Detection and Isolation of False Data Injection Attacks in Smart Grid via Unknown Input Interval Observer

This article investigates the detection and isolation of false data injection (FDI) attacks in a smart grid based on the unknown input (UI) interval observer. Recent studies have shown that the FDI attacks can bypass the traditional bad data detection methods by using the vulnerability of state estimation. For this reason, the emergency of FDI attacks brings enormous risk to the security of smart grid. To solve this crucial problem, an UI interval observer-based detection and the isolation scheme against FDI attacks are proposed. We first design the UI interval observers to obtain interval state estimation accurately, based on the constructed physical dynamics grid model. Through the capabilities of the designed UI interval observers, the accurate interval estimation state can be decoupled from unknown disturbances. Based on the characteristics of the interval residuals, a UI interval observer-based global detection algorithm was proposed. Particularly, the interval residual-based detection criteria can address the limitation of the precomputed threshold in traditional bad data detection methods. On this basis, we further consider the detection and isolation of FDI attacks under structure vulnerability. Namely, there exist undetectable FDI attacks in the grid system. Taking the attack undetectability problem into account, a logic judgment matrix-based local detection and isolation algorithm against FDI attacks are developed. Based on the combinations of observable sensor cases, local control centers can further detect and isolate the attack set under structure vulnerability. Finally, the effectiveness of the developed detection and isolation algorithms against FDI attacks is demonstrated on the IEEE 8-bus and IEEE 118-bus smart grid system, respectively.

[1]  Xinyu Wang,et al.  Structural Analysis for Cyber Attack Detection and Isolation Problem in Smart Grid , 2018, 2018 Chinese Automation Congress (CAC).

[2]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.

[3]  Olivier Bernard,et al.  Interval observers for linear time-invariant systems with disturbances , 2011, Autom..

[4]  Sridhar Adepu,et al.  Generalized Attacker and Attack Models for Cyber Physical Systems , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[5]  Xiaohong Guan,et al.  Enhanced Hidden Moving Target Defense in Smart Grids , 2019, IEEE Transactions on Smart Grid.

[6]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[7]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[8]  Marios M. Polycarpou,et al.  Real-time hydraulic interval state estimation for water transport networks: a case study , 2017 .

[9]  Saïd Mammar,et al.  An Interval Algebraic Approach for vehicle lateral tire forces estimation , 2019, 2019 IEEE Intelligent Transportation Systems Conference (ITSC).

[10]  Newton G. Bretas,et al.  Further contributions to smart grids cyber-physical security as a malicious data attack: Proof and properties of the parameter error spreading out to the measurements and a relaxed correction model , 2019, International Journal of Electrical Power & Energy Systems.

[11]  J. Gouzé,et al.  Interval observers for uncertain biological systems , 2000 .

[12]  Sridhar Adepu,et al.  Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems , 2018, IEEE Transactions on Sustainable Computing.

[13]  Rudolf Mathar,et al.  A Cosimulation Architecture for Power System, Communication, and Market in the Smart Grid , 2018, Complex..

[14]  Sridhar Adepu,et al.  Distributed Attack Detection in a Water Treatment Plant: Method and Case Study , 2018, IEEE Transactions on Dependable and Secure Computing.

[15]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[16]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[17]  Xiaodong Lin,et al.  The Security of Autonomous Driving: Threats, Defenses, and Future Directions , 2020, Proceedings of the IEEE.

[18]  Aditya Ashok,et al.  Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation , 2018, IEEE Transactions on Smart Grid.

[19]  Xiaohong Guan,et al.  Moving Target Defense Approach to Detecting Stuxnet-Like Attacks , 2020, IEEE Transactions on Smart Grid.

[20]  Yao Zhang,et al.  A survey on the development status and challenges of smart grids in main driver countries , 2017 .

[21]  Amr M. Youssef,et al.  Attack Detection and Identification for Automatic Generation Control Systems , 2018, IEEE Transactions on Power Systems.

[22]  Xinping Guan,et al.  Unknown cyber attack detection and isolation for power systems via Luenberger observer , 2017, 2017 4th International Conference on Information, Cybernetics and Computational Social Systems (ICCSS).

[23]  Chuangxin GUO,et al.  Modeling cascading failures and mitigation strategies in PMU based cyber-physical power systems , 2018, Journal of Modern Power Systems and Clean Energy.

[24]  N.G. Bretas,et al.  Large disturbance voltage stability assessment using extended Lyapunov function and considering voltage dependent active loads , 2005, IEEE Power Engineering Society General Meeting, 2005.

[25]  Ali R. Hurson,et al.  Consideration of Cyber-Physical Interdependencies in Reliability Modeling of Smart Grids , 2018, IEEE Transactions on Sustainable Computing.

[26]  Jianying Zhou,et al.  Attacks on smart grid: power supply interruption and malicious power generation , 2019, International Journal of Information Security.

[27]  Zahir Tari,et al.  Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid , 2015, Inf. Syst..

[28]  Rajat Saini,et al.  OPTIMAL PLACEMENT OF PHASOR MEASUREMENT UNITS FOR POWER SYSTEM OBSERVABILITY , 2013 .

[29]  Husheng Li,et al.  Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis , 2012, ArXiv.

[30]  Ming Gu Anomaly Detection Based on Chi-Square Statistic Technology in Computer Information System , 2013 .

[31]  Cristina Alcaraz,et al.  A Resilient Architecture for the Smart Grid , 2018, IEEE Transactions on Industrial Informatics.

[32]  Sridhar Adepu,et al.  EPIC: An Electric Power Testbed for Research and Training in Cyber Physical Systems Security , 2018, CyberICPS/SECPRE@ESORICS.

[33]  M. Darouach,et al.  Full-order observers for linear systems with unknown inputs , 1994, IEEE Trans. Autom. Control..

[34]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[35]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[36]  Xinping Guan,et al.  Detection and Isolation of False Data Injection Attacks in Smart Grids via Nonlinear Interval Observer , 2019, IEEE Internet of Things Journal.

[37]  Hal L. Smith,et al.  Monotone Dynamical Systems: An Introduction To The Theory Of Competitive And Cooperative Systems (Mathematical Surveys And Monographs) By Hal L. Smith , 1995 .

[38]  Deepa Kundur,et al.  A Cyber-Physical Control Framework for Transient Stability in Smart Grids , 2018, IEEE Transactions on Smart Grid.

[39]  Sridhar Adepu,et al.  An Investigation into the Response of a Water Treatment System to Cyber Attacks , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).

[40]  Haibo He,et al.  Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..

[41]  D.K. Nilsson,et al.  An approach to specification-based attack detection for in-vehicle networks , 2008, 2008 IEEE Intelligent Vehicles Symposium.

[42]  Changyun Wen,et al.  Adaptive cyber-physical system attack detection and reconstruction with application to power systems , 2016 .

[43]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[44]  Christophe Combastel,et al.  Stable Interval Observers in BBC for Linear Systems With Time-Varying Input Bounds , 2013, IEEE Transactions on Automatic Control.

[45]  Faruk Kazi,et al.  Cascading Failure Analysis for Indian Power Grid , 2016, IEEE Transactions on Smart Grid.

[46]  Wenyuan Xu,et al.  Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles , 2018, IEEE Internet of Things Journal.

[47]  Abdullah Abusorrah,et al.  Analyzing Locally Coordinated Cyber-Physical Attacks for Undetectable Line Outages , 2018, IEEE Transactions on Smart Grid.

[48]  Xinping Guan,et al.  Detection and isolation of false data injection attack for smart grids via unknown input observers , 2019, IET Generation, Transmission & Distribution.

[49]  Xinping Guan,et al.  Observer-based cyber attack detection and isolation in smart grids , 2018, International Journal of Electrical Power & Energy Systems.