Measurement-driven blind topology estimation for sparse data injection attack in energy system

被引:5
作者
Anwar, Adnan [1 ]
Mahmood, Abdun Naser [2 ]
Tari, Zahir [3 ]
Kalam, Akhtar [4 ]
机构
[1] Deakin Univ, Sch Informat Technol, Strateg Ctr Cyber Secur Res Inst CSRI, Geelong, Vic 3216, Australia
[2] La Trobe Univ, Sch Engn & Math Sci, Bundoora, Vic 3086, Australia
[3] RMIT Univ, Comp Sci & Software Engn, Melbourne, Vic 3000, Australia
[4] Victoria Univ, Coll Engn & Sci, Footscray, Vic 3011, Australia
基金
澳大利亚研究理事会;
关键词
Topology estimation; FDI attack; Measurement; State estimation; CYBER-PHYSICAL SECURITY; STATE ESTIMATION; SMART; OBSERVABILITY;
D O I
10.1016/j.epsr.2021.107593
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Smart grid cyber-security has come to the forefront of national security priorities due to the emergence of new cyber threats such as the False Data Injection (FDI) attack. This specific type of attack modifies smart grid measurements to produce wrong system states during the state estimation which is a critical operational functionality. While most of the existing works assume that power grid topology or the Jacobian matrix (that represents measurement and state relationship) is known to the attacker, this work shows that an intelligent attacker can construct a data-driven sparse FDI attack which does not require prior knowledge of system Jacobian or grid topology. In this paper, we show how the power grid topology, which is an important information for sparse attack construction, can be revealed using only measurement signals. The blind topology estimation is formulated as a constrained optimisation problem. The alternating direction method of multipliers (ADMM) is then employed with a novel initialization process for solving this complex problem. The comparative evaluation using graph-theoretic measures indicates that the power grid topology can be revealed with very high accuracy using such an approach. For example, average eigenvalue centrality measures and degree centrality measures show that the estimated topology is around 95.82% and 94.99% accurate compared to the actual topology for the IEEE-14 bus system and 86.47% and 96.34%, respectively for IEEE-30 bus system. Finally, based on the estimated topology we determine the critical set of measurements, which are then utilised for sparse attack construction. We show that only 7.40% and 3.57% sensors are required to construct the sparsest stealthy attacks for the IEEE 14 bus and the 30 bus system, respectively. The findings of this research conclude that an intelligent attacker can construct a very sparse 'stealthy' attack, that can degrade the operational performance significantly, by manipulating a few sensor devices only without any prior system knowledge or information.
引用
收藏
页数:11
相关论文
共 34 条
  • [31] Rahman MA, 2012, IEEE GLOB COMM CONF, P3153, DOI 10.1109/GLOCOM.2012.6503599
  • [32] Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid
    Yu, Zong-Han
    Chin, Wen-Long
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (03) : 1219 - 1226
  • [33] MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education
    Zimmerman, Ray Daniel
    Edmundo Murillo-Sanchez, Carlos
    Thomas, Robert John
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2011, 26 (01) : 12 - 19
  • [34] Smart grids cyber-physical security: Parameter correction model against unbalanced false data injection attacks
    Zou, Tierui
    Bretas, Arturo S.
    Ruben, Cody
    Dhulipala, Surya C.
    Bretas, Newton
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2020, 187