Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid

Malicious attacks in the power system can eventually result in a large-scale cascade failure if not rectified in a timely manner. These attacks, which are traditionally classified into physical and cyber attacks, can be avoided by using the latest advanced detection mechanisms. However, a new threat called cyber-physical attacks jointly targets both the physical and cyber layers of the system to interfere with the operations of the power grid is more malicious than traditional attacks. In this paper, we propose a new cyber-physical attack strategy where the transmission line is first physically disconnected, the line-outage event is masked to mislead the control center into detecting this as an obvious line outage at a different position in the local area of the power system. Therefore, the topology information in the control center is interfered with as a result of our attack. We also propose a novel procedure for selecting vulnerable lines and analyze the observability of our proposed framework. Our proposed method can effectively and continuously deceive the control center into detecting fake line-outage positions, and thereby increase the chance of cascade failure because the attention is given to the fake outage. The simulation results validate the efficiency of our proposed attack strategy.

[1]  Lalitha Sankar,et al.  Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks , 2016, IEEE Transactions on Smart Grid.

[2]  Wen-Long Chin,et al.  Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid , 2015, IEEE Transactions on Smart Grid.

[3]  Chau Yuen,et al.  Local cyber-physical attack with leveraging detection in smart grid , 2017, 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[4]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[5]  Abdullah Abusorrah,et al.  Analyzing Locally Coordinated Cyber-Physical Attacks for Undetectable Line Outages , 2018, IEEE Transactions on Smart Grid.

[6]  Ali Abur,et al.  A New Framework for Detection and Identification of Network Parameter Errors , 2018, IEEE Transactions on Smart Grid.

[7]  Zuyi Li,et al.  Local Topology Attacks in Smart Grids , 2017, IEEE Transactions on Smart Grid.

[8]  Åke J. Holmgren,et al.  Evaluating Strategies for Defending Electric Power Networks Against Antagonistic Attacks , 2007, IEEE Transactions on Power Systems.

[9]  Faruk Kazi,et al.  Cascading Failure Analysis for Indian Power Grid , 2016, IEEE Transactions on Smart Grid.

[10]  Zuyi Li,et al.  Modeling of Local False Data Injection Attacks With Reduced Network Information , 2015, IEEE Transactions on Smart Grid.

[11]  A. Abur,et al.  Identification of network parameter errors , 2006, IEEE Transactions on Power Systems.

[12]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[13]  Chau Yuen,et al.  Joint cyber and physical attacks against topology of electric grids , 2016, 2016 IEEE Region 10 Conference (TENCON).

[14]  Hamed Mohsenian Rad,et al.  False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[15]  Lang Tong,et al.  On topology attack of a smart grid , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).

[16]  Mohammad Shahidehpour,et al.  The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .

[17]  M. Shahidehpour,et al.  Direct Calculation of Line Outage Distribution Factors , 2009, IEEE Transactions on Power Systems.

[18]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[19]  Karl Henrik Johansson,et al.  Electric power network security analysis via minimum cut relaxation , 2011, IEEE Conference on Decision and Control and European Control Conference.

[20]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[21]  Babak Hassibi,et al.  Equivalent Relaxations of Optimal Power Flow , 2014, IEEE Transactions on Automatic Control.

[22]  J. Salmeron,et al.  Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.

[23]  Zuyi Li,et al.  Local Load Redistribution Attacks in Power Systems With Incomplete Network Information , 2014, IEEE Transactions on Smart Grid.

[24]  Pascal Van Hentenryck,et al.  DistFlow Extensions for AC Transmission Systems , 2015, ArXiv.

[25]  Hamed Mohsenian-Rad,et al.  False data injection attacks against nonlinear state estimation in smart power grids , 2013, 2013 IEEE Power & Energy Society General Meeting.

[26]  Zuyi Li,et al.  False Data Attacks Against AC State Estimation With Incomplete Network Information , 2017, IEEE Transactions on Smart Grid.

[27]  Lang Tong,et al.  On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.

[28]  Hao Liang,et al.  CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid , 2017, IEEE Transactions on Smart Grid.

[29]  Zuyi Li,et al.  Masking Transmission Line Outages via False Data Injection Attacks , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Ian Dobson,et al.  Using Transmission Line Outage Data to Estimate Cascading Failure Propagation in an Electric Power System , 2008, IEEE Transactions on Circuits and Systems II: Express Briefs.

[31]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[32]  Abdullah Abusorrah,et al.  Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems , 2016, IEEE Transactions on Smart Grid.

[33]  Lalitha Sankar,et al.  Implementation of unobservable state-preserving topology attacks , 2015, 2015 North American Power Symposium (NAPS).