Security Analysis for Dynamic State Estimation of Power Systems With Measurement Delays

被引:21
作者
Cheng, Zhijian [1 ]
Ren, Hongru [2 ,3 ]
Qin, Jiahu [1 ,4 ]
Lu, Renquan [2 ,3 ]
机构
[1] Univ Sci & Technol China, Dept Automat, Hefei 230027, Peoples R China
[2] Guangdong Univ Technol, Sch Automat, Guangzhou 510006, Peoples R China
[3] Guangdong Univ Technol, Guangdong Prov Key Lab Intelligent Decis & Cooper, Guangzhou 510006, Peoples R China
[4] Hefei Comprehens Natl Sci Ctr, Inst Artificial Intelligence, Hefei 230088, Peoples R China
基金
中国国家自然科学基金;
关键词
Phasor measurement units; Power measurement; Delays; Power system dynamics; Voltage measurement; State estimation; Power system stability; Attack detection method; delayed measurements; false data-injection (FDI) attack; Kalman filter (KF); state estimation; FALSE DATA-INJECTION; ATTACKS; PMUS;
D O I
10.1109/TCYB.2021.3108884
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article is centered on the cybersecurity research of dynamic state estimation for power systems with measurement delays. Relying on mixed measurements from phasor measurement units (PMUs) and remote terminal units (RTUs), a delayed measurement model is constructed. A modified state estimator based on the Kalman filter (KF) is designed, which can obtain the optimal estimated states under measurement delays. Moreover, the measurement data transmitted from the sensor to the estimator are vulnerable to cyberattacks. Especially, false data-injection (FDI) attacks are frequently encountered in the power system state estimation (PSSE) process. In the case of measurement delays, an FDI attack strategy is designed to interfere with the state estimator and evade detection by the chi-square detector. By utilizing the attacked estimated information and the uncorrupted measurement information, two measurement residual vectors are designed. According to these two residual vectors, a chi-square-based attack detection method is proposed, which has the ability to detect the attack without being affected by the delayed measurements. The proposed KF algorithm and attack detection method are implemented on an IEEE 14-bus system and they are confirmed to be effective and feasible.
引用
收藏
页码:2087 / 2096
页数:10
相关论文
共 47 条
[1]  
Abur A., 2004, Power System State Estimation: Theory and Implementation
[2]   A CHI-SQUARE TEST FOR FAULT-DETECTION IN KALMAN FILTERS [J].
BRUMBACK, BD ;
SRINATH, MD .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1987, 32 (06) :552-554
[3]   A New Estimation Algorithm from Measurements with Multiple-Step Random Delays and Packet Dropouts [J].
Caballero-Aguila, R. ;
Hermoso-Carazo, A. ;
Linares-Perez, J. .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2010, 2010
[4]   Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks [J].
Chen, Bo ;
Ho, Daniel W. C. ;
Hu, Guoqiang ;
Yu, Li .
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (06) :1862-1876
[5]   Placement of PMUs to enable bad data detection in state estimation [J].
Chen, Jian ;
Abur, Ali .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2006, 21 (04) :1608-1615
[6]   A novel online detection method of data injection attack against dynamic state estimation in smart grid [J].
Chen, Rui ;
Li, Xue ;
Zhong, Huixin ;
Fei, Minrui .
NEUROCOMPUTING, 2019, 344 :73-81
[7]   Distributed Kalman Filter for Large-Scale Power Systems With State Inequality Constraints [J].
Cheng, Zhijian ;
Ren, Hongru ;
Zhang, Bin ;
Lu, Renquan .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2021, 68 (07) :6238-6247
[8]   Coordinated Data-Injection Attack and Detection in the Smart Grid [J].
Cui, Shuguang ;
Han, Zhu ;
Kar, Soummya ;
Kim, Tung T. ;
Poor, H. Vincent ;
Tajer, Ali .
IEEE SIGNAL PROCESSING MAGAZINE, 2012, 29 (05) :106-115
[9]   False Data Injection on State Estimation in Power Systems-Attacks, Impacts, and Defense: A Survey [J].
Deng, Ruilong ;
Xiao, Gaoxi ;
Lu, Rongxing ;
Liang, Hao ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (02) :411-423
[10]   Defending Against False Data Injection Attacks on Power System State Estimation [J].
Deng, Ruilong ;
Xiao, Gaoxi ;
Lu, Rongxing .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (01) :198-207