Vulnerability of Synchrophasor-Based WAMPAC Applications’ to Time Synchronization Spoofing

View Researcher's Other Codes

Disclaimer: The provided code links for this paper are external links. Science Nest has no responsibility for the accuracy, legality or content of these links. Also, by downloading this code(s), you agree to comply with the terms of use as set out by the author(s) of the code(s).

Please contact us in case of a broken link from here

Authors M. S. Almas, L. Vanfretti, R. S. Singh, Gudrun Margret Jonsdottir
Journal/Conference Name IEEE Transactions on Smart Grid
Paper Category
Paper Abstract This paper experimentally assesses the impact of time synchronization spoofing attacks (TSSA) on synchrophasor-based wide-area monitoring, protection and control (WAMPAC) applications. Phase angle monitoring, anti-islanding protection, and power oscillation damping applications are investigated. TSSA are created using a real-time (RT) IRIG-B signal generator and power system models are executed using an RT simulator with commercial phasor measurement units (PMUs) coupled to them as hardware-in-the-loop. Because PMUs utilize time synchronization signals to compute synchrophasors, an error in the PMUs’ time input introduces a proportional phase error in the voltage or current phase measurements provided by the PMU. The experiments conclude that a phase angle monitoring application will show erroneous power transfers, whereas the anti-islanding protection mal-operates and the damping controller introduces negative damping in the system as a result of the time synchronization error incurred in the PMUs due to TSSA. The proposed test-bench and TSSA approach can be used to investigate the impact of TSSA on any WAMPAC application and to determine the time synchronization error threshold that can be tolerated by these WAMPAC applications.
Date of publication 2018
Code Programming Language Matlab
Comment

Copyright Researcher 2022