Supplementary file for “ Defending Against Unidentifiable Attacks in Electric Power Grids ”

نویسندگان

  • Zhengrui Qin
  • Qun Li
چکیده

Therefore, we first need to find the regions that require fewest compromised meters for an undetectable attack. In [6], Liu et al. proposed a heuristic algorithm for desirable attack region in DC model, where z = Hx+e and H is fixed; with column transformation of H matrix, they aimed to find a column vector with the greatest number of zero elements. However, in our AC model case, there is no such fixed H matrix and the relations between measurements and state variables are non-linear. Instead, we examine the Jacobian matrix ∂h/∂x, denoted by J. Similar to [6], we apply column transformations on the Jacobian matrix to find a column vector with the greatest number of zero elements, say vector u. Then, we figure out the rows with non-zero elements in u. Finally the attack region is the region containing meters i such that ui = 0. The algorithm is summarized as follows. ————————————————————————— Alg. 1: Finding the best attack region 1: Calculate J at the pre-attack point; 2: u =the column vector in J with most zeros; 3: For each column vector j ∈ J, j = u, 4: Find u′ = u+ c· j that results in most zero elements, where c can be any scalar; 5: Endfor 6: If u′ has more zero elements than u, go to line 3; 7: Find the set of meters with indices {i|ui = 0}; the attack region is the region where these meters are. ————————————————————————— Different from H, which is fixed, our Jacobian matrix is different at different starting points. Here, we assume a simple starting scenario that all voltages are 1 and all phases are 0, which is a feasible solution to power systems. We examine three IEEE bus systems: 9-bus system, 14-bus system, and 30-bus system. The results

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations

Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyberphysical systems are prone to malignant attacks, and specific analysis tools as well as monitoring mechanisms need to be developed to enforce system security and reliability. This paper proposes a unified framework to analyze...

متن کامل

Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

متن کامل

Optimal Intelligent Control of Plug-in Fuel Cell Electric Vehicles in Smart Electric Grids

In this paper, Plug-in Fuel Cell Electric Vehicle (PFCEV) is considered with dual power sources including Fuel Cell (FC) and battery Energy Storage. In order to respond to a transient power demand, usually supercapacitor energy storage device is combined with fuel cell to create a hybrid system with high energy density of fuel cell and the high power density of battery. In order to simulate the...

متن کامل

The Impact of the Topology on Cascading Failures in Electric Power Grids

Cascading failures are one of the main reasons for blackouts in power transmission grids. The topology of a power grid, together with its operative state determine, for the most part, the robustness of the power grid against cascading failures. Secure electrical power supply requires, together with careful operation, a robust design of the electrical power grid topology. This paper investigates...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012