Dataset SUC1/S1-S4: Cyberattack scenarios on DER energy management and control
Creators
Description
This sandboxing use case focuses on advanced energy management and control applications for DERs, which are essential for optimizing their operation and achieving key objectives. These objectives include tracking the awarded power generation according to energy market clearing processes, avoiding intense power imbalances caused by intermittent weather-based RES, and increasing the profitability of DER owners. By leveraging real-time control strategies, the management system can dynamically adjust flexible DER operations to improve the overall response of aggregated DERs, based on both RES and Battery Storage Systems (BSS). Since this use case requires active control of an BSS and its operation can be severely affected in case of a cyber-attack, it is crucial to examine this scenario in a controlled and non-invasive environment enabled by a sandboxing testing environment (the KIOS CoE Cyber-physical sandbox) to avoid any disturbance to the actual power infrastructure.
This dataset collection is related to the four comprehensive cyber attack scenarios which target the Modbus TCP communication ptotocol used for transmitting measurements from smart meters of RESs and DERs to DER controller, as well as set-points sent to flexible DER inverters from DER controller, aiming to affect the proper operation of the DER energy managemnet and control function. The four scenarios are:
SUC1/S1 - MITM with FDI cyber-attack on wind farm measurements
SUC1/S2 - MITM with FDI cyber-attack on BSS measurements
SUC1/S3 - MITM with FDI cyber-attack on BSS set-points
SUC1/S4 - MITM with DoS cyber-attack
The dataset includes electrical measurements of the active power generation of the wind farm (attacked signal and actual state) and the BSS operation, as well as the set-point generated by the DER controller. The dataset is provided in the form of time-series measurements available as MATLAB (.mat) and CSV files. The measurements were recorded with a 5-second time resolution by the DER controller.
Files
Electron_SUC1_S1_Pwind_Attack_Measurements.csv
Files
(337.4 kB)
Name | Size | Download all |
---|---|---|
md5:31aa1663c50467b2a0b730f276eaa524
|
43.5 kB | Preview Download |
md5:0272d62ca6b991a7c01733dc6b7b38e9
|
16.8 kB | Download |
md5:919f38ab276465e37a4393d86f0480c0
|
37.5 kB | Preview Download |
md5:af858aabb02c43d342980b30e9574633
|
14.6 kB | Download |
md5:d703dcbc07ce92e7e85e44474133c017
|
33.9 kB | Preview Download |
md5:170a13550c4c4ab337c156bb792896aa
|
15.4 kB | Download |
md5:0b907bd53d6ce62f8305b750d0d18f77
|
11.0 kB | Download |
md5:ec0359d24e628e2a98b13443418967ca
|
81.6 kB | Preview Download |
md5:55186a09befe3c3b14fd6552a1b181bf
|
56.8 kB | Download |
md5:b4e1a7282d4cc8b4174c79affad3ba7d
|
26.3 kB | Preview Download |
Additional details
Additional titles
- Alternative title
- SUC1/S1: Man in the middle (MITM) with false data injection (FDI) cyber-attack on wind farm measurements
- Alternative title
- SUC1/S2 - MITM with FDI cyber-attack on BSS measurements
- Alternative title
- SUC1/S3 - MITM with FDI cyber-attack on BSS set-points
- Alternative title
- SUC1/S4 - MITM with DoS cyber-attack
Related works
- Is supplemented by
- Data paper: 10.5281/zenodo.12636116 (DOI)
- Data paper: 10.5281/zenodo.12923889 (DOI)