1. Introduction
The heavy usage of non-renewable fossil fuels is the primary contributor to the greenhouse effect by releasing carbon dioxide [1]. Zaidi et al. reveal that non-renewable energy is the main contributor to pollution by analyzing renewable and non-renewable energy consumption [2]. Awan et al. highlight that industrialization increases the demand for renewable energy resources and decreases sustainability of greenhouse gas emissions [3]. With the emergence of environmental problems and the consumption of non-renewable energy, the application of renewable energy such as wind and solar energy is more and more important [4]. Shady et al. highlight in [5] that the establishment of SGs is very important to improve the efficiency and security of energy supply. SGs would help in reducing energy consumption during peak load, and in reducing emissions of pollutants. However, a large number of instruments and equipment with network communication in new energy are applied in SGs. Due to the lack of adequate protection measures, the risk of network attack on SGs is greatly increased; access to distributed and renewable energy resources brings great uncertainty to the cyber security of SGs [6]. In 2003, a computer network at Davis–Besse nuclear power plant was penetrated. In 2010, the nuclear power plant in Iran was penetrated by Stuxnet [7]. In December 2015, malicious software called “Black Energy” penetrated the national grid of Ukraine, causing serious damage to the supervisory control and data acquisition (SCADA) system [8]. In January 2016, Israel’s electricity authority suffered a serious cyber attack, in which ransom ware was distributed by mail to trick its staff into executing malicious code, causing the associated computers to be shut down for two days. Cyber security of smart grids is becoming an increasingly important issue [9,10].
Through analysis, it is not difficult to find that the main process attacked is as follows. First, adversaries implant virus software by hacking into the target host. Then, the adversaries continuously steal the data and constructs the appropriate attack based on the acquired data. After that, the constructed attack implanted in the available data and uploads to the control station. Finally, the control station is misled by the attacked data and makes a series of wrong operations, which causes the system to crash. Moreover, because some transport protocols as the IEC TR 61850-90-2 are short of integrity protection or provided but can be omitted when requiring very low latency [11]. Potential adversaries can even modify measurements by modifying the transmitted bits.
Similarly, the SCADA system is the important data acquisition and monitoring component in the power grid [12]. It is responsible for collecting measurements from sensors and monitoring the operation of the current grids. State estimation techniques are used to detect and weed out bad data in the SCADA system [13]. While few power companies will disclose the details of their grid to the public, it is proposed in [14] that the attackers can combine satellite images and the existing transmission system map to collect information of the target power system to identify the topology of the power grids. Moreover, the attackers can determine the actual value of the network parameters through the characteristics of the transmission line. The node admittance matrix within 1% of the margin of error has been estimated [15]. In particular, once the adversaries know the configuration of the grids, the false data injection attack (FDIA) can bypass the existing detection techniques. The fundamental reason is that the existing bad data detection (BBD) techniques rely usually on the Chi-square detection mechanism, yet it is not reliable [16]. Specifically, it is proposed in [16] that even if the result of the state estimator is changed by FDIA, the BDD alarm is not triggered as long as the residual increment is within the threshold.
This paper primarily studies false data injection attacks against the SGs state estimation. The purpose of the idea is not to destroy the power grids, but to reveal the mechanism of the attack and digging the system vulnerability. In [17], Li et al. consider that the cyber attack problem is significant since one needs to understand the behavior of an attacker to give effective defensive measures. Similar views emerge in [18], they point out that studying potential attack mechanisms helps assess the vulnerability and security weaknesses of SGs. Therefore, the research of the attack is significant to the protection of the system.
The FDIA exploits the vulnerabilities of the BDD scheme, resulting in major harm to the power grids [19]. For the FDIA, there are two issues research topics: The construction of false data attack vectors [16,20,21] and attack detection and defense [22,23,24]. In particular, the construction of the FDIA attack vector can reveal the vulnerability of the state estimation, which will help the development of security defense.
False data injection attack was firstly proposed by Liu et al. in 2009 [16] where they constructed the attack vector by limiting it as the linear combination of the column vectors of the measurement matrix. Moreover, they put forward that the attack vector can be constructed as long as the attackers can tamper with a certain number of sensors. In [21,25,26], the principle was inherited. In those methods, the attack residual has no change compared with no attack. Therefore the attack can easily pass the residual detection mechanism. Then in [27], to reduce the cost of the attack, the sparseness of an attack vector was studied, whereby setting some specific element of the attack vector to be 1, the problem of designing an attack vector was transformed intol1 -norm optimization problem. Furthermore, Teixeira et al. [28] transformed thel1 -norm optimization problem into a general p-norm problem based on the constraint, and a general construction method of FDIA method with specific target constraints was proposed. Next, the mathematical optimizer CPLEX or Gurobi was used to solve the construction problem of attack vectors [29]. In the above methods, because of limiting attack as the linear combination of the column vectors of the measurement matrix, the sparseness of attacks is difficult to be improved, and the risks and costs associated with attacks are greatly increased. Different from the above model, the residual increment caused by the attack is ensured within the threshold and a construction method of attack vectors based on ADMM is proposed in [30]. The attack vector design relaxed.
While the above methods can find the attack vector, the sparseness and effectiveness of attack vectors are difficult to be satisfied simultaneously. Moreover, the existing methods also do not provide a feasible domain of attack vector. In conclusion, there are three problems:
- To pass BDD, what is the range of attack vector?
- What extent can an attack be called effective attacks?
- How to design the sparse attack vectors within the feasible domain to achieve the desired attack effect?
Aiming at these problems, this paper investigates the feasible region of attack vector and a novel sparse attack vector construction method is presented. The main contributions are:
- According to the state estimation technique, the feasible region of attack vector is obtained using linear algebra.
- The constraint of the effectiveness of attack is derived based on whether it can cause the operator to misbehave.
- The state estimation variations domain is proposed based on the feasible region of the attack vector.
Furthermore, the greatest contribution considered by the authors should be the discussion of the attack vector range in this paper.
The rest is organized as follows. Section 2 illustrates the BDD mechanism and the principle of FDIA based on the DC model. Section 3 presents the main results of the paper. The simulation results are presented in Section 4.
2. Formulate Problem
Power system state estimation can be used for inference the operation state by the available measurements of various meters in the power grid [16]. The available measurements include bus real power and reactive power injection, and branch real power and reactive power flow. The measurement model of the AC power flow is described as
z=h(x)+v,
wherez=z1,z2,…,zmTis denoted as measurement vector;x=x1,x2,…,xnTis the system state vector;v=v1,v2,⋯,vmTis the Gaussian measurement noise caused by environmental factors and measuring instrument, andh(.)is the functional dependency between measurements and state variables.
When the weighted least squares (WLS) algorithm is used in the model, the system state can be inferred from the following optimization problem
argminxJ(x)=(z−h(x))TW(z−h(x)).
Here, the state estimation based on the DC model can be used, the details of the DC power flow measurement model are as follows:
z=Hx+v,
wherez=z1,z2,…,zmTis denoted measurement vector, including active powers and reactive powers,x=x1,x2,…,xnTis the voltage phase angle of each node,v=v1,v2,⋯,vmTis the Gaussian measurement noise caused by environmental factors and measuring instrument, H is the measurement matrix which depends on the topology of network and line parameters.
The system state can be inferred from the following optimization problem
argminxJ(x)=(z−Hx)TW(z−Hx),
whereW=diagσi−2,0andσi2is the variance of measurement noise associated with the i-th meter(1≤i≤m) [28]. If the matrixHTWHis invertible, the solution of Equation (4) can be written as
x^=HTWH−1 HTWz.
Let vectorr=z−Hx^is the measurement estimation residual. Since the noise vector satisfies Gaussian distribution,J(x^)=rTWrsatisfies the Chi-square distribution with a degree of freedom(m−n). Then the binary hypothesis test is established as BBD, this is the Chi-square detection. When the confidence level is1−α, the binary hypothesis test can be expressed as
-
HypothesisH0:J(x^)≤τ, there is no bad data andH0is true.
-
HypothesisH1:J(x^)>τ, there is a bad data andH1is true.
Figure 1 illustrates the FDIA frame. If the target’s topology and line parameters are obtained by the attackers, they may capture measurement z through invading advanced parts such as phase measurement units (PMUs)/remote terminal units (RTUs). Then, the adversaries use z to construct an attack a. After that, a is injected into measurement and makes z becomeza. Next,zawill be transmitted to the SCADA system via the communication network. In SCADA system, the WLS state estimation algorithm is employed to estimate the system state and identify bad data. Oncezais not detected by BDD, it will be used for system power flow calculation and scheduling.
Remark 1.The SCADA system collects the measurements from the remotes, which may cause packet data random sequence false, loss and other situations because of transmission through the network. The construction of attack vectors is the main focus in this paper, so where network communication is in an ideal situation.
The Chi-square detector is a residual detector centered on measurement and estimated residual. The successful FDIA depends on that the attack vector can pass BDD and the result of the attack is effective. The construction of the attack vector is the key for attackers. Therefore, this paper focuses on the feasible and effective domains of attack vectors and the state variation domains caused by attack vectors using linear algebra.
Remark 2.The research on the feasible domain of attack vector can not only facilitate the attacker but also be significant to the defender. If the defenders know the feasible domain, they can reduce the feasible domain to improve the security. The discussion on effectiveness has the same effect.
3. Construction of Sparse Attack Vector 3.1. Feasible Domain of Attack Vector
Definition 1.
When the attack vectora∈Πa, the alarm is not triggered. The rangeΠais defined as the feasible domain of attack vector a.
The feasible domain of attack vector is not delved into in the existing research. It will be proved that the attack vector is only selected from a subset ofΠain the existing methods, which leads to a sparseness of attack vectors. In this subsection, the research ofΠawill be a great guide to the design of the attack vector.
Definition 2
([31]). In the finite-dimensional space, a square matrix P is called a projection matrix if it is equal to its square, i.e.,P2=P.
Lemma 1
([31]). LetCmbe a finite dimensional vector space and the matrix P be a projection onCm. If the subspaces L and M are the range and kernel of P, respectively, P has the following properties: Every vectord∈Cmcan be decomposed uniquely asd=e+fwithe=Pdandf=d−Pd=(I−P)d, wheree∈L,f∈MandCm=L⊕M.
Lemma 2.
LetB=HHTWH−1 HTW, then B is a projection matrix and(Im−B)2=(Im−B)is a projection matrix too.
The calculation of Lemma 2 is shown below.
B2=(HHTWH−1 HTW)2=HHTWH−1 HTW=B.
According to Definition 2, B is a projection matrix. Since
(Im−B)2=Im−2B+B2,
substituting Equation (6) into Equation (7), we have
(Im−B)2=Im−B.
Thus square matrix(Im−B)is also a projection matrix.
Theorem 1.
Πaincludes projection subspace and kernel subspace of projection transformation matrix(Im−HHTWH−1 HTW).
Proof of Theorem 1.
Letzabe the measurement contained the attack vector.zacan be written as
za=z+a.
Letx^aas the attacked estimate. When there exists the attack,x^acan be written as
x^a=x^+c,
where c is the perturbation of the state caused by a. Whena≠0, according to the Equation (5),
c=HTWH−1 HTWa.
Letz^aas the attacked measurement estimate. Because ofz^a=Hx^a, the attacked residualracan be expressed as
ra=za−z^a.
From Equations (9)–(11),rais rewritten as
ra=z−Hx^+a−HHTWH−1 HTWa.
when there is no an attack, normal measurement can pass through the detector because of∥z−Hx^∥2≤τ. Hence, ifzaattempt to pass the Chi-square detector, a must satisfy
z−Hx^+a−HHTWH−1 HTWa2≤τ
LetB=:HHTWH−1 HTWby using (5), Equation (14) can be rewritten as
z−Bz+a−Ba2≤τ.
Since B is an m-dimensional square matrix,
(Im−B)(z+a)2≤τ.
Lemma 2 states that(Im−B)is a projection transformation matrix inCmspace, andCm=L⊕M, where the subspaces L and M are the range and kernel of(Im−B), respectively. According to the nature of the idempotent matrix,z+acan be expressed as
z+a=(zL+aL)+(zM+aM),
wherezL+aL∈LandzM+aM∈M. Using Lemma 1, it follows that
(Im−B)(z+a)=zL+aL.
The projection transformation projects the vectorz+afrom the original spaceCmto the projection subspace L. Combining Equations (16) and (18), the feasible domain of the attack vector can be obtained as
zL+aL2≤τ,
in the subspace M,
(Im−B)(zM+aM)=0.
Therefore, Equation (19) shows thatΠa is a sphere in the projection subspace L of the projection transformation. The feasible domain in the subspace M can be calculated from Equation (20) and theaMis any. □
Remark 3.
Not all of thezainjected into the measurement z can pass the BDD because of the existence of the BDD mechanism. The feasible domain inCmspace consists ofaLandaM:
1.
whereaLis a sphere in the projection subspace L of the projection transformation matrix(Im−B)and the centre of sphere is−zL,the radius is τ.
2.
whereaMis any in the kernel subspace M of the projection transformation matrix(Im−B).
TheΠaproposed in this paper is a sufficient and necessary condition. Furthermore, it covers all feasible domains of perfect attack vectors and imperfect attack vectors.
Corollary 1.
The spherez+a2≤τis a subset ofΠa.
Remark 4.
When designing an attack vector, the attacker must ensure that the attack vector is within the feasible domain. Therefore, an attacker prefers the feasible domain to be as large as possible. However,Πarelates to the threshold of τ. From the view of power system security, τ should be as small as possible. A small τ limits the scope of the attack.
Further, it will be proved that the attack vector is only selected from the kernel space in the methods ofa=Hc. Because the selection is so small, which leads to the sparseness of attack vectors is greatly limited.
Theorem 2.
The column vectors of measurement matrix H belong to the kernel space of the projection transformation matrixIm−B.
Proof of Theorem 2.
According to matrix theory, there is
(Im−B)H=H−BH,
and becauseB=HHTWH−1 HTW, so
BH=HHTWH−1 HTWH=H.
Combining Equations (21) and (22),(Im−B)H=0is always true, so the column vectors of measurement matrix H belong to the kernel space of(Im−B). □
Remark 5.
In the constrainta=Hc, a is a linear combination of the columns of H, so a is one member of the vector space of the columns of H. According to Theorem 2, the vector space of the columns belongs to the kernel space of(Im−B). Hence, the design scheme ofa=Hcis based on kernel space, which is only a subset of the feasible domain proposed in this paper.
3.2. Lower Bound of the Attack Vector As seen in the previous section, the feasible domain of a is discussed. The question of attack vector range is answered. However, apart from the feasible domain, another main issue is the effectiveness when the attack constructed. In this subsection, the effectiveness of attacks will be investigated. We propose that the criterion of causing operator’s wrong action is taken as the index of effective attack and the constraint of an effective attack is suggested. When the operators find the estimated state deviated from their expected without considering the existence of an attack, they take actions such as adjusting the generator output or changing loads. These actions based on incorrect state variables may harm the normal operation of SGs. Thus, only attacks that can harm the power grid operation will be called effective attacks.
Definition 3.An effective attack can make the state estimated deviate from its given normal operating range for the power grid.
For example, a harmful attack is an attack which causes the voltage deviation exceeds 5% of the nominal. Next, the constraints on the attack vector will be derived for such an effective attack. Suppose that each state deviation is less thanCminduring normal operation. Therefore, by Definition 3, the potential attackers need to design attack a so that the maximum state variable more thanCmin. Equation (11) shows that the state variation caused by the attack is c. Combined with Definition 3,
c∞>Cmin,
where∞is the maximum. According to Equation (11), Equation (23) can be re-written as
HTWH−1 HTWa∞ >Cmin.
NotingA=HTWH−1 HTW, Equation (24) can be re-written as
Aa∞>Cmin.
Aa∞≤Aa2combined with Equation (25) can be derived as
a2>Cmin A2,
whereA2is the induced norm, also known as the spectral norm of the matrix A.
According to the definition of the spectral norm of the matrix,A2=λmax(ATA), whereλmax(ATA)is the largest eigenvalue of matrixATA. So Equation (26) can be re-written as
a2>Cminλmax(ATA).
Remark 6.To induce the operator’s mistake, the attack vector designed must meet certain conditions. As shown in Equation (27), which condition distinguishes the effectiveness of the attack vector and indicates the system’s tolerance to noise.
3.3. The Range of State Estimate Variable
When the attackers make an attack, they need to specify an expected state variablec0at first. The attackers construct a to implements such a state variable. Therefore, it is very essential to understand the range of c and selectc0 in the domain. An attacker can construct the desired attack vector result from picking a suitable value within this domain. However, if an attack is in the range of Corollary 1 in Section 3.1, what is the domain of state variables in the state space? In this subsection, we study the topic. This is a map from attack domain to result domain. As an attacker, this is the knowledge to have before constructing an attack.
Lemma 3
([31]). Let D be a real m-by-n matrix andrank(D)=r. Then the image set of unit sphere surface inRnunder linear transformationTDhas the following properties:
1.
Ifr=n, the image set inRmis an ellipsoid surface, in basis P which can be expressed as
λ1 ς12+λ2 ς22+…+λr ςr2=1.
2.
Ifr<n, the image set inRmis an ellipsoid, in basis P which can be expressed as
λ1 ς12+λ2 ς22+…+λr ςr2≤1,
where P is the left singular matrix of D andςiis the singular value of matrix D.
As seen in Section 3.1, the feasible domain of a is derived. The question of attack vector range is answered. A subset of a is determined in Corollary 1, which is a solid sphere whit the centre of sphere−zand the radiusτ.
Lety=1τ(z+a). Combining with Corollary 1,z+a2≤τcan be re-written as
y2≤1.
Equation (30) shows that column vector y is constrained to a unit sphere and the attack vector a expressed as
a=τy−z.
BecauseA=HTWH−1 HTW, combining Equations (11) and (31), state variations caused by an attack can be written as
c=A(τy−z).
Sincex^=Az, Equation (32) can be re-written as
1τ(c+x^)=Ay.
The singular value decomposition of matrix A can be express as
A=UΣVT.
Lemma 3 shows that inRmthe image set of y is an ellipsoid, Using the columns of U as a set of basis, the ellipsoid can be written as
c1+x^1τσ12+c2+x^2τσ22+…+cr+x^rτσr2≤1.
Equation (35) can be re-written as
c+x^τΣr2≤1,
whereΣris a diagonal matrix whose elements are the singular values of matrix A.
Equation (36) shows the range of state change under attack. An attacker can select a specificc0in the range to construct an attack vector when they make an FDIA. However, since the representation of the state is under the natural basis E, it is necessary to convert the coordinate representation of U into the representation of the natural basis E. Since the matrix U is a unitary matrix, the basis transformation matrixUTcan convert the coordinates under the basis U into coordinates under the basis E. The coordinates of the image set of y with E as the basis can be expressed as
c+UTx^τΣr2≤1.
Remark 7.If attack vector satisfies Corollary 1, its effect on state is limited.
3.4. Sparse Attack Vector Construction Based onl0Norm
In this subsection, c is selected with the restriction of Equation (37) as derived in Section 3.3. Attackers also needs to consider that it is unrealistic to tamper with the measurements on a large scale. This will not only increase the cost but also increase the possibility of being detected. Therefore, the sparseness of the attack vector is chosen as the objective function, the design problem is transformed into an optimization problem ofl0-norm.
Sincec=Aa, after the desired state variablec0is determined as the attackers, if they have access to all the measuring instruments, the current measurements will construct the attack vector to meet the attacks’ needs. To reduce the cost and risk of the attack, the attackers tend to the modified measurement as little as possible, i.e., the attack vector should be as sparse as possible. Therefore, the attacker’s requirements can be described as
argamina0s.t.c0=Aa
There are other constraints when the effectiveness (see Section 3.2) and the feasibility (see Section 3.1) of the attack vector are considered. The feasible domain is concerned in Section 3.2 and Equation (27) can be taken as the effectiveness constraint of attack vector. The construction problem of sparse effective attack vectors can be expressed as Equation (38). Hence, when designing an attack vector a and take into account the feasible domain (see Section 3.1) and the effectiveness (see Section 3.2). This changes Equation (38) to Equation (39) below:
argamina0s.t.c0=Aaz+a2≤τa2>Cminλmax(ATA)
Equation (39) represents a constrainedl0 -norm optimization problem, which is a non-convex optimization. Compare with the methods in [25,26,27], the constraint in this methodz+a2≤τ on attack vectors are relaxed, which can improve the sparseness of attack vectors. Compare with the literature [30], the effectiveness of the attack in this method is explicitly specified. Moreover, the variable domain of the state is proposed in this method, which gives the attacker a reference when carrying out an attack. Since the above model is thel0 -norm optimization problem, the greedy algorithm can be used to solve it. In this paper, the OMP algorithm is used to solve the problem. The OMP algorithm is often used in the study of compressed sensing, and it described in the literature [32]. The OMP algorithm pseudo-code (Algorithm 1) is given below.
Algorithm 1 OMP algorithm for sparse constrained a |
Require: Expected state variationc0, dictionary A, sparseness k. |
Ensure: Sparse attack vector a. |
1: Initial solutiona0=0, initial residualr0=c0,i=1, initialΛ=∅. |
2: repeat |
3:tf=AjT ri−12/Aj22,∀j∈{1,…,n}(Sweep) |
4:tk=argmaxk tk:∀k∉Λ(Find new minimizer) |
5: Ifz+a2≤τ, else break; |
6:Λ=Λ∪{k}(Update provisional solution) |
7:a(Λ)=(A(Λ)TA(Λ))−1A(Λ)T c0(Update provisional solution) |
8:ri=c0−A(Λ)a(Λ)(Update residual) |
9: i=i+1 |
10: untili>k |
The attackers implement an attack that can be expressed as follows. First, adversaries implant virus software by hacking into the target host. Then, the adversaries continuously steal measurement z. After that, adversaries can construct the appropriate attack vector a using this method based on the stolen measurements. Then, the constructed attack is implanted in the available measurement and uploaded to the control station. Finally, the control station will be misled by the attacked data and makes a series of wrong operations, which will cause the system to crash. 4. Simulations Study To verify its feasibility and effectiveness, the proposed new sparse attack strategy is tested on the Institute of Electrical and Electronic Engineers (IEEE) 14-bus system and a coastal distribution network. After the measurement z captured, there are four steps for designing:
-
Step 1: DetermineΠa which is the feasible domain of the attack vector. (see Section 3.1).
-
Step 2: The state variation domain can be calculated byΠa (see Section 3.3).
-
Step 3: Selectc0in the state variation domain as the expected variation.
- Step 4: Construct an attack vector using the Algorithm 1.
4.1. Case 1:IEEE 14-bus System
Figure 2 is the one-line diagram of the IEEE 14-bus system. Node 1 is the reference node. Assuming the system is fully measurable. For the system, there are 54 measurements, andz∈R54×1.z1:14are the active power of the bus,z15:34are the inflow nodes branch power andz35:54are the outflow nodes branch power. The measurement is subject to the Gaussian distribution noisevi∈N0,0.052. The full measurement matrixH∈R54×13.
The degrees of freedom of the Chi-square detector ism−n=41. According to the Chi-square distribution table, the BDD detection threshold isτ=56.942when the significance level is 0.05.
The domainΠa can be calculated after the measurement z is knowing to the attacks. Figure 3 is the range of state variation (see Section 3.3) under the basis U, it needs to be transformed into the range under the basis E. Since the state variable is a high-dimensional vector, it cannot be completely presented in two-dimensional coordinates. In Figure 3, the red cycles are the center of the state variable and the triangles are intersection point with each axis coordinate.
To verify the effectiveness of the proposed method, a specific state variation is chosen as
c0=−UTx^+0.100τσ3…0.
Figure 4 shows the influence ofc0on the state estimation results, where the state estimation will deviate greatly from the real estimation results.
Table 1 shows the attacked measurement indexes selected under different sparseness k, which k is the total number ofziunder attack. It is observed thatz2is an important measurement since it is always in the index list to be attacked. Therefore, as a defender, it is important to securez2from being attacked. Avoided as much as possible from attackers.
Figure 5 is the attack vectors with two values of the sparseness k. The horizontal axis represents the measurement indexes and the vertical axis is the value of injected data.
There are different effects variations on state estimation with different sparse attack vectors. Figure 6 shows the attack vector’s effects with different sparse a. Figure 6 shows that whenk=2, the selected a has been able to achieve the main effect on state estimation. Moreover, with the continuous increase of sparseness, the effect generated by a keeps approaching the expectedc0. Whenk=13, the effect basically approximatesc0.
Therefore, an attacker can choose different sparseness a base on their demands. If an attacker expects state variation controlled accurately, they can also choose a as sparse as possible. Or, if only the main variations required, an extreme sparse a can be chosen.
The residual detection is shown in Figure 7. Residual detection results show that the proposed algorithm can trace a sufficiently sparse attack vector a in the feasible domain and the residual caused by a is less than the threshold. Figure 8 is the results of state estimation after different sparseness a injected into measurement, shows the attacks’ effectiveness are satisfied.
4.2. Case 2: Coastal Distribution Network
To further verify the feasibility and effectiveness, another simulation experiment is the actual coastal distribution network system. The coastal distribution network system topology is shown as the Figure 9 [33].
The distribution network system consists of 23 nodes, 12 transformers, and 15 transmission lines. The corresponding voltage levels are shown in Table 2, Table 3 and Table 4. The distribution network system includes 22 branches, 67 measurements and 22 states, therefore the measurement matrixH∈R67×22. The thresholdτ=61.32can be determined by the Chi-square distribution table.
When the effectiveness is considered, the expected state variationc0is chosen as
c0=−UTx^+0.005τ×0…σ5…0.
The state variationc0is outside±10%, therefore the control center will adjust the generator output or load. Afterc0is determined, the proposed algorithm can be used to construct the attack vector a. The attack vectors selected under the sparsenessk=1,2 are shown in Table 5:
The attack vectors injected into the corresponding measurement indexes, the results of the Chi-square test is shown in Table 6:
Figure 10 shows that the effect of state estimator under attacking and simulation results show that the proposed method is correct and effective. Moreover, the proposed method guarantees the attack vectors’ sparseness.
4.3. Discussion
It can be seen from the results of Cases 1 and 2 that the generated attack vector can achieve the effect of the attacker without triggering the BDD alarm. In terms of the sparseness, this method is shown in Figure 6 that the generated attack has been able to achieve the main effect on state estimation whenk=2. This indicates that up to 96% sparseness has been able to achieve the main effect, and the attackers simply needs to tamper with the results of two sensors, and the costs and risks are greatly reduced. Moreover, with the continuous increase of nonzero elements, the effect generated by attack keeps approaching the expected. However, the method proposed in this paper requires the attackers to have access to all the meters, it is valuable to develop method to reduce this demand in the future.
5. Conclusions
To help to improve SGs security and more effective defense against attacks, the FDIA attack vector design method in SGs is studied. From the point of the attackers, to construct sparser and effective attack vectors, the feasible region of attack vectors based on the vulnerability of the Chi-square detector is derived. Then, the attack vector validity constraint is proposed when the selected attack vectors could impact on the system. Next, the domain of the state variations caused by the attack vector in the feasible region is calculated. This provides the basis for the attacker to select the appropriate target state variable. Finally, an attack vector is constructed based onl0-norm using OMP algorithms in the feasible region. The method proposed in this paper can improve the sparseness of attack and reduce the risks and costs. Moreover, the attack vector feasible region and state variable domain derived can also provide theoretical support for other design methods. However, the theory still needs to have access to all the instruments. It will be meaningful to reduce this requirement in future research. Furthermore, it is meritorious to propose a new false data attack detection method in the future.
Sparseness k | Selected Measurement Position |
---|---|
1 | 2 |
2 | 2, 4 |
4 | 2, 4, 15, 21 |
5 | 2, 4, 6, 15, 21 |
9 | 2, 4, 5, 6, 7, 11, 13, 15, 21 |
11 | 2, 4, 5, 6, 7, 10, 11, 13, 15, 21, 53 |
13 | 2, 3, 4, 5, 6, 7, 9, 10, 11, 13, 15, 21, 53 |
Network Level | Transformers |
---|---|
110 kv | T1 |
35 kv | T2,T3,T4,T5 |
10 kv | T6,T7,T8,T9,T10,T11,T12 |
Network Level | Lines |
---|---|
35 kv | L1,L2,L3,L4,L5 |
10 kv | L6,L7,L8,L9,L10,L11,L12,L13,L14,L15 |
Network Level | Nodes |
---|---|
110 kv | N1 |
35 kv | N2,N3,N4,N5,N7 |
10 kv | N6,N8,N9,N10,N11,N12,N14,N16,N18,N20,N21,N22 |
0.4 kv | N13,N15,N17,N19,N23 |
Sparseness | Selected Measurement Position | Injected False Value |
---|---|---|
1 | 5 | 26.437 |
2 | 5 | 30.882 |
26 | −11.998 |
Detection Threshold | Sparsenessk=1 | Sparsenessk=2 |
---|---|---|
61.32 | 23.38 | 29.46 |
Author Contributions
Conceptualization, M.X. and D.D.; Formal analysis, M.X., D.D. and T.Y.; Funding acquisition, M.F. and X.L.; Investigation, M.X. and X.L.; Methodology, M.X., D.D. and X.L.; Project administration, M.F.; Resources, D.D. and M.F.; Supervision, D.D., M.F., X.L. and T.Y.; Validation, M.X.; Writing-original draft, M.X., D.D., M.F., X.L, T.Y.; All the authors discussed the results and contributed to the final manuscript. All authors have read and agreed to the published version of the manuscript.
Funding
This research is funded by the National Natural Science Foundation of China (No. 61633016 and No. 61773253), the National Key Research and Development Program of China (No. 2019YFB1405500), the Key Project of Science and Technology Commission of Shanghai Municipality (No. 19500712300, No. 19510750300, and No. 16010500300), and the 111 Project (No. D18003).
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
FDIA | false data injection attack |
SGs | smart grids |
BDD | bad data detection |
OMP | orthogonal matching pursuit |
SCADA | supervisory control and data acquisition |
AC | alternating current |
DC | direct current |
ADMM | alternating direction method of multipliers |
WLS | weighted least squares |
PMUs | phase measurement units |
RTUs | remote terminal units |
IEEE | Institute of Electrical and Electronic Engineers |
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2020. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
To improve the security of smart grids (SGs) by finding the system vulnerability, this paper investigates the sparse attack vectors’ construction method for malicious false data injection attack (FDIA). The drawbacks of the existing attack vector construction methods include avoiding discussing the feasible region and validity of the attack vector. For the above drawbacks, this paper has three main contributions: (1) To construct the appropriate attack evading bad data detection (BDD), the feasible region of the attack vector is proved by projection transformation theory. The acquisition of the feasible region can help the defender to formulate the defense strategy; (2) an effective attack is proposed and the constraint of effectiveness is obtained using norm theory; (3) the domain of the state variations caused by the attack vector in the feasible region is calculated, while the singular value decomposition method is adopted. Finally, an attack vector is constructed based onl0-norm using OMP algorithms in the feasible domain. Simulation results confirm the feasibility and effectiveness of the proposed technique.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer