Detection of False-Data Injection Attacks in Cyber-Physical DC Microgrids

被引:228
作者
Beg, Omar Ali [1 ]
Johnson, Taylor T. [2 ]
Davoudi, Ali [1 ]
机构
[1] Univ Texas Arlington, Arlington, TX 76019 USA
[2] Vanderbilt Univ, Nashville, TN 37240 USA
基金
美国国家科学基金会;
关键词
Cyber-physical systems (CPS); dc microgrid; distributed control; false-data injection attack (FDIA); hybrid automaton; STATE ESTIMATION; SYSTEM;
D O I
10.1109/TII.2017.2656905
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Power electronics-intensive dc microgrids use increasingly complex software-based controllers and communication networks. They are evolving into cyber-physical systems (CPS) with sophisticated interactions between physical and computational processes, making them vulnerable to cyber attacks. This paper presents a framework to detect possible false-data injection attacks (FDIAs) in cyber-physical dc microgrids. The detection problem is formalized as identifying a change in sets of inferred candidate invariants. Invariants are microgrids properties that do not change over time. Both the physical plant and the software controller of CPS can be described as Simulink/Stateflow (SLSF) diagrams. The dynamic analysis infers the candidate invariants over the input/output variables of SLSF components. The reachability analysis generates the sets of reachable states (reach sets) for the CPS modeled as hybrid automata. The candidate invariants that contain the reach sets are called the actual invariants. The candidate invariants are then compared with the actual invariants, and any mismatch indicates the presence of FDIA. To evaluate the proposed methodology, the hybrid automaton of a dc microgrid, with a distributed cooperative control scheme, is presented. The reachability analysis is performed to obtain the reach sets and, hence, the actual invariants. Moreover, a prototype tool, HYbrid iNvariant GEneratoR, is extended to instrument SLSF models, obtain candidate invariants, and identify FDIA.
引用
收藏
页码:2693 / 2703
页数:11
相关论文
共 39 条
[1]  
Bobba R. B., 2010, 1 WORKSH SEC CONTR S, P1
[2]   DC Microgrids-Part II: A Review of Power Architectures, Applications, and Standardization Issues [J].
Dragicevic, Tomislav ;
Lu, Xiaonan ;
Vasquez, Juan C. ;
Guerrero, Josep M. .
IEEE TRANSACTIONS ON POWER ELECTRONICS, 2016, 31 (05) :3528-3549
[3]   DC Microgrids-Part I: A Review of Control Strategies and Stabilization Techniques [J].
Dragicevic, Tomislav ;
Lu, Xiaonan ;
Vasquez, Juan C. ;
Guerrero, Josep M. .
IEEE TRANSACTIONS ON POWER ELECTRONICS, 2016, 31 (07) :4876-4891
[4]   Dynamically discovering likely program invariants to support program evolution [J].
Ernst, MD ;
Cockrell, J ;
Griswold, WG ;
Notkin, D .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2001, 27 (02) :99-123
[5]   The Daikon system for dynamic detection of likely invariants [J].
Ernst, Michael D. ;
Perkins, Jeff H. ;
Guo, Philip J. ;
McCarnant, Stephen ;
Pacheco, Carlos ;
Tschantz, Matthew S. ;
Xiao, Chen .
SCIENCE OF COMPUTER PROGRAMMING, 2007, 69 (1-3) :35-45
[6]  
Esmalifalak M., IEEE SYST J IN PRESS
[7]  
Frehse G., 2011, LNCS, V6806, P379, DOI DOI 10.1007/978-3-642-22110-1
[8]   Detecting False Data Injection Attacks in AC State Estimation [J].
Gu Chaojun ;
Jirutitijaroen, Panida ;
Motani, Mehul .
IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (05) :2476-2483
[9]   The theory of hybrid automata [J].
Henzinger, TA .
11TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 1996, :278-292
[10]   Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks [J].
Hug, Gabriela ;
Giampapa, Joseph Andrew .
IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (03) :1362-1370