{"title":"针对多发电厂电力系统状态估计的线性欺骗攻击设计","authors":"Chuanyi Ning;Fei Hao","doi":"10.1109/TCNS.2024.3431388","DOIUrl":null,"url":null,"abstract":"In this article, we address the problem of designing linear deception attacks against multiplant power systems. In the existing deception attack schemes, only sensor measurement channels are regarded as targets of attackers. Here, attack strategies against the edge measurements in power systems are provided as well to achieve a larger estimation error. Moreover, it is found that attack signals with a dependent nature perform better than the independent ones under the same stealthiness constraints. For dependent attacks, a necessary and sufficient condition to guarantee the unboundedness of the estimation error was obtained. Then, the problem of designing dependent attacks is further analyzed. Different suboptimal attack strategies are provided by solving nonconvex problem or transforming the nonconvex problem into a convex one. It is worth noting that all the attack signals concerned in this article are independent of real-time data of system operation, thus can be designed offline and be easier for application. Finally, simulation results are provided based on the IEEE 4-bus system to demonstrate the feasibility and the efficiency of theoretical results. Comparisons of different attack schemes are provided as well.","PeriodicalId":56023,"journal":{"name":"IEEE Transactions on Control of Network Systems","volume":"12 1","pages":"882-893"},"PeriodicalIF":4.0000,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Design of Linear Deception Attacks Against State Estimation in Multiplant Power Systems\",\"authors\":\"Chuanyi Ning;Fei Hao\",\"doi\":\"10.1109/TCNS.2024.3431388\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this article, we address the problem of designing linear deception attacks against multiplant power systems. In the existing deception attack schemes, only sensor measurement channels are regarded as targets of attackers. Here, attack strategies against the edge measurements in power systems are provided as well to achieve a larger estimation error. Moreover, it is found that attack signals with a dependent nature perform better than the independent ones under the same stealthiness constraints. For dependent attacks, a necessary and sufficient condition to guarantee the unboundedness of the estimation error was obtained. Then, the problem of designing dependent attacks is further analyzed. Different suboptimal attack strategies are provided by solving nonconvex problem or transforming the nonconvex problem into a convex one. It is worth noting that all the attack signals concerned in this article are independent of real-time data of system operation, thus can be designed offline and be easier for application. Finally, simulation results are provided based on the IEEE 4-bus system to demonstrate the feasibility and the efficiency of theoretical results. Comparisons of different attack schemes are provided as well.\",\"PeriodicalId\":56023,\"journal\":{\"name\":\"IEEE Transactions on Control of Network Systems\",\"volume\":\"12 1\",\"pages\":\"882-893\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2024-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Control of Network Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10605050/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Control of Network Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10605050/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Design of Linear Deception Attacks Against State Estimation in Multiplant Power Systems
In this article, we address the problem of designing linear deception attacks against multiplant power systems. In the existing deception attack schemes, only sensor measurement channels are regarded as targets of attackers. Here, attack strategies against the edge measurements in power systems are provided as well to achieve a larger estimation error. Moreover, it is found that attack signals with a dependent nature perform better than the independent ones under the same stealthiness constraints. For dependent attacks, a necessary and sufficient condition to guarantee the unboundedness of the estimation error was obtained. Then, the problem of designing dependent attacks is further analyzed. Different suboptimal attack strategies are provided by solving nonconvex problem or transforming the nonconvex problem into a convex one. It is worth noting that all the attack signals concerned in this article are independent of real-time data of system operation, thus can be designed offline and be easier for application. Finally, simulation results are provided based on the IEEE 4-bus system to demonstrate the feasibility and the efficiency of theoretical results. Comparisons of different attack schemes are provided as well.
期刊介绍:
The IEEE Transactions on Control of Network Systems is committed to the timely publication of high-impact papers at the intersection of control systems and network science. In particular, the journal addresses research on the analysis, design and implementation of networked control systems, as well as control over networks. Relevant work includes the full spectrum from basic research on control systems to the design of engineering solutions for automatic control of, and over, networks. The topics covered by this journal include: Coordinated control and estimation over networks, Control and computation over sensor networks, Control under communication constraints, Control and performance analysis issues that arise in the dynamics of networks used in application areas such as communications, computers, transportation, manufacturing, Web ranking and aggregation, social networks, biology, power systems, economics, Synchronization of activities across a controlled network, Stability analysis of controlled networks, Analysis of networks as hybrid dynamical systems.