Data-driven detection and identification of IoT-enabled load-altering attacks in power grids

被引:15
作者
Lakshminarayana, Subhash [1 ]
Sthapit, Saurav [2 ]
Jahangir, Hamidreza [1 ]
Maple, Carsten [2 ]
Poor, H. Vincent [3 ]
机构
[1] Univ Warwick, Sch Engn, Coventry, W Midlands, England
[2] Univ Warwick, Warwick Mfg Grp, Coventry, W Midlands, England
[3] Princeton Univ, Dept Elect & Comp Engn, Princeton, NJ USA
基金
美国国家科学基金会; 英国工程与自然科学研究理事会;
关键词
DATA INJECTION ATTACKS; NEURAL-NETWORKS;
D O I
10.1049/stg2.12066
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Advances in edge computing are powering the development and deployment of Internet of Things (IoT) systems to provide advanced services and resource efficiency. However, large-scale IoT-based load-altering attacks (LAAs) can seriously impact power grid operations, such as destabilising the grid's control loops. Timely detection and identification of any compromised nodes are essential to minimise the adverse effects of these attacks on power grid operations. In this work, two data-driven algorithms are proposed to detect and identify compromised nodes and the attack parameters of the LAAs. The first method, based on the Sparse Identification of Nonlinear Dynamics approach, adopts a sparse regression framework to identify attack parameters that best describe the observed dynamics. The second method, based on physics-informed neural networks, employs neural networks to infer the attack parameters from the measurements. Both algorithms are presented utilising edge computing for deployment over decentralised architectures. Extensive simulations are performed on IEEE 6-, 14-, and 39-bus systems to verify the effectiveness of the proposed methods. Numerical results confirm that the proposed algorithms outperform existing approaches, such as those based on unscented Kalman filter, support vector machines, and neural networks (NN), and effectively detect and identify locations of attack in a timely manner.
引用
收藏
页码:203 / 218
页数:16
相关论文
共 36 条
  • [1] Cybersecurity of Smart Electric Vehicle Charging: A Power Grid Perspective
    Acharya, Samrat
    Dvorkin, Yury
    Pandzic, Hrvoje
    Karri, Ramesh
    [J]. IEEE ACCESS, 2020, 8 : 214434 - 214453
  • [2] Hierarchical Location Identification of Destabilizing Faults and Attacks in Power Systems: A Frequency-Domain Approach
    Amini, Sajjad
    Pasqualetti, Fabio
    Abbaszadeh, Masoud
    Mohsenian-Rad, Hamed
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (02) : 2036 - 2045
  • [3] Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes
    Amini, Sajjad
    Pasqualetti, Fabio
    Mohsenian-Rad, Hamed
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) : 2862 - 2872
  • [4] Amini S, 2015, INT CONF SMART GRID, P503, DOI 10.1109/SmartGridComm.2015.7436350
  • [5] [Anonymous], 2018, 502551181 IECIEEE, P1
  • [6] Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
  • [7] Discovering governing equations from data by sparse identification of nonlinear dynamical systems
    Brunton, Steven L.
    Proctor, Joshua L.
    Kutz, J. Nathan
    [J]. PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2016, 113 (15) : 3932 - 3937
  • [8] Consult S.E.C., MULTIPLE VULNERABILI
  • [9] Grid Shock: Coordinated Load-Changing Attacks on Power Grids The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well
    Dabrowski, Adrian
    Ullrich, Johanna
    Weippl, Edgar R.
    [J]. 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 303 - 314
  • [10] Dvorkin Y, 2017, NORTH AMER POW SYMP