Complementarity reformulations for false data injection attacks on PMU-only state estimation

被引:29
作者
Alexopoulos, Theodoros A. [1 ]
Korres, George N. [1 ]
Manousakis, Nikolaos M. [2 ]
机构
[1] Natl Tech Univ Athens, Sch Elect & Comp Engn, Athens, Greece
[2] Univ West Attica, Dept Elect & Elect Engn, Athens, Greece
关键词
Complementarity constraints; Cyber-security; Phasor measurements unit; State estimation; Zero injections; OBSERVABILITY ANALYSIS; SYSTEMS;
D O I
10.1016/j.epsr.2020.106796
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The accuracy and integrity of state estimators are perniciously influenced by false data injection attacks (FDIAs) trying to manipulate the values of a subset of measurements without being detected by the underlying bad data processing scheme. In the framework of vulnerability analysis, we examine FDIAs against a PMU linear state estimator based on Cartesian formulation in the presence of zero injection buses, under the assumption that the attacker would most likely try to corrupt as few measurements as possible. Exact and relaxed complementarity reformulations to cardinality minimization are proposed in order to compute minimal sets of measurements whose values need to be maliciously modified for successful FDIAs. The performance of the proposed approaches is demonstrated with experimental evaluations over IEEE benchmark systems.
引用
收藏
页数:8
相关论文
共 28 条
[1]  
Abur A., 2004, Power System State Estimation Theory and Implementation
[2]  
[Anonymous], 1998, Integer Programming
[3]  
[Anonymous], 2016, Analysis of the Cyber Attack on the Ukrainian Power Grid
[4]  
Bennet K. P., 1997, INFORMS Journal on Computing, V9, P311, DOI 10.1287/ijoc.9.3.311
[5]  
Currie J., 2012, FOUND COMPUT AIDED P
[6]   Branch-and-cut for combinatorial optimisation problems without auxiliary binary variables [J].
de Farias, IR ;
Johnson, EL ;
Nemhauser, GL .
KNOWLEDGE ENGINEERING REVIEW, 2001, 16 (01) :25-39
[7]  
Esmalifalak M, 2011, INT CONF SMART GRID
[8]  
Feng M., 2013, Technical Report
[9]  
Gurobi Optimization, 2019, GUROBI OPTIMIZER REF
[10]   Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids [J].
Hao, Jinping ;
Piechocki, Robert J. ;
Kaleshi, Dritan ;
Chin, Woon Hau ;
Fan, Zhong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (05) :1198-1209