Tensor-Completion-Enabled Stealthy False Data Injection Attacks on IoT-Based Smart Grid

被引:4
作者
Liu, Bo [1 ]
Liu, Yajing [2 ]
Wu, Hongyu [3 ]
机构
[1] Washington State Univ Tri Cities, Sch Engn & Appl Sci, Richland, WA 99354 USA
[2] Colorado State Univ, Dept Math, Ft Collins, CO 80523 USA
[3] Kansas State Univ, Mike Wiegers Dept Elect & Comp Engn, Manhattan, KS 66502 USA
基金
美国国家科学基金会;
关键词
False data injection (FDI); machine learning (ML); reactance perturbation strategy (RPS); state estimation (SE); tensor completion (TC); MOVING TARGET DEFENSE; STATE ESTIMATION; STABILITY;
D O I
10.1109/JIOT.2024.3416839
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
False data injection (FDI) attacks against power system state estimation through manipulating measurements can result in economic losses and grid operating security issues. FDI attacks are stealthy to the traditional bad data detector. However, existing FDI construction methods fail to consider the stealthiness of attacks against machine-learning (ML) detectors. Since the historical measurement patterns are generally utilized by ML detectors, we apply the tensor completion (TC) technique in the FDI construction to manipulate compromised measurements matching the historical measurement patterns. We propose a novel convex TC-based FDI (TC-FDI) attack algorithm that 1) minimizes the nuclear norm of the compromised measurement tensor to make the compromised measurements consistent with the historical ones and 2) maximizes the L1-norm of the incremental voltage to ensure a sufficient negative impact on the power system operation. Further, the reactance perturbation strategy (RPS) is utilized to detect the TC-FDI attacks by breaking the spatial and temporal correlation of the compromised measurements. Numerical results on the IEEE 14-bus system show the stealthiness of the proposed attacks to the statistic-based detectors and ML detectors. The efficacy of the RPS in detecting TC-FDI attacks is also demonstrated.
引用
收藏
页码:36660 / 36672
页数:13
相关论文
共 36 条
[1]  
Diamond S, 2016, J MACH LEARN RES, V17
[2]   High-Stealth False Data Attacks on Overloading Multiple Lines in Power Systems [J].
Du, Min ;
Wang, Lianhong ;
Zhou, Yicong .
IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (02) :1321-1324
[3]  
Electric Reliability Council of Texas, about us
[4]   Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid [J].
Esmalifalak, Mohammad ;
Liu, Lanchao ;
Nguyen, Nam ;
Zheng, Rong ;
Han, Zhu .
IEEE SYSTEMS JOURNAL, 2017, 11 (03) :1644-1652
[5]   ROBUST LOW-RANK TENSOR RECOVERY: MODELS AND ALGORITHMS [J].
Goldfarb, Donald ;
Qin, Zhiwei .
SIAM JOURNAL ON MATRIX ANALYSIS AND APPLICATIONS, 2014, 35 (01) :225-253
[6]   Graph implementations for nonsmooth convex programs [J].
Grant, Michael C. ;
Boyd, Stephen P. .
Lecture Notes in Control and Information Sciences, 2008, 371 :95-110
[7]   Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks [J].
Hug, Gabriela ;
Giampapa, Joseph Andrew .
IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (03) :1362-1370
[8]  
Khamesi Victor, 2022, Zenodo, DOI 10.5281/ZENODO.7632721
[9]  
Khan R, 2016, IEEE POW ENER SOC GE
[10]   Data-Driven False Data Injection Attacks Against Power Grids: A Random Matrix Approach [J].
Lakshminarayana, Subhash ;
Kammoun, Abla ;
Debbah, Merouane ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (01) :635-646