A Data-Driven Approach for Quantifying and Evaluating Overloading Dependencies Among Power System Branches Under Load Redistribution Attacks

被引:4
作者
Wei, Xiaoguang [1 ]
Lei, Jieyu [1 ]
Shi, Jian [2 ]
Shahidehpour, Mohammad [3 ]
Gao, Shibin [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Elect Engn, Chengdu 611756, Peoples R China
[2] Univ Houston, Dept Engn Technol, Houston, TX 77004 USA
[3] IIT, Galvin Ctr Elect Innovat, Chicago, IL 60616 USA
基金
中国国家自然科学基金;
关键词
Power systems; Indexes; Security; Power measurement; Optimization; Load modeling; Data models; Cyber security; false data attack; load redistribution attack; critical branches; smart grid applications; DATA INJECTION ATTACKS; CYBER-ATTACK; VULNERABILITY; STATE;
D O I
10.1109/TSG.2023.3344556
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
False data injection (FDI) for inducing load redistribution attacks can pose significant overloading risks to power systems. In this paper, we propose a data-driven approach to investigate the underlying dependencies and correlation of injected false data and the resulting overloading events, so that the detailed overloading mechanisms and propagation patterns of LR attacks can be revealed. Initially, we define two types of branches to capture the load distribution features of a network following an LR attack. Then, we develop a data-driven overloading dependency model to capture the pairwise dependencies among branches so that the overloading risks imposed by LR attacks can be captured. Finally, we propose three types of performance evaluation metrics to systematically quantify how the identified overloading dependencies can be used to evaluate the damaging effects of LR attack. Simulation results, conducted based on the IEEE 39-bus system, show that the proposed approach is more effective than the existing methods in mitigating the average overloading risks following an LR attack.
引用
收藏
页码:4050 / 4062
页数:13
相关论文
共 33 条
[1]   Minimax-Regret Robust Defensive Strategy Against False Data Injection Attacks [J].
Abusorrah, Abdullah ;
Alabdulwahab, Ahmed ;
Li, Zhiyi ;
Shahidehpour, Mohammad .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (02) :2068-2079
[2]  
Case D.U., 2016, Electricity Information Sharing and Analysis Center (E-ISAC), V388, P1
[3]   Fast Screening of High-Risk Lines Under False Data Injection Attacks [J].
Che, Liang ;
Liu, Xuan ;
Li, Zuyi .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (04) :4003-4014
[4]   Cyber Cascades Screening Considering the Impacts of False Data Injection Attacks [J].
Che, Liang ;
Liu, Xuan ;
Shuai, Zhikang ;
Li, Zuyi ;
Wen, Yunfeng .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (06) :6545-6556
[5]   Mitigating False Data Attacks Induced Overloads Using a Corrective Dispatch Scheme [J].
Che, Liang ;
Liu, Xuan ;
Li, Zuyi .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (03) :3081-3091
[6]   Model-Free Emergency Frequency Control Based on Reinforcement Learning [J].
Chen, Chunyu ;
Cui, Mingjian ;
Li, Fangxing ;
Yin, Shengfei ;
Wang, Xinan .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) :2336-2346
[7]   Co-Estimation of State and FDI Attacks and Attack Compensation Control for Multi-Area Load Frequency Control Systems Under FDI and DoS Attacks [J].
Chen, Xiaoli ;
Hu, Songlin ;
Li, Yu ;
Yue, Dong ;
Dou, Chunxia ;
Ding, Lei .
IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (03) :2357-2368
[8]   Defending Against False Data Injection Attacks on Power System State Estimation [J].
Deng, Ruilong ;
Xiao, Gaoxi ;
Lu, Rongxing .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (01) :198-207
[9]   Secure State Estimation and Control of Cyber-Physical Systems: A Survey [J].
Ding, Derui ;
Han, Qing-Long ;
Ge, Xiaohua ;
Wang, Jun .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (01) :176-190
[10]   Assessment of Overloading Correlations Among Transmission Lines Under Load Redistribution Attacks [J].
Gao, Shibin ;
Lei, Jieyu ;
Shi, Jian ;
Wei, Xiaoguang ;
Dong, Ming ;
Han, Zhu .
IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (02) :1570-1581