Analysis of false data injection attacks in power systems: A dynamic Bayesian game-theoretic approach

被引:20
|
作者
Tian, Meng [1 ]
Dong, Zhengcheng [2 ]
Wang, Xianpei [1 ]
机构
[1] Wuhan Univ, Elect Informat Sch, Wuhan, Peoples R China
[2] Wuhan Univ, Sch Elect Engn & Automat, Wuhan, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
False data injection attacks; Bi-level optimization; Dynamic Bayesian game; Bayesian Nash equilibrium; SMART GRIDS; COUNTERMEASURES; VULNERABILITY; INFORMATION; PROTECTION; DEFENSE;
D O I
10.1016/j.isatra.2021.01.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
False data injection (FDI) attack is a malicious kind of cyber attack that targets state estimators of power systems. In this paper, a dynamic Bayesian game-theoretic approach is proposed to analyze FDI attacks with incomplete information. In this approach, players' payoffs are identified according to a proposed bi-level optimization model, and the prior belief of the attacker's type is constantly updated based on history profiles and relationships between measurements. It is proven that the type belief and Bayesian Nash equilibrium are convergent. The stability and reliability of this approach can be guaranteed by the law of large numbers and the central limit theorem. The time complexity and space complexity are O(n(m)n(s)n(l)) and O(1), respectively. Numerical results show that the average success rate to identify at-risk load measurements is 98%. The defender can efficiently allocate resources to at-risk load measurements using the dynamic Bayesian game-theoretic approach. (C) 2021 ISA. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:108 / 123
页数:16
相关论文
共 50 条
  • [11] False Data Injection Attacks in Power Distribution Systems Considering the Characteristics of Distributed Photovoltaic
    Liu, Yang
    Wen, Mi
    Wen, Hong
    Deng, Ruilong
    Peng, Sha
    Guo, Naiwang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2025, 21 (03) : 2023 - 2032
  • [12] A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems
    Hussain, Shahbaz
    Hussain, S. M. Suhail
    Hemmati, Marziyeh
    Iqbal, Atif
    Alammari, Rashid
    Zanero, Stefano
    Ragaini, Enrico
    Gruosso, Giambattista
    PROTECTION AND CONTROL OF MODERN POWER SYSTEMS, 2023, 8 (01)
  • [13] False Data Injection Attacks Against State Estimation in Power Distribution Systems
    Deng, Ruilong
    Zhuang, Peng
    Liang, Hao
    IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (03) : 2871 - 2881
  • [14] Optimal Protection Strategy Against False Data Injection Attacks in Power Systems
    Liu, Xuan
    Li, Zhiyi
    Li, Zuyi
    IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (04) : 1802 - 1810
  • [15] Accurate Detection of False Data Injection Attacks in Renewable Power Systems Using Deep Learning
    Almutairy, Fayha
    Scekic, Lazar
    Elmoudi, Ramadan
    Wshah, Safwan
    IEEE ACCESS, 2021, 9 : 135774 - 135789
  • [16] Analysis of cascading failures of power cyber-physical systems considering false data injection attacks
    Li, Jian
    Sun, Chaowei
    Su, Qingyu
    GLOBAL ENERGY INTERCONNECTION-CHINA, 2021, 4 (02): : 204 - 213
  • [17] Literature Review on False Data Injection Attacks Against Power System
    Liang, Gaoqi
    Zhao, Junhua
    Luo, Fengji
    Weller, Steven R.
    Dong, Zhao Yang
    IEEE SOUTHEASTCON 2020, 2020,
  • [18] A game-theoretic study of load redistribution attack and defense in power systems
    Xiang, Yingmeng
    Wang, Lingfeng
    ELECTRIC POWER SYSTEMS RESEARCH, 2017, 151 : 12 - 25
  • [19] Analysis of False Data Injection Attacks on the Power System's Spinning Reserves
    Zhang, Changwen
    Ran, Xiaohong
    Wang, Jing
    Liu, Haofeng
    Liu, Kaipei
    Qin, Liang
    2024 THE 7TH INTERNATIONAL CONFERENCE ON ENERGY, ELECTRICAL AND POWER ENGINEERING, CEEPE 2024, 2024, : 1011 - 1015
  • [20] Modelling and Countermeasures of False Data Injection Attacks Against State Estimation in Power Systems
    Alayande, Akintunde Samson
    Nwulu, Nnamdi
    Bakare, Ayodeji Emmanuel
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 129 - 134