Set-Theoretic Detection of Bias Injection Cyber-Attacks on Networked Power Systems

This paper addresses the concept of a set-theoretic framework for the detection of bias injection cyber-attacks on the load frequency control loop of a networked power system. The proposed attack detection mechanism is based on the use of convex and compact polyhedral robust invariant sets. An alarm signal is triggered whenever the state vector exits the invariant sets, indicating a potential security breach. The attack scenario studied involves the transmission of corrupted frequency sensor measurements to the automatic generation control unit of a compromised control area. Simulation studies demonstrate the ability of a set-theoretic detector to disclose intermittent attack patterns even in the presence of disturbances.

[1]  T. Suehiro,et al.  Decentralized control of smart grid by using overlapping information , 2012, 2012 Proceedings of SICE Annual Conference (SICE).

[2]  Olle I. Elgerd,et al.  Electric Energy Systems Theory: An Introduction , 1972 .

[3]  André Teixeira,et al.  Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.

[4]  Sriram Vishwanath,et al.  Jamming Aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation , 2015, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[5]  E. Gilbert,et al.  Theory and computation of disturbance invariant sets for discrete-time linear systems , 1998 .

[6]  Anthony Tzes,et al.  Cyber-attack on a power plant using bias injected measurements , 2017, 2017 American Control Conference (ACC).

[7]  Alessandro Casavola,et al.  A leader-follower architecture for Load Frequency Control purposes against cyber attacks in power grids - Part I , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[8]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.

[9]  John Lygeros,et al.  Cyber attack in a two-area power system: Impact identification using reachability , 2010, Proceedings of the 2010 American Control Conference.

[10]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[11]  Leonidas Dritsas,et al.  Impact Analysis of a Bias Injection Cyber-Attack on a Power Plant , 2017 .

[12]  Nadeem Javaid,et al.  A review of wireless communications for smart grid , 2015 .