Skip to main content

Bi-level Adversary-Operator Cyberattack Framework and Algorithms for Transmission Networks in Smart Grids

  • Chapter
  • First Online:
Optimization, Learning, and Control for Interdependent Complex Networks

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1123))

Abstract

Transmission system is one of the most important assets in secure power delivery. Recent advancements toward automation of smart grids and application of supervisory control and data acquisition (SCADA) systems have increased vulnerability of power grids to cyberattacks. Cyberattacks on transmission network, specifically the power transmission lines, are among crucial emerging challenges for the operators. If not identified properly and in a timely fashion, they can cause cascading failures leading to blackouts. This chapter tackles false data injection modeling from the attacker’s perspective. It further develops an algorithm for detection of false data injections in transmission lines. To this end, first, a bi-level mixed integer programming problem is introduced to model the attack scenario, where the attacker can target a transmission line in the system and inject false data in load measurements on targeted buses in the system to overflow the targeted line. Second, the problem is analyzed from the operator’s viewpoint and a detection algorithm is proposed using l 1 norm minimization approach to identify the bad measurement vector in data readings. In order to evaluate the effectiveness of the proposed attack model, case studies have been conducted on IEEE 57-bus test system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. X. Yu, Y. Xue, Smart grids: a cyberphysical systems perspective. Proc. IEEE 104(5), 1058–1070 (2016)

    Article  MathSciNet  Google Scholar 

  2. M.H. Cintuglu, O.A. Mohammed, K. Akkaya, A.S. Uluagac, A survey on smart grid cyber-physical system testbeds. IEEE Commun. Surv. Tutorials 19(1), 446–464 (2017)

    Article  Google Scholar 

  3. H. Chung, W. Li, C. Yuen, W. Chung, Y. Zhang, C. Wen, Local cyber-physical attack for masking line outage and topology attack in smart grid. IEEE Trans. Smart Grid 10, 4577–4588 (2019)

    Article  Google Scholar 

  4. A. Imteaj, M.H. Amini, J. Mohammadi, Leveraging decentralized artificial intelligence to enhance resilience of energy networks (2019). arXiv preprint arXiv:1911.07690

    Google Scholar 

  5. Y. Tang, Q. Chen, M. Li, Q. Wang, M. Ni, and X. Fu, Challenge and evolution of cyber attacks in cyber physical power system, in 2016 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC) (IEEE, Xi’an, 2016), pp. 857–862

    Google Scholar 

  6. N. Perlroth, D.E. Sanger, Cyberattacks put Russian fingers on the switch at power plants, US says. New York Times 15 (2018)

    Google Scholar 

  7. T. Maurer, Cyber Mercenaries (Cambridge University Press, Cambridge, 2018)

    Book  Google Scholar 

  8. Y. Cai, Y. Cao, Y. Li, T. Huang, B. Zhou, Cascading failure analysis considering interaction between power grids and communication networks. IEEE Trans. Smart Grid 7(1), 530–538 (2015)

    Article  Google Scholar 

  9. X. Liu, Z. Li, X. Liu, and Z. Li, Masking transmission line outages via false data injection attacks. IEEE Trans. Inf. Forensics Secur. 11(7), 1592–1602 (2016)

    Article  Google Scholar 

  10. L. Wei, D. Gao, C. Luo, False data injection attacks detection with deep belief networks in smart grid, in 2018 Chinese Automation Congress (CAC) (2018), pp. 2621–2625

    Google Scholar 

  11. Y. Xiang, Z. Ding, Y. Zhang, L. Wang, Power system reliability evaluation considering load redistribution attacks. IEEE Trans. Smart Grid 8(2), 889–901 (2016)

    Google Scholar 

  12. Y. Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1), 13 (2011)

    Article  Google Scholar 

  13. L. Liu, M. Esmalifalak, Q. Ding, V.A. Emesih, Z. Han, Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid 5(2), 612–621 (2014)

    Article  Google Scholar 

  14. O. Kosut, L. Jia, R.J. Thomas, L. Tong, Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2(4), 645–658 (2011)

    Article  Google Scholar 

  15. G. Chaojun, P. Jirutitijaroen, M. Motani, Detecting false data injection attacks in AC state estimation. IEEE Trans. Smart Grid 6(5), 2476–2483 (2015)

    Article  Google Scholar 

  16. L. Xie, Y. Mo, B. Sinopoli, Integrity data attacks in power market operations. IEEE Trans. Smart Grid 2(4), 659–666 (2011)

    Article  Google Scholar 

  17. S. Barreto, M. Pignati, G. Dán, J.-Y. Le Boudec, M. Paolone, Undetectable timing-attack on linear state-estimation by using rank-1 approximation. IEEE Trans. Smart Grid 9(4), 3530–3542 (2018)

    Article  Google Scholar 

  18. X. Liu, Z. Li, Local load redistribution attacks in power systems with incomplete network information. IEEE Trans. Smart Grid 5(4), 1665–1676 (2014)

    Article  Google Scholar 

  19. Y. Yuan, Z. Li, K. Ren, Quantitative analysis of load redistribution attacks in power systems. IEEE Trans. Parallel Distrib. Syst. 23(9), 1731–1738 (2012)

    Article  Google Scholar 

  20. Z. Li, M. Shahidehpour, A. Alabdulwahab, A. Abusorrah, Bilevel model for analyzing coordinated cyber-physical attacks on power systems. IEEE Trans. Smart Grid 7(5), 2260–2272 (2016)

    Article  Google Scholar 

  21. M. Tian, M. Cui, Z. Dong, X. Wang, S. Yin, L. Zhao, Multilevel programming-based coordinated cyber physical attacks and countermeasures in smart grid. IEEE Access 7, 9836–9847 (2019)

    Article  Google Scholar 

  22. J. Liang, L. Sankar, O. Kosut, Vulnerability analysis and consequences of false data injection attack on power system state estimation. IEEE Trans. Power Syst. 31(5), 3864–3872 (2016)

    Article  Google Scholar 

  23. X. Liu, Z. Li, Trilevel modeling of cyber attacks on transmission lines. IEEE Trans. Smart Grid 8(2), 720–729 (2017)

    Article  Google Scholar 

  24. Y. Tan, Y. Li, Y. Cao, M. Shahidehpour, Cyber-attack on overloading multiple lines: a bilevel mixed-integer linear programming model. IEEE Trans. Smart Grid 9(2), 1534–1536 (2018)

    Article  Google Scholar 

  25. G. Giannakis, V. Kekatos, N. Gatsis, S.-J. Kim, H. Zhu, B. Wollenberg, Monitoring and optimization for power grids: a signal processing perspective. IEEE Signal Process. Mag. 30(5), 107–128 (2013)

    Article  Google Scholar 

  26. A.J. Wood, B.F. Wollenberg, G.B. Sheblé, Power Generation, Operation, and Control (Wiley, New York, 2013)

    Google Scholar 

  27. Y. Yuan, Z. Li, K. Ren, Modeling load redistribution attacks in power systems. IEEE Trans. Smart Grid 2(2), 382–390 (2011)

    Article  Google Scholar 

  28. G. Dantzig, Linear Programming and Extensions (Princeton University Press, Princeton, 2016)

    Google Scholar 

  29. A. Gholami, T. Shekari, M.H. Amirioun, F. Aminifar, M.H. Amini, A. Sargolzaei, Toward a consensus on the definition and taxonomy of power system resilience. IEEE Access 6, 32035–32053 (2018)

    Article  Google Scholar 

  30. M.H. Amini, M. Rahmani, K.G. Boroojeni, G. Atia, S.S. Iyengar, O. Karabasoglu, Sparsity-based error detection in dc power flow state estimation, in 2016 IEEE International Conference on Electro Information Technology (EIT) (IEEE, Grand Forks, 2016), pp. 0263–0268

    Google Scholar 

  31. M. Rahmani, G.K. Atia, High dimensional low rank plus sparse matrix decomposition. IEEE Trans. Signal Process. 65(8), 2004–2019 (2017)

    Article  MathSciNet  MATH  Google Scholar 

  32. E. Candes, J. Romberg, Sparsity and incoherence in compressive sampling. Inverse Probl. 23(3), 969 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  33. E.J. Candès, J. Romberg, T. Tao, Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 52(2), 489–509 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  34. E.J. Candes, T. Tao, Near-optimal signal recovery from random projections: universal encoding strategies? IEEE Trans. Inf. Theory 52(12), 5406–5425 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  35. E.J. Candes, T. Tao, Decoding by linear programming. IEEE Trans. Inf. Theory 51(12), 4203–4215 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  36. R.D. Zimmerman, C.E. Murillo-Sanchez, R.J. Thomas, MATPOWER: steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 26(1), 12–19 (2011)

    Article  Google Scholar 

Download references

Acknowledgements

This work was under support from Penn State’s Center for Security Research and Education (CSRE) seed grant 2019.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Hadi Amini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Amini, M.H., Khazaei, J., Khezrimotlagh, D., Asrari, A. (2020). Bi-level Adversary-Operator Cyberattack Framework and Algorithms for Transmission Networks in Smart Grids. In: Amini, M. (eds) Optimization, Learning, and Control for Interdependent Complex Networks. Advances in Intelligent Systems and Computing, vol 1123. Springer, Cham. https://doi.org/10.1007/978-3-030-34094-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34094-0_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34093-3

  • Online ISBN: 978-3-030-34094-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics