Topology Perturbation for Detecting Malicious Data Injection

Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one potential cause of bad data and may have serious consequences. A solution for bad data detection in power systems is proposed in this work, particularly designed to detect malicious data attacks. By applying known perturbations to the system and measuring the changes elsewhere, the approach 'probes' the system for unexpected responses in terms of measurement values. Using a developed 'key space' approach, the perturbation used is rendered unpredictable to the attacker, making it difficult for the attacker to adapt his attacks. Thus, unexpected measurement values after a probe provide an indication of both bad and malicious data. The proposed approach is analyzed for sample systems using MATLAB.

[1]  M. Ribbens-Pavella,et al.  Hypothesis Testing Identification: A New Method For Bad Data Analysis In Power System State Estimation , 1984, IEEE Transactions on Power Apparatus and Systems.

[2]  A. Brameller,et al.  Power System Tracking State Estimation and Bad Data Processing , 1982, IEEE Transactions on Power Apparatus and Systems.

[3]  Felix F. Wu,et al.  Observability analysis and bad data processing for state estimation with equality constraints , 1988 .

[4]  A. Monticelli State estimation in electric power systems : a generalized approach , 1999 .

[5]  Felix F. Wu,et al.  Detection of Topology Errors by State Estimation , 1989, IEEE Power Engineering Review.

[6]  Fred C. Schweppe,et al.  Power System Static-State Estimation, Part I: Exact Model , 1970 .

[7]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[8]  R. Romero,et al.  Identifying multiple interacting bad data in power system state estimation , 2005, IEEE Power Engineering Society General Meeting, 2005.

[9]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[10]  Ning Zhou,et al.  Probing signal design for power system identification , 2010, IEEE PES General Meeting.

[11]  Thomas J. Overbye,et al.  Power flow control with Distributed Flexible AC Transmission System (D-FACTS) devices , 2009, 41st North American Power Symposium.

[12]  T.J. Overbye,et al.  Some applications of Distributed Flexible AC Transmission System (D-FACTS) devices in power systems , 2008, 2008 40th North American Power Symposium.

[13]  Xiang De,et al.  An Application of Estimation-Identification Approach of Multiple Bad Data in Power System State Estimation , 1984, IEEE Power Engineering Review.

[14]  Ali Abur,et al.  Bad Data Detection and Identification , 2004 .

[15]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[16]  E. Handschin,et al.  Bad data analysis for power system state estimation , 1975, IEEE Transactions on Power Apparatus and Systems.

[17]  Katherine M. Rogers,et al.  Power System Control with Distributed Flexible AC Transmission System Devices , 2009 .

[18]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[19]  Ilya W. Slutsker Bad Data Identification in Power System State Estimation Based on Measurement Compensation and Linear Residual Calculation , 1989, IEEE Power Engineering Review.

[20]  B.M. Zhang,et al.  A linear recursive bad data identification method with real-time application to power system state estimation , 1991, [Proceedings] Conference Papers 1991 Power Industry Computer Application Conference.

[21]  Fred C. Schweppe,et al.  Bad Data Suppression in Power System Static State Estimation , 1971 .

[22]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[23]  John G. DeSteese,et al.  A Tutorial on Detection and Characterization of Special Behavior in Large Electric Power Systems , 2004 .

[24]  M. Vidyasagar,et al.  Bad Data Rejection Properties of Weughted Least Absolute Value Techniques Applied to Static State Estimation , 1982, IEEE Transactions on Power Apparatus and Systems.

[25]  Allen J. Wood,et al.  Power Generation, Operation, and Control , 1984 .

[26]  R. Lugtu,et al.  Power System State Estimation: Detection of Topological Errors , 1980, IEEE Transactions on Power Apparatus and Systems.

[27]  W. L. Peterson,et al.  Multiple bad data detection in power system state estimation using linear programming , 1988, [1988] Proceedings. The Twentieth Southeastern Symposium on System Theory.

[28]  Probability Subcommittee,et al.  IEEE Reliability Test System , 1979, IEEE Transactions on Power Apparatus and Systems.

[29]  W.A. Mittelstadt,et al.  Use of the WECC WAMS in Wide-Area Probing Tests for Validation of System Performance and Modeling , 2009, IEEE Transactions on Power Systems.

[30]  Felix F. Wu,et al.  Detection of topology errors by state estimation (power systems) , 1989 .

[31]  Lang Tong,et al.  Limiting false data attacks on power system state estimation , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[32]  Ning Zhou,et al.  Initial results in power system identification from injected probing signals using a subspace method , 2006, IEEE Transactions on Power Systems.

[33]  Ning Zhou,et al.  Probing Signal Design for Power System Identification , 2010, IEEE Transactions on Power Systems.

[34]  Yu Er-keng,et al.  A New Approach for Detection and Identification of Multiple Bad Data in Power System State Estimation , 1982, IEEE Transactions on Power Apparatus and Systems.

[35]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[36]  Ali Abur,et al.  A bad data identification method for linear programming state estimation , 1990 .

[37]  Philip G. Hill,et al.  Power generation , 1927, Journal of the A.I.E.E..

[38]  A. Abur,et al.  Placement of PMUs to Enable Bad Data Detection in State Estimation , 2006, IEEE Transactions on Power Systems.