Load altering attack-tolerant defense strategy for load frequency control system

被引:62
作者
Chen, Chunyu [1 ]
Cui, Mingjian [2 ]
Fang, Xin [3 ]
Ren, Bixing [4 ]
Chen, Yang [5 ]
机构
[1] China Univ Min & Technol, Sch Elect & Power Engn, Xuzhou 221116, Jiangsu, Peoples R China
[2] Univ Tennessee, Dept Elect Engn & Comp Sci, Knoxville, TN 37996 USA
[3] Natl Renewable Energy Lab NREL, Golden, CO 80401 USA
[4] State Grid Jiangsu Elect Power Co Ltd, Res Inst, Nanjing 211103, Jiangsu, Peoples R China
[5] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
关键词
Load frequency control; Load altering attack; Model-free control; Defense strategy; FALSE DATA INJECTION; POWER-SYSTEMS; CYBER-ATTACKS; MODEL; MITIGATION;
D O I
10.1016/j.apenergy.2020.116015
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Cyber attacks become emerging threats to every information-oriented energy management system. By violating the cyber systems, the hacker can disrupt the security and stability due to the strong coupling between the cyber and physical facilities. In this paper, one type of cyber attacks designated as the load altering attack is studied for the power system frequency control, and corresponding defense strategies are proposed to improve the frequency control performance. Considering the difficulty of the application of model-based controller into large-scale power systems, a novel model-free defense framework is for the first time presented. Under this framework, both active defense and passive defense strategies are designed. The former assumes that the defender has the initiative to learn different attack scenarios. Adaptive defense strategies are implemented using the online attack identification information and off-line trained strategy pool. The latter assumes that the defender passively tolerates various attack scenarios via the pre-trained off-line strategy. Both approaches prove to be effective through validation based on the IEEE benchmark systems. The proposed defense framework and defense strategies can be extended to other energy control systems to enhance their attack tolerance capability.
引用
收藏
页数:14
相关论文
共 43 条
[1]   Attack Detection and Identification for Automatic Generation Control Systems [J].
Ameli, Amir ;
Hooshyar, Ali ;
El-Saadany, Ehab F. ;
Youssef, Amr M. .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (05) :4760-4774
[2]   Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes [J].
Amini, Sajjad ;
Pasqualetti, Fabio ;
Mohsenian-Rad, Hamed .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) :2862-2872
[3]   System Redundancy Enhancement of Secondary Frequency Control Under Latency Attacks [J].
Chen, Chunyu ;
Chen, Yang ;
Zhang, Kaifeng ;
Ni, Ming ;
Wang, Shushan ;
Liang, Rui .
IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (01) :647-658
[4]   An Investigation of Coordinated Attack on Load Frequency Control [J].
Chen, Chunyu ;
Cui, Mingjian ;
Wang, Xinan ;
Zhang, Kaifeng ;
Yin, Shengfei .
IEEE ACCESS, 2018, 6 :30414-30423
[5]   Novel Detection Scheme Design Considering Cyber Attacks on Load Frequency Control [J].
Chen, Chunyu ;
Zhang, Kaifeng ;
Yuan, Kun ;
Zhu, Lingzhi ;
Qian, Minhui .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (05) :1932-1941
[6]   Flexible Machine Learning-Based Cyberattack Detection Using Spatiotemporal Patterns for Distribution Systems [J].
Cui, Mingjian ;
Wang, Jianhui ;
Chen, Bo .
IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (02) :1805-1808
[7]   False Data Injection on State Estimation in Power Systems-Attacks, Impacts, and Defense: A Survey [J].
Deng, Ruilong ;
Xiao, Gaoxi ;
Lu, Rongxing ;
Liang, Hao ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (02) :411-423
[8]  
Esfahani PM, 2010, P AMER CONTR CONF, P962
[9]   Online Optimization for Networked Distributed Energy Resources With Time-Coupling Constraints [J].
Fan, Shuai ;
He, Guangyu ;
Zhou, Xinyang ;
Cui, Mingjian .
IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (01) :251-267
[10]   Model-free control [J].
Fliess, Michel ;
Join, Cedric .
INTERNATIONAL JOURNAL OF CONTROL, 2013, 86 (12) :2228-2252