Robust Mitigation Strategy Against Dummy Data Attacks in Power Systems

被引:9
作者
Du, Min [1 ]
Liu, Xuan [1 ]
Li, Zuyi [2 ]
Lin, Hai [3 ]
机构
[1] Hunan Univ, Coll Elect & Informat Engn, Changsha 410082, Peoples R China
[2] IIT, Elect & Comp Engn Dept, Chicago, IL 60616 USA
[3] State Grid Hunan Elect Power Co Ltd, Informat & Commun Dept, Changsha 410004, Peoples R China
基金
中国国家自然科学基金;
关键词
Line overloads; false data; dummy data attacks; cyber security; power systems; DATA INJECTION ATTACK;
D O I
10.1109/TSG.2022.3225469
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An intelligent attacker can carefully design stealthy false data by hiding them among normal ones to escape detection. Such attacks are referred to as dummy data attacks (DDAs), whose stealth is further improved in this paper, which can induce line overloads and even cascading failures in a power system. Thus, in this paper, we propose a robust mitigation strategy model to mitigate DDAs risk by preventing the attacker from constructing high-stealth attack scenarios. The robust mitigation strategy secures line flow levels and trades off the economy and the security of power systems. A novel decomposition algorithm is developed to solve the proposed model which can guarantee the solution optimality in a finite number of iterations. Simulation results on the IEEE 118-bus and Chinese 132-bus systems demonstrate the effectiveness of the proposed approach.
引用
收藏
页码:3102 / 3113
页数:12
相关论文
共 39 条
[1]  
[Anonymous], 2017, IRISH INDEPENDEN AUG
[2]   Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids Using Graph Neural Networks [J].
Boyaci, Osman ;
Narimani, Mohammad Rasoul ;
Davis, Katherine R. ;
Ismail, Muhammad ;
Overbye, Thomas J. ;
Serpedin, Erchin .
IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (01) :807-819
[3]   LOF: Identifying density-based local outliers [J].
Breunig, MM ;
Kriegel, HP ;
Ng, RT ;
Sander, J .
SIGMOD RECORD, 2000, 29 (02) :93-104
[4]   Revealing Impacts of Cyber Attacks on Power Grids Vulnerability to Cascading Failures [J].
Che, Liang ;
Liu, Xuan ;
Ding, Tao ;
Li, Zuyi .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2019, 66 (06) :1058-1062
[5]   Mitigating False Data Attacks Induced Overloads Using a Corrective Dispatch Scheme [J].
Che, Liang ;
Liu, Xuan ;
Li, Zuyi .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (03) :3081-3091
[6]   A Covert Electricity-Theft Cyberattack Against Machine Learning-Based Detection Models [J].
Cui, Lei ;
Guo, Lei ;
Gao, Longxiang ;
Cai, Borui ;
Qu, Youyang ;
Zhou, Yipeng ;
Yu, Shui .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (11) :7824-7833
[7]   A Data-Driven Stochastic Reactive Power Optimization Considering Uncertainties in Active Distribution Networks and Decomposition Method [J].
Ding, Tao ;
Yang, Qingrun ;
Yang, Yongheng ;
Li, Cheng ;
Bie, Zhaohong ;
Blaabjerg, Frede .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (05) :4994-5004
[8]   High-Stealth False Data Attacks on Overloading Multiple Lines in Power Systems [J].
Du, Min ;
Wang, Lianhong ;
Zhou, Yicong .
IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (02) :1321-1324
[9]   Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid [J].
Esmalifalak, Mohammad ;
Liu, Lanchao ;
Nguyen, Nam ;
Zheng, Rong ;
Han, Zhu .
IEEE SYSTEMS JOURNAL, 2017, 11 (03) :1644-1652
[10]   Outlier detection in the multiple cluster setting using the minimum covariance determinant estimator [J].
Hardin, J ;
Rocke, DM .
COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2004, 44 (04) :625-638