Extended Distributed State Estimation: A Detection Method against Tolerable False Data Injection Attacks in Smart Grids

False data injection (FDI) is considered to be one of the most dangerous cyber-attacks in smart grids, as it may lead to energy theft from end users, false dispatch in the distribution process, and device breakdown during power generation. In this paper, a novel kind of FDI attack, named tolerable false data injection (TFDI), is constructed. Such attacks exploit the traditional detector’s tolerance of observation errors to bypass the traditional bad data detection. Then, a method based on extended distributed state estimation (EDSE) is proposed to detect TFDI in smart grids. The smart grid is decomposed into several subsystems, exploiting graph partition algorithms. Each subsystem is extended outward to include the adjacent buses and tie lines, and generate the extended subsystem. The Chi-squares test is applied to detect the false data in each extended subsystem. Through decomposition, the false data stands out distinctively from normal observation errors and the detection sensitivity is increased. Extensive TFDI attack cases are simulated in the Institute of Electrical and Electronics Engineers (IEEE) 14-, 39-, 118- and 300-bus systems. Simulation results show that the detection precision of the EDSE-based method is much higher than that of the traditional method, while the proposed method significantly reduces the associated computational costs.

[1]  H. Poor,et al.  Fully Distributed State Estimation for Wide-Area Monitoring Systems , 2012, IEEE Transactions on Smart Grid.

[2]  G.T. Heydt,et al.  A Distributed State Estimator Utilizing Synchronized Phasor Measurements , 2007, IEEE Transactions on Power Systems.

[3]  Mourad Debbabi,et al.  Communication security for smart grid distribution networks , 2013, IEEE Communications Magazine.

[4]  Robert J. Thomas,et al.  MATPOWER's extensible optimal power flow architecture , 2009, 2009 IEEE Power & Energy Society General Meeting.

[5]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[6]  Le Xie,et al.  Fully distributed bad data processing for wide area state estimation , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[7]  William H. Sanders,et al.  SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures , 2012, IEEE Transactions on Smart Grid.

[8]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[9]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[10]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[11]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[12]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[13]  György Dán,et al.  On the security of distributed power system state estimation under targeted attacks , 2013, SAC '13.

[14]  Qiaoping Zhang,et al.  A New and Efficient K-Medoid Algorithm for Spatial Clustering , 2005, ICCSA.

[15]  William F. Tinney,et al.  Optimal Power Flow Solutions , 1968 .

[16]  J.F. Dopazo,et al.  Implementation of the AEP real-time monitoring system , 1976, IEEE Transactions on Power Apparatus and Systems.

[17]  Fred C. Schweppe,et al.  Power System Static-State Estimation, Part I: Exact Model , 1970 .

[18]  Henrik Sandberg,et al.  Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.

[19]  Lawrence Hasdorff,et al.  Economic Dispatch Using Quadratic Programming , 1973 .

[20]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[21]  Vipin Kumar,et al.  Chameleon: Hierarchical Clustering Using Dynamic Modeling , 1999, Computer.

[22]  P. Hespanha,et al.  An Efficient MATLAB Algorithm for Graph Partitioning , 2006 .

[23]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[24]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[25]  Rong Zheng,et al.  Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.

[26]  Kameshwar Poolla,et al.  Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .

[27]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[28]  Zhu Han,et al.  Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.

[29]  Jiang Wu,et al.  A gradient information based real time pricing mechanism for microgrid in energy intensive enterprise , 2012, Proceedings of the 10th World Congress on Intelligent Control and Automation.