Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation

被引:56
作者
Bi, Suzhi [1 ]
Zhang, Ying Jun [2 ,3 ]
机构
[1] Natl Univ Singapore, Fac Engn, Dept Elect & Comp Engn, Singapore 119077, Singapore
[2] Chinese Univ Hong Kong, Dept Informat Engn, Shatin, Hong Kong, Peoples R China
[3] Chinese Univ Hong Kong, Shenzhen Res Inst, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
False-data injection attack; power system state estimation; smart grid security; graph algorithms; DATA INJECTION ATTACKS; POWER;
D O I
10.1109/JSAC.2014.2332051
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Accurate state estimation is of paramount importance to maintain the power system operating in a secure and efficient state. The recently identified coordinated data injection attacks to meter measurements can bypass the current security system and introduce errors to the state estimates. The conventional wisdom to mitigate such attacks is by securing meter measurements to evade malicious injections. In this paper, we provide a novel alternative to defend against false data injection attacks using covert power network topological information. By keeping the exact reactance of a set of transmission lines from attackers, no false data injection attack can be launched to compromise any set of state variables. We first investigate from the attackers' perspective the necessary condition to perform an injection attack. Based on the arguments, we characterize the optimal protection problem, which protects the state variables with minimum cost, as a well-studied Steiner tree problem in a graph. In addition, we also propose a mixed defending strategy that jointly considers the use of covert topological information and secure meter measurements when either method alone is costly or unable to achieve the protection objective. A mixed-integer linear programming formulation is introduced to obtain the optimal mixed defending strategy. To tackle the NP-hardness of the problem, a tree-pruning-based heuristic is further presented to produce an approximate solution in polynomial time. The advantageous performance of the proposed defending mechanisms is verified in IEEE standard power system test cases.
引用
收藏
页码:1471 / 1485
页数:15
相关论文
共 34 条
[1]  
[Anonymous], TAP ADJUSTMENT AC LO
[2]  
[Anonymous], 2004, Power System State Estimation Theory and Implementation
[3]  
Barglela A., 1986, IEEE T POWER SYST, V1, P1534
[4]  
Bi SZ, 2013, IEEE GLOB COMM CONF, P766, DOI 10.1109/GLOCOM.2013.6831165
[5]   Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation [J].
Bi, Suzhi ;
Zhang, Ying Jun .
IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (03) :1216-1227
[6]  
Bi SZ, 2011, IEEE GLOBE WORK, P1162, DOI 10.1109/GLOCOMW.2011.6162362
[7]  
Bobba R. B., 2010, 1 WORKSH SEC CONTR S, P1
[8]   Optimal placement of phasor measurement units for power system observability [J].
Chakrabarti, Saikat ;
Kyriakides, Elias .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2008, 23 (03) :1433-1440
[9]  
Choi DH, 2012, INT CONF SMART GRID, P330, DOI 10.1109/SmartGridComm.2012.6486005
[10]   Coordinated Data-Injection Attack and Detection in the Smart Grid [J].
Cui, Shuguang ;
Han, Zhu ;
Kar, Soummya ;
Kim, Tung T. ;
Poor, H. Vincent ;
Tajer, Ali .
IEEE SIGNAL PROCESSING MAGAZINE, 2012, 29 (05) :106-115