Mitigating False Data Attacks Induced Overloads Using a Corrective Dispatch Scheme

被引:57
作者
Che, Liang [1 ]
Liu, Xuan [2 ]
Li, Zuyi [3 ]
机构
[1] Hunan Univ, Dept Elect & Informat Engn, Changsha 410000, Hunan, Peoples R China
[2] Hunan Univ, Coll Elect & Informat Engn, Changsha 410082, Hunan, Peoples R China
[3] IIT, Elect & Comp Engn, Chicago, IL 60616 USA
基金
中国国家自然科学基金;
关键词
Benders cuts; cyber-security; false data injection attacks; corrective action; power system operations; DATA INJECTION ATTACKS; STATE ESTIMATION; SECURITY; VULNERABILITY;
D O I
10.1109/TSG.2018.2817515
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The malicious data attacks may evade the detection and impose operational impacts. One major impact is the transmission line overloads being intentionally triggered by a judiciously designed false data injection attack. Such overloads can cause physical damages to components or even initiate cascading failures with severe consequences. Thus, it is necessary to establish a mechanism for mitigating the physical overloads due to potential attacks. So, in this paper, we propose a cyber-secured corrective dispatch scheme which can secure the flow levels, i.e., mitigate the physical overloads, against those potential data attacks. The scheme integrates a corrective action for dispatching generators. We propose a solution method which can find the global optimum by adding a finite number of Benders like cuts. We also prove that the Lagrange multipliers can be set as binary variables without changing the optimal solution. The simulations on the IEEE 118-bus system verify the proposed scheme and pave the way for investigating relevant defensive strategies.
引用
收藏
页码:3081 / 3091
页数:11
相关论文
共 31 条
[1]   Impacts of Wind Power Uncertainty on Grid Vulnerability to Cascading Overload Failures [J].
Athari, Mir Hadi ;
Wang, Zhifang .
IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, 2018, 9 (01) :128-137
[2]   Cyber-Physical Security: A Game Theory Model of Humans Interacting Over Control Systems [J].
Backhaus, Scott ;
Bent, Russell ;
Bono, James ;
Lee, Ritchie ;
Tracey, Brendan ;
Wolpert, David ;
Xie, Dongping ;
Yildiz, Yildiray .
IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (04) :2320-2327
[3]  
Capitanescu F., 2002, P 14 PSCC C SEV SPAI
[4]   Screening Hidden N-k Line Contingencies in Smart Grids Using a Multi-Stage Model [J].
Che, Liang ;
Liu, Xuan ;
Li, Zuyi .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (02) :1280-1289
[5]   A Mixed Integer Programming Model for Evaluating the Hidden Probabilities of N-k Line Contingencies in Smart Grids [J].
Che, Liang ;
Liu, Xuan ;
Wen, Yunfeng ;
Li, Zuyi .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (01) :1036-1045
[6]  
DAI Y, 2001, IEEE POWER ENG REV, V21, P59
[7]   A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems [J].
Farraj, Abdallah ;
Hammad, Eman ;
Al Daoud, Ashraf ;
Kundur, Deepa .
IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (04) :1846-1855
[8]   AC contingency dispatch based on security-constrained unit commitment [J].
Fu, Y ;
Shahidehpour, M ;
Li, ZY .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2006, 21 (02) :897-908
[9]  
Greenberg A., 2017, POWER GRID HACKS WOR
[10]   Integrated Anomaly Detection for Cyber Security of the Substations [J].
Hong, Junho ;
Liu, Chen-Ching ;
Govindarasu, Manimaran .
IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (04) :1643-1653