Data-Driven Stealthy Injection Attacks on Smart Grid with Incomplete Measurements

Key smart grid operational module like state estimator is highly vulnerable to a class of data integrity attacks known as 'False Data Injection FDI'. Although most of the existing FDI attack construction strategies require the knowledge of the power system topology and electric parameters e.g., line resistance and reactance, this paper proposes an alternative data-driven approach. We show that an attacker can construct stealthy attacks using only the subspace information of the measurement signals without requiring any prior power system knowledge. However, principle component analysis PCA or singular value decomposition SVD based attack construction techniques do not remain stealthy if measurement signals contain missing values. We demonstrate that even in that case an intelligent attacker is able to construct the stealthy FDI attacks using low-rank and sparse matrix approximation techniques. We illustrate an attack example using augmented lagrange multiplier ALM method approach. These attacks remain hidden in the existing bad data detection modules and affect the operation of the physical energy grid. IEEE benchmark test systems, different attack scenarios and state-of-the-art detection techniques are considered to validate the proposed claims.

[1]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[2]  Yi Ma,et al.  Robust principal component analysis? , 2009, JACM.

[3]  Adnan Anwar,et al.  Anomaly detection in electric network database of smart grid: Graph matching approach , 2016 .

[4]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[5]  Victor C. M. Leung,et al.  Intrusion detection in advanced metering infrastructure based on consumption pattern , 2013, 2013 IEEE International Conference on Communications (ICC).

[6]  Zhu Han,et al.  Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.

[7]  Jahangir Hossain,et al.  Renewable energy integration: challenges and solutions , 2014 .

[8]  Adnan Anwar,et al.  Vulnerabilities of Smart Grid State Estimation against False Data Injection Attack , 2014, ArXiv.

[9]  G. Sapiro,et al.  A collaborative framework for 3D alignment and classification of heterogeneous subvolumes in cryo-electron tomography. , 2013, Journal of structural biology.

[10]  Ying Jun Zhang,et al.  Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation , 2013, IEEE Transactions on Smart Grid.

[11]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[12]  Lang Tong,et al.  Data Framing Attack on State Estimation , 2013, IEEE Journal on Selected Areas in Communications.

[13]  Jianhui Wang,et al.  Real-time intrusion detection in power system operations , 2013, IEEE Transactions on Power Systems.

[14]  Hamed Mohsenian Rad,et al.  False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[15]  Adnan Anwar,et al.  Cyber Security of Smart Grid Infrastructure , 2014, ArXiv.

[16]  Zahir Tari,et al.  SCADASim—A Framework for Building SCADA Simulations , 2011, IEEE Transactions on Smart Grid.

[17]  H. Vincent Poor,et al.  Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models , 2013, IEEE Journal on Selected Areas in Communications.

[18]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[19]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[20]  Lang Tong,et al.  Subspace Methods for Data Attack on State Estimation: A Data Driven Approach , 2014, IEEE Transactions on Signal Processing.

[21]  Wen-Long Chin,et al.  Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid , 2015, IEEE Transactions on Smart Grid.

[22]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[23]  Mohiuddin Ahmed,et al.  False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation , 2014, SecureComm.

[24]  Zahir Tari,et al.  Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid , 2015, Inf. Syst..

[25]  Rong Zheng,et al.  Stealth false data injection using independent component analysis in smart grid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[26]  Arvind Ganesh,et al.  Fast Convex Optimization Algorithms for Exact Recovery of a Corrupted Low-Rank Matrix , 2009 .