Generalized attack separation scheme in cyber physical smart grid based on robust interval state estimation

被引:13
作者
Wang, Huaizhi [1 ]
Wen, Xichang [1 ]
Huang, Sheng [2 ]
Zhou, Bin [3 ]
Wu, Qiuwei [2 ]
Liu, Nian [4 ]
机构
[1] Shenzhen Univ, Guangdong Key Lab Electromagnet Control & Intelli, Shenzhen 518060, Peoples R China
[2] Tech Univ Denmark, Dept Elect Engn, DK-2800 Lyngby, Denmark
[3] Hunan Univ, Coll Elect & Informat Engn, Changsha 410082, Hunan, Peoples R China
[4] North China Elect Power Univ, State Key Lab Alternate Elect Power Syst Renewabl, Beijing 102206, Peoples R China
基金
中国国家自然科学基金;
关键词
Attack isolation; Cyber-attack detection; Cyber security; Smart grid state estimation; Energy internet; FALSE DATA INJECTION;
D O I
10.1016/j.ijepes.2020.106741
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a new generalized attack separation scheme in energy internet to analyze how an attacker behaves. This scheme consists of a robust interval state estimation-based anomaly detection method and a coordinated bad data processor. We develop an anomaly detection method that takes system uncertainties, i.e., forecasting uncertainty and parameter perturbation, into account to approximate the largest possible deviations of state variables in smart grid, thus recognizing stealthy anomalies. In this method, we decouple the power balancing formulation into P-? and Q-V sub-problems to improve the computational efficiency. Thereafter, a new coordinated bad data processor is proposed to automatically filter out the impact of malicious attacks on state estimation and to reconstruct the real states of a cyber physical smart grid. In this processor, three-stage state estimator is applied to rapidly assess the biased state from the current observations with the contamination of meters and communication channels. As a result, the implemented attack vector can be separated and isolated from the current observations online. Finally, the proposed scheme is validated via comprehensive tests on several IEEE systems. The obtained results show the strong robustness, high stability and promising performance for attack separation, indicating a high potential of the proposed scheme for practical implementations in deepcyber penetrated smart grids.
引用
收藏
页数:11
相关论文
共 30 条
  • [1] Line switching for alleviating overloads under line outage condition taking bus voltage limits into account
    Arya, LD
    Choube, SC
    Kothari, DP
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2000, 22 (03) : 213 - 221
  • [2] CHEN C, 2020, IN PRESS
  • [3] Flexible Machine Learning-Based Cyberattack Detection Using Spatiotemporal Patterns for Distribution Systems
    Cui, Mingjian
    Wang, Jianhui
    Chen, Bo
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (02) : 1805 - 1808
  • [4] False Data Injection on State Estimation in Power Systems-Attacks, Impacts, and Defense: A Survey
    Deng, Ruilong
    Xiao, Gaoxi
    Lu, Rongxing
    Liang, Hao
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (02) : 411 - 423
  • [5] Wide area measurements based fault detection and location method for transmission lines
    Fan, Wen
    Liao, Yuan
    [J]. PROTECTION AND CONTROL OF MODERN POWER SYSTEMS, 2019, 4 (01)
  • [6] Bilinear Power System State Estimation
    Gomez-Exposito, Antonio
    Gomez-Quiles, Catalina
    de la Villa Jaen, Antonio
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2012, 27 (01) : 493 - 501
  • [7] Multi-objective optimization strategy for distribution network considering V2G-enabled electric vehicles in building integrated energy system
    Huang, Zhao
    Fang, Baling
    Deng, Jin
    [J]. PROTECTION AND CONTROL OF MODERN POWER SYSTEMS, 2020, 5 (01)
  • [8] Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid
    Kurt, Mehmet Necip
    Yilmaz, Yasin
    Wang, Xiaodong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 498 - 513
  • [9] Distributed Quickest Detection of Cyber-Attacks in Smart Grid
    Kurt, Mehmet Necip
    Yilmaz, Yasin
    Wang, Xiaodong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) : 2015 - 2030
  • [10] DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System
    Li, Beibei
    Lu, Rongxing
    Wang, Wei
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) : 2415 - 2425