Control system modeling in early-stage simulation for cyber vulnerability assessment

Allen W. Flath, Aaron M. Cramer, Xiao Liu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Previous approaches for early-stage shipboardpower- system simulation were driven by a need to perform timedomain simulation during the early design stage and included an internal idealized representation of the control system. Herein, the reduced-order physical model of the power system is combined with an independent representation of the control system. This allows the benefits of faster simulation and reduced modeling effort to be retained while improving understanding of the effects of the control system on system performance. This approach is demonstrated by studying a compromised control system subjected to false set point attacks that drive the system operation away from ideal behavior. Using a notional MVDC system and a representative operational vignette, the performance of the uncompromised system is compared with the performance of the compromised system over a set of potential cyber disruptions by calculating the system dependability.

Original languageEnglish
Title of host publication2017 IEEE Electric Ship Technologies Symposium, ESTS 2017
Pages9-15
Number of pages7
ISBN (Electronic)9781509049448
DOIs
StatePublished - Oct 16 2017
Event2017 IEEE Electric Ship Technologies Symposium, ESTS 2017 - Arlington, United States
Duration: Aug 14 2017Aug 17 2017

Publication series

Name2017 IEEE Electric Ship Technologies Symposium, ESTS 2017

Conference

Conference2017 IEEE Electric Ship Technologies Symposium, ESTS 2017
Country/TerritoryUnited States
CityArlington
Period8/14/178/17/17

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

ASJC Scopus subject areas

  • Automotive Engineering
  • Transportation
  • Energy Engineering and Power Technology

Fingerprint

Dive into the research topics of 'Control system modeling in early-stage simulation for cyber vulnerability assessment'. Together they form a unique fingerprint.

Cite this