Cyber-Attacks in PMU-Based Power Network and Countermeasures

被引:25
作者
Tu, Chunming [1 ,2 ]
He, Xi [1 ,2 ]
Liu, Xuan [1 ,2 ]
Li, Peng [3 ]
机构
[1] Natl Elect Power Convers & Control Engn Technol R, Changsha 410082, Hunan, Peoples R China
[2] Hunan Univ, Dept Elect & Informat Engn, Changsha 410006, Hunan, Peoples R China
[3] China Southern Power Grid, Elect Power Res Inst, Guangzhou 510663, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber-attack; cognitive radio network (CRN); independent component analysis (ICA); smart gird (SG); synchrophasor measurement unit (PMU); STATE ESTIMATION;
D O I
10.1109/ACCESS.2018.2878436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of cyber-physical power grid is to use metering, communication, and control to make an intelligent and autonomous power system. Therefore, the smart meters form the basis of the cyber-physical system. Recentlyan increasing number of synchrophasor measurement units (PMU) and micro synchrophasor measurement units (mu PMU) have been deployed in transmission grids and distribution networks, respectively. Because of the importance of these data, it is imperative to guarantee its integrity and authenticity. In this paper, the measurement structure and data format of the synchrophasor data are analyzed, which reveals the vulnerability of PMU data to cyber-attacks. Then the signal separation method, i.e., independent component analysis algorithm, and its behavior are investigated, which reveals the mechanism of the PMU data attacks. Further, a cognitive radio (CR) based secure network architecture is propose as a countermeasure. With the stochastic but confined choice of the bandwidth and an unfixed number of Splepian tapers, the proposed architecture makes the data stream much harder to intercept by dynamically exploiting the unused PU band. The effectiveness of the proposed network is validated by the simulation results.
引用
收藏
页码:65594 / 65603
页数:10
相关论文
共 28 条
[1]  
Aman M.N., 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference, P1
[2]  
[Anonymous], 2011, C371182 IEEE
[3]  
Chen K.-C., 2008, ICUIMC 08, P114, DOI DOI 10.1145/1352793.1352817
[4]  
Cover TM., 1991, ELEMENTS INFORM THEO, V1, P279
[5]   Independent component analysis:: algorithms and applications [J].
Hyvärinen, A ;
Oja, E .
NEURAL NETWORKS, 2000, 13 (4-5) :411-430
[6]  
Jiang F., IEEE T IND ELECTRON, DOI [10.1109/TIE.2018.2868254A, DOI 10.1109/TIE.2018.2868254A]
[7]  
Kersting W, 2001, 2001 IEEE POWER ENGINEERING SOCIETY WINTER MEETING, CONFERENCE PROCEEDINGS, VOLS 1-3, P908, DOI 10.1109/PESW.2001.916993
[8]   Cognitive Radio for Smart Grids: Survey of Architectures, Spectrum Sensing Mechanisms, and Networking Protocols [J].
Khan, Athar Ali ;
Rehmani, Mubashir Husain ;
Reisslein, Martin .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (01) :860-898
[9]   Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [J].
Kim, Jinsub ;
Tong, Lang ;
Thomas, Robert J. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (05) :1102-1114
[10]  
Li W., 2017, IEEE ACCESS, V6, P4006