Mitigating Propagation of Cyber-Attacks in Wide-Area Measurement Systems

被引:0
作者
Sarjan, Hamed [1 ]
Asghari, Mohammadmahdi [1 ]
Ameli, Amir [1 ]
Ghafouri, Mohsen [2 ]
机构
[1] Lakehead Univ, Elect & Comp Engn Dept, Thunder Bay, ON P7B 5E1, Canada
[2] Concordia Inst Informat Syst Engn CIISE, Montreal, PQ H3G 1M8, Canada
关键词
Cyber-attacks; attack propagation; communication system reconfiguration; wide area measurement system; OPTIMIZATION;
D O I
10.1109/TIFS.2024.3477269
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wide Area Measurement Systems (WAMSs) are used in power networks to improve the situational awareness of the operator, as well as to facilitate real-time control and protection decisions. In WAMSs, Phasor Data Concentrators (PDCs) collect time-synchronized data of Phasor Measurement Units (PMUs) through the communication system, and direct it to the control center to be used in wide-area control and protection applications. Due to the dependence of WAMSs on information and communication technologies, cyber-attacks can target these systems and propagate through them, i.e., infect a greater number of components by accessing and controlling a few of them. On this basis, this paper initially develops a Learning-Based Framework (LBF) to estimate the required defense strategy to counter the propagation of cyber-attacks in WAMSs. Afterwards, through solving a linear Binary Integer Programming (BIP) problem, this paper develops a mitigation strategy to optimally reconfigure the communication network and reduce the contamination probability for critical PMUs and PDCs while maintaining the observability of the grid. The simulation results obtained from IEEE 14- and 30-bus test systems corroborate the effectiveness of the proposed LBF and communication network reconfiguration strategy in mitigating the propagation of cyber-attacks in WAMSs.
引用
收藏
页码:9984 / 9999
页数:16
相关论文
共 49 条
  • [1] Abur A., 2004, POWER SYSTEM STATE E
  • [2] Akhtar T, 2018, IEEE ICCE
  • [3] Al-kasassbeh Mouhammd, 2020, Intelligent Computing. Proceedings of the 2020 Computing Conference. Advances in Intelligent Systems and Computing (AISC 1230), P391, DOI 10.1007/978-3-030-52243-8_28
  • [4] Complementarity reformulations for false data injection attacks on PMU-only state estimation
    Alexopoulos, Theodoros A.
    Korres, George N.
    Manousakis, Nikolaos M.
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2020, 189
  • [5] Optimal response to attacks on the open science grid
    Altunay, Mine
    Leyffer, Sven
    Linderoth, Jeffrey T.
    Xie, Zhen
    [J]. COMPUTER NETWORKS, 2011, 55 (01) : 61 - 73
  • [6] Ameli A., 2022, Wiley Encyclopedia Electr. Electron. Eng., P1
  • [7] Ameli A., 2022, IEEE Trans. Instrum. Meas., V71, P1
  • [8] A Learning-Based Framework for Detecting Cyber-Attacks Against Line Current Differential Relays
    Ameli, Amir
    Ayad, Abdelrahman
    El-Saadany, Ehab F.
    Salama, Magdy
    Youssef, Amr
    [J]. IEEE TRANSACTIONS ON POWER DELIVERY, 2021, 36 (04) : 2274 - 2286
  • [9] Transformation and Linearization Techniques in Optimization: A State-of-the-Art Survey
    Asghari, Mohammad
    Fathollahi-Fard, Amir M.
    Mirzapour Al-e-hashem, S. M. J.
    Dulebenets, Maxim A.
    [J]. MATHEMATICS, 2022, 10 (02)
  • [10] Bello I, 2017, PR MACH LEARN RES, V70