Set-theoretic detection of data corruption attacks on cyber physical power systems

被引:0
作者
Efstathios KONTOURAS [1 ]
Anthony TZES [2 ]
Leonidas DRITSAS [3 ]
机构
[1] Electrical and Computer Engineering Department, University of Patras
[2] Electrical and Computer Engineering Program, New York University Abu Dhabi
[3] Department of Electrical and Electronic Engineering Educators, School of Pedagogical and Technological Education,ASPETE, Athens, Greece
关键词
Power systems; Load frequency control; Cyber-attacks; Set-theoretic methods;
D O I
暂无
中图分类号
TM76 [电力系统的自动化];
学科分类号
080802 ;
摘要
This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control areas forming a power grid. Based on the overall discrete-time network dynamics, a convex and compact polyhedral robust invariant set is extracted and is used as a set-induced anomaly detector. If the state vector exits the invariant set,then an alarm will be activated, and the potential threat is considered disclosed. The attack scenario used to assess the efficiency of the proposed anomaly detector concerns corrupted frequency sensor measurements transmitted to the automatic generation control unit of a compromised control area. Simulation studies highlight the ability of a set-theoretic approach to disclose persistent and intermittent attack patterns even when they occur at the same time with changes in the power load demand.
引用
收藏
页码:872 / 886
页数:15
相关论文
共 8 条
[1]  
A review of wireless communications for smart grid[J] . Anzar Mahmood,Nadeem Javaid,Sohail Razzaq. Renewable and Sustainable Energy Reviews . 2015
[2]   Attack Detection and Identification in Cyber-Physical Systems [J].
Pasqualetti, Fabio ;
Doerfler, Florian ;
Bullo, Francesco .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2013, 58 (11) :2715-2729
[3]   Cascade-based attack vulnerability on the US power grid [J].
Wang, Jian-Wei ;
Rong, Li-Li .
SAFETY SCIENCE, 2009, 47 (10) :1332-1336
[4]  
Causes of the 2003 Major Grid Blackouts in North America and Europe, and Recommended Means to Improve System Dynamic Performance[J] . G. Andersson,P. Donalek,R. Farmer,N. Hatziargyriou,I. Kamwa,P. Kundur,N. Martins,J. Paserba,P. Pourbeik,J. Sanchez-Gasca,R. Schulz,A. Stankovic,C. Taylor,V. Vittal. IEEE Transactions on Power Systems: A Publication of the Power Engineering Society . 2005 (4)
[5]   Set invariance in control [J].
Blanchini, F .
AUTOMATICA, 1999, 35 (11) :1747-1767
[6]  
Theory and computation of disturbance invariant sets for discrete-time linear systems[J] . Ilya Kolmanovsky,Elmer G. Gilbert. Mathematical Problems in Engineering . 1997 (4)
[7]   DISCRETE-TIME REFERENCE GOVERNORS AND THE NONLINEAR CONTROL OF SYSTEMS WITH STATE AND CONTROL CONSTRAINTS [J].
GILBERT, EG ;
KOLMANOVSKY, I ;
TAN, KT .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 1995, 5 (05) :487-504
[8]  
Cyber attack in a two-area powersystem: impact identification using reachability .2 Esfahani P,Vrakopoulou M,Margellos K,et al. American ControlConference (ACC) . 2010