Skip to main content
Log in

Active resilient defense control against false data injection attacks in smart grids

  • Research Article
  • Published:
Control Theory and Technology Aims and scope Submit manuscript

Abstract

The emerging of false data injection attacks (FDIAs) can fool the traditional detection methods by injecting false data, which has brought huge risks to the security of smart grids. For this reason, a resilient active defense control scheme based on interval observer detection is proposed in this paper to protect smart grids. The proposed active defense highlights the integration of detection and defense against FDIAs in smart girds. First, a dynamic physical grid model under FDIAs is modeled, in which model uncertainty and parameter uncertainty are taken into account. Then, an interval observer-based detection method against FDIAs is proposed, where a detection criteria using interval residual is put forward. Corresponding to the detection results, the resilient defense controller is triggered to defense the FDIAs if the system states are affected by FDIAs. Linear matrix inequality (LMI) approach is applied to design the resilient controller with H\(_{{\infty }}\) performance. The system with the resilient defense controller can be robust to FDIAs and the gain of the resilient controller has a certain gain margin. Our active resilient defense approach can be built in real time and show accurate and quick respond to the injected FDIAs. The effectiveness of the proposed defense scheme is verified by the simulation results on an IEEE 30-bus grid system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Abbreviations

a :

Attack vector

\(B_{ij}\) :

The susceptance of the power line

c :

State change caused by attack

\(D_{i}\) :

The damping coefficient of the ith generator

\(E_{qi}^{^{\prime }}\) :

The transient voltage in quadrature

\(\varkappa _{i}\) :

The inertia coefficient of the ith generator

H :

Jacobian matrix

\(K^{k}\) :

Gain of controller

\(\delta _{i}\) :

The phase angle of the ith generator

\(\omega _{i}\) :

The relative speed of the ith generator

\(\omega _{0}\) :

The synchronous machine speed

\(P_{mi}\) :

The mechanical input power

\(H_{i}\) :

The inertia coefficient of the ith generator

\(X_{ei}\) :

The steam valve opening of the ith generator

\(T_{mi}\) :

The time constant of the ith machine’s turbine

\(K_{mi}\) :

The gain of the ith machine’s turbine

\(T_{ei}\) :

The time constant of the ith machine’s speed governor

\(K_{ei}\) :

The gain of the ith machine’s speed governor

\(R_{i}\) :

The regulation constant of the ith machine

r :

State residual

\(r_{a}\) :

State residual under FDIAs

\(\tau \) :

Precomputed threshold

\(f^{k}\left( t\right) \) :

Attack vector

\(\varDelta A^{k}\) :

The matrix function representing time-varying parameter uncertainty

\(x^{k}\) :

The state vector of the kth interval observer

\({\underline{x}}^{k}\) :

The lower bounds of \(x^{k}\)

\({\bar{x}}^{k}\) :

The upper bounds of \(x^{k}\)

\(y^{k}\) :

The output vector of the kth interval observer

\({\underline{y}}^{k}\) :

The lower bounds of \(y^{k}\)

\({\bar{y}}^{k}\) :

The upper bounds of \(y^{k}\)

\(L^{k}\) :

The gain of the kth interval observer

\({\underline{r}}^{k}\) :

The lower bound of \(r^{k}\) respectively

\({\bar{r}}^{k}\) :

The upper bound of \(r^{k}\) respectively

\(x=\left( x_{1},x_{2},\cdots ,x_{n}\right) ^{\textrm{T}}\) :

State vector

\(z=\left( z_{1},z_{2},\cdots ,z_{n}\right) ^{\textrm{T}}\) :

Measurement vector

\(F^{k}\) :

A known real matrix with appropriate dimension

BDD:

Bad data detection

FDIAs:

False data injection attacks

DoS:

Denial of service attack

PMUs:

Phasor measurement units

WLS:

Weighted least squares

LMI:

Linear matrix inequality

References

  1. Mrabet, Z. E., Kaabouch, N., & Ghazi, H. E. (2018). Cyber-security in smart grid: Survey and challenges. Computers & Electrical Engineering, 67, 469–482.

    Article  Google Scholar 

  2. Fang, X., Misra, S., Xue, G., & Yang, D. (2012). Smart grid—the new and improved power grid: A survey. IEEE Communications Surveys & Tutorials, 14(4), 944–980.

    Article  Google Scholar 

  3. Ten, C. W., Manimaran, G., & Liu, C. C. (2010). Cyber security for critical infrastructures: Attack and defense modeling. IEEE Transactions on Systems, Man and Cybernetics Part A (Systems and Humans), 40(4), 853–865.

    Article  Google Scholar 

  4. Li, B., Liu, Y., & Li, H. (2017). Enlightenment on the security of cyber information system under smart grid from ukraine blackout. Electric Power, 50(5), 71–77.

    Google Scholar 

  5. Liang, G., Weller, S. R., Zhao, J., Luo, F., & Zhao, Y. D. (2017). The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Transactions on Power Systems, 32(4), 3317–3318.

    Article  Google Scholar 

  6. Inayat, U., Zia, M. F., Mahmood, S., & Haris, M. (2022). Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects. MDPI Electronics, 11(9), 1–20.

    Google Scholar 

  7. Ashraf, S., Shawon, M. H., Khalid, H. M., & Muyeen, S. M. (2021). Denial-of-service attack on IEC 61850-based substation automation system: A crucial cyber threat towards smart substation pathways. MDPI Sensors, 21(6415), 1–19.

    Google Scholar 

  8. Liu, Y., Ning, P., & Reiter, M. K. (2011). False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security, 14(1), 1–33.

    Article  Google Scholar 

  9. Xie, L., Mo, Y., & Sinopoli B. (2010). False Data Injection Attacks in Electricity Markets. In the First IEEE International Conference on Smart Grid Communications, pp. 226–231. Gaithersburg, MD, USA.

  10. Yuan, Y., Li, Z., & Ren, K. (2011). Modeling load redistribution attacks in power systems. IEEE Transactions on Smart Grid, 2(2), 382–390.

    Article  Google Scholar 

  11. Deng, R., Xiao, G., Lu, R., et al. (2016). False data injection on state estimation in power systems—attacks, impacts, and defense: A survey. IEEE Transactions on Industrial Informatics, 13(2), 411–423.

    Article  Google Scholar 

  12. Ansari, M. H., Vakili, V. T., Bahrak, B., & Tavassoli, P. (2018). Graph theoretical defense mechanisms against false data injection attacks in smart grids. Journal of Modern Power Systems and Clean Energy, 6(5), 860–871.

    Article  Google Scholar 

  13. Khalid, H. M., & Peng, J. C. (2016). A Bayesian algorithm to enhance the resilience of WAMS applications against cyber attacks. IEEE Transactions on Smart Grid, 7(4), 2026–2037.

    Article  Google Scholar 

  14. Zhu, M., & Martínez, S. (2013). On the performance analysis of resilient networked control systems under replay attacks. IEEE Transactions on Automatic Control, 59(3), 804–808.

    Article  MathSciNet  MATH  Google Scholar 

  15. Manandhar, K., Cao, X., Hu, F., et al. (2014). Detection of faults and attacks including false data injection attack in smart grid using kalman filter. IEEE Transactions on Control of Network Systems, 1(4), 370–379.

    Article  MathSciNet  MATH  Google Scholar 

  16. Khalid, H. M., & Muyeen, S. M. (2020). Cyber-attacks in a looped energy-water nexus: An inoculated sub-observer based approach. IEEE Systems Journal, 14(2), 2054–2065.

    Article  Google Scholar 

  17. Rhouma, T., Chabir, K., & Abdelkrim, M. N. (2018). Resilient control for networked control systems subject to cyber/physical attacks. International Journal of Automation and Computing, 15(3), 99–108.

    Article  Google Scholar 

  18. Musleh, A. S., Khalid, H. M., Muyeen, S. M., & Al-Durra, A. (2019). A prediction algorithm to enhance grid resilience towards cyber attacks in WAMCS applications. IEEE Systems Journal, 13(1), 710–719.

    Article  Google Scholar 

  19. Yuan, Y., Fuchun, S., & Zhu, Q. (2015). Resilient control in the presence of DoS attack: Switched system approach. International Journal of Control, Automation and Systems, 13(6), 1423–1435.

    Article  Google Scholar 

  20. Guo, Y., Hill, D. J., & Wang, Y. (2000). Nonlinear decentralized control of large-scale power systems. Automatica, 36(9), 1275–1289.

    Article  MathSciNet  MATH  Google Scholar 

  21. Chen, J., Liang, G., Cai, Z., Hu, C., Xu, Y., Luo, F., & Zhao, J. (2016). Impact analysis of false data injection attacks on power system static security assessment. Journal of Modern Power Systems and Clean Energy, 4(3), 496–505.

    Article  Google Scholar 

  22. Cao, G., Gu, W., Lou, G., et al. (2022). Distributed synchronous detection for false data injection attack in cyber-physical microgrids. International Journal of Electrical Power & Energy Systems, 137, 107788.

    Article  Google Scholar 

  23. Mo, Y., & Sinopoli, B. (2010). False data injection attacks in control systems. In First Workshop on Secure Control Systems. Stockholm, Sweden.

  24. Xiaoyuan, L., Qian, Y., Xinyu, W., & Guan, X. (2018). Observer-based cyber attack detection and isolation in smart grids. International Journal of Electrical Power & Energy Systems, 101, 127–138.

    Article  Google Scholar 

  25. Yu, L. (2000). Optimal guaranteed cost control of linear uncertain system: An LMI approach. Control Theory and Applications, 17(3), 423–428.

    MathSciNet  MATH  Google Scholar 

  26. Guo, G., & Wang, Y. (2000). Nonlinear output stabilization control for multimachine power systems. IEEE Transactions on Circuits & Systems I Fundamental Theory & Applications, 47(1), 46–53.

    Article  Google Scholar 

  27. Luo, X., Li, Y., Wang, X., & Guan, X. (2020). Interval observer-based detection and localization against false data injection attack in smart grids. IEEE Internet of Things Journal, 8(2), 657–671.

    Article  Google Scholar 

  28. Wang, X., Luo, X., Zhang, M., Jiang, Z., & Guan, X. (2019). Detection and isolation of false data injection attacks in smart grid via unknown input interval observer. IEEE Internet of Things Journal, 7(4), 3214–3229.

    Article  Google Scholar 

  29. Liu, L., Han, Z., & Li, W. (2010). Non-fragile observer-based passive control for uncertain time delay systems subjected to input nonlinearity. Nonlinear Analysis, 73(8), 2603–2610.

    Article  MathSciNet  MATH  Google Scholar 

  30. Kim, J. H., & Park, H. B. (1999). H\(^{\infty }\) state feedback control for generalized continuous/discrete time delay system. Automatica, 35(8), 1443–1451.

    Article  MathSciNet  MATH  Google Scholar 

  31. Hou, L., Luo, X., Wang, X., & Guan, X. (2019). An adaptive control defense scheme of false data injection attacks in smart grids. In the 3rd International Symposium on Autonomous Systems (ISAS), pp. 522–527. Shanghai, China.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinyu Wang.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

This work was supported by the National Nature Science Foundation of China (Nos. 62103357, 62203376), the Science and Technology Plan of Hebei Education Department (No. QN2021139), the Nature Science Foundation of Hebei Province (Nos. F2021203043, F2022203074) and the Open Research Fund of Jiangsu Collaborative Innovation Center for Smart Distribution Network, Nanjing Institute of Technology (No. XTCX202203).

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, X., Hou, L., Wang, X. et al. Active resilient defense control against false data injection attacks in smart grids. Control Theory Technol. 21, 515–529 (2023). https://doi.org/10.1007/s11768-023-00141-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11768-023-00141-2

Keywords

Navigation