Published July 18, 2024 | Version v1.0 author version
Dataset Open

Dataset SUC1/S1-S4: Cyberattack scenarios on DER energy management and control

Description

This sandboxing use case focuses on advanced energy management and control applications for DERs, which are essential for optimizing their operation and achieving key objectives. These objectives include tracking the awarded power generation according to energy market clearing processes, avoiding intense power imbalances caused by intermittent weather-based RES, and increasing the profitability of DER owners. By leveraging real-time control strategies, the management system can dynamically adjust flexible DER operations to improve the overall response of aggregated DERs, based on both RES and Battery Storage Systems (BSS). Since this use case requires active control of an BSS and its operation can be severely affected in case of a cyber-attack, it is crucial to examine this scenario in a controlled and non-invasive environment enabled by a sandboxing testing environment (the KIOS CoE Cyber-physical sandbox) to avoid any disturbance to the actual power infrastructure.

This dataset collection is related to the four comprehensive cyber attack scenarios which target the Modbus TCP communication ptotocol used for transmitting measurements from smart meters of RESs and DERs to DER controller, as well as set-points sent to flexible DER inverters from DER controller, aiming to affect the proper operation of the DER energy managemnet and control function. The four scenarios are:

SUC1/S1 - MITM with FDI cyber-attack on wind farm measurements
SUC1/S2 - MITM with FDI cyber-attack on BSS measurements

SUC1/S3 - MITM with FDI cyber-attack on BSS set-points

SUC1/S4 - MITM with DoS cyber-attack

The dataset includes electrical measurements of the active power generation of the wind farm (attacked signal and actual state) and the BSS operation, as well as the set-point generated by the DER controller. The dataset is provided in the form of time-series measurements available as MATLAB (.mat) and CSV files. The measurements were recorded with a 5-second time resolution by the DER controller.  

Files

Electron_SUC1_S1_Pwind_Attack_Measurements.csv

Files (337.4 kB)

Name Size Download all
md5:31aa1663c50467b2a0b730f276eaa524
43.5 kB Preview Download
md5:0272d62ca6b991a7c01733dc6b7b38e9
16.8 kB Download
md5:919f38ab276465e37a4393d86f0480c0
37.5 kB Preview Download
md5:af858aabb02c43d342980b30e9574633
14.6 kB Download
md5:d703dcbc07ce92e7e85e44474133c017
33.9 kB Preview Download
md5:170a13550c4c4ab337c156bb792896aa
15.4 kB Download
md5:0b907bd53d6ce62f8305b750d0d18f77
11.0 kB Download
md5:ec0359d24e628e2a98b13443418967ca
81.6 kB Preview Download
md5:55186a09befe3c3b14fd6552a1b181bf
56.8 kB Download
md5:b4e1a7282d4cc8b4174c79affad3ba7d
26.3 kB Preview Download

Additional details

Additional titles

Alternative title
SUC1/S1: Man in the middle (MITM) with false data injection (FDI) cyber-attack on wind farm measurements
Alternative title
SUC1/S2 - MITM with FDI cyber-attack on BSS measurements
Alternative title
SUC1/S3 - MITM with FDI cyber-attack on BSS set-points
Alternative title
SUC1/S4 - MITM with DoS cyber-attack

Related works

Is supplemented by
Data paper: 10.5281/zenodo.12636116 (DOI)
Data paper: 10.5281/zenodo.12923889 (DOI)

Funding

European Commission
ELECTRON – rEsilient and seLf-healed EleCTRical pOwer Nanogrid 101021936
European Commission
KIOS CoE – KIOS Research and Innovation Centre of Excellence 739551