Measurement-driven blind topology estimation for sparse data injection attack in energy system

被引:5
作者
Anwar, Adnan [1 ]
Mahmood, Abdun Naser [2 ]
Tari, Zahir [3 ]
Kalam, Akhtar [4 ]
机构
[1] Deakin Univ, Sch Informat Technol, Strateg Ctr Cyber Secur Res Inst CSRI, Geelong, Vic 3216, Australia
[2] La Trobe Univ, Sch Engn & Math Sci, Bundoora, Vic 3086, Australia
[3] RMIT Univ, Comp Sci & Software Engn, Melbourne, Vic 3000, Australia
[4] Victoria Univ, Coll Engn & Sci, Footscray, Vic 3011, Australia
基金
澳大利亚研究理事会;
关键词
Topology estimation; FDI attack; Measurement; State estimation; CYBER-PHYSICAL SECURITY; STATE ESTIMATION; SMART; OBSERVABILITY;
D O I
10.1016/j.epsr.2021.107593
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Smart grid cyber-security has come to the forefront of national security priorities due to the emergence of new cyber threats such as the False Data Injection (FDI) attack. This specific type of attack modifies smart grid measurements to produce wrong system states during the state estimation which is a critical operational functionality. While most of the existing works assume that power grid topology or the Jacobian matrix (that represents measurement and state relationship) is known to the attacker, this work shows that an intelligent attacker can construct a data-driven sparse FDI attack which does not require prior knowledge of system Jacobian or grid topology. In this paper, we show how the power grid topology, which is an important information for sparse attack construction, can be revealed using only measurement signals. The blind topology estimation is formulated as a constrained optimisation problem. The alternating direction method of multipliers (ADMM) is then employed with a novel initialization process for solving this complex problem. The comparative evaluation using graph-theoretic measures indicates that the power grid topology can be revealed with very high accuracy using such an approach. For example, average eigenvalue centrality measures and degree centrality measures show that the estimated topology is around 95.82% and 94.99% accurate compared to the actual topology for the IEEE-14 bus system and 86.47% and 96.34%, respectively for IEEE-30 bus system. Finally, based on the estimated topology we determine the critical set of measurements, which are then utilised for sparse attack construction. We show that only 7.40% and 3.57% sensors are required to construct the sparsest stealthy attacks for the IEEE 14 bus and the 30 bus system, respectively. The findings of this research conclude that an intelligent attacker can construct a very sparse 'stealthy' attack, that can degrade the operational performance significantly, by manipulating a few sensor devices only without any prior system knowledge or information.
引用
收藏
页数:11
相关论文
共 34 条
  • [1] Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest
    Ahmed, Saeed
    Lee, YoungDoo
    Hyun, Seung-Ho
    Koo, Insoo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (10) : 2765 - 2777
  • [2] Complementarity reformulations for false data injection attacks on PMU-only state estimation
    Alexopoulos, Theodoros A.
    Korres, George N.
    Manousakis, Nikolaos M.
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2020, 189
  • [3] Anwar Adnan, 2016, 2016 IEEE International Conference on Smart Grid Communications (SmartGridComm), P539, DOI 10.1109/SmartGridComm.2016.7778817
  • [4] Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements
    Anwar, Adnan
    Mahmood, Abdun Naser
    Pickering, Mark
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 83 (01) : 58 - 72
  • [5] Anomaly detection in electric network database of smart grid: Graph matching approach
    Anwar, Adnan
    Mahmood, Abdun Naser
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2016, 133 : 51 - 62
  • [6] Anwar A, 2014, GREEN ENERGY TECHNOL, P411, DOI 10.1007/978-981-4585-27-9_17
  • [7] Extended Topological Metrics for the Analysis of Power Grid Vulnerability
    Bompard, Ettore
    Pons, Enrico
    Wu, Di
    [J]. IEEE SYSTEMS JOURNAL, 2012, 6 (03): : 481 - 487
  • [8] Overview of metrics and their correlation patterns for multiple- metric topology analysis on heterogeneous graph ensembles
    Bounova, Gergana
    de Weck, Olivier
    [J]. PHYSICAL REVIEW E, 2012, 85 (01)
  • [9] Distributed optimization and statistical learning via the alternating direction method of multipliers
    Boyd S.
    Parikh N.
    Chu E.
    Peleato B.
    Eckstein J.
    [J]. Foundations and Trends in Machine Learning, 2010, 3 (01): : 1 - 122
  • [10] Smart grids cyber-physical security as a malicious data attack: An innovation approach
    Bretas, Arturo S.
    Bretas, Newton G.
    Carvalho, Breno
    Baeyens, Enrique
    Khargonekar, Pramod P.
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2017, 149 : 210 - 219