Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

Authors

Abstract:

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfiguration as a strategy to decrease FDI attacks on distribution system state estimation. It is well-known that network reconfiguration is a common approach in distribution systems to improve the system’s operation. In this paper, a modified switch opening and exchange (MSOE) method is used to reconfigure the network. The proposed method is tested on the IEEE 33-bus system. It is shown that network reconfiguration decreases the power measurements manipulation under false data injection attacks. Also, the resilient configuration of the distribution system is achieved, and the best particular configuration for reducing FDI attacks on each bus is obtained.   

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Detecting False Data Injection Attacks on DC State Estimation

State estimation is an important power system application that is used to estimate the state of the power transmission networks using (usually) a redundant set of sensor measurements and network topology information. Many power system applications such as contingency analysis rely on the output of the state estimator. Until recently it was assumed that the techniques used to detect and identify...

full text

Extended Distributed State Estimation: A Detection Method against Tolerable False Data Injection Attacks in Smart Grids

False data injection (FDI) is considered to be one of the most dangerous cyber-attacks in smart grids, as it may lead to energy theft from end users, false dispatch in the distribution process, and device breakdown during power generation. In this paper, a novel kind of FDI attack, named tolerable false data injection (TFDI), is constructed. Such attacks exploit the traditional detector’s toler...

full text

False Data Injection Attacks in Control Systems

This paper analyzes the effects of false data injection attacks on Control System. We assume that the system, equipped with a Kalman filter and LQG controller, is used to monitor and control a discrete linear time invariant Gaussian system. We further assume that the system is equipped with a failure detector. An attacker wishes to destabilize the system by compromising a subset of sensors and ...

full text

Vulnerabilities of Smart Grid State Estimation against False Data Injection Attack

In recent years, Information Security has become a notable issue in the energy sector. After the invention of ‘The Stuxnet worm’ [1] in 2010, data integrity, privacy and confidentiality has received significant importance in the real-time operation of the control centres. New methods and frameworks are being developed to protect the National Critical Infrastructures likeenergy sector. In the re...

full text

Consequences of False Data Injection on Power System State Estimation by

The electric power system is one of the largest, most complicated, and most important cyber-physical systems in the world. The link between the cyber and physical level is the Supervisory Control and Data Acquisition (SCADA) systems and Energy Management Systems (EMS). Their functions include monitoring the real-time system operation through state estimation (SE), controlling the system to oper...

full text

A Security Method for Multiple Attacks in Sensor Networks: against False-report Injection, False-vote Injection, and Wormhole Attacks

In a large-scale wireless sensor network, damage spreads rapidly in the network when under false report injection, false votes injection, or wormhole attacks. These attacks cause finite energy resources to be drained, legitimate reports to be dropped, and data to be intercepted by adversary nodes. A probabilistic voting-based filtering scheme (PVFS) and localized encryption and authentication p...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 18  issue 4

pages  2569- 2569

publication date 2022-12

By following a journal you will be notified via email when a new issue of this journal is published.

Keywords

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023