Set-theoretic detection of data corruption attacks on cyber physical power systems

被引:18
作者
Kontouras, Efstathios [1 ]
Tzes, Anthony [2 ]
Dritsas, Leonidas [3 ]
机构
[1] Univ Patras, Elect & Comp Engn Dept, Rion 26500, Greece
[2] New York Univ Abu Dhabi, Elect & Comp Engn Program, POB 129188, Abu Dhabi, U Arab Emirates
[3] ASPETE, Sch Pedag & Technol Educ, Dept Elect & Elect Engn Educators, Athens 14121, Greece
关键词
Power systems; Load frequency control; Cyber-attacks; Set-theoretic methods;
D O I
10.1007/s40565-018-0452-y
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control areas forming a power grid. Based on the overall discrete-time network dynamics, a convex and compact polyhedral robust invariant set is extracted and is used as a set-induced anomaly detector. If the state vector exits the invariant set, then an alarm will be activated, and the potential threat is considered disclosed. The attack scenario used to assess the efficiency of the proposed anomaly detector concerns corrupted frequency sensor measurements transmitted to the automatic generation control unit of a compromised control area. Simulation studies highlight the ability of a set-theoretic approach to disclose persistent and intermittent attack patterns even when they occur at the same time with changes in the power load demand.
引用
收藏
页码:872 / 886
页数:15
相关论文
共 28 条
  • [1] Akkaya I, 2015, POWER SYST, P1, DOI 10.1007/978-3-662-45928-7_1
  • [2] Causes of the 2003 major grid blackouts in north America and Europe, and recommended means to improve System Dynamic Performance
    Andersson, G
    Donalek, P
    Farmer, R
    Hatziargyriou, N
    Kamwa, I
    Kundur, P
    Martins, N
    Paserba, J
    Pourbeik, P
    Sanchez-Gasca, J
    Schulz, R
    Stankovic, A
    Taylor, C
    Vittal, V
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2005, 20 (04) : 1922 - 1928
  • [3] Set invariance in control
    Blanchini, F
    [J]. AUTOMATICA, 1999, 35 (11) : 1747 - 1767
  • [4] Blanchini F, 2008, SYST CONTROL-FOUND A, P1
  • [5] Jamming aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation
    Deka, Deepjyoti
    Baldick, Ross
    Vishwanath, Sriram
    [J]. PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2556 - U1000
  • [6] OPTIMUM MEGAWATT-FREQUENCY CONTROL OF MULTIAREA ELECTRIC ENERGY SYSTEMS
    ELGERD, OI
    FOSHA, CE
    [J]. IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1970, PA89 (04): : 556 - &
  • [7] Elgerd OI., 1982, ELECT ENERGY SYSTEMS
  • [8] Esfahani PM, 2010, IEEE DECIS CONTR P, P5973, DOI 10.1109/CDC.2010.5717285
  • [9] Esfahani PM, 2010, P AMER CONTR CONF, P962
  • [10] Franzè G, 2016, IEEE DECIS CONTR P, P5128, DOI 10.1109/CDC.2016.7799053