Source Authentication of Distribution Synchrophasors for Cybersecurity of Microgrids

被引:8
作者
Cui, Yi [1 ]
Bai, Feifei [1 ]
Yan, Ruifeng [1 ]
Saha, Tapan [1 ]
Ko, Ryan K. L. [1 ]
Liu, Yilu [2 ,3 ]
机构
[1] Univ Queensland, Sch Informat Technol & Elect Engn, Brisbane, Qld 4072, Australia
[2] Univ Tennessee, Dept Elect Engn & Comp Sci, Knoxville, TN 37996 USA
[3] Oak Ridge Natl Lab, Oak Ridge, TN 37831 USA
基金
美国国家科学基金会;
关键词
Authentication; Feature extraction; Testing; Phasor measurement units; Training; Time-frequency analysis; Data mining; Distribution network; cyber-physical security; synchrophasors; source authentication; NETWORK;
D O I
10.1109/TSG.2021.3089041
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This letter proposes a hybrid approach combining Self-Adaptive Mathematical Morphology (SAMM) and Time-Frequency (TF) techniques to authenticate the source information of Distribution Synchrophasors (DS) within near-range locations. The SAMM can adaptively regulate the synchrophasors variations which are representatives of local environmental characteristics. Subsequently, TF mapping is employed to extract informative signatures from the regulated synchrophasors variation. Finally, Random Forest Classification (RFC) is used to correlate the extracted signatures with the source information based on the derived TF mapping. Experiment results using DS collected at multiple small geographical scales validated the proposed methodology.
引用
收藏
页码:4577 / 4580
页数:4
相关论文
共 15 条
[1]   Spatio-Temporal Characterization of Synchrophasor Data Against Spoofing Attacks in Smart Grids [J].
Cui, Yi ;
Bai, Feifei ;
Liu, Yilu ;
Fuhr, Peter L. ;
Morales-Rodriguez, Marissa E. .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (05) :5807-5818
[2]   A Measurement Source Authentication Methodology for Power System Cyber Security Enhancement [J].
Cui, Yi ;
Bai, Feifei ;
Liu, Yong ;
Liu, Yilu .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) :3914-3916
[3]   Faults diagnosis of rolling element bearings based on modified morphological method [J].
Dong, Yabin ;
Liao, Mingfu ;
Zhang, Xiaolong ;
Wang, Fazhan .
MECHANICAL SYSTEMS AND SIGNAL PROCESSING, 2011, 25 (04) :1276-1286
[4]   Resilient Distributed DC Optimal Power Flow Against Data Integrity Attack [J].
Duan, Jie ;
Zeng, Wente ;
Chow, Mo-Yuen .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) :3543-3552
[5]   Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid [J].
Esmalifalak, Mohammad ;
Liu, Lanchao ;
Nguyen, Nam ;
Zheng, Rong ;
Han, Zhu .
IEEE SYSTEMS JOURNAL, 2017, 11 (03) :1644-1652
[6]  
Garg R, 2013, INT CONF ACOUST SPEE, P2862, DOI 10.1109/ICASSP.2013.6638180
[7]   Risk-Based Mitigation of Load Curtailment Cyber Attack Using Intelligent Agents in a Shipboard Power System [J].
Kushal, Tazim Ridwan Billah ;
Lai, Kexing ;
Illindala, Mahesh S. .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (05) :4741-4750
[8]   Detecting False Data Injection Attacks Against Power System State Estimation With Fast Go-Decomposition Approach [J].
Li, Boda ;
Ding, Tao ;
Huang, Can ;
Zhao, Junbo ;
Yang, Yongheng ;
Chen, Ying .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (05) :2892-2904
[9]   Model-Free Data Authentication for Cyber Security in Power Systems [J].
Liu, Shengyuan ;
You, Shutang ;
Yin, He ;
Lin, Zhenzhi ;
Liu, Yilu ;
Yao, Wenxuan ;
Sundaresh, Lakshmi .
IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (05) :4565-4568
[10]   A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids [J].
Musleh, Ahmed S. ;
Chen, Guo ;
Dong, Zhao Yang .
IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (03) :2218-2234