Protection Against Graph-Based False Data Injection Attacks on Power Systems

被引:4
作者
Morgenstern, Gal [1 ]
Kim, Jip [2 ]
Anderson, James [3 ]
Zussman, Gil [3 ]
Routtenberg, Tirza [4 ,5 ]
机构
[1] Ben Gurion Univ Negev, Sch Elect & Comp Engn, IL-84105 Beer Sheva, Israel
[2] KENTECH, Naju 58330, South Korea
[3] Columbia Univ, Dept Elect Engn, New York, NY 10027 USA
[4] Bengur Univ Negev, Sch Elect & Comp Engn, IL-84105 Beer Sheva, Israel
[5] Princeton Univ, Dept Elect & Comp Engn, Princeton, NJ 08544 USA
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2024年 / 11卷 / 04期
基金
新加坡国家研究基金会;
关键词
TV; Power systems; Filtering theory; Detectors; Transmission line measurements; Frequency-domain analysis; Image edge detection; False data injection (FDI) attacks; graph signal processing (GSP); power system state estimation (PSSE); protective schemes; sensor networks; IDENTIFICATION; DEFENSE;
D O I
10.1109/TCNS.2024.3371548
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Graph signal processing (GSP) has emerged as a powerful tool for practical network applications, including power system monitoring. Recent research works focused on developing GSP-based methods for state estimation, attack detection, and topology identification using the representation of the power system voltages as smooth graph signals. Within this framework, efficient methods have been developed for detecting false data injection (FDI) attacks, which until now were perceived as nonsmooth with respect to the graph Laplacian matrix. Consequently, these methods may not be effective against smooth FDI attacks. In this article, we propose a graph FDI (GFDI) attack that minimizes the Laplacian-based graph total variation under practical constraints. We present the GFDI attack as the solution for a nonconvex constrained optimization problem. The solution to the GFDI attack problem is obtained through approximating it using & ell;(1) relaxation. A series of quadratic programming problems that are classified as convex optimization problems are solved to obtain the final solution. We then propose a protection scheme that identifies the minimal set of measurements necessary to constrain the GFDI output to a high graph TV, thereby enabling its detection by existing GSP-based detectors. Our numerical simulations on the IEEE-57 and IEEE-118 bus test cases reveal the potential threat posed by well-designed GSP-based FDI attacks. Moreover, we demonstrate that integrating the proposed protection design with GSP-based detection can lead to significant hardware cost savings compared to previous designs of protection methods against FDI attacks.
引用
收藏
页码:1924 / 1936
页数:13
相关论文
共 66 条
  • [1] Abur A., Exposito A.G., Power System State Estimation: Theory and Implementation, (2004)
  • [2] Liu Y., Ning P., Reiter M.K., False data injection attacks against state estimation in electric power grids, ACM Trans. Inf. Syst. Secur., 14, 1, (2011)
  • [3] Liang G., Zhao J., Luo F., Weller S.R., Dong Z.Y., A review of false data injection attacks against modern power systems, IEEE Trans. Smart Grid, 8, 4, pp. 1630-1638, (2017)
  • [4] Xie L., Mo Y., Sinopoli B., Integrity data attacks in power market operations, IEEETrans.SmartGrid, 2, 4, pp. 659-666, (2011)
  • [5] Jia L., Kim J., Thomas R.J., Tong L., Impact of data quality on real-time locational marginal price, IEEE Trans. Power Syst., 29, 2, pp. 627-636, (2014)
  • [6] Kekatos V., Giannakis G.B., Baldick R., Online energy price matrix factorization for power grid topology tracking, IEEE Trans. Smart Grid, 7, 3, pp. 1239-1248, (2016)
  • [7] Kim J., Tong L., Thomas R.J., Subspace methods for data attack on state estimation: A data driven approach, IEEE Trans. Signal Process, 63, 5, pp. 1102-1114, (2015)
  • [8] Kim T.T., Poor H.V., Strategic protection against data injection attacks on power grids, IEEE Trans. Smart Grid, 2, 2, pp. 326-333, (2011)
  • [9] Bi S., Zhang Y.J., Graphical methods for defense against false-data injection attacks on power system state estimation, IEEE Trans. Smart Grid, 5, 3, pp. 1216-1227, (2014)
  • [10] Deng R., Xiao G., Lu R., Defending against false data injection attacks on power system state estimation, IEEE Trans. Ind. Inform., 13, 1, pp. 198-207, (2017)