Research on Topology Optimization of Resilient Defense Strategy Against False Data Injection Attack in Smart Grid

被引:0
作者
Luo X.-Y. [1 ]
He J.-N. [1 ]
Wang X.-Y. [1 ,2 ]
Li H.-B. [1 ]
Guan X.-P. [3 ]
机构
[1] School of Electrical Engineering, Yanshan University, Qinhuangdao
[2] Jiangsu Collaborative Innovation Center for Smart Distribution Network, Nanjing
[3] School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai
来源
Zidonghua Xuebao/Acta Automatica Sinica | 2023年 / 49卷 / 06期
基金
中国国家自然科学基金;
关键词
attack defense; false data injection attack (FDIA); Smart grid; topological graph theory;
D O I
10.16383/j.aas.c230020
中图分类号
学科分类号
摘要
Based on the defense control strategy of virtual hidden network, this paper proposes a topology optimization algorithm based on graph theory to improve the defense performance of power system against false data injection attacks. Firstly, an equivalent transformation method of graph-weight distribution method is proposed to realize the one-to-one correspondence between the connection topology of bipartite graph and the Laplace matrix of bipartite graph; Then, based on the connectivity of network topology and the theory of removable edges of connected graphs, the topological selection basis of virtual hidden networks and bipartite graph connected networks is given; Based on the consideration of topological weights, the index evaluation function of topological optimization of weights is given; By minimizing the cost of index evaluation function, topology optimization is realized, and then the performance of false data injection attack defense method based on virtual hidden network is improved. Finally, the effectiveness of the proposed algorithm is verified by simulation on IEEE-14 bus power grid system. © 2023 Science Press. All rights reserved.
引用
收藏
页码:1326 / 1338
页数:12
相关论文
共 25 条
[1]  
Mustafa A, Modares H., Attack analysis and resilient control design for discrete-time distributed multi-agent systems, IEEE Robotics and Automation Letters, 5, 2, pp. 369-376, (2020)
[2]  
Amin M, El-Sousy F F M, Aziz G A A, Gaber K, Mohammed O A., CPS attacks mitigation approaches on power electronic systems with security challenges for smart grid applications: A review, IEEE Access, 9, pp. 38571-38601, (2021)
[3]  
Alguliyev R, Imamverdiyev Y, Sukhostat L., Cyber-physical systems and their security issues, Computers in Industry, 100, pp. 212-223, (2018)
[4]  
Dibaji S M, Pirani M, Flamholz D B, Annaswamy A M, Johansson K H, Chakrabortty A., A systems and control perspective of CPS security, Annual Reviews in Control, 47, pp. 394-411, (2019)
[5]  
Nozari E, Tallapragada P, Cortes J., Differentially private average consensus: Obstructions, trade-offs, and optimal algorithm design, Automatica, 81, pp. 221-231, (2017)
[6]  
Jafarnia-Jahromi A, Broumandan A, Nielsen J, Lachapelle G., GPS vulnerability to spoofing threats and a review of antispoofing techniques, International Journal of Navigation and Observation, 2012, (2012)
[7]  
Deng R L, Xiao G X, Lu R X, Liang H, Vasilakos A V., False data injection on state estimation in power systems-attacks, impacts, and defense: A survey, IEEE Transactions on Industrial Informatics, 13, 2, (2017)
[8]  
De Persis C, Tesi P., Input-to-state stabilizing control under denial-of-service, IEEE Transactions on Automatic Control, 60, 11, pp. 2930-2944, (2015)
[9]  
Liu Y, Ning P, Reiter M K., False data injection attacks against state estimation in electric power grids, ACM Transactions on Information and System Security, 14, 1, (2011)
[10]  
Sun Kai-Qi, Qiu Wei, Li Ke-Jun, Yao Wen-Xuan, Liu Yi-Lu, Cyber attack defense control for fast frequency response system, Proceedings of the CSEE, 41, 16, pp. 5476-5485, (2021)