Joint Detection and Mitigation of False Data Injection Attacks in AGC Systems

被引:108
作者
Khalaf, Mohsen [1 ]
Youssef, Amr [2 ]
El-Saadany, Ehab [3 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ H3G 2W1, Canada
[3] Khalifa Univ, Elect & Comp Dept, Abu Dhabi 127788, U Arab Emirates
关键词
Automatic generation control (AGC); false data injection; Kalman filter; joint input/state estimation; smart grid security; SIMULTANEOUS INPUT; STATE ESTIMATION;
D O I
10.1109/TSG.2018.2872120
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The ability to maintain the system frequency within specified operating limits is crucial for the stability and proper operation of power systems. Any small deviation out of the permissible frequency range must be well-mitigated by the automatic generation control (AGC) system, otherwise it may result in disruption of operation and/or damage to the power grid equipment. The data required by the AGC control system is sent to the control center through communication links which are susceptible to cyber attacks. Therefore, such AGC systems have to be well-protected against false data injection (MI) attacks. In this paper, the use of a simultaneous input and state estimation based algorithm to detect and concurrently compensate for FDI attacks against the measurements of AGC systems is investigated. Throughout the use of this algorithm, the FM attack signal is dealt with as an unknown input and its value is estimated accordingly. Then, the estimated value for the FDI is used to compensate for the effect of the attack so that the control center makes its decision based on the corrected sensor signals, and not the manipulated ones. The proposed approach is tested under different types of FDI attacks and the simulation results for a 2-area and a 4-area practical system confirm its ability to detect, estimate FM attacks and successfully compensate for it.
引用
收藏
页码:4985 / 4995
页数:11
相关论文
共 34 条
  • [1] Abbaspour A., 2017, POWER S NAPS 2017 N, P1, DOI DOI 10.1109/DAT.2017.7889148
  • [2] Akyol B., 2010, SURVEY WIRELESS COMM
  • [3] Attack Detection and Identification for Automatic Generation Control Systems
    Ameli, Amir
    Hooshyar, Ali
    El-Saadany, Ehab F.
    Youssef, Amr M.
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (05) : 4760 - 4774
  • [4] [Anonymous], 2015, SoutheastCon 2015
  • [5] Ashok A., 2015, 2015 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT), P1, DOI DOI 10.1145/2802130.2802131
  • [6] Bevrani H, 2014, POWER ELECTRON POWER, P1, DOI 10.1007/978-3-319-07278-4
  • [7] Biswas S, 2016, 2016 RESILIENCE WEEK (RWS), P40, DOI 10.1109/RWEEK.2016.7573304
  • [8] Novel Detection Scheme Design Considering Cyber Attacks on Load Frequency Control
    Chen, Chunyu
    Zhang, Kaifeng
    Yuan, Kun
    Zhu, Lingzhi
    Qian, Minhui
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (05) : 1932 - 1941
  • [9] Esfahani PM, 2010, IEEE DECIS CONTR P, P5973, DOI 10.1109/CDC.2010.5717285
  • [10] Esfahani PM, 2010, P AMER CONTR CONF, P962