Detection and Protection Against Intrusions on Smart Grid Systems

The wide area monitoring of power systems is implemented at a central control center to coordinate the actions of local controllers. Phasor measurement units (PMUs) are used for the collection of data in real time for the smart grid energy systems. Intrusion detection and cyber security of network are important requirements for maintaining the integrity of wide area monitoring systems. The intrusion detection methods analyze the measurement data to detect any possible cyber attacks on the operation of smart grid systems. In this paper, the model-based and signal-based intrusion detection methods are investigated to detect the presence of malicious data. The chi-square test and discrete wavelet transform (DWT) have been used for anomaly-based detection. The false data injection attack (FDIA) can be detected using measurement residual. If the measurement residual is larger than expected detection threshold, then an alarm is triggered and bad data can be identified. Avoiding such alarms in the residual test is referred to as stealth attack. There are two protection strategies for stealth attack: (1) Select a subset of meters to be protected from the attacker (2) Place secure phasor measurement units in the power grid. An IEEE 14-bus system is simulated using real time digital simulator (RTDS) hardware platform for implementing attack and detection schemes.

[1]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[2]  Marina Vannucci,et al.  Detecting Traffic Anomalies Using Discrete Wavelet Transform , 2004, ICOIN.

[3]  S. Mallat A wavelet tour of signal processing , 1998 .

[4]  K. Uhlen,et al.  Deployment of a SCADA integrated wide area monitoring system , 2008, 2008 IEEE/PES Transmission and Distribution Conference and Exposition: Latin America.

[5]  A. Abur,et al.  Multi area state estimation using synchronized phasor measurements , 2005, IEEE Transactions on Power Systems.

[6]  Ganesh K. Venayagamoorthy,et al.  Enhanced wide area monitoring system , 2010, 2010 Innovative Smart Grid Technologies (ISGT).

[7]  A. Monticelli,et al.  Electric power system state estimation , 2000, Proceedings of the IEEE.

[8]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[9]  Guangmin Hu,et al.  Anomaly Detection of Network Traffic Based on Wavelet Packet , 2006, 2006 Asia-Pacific Conference on Communications.

[10]  Chin-Tser Huang,et al.  Wavelet-based Real Time Detection of Network Traffic Anomalies , 2006, 2006 Securecomm and Workshops.

[11]  L. L. Freris,et al.  Investigation of the load-flow problem , 1967 .

[12]  Min Chen,et al.  Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System , 2011, IEEE Transactions on Smart Grid.

[13]  Xu Zhang,et al.  Notice of RetractionA Novel Voltage Stability Prediction Index Based On Wide Area Measurement , 2010, 2010 Asia-Pacific Power and Energy Engineering Conference.

[14]  Hong Li,et al.  A new method of power system state estimation based on wide-area measurement system , 2009, 2009 4th IEEE Conference on Industrial Electronics and Applications.

[15]  A. L. Narasimha Reddy,et al.  Statistical Techniques for Detecting Traffic Anomalies Through Packet Header Data , 2008, IEEE/ACM Transactions on Networking.

[16]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[17]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .