Chapter 4

Typical cyber physical systems

Abstract

In this chapter, two typical cyber physical systems (CPSs) are detailed to illustrate the key issues in CPSs. For power systems, the corresponding dynamics, communication, and protection are explained. For robotic networks, useful models of dynamics and communications are provided.

Keywords

Power networks; Smart metering; Protection; Robotic networks

4.1 Introduction

In this chapter, we introduce several typical cyber physical systems (CPSs), such as power networks and robotic networks. For each typical CPS, we focus on the following aspects:

 Physical dynamics: We will introduce the background of the CPS and formulate the mathematical models, in particular the differential equations, of the physical dynamics.

 Communication networks: We will introduce the practical protocols and mathematical models for networked control.

4.2 Power networks

Power networks are among the most long-standing CPSs. In power networks, the physical dynamics is the dynamics of voltages, currents, frequencies, and phases. The communication system helps to better estimate and control the current system state. In the subsequent subsections, we will explain models of physical dynamics and the corresponding communication systems.

4.2.1 Physical Dynamics

For simplicity, we consider only the dynamics of generators and ignore the details of the loads and transmission lines. We consider the power grid as a graph G in which each node represents a geographical site and each edge denotes a transmission line. For simplicity, we assume that each site has one synchronous generator and all generators are the same. If sites i and j are adjacent, we denote this by ij. It is challenging to incorporate the difference of generators into the model; however, it is complicated and beyond the scope of this section. Similarly to Ref. [56], we assume that each generator supplies a time-varying current, as well as time-varying power, using a constant voltage. The state of a single generator is represented by rotor rotation angle δ, which is described by the following swing equation [4]:

Mδ..+Dδ.=PmPe,

si1_e  (4.1)

where Pm is the mechanical power, Pe is the electrical power, M is the rotor inertia constant, and D is the mechanical damping constant.

Fix an arbitrary node i shown in Fig. 4.1, where Z = R + jX is the impedance of the transmission line, Ei is the voltage of the generator, and Y is the shunt admittance. Then for any node ki, the current flowing through the transmission line between these two nodes is given by

Ii,k=EiEkZ.

si2_e  (4.2)

Then the current flowing from the voltage source to the node, denoted by Ii, is given by

Ii=kiIi,k+YEi=1Zki(EiEk)+YEi,

si3_e  (4.3)

due to Kirchoff’s current law. Since we assume that the voltage of the generator is constant in magnitude, we have Ei=Vejδisi4_e. Meanwhile, the electric power is given by

Pei=Re[EiIi*]=V2|Z|2RNikicos(δiδk)Xkisin(δiδk)+V2Re[Y],

si5_e  (4.4)

which is obtained by substituting Eq. (4.3) into the expression of Pei.

f04-01-9780128019504
Fig. 4.1 Illustration of one node in the power grid.

Substituting Eq. (4.4) into the swing Eq. (4.1), we obtain the differential equation describing the dynamics of a power grid, which is given by

Mδ..i+Dδ.i=PmiV2|Z|2RNikicos(δiδk)Xkisin(δiδk)+V2Re[Y],

si6_e  (4.5)

where Ni is the number of neighbors of node i. We notice that the dynamics of different nodes are coupled to the difference of rotation angles.

4.2.2 Protection

In power networks, protection devices are used to handle faults and also to prevent damage. For example, if the protection system detects a fault in a transmission line, the corresponding protective relays at both ends will be triggered to isolate the transmission line. The protection actions need to be very fast in order to prevent the propagation of the damage incurred by the fault. There are numerous types of protections such as overcurrent relays protecting the devices from large currents, and distance protection distinguishing the faults occurring in different parts of the power network. Note that both overcurrent relay and distance protection do not need communications, since local measurements (e.g., the local current) are used to make the decision.

In a sharp contest, communications are needed for differential protection, whose mechanism is illustrated in Fig. 4.2 and explained as follows. Suppose that two relays are installed at the two ends of a power transmission line. Both relays have communication transceivers; they can communicate with each other. They measure the currents flowing through the two ends, denoted by I1 and I2, simultaneously. We define the directions of the currents as flowing into the power line. When there is no fault in the transmission line, we have

I1+I2=0,

si7_e  (4.6)

according to Kirchhoff’s current law.

f04-02-9780128019504
Fig. 4.2 Illustration of differential protection.

When a fault occurs (e.g., the transmission line breaks and falls to the ground), there is usually a significant current flowing into the ground since the ground usually has a low impedance. It is possible that the ground has a high impedance. In this situation, the leaking current is very weak and is very difficult to detect. For simplicity, we assume that the ground has a low impedance; thus Eq. (4.6) is broken due to the leaking current. Therefore when the two relays find that I1 + I2 is significantly different from zero, they trigger the breakers to take action such that the fault is isolated. If the two relays are not located at the same place (e.g., at the two ends of a transmission line), telecommunication is needed across the two relays. In a more generalized scenario [57, 58], the measurements are propagated through a communication network (no longer point-to-point communications) in order to provide backup protections. The corresponding communication network for differential protection has been optimized to maximize the overall reliability in Ref. [58].

Besides differential protection, communications may be needed in other protection schemes. It is well known that phasor measurement units (PMUs) are very useful for protection. For example, the reports from PMUs can be used to detect and locate transmission line faults [59]. They can also be used in adaptive out-of-step control and distance relaying of multiterminal transmission lines [1]. Since the action of protection should be very fast (thus very short delays), communication could be a bottleneck of PMU-based protection schemes.

4.2.3 Smart Metering

Communications are needed in advanced metering infrastructure (AMI) [60], which is a critical mechanism in smart grids [61, 62]. The AMI is needed by the demand response mechanism in future power grids. Demand response is defined as “changes in electric usage by end-use customers from their normal consumption patterns in response to changes in the price of electricity over time, or to incentive payments designed to induce lower electricity use at times of high wholesale market prices or when system reliability is jeopardized” [63]. It has been intensively studied, for example the demand response for areas with large populations [64] and the charging of electric vehicles [65].

In the AMI system, each power consumer (e.g., factory, household, workshop, building, etc.) is equipped with smart meters capable of two-way communications. A smart meter can monitor the activities of the power consumer. It reports the most recent power consumption to a control center; meanwhile it receives a power price from the power market. These reports can be used to achieve the balance of power demand and supply, and avoid power consumption peaks (e.g., the dinner time or summer noons), by setting the correct power price for demand response and adjusting the power generations [66, 67]. Although the communication requirements, such as throughput and delay, are quite loose for AMI (e.g., a report with at most tens of bytes per few minutes) compared with the capability of modern data communications, the aggregated data traffic can be large in densely populated areas (consider an area with thousands of smart meters). Therefore an event-triggered communication mechanism has been proposed in Ref. [68] such that the throughput requirement is substantially relaxed. Among many modern communication technologies, wireless communication has great potential for AMI since it is inexpensive and can be deployed quickly.

4.2.4 Communication Systems in Industrial Control and Smart Grids

Compared with modern data communication systems such as 4G cellular systems, WiFi and Internet, the communication networks in industrial control systems have special requirements, e.g., predictable throughput, very high reliability, robustness in hostile environments, scalability, and the maintenance capability [27]. Here we explain two typical types of communication systems for industrial controls. Readers can consult Ref. [28] for a comprehensive introduction.

 Foundation Fieldbus [29]: Fieldbus is a family of industrial control communication systems. It has been widely used in numerous industrial control applications. It corresponds to IEC61158. Foundation Fieldbus is a Type 1 Fieldbus. In sharp contrast to modern communication systems, the physical layer of Fieldbus is based on current modulation, in which each device senses the voltage drops at the terminating resistors, thus still being analog. The access control is managed by the Datalink layer using tokens. Fieldbus is real-time and reliable, which is important for control systems. However, its data rate is around 30 kbps, thus being too low for applications with fast dynamics.

 Supervisory Control and Data Acquisition (SCADA) [30]: SCADA has been used to monitor or control the plant dynamics of industrial infrastructures such as power grids. It consists of a human-machine interface, supervisory computer system, remote terminal units (RTUs) connected to sensors, and communication infrastructure. Either wired or wireless communications are used. For large area networks, SONET/SDH optical communication is an option. A major disadvantage of SCADA is the slow speed, which may take minutes to collect data from the power grid [31]. Hence it cannot be used in fast data communications.

4.3 Robotic networks

A robotic network is a typical CPS, in which multiple robots interact, using either communications or sensing, with each other in order to accomplish certain tasks. Hence the physical dynamic is the motion of the robots, while the cyber part consists of the communications, sensing, and computing of each robot. In this section, we provide a brief introduction to basic models of robotic networks. This section will serve as a working example for which the subsequent discussions on communications and controls in CPS can be applied. Note that we follow the framework in Refs. [5, 69] to introduce basic models of robotic networks.

4.3.1 Physical Dynamics

The physical dynamics mainly describes the locations and motions of the robots. They can be modeled in either a deterministic or probabilistic manner.

Deterministic model

We assume that each robot moves in a continuous space in continuous time. The state of each robot consists of the following four components:

 Robot state (location and velocity vector): xRd.

 Control action: uRm.

 Initial state: x0.

 Dynamics law: f, which is given by

x.(t)=f(x(t),u(t)).

si8_e  (4.7)

The space of the state is denoted by Xi for robot i. A simple example is the planar vehicle model, in which each robot has a constant speed and the control is on the direction. The corresponding dynamics of motion is described by

x.1=vcosθ,x.2=vsinθ,w.=w,

si9_e  (4.8)

where x = (x1x2θ) and u = w.

Another example is first-order robots with range-limited communications. Denote by p[i](t) the location of robot i, whose evolution is given by

p.[i](t)=u[i](t),

si10_e  (4.9)

where u[i](t)[umax,umax]si11_e is the control action. It can be approximated by the following discrete-time dynamics:

p[i](l+1)=p[i](l)+u[i](t),i=1,,n,

si12_e  (4.10)

where p[i](l) is the location of robot i at time slot l.

Then a robotic network consists of multiple robots described as above. In particular, the communication network of the robotic network can be represented by a graph, in which each vertex is a robot while each edge is a communication link. Whether two robots can establish a communication link is mainly determined by their distance.

Probabilistic model

The motion of a robot can also be modeled in a probabilistic manner. Denote by x(t) and u(t) the state and control of a robot, similarly to the deterministic model. Then the dynamics can be modeled by a Markov chain, whose transition probability is given by

p(x(t)|u(t),x(t1)).

si13_e  (4.11)

In probabilistic models, the modeling of the robot motion is of key importance. Two models are possible for robot motion:

 Velocity motion model: In this model, a robot can be controlled by manipulating its rotational and translational velocities (denoted by v(t) and w(t)). Hence the control action is given by

u(t)=(v(t),w(t)).

si14_e  (4.12)

To evaluate the transition probability p(x(t)|u(t), x(t − 1)), one first assumes that the control u(t) is exact and calculates the expressions for the location after a small time of motion. Then we relax the assumption that the control is exact and assume that the actual control action is contaminated by random perturbations, which is given by

(v^,ŵ)=(v,w)+(ϵv,ϵw),

si15_e  (4.13)

where (vw) is the expected control and (ϵvϵw) is the random perturbation, which is assumed to be centered at zero and has a bounded variance. Typical distributions of (ϵvϵw) include Gaussian distribution and triangular distribution. From these distributions of random perturbation, p(x(t)|u(t), x(t − 1)) can be evaluated. The detailed algorithm can be found in Ref. [69].

 Odometry motion model: In this model, odometry measurements are used. Usually odometry is more accurate than velocity. At time t, the odometry of a robot estimates the relative location change; i.e., it reports the advance from x(t − 1) to x(t). The location change has three components, namely δrot1, δtrans, and δrot2, as illustrated in Fig. 4.3. In the odometry motion model, it is assumed that these three components experience independent random perturbations. Given the distributions of these random perturbations, the conditional probability p(x(t)|u(t), x(t − 1)) can be obtained, whose details can be found in Ref. [69].

f04-03-9780128019504
Fig. 4.3 Illustration of the three parameters of relative motion.

4.3.2 Communications and Control

The procedure of communication and control of a robot is illustrated in Fig. 4.4. In each cycle, a robot exchanges information with neighbors through its communication module. Then it updates its own processor state and calculates the control action, which will be carried out subsequently. Hence the communication and control law of each robot (say robot iI, where I is the index set of robots) consists of the following elements:

f04-04-9780128019504
Fig. 4.4 Communication and control in robots.

 Communication alphabet A, which consists of the symbols for communications.

 Processor state sets Wi, which describe the local state of computing.

 Allowable initial values W0isi16_e, which denote the initial state of computing.

 Message generation law: msgi:Xi×Wi×IAsi17_e, which means the message generated according to the physical state, computing state, and robot index.

 State transition law: stli:Xi×Wi×A|I|Wisi18_e, which makes the robot transit to a new state of computing according to the current physical state, computing state and all messages.

 Control law: ctli:Xi×Xi×Wi×AnUisi19_e, which calculates the control action at time t ∈ [ll + 1), where l is the time instant of the previous update of the computing state; hence the control action u(t) is a function of x(l), x(t), current local computing state, and all received messages.

Several simplifications can be made to the above rather general model:

 The communication and control law can be static, which does not change with time and thus means that Wi is a singleton.

 The communication and control law can be data sampled, if the control action u(t) is independent of x(t) and is dependent on only x(l) (the physical state of the last sample time).

4.3.3 Coordination of Robots

The robots in a robotic network need coordination in order to accomplish their tasks. In the subsequent discussion, we introduce two major types of coordination tasks, namely rendezvous and connectivity maintenance.

Rendezvous

One of the major tasks of robotic network is the rendezvous problem, i.e., achieving agreement of the locations of the robots. The following two models of rendezvous can be used for the analysis and design of the corresponding algorithm:

 Exact rendezvous: The task succeeds only when the physical states of all robots coincide; i.e., x[i] = x[j], for all ij = 1, …, n.

 ϵ-Rendezvous: The task succeeds only when each robot is within an ϵ-neighborhood of the average location; i.e.,

p[i]1nk=1np[k]ϵ.

si20_e  (4.14)

There are many approaches to realizing the rendezvous. One simple approach to communications is the average control and communication law. In each time slot, each robot carries out the following actions:

1. It transmits its own location to all neighbors.

2. It receives the messages about locations of the neighbors.

3. It calculates the average location of itself and its neighbors.

4. It drives itself to that average location.

Another approach, called the circumcenter control and communication law, carries out the following actions for each robot in each time slot:

1. It exchanges position information.

2. It computes the circumcenter of these positions (including itself).

3. It moves to the circumcenter.

Connectivity maintenance

The other task of coordination is the maintenance of network connectivity. First we define the r-disk graph of geographical nodes, where two nodes are connected when their distance is no more than r. When the r-graph is connected (i.e., for any pair of nodes in the graph we can always find a path between them), then the connectivity maintenance problem is to enable the robots to form a connected r-disk graph.

We first consider the maintenance of the connectivity of two robots. Suppose that two robots i and j have positions p[i] and p[j] with ∥p[i]p[j]∥ < r. Then we define the connectivity constraint set as

χ(p[i],p[j])=Bp[i]+p[j]2,r2,

si21_e  (4.15)

where B(ca) denotes a ball with center c and radius a.

Assume that robots i and j are within distance r at time t. Then it can be shown that, if the control actions ui(t) and uj(t) satisfy

ui(t)χp[i](t),p[j](t)p[i](t)

si22_e  (4.16)

and

uj(t)χp[i](t),p[j](t)p[j](t),

si23_e  (4.17)

as illustrated in Fig. 4.5, then the following two conclusions hold:

 Robots i and j will still be in the connectivity constraint set χp[i],p[j]si24_e.

 Their positions are still within distance r.

f04-05-9780128019504
Fig. 4.5 Illustration of the connectivity constraint set for two robots.

Then we can extend the two-robot case to the generic case with arbitrarily many robots. When the locations of the robots are p[1]p[2], …, p[n], the corresponding connectivity constraint set is defined as (as illustrated in Fig. 4.6)

χip[1],,p[n]=xχp[i],p[j]|ji,s.t.,p[i]p[j]r,

si25_e  (4.18)

which means the joint set of the connectivity constraint set of robot i with all other robots that are within distance r of robot i. Then it is shown in Ref. [5] that, if the robot network keeps the control actions at time l to satisfy the following condition:

u[i](l)χip[1](l),,p[n](l)p[i],

si26_e  (4.19)

then the following goals can be achieved:

 At the next time slot l + 1, each robot will still be in its connectivity constraint set of time slot l.

 All the communication links are still maintained.

 The connectivity of the robot network in time slot l + 1 is maintained, if the network is connected in time slot l.

 The number of connected components in time slot l + 1 is not larger than that of time slot l.

f04-06-9780128019504
Fig. 4.6 Illustration of the connectivity constraint set for robot i.

The concept of the connectivity constraint set provides a sufficient condition for the control actions of the robots to maintain the connectivity of the network. It can be relaxed and applied in more complicated situations. The details can be found in Chapter 4 of Ref. [5].

4.4 Conclusions

In this chapter, we have briefly introduced two typical CPSs, namely power networks and robotic networks. As we have seen, different CPSs have substantially different characteristics and thus significantly different mathematical models. For example, the mathematical modeling of power networks is usually deterministic, since its operation is usually stable, while robotic networks are more random. Hence it is impossible to cover all details of all CPSs using a single framework.

References

[1] Phadke A.G., Thorp J.S. Synchronized Phasor Measurements and Their Applications. New York: Springer; 2008.

[4] Kundur P. Power System Stability and Control. McGraw-Hill; 1994.

[5] Bullo F., Cortés J., Martínez S. Distributed Control of Robotic Networks. Princeton University Press; 2009.

[27] Thompson L.M. Industrial Data Communications. fourth ed. Instrumentation Systems; 2002.

[28] Galloway B., Hancke G. Introduction to industrial control networks. IEEE Commun. Surv. Tut. 2012;99:1–21.

[29] National Instruments, Fieldbus: Foundation Fieldbus Overview, 2003.

[30] Boyer S.A. SCADA: Supervisory Control and Data Acquisition. fourth ed. The Instrumentation, Systems and Automation Society; 2009.

[31] Mynam M.V., Harikrishna A., Singh V. Synchrophasors Redefining SCADA Systems. Schweitzer Engineering Laboratories, Inc., 2013.

[56] Thorp J.S., Seyler C.E., Phadke A.G. Electromechanical wave propagation in large electric power systems. IEEE Trans. Circuits Syst. I, Fundam. Theory Appl. 1998;45:614–622.

[57] Lin H., Sambamoorthy S., Shukla S., Thorp J., Mili L. Ad hoc vs. supervisory wide area backup relay protection validated on power/network co-simulation platform. In: Proceedings of the 17th Power Systems Computation Conference, Stockholm, Sweden; 2011.

[58] Zhang Z., Li H. Wireless communication aided differential protection in smart grids: a concerted Blizkrieg. In: IEEE Symposium on Smart Grid Communications (SmartGridComm), Vancouver, Canada; 2013.

[59] Jiang J., Yang J., Lin Y., Liu C., Ma J. An adaptive PMU based fault detection/location technique for transmission lines—Part I: theory and algorithms. IEEE Trans. Power Deliv. 2000;15(2):486–493.

[60] Bennett C., Wicker S. Decreased time delay and security enhancement recommendations for AMI smart meter networks. In: Proceedings of the Innovative Smart Grid Technologies Conference, Gothenburg, Sweden; 2010.

[61] ISO New England, Inc. Overview of the Smart Grid: Policies, Initiatives and Needs. 2009.

[62] Borenstein S., Jaske M., Rosenfeld A. Dynamic Pricing, Advanced Metering, and Demand Response in Electricity Markets. Berkeley, CA: Center for the Study of Energy Markets, University of California; 2010.

[63] Balijepalli M., Pradhan K. Review of demand response under smart grid paradigm. In: Proceedings of the IEEE PES Innovative Smart Grid Technologies, Anaheim, CA, USA; 2011.

[64] Sharma G., Xie L., Kumar P. Large population optimal demand response for thermostatically controlled inertial loads. In: Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, Canada; 2013.

[65] Tang W., Bi S., Zhang Y.J. Online speeding optimal charging algorithm for electric vehicles without future information. In: Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, Canada; 2013.

[66] Roozbehani M., Dahleh M., Mitter S. Dynamic pricing and stabilization of supply and demand in modern electric power grids. In: Proceedings of the First IEEE Conference on Smart Grid Communications, DC, USA; 2010.

[67] Stoft S. Power System Economics—Designing Markets for Electricity. IEEE/Wiley; 2002.

[68] Li H., Gong S., Lai L., Han Z., Qui R.C., Yang D. Efficient and secure wireless communications for advanced metering infrastructure in smart grids. IEEE Trans. Smart Grid. 2012;3(3):1540–1551.

[69] Thrun S., Burgard W., Fox D. Probabilistic Robotics. MIT Press; 2005.


“To view the full reference list for the book, click here

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset