Trade-offs in Data-Driven False Data Injection Attacks Against the Power Grid

We address the problem of constructing false data injection (FDI) attacks that can bypass the bad data detector (BDD) of a power grid. The attacker is assumed to have access to only power flow measurement data traces (collected over a limited period of time) and no other prior knowledge about the grid. Existing related algorithms are formulated under the assumption that the attacker has access to measurements collected over a long (asymptotically infinite) time period, which may not be realistic. We show that these approaches do not perform well when the attacker has a limited number of data samples only. We design an enhanced algorithm to construct FDI attack vectors in the face of limited measurements that can nevertheles bypass the BDD with high probability. Furthermore, we characterize an important trade-off between the attack's BDD-bypass probability and its sparsity, which affects the spatial extent of the attack that must be achieved. Extensive simulations using data traces collected from the MATPOWER simulator and benchmark IEEE bus systems validate our findings.

[1]  G. Manimaran,et al.  Cybersecurity for electric power control and automation systems , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.

[2]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[3]  Dick Duffey,et al.  Power Generation , 1932, Transactions of the American Institute of Electrical Engineers.

[4]  H. Vincent Poor,et al.  Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models , 2013, IEEE Journal on Selected Areas in Communications.

[5]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[6]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[7]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[8]  P. M. Herdera,et al.  Institutional challenges caused by the integration of renewable energy sources in the European electricity sector , 2016 .

[9]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[10]  M. Viberg,et al.  Two decades of array signal processing research: the parametric approach , 1996, IEEE Signal Process. Mag..

[11]  H. Vincent Poor,et al.  Blind topology identification for power systems , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[12]  Lang Tong,et al.  Subspace Methods for Data Attack on State Estimation: A Data Driven Approach , 2014, IEEE Transactions on Signal Processing.

[13]  F. Li,et al.  Performance analysis for DOA estimation algorithms: unification, simplification, and observations , 1993 .

[14]  D. Divan,et al.  Distributed FACTS—A New Concept for Realizing Grid Power Flow Control , 2005, IEEE Transactions on Power Electronics.

[15]  Anja Vogler,et al.  An Introduction to Multivariate Statistical Analysis , 2004 .