A Detection Mechanism Against Load-Redistribution Attacks in Smart Grids

被引:43
作者
Kaviani, Ramin [1 ]
Hedman, Kory W. [1 ]
机构
[1] Arizona State Univ, Sch Elect Comp & Energy Engn, Tempe, AZ 85281 USA
基金
美国国家科学基金会;
关键词
Programming; Stochastic processes; Linear programming; Random variables; Optimization; Scheduling; Mathematical model; Cyber-attack detection; false data injection attack (FDIA); greedy algorithm; linear programming (LP); load-redistribution attack detection; DATA-INJECTION ATTACKS; STATE ESTIMATION; POWER-SYSTEMS; SECURITY;
D O I
10.1109/TSG.2020.3017562
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This article presents a real-time non-probabilistic approach to detect load-redistribution (LR) attacks, which attempt to cause an overflow, in smart grids. Prior studies have shown that certain LR attacks can bypass traditional bad data detectors and remain undetectable, which implies that the presence of a reliable and intelligent detection mechanism is imperative. Therefore, in this study a detection mechanism is proposed based on the fundamental knowledge of the physics laws in electric grids. To do so, we leverage power systems domain insight to identify an underlying exploitable structure for the core problem of LR attacks, which enables the prediction of the attackers' behavior. Then, a fast greedy algorithm is presented to find the best attack vector and identify the most sensitive buses for critical transmission assets. Finally, a security index, which can be used in practice with minimal disruptions, is developed for each critical asset with respect to the identified best attack vector and sensitive buses. The proposed approach is applied to 2383-bus Polish test system to demonstrate the scalability and efficiency of the proposed algorithm.
引用
收藏
页码:704 / 714
页数:11
相关论文
共 45 条
[1]  
[Anonymous], 2010, WORKSHOP SECURE CONT
[2]  
Dán G, 2010, INT CONF SMART GRID, P214, DOI 10.1109/SMARTGRID.2010.5622046
[3]   Jamming aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation [J].
Deka, Deepjyoti ;
Baldick, Ross ;
Vishwanath, Sriram .
PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, :2556-U1000
[4]  
Deka D, 2014, IEEE POW ENER SOC GE, DOI 10.1109/PESGM.2014.6939058
[5]   Defending Against False Data Injection Attacks on Power System State Estimation [J].
Deng, Ruilong ;
Xiao, Gaoxi ;
Lu, Rongxing .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (01) :198-207
[6]   Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid [J].
Esmalifalak, Mohammad ;
Liu, Lanchao ;
Nguyen, Nam ;
Zheng, Rong ;
Han, Zhu .
IEEE SYSTEMS JOURNAL, 2017, 11 (03) :1644-1652
[7]   Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study [J].
Esmalifalak, Mohammad ;
Shi, Ge ;
Han, Zhu ;
Song, Lingyang .
IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (01) :160-169
[8]   Greedy-knapsack algorithm for optimal downlink resource allocation in LTE networks [J].
Ferdosian, Nasim ;
Othman, Mohamed ;
Ali, Borhanuddin Mohd ;
Lun, Kweh Yeah .
WIRELESS NETWORKS, 2016, 22 (05) :1427-1440
[9]   Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method [J].
Armina Foroutan, S. ;
Salmasi, Farzad R. .
IET Cyber-Physical Systems: Theory and Applications, 2017, 2 (04)
[10]   Identification of Successive "Unobservable" Cyber Data Attacks in Power Systems Through Matrix Decomposition [J].
Gao, Pengzhi ;
Wang, Meng ;
Chow, Joe H. ;
Ghiocel, Scott G. ;
Fardanesh, Bruce ;
Stefopoulos, George ;
Razanousky, Michael P. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2016, 64 (21) :5557-5570