Abstract
The emerging of false data injection attacks (FDIAs) can fool the traditional detection methods by injecting false data, which has brought huge risks to the security of smart grids. For this reason, a resilient active defense control scheme based on interval observer detection is proposed in this paper to protect smart grids. The proposed active defense highlights the integration of detection and defense against FDIAs in smart girds. First, a dynamic physical grid model under FDIAs is modeled, in which model uncertainty and parameter uncertainty are taken into account. Then, an interval observer-based detection method against FDIAs is proposed, where a detection criteria using interval residual is put forward. Corresponding to the detection results, the resilient defense controller is triggered to defense the FDIAs if the system states are affected by FDIAs. Linear matrix inequality (LMI) approach is applied to design the resilient controller with H\(_{{\infty }}\) performance. The system with the resilient defense controller can be robust to FDIAs and the gain of the resilient controller has a certain gain margin. Our active resilient defense approach can be built in real time and show accurate and quick respond to the injected FDIAs. The effectiveness of the proposed defense scheme is verified by the simulation results on an IEEE 30-bus grid system.
Similar content being viewed by others
Abbreviations
- a :
-
Attack vector
- \(B_{ij}\) :
-
The susceptance of the power line
- c :
-
State change caused by attack
- \(D_{i}\) :
-
The damping coefficient of the ith generator
- \(E_{qi}^{^{\prime }}\) :
-
The transient voltage in quadrature
- \(\varkappa _{i}\) :
-
The inertia coefficient of the ith generator
- H :
-
Jacobian matrix
- \(K^{k}\) :
-
Gain of controller
- \(\delta _{i}\) :
-
The phase angle of the ith generator
- \(\omega _{i}\) :
-
The relative speed of the ith generator
- \(\omega _{0}\) :
-
The synchronous machine speed
- \(P_{mi}\) :
-
The mechanical input power
- \(H_{i}\) :
-
The inertia coefficient of the ith generator
- \(X_{ei}\) :
-
The steam valve opening of the ith generator
- \(T_{mi}\) :
-
The time constant of the ith machine’s turbine
- \(K_{mi}\) :
-
The gain of the ith machine’s turbine
- \(T_{ei}\) :
-
The time constant of the ith machine’s speed governor
- \(K_{ei}\) :
-
The gain of the ith machine’s speed governor
- \(R_{i}\) :
-
The regulation constant of the ith machine
- r :
-
State residual
- \(r_{a}\) :
-
State residual under FDIAs
- \(\tau \) :
-
Precomputed threshold
- \(f^{k}\left( t\right) \) :
-
Attack vector
- \(\varDelta A^{k}\) :
-
The matrix function representing time-varying parameter uncertainty
- \(x^{k}\) :
-
The state vector of the kth interval observer
- \({\underline{x}}^{k}\) :
-
The lower bounds of \(x^{k}\)
- \({\bar{x}}^{k}\) :
-
The upper bounds of \(x^{k}\)
- \(y^{k}\) :
-
The output vector of the kth interval observer
- \({\underline{y}}^{k}\) :
-
The lower bounds of \(y^{k}\)
- \({\bar{y}}^{k}\) :
-
The upper bounds of \(y^{k}\)
- \(L^{k}\) :
-
The gain of the kth interval observer
- \({\underline{r}}^{k}\) :
-
The lower bound of \(r^{k}\) respectively
- \({\bar{r}}^{k}\) :
-
The upper bound of \(r^{k}\) respectively
- \(x=\left( x_{1},x_{2},\cdots ,x_{n}\right) ^{\textrm{T}}\) :
-
State vector
- \(z=\left( z_{1},z_{2},\cdots ,z_{n}\right) ^{\textrm{T}}\) :
-
Measurement vector
- \(F^{k}\) :
-
A known real matrix with appropriate dimension
- BDD:
-
Bad data detection
- FDIAs:
-
False data injection attacks
- DoS:
-
Denial of service attack
- PMUs:
-
Phasor measurement units
- WLS:
-
Weighted least squares
- LMI:
-
Linear matrix inequality
References
Mrabet, Z. E., Kaabouch, N., & Ghazi, H. E. (2018). Cyber-security in smart grid: Survey and challenges. Computers & Electrical Engineering, 67, 469–482.
Fang, X., Misra, S., Xue, G., & Yang, D. (2012). Smart grid—the new and improved power grid: A survey. IEEE Communications Surveys & Tutorials, 14(4), 944–980.
Ten, C. W., Manimaran, G., & Liu, C. C. (2010). Cyber security for critical infrastructures: Attack and defense modeling. IEEE Transactions on Systems, Man and Cybernetics Part A (Systems and Humans), 40(4), 853–865.
Li, B., Liu, Y., & Li, H. (2017). Enlightenment on the security of cyber information system under smart grid from ukraine blackout. Electric Power, 50(5), 71–77.
Liang, G., Weller, S. R., Zhao, J., Luo, F., & Zhao, Y. D. (2017). The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Transactions on Power Systems, 32(4), 3317–3318.
Inayat, U., Zia, M. F., Mahmood, S., & Haris, M. (2022). Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects. MDPI Electronics, 11(9), 1–20.
Ashraf, S., Shawon, M. H., Khalid, H. M., & Muyeen, S. M. (2021). Denial-of-service attack on IEC 61850-based substation automation system: A crucial cyber threat towards smart substation pathways. MDPI Sensors, 21(6415), 1–19.
Liu, Y., Ning, P., & Reiter, M. K. (2011). False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security, 14(1), 1–33.
Xie, L., Mo, Y., & Sinopoli B. (2010). False Data Injection Attacks in Electricity Markets. In the First IEEE International Conference on Smart Grid Communications, pp. 226–231. Gaithersburg, MD, USA.
Yuan, Y., Li, Z., & Ren, K. (2011). Modeling load redistribution attacks in power systems. IEEE Transactions on Smart Grid, 2(2), 382–390.
Deng, R., Xiao, G., Lu, R., et al. (2016). False data injection on state estimation in power systems—attacks, impacts, and defense: A survey. IEEE Transactions on Industrial Informatics, 13(2), 411–423.
Ansari, M. H., Vakili, V. T., Bahrak, B., & Tavassoli, P. (2018). Graph theoretical defense mechanisms against false data injection attacks in smart grids. Journal of Modern Power Systems and Clean Energy, 6(5), 860–871.
Khalid, H. M., & Peng, J. C. (2016). A Bayesian algorithm to enhance the resilience of WAMS applications against cyber attacks. IEEE Transactions on Smart Grid, 7(4), 2026–2037.
Zhu, M., & Martínez, S. (2013). On the performance analysis of resilient networked control systems under replay attacks. IEEE Transactions on Automatic Control, 59(3), 804–808.
Manandhar, K., Cao, X., Hu, F., et al. (2014). Detection of faults and attacks including false data injection attack in smart grid using kalman filter. IEEE Transactions on Control of Network Systems, 1(4), 370–379.
Khalid, H. M., & Muyeen, S. M. (2020). Cyber-attacks in a looped energy-water nexus: An inoculated sub-observer based approach. IEEE Systems Journal, 14(2), 2054–2065.
Rhouma, T., Chabir, K., & Abdelkrim, M. N. (2018). Resilient control for networked control systems subject to cyber/physical attacks. International Journal of Automation and Computing, 15(3), 99–108.
Musleh, A. S., Khalid, H. M., Muyeen, S. M., & Al-Durra, A. (2019). A prediction algorithm to enhance grid resilience towards cyber attacks in WAMCS applications. IEEE Systems Journal, 13(1), 710–719.
Yuan, Y., Fuchun, S., & Zhu, Q. (2015). Resilient control in the presence of DoS attack: Switched system approach. International Journal of Control, Automation and Systems, 13(6), 1423–1435.
Guo, Y., Hill, D. J., & Wang, Y. (2000). Nonlinear decentralized control of large-scale power systems. Automatica, 36(9), 1275–1289.
Chen, J., Liang, G., Cai, Z., Hu, C., Xu, Y., Luo, F., & Zhao, J. (2016). Impact analysis of false data injection attacks on power system static security assessment. Journal of Modern Power Systems and Clean Energy, 4(3), 496–505.
Cao, G., Gu, W., Lou, G., et al. (2022). Distributed synchronous detection for false data injection attack in cyber-physical microgrids. International Journal of Electrical Power & Energy Systems, 137, 107788.
Mo, Y., & Sinopoli, B. (2010). False data injection attacks in control systems. In First Workshop on Secure Control Systems. Stockholm, Sweden.
Xiaoyuan, L., Qian, Y., Xinyu, W., & Guan, X. (2018). Observer-based cyber attack detection and isolation in smart grids. International Journal of Electrical Power & Energy Systems, 101, 127–138.
Yu, L. (2000). Optimal guaranteed cost control of linear uncertain system: An LMI approach. Control Theory and Applications, 17(3), 423–428.
Guo, G., & Wang, Y. (2000). Nonlinear output stabilization control for multimachine power systems. IEEE Transactions on Circuits & Systems I Fundamental Theory & Applications, 47(1), 46–53.
Luo, X., Li, Y., Wang, X., & Guan, X. (2020). Interval observer-based detection and localization against false data injection attack in smart grids. IEEE Internet of Things Journal, 8(2), 657–671.
Wang, X., Luo, X., Zhang, M., Jiang, Z., & Guan, X. (2019). Detection and isolation of false data injection attacks in smart grid via unknown input interval observer. IEEE Internet of Things Journal, 7(4), 3214–3229.
Liu, L., Han, Z., & Li, W. (2010). Non-fragile observer-based passive control for uncertain time delay systems subjected to input nonlinearity. Nonlinear Analysis, 73(8), 2603–2610.
Kim, J. H., & Park, H. B. (1999). H\(^{\infty }\) state feedback control for generalized continuous/discrete time delay system. Automatica, 35(8), 1443–1451.
Hou, L., Luo, X., Wang, X., & Guan, X. (2019). An adaptive control defense scheme of false data injection attacks in smart grids. In the 3rd International Symposium on Autonomous Systems (ISAS), pp. 522–527. Shanghai, China.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
This work was supported by the National Nature Science Foundation of China (Nos. 62103357, 62203376), the Science and Technology Plan of Hebei Education Department (No. QN2021139), the Nature Science Foundation of Hebei Province (Nos. F2021203043, F2022203074) and the Open Research Fund of Jiangsu Collaborative Innovation Center for Smart Distribution Network, Nanjing Institute of Technology (No. XTCX202203).
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Luo, X., Hou, L., Wang, X. et al. Active resilient defense control against false data injection attacks in smart grids. Control Theory Technol. 21, 515–529 (2023). https://doi.org/10.1007/s11768-023-00141-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11768-023-00141-2