By Topic

A tractable nonlinear fault detection and isolation technique with application to the cyber-physical security of power systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
P. Mohajerin Esfahani ; Automatic Control Laboratory, Department of Electrical Engineering, Swiss Federal Institute of Technology (ETH), Physikstrasse 3, ETL I22, 8092, Zürich, Switzerland ; M. Vrakopoulou ; G. Andersson ; J. Lygeros

This article consists of two parts: a theoretical part concerned with fault detection schemes, and an application part dealing with cyber security of power systems. In the first part, we develop a tractable approach to design a robust residual generator to detect and isolate faults in high dimensional nonlinear systems. Previous approaches on fault detection and isolation problems are either confined to linear systems or they are only applicable to low dimensional dynamics with more specific structures. In contrast, we propose a novel methodology to robustify a linear residual generator for a nonlinear system in the presence of certain disturbance signatures. To this end, we formulate the problem into the framework of quadratic programming which enables us to solve relatively high dimensional systems. In the second part, the application is motivated by the emerging problem of cyber security in power networks. We provide description of a multi-machine power system that represents a two-area power system, and we model a cyber-physical attack emanating from the vulnerabilities introduced by the interaction between IT infrastructure and power system. The algorithm developed in the first part is finally used to diagnose such an intrusion before the functionality of the power system is disrupted.

Published in:

2012 IEEE 51st IEEE Conference on Decision and Control (CDC)

Date of Conference:

10-13 Dec. 2012