False-Data Injection Attack in Electricity Generation System Subject to Actuator Saturation: Analysis and Design

The secure operation of electricity generation system (EGS) is essential to the quality of electricity and the security of energy Internet. In order to design secure control strategy for EGS, the behavior and capacity of adversary and possible attack should be studied. From this point of view and considering the actuator saturation and the false-data injection attack in control input channel of EGS, we analyze the behavior and stealthiness of adversary and design stealthy attack strategies in this paper. First, we prove that the magnitude of effective attack signal is smaller than the magnitude of injected attack signal because of actuator saturation. Second, we find that smaller actuator saturation limit makes the adversary easier to be detected. Finally, two stealthy attack strategies are designed for EGS which incorporates a $\chi ^{2}$ attack detector, and the effectiveness of them are illustrated through simulation.

[1]  Mani B. Srivastava,et al.  Design considerations for solar energy harvesting wireless embedded systems , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[2]  A. Mullane,et al.  Modeling of the wind turbine with a doubly fed induction generator for grid integration studies , 2006, IEEE Transactions on Energy Conversion.

[3]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[4]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[5]  Josep M. Guerrero,et al.  A Multiagent-Based Consensus Algorithm for Distributed Coordinated Control of Distributed Generators in the Energy Internet , 2015, IEEE Transactions on Smart Grid.

[6]  Fushuan Wen,et al.  From Smart Grid to Energy Internet:Basic Concept and Research Framework , 2014 .

[7]  Qing-Long Han,et al.  Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[8]  L.H. Tsoukalas,et al.  From smart grids to an energy internet: Assumptions, architectures and requirements , 2008, 2008 Third International Conference on Electric Utility Deregulation and Restructuring and Power Technologies.

[9]  Zhe Chen,et al.  Overview of different wind generator systems and their comparisons , 2008 .

[10]  Soummya Kar,et al.  Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.

[11]  Junwei Cao,et al.  Energy Internet -- Towards Smart Grid 2.0 , 2013, 2013 Fourth International Conference on Networking and Distributed Computing.

[12]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[13]  Ruochi Zhang,et al.  Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[15]  J. Sasiadek,et al.  Linearization of nonlinear MIMO model of large power plant station , 2000, Proceedings of the 2000 American Control Conference. ACC (IEEE Cat. No.00CH36334).

[16]  Haibo He,et al.  Event-Triggered Robust Stabilization of Nonlinear Input-Constrained Systems Using Single Network Adaptive Critic Designs , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[17]  A Q Huang,et al.  The Future Renewable Electric Energy Delivery and Management (FREEDM) System: The Energy Internet , 2011, Proceedings of the IEEE.

[18]  Tomonobu Senjyu,et al.  Output power leveling of wind turbine Generator for all operating regions by pitch angle control , 2006 .

[19]  Changyin Sun,et al.  Adaptive Neural Impedance Control of a Robotic Manipulator With Input Saturation , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[20]  Ming Cheng,et al.  Pitch angle control for variable speed wind turbines , 2008, 2008 Third International Conference on Electric Utility Deregulation and Restructuring and Power Technologies.

[21]  Naixue Xiong,et al.  Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[22]  Subhashish Bhattacharya,et al.  Energy router: Architectures and functionalities toward Energy Internet , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[23]  Allen J. Wood,et al.  Power Generation, Operation, and Control , 1984 .

[24]  Song Guo,et al.  A Survey on Energy Internet: Architecture, Approach, and Emerging Technologies , 2018, IEEE Systems Journal.

[25]  Qing-Long Han,et al.  State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..

[26]  Terry L King A Guide to Chi-Squared Testing , 1997 .

[27]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[28]  Maureen Hand,et al.  Multivariable control strategy for variable speed, variable pitch wind turbines , 2007 .

[29]  Jonathan Miller,et al.  Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.