Building Efficiency and Sustainability in the Tropics ( SinBerBEST )

Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored and transmitted over a SCADA network to the system operator. These are used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks on power meter readings can be designed to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected with O(n2) flops using standard graph algorithms. Known-secure phasor measurement units [PMUs] can be used as countermeasures against a given collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p+1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

[1]  J. Thorp,et al.  State Estimation with Phasor Measurements , 1986, IEEE Power Engineering Review.

[2]  Tony Flick,et al.  Securing the Smart Grid: Next Generation Power Grid Security , 2010 .

[3]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[4]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[5]  Karl Henrik Johansson,et al.  A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator , 2010, ArXiv.

[6]  J. S. Thorp,et al.  State Estimlatjon with Phasor Measurements , 1986, IEEE Transactions on Power Systems.

[7]  A. Abur,et al.  Placement of PMUs to Enable Bad Data Detection in State Estimation , 2006, IEEE Transactions on Power Systems.

[8]  Chien-Hsing Lee,et al.  Bad data analysis in power system measurement estimation using complex artificial neural network based on the extended complex Kalman filter , 2010 .

[9]  J.-A. Jiang,et al.  Transmission network fault location observability with minimal PMU placement , 2006, IEEE Transactions on Power Delivery.

[10]  Newton G. Bretas,et al.  Network observability: identification of the measurements redundancy level , 2000, PowerCon 2000. 2000 International Conference on Power System Technology. Proceedings (Cat. No.00EX409).

[11]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[12]  A. Monticelli State estimation in electric power systems : a generalized approach , 1999 .

[13]  K. Clements,et al.  Numerical observability analysis based on network graph theory , 2003 .

[14]  H.-J. Koglin,et al.  Bad data detection and identification , 1990 .

[15]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[16]  G. Granelli,et al.  Identification of interacting bad data in the framework of the weighted least square method , 2008 .

[17]  Robert E. Tarjan,et al.  A Note on Finding the Bridges of a Graph , 1974, Inf. Process. Lett..

[18]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[19]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[20]  J. Hopcroft,et al.  Algorithm 447: efficient algorithms for graph manipulation , 1973, CACM.

[21]  Kameshwar Poolla,et al.  Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[22]  Thomas J. Overbye,et al.  The smart grid and PMUs: Operational challenges and opportunities , 2010, IEEE PES General Meeting.

[23]  Qiao Li,et al.  Phasor measurement units placement for power system state estimation: A greedy approach , 2011, 2011 IEEE Power and Energy Society General Meeting.

[24]  Michèle Basseville,et al.  Detection of abrupt changes: theory and application , 1993 .

[25]  David P. Williamson The primal-dual method for approximation algorithms , 2002, Math. Program..

[26]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[27]  A. Abur,et al.  Robust Measurement Design by Placing Synchronized Phasor Measurements on Network Branches , 2010, IEEE Transactions on Power Systems.

[28]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[29]  Zhu Han,et al.  Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.

[30]  J. Giri,et al.  PMU Impact on State Estimation Reliability for Improved Grid Security , 2006, 2005/2006 IEEE/PES Transmission and Distribution Conference and Exhibition.

[31]  Stephen Boyd,et al.  Estimation of faults in DC electrical power system , 2009, 2009 American Control Conference.

[32]  J. Hopcroft,et al.  Efficient algorithms for graph manipulation , 1971 .

[33]  George N. Korres,et al.  Observability analysis for power systems including conventional and phasor measurements , 2010 .

[34]  Jeu-Min Lin,et al.  A Static State Estimation Approach Including Bad Data Detection and Identification in Power Systems , 2007, 2007 IEEE Power Engineering Society General Meeting.

[35]  Marcel Worring,et al.  NIST Special Publication , 2005 .

[36]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.