 Rotation speed fluctuation after small disturbance

Complexity 9

In the traditional distribution network the load mainlyconsumes electrical energy passively and it is usually faraway from the generator with relatively scattered distri-bution and it is not easy to have large-scale synchronousldquocastingrdquoldquodroppingrdquo However with the development ofDG connected to the power grid and CLs it makes thedistance between the load and the generator become closerand the load would be maliciously controlled by the at-tackers If the large-scale CLs are maliciously controlled andthe frequency of periodic ldquocastingrdquo and ldquodroppingrdquo is closeto the natural frequency of the system it may amplify theimpact of power fluctuation and affect the power quality ofthe distribution network

44 Summary on the Influence of CLs byMalicious Control onADNs +e power quality impact of CLs maliciously con-trolled by attackers on ADNs can be summarized in Table 1Compared with the power quality of the distribution net-work without DG the DG connected to the power grid canbe leveraged to improve the power quality of the distributionnetworks such as improving the condition of low-voltagecross-limits However while the CLs suffered unpredictablecyber attacks it can result in dropping or casting of the large-scale CLs frequently and synchronously and the reliability ofthe distribution network is also reduced In summary thoseimpacts can cause power quality problems such as voltagedeviation and voltage fluctuation and even introduce new

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(a)

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(b)Ac

tive p

ower

uni

te v

alue

(pu)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(c)

Figure 14 +e active power oscillation curve of the line under different disturbance frequencies of (a) 167Hz (b) 187Hz and (c) 147Hz

Activ

e pow

er u

nite

val

ue (p

u)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

Figure 15 +e active power oscillation curve of line under small-scale load attack with a disturbance frequency of 167Hz

10 Complexity

power quality issues (such as forced resonance at low fre-quencies) In addition the impact of cyber attacks on thepower supply quality of ADNs is not only related to theattack modes but also related to the topology of the dis-tribution network (such as the connection points of DG) Inorder to ensure the normal operation of the ADNs the risksintroduced by cyber attacks must be considered

5 Conclusions

+e introduction of distributed energy objects and the fullapplication of communication technologies make distribu-tion networks face new security risks In this paper weanalyze the security risks of industrial CLs and civil CLs inthe distribution networks and compare the revenue and costof attacks from the perspective of attackers It can be seenthat the cyber attack against civil CLs can obtain a largeattack revenues with a small attack cost +en an ADNcontrol model considering cyber attacks is established andat the same time the attack behavior model is also estab-lished In these models it provides a clear representation ofthe attack object the attack method and the across-spaceimpact mechanism Taking power quality as an example theimpacts of AI

U AIIU and AIII

U attacks on ADNs are analyzedIn summary the result shows that DG connected to thepower grid can improve power quality but once large-scaleCLs are suffered by cyber attacks it may also cause powerquality problems and may introduce new problems such aslow-frequency compelled oscillation

In the future there is still a lot of work to be done againstthe potential security risks of the ADNs introduced bydistributed energy objects Based on the existing researchresults we can continue to study the impacts of cyber attacksagainst civil CL on the security and stable operation of theADNs such as refining attack models enriching attackscenarios and exploring the ADN operation characteristicsafter the attacks In order to provide a reference for thepower grid to improve its operation control strategy andformulate user-side cyber security standards we should fullygrasp the risks introduced by the CL to the ADNs In otherwords we can refer to the ADN security risk analysis of thescenario where the CLs have suffered malicious control andcarry out research on other energy objects in the ADNs asthe attack object In addition further research on the powergrid cascading failures caused by cyber attacks on distributedenergy objects can provide a reference for the security andstable operation of the entire power grid

Data Availability

+e data used to support the findings of this study arecurrently under embargo while the research findings arecommercialized Requests for data after publication of thisarticle will be considered by the corresponding author

Conflicts of Interest

+e authors declare that there are no conflicts of interestregarding the publication of this manuscript

Acknowledgments

+is work was supported by the Science and TechnologyProject of State Grid Corporation of China (Research onCooperative Situation Awareness and Active DefenseMethod of Cyber-Physical Power System for Cyber Attackno SGJSDK00KJJS1800315)

References

[1] QWangW Tai Y Tang andM Ni ldquoReview of the false datainjection attack against the cyber-physical power systemrdquo IETCyber-Physical Systems 3eory amp Applications vol 4 no 2pp 101ndash107 2019

[2] S Sridhar A Hahn and M Govindarasu ldquoCyber-physicalsystem security for the electric power gridrdquo Proceedings of theIEEE vol 100 no 1 pp 210ndash224 2012

[3] M S Mahmoud M M Hamdan and U A BaroudildquoModeling and control of cyber-physical systems subject tocyber attacks a survey of recent advances and challengesrdquoNeurocomputing vol 338 no 2 pp 101ndash115 2019

[4] R Liu C Vellaithurai S S Biswas T T Gamage andA K Srivastava ldquoAnalyzing the cyber-physical impact ofcyber events on the power gridrdquo IEEE Transactions on SmartGrid vol 6 no 5 pp 2444ndash2453 2015

[5] Y Cai Y Cao Y Li T Huang and B Zhou ldquoCascadingfailure analysis considering interaction between power gridsand communication networksrdquo IEEE Transactions on SmartGrid vol 7 no 1 pp 530ndash538 2016

[6] F Liang W Yu X Liu D Griffith and N Golmie ldquoTowardedge-based deep learning in industrial Internet of thingsrdquoIEEE Internet of 3ings Journal vol 7 no 5 pp 4329ndash43412020

[7] Z Wang M Rahnamay-Naeini J M Abreu et al ldquoImpacts ofoperatorsrsquo behavior on reliability of power grids duringcascading failuresrdquo IEEE Transactions on Power Systemsvol 33 no 6 pp 6013ndash6024 2018

[8] D E Whitehead K Owens D Gammel and J SmithldquoUkraine cyber-induced power outage analysis and practical

Table 1 Distribution network control model with CLs

Attack behaviors (A)Risk

Scenarios Attack object Type of attack Scale

IEEE 33-bus standard distribution system Node 18202530 AI

U 12gtPPN gt 042 Low-voltage exceeding limits

IEEE 33-bus standard distribution system Node 18202530 AII

U

Single-phaseΔPP0 gt 01 High-voltage exceeding limits

Single-machine (DG) infinite powersystem DG access node AIII

U 12gtPPN gt 05 Power fluctuation andresonance

Complexity 11

mitigation strategiesrdquo in Proceedings of the 2017 70th AnnualConference for Protective Relay Engineers (CPRE) pp 1ndash8College Station TX USA April 2017

[9] R Langner ldquoTo kill a centrifuge a technical analysis of whatStuxnetrsquos creators tried to achieverdquo Technical Report LangnerCommunications Norderstedt Germany 2013

[10] J E Sullivan and D Kamensky ldquoHow cyber-attacks inUkraine show the vulnerability of the US power gridrdquo 3eElectricity Journal vol 30 no 3 pp 30ndash35 2017

[11] R M Lee M J Assante and T Conway Analysis of the CyberAttack on the Ukrainian Power Grid SANS Industrial ControlSystems Bethesda MD USA 2016

[12] C-C Sun A Hahn and C-C Liu ldquoCyber security of a powergrid state-of-the-artrdquo International Journal of ElectricalPower amp Energy Systems vol 99 no 4 pp 45ndash56 2018

[13] G Dan H Sandberg M Ekstedt and G Bjorkman ldquoChal-lenges in power system information securityrdquo IEEE SecurityPrivacy vol 10 no 4 pp 62ndash70 2012

[14] A Rasim I Yadigar and S Lyudmila ldquoCyber-physical sys-tems and their security issuesrdquo Computers in Industryvol 100 no 4 pp 212ndash223 2018

[15] P Dong Y Han X Guo and F Xie ldquoA systematic review ofstudies on cyber physical system securityrdquo InternationalJournal of Security and Its Applications vol 9 no 1pp 155ndash164 2015

[16] N Komninos E Philippou and A Pitsillides ldquoSurvey insmart grid and smart home security issues challenges andcountermeasuresrdquo IEEE Communications Surveys amp Tuto-rials vol 16 no 4 pp 1933ndash1954 2014

[17] A-H Mohsenian-Rad and A Leon-Garcia ldquoDistributed in-ternet-based load altering attacks against smart power gridsrdquoIEEE Transactions on Smart Grid vol 2 no 4 pp 667ndash6742011

[18] R Chen X Li and H Zhong ldquonovel online detection methodof data injection attack against dynamic state estimation insmart gridrdquo Neurocomputing vol 344 no 7 pp 73ndash81 2019

[19] C Fei C Patsios P C Taylor and Z Pourmirza ldquoUsing self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemesrdquo IEEE Transactionson Smart Grid vol 10 no 3 pp 3010ndash3019 2019

[20] S Khan R Khan and A H Al-Bayatti ldquoSecure communi-cation architecture for dynamic energy management in smartgridrdquo IEEE Power and Energy Technology Systems Journalvol 6 no 1 pp 47ndash58 2019

[21] S Saleh M Prateek and P H Vincent ldquoBlackIoT IoT botnetof high wattage devices can disrupt the power gridrdquo inProceedings of the 27th USENIX Security Symposium(USENIX Security 18) pp 15ndash32 Baltimore MD USA May2018

[22] Z Dong M Tian and L Ding ldquoA framework for modelingand structural vulnerability analysis of spatial cyber-physicalpower systems from an attack-defense perspectiverdquo IEEESystems Journal pp 1ndash12 2020

[23] T N Boutsika and S A Papathanassiou ldquoShort-circuit cal-culations in networks with distributed generationrdquo ElectricPower Systems Research vol 78 no 7 pp 1181ndash1191 2008

[24] V V S N Murty and A Kumar ldquoOptimal placement of DGin radial distribution systems based on new voltage stabilityindex under load growthrdquo International Journal of ElectricalPower amp Energy Systems vol 69 no 3 pp 246ndash256 2015

[25] V C Nikolaidis E Papanikolaou and A S Safigianni ldquoAcommunication-assisted overcurrent protection scheme forradial distribution systems with distributed generationrdquo IEEETransactions on Smart Grid vol 7 no 1 pp 114ndash123 2016

[26] K Clement-Nyns E Haesen and J Driesen ldquo+e impact ofcharging plug-in hybrid electric vehicles on a residentialdistribution gridrdquo IEEE Transactions on Power Systemsvol 25 no 1 pp 371ndash380 2010

[27] J Munkhammar P Grahn and J Widen ldquoQuantifying self-consumption of on-site photovoltaic power generation inhouseholds with electric vehicle home chargingrdquo Solar En-ergy vol 97 no 6 pp 208ndash216 2013

[28] M Singh P Kumar and I Kar ldquoA multi charging station forelectric vehicles and its utilization for load management andthe grid supportrdquo IEEE Transactions on Smart Grid vol 4no 2 pp 1026ndash1037 2013

[29] M P Moghaddam A Abdollahi and M RashidinejadldquoFlexible demand response programs modeling in competi-tive electricity marketsrdquo Applied Energy vol 88 no 9pp 3257ndash3269 2011

[30] D Adrian J Ullrich and E R Weippl ldquoGrid shock coor-dinated load-changing attacks on power grids the non-smartpower grid is vulnerable to cyber attacks as wellrdquo in Pro-ceedings of the 33rd Annual Computer Security ApplicationsConference pp 303ndash314 Orlando FL USA September 2017

[31] G M Zhang et al ldquoDolphinattack inaudible voice com-mandsrdquo in Proceedings of the 2017 ACM SIGSAC Conferenceon Computer and Communications Security pp 103ndash117Dallas TX USA November 2017

[32] E Bou-Harb C Fachkha M Pourzandi M Debbabi andC Assi ldquoCommunication security for smart grid distributionnetworksrdquo IEEE Communications Magazine vol 51 no 1pp 42ndash49 2013

[33] X Chen ldquoIndustrial control network information securitythreats and vulnerability analysis and researchrdquo ComputerScience vol 39 no 10 pp 4188ndash4190 2012

[34] W Knowles D Prince D Hutchison and K Jones ldquoA surveyof cyber security management in industrial control systemsrdquoInternational Journal of Critical Infrastructure Protectionvol 9 no 1 pp 52ndash80 2015

[35] C-W Disso C-C Liu and G Manimaran ldquoVulnerabilityassessment of cybersecurity for SCADA systemsrdquo IEEETransactions on Power Systems vol 23 no 4 pp 1836ndash18462008

[36] L Sankar S R Rajagopalan S Mohajer and H V PoorldquoSmart meter privacy a theoretical frameworkrdquo IEEETransactions on Smart Grid vol 4 no 2 pp 837ndash846 2013

[37] M Li and H-J Lin ldquoDesign and implementation of smarthome control systems based on wireless sensor networks andpower line communicationsrdquo IEEE Transactions on IndustrialElectronics vol 62 no 7 pp 4430ndash4442 2015

12 Complexity

Page 6: Security Risk Analysis of Active Distribution Networks

command and the ADN is kept in a high-load state for a longtime

322 Attack of Loads Dropping Synchronously At a certainpoint attackers send Moff (synchronously ldquooffrdquo MMoff)commands to massive CLs And attack behavior can beexpressed as AII

u In the meantime P(t) reduces immedi-ately which can be expressed as follows

P(t) P0(t) minus ΔP(t) P0(t) minus αβP0(t) (5)

In the sequence t[n] of control command-sending timen 0 is the simplest form of attack of loads dropping syn-chronously when nne 0 the attack is to keep sending theldquoMoffrdquo command and the ADN is kept in a low-load state fora long time

323 Attack of Loads of Frequent and Synchronous Castingand Dropping Attackers sendMon andMoff (frequently andsynchronously ldquoon and offrdquo MMon and Moff) commandsperiodically to massiv CLs which leads to frequent andsynchronous casting and dropping of loads And attackbehavior can be expressed as AIII

u In the meantime P(t)

increases and drops frequently and synchronously If wedefine Mon command at t [2i] and send Moff commandwhile t [2i + 1] the control command M can be expressedas follows

M Mon T [2i]

Moff T t[2i + 1]1113896 i 0 1 2 (6)

At first attackers send Mon command at t [2i] and theP(t) will be increased αβP0(t) +en attackers send Moffcommand while t [2i+1] and P(t) will be increasedαβP0(t) because CLs can be controlled by attackers AtMoffcommand α 1 and P(t) will be reduced toβP0(t)+erefore P(t) can be expressed as follows

P(t) P0(t) + αβP0(t) t isin (t[2i])

P0(t) + αβP0(t) minus βP0(t) t isin (t[2i + 1])1113896 i 0 1 2

(7)

+e attackers through setting the time interval τ (τ t[n]minus t[nminus 1] n 1 2 3 ) in the attack command M canchange the casting and dropping frequency of CLs and leadto abnormal performance of those CLs It may also causeproblems such as resonance in serious cases

4 Analysis on the Impact of Large-Scale CLAttacks on ADNs

+e risk of the ADNs was greatly increased when the large-scale CLs were controlled by attackers and the power qualitymay also be affected +e attack also resulted in abnormalpower consumption of the users and damaged the powersupply equipment in severe cases +erefore we take theimpact of attacks on power quality as an example and the10KV IEEE 33-bus standard distribution system was used asthe study case as shown in Figure 4 Finally we consider a

single DG connected at the end of the line and analyze theimpact of the malicious attacks

41 Impact of Load-Casting Attack on Power QualityScenario 1 node 18 of the IEEE 33-bus standard distributionsystem is connected to the DG and the penetration rate is100 Nodes 18 20 25 and 30 suffered AI

u attacks (n 0and ΔPP0 1)

+e node branchmodel in the ADN is shown in Figure 5+e power flow of branch bij is from node i to node j Basedon power flow calculation the voltage of node j can beexpressed as follows

Vj Vi minus ΔV Vi minusPjRij + QjXij

VN

(8)

Here ΔV is the branch voltage drop and VNis thenominal voltage Pj and Qj are the active and reactive powerof node j respectively Rij and Xij are the resistance andreactance of the branch (i j) respectively According to thestructural parameters of the ADN and the voltage of thepower supply terminal the voltage of each node can becalculated When the ADN suffered AI

u attacks and lead toincrease of the node load the line voltage dropped very fastand the receiving terminal voltage would also be decreasingand so low-voltage overruns may occur According to powerquality specifications the allowable deviation of 10 kV uservoltage is plusmn7 of the system nominal voltage

We assume that the load is twice the normal operatingstate after the attacks and PPN 065 at this moment Asshown in Figure 6 we obtain the node voltage situationcurves which represent the suffered distribution networkbefore and after the attacks According to the analysis of thenode voltage situation curves due to the increase of the loadcaused by the malicious attacks the voltage of each node hasdropped and caused addition of four new low-voltageoverlimit nodes and the power quality had been dropped aswell After further calculation when PPN gt 052 after theattacks which led to the increase in the low-voltage out-of-limit node number the power quality of these nodes doesnot meet the standard power quality

Compared with the attack scenario of DG connected tothe standard distribution system the attackers need to attacka large-scale CL to make the voltage deviation go beyond thestandard range In addition the newly added low-voltageoverlimit nodes are on branches that do not include DGBecause the voltage is increased by the DG after the cyberattacks the voltage of the nodes with DG supply branches isat the allowable range of deviation

We compare the node voltage distribution of the sufferedbranch before and after the attacks with the traditionaldistribution network under the same type of the attack Asshown in Figure 7 the conclusions can be drawn as follows

(1) If the power line already contains DG and not con-sidering the off-grid status when it is subjected to AI

u

attack against CLs the DG can be leveraged to improvethe power quality of the distribution network and theline is not prone to low-voltage phenomenon

6 Complexity

(2) If the line contains DG and considering the off-linestatus when it is subjected to AI

u attack against CLsDGmay be out of operation after the attacks becauseof poor operation environment and it can exacer-bate voltage dropping and reduce power quality

(3) If a DG is not connected to the power line when it issubjected to AI

u attack against CLs the operation ofthe DG can be used as an adjustment strategy toimprove power quality

42 Impact of LoadDroppingAttack onPowerQuality In thetraditional distribution network the voltage rise is causedby load dropping However there is only one power supplynode on the power side and it is also limited by the ref-erence voltage In the ADNs DG can also provide electricalenergy if the voltage rise caused by the load dropping itmay cause high voltage to exceed the limit and reducepower quality

Scenario 2 node 18 of the IEEE 33-bus standard dis-tribution system is connected to the DG and the penetrationrate is 100 Nodes 18 20 25 and 30 have suffered AII

u

attacks (n 0 ΔPP0 1)In order to ensure the normal operation of the ADN the

load balance of each phase should be considered when we setup distribution lines for users If there is load suffer due toAII

u attack in this area and it is not evenly distributed on eachphase line it will cause unhomogeneous load distribution oneach phase line and increases the degree of the three-phaseimbalance and while those disruptions are serious it willalso reduce the power quality

+e calculation of the three-term imbalance can beexpressed as follows

ε I2

I1times 100 (9)

Here I1 is the effective value of the positive sequencecomponent of the three-phase current and I2 is the effectivevalue of the negative sequence component of the three-phase

21 3 54 6 87 9 1110 12 13 14 1615 17 18

2019 21 22

26 27 28 29 3130 32 33

23 24 25

Figure 4 Diagram of IEEE 33-node standard distribution system

i j

Pi + jQi Pj + jQi

Vi Vj

Figure 5 +e node branch model

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34078080082084086088090092094096098100102

The voltage of ADNsrsquo nodes before attacksThe voltage of ADNsrsquo nodes after attacks

Node

Volta

ge p

er u

int

Figure 6 +e voltage unit value of ADN nodes before and after AIu

attack

Volta

ge p

er u

int

Node1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

11

105

1

095

09

085

08

Before suffering attack of ADNS

After suffering attack of ADNS

Before suffering attack of traditional distribution

After suffering attack of traditional distribution

Figure 7 +e voltage unit value of traditional ADN nodes beforeand after AI

u attack

Complexity 7

current In the low-voltage power distribution system theimbalance of the three-phase load current at the outlet of thedistribution transformer should be less than 10 For theconvenience of quantification assume that the attacked loadis concentrated in one phase that is single phase

In scenario 2 three-phase current on the secondary side ofthe transformer before and after the AII

uattack is obtainedthrough simulation as shown in Figure 8 Before the attack theeffective value of the three-phase current Ia Ib Ic 850A andthe degree of three-phase imbalance is 0 after the attack thethree-phase load is unbalanced Ia Ib 850A and Ic 525Aand the three-phase imbalance is 148 It can be seen that thethree-phase balance before and after the attack exceeds thestandard and the power quality does not meet the standardFurther calculation can be obtained when single-phaseΔPP0 01 and ε 10 It can be obtained that when single-phase ΔPP0 gt 01 the three-phase imbalance degree exceedsthe standard

If the imbalance degree of three-phase voltage becomesvery serious it will increase line and transformer loss si-multaneously and affect the safe operation of electricalequipment Supplying power under unbalanced voltageconditions may easily cause the userrsquos electrical equipmentwith a high-voltage one-phase connection to burn out whilethe userrsquos electrical equipment with a low-voltage one-phaseconnection may show abnormal work

+e suffered attack nodes dropped on a large scale in thedistribution network +e voltage distribution of each nodeis shown in Figure 9 It can be seen that after the AII

u attacksthe voltage of each node is increasing and the voltage perunit value of node 18 increases from 1057 to 1074 whichhas exceeded the allowable range of power quality voltagedeviation and results in reduced power quality

For the distribution network transformer the excessivevoltage not only reduced service life of transformers but itmay also cause resonance phenomena and harmonic pol-lution and disrupt other normally operating equipment Forelectrical equipment the excessive voltage can affect thenormal operation while the electrical equipment operatedwith high voltage for a long time would show reduction inservice life and increase in power consumption

To change the attack intensity the voltage of each node isshown in Figure 10 where the corresponding attack modesfrom decentralized attacks to no attacks of the curve aredescribed as follows

(1) +e decentralized attacks all the nodes with half ofthe load suffered the AII

u attacks(2) +e centralized large-scale attacks nodes 18 20 25

and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in large-scale load of attacked nodes tripping from the linePPN 0

(3) +e centralized small-scale attacks nodes 18 20 25and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in 50load of attacked nodes tripping from the line

(4) No attacks

Among them attack modes (1) and (2) caused thevoltage to exceed the limits and reduced the power qualityAlthough attack mode (3) raised the node voltage thevoltage deviation index of the power quality still satisfied thespecified range

If the ADNs within a certain attack scenario where thenode 22 is connected to the DG take this branch line as theanalysis object the voltage distribution of those nodes areshown in Figure 11 Although the node voltage increases arecaused by the synchronous dropping attacks the deviationindex of the voltage still satisfied the specified range

It can be seen that the deviation impact of AIIu attacks on

the load voltage of the distribution network is not onlyrelated to the attack intensity but also related to the topologyof the distribution network

43 Impact of Frequent Casting and Dropping of Load AttacksonPowerQuality Due to the DGs the power systemmay besubjected to periodic disturbance of the load and it wouldcause power oscillation that is compelled resonance

Attack pointTime (s)

Curr

ent (

A)

15001000

5000

ndash1500ndash1000

ndash500

Ia Ib Ic

0 001 002 003 004 005 006

Figure 8 +ree-phase current on the secondary side of thetransformer before and after the AII

u attack

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34090

092

094

096

098

100

102

104

106

108

Volta

ge p

er u

int

Node

The voltage of ADNs nodes before attacksThe voltage of ADNs nodes aer attacks

Figure 9 +e voltage value of ADNsrsquo nodes before and after AIIu

attack

8 Complexity

low-frequency oscillation +e theory of compelled reso-nance low-frequency oscillation points out that regular smallperiodic disturbance in the system will cause the poweroscillation If the frequency of the disturbance is consistentwith the natural frequency of the system it will cause res-onance and the compelled oscillation amplitude of thesystem is the largest at this period

Assume that the DG is directly connected to the powergrid through the generator and select the connection node asa malicious attack object to construct a single-machineinfinite system As shown in Figure 12 the DG is connectedinto the distribution system through a 04 kV10 kV boostertransformer

To cast small-scale load while the system is runningstably with light load we can get the generator speed curveas shown in Figure 13 and the natural oscillation frequencyof the system is 167Hz

Scenario 3 the connection point of the DG suffered theAIII

u attack (t[0] 6 s and ΔPP0 1)To change the frequency of ldquocastingrdquoldquodroppingrdquo of the

load while the same-scale load is attacked we can obtainthe line power curve as shown in Figure 14 When thecommand ldquoonrdquoldquooffrdquo is sent at τ 03 s intervals as shownin Figure 14(a) the disturbance frequency is 167Hz Whenthe command ldquoonrdquoldquooffrdquo is sent at τ 026 s intervals as

shown in Figure 14(b) the disturbance frequency is187Hz When the command ldquoonrdquoldquooffrdquo is sent at τ 034 sintervals as shown in Figure 14(c) the disturbance fre-quency is 147Hz

Due to the disturbance frequency being equal to thenatural frequency of the system it results in the largestamplitude of the power fluctuation when the deviationbetween the disturbance frequency and the natural fre-quency of the system increases the power oscillationcurves can also be obtained but the amplitude of this oneis relatively small And the amplitude of power oscilla-tions is also related to the scales of the attack loadCompared with Figure 14(a) While the scale of the attackload becomes 50 the frequency of periodic disturbanceis still 167 Hz and the oscillation amplitude becomesrelatively small as shown in Figure 15

Node

Volta

ge p

er u

int

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

112

11

108

106

104

102

1

098

096

094

092

Centralized small-scale attacksNo attacks

Decentralized attacksCentralized large-scale attacks

Figure 10 +e voltage value of nodes before and after AIIu attack under different attack modes

Node

Volta

ge p

er u

int

1008100610041002

10998099609940992

1 2 19 20 21 22

After attack of ADNBefore attack of ADN

Figure 11 +e partial node voltage before and after AIIu attack

DG

Infinite power system

Figure 12 Single-machine (DG) infinite power system

1001

10005

1

09995

0999

6 65 7 75 8 85Ts

ltRotor speed wm (pu)gt

Figure 13 Rotation speed fluctuation after small disturbance

Complexity 9

In the traditional distribution network the load mainlyconsumes electrical energy passively and it is usually faraway from the generator with relatively scattered distri-bution and it is not easy to have large-scale synchronousldquocastingrdquoldquodroppingrdquo However with the development ofDG connected to the power grid and CLs it makes thedistance between the load and the generator become closerand the load would be maliciously controlled by the at-tackers If the large-scale CLs are maliciously controlled andthe frequency of periodic ldquocastingrdquo and ldquodroppingrdquo is closeto the natural frequency of the system it may amplify theimpact of power fluctuation and affect the power quality ofthe distribution network

44 Summary on the Influence of CLs byMalicious Control onADNs +e power quality impact of CLs maliciously con-trolled by attackers on ADNs can be summarized in Table 1Compared with the power quality of the distribution net-work without DG the DG connected to the power grid canbe leveraged to improve the power quality of the distributionnetworks such as improving the condition of low-voltagecross-limits However while the CLs suffered unpredictablecyber attacks it can result in dropping or casting of the large-scale CLs frequently and synchronously and the reliability ofthe distribution network is also reduced In summary thoseimpacts can cause power quality problems such as voltagedeviation and voltage fluctuation and even introduce new

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(a)

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(b)Ac

tive p

ower

uni

te v

alue

(pu)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(c)

Figure 14 +e active power oscillation curve of the line under different disturbance frequencies of (a) 167Hz (b) 187Hz and (c) 147Hz

Activ

e pow

er u

nite

val

ue (p

u)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

Figure 15 +e active power oscillation curve of line under small-scale load attack with a disturbance frequency of 167Hz

10 Complexity

power quality issues (such as forced resonance at low fre-quencies) In addition the impact of cyber attacks on thepower supply quality of ADNs is not only related to theattack modes but also related to the topology of the dis-tribution network (such as the connection points of DG) Inorder to ensure the normal operation of the ADNs the risksintroduced by cyber attacks must be considered

5 Conclusions

+e introduction of distributed energy objects and the fullapplication of communication technologies make distribu-tion networks face new security risks In this paper weanalyze the security risks of industrial CLs and civil CLs inthe distribution networks and compare the revenue and costof attacks from the perspective of attackers It can be seenthat the cyber attack against civil CLs can obtain a largeattack revenues with a small attack cost +en an ADNcontrol model considering cyber attacks is established andat the same time the attack behavior model is also estab-lished In these models it provides a clear representation ofthe attack object the attack method and the across-spaceimpact mechanism Taking power quality as an example theimpacts of AI

U AIIU and AIII

U attacks on ADNs are analyzedIn summary the result shows that DG connected to thepower grid can improve power quality but once large-scaleCLs are suffered by cyber attacks it may also cause powerquality problems and may introduce new problems such aslow-frequency compelled oscillation

In the future there is still a lot of work to be done againstthe potential security risks of the ADNs introduced bydistributed energy objects Based on the existing researchresults we can continue to study the impacts of cyber attacksagainst civil CL on the security and stable operation of theADNs such as refining attack models enriching attackscenarios and exploring the ADN operation characteristicsafter the attacks In order to provide a reference for thepower grid to improve its operation control strategy andformulate user-side cyber security standards we should fullygrasp the risks introduced by the CL to the ADNs In otherwords we can refer to the ADN security risk analysis of thescenario where the CLs have suffered malicious control andcarry out research on other energy objects in the ADNs asthe attack object In addition further research on the powergrid cascading failures caused by cyber attacks on distributedenergy objects can provide a reference for the security andstable operation of the entire power grid

Data Availability

+e data used to support the findings of this study arecurrently under embargo while the research findings arecommercialized Requests for data after publication of thisarticle will be considered by the corresponding author

Conflicts of Interest

+e authors declare that there are no conflicts of interestregarding the publication of this manuscript

Acknowledgments

+is work was supported by the Science and TechnologyProject of State Grid Corporation of China (Research onCooperative Situation Awareness and Active DefenseMethod of Cyber-Physical Power System for Cyber Attackno SGJSDK00KJJS1800315)

References

[1] QWangW Tai Y Tang andM Ni ldquoReview of the false datainjection attack against the cyber-physical power systemrdquo IETCyber-Physical Systems 3eory amp Applications vol 4 no 2pp 101ndash107 2019

[2] S Sridhar A Hahn and M Govindarasu ldquoCyber-physicalsystem security for the electric power gridrdquo Proceedings of theIEEE vol 100 no 1 pp 210ndash224 2012

[3] M S Mahmoud M M Hamdan and U A BaroudildquoModeling and control of cyber-physical systems subject tocyber attacks a survey of recent advances and challengesrdquoNeurocomputing vol 338 no 2 pp 101ndash115 2019

[4] R Liu C Vellaithurai S S Biswas T T Gamage andA K Srivastava ldquoAnalyzing the cyber-physical impact ofcyber events on the power gridrdquo IEEE Transactions on SmartGrid vol 6 no 5 pp 2444ndash2453 2015

[5] Y Cai Y Cao Y Li T Huang and B Zhou ldquoCascadingfailure analysis considering interaction between power gridsand communication networksrdquo IEEE Transactions on SmartGrid vol 7 no 1 pp 530ndash538 2016

[6] F Liang W Yu X Liu D Griffith and N Golmie ldquoTowardedge-based deep learning in industrial Internet of thingsrdquoIEEE Internet of 3ings Journal vol 7 no 5 pp 4329ndash43412020

[7] Z Wang M Rahnamay-Naeini J M Abreu et al ldquoImpacts ofoperatorsrsquo behavior on reliability of power grids duringcascading failuresrdquo IEEE Transactions on Power Systemsvol 33 no 6 pp 6013ndash6024 2018

[8] D E Whitehead K Owens D Gammel and J SmithldquoUkraine cyber-induced power outage analysis and practical

Table 1 Distribution network control model with CLs

Attack behaviors (A)Risk

Scenarios Attack object Type of attack Scale

IEEE 33-bus standard distribution system Node 18202530 AI

U 12gtPPN gt 042 Low-voltage exceeding limits

IEEE 33-bus standard distribution system Node 18202530 AII

U

Single-phaseΔPP0 gt 01 High-voltage exceeding limits

Single-machine (DG) infinite powersystem DG access node AIII

U 12gtPPN gt 05 Power fluctuation andresonance

Complexity 11

mitigation strategiesrdquo in Proceedings of the 2017 70th AnnualConference for Protective Relay Engineers (CPRE) pp 1ndash8College Station TX USA April 2017

[9] R Langner ldquoTo kill a centrifuge a technical analysis of whatStuxnetrsquos creators tried to achieverdquo Technical Report LangnerCommunications Norderstedt Germany 2013

[10] J E Sullivan and D Kamensky ldquoHow cyber-attacks inUkraine show the vulnerability of the US power gridrdquo 3eElectricity Journal vol 30 no 3 pp 30ndash35 2017

[11] R M Lee M J Assante and T Conway Analysis of the CyberAttack on the Ukrainian Power Grid SANS Industrial ControlSystems Bethesda MD USA 2016

[12] C-C Sun A Hahn and C-C Liu ldquoCyber security of a powergrid state-of-the-artrdquo International Journal of ElectricalPower amp Energy Systems vol 99 no 4 pp 45ndash56 2018

[13] G Dan H Sandberg M Ekstedt and G Bjorkman ldquoChal-lenges in power system information securityrdquo IEEE SecurityPrivacy vol 10 no 4 pp 62ndash70 2012

[14] A Rasim I Yadigar and S Lyudmila ldquoCyber-physical sys-tems and their security issuesrdquo Computers in Industryvol 100 no 4 pp 212ndash223 2018

[15] P Dong Y Han X Guo and F Xie ldquoA systematic review ofstudies on cyber physical system securityrdquo InternationalJournal of Security and Its Applications vol 9 no 1pp 155ndash164 2015

[16] N Komninos E Philippou and A Pitsillides ldquoSurvey insmart grid and smart home security issues challenges andcountermeasuresrdquo IEEE Communications Surveys amp Tuto-rials vol 16 no 4 pp 1933ndash1954 2014

[17] A-H Mohsenian-Rad and A Leon-Garcia ldquoDistributed in-ternet-based load altering attacks against smart power gridsrdquoIEEE Transactions on Smart Grid vol 2 no 4 pp 667ndash6742011

[18] R Chen X Li and H Zhong ldquonovel online detection methodof data injection attack against dynamic state estimation insmart gridrdquo Neurocomputing vol 344 no 7 pp 73ndash81 2019

[19] C Fei C Patsios P C Taylor and Z Pourmirza ldquoUsing self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemesrdquo IEEE Transactionson Smart Grid vol 10 no 3 pp 3010ndash3019 2019

[20] S Khan R Khan and A H Al-Bayatti ldquoSecure communi-cation architecture for dynamic energy management in smartgridrdquo IEEE Power and Energy Technology Systems Journalvol 6 no 1 pp 47ndash58 2019

[21] S Saleh M Prateek and P H Vincent ldquoBlackIoT IoT botnetof high wattage devices can disrupt the power gridrdquo inProceedings of the 27th USENIX Security Symposium(USENIX Security 18) pp 15ndash32 Baltimore MD USA May2018

[22] Z Dong M Tian and L Ding ldquoA framework for modelingand structural vulnerability analysis of spatial cyber-physicalpower systems from an attack-defense perspectiverdquo IEEESystems Journal pp 1ndash12 2020

[23] T N Boutsika and S A Papathanassiou ldquoShort-circuit cal-culations in networks with distributed generationrdquo ElectricPower Systems Research vol 78 no 7 pp 1181ndash1191 2008

[24] V V S N Murty and A Kumar ldquoOptimal placement of DGin radial distribution systems based on new voltage stabilityindex under load growthrdquo International Journal of ElectricalPower amp Energy Systems vol 69 no 3 pp 246ndash256 2015

[25] V C Nikolaidis E Papanikolaou and A S Safigianni ldquoAcommunication-assisted overcurrent protection scheme forradial distribution systems with distributed generationrdquo IEEETransactions on Smart Grid vol 7 no 1 pp 114ndash123 2016

[26] K Clement-Nyns E Haesen and J Driesen ldquo+e impact ofcharging plug-in hybrid electric vehicles on a residentialdistribution gridrdquo IEEE Transactions on Power Systemsvol 25 no 1 pp 371ndash380 2010

[27] J Munkhammar P Grahn and J Widen ldquoQuantifying self-consumption of on-site photovoltaic power generation inhouseholds with electric vehicle home chargingrdquo Solar En-ergy vol 97 no 6 pp 208ndash216 2013

[28] M Singh P Kumar and I Kar ldquoA multi charging station forelectric vehicles and its utilization for load management andthe grid supportrdquo IEEE Transactions on Smart Grid vol 4no 2 pp 1026ndash1037 2013

[29] M P Moghaddam A Abdollahi and M RashidinejadldquoFlexible demand response programs modeling in competi-tive electricity marketsrdquo Applied Energy vol 88 no 9pp 3257ndash3269 2011

[30] D Adrian J Ullrich and E R Weippl ldquoGrid shock coor-dinated load-changing attacks on power grids the non-smartpower grid is vulnerable to cyber attacks as wellrdquo in Pro-ceedings of the 33rd Annual Computer Security ApplicationsConference pp 303ndash314 Orlando FL USA September 2017

[31] G M Zhang et al ldquoDolphinattack inaudible voice com-mandsrdquo in Proceedings of the 2017 ACM SIGSAC Conferenceon Computer and Communications Security pp 103ndash117Dallas TX USA November 2017

[32] E Bou-Harb C Fachkha M Pourzandi M Debbabi andC Assi ldquoCommunication security for smart grid distributionnetworksrdquo IEEE Communications Magazine vol 51 no 1pp 42ndash49 2013

[33] X Chen ldquoIndustrial control network information securitythreats and vulnerability analysis and researchrdquo ComputerScience vol 39 no 10 pp 4188ndash4190 2012

[34] W Knowles D Prince D Hutchison and K Jones ldquoA surveyof cyber security management in industrial control systemsrdquoInternational Journal of Critical Infrastructure Protectionvol 9 no 1 pp 52ndash80 2015

[35] C-W Disso C-C Liu and G Manimaran ldquoVulnerabilityassessment of cybersecurity for SCADA systemsrdquo IEEETransactions on Power Systems vol 23 no 4 pp 1836ndash18462008

[36] L Sankar S R Rajagopalan S Mohajer and H V PoorldquoSmart meter privacy a theoretical frameworkrdquo IEEETransactions on Smart Grid vol 4 no 2 pp 837ndash846 2013

[37] M Li and H-J Lin ldquoDesign and implementation of smarthome control systems based on wireless sensor networks andpower line communicationsrdquo IEEE Transactions on IndustrialElectronics vol 62 no 7 pp 4430ndash4442 2015

12 Complexity

Page 7: Security Risk Analysis of Active Distribution Networks

(2) If the line contains DG and considering the off-linestatus when it is subjected to AI

u attack against CLsDGmay be out of operation after the attacks becauseof poor operation environment and it can exacer-bate voltage dropping and reduce power quality

(3) If a DG is not connected to the power line when it issubjected to AI

u attack against CLs the operation ofthe DG can be used as an adjustment strategy toimprove power quality

42 Impact of LoadDroppingAttack onPowerQuality In thetraditional distribution network the voltage rise is causedby load dropping However there is only one power supplynode on the power side and it is also limited by the ref-erence voltage In the ADNs DG can also provide electricalenergy if the voltage rise caused by the load dropping itmay cause high voltage to exceed the limit and reducepower quality

Scenario 2 node 18 of the IEEE 33-bus standard dis-tribution system is connected to the DG and the penetrationrate is 100 Nodes 18 20 25 and 30 have suffered AII

u

attacks (n 0 ΔPP0 1)In order to ensure the normal operation of the ADN the

load balance of each phase should be considered when we setup distribution lines for users If there is load suffer due toAII

u attack in this area and it is not evenly distributed on eachphase line it will cause unhomogeneous load distribution oneach phase line and increases the degree of the three-phaseimbalance and while those disruptions are serious it willalso reduce the power quality

+e calculation of the three-term imbalance can beexpressed as follows

ε I2

I1times 100 (9)

Here I1 is the effective value of the positive sequencecomponent of the three-phase current and I2 is the effectivevalue of the negative sequence component of the three-phase

21 3 54 6 87 9 1110 12 13 14 1615 17 18

2019 21 22

26 27 28 29 3130 32 33

23 24 25

Figure 4 Diagram of IEEE 33-node standard distribution system

i j

Pi + jQi Pj + jQi

Vi Vj

Figure 5 +e node branch model

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34078080082084086088090092094096098100102

The voltage of ADNsrsquo nodes before attacksThe voltage of ADNsrsquo nodes after attacks

Node

Volta

ge p

er u

int

Figure 6 +e voltage unit value of ADN nodes before and after AIu

attack

Volta

ge p

er u

int

Node1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

11

105

1

095

09

085

08

Before suffering attack of ADNS

After suffering attack of ADNS

Before suffering attack of traditional distribution

After suffering attack of traditional distribution

Figure 7 +e voltage unit value of traditional ADN nodes beforeand after AI

u attack

Complexity 7

current In the low-voltage power distribution system theimbalance of the three-phase load current at the outlet of thedistribution transformer should be less than 10 For theconvenience of quantification assume that the attacked loadis concentrated in one phase that is single phase

In scenario 2 three-phase current on the secondary side ofthe transformer before and after the AII

uattack is obtainedthrough simulation as shown in Figure 8 Before the attack theeffective value of the three-phase current Ia Ib Ic 850A andthe degree of three-phase imbalance is 0 after the attack thethree-phase load is unbalanced Ia Ib 850A and Ic 525Aand the three-phase imbalance is 148 It can be seen that thethree-phase balance before and after the attack exceeds thestandard and the power quality does not meet the standardFurther calculation can be obtained when single-phaseΔPP0 01 and ε 10 It can be obtained that when single-phase ΔPP0 gt 01 the three-phase imbalance degree exceedsthe standard

If the imbalance degree of three-phase voltage becomesvery serious it will increase line and transformer loss si-multaneously and affect the safe operation of electricalequipment Supplying power under unbalanced voltageconditions may easily cause the userrsquos electrical equipmentwith a high-voltage one-phase connection to burn out whilethe userrsquos electrical equipment with a low-voltage one-phaseconnection may show abnormal work

+e suffered attack nodes dropped on a large scale in thedistribution network +e voltage distribution of each nodeis shown in Figure 9 It can be seen that after the AII

u attacksthe voltage of each node is increasing and the voltage perunit value of node 18 increases from 1057 to 1074 whichhas exceeded the allowable range of power quality voltagedeviation and results in reduced power quality

For the distribution network transformer the excessivevoltage not only reduced service life of transformers but itmay also cause resonance phenomena and harmonic pol-lution and disrupt other normally operating equipment Forelectrical equipment the excessive voltage can affect thenormal operation while the electrical equipment operatedwith high voltage for a long time would show reduction inservice life and increase in power consumption

To change the attack intensity the voltage of each node isshown in Figure 10 where the corresponding attack modesfrom decentralized attacks to no attacks of the curve aredescribed as follows

(1) +e decentralized attacks all the nodes with half ofthe load suffered the AII

u attacks(2) +e centralized large-scale attacks nodes 18 20 25

and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in large-scale load of attacked nodes tripping from the linePPN 0

(3) +e centralized small-scale attacks nodes 18 20 25and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in 50load of attacked nodes tripping from the line

(4) No attacks

Among them attack modes (1) and (2) caused thevoltage to exceed the limits and reduced the power qualityAlthough attack mode (3) raised the node voltage thevoltage deviation index of the power quality still satisfied thespecified range

If the ADNs within a certain attack scenario where thenode 22 is connected to the DG take this branch line as theanalysis object the voltage distribution of those nodes areshown in Figure 11 Although the node voltage increases arecaused by the synchronous dropping attacks the deviationindex of the voltage still satisfied the specified range

It can be seen that the deviation impact of AIIu attacks on

the load voltage of the distribution network is not onlyrelated to the attack intensity but also related to the topologyof the distribution network

43 Impact of Frequent Casting and Dropping of Load AttacksonPowerQuality Due to the DGs the power systemmay besubjected to periodic disturbance of the load and it wouldcause power oscillation that is compelled resonance

Attack pointTime (s)

Curr

ent (

A)

15001000

5000

ndash1500ndash1000

ndash500

Ia Ib Ic

0 001 002 003 004 005 006

Figure 8 +ree-phase current on the secondary side of thetransformer before and after the AII

u attack

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34090

092

094

096

098

100

102

104

106

108

Volta

ge p

er u

int

Node

The voltage of ADNs nodes before attacksThe voltage of ADNs nodes aer attacks

Figure 9 +e voltage value of ADNsrsquo nodes before and after AIIu

attack

8 Complexity

low-frequency oscillation +e theory of compelled reso-nance low-frequency oscillation points out that regular smallperiodic disturbance in the system will cause the poweroscillation If the frequency of the disturbance is consistentwith the natural frequency of the system it will cause res-onance and the compelled oscillation amplitude of thesystem is the largest at this period

Assume that the DG is directly connected to the powergrid through the generator and select the connection node asa malicious attack object to construct a single-machineinfinite system As shown in Figure 12 the DG is connectedinto the distribution system through a 04 kV10 kV boostertransformer

To cast small-scale load while the system is runningstably with light load we can get the generator speed curveas shown in Figure 13 and the natural oscillation frequencyof the system is 167Hz

Scenario 3 the connection point of the DG suffered theAIII

u attack (t[0] 6 s and ΔPP0 1)To change the frequency of ldquocastingrdquoldquodroppingrdquo of the

load while the same-scale load is attacked we can obtainthe line power curve as shown in Figure 14 When thecommand ldquoonrdquoldquooffrdquo is sent at τ 03 s intervals as shownin Figure 14(a) the disturbance frequency is 167Hz Whenthe command ldquoonrdquoldquooffrdquo is sent at τ 026 s intervals as

shown in Figure 14(b) the disturbance frequency is187Hz When the command ldquoonrdquoldquooffrdquo is sent at τ 034 sintervals as shown in Figure 14(c) the disturbance fre-quency is 147Hz

Due to the disturbance frequency being equal to thenatural frequency of the system it results in the largestamplitude of the power fluctuation when the deviationbetween the disturbance frequency and the natural fre-quency of the system increases the power oscillationcurves can also be obtained but the amplitude of this oneis relatively small And the amplitude of power oscilla-tions is also related to the scales of the attack loadCompared with Figure 14(a) While the scale of the attackload becomes 50 the frequency of periodic disturbanceis still 167 Hz and the oscillation amplitude becomesrelatively small as shown in Figure 15

Node

Volta

ge p

er u

int

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

112

11

108

106

104

102

1

098

096

094

092

Centralized small-scale attacksNo attacks

Decentralized attacksCentralized large-scale attacks

Figure 10 +e voltage value of nodes before and after AIIu attack under different attack modes

Node

Volta

ge p

er u

int

1008100610041002

10998099609940992

1 2 19 20 21 22

After attack of ADNBefore attack of ADN

Figure 11 +e partial node voltage before and after AIIu attack

DG

Infinite power system

Figure 12 Single-machine (DG) infinite power system

1001

10005

1

09995

0999

6 65 7 75 8 85Ts

ltRotor speed wm (pu)gt

Figure 13 Rotation speed fluctuation after small disturbance

Complexity 9

In the traditional distribution network the load mainlyconsumes electrical energy passively and it is usually faraway from the generator with relatively scattered distri-bution and it is not easy to have large-scale synchronousldquocastingrdquoldquodroppingrdquo However with the development ofDG connected to the power grid and CLs it makes thedistance between the load and the generator become closerand the load would be maliciously controlled by the at-tackers If the large-scale CLs are maliciously controlled andthe frequency of periodic ldquocastingrdquo and ldquodroppingrdquo is closeto the natural frequency of the system it may amplify theimpact of power fluctuation and affect the power quality ofthe distribution network

44 Summary on the Influence of CLs byMalicious Control onADNs +e power quality impact of CLs maliciously con-trolled by attackers on ADNs can be summarized in Table 1Compared with the power quality of the distribution net-work without DG the DG connected to the power grid canbe leveraged to improve the power quality of the distributionnetworks such as improving the condition of low-voltagecross-limits However while the CLs suffered unpredictablecyber attacks it can result in dropping or casting of the large-scale CLs frequently and synchronously and the reliability ofthe distribution network is also reduced In summary thoseimpacts can cause power quality problems such as voltagedeviation and voltage fluctuation and even introduce new

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(a)

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(b)Ac

tive p

ower

uni

te v

alue

(pu)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(c)

Figure 14 +e active power oscillation curve of the line under different disturbance frequencies of (a) 167Hz (b) 187Hz and (c) 147Hz

Activ

e pow

er u

nite

val

ue (p

u)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

Figure 15 +e active power oscillation curve of line under small-scale load attack with a disturbance frequency of 167Hz

10 Complexity

power quality issues (such as forced resonance at low fre-quencies) In addition the impact of cyber attacks on thepower supply quality of ADNs is not only related to theattack modes but also related to the topology of the dis-tribution network (such as the connection points of DG) Inorder to ensure the normal operation of the ADNs the risksintroduced by cyber attacks must be considered

5 Conclusions

+e introduction of distributed energy objects and the fullapplication of communication technologies make distribu-tion networks face new security risks In this paper weanalyze the security risks of industrial CLs and civil CLs inthe distribution networks and compare the revenue and costof attacks from the perspective of attackers It can be seenthat the cyber attack against civil CLs can obtain a largeattack revenues with a small attack cost +en an ADNcontrol model considering cyber attacks is established andat the same time the attack behavior model is also estab-lished In these models it provides a clear representation ofthe attack object the attack method and the across-spaceimpact mechanism Taking power quality as an example theimpacts of AI

U AIIU and AIII

U attacks on ADNs are analyzedIn summary the result shows that DG connected to thepower grid can improve power quality but once large-scaleCLs are suffered by cyber attacks it may also cause powerquality problems and may introduce new problems such aslow-frequency compelled oscillation

In the future there is still a lot of work to be done againstthe potential security risks of the ADNs introduced bydistributed energy objects Based on the existing researchresults we can continue to study the impacts of cyber attacksagainst civil CL on the security and stable operation of theADNs such as refining attack models enriching attackscenarios and exploring the ADN operation characteristicsafter the attacks In order to provide a reference for thepower grid to improve its operation control strategy andformulate user-side cyber security standards we should fullygrasp the risks introduced by the CL to the ADNs In otherwords we can refer to the ADN security risk analysis of thescenario where the CLs have suffered malicious control andcarry out research on other energy objects in the ADNs asthe attack object In addition further research on the powergrid cascading failures caused by cyber attacks on distributedenergy objects can provide a reference for the security andstable operation of the entire power grid

Data Availability

+e data used to support the findings of this study arecurrently under embargo while the research findings arecommercialized Requests for data after publication of thisarticle will be considered by the corresponding author

Conflicts of Interest

+e authors declare that there are no conflicts of interestregarding the publication of this manuscript

Acknowledgments

+is work was supported by the Science and TechnologyProject of State Grid Corporation of China (Research onCooperative Situation Awareness and Active DefenseMethod of Cyber-Physical Power System for Cyber Attackno SGJSDK00KJJS1800315)

References

[1] QWangW Tai Y Tang andM Ni ldquoReview of the false datainjection attack against the cyber-physical power systemrdquo IETCyber-Physical Systems 3eory amp Applications vol 4 no 2pp 101ndash107 2019

[2] S Sridhar A Hahn and M Govindarasu ldquoCyber-physicalsystem security for the electric power gridrdquo Proceedings of theIEEE vol 100 no 1 pp 210ndash224 2012

[3] M S Mahmoud M M Hamdan and U A BaroudildquoModeling and control of cyber-physical systems subject tocyber attacks a survey of recent advances and challengesrdquoNeurocomputing vol 338 no 2 pp 101ndash115 2019

[4] R Liu C Vellaithurai S S Biswas T T Gamage andA K Srivastava ldquoAnalyzing the cyber-physical impact ofcyber events on the power gridrdquo IEEE Transactions on SmartGrid vol 6 no 5 pp 2444ndash2453 2015

[5] Y Cai Y Cao Y Li T Huang and B Zhou ldquoCascadingfailure analysis considering interaction between power gridsand communication networksrdquo IEEE Transactions on SmartGrid vol 7 no 1 pp 530ndash538 2016

[6] F Liang W Yu X Liu D Griffith and N Golmie ldquoTowardedge-based deep learning in industrial Internet of thingsrdquoIEEE Internet of 3ings Journal vol 7 no 5 pp 4329ndash43412020

[7] Z Wang M Rahnamay-Naeini J M Abreu et al ldquoImpacts ofoperatorsrsquo behavior on reliability of power grids duringcascading failuresrdquo IEEE Transactions on Power Systemsvol 33 no 6 pp 6013ndash6024 2018

[8] D E Whitehead K Owens D Gammel and J SmithldquoUkraine cyber-induced power outage analysis and practical

Table 1 Distribution network control model with CLs

Attack behaviors (A)Risk

Scenarios Attack object Type of attack Scale

IEEE 33-bus standard distribution system Node 18202530 AI

U 12gtPPN gt 042 Low-voltage exceeding limits

IEEE 33-bus standard distribution system Node 18202530 AII

U

Single-phaseΔPP0 gt 01 High-voltage exceeding limits

Single-machine (DG) infinite powersystem DG access node AIII

U 12gtPPN gt 05 Power fluctuation andresonance

Complexity 11

mitigation strategiesrdquo in Proceedings of the 2017 70th AnnualConference for Protective Relay Engineers (CPRE) pp 1ndash8College Station TX USA April 2017

[9] R Langner ldquoTo kill a centrifuge a technical analysis of whatStuxnetrsquos creators tried to achieverdquo Technical Report LangnerCommunications Norderstedt Germany 2013

[10] J E Sullivan and D Kamensky ldquoHow cyber-attacks inUkraine show the vulnerability of the US power gridrdquo 3eElectricity Journal vol 30 no 3 pp 30ndash35 2017

[11] R M Lee M J Assante and T Conway Analysis of the CyberAttack on the Ukrainian Power Grid SANS Industrial ControlSystems Bethesda MD USA 2016

[12] C-C Sun A Hahn and C-C Liu ldquoCyber security of a powergrid state-of-the-artrdquo International Journal of ElectricalPower amp Energy Systems vol 99 no 4 pp 45ndash56 2018

[13] G Dan H Sandberg M Ekstedt and G Bjorkman ldquoChal-lenges in power system information securityrdquo IEEE SecurityPrivacy vol 10 no 4 pp 62ndash70 2012

[14] A Rasim I Yadigar and S Lyudmila ldquoCyber-physical sys-tems and their security issuesrdquo Computers in Industryvol 100 no 4 pp 212ndash223 2018

[15] P Dong Y Han X Guo and F Xie ldquoA systematic review ofstudies on cyber physical system securityrdquo InternationalJournal of Security and Its Applications vol 9 no 1pp 155ndash164 2015

[16] N Komninos E Philippou and A Pitsillides ldquoSurvey insmart grid and smart home security issues challenges andcountermeasuresrdquo IEEE Communications Surveys amp Tuto-rials vol 16 no 4 pp 1933ndash1954 2014

[17] A-H Mohsenian-Rad and A Leon-Garcia ldquoDistributed in-ternet-based load altering attacks against smart power gridsrdquoIEEE Transactions on Smart Grid vol 2 no 4 pp 667ndash6742011

[18] R Chen X Li and H Zhong ldquonovel online detection methodof data injection attack against dynamic state estimation insmart gridrdquo Neurocomputing vol 344 no 7 pp 73ndash81 2019

[19] C Fei C Patsios P C Taylor and Z Pourmirza ldquoUsing self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemesrdquo IEEE Transactionson Smart Grid vol 10 no 3 pp 3010ndash3019 2019

[20] S Khan R Khan and A H Al-Bayatti ldquoSecure communi-cation architecture for dynamic energy management in smartgridrdquo IEEE Power and Energy Technology Systems Journalvol 6 no 1 pp 47ndash58 2019

[21] S Saleh M Prateek and P H Vincent ldquoBlackIoT IoT botnetof high wattage devices can disrupt the power gridrdquo inProceedings of the 27th USENIX Security Symposium(USENIX Security 18) pp 15ndash32 Baltimore MD USA May2018

[22] Z Dong M Tian and L Ding ldquoA framework for modelingand structural vulnerability analysis of spatial cyber-physicalpower systems from an attack-defense perspectiverdquo IEEESystems Journal pp 1ndash12 2020

[23] T N Boutsika and S A Papathanassiou ldquoShort-circuit cal-culations in networks with distributed generationrdquo ElectricPower Systems Research vol 78 no 7 pp 1181ndash1191 2008

[24] V V S N Murty and A Kumar ldquoOptimal placement of DGin radial distribution systems based on new voltage stabilityindex under load growthrdquo International Journal of ElectricalPower amp Energy Systems vol 69 no 3 pp 246ndash256 2015

[25] V C Nikolaidis E Papanikolaou and A S Safigianni ldquoAcommunication-assisted overcurrent protection scheme forradial distribution systems with distributed generationrdquo IEEETransactions on Smart Grid vol 7 no 1 pp 114ndash123 2016

[26] K Clement-Nyns E Haesen and J Driesen ldquo+e impact ofcharging plug-in hybrid electric vehicles on a residentialdistribution gridrdquo IEEE Transactions on Power Systemsvol 25 no 1 pp 371ndash380 2010

[27] J Munkhammar P Grahn and J Widen ldquoQuantifying self-consumption of on-site photovoltaic power generation inhouseholds with electric vehicle home chargingrdquo Solar En-ergy vol 97 no 6 pp 208ndash216 2013

[28] M Singh P Kumar and I Kar ldquoA multi charging station forelectric vehicles and its utilization for load management andthe grid supportrdquo IEEE Transactions on Smart Grid vol 4no 2 pp 1026ndash1037 2013

[29] M P Moghaddam A Abdollahi and M RashidinejadldquoFlexible demand response programs modeling in competi-tive electricity marketsrdquo Applied Energy vol 88 no 9pp 3257ndash3269 2011

[30] D Adrian J Ullrich and E R Weippl ldquoGrid shock coor-dinated load-changing attacks on power grids the non-smartpower grid is vulnerable to cyber attacks as wellrdquo in Pro-ceedings of the 33rd Annual Computer Security ApplicationsConference pp 303ndash314 Orlando FL USA September 2017

[31] G M Zhang et al ldquoDolphinattack inaudible voice com-mandsrdquo in Proceedings of the 2017 ACM SIGSAC Conferenceon Computer and Communications Security pp 103ndash117Dallas TX USA November 2017

[32] E Bou-Harb C Fachkha M Pourzandi M Debbabi andC Assi ldquoCommunication security for smart grid distributionnetworksrdquo IEEE Communications Magazine vol 51 no 1pp 42ndash49 2013

[33] X Chen ldquoIndustrial control network information securitythreats and vulnerability analysis and researchrdquo ComputerScience vol 39 no 10 pp 4188ndash4190 2012

[34] W Knowles D Prince D Hutchison and K Jones ldquoA surveyof cyber security management in industrial control systemsrdquoInternational Journal of Critical Infrastructure Protectionvol 9 no 1 pp 52ndash80 2015

[35] C-W Disso C-C Liu and G Manimaran ldquoVulnerabilityassessment of cybersecurity for SCADA systemsrdquo IEEETransactions on Power Systems vol 23 no 4 pp 1836ndash18462008

[36] L Sankar S R Rajagopalan S Mohajer and H V PoorldquoSmart meter privacy a theoretical frameworkrdquo IEEETransactions on Smart Grid vol 4 no 2 pp 837ndash846 2013

[37] M Li and H-J Lin ldquoDesign and implementation of smarthome control systems based on wireless sensor networks andpower line communicationsrdquo IEEE Transactions on IndustrialElectronics vol 62 no 7 pp 4430ndash4442 2015

12 Complexity

Page 8: Security Risk Analysis of Active Distribution Networks

current In the low-voltage power distribution system theimbalance of the three-phase load current at the outlet of thedistribution transformer should be less than 10 For theconvenience of quantification assume that the attacked loadis concentrated in one phase that is single phase

In scenario 2 three-phase current on the secondary side ofthe transformer before and after the AII

uattack is obtainedthrough simulation as shown in Figure 8 Before the attack theeffective value of the three-phase current Ia Ib Ic 850A andthe degree of three-phase imbalance is 0 after the attack thethree-phase load is unbalanced Ia Ib 850A and Ic 525Aand the three-phase imbalance is 148 It can be seen that thethree-phase balance before and after the attack exceeds thestandard and the power quality does not meet the standardFurther calculation can be obtained when single-phaseΔPP0 01 and ε 10 It can be obtained that when single-phase ΔPP0 gt 01 the three-phase imbalance degree exceedsthe standard

If the imbalance degree of three-phase voltage becomesvery serious it will increase line and transformer loss si-multaneously and affect the safe operation of electricalequipment Supplying power under unbalanced voltageconditions may easily cause the userrsquos electrical equipmentwith a high-voltage one-phase connection to burn out whilethe userrsquos electrical equipment with a low-voltage one-phaseconnection may show abnormal work

+e suffered attack nodes dropped on a large scale in thedistribution network +e voltage distribution of each nodeis shown in Figure 9 It can be seen that after the AII

u attacksthe voltage of each node is increasing and the voltage perunit value of node 18 increases from 1057 to 1074 whichhas exceeded the allowable range of power quality voltagedeviation and results in reduced power quality

For the distribution network transformer the excessivevoltage not only reduced service life of transformers but itmay also cause resonance phenomena and harmonic pol-lution and disrupt other normally operating equipment Forelectrical equipment the excessive voltage can affect thenormal operation while the electrical equipment operatedwith high voltage for a long time would show reduction inservice life and increase in power consumption

To change the attack intensity the voltage of each node isshown in Figure 10 where the corresponding attack modesfrom decentralized attacks to no attacks of the curve aredescribed as follows

(1) +e decentralized attacks all the nodes with half ofthe load suffered the AII

u attacks(2) +e centralized large-scale attacks nodes 18 20 25

and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in large-scale load of attacked nodes tripping from the linePPN 0

(3) +e centralized small-scale attacks nodes 18 20 25and 30 of the IEEE 33-bus standard distributionsystem suffered AII

u attacks and it resulted in 50load of attacked nodes tripping from the line

(4) No attacks

Among them attack modes (1) and (2) caused thevoltage to exceed the limits and reduced the power qualityAlthough attack mode (3) raised the node voltage thevoltage deviation index of the power quality still satisfied thespecified range

If the ADNs within a certain attack scenario where thenode 22 is connected to the DG take this branch line as theanalysis object the voltage distribution of those nodes areshown in Figure 11 Although the node voltage increases arecaused by the synchronous dropping attacks the deviationindex of the voltage still satisfied the specified range

It can be seen that the deviation impact of AIIu attacks on

the load voltage of the distribution network is not onlyrelated to the attack intensity but also related to the topologyof the distribution network

43 Impact of Frequent Casting and Dropping of Load AttacksonPowerQuality Due to the DGs the power systemmay besubjected to periodic disturbance of the load and it wouldcause power oscillation that is compelled resonance

Attack pointTime (s)

Curr

ent (

A)

15001000

5000

ndash1500ndash1000

ndash500

Ia Ib Ic

0 001 002 003 004 005 006

Figure 8 +ree-phase current on the secondary side of thetransformer before and after the AII

u attack

0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34090

092

094

096

098

100

102

104

106

108

Volta

ge p

er u

int

Node

The voltage of ADNs nodes before attacksThe voltage of ADNs nodes aer attacks

Figure 9 +e voltage value of ADNsrsquo nodes before and after AIIu

attack

8 Complexity

low-frequency oscillation +e theory of compelled reso-nance low-frequency oscillation points out that regular smallperiodic disturbance in the system will cause the poweroscillation If the frequency of the disturbance is consistentwith the natural frequency of the system it will cause res-onance and the compelled oscillation amplitude of thesystem is the largest at this period

Assume that the DG is directly connected to the powergrid through the generator and select the connection node asa malicious attack object to construct a single-machineinfinite system As shown in Figure 12 the DG is connectedinto the distribution system through a 04 kV10 kV boostertransformer

To cast small-scale load while the system is runningstably with light load we can get the generator speed curveas shown in Figure 13 and the natural oscillation frequencyof the system is 167Hz

Scenario 3 the connection point of the DG suffered theAIII

u attack (t[0] 6 s and ΔPP0 1)To change the frequency of ldquocastingrdquoldquodroppingrdquo of the

load while the same-scale load is attacked we can obtainthe line power curve as shown in Figure 14 When thecommand ldquoonrdquoldquooffrdquo is sent at τ 03 s intervals as shownin Figure 14(a) the disturbance frequency is 167Hz Whenthe command ldquoonrdquoldquooffrdquo is sent at τ 026 s intervals as

shown in Figure 14(b) the disturbance frequency is187Hz When the command ldquoonrdquoldquooffrdquo is sent at τ 034 sintervals as shown in Figure 14(c) the disturbance fre-quency is 147Hz

Due to the disturbance frequency being equal to thenatural frequency of the system it results in the largestamplitude of the power fluctuation when the deviationbetween the disturbance frequency and the natural fre-quency of the system increases the power oscillationcurves can also be obtained but the amplitude of this oneis relatively small And the amplitude of power oscilla-tions is also related to the scales of the attack loadCompared with Figure 14(a) While the scale of the attackload becomes 50 the frequency of periodic disturbanceis still 167 Hz and the oscillation amplitude becomesrelatively small as shown in Figure 15

Node

Volta

ge p

er u

int

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

112

11

108

106

104

102

1

098

096

094

092

Centralized small-scale attacksNo attacks

Decentralized attacksCentralized large-scale attacks

Figure 10 +e voltage value of nodes before and after AIIu attack under different attack modes

Node

Volta

ge p

er u

int

1008100610041002

10998099609940992

1 2 19 20 21 22

After attack of ADNBefore attack of ADN

Figure 11 +e partial node voltage before and after AIIu attack

DG

Infinite power system

Figure 12 Single-machine (DG) infinite power system

1001

10005

1

09995

0999

6 65 7 75 8 85Ts

ltRotor speed wm (pu)gt

Figure 13 Rotation speed fluctuation after small disturbance

Complexity 9

In the traditional distribution network the load mainlyconsumes electrical energy passively and it is usually faraway from the generator with relatively scattered distri-bution and it is not easy to have large-scale synchronousldquocastingrdquoldquodroppingrdquo However with the development ofDG connected to the power grid and CLs it makes thedistance between the load and the generator become closerand the load would be maliciously controlled by the at-tackers If the large-scale CLs are maliciously controlled andthe frequency of periodic ldquocastingrdquo and ldquodroppingrdquo is closeto the natural frequency of the system it may amplify theimpact of power fluctuation and affect the power quality ofthe distribution network

44 Summary on the Influence of CLs byMalicious Control onADNs +e power quality impact of CLs maliciously con-trolled by attackers on ADNs can be summarized in Table 1Compared with the power quality of the distribution net-work without DG the DG connected to the power grid canbe leveraged to improve the power quality of the distributionnetworks such as improving the condition of low-voltagecross-limits However while the CLs suffered unpredictablecyber attacks it can result in dropping or casting of the large-scale CLs frequently and synchronously and the reliability ofthe distribution network is also reduced In summary thoseimpacts can cause power quality problems such as voltagedeviation and voltage fluctuation and even introduce new

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(a)

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(b)Ac

tive p

ower

uni

te v

alue

(pu)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(c)

Figure 14 +e active power oscillation curve of the line under different disturbance frequencies of (a) 167Hz (b) 187Hz and (c) 147Hz

Activ

e pow

er u

nite

val

ue (p

u)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

Figure 15 +e active power oscillation curve of line under small-scale load attack with a disturbance frequency of 167Hz

10 Complexity

power quality issues (such as forced resonance at low fre-quencies) In addition the impact of cyber attacks on thepower supply quality of ADNs is not only related to theattack modes but also related to the topology of the dis-tribution network (such as the connection points of DG) Inorder to ensure the normal operation of the ADNs the risksintroduced by cyber attacks must be considered

5 Conclusions

+e introduction of distributed energy objects and the fullapplication of communication technologies make distribu-tion networks face new security risks In this paper weanalyze the security risks of industrial CLs and civil CLs inthe distribution networks and compare the revenue and costof attacks from the perspective of attackers It can be seenthat the cyber attack against civil CLs can obtain a largeattack revenues with a small attack cost +en an ADNcontrol model considering cyber attacks is established andat the same time the attack behavior model is also estab-lished In these models it provides a clear representation ofthe attack object the attack method and the across-spaceimpact mechanism Taking power quality as an example theimpacts of AI

U AIIU and AIII

U attacks on ADNs are analyzedIn summary the result shows that DG connected to thepower grid can improve power quality but once large-scaleCLs are suffered by cyber attacks it may also cause powerquality problems and may introduce new problems such aslow-frequency compelled oscillation

In the future there is still a lot of work to be done againstthe potential security risks of the ADNs introduced bydistributed energy objects Based on the existing researchresults we can continue to study the impacts of cyber attacksagainst civil CL on the security and stable operation of theADNs such as refining attack models enriching attackscenarios and exploring the ADN operation characteristicsafter the attacks In order to provide a reference for thepower grid to improve its operation control strategy andformulate user-side cyber security standards we should fullygrasp the risks introduced by the CL to the ADNs In otherwords we can refer to the ADN security risk analysis of thescenario where the CLs have suffered malicious control andcarry out research on other energy objects in the ADNs asthe attack object In addition further research on the powergrid cascading failures caused by cyber attacks on distributedenergy objects can provide a reference for the security andstable operation of the entire power grid

Data Availability

+e data used to support the findings of this study arecurrently under embargo while the research findings arecommercialized Requests for data after publication of thisarticle will be considered by the corresponding author

Conflicts of Interest

+e authors declare that there are no conflicts of interestregarding the publication of this manuscript

Acknowledgments

+is work was supported by the Science and TechnologyProject of State Grid Corporation of China (Research onCooperative Situation Awareness and Active DefenseMethod of Cyber-Physical Power System for Cyber Attackno SGJSDK00KJJS1800315)

References

[1] QWangW Tai Y Tang andM Ni ldquoReview of the false datainjection attack against the cyber-physical power systemrdquo IETCyber-Physical Systems 3eory amp Applications vol 4 no 2pp 101ndash107 2019

[2] S Sridhar A Hahn and M Govindarasu ldquoCyber-physicalsystem security for the electric power gridrdquo Proceedings of theIEEE vol 100 no 1 pp 210ndash224 2012

[3] M S Mahmoud M M Hamdan and U A BaroudildquoModeling and control of cyber-physical systems subject tocyber attacks a survey of recent advances and challengesrdquoNeurocomputing vol 338 no 2 pp 101ndash115 2019

[4] R Liu C Vellaithurai S S Biswas T T Gamage andA K Srivastava ldquoAnalyzing the cyber-physical impact ofcyber events on the power gridrdquo IEEE Transactions on SmartGrid vol 6 no 5 pp 2444ndash2453 2015

[5] Y Cai Y Cao Y Li T Huang and B Zhou ldquoCascadingfailure analysis considering interaction between power gridsand communication networksrdquo IEEE Transactions on SmartGrid vol 7 no 1 pp 530ndash538 2016

[6] F Liang W Yu X Liu D Griffith and N Golmie ldquoTowardedge-based deep learning in industrial Internet of thingsrdquoIEEE Internet of 3ings Journal vol 7 no 5 pp 4329ndash43412020

[7] Z Wang M Rahnamay-Naeini J M Abreu et al ldquoImpacts ofoperatorsrsquo behavior on reliability of power grids duringcascading failuresrdquo IEEE Transactions on Power Systemsvol 33 no 6 pp 6013ndash6024 2018

[8] D E Whitehead K Owens D Gammel and J SmithldquoUkraine cyber-induced power outage analysis and practical

Table 1 Distribution network control model with CLs

Attack behaviors (A)Risk

Scenarios Attack object Type of attack Scale

IEEE 33-bus standard distribution system Node 18202530 AI

U 12gtPPN gt 042 Low-voltage exceeding limits

IEEE 33-bus standard distribution system Node 18202530 AII

U

Single-phaseΔPP0 gt 01 High-voltage exceeding limits

Single-machine (DG) infinite powersystem DG access node AIII

U 12gtPPN gt 05 Power fluctuation andresonance

Complexity 11

mitigation strategiesrdquo in Proceedings of the 2017 70th AnnualConference for Protective Relay Engineers (CPRE) pp 1ndash8College Station TX USA April 2017

[9] R Langner ldquoTo kill a centrifuge a technical analysis of whatStuxnetrsquos creators tried to achieverdquo Technical Report LangnerCommunications Norderstedt Germany 2013

[10] J E Sullivan and D Kamensky ldquoHow cyber-attacks inUkraine show the vulnerability of the US power gridrdquo 3eElectricity Journal vol 30 no 3 pp 30ndash35 2017

[11] R M Lee M J Assante and T Conway Analysis of the CyberAttack on the Ukrainian Power Grid SANS Industrial ControlSystems Bethesda MD USA 2016

[12] C-C Sun A Hahn and C-C Liu ldquoCyber security of a powergrid state-of-the-artrdquo International Journal of ElectricalPower amp Energy Systems vol 99 no 4 pp 45ndash56 2018

[13] G Dan H Sandberg M Ekstedt and G Bjorkman ldquoChal-lenges in power system information securityrdquo IEEE SecurityPrivacy vol 10 no 4 pp 62ndash70 2012

[14] A Rasim I Yadigar and S Lyudmila ldquoCyber-physical sys-tems and their security issuesrdquo Computers in Industryvol 100 no 4 pp 212ndash223 2018

[15] P Dong Y Han X Guo and F Xie ldquoA systematic review ofstudies on cyber physical system securityrdquo InternationalJournal of Security and Its Applications vol 9 no 1pp 155ndash164 2015

[16] N Komninos E Philippou and A Pitsillides ldquoSurvey insmart grid and smart home security issues challenges andcountermeasuresrdquo IEEE Communications Surveys amp Tuto-rials vol 16 no 4 pp 1933ndash1954 2014

[17] A-H Mohsenian-Rad and A Leon-Garcia ldquoDistributed in-ternet-based load altering attacks against smart power gridsrdquoIEEE Transactions on Smart Grid vol 2 no 4 pp 667ndash6742011

[18] R Chen X Li and H Zhong ldquonovel online detection methodof data injection attack against dynamic state estimation insmart gridrdquo Neurocomputing vol 344 no 7 pp 73ndash81 2019

[19] C Fei C Patsios P C Taylor and Z Pourmirza ldquoUsing self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemesrdquo IEEE Transactionson Smart Grid vol 10 no 3 pp 3010ndash3019 2019

[20] S Khan R Khan and A H Al-Bayatti ldquoSecure communi-cation architecture for dynamic energy management in smartgridrdquo IEEE Power and Energy Technology Systems Journalvol 6 no 1 pp 47ndash58 2019

[21] S Saleh M Prateek and P H Vincent ldquoBlackIoT IoT botnetof high wattage devices can disrupt the power gridrdquo inProceedings of the 27th USENIX Security Symposium(USENIX Security 18) pp 15ndash32 Baltimore MD USA May2018

[22] Z Dong M Tian and L Ding ldquoA framework for modelingand structural vulnerability analysis of spatial cyber-physicalpower systems from an attack-defense perspectiverdquo IEEESystems Journal pp 1ndash12 2020

[23] T N Boutsika and S A Papathanassiou ldquoShort-circuit cal-culations in networks with distributed generationrdquo ElectricPower Systems Research vol 78 no 7 pp 1181ndash1191 2008

[24] V V S N Murty and A Kumar ldquoOptimal placement of DGin radial distribution systems based on new voltage stabilityindex under load growthrdquo International Journal of ElectricalPower amp Energy Systems vol 69 no 3 pp 246ndash256 2015

[25] V C Nikolaidis E Papanikolaou and A S Safigianni ldquoAcommunication-assisted overcurrent protection scheme forradial distribution systems with distributed generationrdquo IEEETransactions on Smart Grid vol 7 no 1 pp 114ndash123 2016

[26] K Clement-Nyns E Haesen and J Driesen ldquo+e impact ofcharging plug-in hybrid electric vehicles on a residentialdistribution gridrdquo IEEE Transactions on Power Systemsvol 25 no 1 pp 371ndash380 2010

[27] J Munkhammar P Grahn and J Widen ldquoQuantifying self-consumption of on-site photovoltaic power generation inhouseholds with electric vehicle home chargingrdquo Solar En-ergy vol 97 no 6 pp 208ndash216 2013

[28] M Singh P Kumar and I Kar ldquoA multi charging station forelectric vehicles and its utilization for load management andthe grid supportrdquo IEEE Transactions on Smart Grid vol 4no 2 pp 1026ndash1037 2013

[29] M P Moghaddam A Abdollahi and M RashidinejadldquoFlexible demand response programs modeling in competi-tive electricity marketsrdquo Applied Energy vol 88 no 9pp 3257ndash3269 2011

[30] D Adrian J Ullrich and E R Weippl ldquoGrid shock coor-dinated load-changing attacks on power grids the non-smartpower grid is vulnerable to cyber attacks as wellrdquo in Pro-ceedings of the 33rd Annual Computer Security ApplicationsConference pp 303ndash314 Orlando FL USA September 2017

[31] G M Zhang et al ldquoDolphinattack inaudible voice com-mandsrdquo in Proceedings of the 2017 ACM SIGSAC Conferenceon Computer and Communications Security pp 103ndash117Dallas TX USA November 2017

[32] E Bou-Harb C Fachkha M Pourzandi M Debbabi andC Assi ldquoCommunication security for smart grid distributionnetworksrdquo IEEE Communications Magazine vol 51 no 1pp 42ndash49 2013

[33] X Chen ldquoIndustrial control network information securitythreats and vulnerability analysis and researchrdquo ComputerScience vol 39 no 10 pp 4188ndash4190 2012

[34] W Knowles D Prince D Hutchison and K Jones ldquoA surveyof cyber security management in industrial control systemsrdquoInternational Journal of Critical Infrastructure Protectionvol 9 no 1 pp 52ndash80 2015

[35] C-W Disso C-C Liu and G Manimaran ldquoVulnerabilityassessment of cybersecurity for SCADA systemsrdquo IEEETransactions on Power Systems vol 23 no 4 pp 1836ndash18462008

[36] L Sankar S R Rajagopalan S Mohajer and H V PoorldquoSmart meter privacy a theoretical frameworkrdquo IEEETransactions on Smart Grid vol 4 no 2 pp 837ndash846 2013

[37] M Li and H-J Lin ldquoDesign and implementation of smarthome control systems based on wireless sensor networks andpower line communicationsrdquo IEEE Transactions on IndustrialElectronics vol 62 no 7 pp 4430ndash4442 2015

12 Complexity

Page 9: Security Risk Analysis of Active Distribution Networks

low-frequency oscillation +e theory of compelled reso-nance low-frequency oscillation points out that regular smallperiodic disturbance in the system will cause the poweroscillation If the frequency of the disturbance is consistentwith the natural frequency of the system it will cause res-onance and the compelled oscillation amplitude of thesystem is the largest at this period

Assume that the DG is directly connected to the powergrid through the generator and select the connection node asa malicious attack object to construct a single-machineinfinite system As shown in Figure 12 the DG is connectedinto the distribution system through a 04 kV10 kV boostertransformer

To cast small-scale load while the system is runningstably with light load we can get the generator speed curveas shown in Figure 13 and the natural oscillation frequencyof the system is 167Hz

Scenario 3 the connection point of the DG suffered theAIII

u attack (t[0] 6 s and ΔPP0 1)To change the frequency of ldquocastingrdquoldquodroppingrdquo of the

load while the same-scale load is attacked we can obtainthe line power curve as shown in Figure 14 When thecommand ldquoonrdquoldquooffrdquo is sent at τ 03 s intervals as shownin Figure 14(a) the disturbance frequency is 167Hz Whenthe command ldquoonrdquoldquooffrdquo is sent at τ 026 s intervals as

shown in Figure 14(b) the disturbance frequency is187Hz When the command ldquoonrdquoldquooffrdquo is sent at τ 034 sintervals as shown in Figure 14(c) the disturbance fre-quency is 147Hz

Due to the disturbance frequency being equal to thenatural frequency of the system it results in the largestamplitude of the power fluctuation when the deviationbetween the disturbance frequency and the natural fre-quency of the system increases the power oscillationcurves can also be obtained but the amplitude of this oneis relatively small And the amplitude of power oscilla-tions is also related to the scales of the attack loadCompared with Figure 14(a) While the scale of the attackload becomes 50 the frequency of periodic disturbanceis still 167 Hz and the oscillation amplitude becomesrelatively small as shown in Figure 15

Node

Volta

ge p

er u

int

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33

112

11

108

106

104

102

1

098

096

094

092

Centralized small-scale attacksNo attacks

Decentralized attacksCentralized large-scale attacks

Figure 10 +e voltage value of nodes before and after AIIu attack under different attack modes

Node

Volta

ge p

er u

int

1008100610041002

10998099609940992

1 2 19 20 21 22

After attack of ADNBefore attack of ADN

Figure 11 +e partial node voltage before and after AIIu attack

DG

Infinite power system

Figure 12 Single-machine (DG) infinite power system

1001

10005

1

09995

0999

6 65 7 75 8 85Ts

ltRotor speed wm (pu)gt

Figure 13 Rotation speed fluctuation after small disturbance

Complexity 9

In the traditional distribution network the load mainlyconsumes electrical energy passively and it is usually faraway from the generator with relatively scattered distri-bution and it is not easy to have large-scale synchronousldquocastingrdquoldquodroppingrdquo However with the development ofDG connected to the power grid and CLs it makes thedistance between the load and the generator become closerand the load would be maliciously controlled by the at-tackers If the large-scale CLs are maliciously controlled andthe frequency of periodic ldquocastingrdquo and ldquodroppingrdquo is closeto the natural frequency of the system it may amplify theimpact of power fluctuation and affect the power quality ofthe distribution network

44 Summary on the Influence of CLs byMalicious Control onADNs +e power quality impact of CLs maliciously con-trolled by attackers on ADNs can be summarized in Table 1Compared with the power quality of the distribution net-work without DG the DG connected to the power grid canbe leveraged to improve the power quality of the distributionnetworks such as improving the condition of low-voltagecross-limits However while the CLs suffered unpredictablecyber attacks it can result in dropping or casting of the large-scale CLs frequently and synchronously and the reliability ofthe distribution network is also reduced In summary thoseimpacts can cause power quality problems such as voltagedeviation and voltage fluctuation and even introduce new

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(a)

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(b)Ac

tive p

ower

uni

te v

alue

(pu)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(c)

Figure 14 +e active power oscillation curve of the line under different disturbance frequencies of (a) 167Hz (b) 187Hz and (c) 147Hz

Activ

e pow

er u

nite

val

ue (p

u)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

Figure 15 +e active power oscillation curve of line under small-scale load attack with a disturbance frequency of 167Hz

10 Complexity

power quality issues (such as forced resonance at low fre-quencies) In addition the impact of cyber attacks on thepower supply quality of ADNs is not only related to theattack modes but also related to the topology of the dis-tribution network (such as the connection points of DG) Inorder to ensure the normal operation of the ADNs the risksintroduced by cyber attacks must be considered

5 Conclusions

+e introduction of distributed energy objects and the fullapplication of communication technologies make distribu-tion networks face new security risks In this paper weanalyze the security risks of industrial CLs and civil CLs inthe distribution networks and compare the revenue and costof attacks from the perspective of attackers It can be seenthat the cyber attack against civil CLs can obtain a largeattack revenues with a small attack cost +en an ADNcontrol model considering cyber attacks is established andat the same time the attack behavior model is also estab-lished In these models it provides a clear representation ofthe attack object the attack method and the across-spaceimpact mechanism Taking power quality as an example theimpacts of AI

U AIIU and AIII

U attacks on ADNs are analyzedIn summary the result shows that DG connected to thepower grid can improve power quality but once large-scaleCLs are suffered by cyber attacks it may also cause powerquality problems and may introduce new problems such aslow-frequency compelled oscillation

In the future there is still a lot of work to be done againstthe potential security risks of the ADNs introduced bydistributed energy objects Based on the existing researchresults we can continue to study the impacts of cyber attacksagainst civil CL on the security and stable operation of theADNs such as refining attack models enriching attackscenarios and exploring the ADN operation characteristicsafter the attacks In order to provide a reference for thepower grid to improve its operation control strategy andformulate user-side cyber security standards we should fullygrasp the risks introduced by the CL to the ADNs In otherwords we can refer to the ADN security risk analysis of thescenario where the CLs have suffered malicious control andcarry out research on other energy objects in the ADNs asthe attack object In addition further research on the powergrid cascading failures caused by cyber attacks on distributedenergy objects can provide a reference for the security andstable operation of the entire power grid

Data Availability

+e data used to support the findings of this study arecurrently under embargo while the research findings arecommercialized Requests for data after publication of thisarticle will be considered by the corresponding author

Conflicts of Interest

+e authors declare that there are no conflicts of interestregarding the publication of this manuscript

Acknowledgments

+is work was supported by the Science and TechnologyProject of State Grid Corporation of China (Research onCooperative Situation Awareness and Active DefenseMethod of Cyber-Physical Power System for Cyber Attackno SGJSDK00KJJS1800315)

References

[1] QWangW Tai Y Tang andM Ni ldquoReview of the false datainjection attack against the cyber-physical power systemrdquo IETCyber-Physical Systems 3eory amp Applications vol 4 no 2pp 101ndash107 2019

[2] S Sridhar A Hahn and M Govindarasu ldquoCyber-physicalsystem security for the electric power gridrdquo Proceedings of theIEEE vol 100 no 1 pp 210ndash224 2012

[3] M S Mahmoud M M Hamdan and U A BaroudildquoModeling and control of cyber-physical systems subject tocyber attacks a survey of recent advances and challengesrdquoNeurocomputing vol 338 no 2 pp 101ndash115 2019

[4] R Liu C Vellaithurai S S Biswas T T Gamage andA K Srivastava ldquoAnalyzing the cyber-physical impact ofcyber events on the power gridrdquo IEEE Transactions on SmartGrid vol 6 no 5 pp 2444ndash2453 2015

[5] Y Cai Y Cao Y Li T Huang and B Zhou ldquoCascadingfailure analysis considering interaction between power gridsand communication networksrdquo IEEE Transactions on SmartGrid vol 7 no 1 pp 530ndash538 2016

[6] F Liang W Yu X Liu D Griffith and N Golmie ldquoTowardedge-based deep learning in industrial Internet of thingsrdquoIEEE Internet of 3ings Journal vol 7 no 5 pp 4329ndash43412020

[7] Z Wang M Rahnamay-Naeini J M Abreu et al ldquoImpacts ofoperatorsrsquo behavior on reliability of power grids duringcascading failuresrdquo IEEE Transactions on Power Systemsvol 33 no 6 pp 6013ndash6024 2018

[8] D E Whitehead K Owens D Gammel and J SmithldquoUkraine cyber-induced power outage analysis and practical

Table 1 Distribution network control model with CLs

Attack behaviors (A)Risk

Scenarios Attack object Type of attack Scale

IEEE 33-bus standard distribution system Node 18202530 AI

U 12gtPPN gt 042 Low-voltage exceeding limits

IEEE 33-bus standard distribution system Node 18202530 AII

U

Single-phaseΔPP0 gt 01 High-voltage exceeding limits

Single-machine (DG) infinite powersystem DG access node AIII

U 12gtPPN gt 05 Power fluctuation andresonance

Complexity 11

mitigation strategiesrdquo in Proceedings of the 2017 70th AnnualConference for Protective Relay Engineers (CPRE) pp 1ndash8College Station TX USA April 2017

[9] R Langner ldquoTo kill a centrifuge a technical analysis of whatStuxnetrsquos creators tried to achieverdquo Technical Report LangnerCommunications Norderstedt Germany 2013

[10] J E Sullivan and D Kamensky ldquoHow cyber-attacks inUkraine show the vulnerability of the US power gridrdquo 3eElectricity Journal vol 30 no 3 pp 30ndash35 2017

[11] R M Lee M J Assante and T Conway Analysis of the CyberAttack on the Ukrainian Power Grid SANS Industrial ControlSystems Bethesda MD USA 2016

[12] C-C Sun A Hahn and C-C Liu ldquoCyber security of a powergrid state-of-the-artrdquo International Journal of ElectricalPower amp Energy Systems vol 99 no 4 pp 45ndash56 2018

[13] G Dan H Sandberg M Ekstedt and G Bjorkman ldquoChal-lenges in power system information securityrdquo IEEE SecurityPrivacy vol 10 no 4 pp 62ndash70 2012

[14] A Rasim I Yadigar and S Lyudmila ldquoCyber-physical sys-tems and their security issuesrdquo Computers in Industryvol 100 no 4 pp 212ndash223 2018

[15] P Dong Y Han X Guo and F Xie ldquoA systematic review ofstudies on cyber physical system securityrdquo InternationalJournal of Security and Its Applications vol 9 no 1pp 155ndash164 2015

[16] N Komninos E Philippou and A Pitsillides ldquoSurvey insmart grid and smart home security issues challenges andcountermeasuresrdquo IEEE Communications Surveys amp Tuto-rials vol 16 no 4 pp 1933ndash1954 2014

[17] A-H Mohsenian-Rad and A Leon-Garcia ldquoDistributed in-ternet-based load altering attacks against smart power gridsrdquoIEEE Transactions on Smart Grid vol 2 no 4 pp 667ndash6742011

[18] R Chen X Li and H Zhong ldquonovel online detection methodof data injection attack against dynamic state estimation insmart gridrdquo Neurocomputing vol 344 no 7 pp 73ndash81 2019

[19] C Fei C Patsios P C Taylor and Z Pourmirza ldquoUsing self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemesrdquo IEEE Transactionson Smart Grid vol 10 no 3 pp 3010ndash3019 2019

[20] S Khan R Khan and A H Al-Bayatti ldquoSecure communi-cation architecture for dynamic energy management in smartgridrdquo IEEE Power and Energy Technology Systems Journalvol 6 no 1 pp 47ndash58 2019

[21] S Saleh M Prateek and P H Vincent ldquoBlackIoT IoT botnetof high wattage devices can disrupt the power gridrdquo inProceedings of the 27th USENIX Security Symposium(USENIX Security 18) pp 15ndash32 Baltimore MD USA May2018

[22] Z Dong M Tian and L Ding ldquoA framework for modelingand structural vulnerability analysis of spatial cyber-physicalpower systems from an attack-defense perspectiverdquo IEEESystems Journal pp 1ndash12 2020

[23] T N Boutsika and S A Papathanassiou ldquoShort-circuit cal-culations in networks with distributed generationrdquo ElectricPower Systems Research vol 78 no 7 pp 1181ndash1191 2008

[24] V V S N Murty and A Kumar ldquoOptimal placement of DGin radial distribution systems based on new voltage stabilityindex under load growthrdquo International Journal of ElectricalPower amp Energy Systems vol 69 no 3 pp 246ndash256 2015

[25] V C Nikolaidis E Papanikolaou and A S Safigianni ldquoAcommunication-assisted overcurrent protection scheme forradial distribution systems with distributed generationrdquo IEEETransactions on Smart Grid vol 7 no 1 pp 114ndash123 2016

[26] K Clement-Nyns E Haesen and J Driesen ldquo+e impact ofcharging plug-in hybrid electric vehicles on a residentialdistribution gridrdquo IEEE Transactions on Power Systemsvol 25 no 1 pp 371ndash380 2010

[27] J Munkhammar P Grahn and J Widen ldquoQuantifying self-consumption of on-site photovoltaic power generation inhouseholds with electric vehicle home chargingrdquo Solar En-ergy vol 97 no 6 pp 208ndash216 2013

[28] M Singh P Kumar and I Kar ldquoA multi charging station forelectric vehicles and its utilization for load management andthe grid supportrdquo IEEE Transactions on Smart Grid vol 4no 2 pp 1026ndash1037 2013

[29] M P Moghaddam A Abdollahi and M RashidinejadldquoFlexible demand response programs modeling in competi-tive electricity marketsrdquo Applied Energy vol 88 no 9pp 3257ndash3269 2011

[30] D Adrian J Ullrich and E R Weippl ldquoGrid shock coor-dinated load-changing attacks on power grids the non-smartpower grid is vulnerable to cyber attacks as wellrdquo in Pro-ceedings of the 33rd Annual Computer Security ApplicationsConference pp 303ndash314 Orlando FL USA September 2017

[31] G M Zhang et al ldquoDolphinattack inaudible voice com-mandsrdquo in Proceedings of the 2017 ACM SIGSAC Conferenceon Computer and Communications Security pp 103ndash117Dallas TX USA November 2017

[32] E Bou-Harb C Fachkha M Pourzandi M Debbabi andC Assi ldquoCommunication security for smart grid distributionnetworksrdquo IEEE Communications Magazine vol 51 no 1pp 42ndash49 2013

[33] X Chen ldquoIndustrial control network information securitythreats and vulnerability analysis and researchrdquo ComputerScience vol 39 no 10 pp 4188ndash4190 2012

[34] W Knowles D Prince D Hutchison and K Jones ldquoA surveyof cyber security management in industrial control systemsrdquoInternational Journal of Critical Infrastructure Protectionvol 9 no 1 pp 52ndash80 2015

[35] C-W Disso C-C Liu and G Manimaran ldquoVulnerabilityassessment of cybersecurity for SCADA systemsrdquo IEEETransactions on Power Systems vol 23 no 4 pp 1836ndash18462008

[36] L Sankar S R Rajagopalan S Mohajer and H V PoorldquoSmart meter privacy a theoretical frameworkrdquo IEEETransactions on Smart Grid vol 4 no 2 pp 837ndash846 2013

[37] M Li and H-J Lin ldquoDesign and implementation of smarthome control systems based on wireless sensor networks andpower line communicationsrdquo IEEE Transactions on IndustrialElectronics vol 62 no 7 pp 4430ndash4442 2015

12 Complexity

Page 10: Security Risk Analysis of Active Distribution Networks

In the traditional distribution network the load mainlyconsumes electrical energy passively and it is usually faraway from the generator with relatively scattered distri-bution and it is not easy to have large-scale synchronousldquocastingrdquoldquodroppingrdquo However with the development ofDG connected to the power grid and CLs it makes thedistance between the load and the generator become closerand the load would be maliciously controlled by the at-tackers If the large-scale CLs are maliciously controlled andthe frequency of periodic ldquocastingrdquo and ldquodroppingrdquo is closeto the natural frequency of the system it may amplify theimpact of power fluctuation and affect the power quality ofthe distribution network

44 Summary on the Influence of CLs byMalicious Control onADNs +e power quality impact of CLs maliciously con-trolled by attackers on ADNs can be summarized in Table 1Compared with the power quality of the distribution net-work without DG the DG connected to the power grid canbe leveraged to improve the power quality of the distributionnetworks such as improving the condition of low-voltagecross-limits However while the CLs suffered unpredictablecyber attacks it can result in dropping or casting of the large-scale CLs frequently and synchronously and the reliability ofthe distribution network is also reduced In summary thoseimpacts can cause power quality problems such as voltagedeviation and voltage fluctuation and even introduce new

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(a)

Activ

e pow

er p

er u

int

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(b)Ac

tive p

ower

uni

te v

alue

(pu)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

(c)

Figure 14 +e active power oscillation curve of the line under different disturbance frequencies of (a) 167Hz (b) 187Hz and (c) 147Hz

Activ

e pow

er u

nite

val

ue (p

u)

Time (s)6 7 8 9 10 11 12 13 14 15

10908070605040302

Figure 15 +e active power oscillation curve of line under small-scale load attack with a disturbance frequency of 167Hz

10 Complexity

power quality issues (such as forced resonance at low fre-quencies) In addition the impact of cyber attacks on thepower supply quality of ADNs is not only related to theattack modes but also related to the topology of the dis-tribution network (such as the connection points of DG) Inorder to ensure the normal operation of the ADNs the risksintroduced by cyber attacks must be considered

5 Conclusions

+e introduction of distributed energy objects and the fullapplication of communication technologies make distribu-tion networks face new security risks In this paper weanalyze the security risks of industrial CLs and civil CLs inthe distribution networks and compare the revenue and costof attacks from the perspective of attackers It can be seenthat the cyber attack against civil CLs can obtain a largeattack revenues with a small attack cost +en an ADNcontrol model considering cyber attacks is established andat the same time the attack behavior model is also estab-lished In these models it provides a clear representation ofthe attack object the attack method and the across-spaceimpact mechanism Taking power quality as an example theimpacts of AI

U AIIU and AIII

U attacks on ADNs are analyzedIn summary the result shows that DG connected to thepower grid can improve power quality but once large-scaleCLs are suffered by cyber attacks it may also cause powerquality problems and may introduce new problems such aslow-frequency compelled oscillation

In the future there is still a lot of work to be done againstthe potential security risks of the ADNs introduced bydistributed energy objects Based on the existing researchresults we can continue to study the impacts of cyber attacksagainst civil CL on the security and stable operation of theADNs such as refining attack models enriching attackscenarios and exploring the ADN operation characteristicsafter the attacks In order to provide a reference for thepower grid to improve its operation control strategy andformulate user-side cyber security standards we should fullygrasp the risks introduced by the CL to the ADNs In otherwords we can refer to the ADN security risk analysis of thescenario where the CLs have suffered malicious control andcarry out research on other energy objects in the ADNs asthe attack object In addition further research on the powergrid cascading failures caused by cyber attacks on distributedenergy objects can provide a reference for the security andstable operation of the entire power grid

Data Availability

+e data used to support the findings of this study arecurrently under embargo while the research findings arecommercialized Requests for data after publication of thisarticle will be considered by the corresponding author

Conflicts of Interest

+e authors declare that there are no conflicts of interestregarding the publication of this manuscript

Acknowledgments

+is work was supported by the Science and TechnologyProject of State Grid Corporation of China (Research onCooperative Situation Awareness and Active DefenseMethod of Cyber-Physical Power System for Cyber Attackno SGJSDK00KJJS1800315)

References

[1] QWangW Tai Y Tang andM Ni ldquoReview of the false datainjection attack against the cyber-physical power systemrdquo IETCyber-Physical Systems 3eory amp Applications vol 4 no 2pp 101ndash107 2019

[2] S Sridhar A Hahn and M Govindarasu ldquoCyber-physicalsystem security for the electric power gridrdquo Proceedings of theIEEE vol 100 no 1 pp 210ndash224 2012

[3] M S Mahmoud M M Hamdan and U A BaroudildquoModeling and control of cyber-physical systems subject tocyber attacks a survey of recent advances and challengesrdquoNeurocomputing vol 338 no 2 pp 101ndash115 2019

[4] R Liu C Vellaithurai S S Biswas T T Gamage andA K Srivastava ldquoAnalyzing the cyber-physical impact ofcyber events on the power gridrdquo IEEE Transactions on SmartGrid vol 6 no 5 pp 2444ndash2453 2015

[5] Y Cai Y Cao Y Li T Huang and B Zhou ldquoCascadingfailure analysis considering interaction between power gridsand communication networksrdquo IEEE Transactions on SmartGrid vol 7 no 1 pp 530ndash538 2016

[6] F Liang W Yu X Liu D Griffith and N Golmie ldquoTowardedge-based deep learning in industrial Internet of thingsrdquoIEEE Internet of 3ings Journal vol 7 no 5 pp 4329ndash43412020

[7] Z Wang M Rahnamay-Naeini J M Abreu et al ldquoImpacts ofoperatorsrsquo behavior on reliability of power grids duringcascading failuresrdquo IEEE Transactions on Power Systemsvol 33 no 6 pp 6013ndash6024 2018

[8] D E Whitehead K Owens D Gammel and J SmithldquoUkraine cyber-induced power outage analysis and practical

Table 1 Distribution network control model with CLs

Attack behaviors (A)Risk

Scenarios Attack object Type of attack Scale

IEEE 33-bus standard distribution system Node 18202530 AI

U 12gtPPN gt 042 Low-voltage exceeding limits

IEEE 33-bus standard distribution system Node 18202530 AII

U

Single-phaseΔPP0 gt 01 High-voltage exceeding limits

Single-machine (DG) infinite powersystem DG access node AIII

U 12gtPPN gt 05 Power fluctuation andresonance

Complexity 11

mitigation strategiesrdquo in Proceedings of the 2017 70th AnnualConference for Protective Relay Engineers (CPRE) pp 1ndash8College Station TX USA April 2017

[9] R Langner ldquoTo kill a centrifuge a technical analysis of whatStuxnetrsquos creators tried to achieverdquo Technical Report LangnerCommunications Norderstedt Germany 2013

[10] J E Sullivan and D Kamensky ldquoHow cyber-attacks inUkraine show the vulnerability of the US power gridrdquo 3eElectricity Journal vol 30 no 3 pp 30ndash35 2017

[11] R M Lee M J Assante and T Conway Analysis of the CyberAttack on the Ukrainian Power Grid SANS Industrial ControlSystems Bethesda MD USA 2016

[12] C-C Sun A Hahn and C-C Liu ldquoCyber security of a powergrid state-of-the-artrdquo International Journal of ElectricalPower amp Energy Systems vol 99 no 4 pp 45ndash56 2018

[13] G Dan H Sandberg M Ekstedt and G Bjorkman ldquoChal-lenges in power system information securityrdquo IEEE SecurityPrivacy vol 10 no 4 pp 62ndash70 2012

[14] A Rasim I Yadigar and S Lyudmila ldquoCyber-physical sys-tems and their security issuesrdquo Computers in Industryvol 100 no 4 pp 212ndash223 2018

[15] P Dong Y Han X Guo and F Xie ldquoA systematic review ofstudies on cyber physical system securityrdquo InternationalJournal of Security and Its Applications vol 9 no 1pp 155ndash164 2015

[16] N Komninos E Philippou and A Pitsillides ldquoSurvey insmart grid and smart home security issues challenges andcountermeasuresrdquo IEEE Communications Surveys amp Tuto-rials vol 16 no 4 pp 1933ndash1954 2014

[17] A-H Mohsenian-Rad and A Leon-Garcia ldquoDistributed in-ternet-based load altering attacks against smart power gridsrdquoIEEE Transactions on Smart Grid vol 2 no 4 pp 667ndash6742011

[18] R Chen X Li and H Zhong ldquonovel online detection methodof data injection attack against dynamic state estimation insmart gridrdquo Neurocomputing vol 344 no 7 pp 73ndash81 2019

[19] C Fei C Patsios P C Taylor and Z Pourmirza ldquoUsing self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemesrdquo IEEE Transactionson Smart Grid vol 10 no 3 pp 3010ndash3019 2019

[20] S Khan R Khan and A H Al-Bayatti ldquoSecure communi-cation architecture for dynamic energy management in smartgridrdquo IEEE Power and Energy Technology Systems Journalvol 6 no 1 pp 47ndash58 2019

[21] S Saleh M Prateek and P H Vincent ldquoBlackIoT IoT botnetof high wattage devices can disrupt the power gridrdquo inProceedings of the 27th USENIX Security Symposium(USENIX Security 18) pp 15ndash32 Baltimore MD USA May2018

[22] Z Dong M Tian and L Ding ldquoA framework for modelingand structural vulnerability analysis of spatial cyber-physicalpower systems from an attack-defense perspectiverdquo IEEESystems Journal pp 1ndash12 2020

[23] T N Boutsika and S A Papathanassiou ldquoShort-circuit cal-culations in networks with distributed generationrdquo ElectricPower Systems Research vol 78 no 7 pp 1181ndash1191 2008

[24] V V S N Murty and A Kumar ldquoOptimal placement of DGin radial distribution systems based on new voltage stabilityindex under load growthrdquo International Journal of ElectricalPower amp Energy Systems vol 69 no 3 pp 246ndash256 2015

[25] V C Nikolaidis E Papanikolaou and A S Safigianni ldquoAcommunication-assisted overcurrent protection scheme forradial distribution systems with distributed generationrdquo IEEETransactions on Smart Grid vol 7 no 1 pp 114ndash123 2016

[26] K Clement-Nyns E Haesen and J Driesen ldquo+e impact ofcharging plug-in hybrid electric vehicles on a residentialdistribution gridrdquo IEEE Transactions on Power Systemsvol 25 no 1 pp 371ndash380 2010

[27] J Munkhammar P Grahn and J Widen ldquoQuantifying self-consumption of on-site photovoltaic power generation inhouseholds with electric vehicle home chargingrdquo Solar En-ergy vol 97 no 6 pp 208ndash216 2013

[28] M Singh P Kumar and I Kar ldquoA multi charging station forelectric vehicles and its utilization for load management andthe grid supportrdquo IEEE Transactions on Smart Grid vol 4no 2 pp 1026ndash1037 2013

[29] M P Moghaddam A Abdollahi and M RashidinejadldquoFlexible demand response programs modeling in competi-tive electricity marketsrdquo Applied Energy vol 88 no 9pp 3257ndash3269 2011

[30] D Adrian J Ullrich and E R Weippl ldquoGrid shock coor-dinated load-changing attacks on power grids the non-smartpower grid is vulnerable to cyber attacks as wellrdquo in Pro-ceedings of the 33rd Annual Computer Security ApplicationsConference pp 303ndash314 Orlando FL USA September 2017

[31] G M Zhang et al ldquoDolphinattack inaudible voice com-mandsrdquo in Proceedings of the 2017 ACM SIGSAC Conferenceon Computer and Communications Security pp 103ndash117Dallas TX USA November 2017

[32] E Bou-Harb C Fachkha M Pourzandi M Debbabi andC Assi ldquoCommunication security for smart grid distributionnetworksrdquo IEEE Communications Magazine vol 51 no 1pp 42ndash49 2013

[33] X Chen ldquoIndustrial control network information securitythreats and vulnerability analysis and researchrdquo ComputerScience vol 39 no 10 pp 4188ndash4190 2012

[34] W Knowles D Prince D Hutchison and K Jones ldquoA surveyof cyber security management in industrial control systemsrdquoInternational Journal of Critical Infrastructure Protectionvol 9 no 1 pp 52ndash80 2015

[35] C-W Disso C-C Liu and G Manimaran ldquoVulnerabilityassessment of cybersecurity for SCADA systemsrdquo IEEETransactions on Power Systems vol 23 no 4 pp 1836ndash18462008

[36] L Sankar S R Rajagopalan S Mohajer and H V PoorldquoSmart meter privacy a theoretical frameworkrdquo IEEETransactions on Smart Grid vol 4 no 2 pp 837ndash846 2013

[37] M Li and H-J Lin ldquoDesign and implementation of smarthome control systems based on wireless sensor networks andpower line communicationsrdquo IEEE Transactions on IndustrialElectronics vol 62 no 7 pp 4430ndash4442 2015

12 Complexity

Page 11: Security Risk Analysis of Active Distribution Networks

power quality issues (such as forced resonance at low fre-quencies) In addition the impact of cyber attacks on thepower supply quality of ADNs is not only related to theattack modes but also related to the topology of the dis-tribution network (such as the connection points of DG) Inorder to ensure the normal operation of the ADNs the risksintroduced by cyber attacks must be considered

5 Conclusions

+e introduction of distributed energy objects and the fullapplication of communication technologies make distribu-tion networks face new security risks In this paper weanalyze the security risks of industrial CLs and civil CLs inthe distribution networks and compare the revenue and costof attacks from the perspective of attackers It can be seenthat the cyber attack against civil CLs can obtain a largeattack revenues with a small attack cost +en an ADNcontrol model considering cyber attacks is established andat the same time the attack behavior model is also estab-lished In these models it provides a clear representation ofthe attack object the attack method and the across-spaceimpact mechanism Taking power quality as an example theimpacts of AI

U AIIU and AIII

U attacks on ADNs are analyzedIn summary the result shows that DG connected to thepower grid can improve power quality but once large-scaleCLs are suffered by cyber attacks it may also cause powerquality problems and may introduce new problems such aslow-frequency compelled oscillation

In the future there is still a lot of work to be done againstthe potential security risks of the ADNs introduced bydistributed energy objects Based on the existing researchresults we can continue to study the impacts of cyber attacksagainst civil CL on the security and stable operation of theADNs such as refining attack models enriching attackscenarios and exploring the ADN operation characteristicsafter the attacks In order to provide a reference for thepower grid to improve its operation control strategy andformulate user-side cyber security standards we should fullygrasp the risks introduced by the CL to the ADNs In otherwords we can refer to the ADN security risk analysis of thescenario where the CLs have suffered malicious control andcarry out research on other energy objects in the ADNs asthe attack object In addition further research on the powergrid cascading failures caused by cyber attacks on distributedenergy objects can provide a reference for the security andstable operation of the entire power grid

Data Availability

+e data used to support the findings of this study arecurrently under embargo while the research findings arecommercialized Requests for data after publication of thisarticle will be considered by the corresponding author

Conflicts of Interest

+e authors declare that there are no conflicts of interestregarding the publication of this manuscript

Acknowledgments

+is work was supported by the Science and TechnologyProject of State Grid Corporation of China (Research onCooperative Situation Awareness and Active DefenseMethod of Cyber-Physical Power System for Cyber Attackno SGJSDK00KJJS1800315)

References

[1] QWangW Tai Y Tang andM Ni ldquoReview of the false datainjection attack against the cyber-physical power systemrdquo IETCyber-Physical Systems 3eory amp Applications vol 4 no 2pp 101ndash107 2019

[2] S Sridhar A Hahn and M Govindarasu ldquoCyber-physicalsystem security for the electric power gridrdquo Proceedings of theIEEE vol 100 no 1 pp 210ndash224 2012

[3] M S Mahmoud M M Hamdan and U A BaroudildquoModeling and control of cyber-physical systems subject tocyber attacks a survey of recent advances and challengesrdquoNeurocomputing vol 338 no 2 pp 101ndash115 2019

[4] R Liu C Vellaithurai S S Biswas T T Gamage andA K Srivastava ldquoAnalyzing the cyber-physical impact ofcyber events on the power gridrdquo IEEE Transactions on SmartGrid vol 6 no 5 pp 2444ndash2453 2015

[5] Y Cai Y Cao Y Li T Huang and B Zhou ldquoCascadingfailure analysis considering interaction between power gridsand communication networksrdquo IEEE Transactions on SmartGrid vol 7 no 1 pp 530ndash538 2016

[6] F Liang W Yu X Liu D Griffith and N Golmie ldquoTowardedge-based deep learning in industrial Internet of thingsrdquoIEEE Internet of 3ings Journal vol 7 no 5 pp 4329ndash43412020

[7] Z Wang M Rahnamay-Naeini J M Abreu et al ldquoImpacts ofoperatorsrsquo behavior on reliability of power grids duringcascading failuresrdquo IEEE Transactions on Power Systemsvol 33 no 6 pp 6013ndash6024 2018

[8] D E Whitehead K Owens D Gammel and J SmithldquoUkraine cyber-induced power outage analysis and practical

Table 1 Distribution network control model with CLs

Attack behaviors (A)Risk

Scenarios Attack object Type of attack Scale

IEEE 33-bus standard distribution system Node 18202530 AI

U 12gtPPN gt 042 Low-voltage exceeding limits

IEEE 33-bus standard distribution system Node 18202530 AII

U

Single-phaseΔPP0 gt 01 High-voltage exceeding limits

Single-machine (DG) infinite powersystem DG access node AIII

U 12gtPPN gt 05 Power fluctuation andresonance

Complexity 11

mitigation strategiesrdquo in Proceedings of the 2017 70th AnnualConference for Protective Relay Engineers (CPRE) pp 1ndash8College Station TX USA April 2017

[9] R Langner ldquoTo kill a centrifuge a technical analysis of whatStuxnetrsquos creators tried to achieverdquo Technical Report LangnerCommunications Norderstedt Germany 2013

[10] J E Sullivan and D Kamensky ldquoHow cyber-attacks inUkraine show the vulnerability of the US power gridrdquo 3eElectricity Journal vol 30 no 3 pp 30ndash35 2017

[11] R M Lee M J Assante and T Conway Analysis of the CyberAttack on the Ukrainian Power Grid SANS Industrial ControlSystems Bethesda MD USA 2016

[12] C-C Sun A Hahn and C-C Liu ldquoCyber security of a powergrid state-of-the-artrdquo International Journal of ElectricalPower amp Energy Systems vol 99 no 4 pp 45ndash56 2018

[13] G Dan H Sandberg M Ekstedt and G Bjorkman ldquoChal-lenges in power system information securityrdquo IEEE SecurityPrivacy vol 10 no 4 pp 62ndash70 2012

[14] A Rasim I Yadigar and S Lyudmila ldquoCyber-physical sys-tems and their security issuesrdquo Computers in Industryvol 100 no 4 pp 212ndash223 2018

[15] P Dong Y Han X Guo and F Xie ldquoA systematic review ofstudies on cyber physical system securityrdquo InternationalJournal of Security and Its Applications vol 9 no 1pp 155ndash164 2015

[16] N Komninos E Philippou and A Pitsillides ldquoSurvey insmart grid and smart home security issues challenges andcountermeasuresrdquo IEEE Communications Surveys amp Tuto-rials vol 16 no 4 pp 1933ndash1954 2014

[17] A-H Mohsenian-Rad and A Leon-Garcia ldquoDistributed in-ternet-based load altering attacks against smart power gridsrdquoIEEE Transactions on Smart Grid vol 2 no 4 pp 667ndash6742011

[18] R Chen X Li and H Zhong ldquonovel online detection methodof data injection attack against dynamic state estimation insmart gridrdquo Neurocomputing vol 344 no 7 pp 73ndash81 2019

[19] C Fei C Patsios P C Taylor and Z Pourmirza ldquoUsing self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemesrdquo IEEE Transactionson Smart Grid vol 10 no 3 pp 3010ndash3019 2019

[20] S Khan R Khan and A H Al-Bayatti ldquoSecure communi-cation architecture for dynamic energy management in smartgridrdquo IEEE Power and Energy Technology Systems Journalvol 6 no 1 pp 47ndash58 2019

[21] S Saleh M Prateek and P H Vincent ldquoBlackIoT IoT botnetof high wattage devices can disrupt the power gridrdquo inProceedings of the 27th USENIX Security Symposium(USENIX Security 18) pp 15ndash32 Baltimore MD USA May2018

[22] Z Dong M Tian and L Ding ldquoA framework for modelingand structural vulnerability analysis of spatial cyber-physicalpower systems from an attack-defense perspectiverdquo IEEESystems Journal pp 1ndash12 2020

[23] T N Boutsika and S A Papathanassiou ldquoShort-circuit cal-culations in networks with distributed generationrdquo ElectricPower Systems Research vol 78 no 7 pp 1181ndash1191 2008

[24] V V S N Murty and A Kumar ldquoOptimal placement of DGin radial distribution systems based on new voltage stabilityindex under load growthrdquo International Journal of ElectricalPower amp Energy Systems vol 69 no 3 pp 246ndash256 2015

[25] V C Nikolaidis E Papanikolaou and A S Safigianni ldquoAcommunication-assisted overcurrent protection scheme forradial distribution systems with distributed generationrdquo IEEETransactions on Smart Grid vol 7 no 1 pp 114ndash123 2016

[26] K Clement-Nyns E Haesen and J Driesen ldquo+e impact ofcharging plug-in hybrid electric vehicles on a residentialdistribution gridrdquo IEEE Transactions on Power Systemsvol 25 no 1 pp 371ndash380 2010

[27] J Munkhammar P Grahn and J Widen ldquoQuantifying self-consumption of on-site photovoltaic power generation inhouseholds with electric vehicle home chargingrdquo Solar En-ergy vol 97 no 6 pp 208ndash216 2013

[28] M Singh P Kumar and I Kar ldquoA multi charging station forelectric vehicles and its utilization for load management andthe grid supportrdquo IEEE Transactions on Smart Grid vol 4no 2 pp 1026ndash1037 2013

[29] M P Moghaddam A Abdollahi and M RashidinejadldquoFlexible demand response programs modeling in competi-tive electricity marketsrdquo Applied Energy vol 88 no 9pp 3257ndash3269 2011

[30] D Adrian J Ullrich and E R Weippl ldquoGrid shock coor-dinated load-changing attacks on power grids the non-smartpower grid is vulnerable to cyber attacks as wellrdquo in Pro-ceedings of the 33rd Annual Computer Security ApplicationsConference pp 303ndash314 Orlando FL USA September 2017

[31] G M Zhang et al ldquoDolphinattack inaudible voice com-mandsrdquo in Proceedings of the 2017 ACM SIGSAC Conferenceon Computer and Communications Security pp 103ndash117Dallas TX USA November 2017

[32] E Bou-Harb C Fachkha M Pourzandi M Debbabi andC Assi ldquoCommunication security for smart grid distributionnetworksrdquo IEEE Communications Magazine vol 51 no 1pp 42ndash49 2013

[33] X Chen ldquoIndustrial control network information securitythreats and vulnerability analysis and researchrdquo ComputerScience vol 39 no 10 pp 4188ndash4190 2012

[34] W Knowles D Prince D Hutchison and K Jones ldquoA surveyof cyber security management in industrial control systemsrdquoInternational Journal of Critical Infrastructure Protectionvol 9 no 1 pp 52ndash80 2015

[35] C-W Disso C-C Liu and G Manimaran ldquoVulnerabilityassessment of cybersecurity for SCADA systemsrdquo IEEETransactions on Power Systems vol 23 no 4 pp 1836ndash18462008

[36] L Sankar S R Rajagopalan S Mohajer and H V PoorldquoSmart meter privacy a theoretical frameworkrdquo IEEETransactions on Smart Grid vol 4 no 2 pp 837ndash846 2013

[37] M Li and H-J Lin ldquoDesign and implementation of smarthome control systems based on wireless sensor networks andpower line communicationsrdquo IEEE Transactions on IndustrialElectronics vol 62 no 7 pp 4430ndash4442 2015

12 Complexity

Page 12: Security Risk Analysis of Active Distribution Networks

mitigation strategiesrdquo in Proceedings of the 2017 70th AnnualConference for Protective Relay Engineers (CPRE) pp 1ndash8College Station TX USA April 2017

[9] R Langner ldquoTo kill a centrifuge a technical analysis of whatStuxnetrsquos creators tried to achieverdquo Technical Report LangnerCommunications Norderstedt Germany 2013

[10] J E Sullivan and D Kamensky ldquoHow cyber-attacks inUkraine show the vulnerability of the US power gridrdquo 3eElectricity Journal vol 30 no 3 pp 30ndash35 2017

[11] R M Lee M J Assante and T Conway Analysis of the CyberAttack on the Ukrainian Power Grid SANS Industrial ControlSystems Bethesda MD USA 2016

[12] C-C Sun A Hahn and C-C Liu ldquoCyber security of a powergrid state-of-the-artrdquo International Journal of ElectricalPower amp Energy Systems vol 99 no 4 pp 45ndash56 2018

[13] G Dan H Sandberg M Ekstedt and G Bjorkman ldquoChal-lenges in power system information securityrdquo IEEE SecurityPrivacy vol 10 no 4 pp 62ndash70 2012

[14] A Rasim I Yadigar and S Lyudmila ldquoCyber-physical sys-tems and their security issuesrdquo Computers in Industryvol 100 no 4 pp 212ndash223 2018

[15] P Dong Y Han X Guo and F Xie ldquoA systematic review ofstudies on cyber physical system securityrdquo InternationalJournal of Security and Its Applications vol 9 no 1pp 155ndash164 2015

[16] N Komninos E Philippou and A Pitsillides ldquoSurvey insmart grid and smart home security issues challenges andcountermeasuresrdquo IEEE Communications Surveys amp Tuto-rials vol 16 no 4 pp 1933ndash1954 2014

[17] A-H Mohsenian-Rad and A Leon-Garcia ldquoDistributed in-ternet-based load altering attacks against smart power gridsrdquoIEEE Transactions on Smart Grid vol 2 no 4 pp 667ndash6742011

[18] R Chen X Li and H Zhong ldquonovel online detection methodof data injection attack against dynamic state estimation insmart gridrdquo Neurocomputing vol 344 no 7 pp 73ndash81 2019

[19] C Fei C Patsios P C Taylor and Z Pourmirza ldquoUsing self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemesrdquo IEEE Transactionson Smart Grid vol 10 no 3 pp 3010ndash3019 2019

[20] S Khan R Khan and A H Al-Bayatti ldquoSecure communi-cation architecture for dynamic energy management in smartgridrdquo IEEE Power and Energy Technology Systems Journalvol 6 no 1 pp 47ndash58 2019

[21] S Saleh M Prateek and P H Vincent ldquoBlackIoT IoT botnetof high wattage devices can disrupt the power gridrdquo inProceedings of the 27th USENIX Security Symposium(USENIX Security 18) pp 15ndash32 Baltimore MD USA May2018

[22] Z Dong M Tian and L Ding ldquoA framework for modelingand structural vulnerability analysis of spatial cyber-physicalpower systems from an attack-defense perspectiverdquo IEEESystems Journal pp 1ndash12 2020

[23] T N Boutsika and S A Papathanassiou ldquoShort-circuit cal-culations in networks with distributed generationrdquo ElectricPower Systems Research vol 78 no 7 pp 1181ndash1191 2008

[24] V V S N Murty and A Kumar ldquoOptimal placement of DGin radial distribution systems based on new voltage stabilityindex under load growthrdquo International Journal of ElectricalPower amp Energy Systems vol 69 no 3 pp 246ndash256 2015

[25] V C Nikolaidis E Papanikolaou and A S Safigianni ldquoAcommunication-assisted overcurrent protection scheme forradial distribution systems with distributed generationrdquo IEEETransactions on Smart Grid vol 7 no 1 pp 114ndash123 2016

[26] K Clement-Nyns E Haesen and J Driesen ldquo+e impact ofcharging plug-in hybrid electric vehicles on a residentialdistribution gridrdquo IEEE Transactions on Power Systemsvol 25 no 1 pp 371ndash380 2010

[27] J Munkhammar P Grahn and J Widen ldquoQuantifying self-consumption of on-site photovoltaic power generation inhouseholds with electric vehicle home chargingrdquo Solar En-ergy vol 97 no 6 pp 208ndash216 2013

[28] M Singh P Kumar and I Kar ldquoA multi charging station forelectric vehicles and its utilization for load management andthe grid supportrdquo IEEE Transactions on Smart Grid vol 4no 2 pp 1026ndash1037 2013

[29] M P Moghaddam A Abdollahi and M RashidinejadldquoFlexible demand response programs modeling in competi-tive electricity marketsrdquo Applied Energy vol 88 no 9pp 3257ndash3269 2011

[30] D Adrian J Ullrich and E R Weippl ldquoGrid shock coor-dinated load-changing attacks on power grids the non-smartpower grid is vulnerable to cyber attacks as wellrdquo in Pro-ceedings of the 33rd Annual Computer Security ApplicationsConference pp 303ndash314 Orlando FL USA September 2017

[31] G M Zhang et al ldquoDolphinattack inaudible voice com-mandsrdquo in Proceedings of the 2017 ACM SIGSAC Conferenceon Computer and Communications Security pp 103ndash117Dallas TX USA November 2017

[32] E Bou-Harb C Fachkha M Pourzandi M Debbabi andC Assi ldquoCommunication security for smart grid distributionnetworksrdquo IEEE Communications Magazine vol 51 no 1pp 42ndash49 2013

[33] X Chen ldquoIndustrial control network information securitythreats and vulnerability analysis and researchrdquo ComputerScience vol 39 no 10 pp 4188ndash4190 2012

[34] W Knowles D Prince D Hutchison and K Jones ldquoA surveyof cyber security management in industrial control systemsrdquoInternational Journal of Critical Infrastructure Protectionvol 9 no 1 pp 52ndash80 2015

[35] C-W Disso C-C Liu and G Manimaran ldquoVulnerabilityassessment of cybersecurity for SCADA systemsrdquo IEEETransactions on Power Systems vol 23 no 4 pp 1836ndash18462008

[36] L Sankar S R Rajagopalan S Mohajer and H V PoorldquoSmart meter privacy a theoretical frameworkrdquo IEEETransactions on Smart Grid vol 4 no 2 pp 837ndash846 2013

[37] M Li and H-J Lin ldquoDesign and implementation of smarthome control systems based on wireless sensor networks andpower line communicationsrdquo IEEE Transactions on IndustrialElectronics vol 62 no 7 pp 4430ndash4442 2015

12 Complexity