Malicious data deception attacks against power systems: A new case and its detection method

Power systems usually employ bad data detection (BDD) to avoid faulty measurements caused by their anomalies, and hence can ensure the security of the state estimation of power systems. However, recently BDD has been found vulnerable to malicious data deception attacks submerged in big data. Such attacks can purposely craft sparse measurement values (i.e. attack vectors) to mislead power estimates, while not posing any anomalies to the BDD. Some related work has been proposed to emphasize this attack. In this paper, a new malicious data deception attack by considering a practical attacking situation is investigated, where the attacker has limited resources for corrupting measurements. In this case, attackers generate attack vectors with less sparsity to evade conventional BDD, while using a convex optimization method to balance the sparsity and magnitude of attack vectors. Accordingly, the effects of such an attack on operational costs and the risks of power systems are analysed in detail. Moreover, according to security evaluation for individual measurements, such attacks can be detected with high probability by just securing one critical measurement. Numerical simulations illustrate the effectiveness of the proposed new attack case and its detection method.

[1]  Pietro Tesi,et al.  Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.

[2]  Newton G. Bretas,et al.  Power system state estimation: Undetectable bad data , 2014 .

[3]  A. Conejo,et al.  Power System State Estimation Considering Measurement Dependencies , 2009, IEEE Transactions on Power Systems.

[4]  Farrokh Aminifar,et al.  Observability of Hybrid AC/DC Power Systems With Variable-Cost PMUs , 2014, IEEE Transactions on Power Delivery.

[5]  H. Vincent Poor,et al.  Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models , 2013, IEEE Journal on Selected Areas in Communications.

[6]  Gexiang Zhang,et al.  Power System Real-Time Monitoring by Using PMU-Based Robust State Estimation Method , 2016, IEEE Transactions on Smart Grid.

[7]  James D. McCalley,et al.  Online risk-based security assessment , 2002 .

[8]  Minrui Fei,et al.  A Novel Networked Online Recursive Identification Method for Multivariable Systems With Incomplete Measurement Information , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[9]  Simone Silvestri,et al.  Managing Contingencies in Smart Grids via the Internet of Things , 2016, IEEE Transactions on Smart Grid.

[10]  Lalitha Sankar,et al.  Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks , 2016, IEEE Transactions on Smart Grid.

[11]  Lei Wu,et al.  Transmission Line Overload Risk Assessment for Power Systems With Wind and Load-Power Generation Correlation , 2015, IEEE Transactions on Smart Grid.

[12]  C. K. Michael Tse,et al.  Assessment of Robustness of Power Systems From a Network Perspective , 2015, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

[13]  Minrui Fei,et al.  Quantized control of distributed event-triggered networked control systems with hybrid wired-wireless networks communication constraints , 2017, Inf. Sci..

[14]  Yijia Cao,et al.  Cascading Failure Analysis Considering Interaction Between Power Grids and Communication Networks , 2016, IEEE Transactions on Smart Grid.

[15]  Minrui Fei,et al.  Multiple event-triggered H2/H∞ filtering for hybrid wired-wireless networked systems with random network-induced delays , 2015, Inf. Sci..

[16]  Zhu Han,et al.  Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.

[17]  Gustavo Valverde,et al.  Unscented kalman filter for power system dynamic state estimation , 2011 .

[18]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[19]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[20]  Jinping Hao,et al.  Optimal malicious attack construction and robust detection in Smart Grid cyber security analysis , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[21]  Stephen P. Boyd,et al.  Enhancing Sparsity by Reweighted ℓ1 Minimization , 2007, 0711.1612.

[22]  Ying Jun Zhang,et al.  Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation , 2013, IEEE Transactions on Smart Grid.

[23]  Lang Tong,et al.  Impact of Data Quality on Real-Time Locational Marginal Price , 2012, IEEE Transactions on Power Systems.

[24]  Xiaodong Wang,et al.  Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids , 2015, IEEE Transactions on Smart Grid.

[25]  Walid Saad,et al.  Data Injection Attacks on Smart Grids With Multiple Adversaries: A Game-Theoretic Perspective , 2016, IEEE Transactions on Smart Grid.

[26]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[27]  Carolyn Penstein Rosé,et al.  CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites , 2011, TSEC.

[28]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[29]  V. J. Gutierrez-Martinez,et al.  Practical Security Boundary-Constrained DC Optimal Power Flow for Electricity Markets , 2016, IEEE Transactions on Power Systems.

[30]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[31]  Chung-Shou Liao,et al.  Hybrid search for the optimal PMU placement problem on a power grid , 2015, Eur. J. Oper. Res..

[32]  Antonio T. Alexandridis,et al.  Modular Control Design and Stability Analysis of Isolated PV-Source/Battery-Storage Distributed Generation Systems , 2015, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

[33]  Xue Li,et al.  Probabilistic optimal power flow for power systems considering wind uncertainty and load correlation , 2015, Neurocomputing.