A reliable architecture based on Precision Time Protocol for WAMPAC synchronization

@article{Pepiciello2018ARA,
  title={A reliable architecture based on Precision Time Protocol for WAMPAC synchronization},
  author={Antonio Pepiciello and Alfredo Vaccaro},
  journal={2018 AEIT International Annual Conference},
  year={2018},
  pages={1-5}
}
Wide Area Monitoring Protection and Control (WAMPAC) systems play an increasingly important role in electric power system. They allow the measurement and the analysis of real time data to improve power system‘s reliability and efficiency. To work properly, every element of a WAMPAC system must be synchronized to a common reference time. Currently, the most common synchronization source is GPS, a system greatly vulnerable to cyber-attacks. To fully exploit WAMPAC systems‘ potential, cyber… 

Figures from this paper

Experimental Assessment of a PTP-based System for Large Scale Time Synchronization of Smart Grids
TLDR
Experimental results related to a test PTP architecture are presented, in order to assess its feasibility and investigate the performance of Precision Time Protocol.
Development and Experimental Validation of a Super-Synchronized Phasor Measurement Unit
TLDR
The role of supersynchronized PMUs that are based on a novel time and frequency transfer algorithm developed by Thales Alenia Space allow PMUs to reach nano-second scale synchronization accuracy, hence representing an effective solution for time-synchronization in modern smart grids.

References

SHOWING 1-10 OF 12 REFERENCES
Understanding and applying precision time protocol
TLDR
PTP is a promising technology for achieving submicrosecond synchronization accuracy between IEDs over Ethernet and the protocol fundamentals are presented and considerations for designing power system networks to achieve sub microsecond accuracies are discussed.
Wide-Area Monitoring, Protection, and Control of Future Electric Power Networks
TLDR
It is expected that WAMPAC systems will in the future reduce the number of catastrophic blackouts and generally improve the reliability and security of energy production, transmission, and distribution, particularly in power networks with a high level of operational uncertainties.
Vulnerability of Synchrophasor-based WAMPAC Applications’ to Time Synchronization Spoofing
This paper experimentally assesses the impact of time synchronization spoofing attacks (TSSA) on synchrophasor-based Wide-Area Monitoring, Protection and Control applications. Phase Angle Monitoring
Design Considerations for Software Only Implementations of the IEEE 1588 Precision Time Protocol
TLDR
This paper investigates adjusting computer clock frequency and time to provide a precise clock for test and measurement systems and outlines the design of a free IEEE 1588 implementation named PTPd, with particular attention to the clock servo.
Time Synchronization Attack in Smart Grid: Impact and Analysis
TLDR
A novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid and the effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smartgrid, namely transmission line fault detection, voltage stability monitoring and event locationing.
Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks
IEEE 1588 synchronization in distributed measurement systems for electric power networks
Modern electric power systems can be considered as the consequence of the continuous technological evolution, often pushed by economical, political and social requirements. As an example, the main
Phasor measurement units and wide area monitoring systems
Spoofing GPS Receiver Clock Offset of Phasor Measurement Units
TLDR
It is shown that the spoofing attack is feasible for any number of visible satellites and induces errors in a real-time voltage stability monitoring algorithm that relies on the phase information from measurements provided by PMUs.
Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer
TLDR
This work is intended to equip GNSS users and receiver manufacturers with authentication methods that are effective against unsophisticated spoofing attacks and refine the civilian spoofing threat assessment.
...
...