A Novel Data Integrity Attack on Consensus-Based Distributed Energy Management Algorithm Using Local Information

This paper introduces a novel data integrity attack on the well-developed consensus-based energy management algorithm. In particular, we show that by sending out elaborately falsified information during the consensus iterations, attackers could manipulate the system operating point and gain extra economic benefits. Meanwhile, the system-level and device-level constraints are still satisfied, e.g., the power generation and demand are balanced, and the operation of individual device respects physical constraints. This data integrity attack has two major features: First, attackers rely only on local information to complete the attack; neither additional information about system topology nor additional colluders are required; second, the attacking effect is accumulative, which enables attackers to choose to finish in either single or multiple iterations. By revealing such vulnerability of consensus-based applications to data integrity attack, this paper conveys the message that besides the efforts of designing novel distributed energy management algorithms to address the renewable energy integration challenges, it is equally important to protect the distributed energy management algorithms from possible malicious attacks to avoid potential economic losses. The proposed attack is illustrated in the Future Renewable Electric Energy Delivery and Management system.

[1]  Mo-Yuen Chow,et al.  Cooperative Distributed Demand Management for Community Charging of PHEV/PEVs Based on KKT Conditions and Consensus Networks , 2014, IEEE Transactions on Industrial Informatics.

[2]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[3]  Jian-Xin Xu,et al.  Consensus Based Approach for Economic Dispatch Problem in a Smart Grid , 2013, IEEE Transactions on Power Systems.

[4]  Jianhui Wang,et al.  A Probabilistic Risk Mitigation Model for Cyber-Attacks to PMU Networks , 2015, IEEE Transactions on Power Systems.

[5]  Allen J. Wood,et al.  Power Generation, Operation, and Control , 1984 .

[6]  Tao Chen,et al.  A Novel Consensus-Based Distributed Algorithm for Economic Dispatch Based on Local Estimation of Power Mismatch , 2017, IEEE Transactions on Smart Grid.

[7]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[8]  Zhihua Qu,et al.  An Attack-Resilient Cooperative Control Strategy of Multiple Distributed Generators in Distribution Networks , 2016, IEEE Transactions on Smart Grid.

[9]  Rong Zheng,et al.  Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Systems Journal.

[10]  Q. Jiang,et al.  Energy Management of Microgrid in Grid-Connected and Stand-Alone Modes , 2013, IEEE Transactions on Power Systems.

[11]  Yuan Zhang,et al.  Resilient Distributed Energy Management Subject to Unexpected Misbehaving Generation Units , 2017, IEEE Transactions on Industrial Informatics.

[12]  Wenxin Liu,et al.  Stable Multi-Agent-Based Load Shedding Algorithm for Power Systems , 2011, IEEE Transactions on Power Systems.

[13]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[14]  Jianhui Wang,et al.  A Distributed Direct Load Control Approach for Large-Scale Residential Demand Response , 2014, IEEE Transactions on Power Systems.

[15]  Yuan Zhang,et al.  Cooperative distributed scheduling for storage devices in microgrids using dynamic KKT multipliers and consensus networks , 2015, 2015 IEEE Power & Energy Society General Meeting.

[16]  Mo-Yuen Chow,et al.  Consensus-based distributed scheduling for cooperative operation of distributed energy resources and storage devices in smart grids , 2016 .

[17]  Zhiqiang Li,et al.  Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks , 2012, IET Commun..

[18]  Abdullah Abusorrah,et al.  Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems , 2016, IEEE Transactions on Smart Grid.

[19]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[20]  Reza Olfati-Saber,et al.  Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.

[21]  Siddharth Sridhar,et al.  Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.

[22]  Jiming Chen,et al.  Analysis of Consensus-Based Distributed Economic Dispatch Under Stealthy Attacks , 2017, IEEE Transactions on Industrial Electronics.

[23]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.