Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid

被引:236
作者
Yu, Zong-Han [1 ]
Chin, Wen-Long [1 ]
机构
[1] Natl Cheng Kung Univ, Tainan 701, Taiwan
关键词
Bad data detection (BDD); blind and stealthy attack; Jacobian matrix; principal component analysis (PCA); smart power grid; state estimation; SYSTEM STATE ESTIMATION; INFORMATION; SECURITY;
D O I
10.1109/TSG.2014.2382714
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Accurate state estimation is of paramount importance to maintain normal operations of smart power grids. However, recent research shows that carefully produced attacks with the knowledge of the grid topology, i.e., Jacobian matrix, can bypass the bad data detection (BDD) system. The BDD is used to ensure the integrity of state estimation to filter faulty measurements introduced by device malfunctions or malicious attacks. However, to construct the false data injection attack vectors, a common assumption in most prior works on false data injection attacks is that the attacker has complete knowledge about the power grid topology and transmission-line admittances. By contrast, this paper studies the general problem of blind false data injection attacks using the principal component analysis approximation method without the knowledge of Jacobian matrix and the assumption regarding the distribution of state variables. The proposed attack is proven to be approximately stealthy.(1) The performance of the proposed attack is analyzed. Simulations confirm the performance of the proposed method.
引用
收藏
页码:1219 / 1226
页数:8
相关论文
共 33 条
[1]  
[Anonymous], 2013, Power generation, operation, and control
[2]  
[Anonymous], PRINCIPLE COMPONENT
[3]  
[Anonymous], CHINESE J MED CHEM
[4]   Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation [J].
Bi, Suzhi ;
Zhang, Ying Jun .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (07) :1471-1485
[5]  
Bi SZ, 2011, IEEE GLOBE WORK, P1162, DOI 10.1109/GLOCOMW.2011.6162362
[6]  
Bobba R. B., 2010, WORKSHOP SECURE CONT, P1
[7]   REAL-TIME MODELING OF POWER NETWORKS [J].
BOSE, A ;
CLEMENTS, KA .
PROCEEDINGS OF THE IEEE, 1987, 75 (12) :1607-1622
[8]  
Casazza J., 2010, UNDERSTANDING ELECT, V2nd
[9]  
Castillo Enrique., 1988, EXTREME VALUE THEORY
[10]   Coordinated Data-Injection Attack and Detection in the Smart Grid [J].
Cui, Shuguang ;
Han, Zhu ;
Kar, Soummya ;
Kim, Tung T. ;
Poor, H. Vincent ;
Tajer, Ali .
IEEE SIGNAL PROCESSING MAGAZINE, 2012, 29 (05) :106-115