Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation

The normal operation of power system relies on accurate state estimation that faithfully reflects the physical aspects of the electrical power grids. However, recent research shows that carefully synthesized false-data injection attacks can bypass the security system and introduce arbitrary errors to state estimates. In this paper, we use graphical methods to study defending mechanisms against false-data injection attacks on power system state estimation. By securing carefully selected meter measurements, no false data injection attack can be launched to compromise any set of state variables. We characterize the optimal protection problem, which protects the state variables with minimum number of measurements, as a variant Steiner tree problem in a graph. Based on the graphical characterization, we propose both exact and reduced-complexity approximation algorithms. In particular, we show that the proposed tree-pruning based approximation algorithm significantly reduces computational complexity, while yielding negligible performance degradation compared with the optimal algorithms. The advantageous performance of the proposed defending mechanisms is verified in IEEE standard power system testcases.

[1]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[2]  Karl Henrik Johansson,et al.  A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator , 2010, ArXiv.

[3]  Hadi Saadat,et al.  Power System Analysis , 1998 .

[4]  Karl Henrik Johansson,et al.  Computing Critical $k$-Tuples in Power Networks , 2012, IEEE Transactions on Power Systems.

[5]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[6]  G. Krumpholz,et al.  Power System Observability: A Practical Algorithm Using Network Topology , 1980, IEEE Transactions on Power Apparatus and Systems.

[7]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[8]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[9]  Munish Kumar,et al.  Optimal Placement of Phasor Measurement Units for Power System Observability , 2015 .

[10]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[11]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[12]  M. R. Irving,et al.  Observability Determination in Power System State Estimation Using a Network Flow Technique , 1986, IEEE Transactions on Power Systems.

[13]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[14]  Kameshwar Poolla,et al.  Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .

[15]  Hans Jürgen Prömel,et al.  The Steiner Tree Problem , 2002 .

[16]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[17]  Rastko Zivanovic,et al.  Implementation of PMU technology in state estimation: an overview , 1996, Proceedings of IEEE. AFRICON '96.

[18]  Lang Tong,et al.  Impacts of Malicious Data on Real-Time Price of Electricity Market Operations , 2012, 2012 45th Hawaii International Conference on System Sciences.

[19]  Henrik Sandberg,et al.  Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.

[20]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[21]  Karl Henrik Johansson,et al.  Electric power network security analysis via minimum cut relaxation , 2011, IEEE Conference on Decision and Control and European Control Conference.

[22]  Rajat Saini,et al.  OPTIMAL PLACEMENT OF PHASOR MEASUREMENT UNITS FOR POWER SYSTEM OBSERVABILITY , 2013 .

[23]  Le Xie,et al.  Malicious ramp-induced temporal data attack in power market with look-ahead dispatch , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[24]  Zhu Han,et al.  Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.

[25]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[26]  G. Manimaran,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.

[27]  Ying Jun Zhang,et al.  Defending mechanisms against false-data injection attacks in the power system state estimation , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[28]  H.M. Ismail,et al.  A Unified Approach for the Optimal PMU Location for Power System State Estimation , 2009, IEEE Transactions on Power Systems.

[29]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[30]  Ali Abur,et al.  On the use of PMUs in power system state estimation , 2011 .