U-Smart is house to the Cyber-physical Power System Resilience (CPSR) testbed, which is used to implement, test and verify cyber and physical resilience solutions for power systems in the lab environment. The CPSR testbed offers a platform for real-time simulation of power systems in concert with real-world monitoring, control, and protection devices. The CPSR testbed comprises a digital real-time power system simulator, power system protection, control, and automation devices, software-defined networking, and anomaly detection systems. The architecture and implementation of the testbed are shown Figures 1 and 2. Together, these components provide a user-defined and flexible testbed platform for the development, testing, and validation of power systems operation architecture and solutions. Please read more about the testbed here, and contact Dr. Masood Parvania (masood.parvania@utah.edu) to learn about gaining access to the CPSR testbed.

Digital Real-Time Simulator (DRTS) simulates the operation of power systems and provides an interface for interaction with power system model components. The CPSR testbed uses the OPAL-RT OP5700 simulator as the DRTS to simulate real-time power system voltage and current waveforms that interact with real protection and control devices through device I/O ports. The OP5700 simulator contains a powerful target computer, re-configurable FPGAs, signal conditioning for up to 256 analog and digital I/O lines, and 16 high-speed fiber-optic SFP ports.

Figure 1: Architecture of the Cyber-physical Power System Resilience (CPSR) Testbed

Controllers and protection relays interface with the DRTS for controlling components, such as inverters, and take protection action as needed. The CPSR testbed deploys commercially available inverters and protective relays and automation controller to protect and coordinate the operation of a simulated power system. The integration of protection devices and controllers in the CPSR testbed enables performance testing of the devices in a simulated power system environment, while creating real-world communication packets and data flow. The CPSR testbed uses the SEL-751 Feeder Protection Relays to control circuit breakers and reclosers. The SEL-751 relay utilizes various protocols (e.g., Modbus and DNP3) in order to communicate with the real-time automation controller.

Real-Time Automation Controllers (RTAC) are utilized to monitor and control the coordinated operation of protective relays and controllers (including inverters) over the system. The CPSR testbed deploys a SEL-2241 Real-Time Automation Controller (RTAC), which offers high-speed control and coordination of any number of compatible protection relays via communication protocols or analog signals. Importantly, the RTAC provides a platform to design custom protection and control schemes that require high fidelity coordination among relays and controllers in charge of different components and segments of the power system.

Figure 2: CPSR testbed implemented in U-Smart

Software-Defined Networking (SDN) system dynamically defines communication paths, permissions and traffic flow among power system protection devices according to defined rules. The CPSR testbed network utilizes a SEL-2740S Software-Defined Network Switch to allow for complete configurability of data flows. This switch is managed by an SDN controller that runs on a Windows server to implement routing tables within the SDN for increased control over the network and dynamic routing changes for enhanced network resiliency.

Network Function Virtualization (NFV) is a method to virtualize network services, such as routers, firewalls, and load balancers, which have traditionally been run on proprietary hardware. The combination of SDN and NFV helps  improve network capabilities by enabling better management of network traffic flows, network visibility, and deployment and control of network functions using software, instead of hardware-specific middleboxes. The CPSR testbed leverages NFV to make use of a local server acting as an edge cloud to run several functions, such as intrusion detection systems (IDS), physics-based anomaly detection algorithms and firewalls, as shown in Figure 3.


Figure 3: SDN and NFV intrusion detection scheme using a cloud and several containers. The network traffic is mirrored to be inspected simultaneously by different network functions.