Detection and localization of targeted attacks on fully distributed power system state estimation

Distributed state estimation will play a central role in the efficient and reliable operation of interconnected power systems. Therefore, its security is of major concern. In this work we show that an attacker that compromises a single control center in an interconnected system could launch a denial of service attack against state-of-the-art distributed state estimation by injecting false data, and consequently, it could blind the entire system. We propose a fully distributed attack detection scheme based on local measurements to detect such a denial of service attack. We then propose a fully distributed attack localization scheme that relies on the regions' beliefs about the attack location, and performs inference on the power system topology to identify the most likely attack location. We validate both algorithms on the IEEE 118 bus power system.

[1]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[2]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[3]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[4]  Kameshwar Poolla,et al.  Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[5]  György Dán,et al.  On the security of distributed power system state estimation under targeted attacks , 2013, SAC '13.

[6]  H. Poor,et al.  Fully Distributed State Estimation for Wide-Area Monitoring Systems , 2012, IEEE Transactions on Smart Grid.

[7]  Stephen P. Boyd,et al.  Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..

[8]  A. Monticelli,et al.  Electric power system state estimation , 2000, Proceedings of the IEEE.

[9]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[10]  A.J. Conejo,et al.  An Optimization Approach to Multiarea State Estimation , 2007, IEEE Transactions on Power Systems.

[11]  Georgios B. Giannakis,et al.  Distributed Robust Power System State Estimation , 2012, IEEE Transactions on Power Systems.

[12]  Elizabeth L. Wilmer,et al.  Markov Chains and Mixing Times , 2008 .

[13]  Karl Henrik Johansson,et al.  A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator , 2010, ArXiv.

[14]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[15]  Henrik Sandberg,et al.  Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.

[16]  H. Vincent Poor,et al.  Distributed joint cyber attack detection and state recovery in smart grids , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[17]  Mohammad Shahidehpour,et al.  Communication and Control in Electric Power Systems: Shahidehpour/Applications of Parallel and Distributed Processing , 2005 .

[18]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[19]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[20]  V. Climenhaga Markov chains and mixing times , 2013 .

[21]  Mohammad Shahidehpour,et al.  Communication and Control in Electric Power Systems: Applications of Parallel and Distributed Processing , 2003 .