Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

A Testbed And Methods For Improved Power Plant Model Validation Via Pmu Terminal Measurements, Jacob Eisenbarth Jul 2020

A Testbed And Methods For Improved Power Plant Model Validation Via Pmu Terminal Measurements, Jacob Eisenbarth

Graduate Theses & Non-Theses

The power industry requires the validation and sharing of the models for generators and controlling equipment to other utilities within North America. Accurate simulation of the electric grid is essential when setting operation and control strategies during various conditions present on the grid. An industry accepted method for performing model validation involves using the voltage and frequency measurements during an event, typically recorded by a phasor measurement unit, to perform a dynamic simulation on the system. The output real and reactive powers from the dynamic simulation and the actual event are then compared to each other. If the real and …


Establishment Of Cyber-Physical Correlation And Verification Based On Attack Scenarios In Power Substations, Koji Yamashita Jan 2020

Establishment Of Cyber-Physical Correlation And Verification Based On Attack Scenarios In Power Substations, Koji Yamashita

Dissertations, Master's Theses and Master's Reports

Insurance businesses for the cyberworld are an evolving opportunity. However, a quantitative model in today's security technologies may not be established. Besides, a generalized methodology to assess the systematic risks remains underdeveloped. There has been a technical challenge to capture intrusion risks of the cyber-physical system, including estimating the impact of the potential cascaded events initiated by the hacker's malicious actions.

This dissertation attempts to integrate both modeling aspects: 1) steady-state probabilities for the Internet protocol-based substation switching attack events based on hypothetical cyberattacks, 2) potential electricity losses. The phenomenon of sequential attacks can be characterized using a time-domain simulation …