Power Grid AC-based State Estimation: Vulnerability Analysis Against Cyber Attacks
نویسندگان
چکیده
To ensure grid efficiency and reliability, powersystem operators continuously monitor the operational char-acteristics of the grid through a critical process called stateestimation (SE), which performs the task by filtering and fusingvarious measurements collected from grid sensors. This studyanalyzes the vulnerability of the key operation module, namelyAC-based SE, against potential cyber attacks on data integrity,also known as false data injection attack (FDIA). A generalform of FDIA can be formulated as an optimization problem,whose objective is to find a stealthy and sparse data injectionvector on the sensor measurements with the aim of making thestate estimate spurious and misleading. Due to the nonlinearAC measurement model and the cardinality constraint, theproblem includes both continuous and discrete nonlinearities.To solve the FDIA problem efficiently, we propose a novelconvexification framework based on semidefinite programming(SDP). By analyzing a globally optimal SDP solution, we delineatethe “attackable region” for any given set of measurement typesand grid topology, where the spurious state can be falsified byFDIA. Furthermore, we prove that the attack is stealthy andsparse, and derive performance bounds. Simulation results onvarious IEEE test cases indicate the efficacy of the proposedconvexification approach. From the grid protection point of view,the results of this study can be used to design a security metricfor the current practice against cyber attacks, redesign the baddata detection scheme, and inform proposals of grid hardening.From a theoretical point of view, the proposed framework canbe used for other nonconvex problems in power systems andbeyond.
منابع مشابه
Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملAn Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine
Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...
متن کاملCyber Risk Analysis of Combined Data Attacks Against Power System State Estimation
Understanding smart grid cyber attacks is key for developing appropriate protection and recovery measures. Advanced attacks pursue maximized impact at minimized costs and detectability. This paper conducts risk analysis of combined data integrity and availability attacks against the power system state estimation. We compare the combined attacks with pure integrity attacks false data injection (...
متن کاملCo-simulation for Cyber Security Analysis: Data Attacks against Energy Management System
It is challenging to assess the vulnerability of a cyber-physical power system to data attacks. In order to support vulnerability assessment, with the exception of analytic methods, a suitable platform for security tests needs to be developed. In this paper we analyze the cyber security of energy management system (EMS) against data attacks. First we extend our analytic framework that character...
متن کاملEXPOSE the Line Failures following a Cyber-Physical Attack on the Power Grid
Recent attacks on power grids demonstrated the vulnerability of the grids to cyber and physical attacks. To analyze this vulnerability, we study cyber-physical attacks that affect both the power grid physical infrastructure and its underlying Supervisory Control And Data Acquisition (SCADA) system. We assume that an adversary attacks an area by: (i) disconnecting some lines within that area, an...
متن کامل