Low Latency Detection of Sparse False Data Injections in Smart Grids

被引:12
作者
Akingeneye, Israel [1 ]
Wu, Jingxian [2 ]
机构
[1] Intel Corp, San Diego, CA 92131 USA
[2] Univ Arkansas, Dept Elect Engn, Fayetteville, AR 72701 USA
基金
美国国家科学基金会;
关键词
Low latency detection; orthogonal matching pursuit; false data injection; cumulative sum; SIGNAL RECOVERY; SYSTEMS;
D O I
10.1109/ACCESS.2018.2873981
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study low-latency detections of sparse false data injection attacks in power grids, where an adversary can maliciously manipulate power grid operations by modifying measurements at a small number of smart meters. When a power grid is under attack, the detection delay, which is defined as the time difference between the occurrence and detection of the attack, is critical to power grid operations. A shorter detection delay can shorten the response time, thus prevent catastrophic impacts from the attack. The objective of this paper is to develop low-latency false data detection algorithms that can minimize the detection delay subject to constraints on false alarm probability. The false data injection can be modeled with a sparse attack vector, with each non-zero element corresponding to one meter under attack. Since neither the support nor the values of the sparse attack vector is known, a new orthogonal matching pursuit cumulative sum (OMP-CUSUM) algorithm is proposed to identify the meters under attack while minimizing the detection delay. In order to recover the support of the sparse vector, we develop a new stopping condition for the iterative OMP algorithm by analyzing the statistical properties of the power grid measurements. Theoretical analysis and simulation results show that the proposed OMP-CUSUM algorithm can efficiently identify the meters under attack, and reliably detect false data injections with low delays while maintaining good detection accuracy.
引用
收藏
页码:58564 / 58573
页数:10
相关论文
共 23 条
[1]   Adaptive greedy approximations [J].
Davis G. ;
Mallat S. ;
Avellaneda M. .
Constructive Approximation, 1997, 13 (1) :57-98
[2]   Some remarks on greedy algorithms [J].
DeVore, RA ;
Temlyakov, VN .
ADVANCES IN COMPUTATIONAL MATHEMATICS, 1996, 5 (2-3) :173-187
[3]  
Evans D. S., 2011, P NDSS, P1, DOI DOI 10.1109/ICC.2011.5962706
[4]   BAD DATA-ANALYSIS FOR POWER-SYSTEM STATE ESTIMATION [J].
HANDSCHIN, E ;
SCHWEPPE, FC ;
KOHLAS, J ;
FIECHTER, A .
IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1975, PA94 (02) :329-337
[5]  
Hershey J. R., 2007, P IEEE INT C AC SPEE, V4
[6]   Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis [J].
Huang, Yi ;
Tang, Jin ;
Cheng, Yu ;
Li, Husheng ;
Campbell, Kristy A. ;
Han, Zhu .
IEEE SYSTEMS JOURNAL, 2016, 10 (02) :532-543
[7]   Malicious Data Attacks on the Smart Grid [J].
Kosut, Oliver ;
Jia, Liyan ;
Thomas, Robert J. ;
Tong, Lang .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :645-658
[8]   Information bounds and quick detection of parameter changes in stochastic systems [J].
Lai, TL .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (07) :2917-2929
[9]   Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids [J].
Li, Shang ;
Yilmaz, Yasin ;
Wang, Xiaodong .
IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (06) :2725-2735
[10]  
Lin J.-M., 2007, 2007 IEEE POWER ENG, P1