False Data Injection Attack with Max-Min Optimization in Smart Grid

IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Poornachandratejasvi Laxman Bhattar, Naran M Pindoriya
{"title":"False Data Injection Attack with Max-Min Optimization in Smart Grid","authors":"Poornachandratejasvi Laxman Bhattar,&nbsp;Naran M Pindoriya","doi":"10.1016/j.cose.2024.103761","DOIUrl":null,"url":null,"abstract":"<div><p>With the proliferation of information and communication technology (ICT), the smart grid is critically vulnerable to cyber-attacks such as false data injection (FDI), denial-of-service, and data spoofing. The cyber-attackers defunctionalize critical operations of the smart grid by compromising the ICT. The decisions for the critical operation of the smart grid are processed with a state estimator, and ICT makes the state estimator vulnerable to FDI attacks. Hence, vulnerability analysis of the state estimator needs to be investigated for potential FDI attacks to protect it from future cyber-attacks. This work proposes the FDI attack vector construction without the knowledge of bad data detection (BDD) threshold on linear and non-linear state estimators using max-min optimization considering the partial network information. The optimization problem is formulated from the attacker's perspective to target the manipulation of measurements in the attack zone so as to increase the generation cost. The equivalent power injection model is developed for the attack zone to construct the deceptive attacks using DC and AC power flow models. The effectiveness of the proposed framework has been tested on 5 bus PJM network, modified IEEE 30 bus, IEEE 57 bus, and IEEE 118 bus system. The proposed framework is compared with existing state-of-art methods (viz., linear attack policy, non-linear attack policy, load redistribution attack, and line flow attack) to assess its efficacy. It is observed that the developed FDI attack vector successfully bypasses the bad data detectors such as the chi-square test, largest normalized residue, and <span><math><msub><mi>l</mi><mn>2</mn></msub></math></span> detector that is normally used by the system operator. Moreover, the study compares and discusses the impact of FDI attacks on the estimated state variables obtained with state estimators and, thereby, the generation cost calculated with the DC &amp; AC optimal power flow tool<strong>.</strong></p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"140 ","pages":"Article 103761"},"PeriodicalIF":4.8000,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404824000622","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

With the proliferation of information and communication technology (ICT), the smart grid is critically vulnerable to cyber-attacks such as false data injection (FDI), denial-of-service, and data spoofing. The cyber-attackers defunctionalize critical operations of the smart grid by compromising the ICT. The decisions for the critical operation of the smart grid are processed with a state estimator, and ICT makes the state estimator vulnerable to FDI attacks. Hence, vulnerability analysis of the state estimator needs to be investigated for potential FDI attacks to protect it from future cyber-attacks. This work proposes the FDI attack vector construction without the knowledge of bad data detection (BDD) threshold on linear and non-linear state estimators using max-min optimization considering the partial network information. The optimization problem is formulated from the attacker's perspective to target the manipulation of measurements in the attack zone so as to increase the generation cost. The equivalent power injection model is developed for the attack zone to construct the deceptive attacks using DC and AC power flow models. The effectiveness of the proposed framework has been tested on 5 bus PJM network, modified IEEE 30 bus, IEEE 57 bus, and IEEE 118 bus system. The proposed framework is compared with existing state-of-art methods (viz., linear attack policy, non-linear attack policy, load redistribution attack, and line flow attack) to assess its efficacy. It is observed that the developed FDI attack vector successfully bypasses the bad data detectors such as the chi-square test, largest normalized residue, and l2 detector that is normally used by the system operator. Moreover, the study compares and discusses the impact of FDI attacks on the estimated state variables obtained with state estimators and, thereby, the generation cost calculated with the DC & AC optimal power flow tool.

智能电网中的最大最小优化虚假数据注入攻击
随着信息和通信技术(ICT)的普及,智能电网极易受到虚假数据注入(FDI)、拒绝服务和数据欺骗等网络攻击。网络攻击者通过破坏信息和通信技术使智能电网的关键运行失灵。智能电网关键运行的决策是通过状态估计器处理的,而信息和通信技术使状态估计器容易受到 FDI 攻击。因此,需要针对潜在的 FDI 攻击对状态估计器进行脆弱性分析,以保护其免受未来的网络攻击。本研究提出了在不知道坏数据检测(BDD)阈值的情况下,利用最大最小优化(考虑部分网络信息)对线性和非线性状态估计器构建 FDI 攻击向量。优化问题从攻击者的角度出发,以操纵攻击区域内的测量数据为目标,从而增加生成成本。为攻击区域开发了等效功率注入模型,利用直流和交流电流模型构建欺骗性攻击。在 5 总线 PJM 网络、修改后的 IEEE 30 总线、IEEE 57 总线和 IEEE 118 总线系统上测试了拟议框架的有效性。将提议的框架与现有的先进方法(即线性攻击策略、非线性攻击策略、负载再分配攻击和线路流攻击)进行了比较,以评估其有效性。研究发现,所开发的 FDI 攻击向量成功绕过了系统运营商通常使用的坏数据检测器,如卡方检验、最大归一化残差和 l2 检测器。此外,研究还比较并讨论了 FDI 攻击对使用状态估计器获得的估计状态变量的影响,以及由此对使用直流与交流优化功率流工具计算的发电成本的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Computers & Security
Computers & Security 工程技术-计算机:信息系统
CiteScore
12.40
自引率
7.10%
发文量
365
审稿时长
10.7 months
期刊介绍: Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world. Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信