Periodic Reporting for period 1 - eFORT (Establishment of a FramewORk for Transforming current EPES into a more resilient, reliable and secure system all over its value chain)
Période du rapport: 2022-09-01 au 2024-02-29
Based on this, the main objective of eFORT is to make European power grids more resilient and reliable to failures, cyberattacks, physical disturbances and data privacy issues. To this end, technological innovations will be developed for the detection, prevention and mitigation of risks and vulnerabilities and positive impact on operation. Specific objectives also include a characterisation and common repository of vulnerabilities and threats to the EPES, along with their impact; a secure data sharing framework, and developing secure-by-design operation technologies. The results will be demonstrated in 4 real-scale sites covering a complete overwiew of the grid: transmission and cascading effects (Netherlands), Distribution (Ukraine), Generation and Islanding modes (Italy) and DER (Spain).
As for the expected impact, the proposed holistic security framework to protect the EPES against man-made hazards and extreme weather events will lead to several contributions in the field of ensuring the continuity and recovery of this critical system. The specific impact factors respond to the expected outcomes, “Demonstration of increased energy system reliability and resilience” and “Preventing or ensuring rapid recovery following disturbances”.
Next, a crossed severity-impact evaluation has been carried out both on threats and vulnerabilities, combined in a risk heat map introducing the events likelihood for a visual interpretation of the overall impact of the threat-vulnerability combinations. Heat waves, floodings, incomplete integration of systems and connection losses were identified as the most critical risks from the literature. Consulted experts pointed additionally to hacking and cyber-crime, operational faults or unpredictable load shifts.
The characterisation of cascading effects in the power grid has been another key activity so far. The conclusions indicate that cascading effects mainly can be caused either from internal causes, (equipment failures, human error, malfunctions, bad monitoring), or from external ones (natural disasters, cyber-attacks, infrastructure interdependencies). In addition, the time to a blackout is preceded by a propagation period where a point of no return can be established and the overall process can be accelerated by cyber-attacks.
The second main line was developing a robust EPES defence system composed of secure-by-design technologies capable of facing a wide range of potential threats in compliance with real-time requirements. Although the final results will be concentrated within the 3rd year of the project, some steps have already been taken: dynamic risk assessment tool (designed in physical and cyber domains, with a methodology that has been published), control scheme for islanding operation (first version of the algorithm), IDS (capture and analysis of real data sets) or the intelligent platform (partner contribution, architecture and API definition).
As for the cascading effects study, measures and actions to improve the resilience of the EPES at the physical and cyber layer were defined and is enhanced by including mitigation and countermeasure actions for these issues. This work is continued in WP4, where a real-time digital twin was developed for the interconnected power grids using open data and common and future power grid components and standards. This is used to investigate the impact of cyber-attacks on power system stability and how cyber-attacks can cause cascading failures in interconnected power systems and a blackout.
Other results worth mentioning at this point include the Dynamic Risk Assessment tool. The related activities resulted in the establishment of a data model for dynamic risk assessment, the development of the PyDyn tool for stability control of Power System Networks, and the implementation of a prototype tool for visualizing cyber risks, which was presented at a national cybersecurity conference.