Data Attack Isolation in Power Networks Using Secure Voltage Magnitude Measurements

In this paper a procedure to detect and isolate data attacks on power network power flow measurements is proposed. This method can be used in conjunction with available bad data detection (BDD) methods to isolate multiple bad data which are otherwise difficult to handle. The proposed procedure relies on secure measurements of bus voltage magnitudes to define a measurement residual using potentially compromised active and reactive power flow measurements on transmission lines. The proposed residual can be calculated in real-time. In addition, the component of the proposed residual on any particular line depends only locally on the component of the data attack on the same line. This makes the proposed residual well-suited for distributed data attack isolation in large-scale power networks. Furthermore, it can be shown that the proposed procedure becomes more effective when measurements from multiple time instances can be utilized. A detailed numerical case study on the IEEE 14-bus benchmark system demonstrates the effectiveness of the proposed procedure.

[1]  Kameshwar Poolla,et al.  Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[2]  R. Romero,et al.  Identifying multiple interacting bad data in power system state estimation , 2005, IEEE Power Engineering Society General Meeting, 2005.

[3]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[4]  Henrik Sandberg,et al.  Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.

[5]  W. L. Peterson,et al.  Multiple bad data detection in power system state estimation using linear programming , 1988, [1988] Proceedings. The Twentieth Southeastern Symposium on System Theory.

[6]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[7]  Karl Henrik Johansson,et al.  Electric power network security analysis via minimum cut relaxation , 2011, IEEE Conference on Decision and Control and European Control Conference.

[8]  I. Kamwa,et al.  Causes of the 2003 major grid blackouts in North America and Europe, and recommended means to improve system dynamic performance , 2005, IEEE Transactions on Power Systems.

[9]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[10]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[11]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[12]  Karl Henrik Johansson,et al.  Efficient Computations of a Security Index for False Data Attacks in Power Networks , 2012, IEEE Transactions on Automatic Control.

[13]  G.P. Harrison,et al.  Centralized and Distributed Voltage Control: Impact on Distributed Generation Penetration , 2007, IEEE Transactions on Power Systems.

[14]  F. A. Viawan,et al.  Voltage Control and Voltage Stability of Power Distribution Systems in the Presence of Distributed Generation , 2008 .

[15]  Babu Narayanan,et al.  POWER SYSTEM STABILITY AND CONTROL , 2015 .

[16]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[17]  Fangxing Li,et al.  Adaptive Voltage Control With Distributed Energy Resources: Algorithm, Theoretical Analysis, Simulation, and Field Test Verification , 2011, IEEE Transactions on Power Systems.

[18]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[19]  Stephen Boyd,et al.  Estimation of faults in DC electrical power system , 2009, 2009 American Control Conference.

[20]  M. R. Irving,et al.  Power System State Estimation Using Linear Programming , 1978 .

[21]  Lamine Mili,et al.  Identification of multiple interacting bad data via power system decomposition , 1996 .

[22]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[23]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[24]  J. Giri,et al.  PMU Impact on State Estimation Reliability for Improved Grid Security , 2006, 2005/2006 IEEE/PES Transmission and Distribution Conference and Exhibition.

[25]  Henrik Sandberg,et al.  The VIKING project: An initiative on resilient control of power networks , 2009, 2009 2nd International Symposium on Resilient Control Systems.

[26]  A. Monticelli State estimation in electric power systems : a generalized approach , 1999 .

[27]  E. Handschin,et al.  Bad data analysis for power system state estimation , 1975, IEEE Transactions on Power Apparatus and Systems.