Abstract
Transmission system is one of the most important assets in secure power delivery. Recent advancements toward automation of smart grids and application of supervisory control and data acquisition (SCADA) systems have increased vulnerability of power grids to cyberattacks. Cyberattacks on transmission network, specifically the power transmission lines, are among crucial emerging challenges for the operators. If not identified properly and in a timely fashion, they can cause cascading failures leading to blackouts. This chapter tackles false data injection modeling from the attacker’s perspective. It further develops an algorithm for detection of false data injections in transmission lines. To this end, first, a bi-level mixed integer programming problem is introduced to model the attack scenario, where the attacker can target a transmission line in the system and inject false data in load measurements on targeted buses in the system to overflow the targeted line. Second, the problem is analyzed from the operator’s viewpoint and a detection algorithm is proposed using l 1 norm minimization approach to identify the bad measurement vector in data readings. In order to evaluate the effectiveness of the proposed attack model, case studies have been conducted on IEEE 57-bus test system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
X. Yu, Y. Xue, Smart grids: a cyberphysical systems perspective. Proc. IEEE 104(5), 1058–1070 (2016)
M.H. Cintuglu, O.A. Mohammed, K. Akkaya, A.S. Uluagac, A survey on smart grid cyber-physical system testbeds. IEEE Commun. Surv. Tutorials 19(1), 446–464 (2017)
H. Chung, W. Li, C. Yuen, W. Chung, Y. Zhang, C. Wen, Local cyber-physical attack for masking line outage and topology attack in smart grid. IEEE Trans. Smart Grid 10, 4577–4588 (2019)
A. Imteaj, M.H. Amini, J. Mohammadi, Leveraging decentralized artificial intelligence to enhance resilience of energy networks (2019). arXiv preprint arXiv:1911.07690
Y. Tang, Q. Chen, M. Li, Q. Wang, M. Ni, and X. Fu, Challenge and evolution of cyber attacks in cyber physical power system, in 2016 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC) (IEEE, Xi’an, 2016), pp. 857–862
N. Perlroth, D.E. Sanger, Cyberattacks put Russian fingers on the switch at power plants, US says. New York Times 15 (2018)
T. Maurer, Cyber Mercenaries (Cambridge University Press, Cambridge, 2018)
Y. Cai, Y. Cao, Y. Li, T. Huang, B. Zhou, Cascading failure analysis considering interaction between power grids and communication networks. IEEE Trans. Smart Grid 7(1), 530–538 (2015)
X. Liu, Z. Li, X. Liu, and Z. Li, Masking transmission line outages via false data injection attacks. IEEE Trans. Inf. Forensics Secur. 11(7), 1592–1602 (2016)
L. Wei, D. Gao, C. Luo, False data injection attacks detection with deep belief networks in smart grid, in 2018 Chinese Automation Congress (CAC) (2018), pp. 2621–2625
Y. Xiang, Z. Ding, Y. Zhang, L. Wang, Power system reliability evaluation considering load redistribution attacks. IEEE Trans. Smart Grid 8(2), 889–901 (2016)
Y. Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1), 13 (2011)
L. Liu, M. Esmalifalak, Q. Ding, V.A. Emesih, Z. Han, Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid 5(2), 612–621 (2014)
O. Kosut, L. Jia, R.J. Thomas, L. Tong, Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2(4), 645–658 (2011)
G. Chaojun, P. Jirutitijaroen, M. Motani, Detecting false data injection attacks in AC state estimation. IEEE Trans. Smart Grid 6(5), 2476–2483 (2015)
L. Xie, Y. Mo, B. Sinopoli, Integrity data attacks in power market operations. IEEE Trans. Smart Grid 2(4), 659–666 (2011)
S. Barreto, M. Pignati, G. Dán, J.-Y. Le Boudec, M. Paolone, Undetectable timing-attack on linear state-estimation by using rank-1 approximation. IEEE Trans. Smart Grid 9(4), 3530–3542 (2018)
X. Liu, Z. Li, Local load redistribution attacks in power systems with incomplete network information. IEEE Trans. Smart Grid 5(4), 1665–1676 (2014)
Y. Yuan, Z. Li, K. Ren, Quantitative analysis of load redistribution attacks in power systems. IEEE Trans. Parallel Distrib. Syst. 23(9), 1731–1738 (2012)
Z. Li, M. Shahidehpour, A. Alabdulwahab, A. Abusorrah, Bilevel model for analyzing coordinated cyber-physical attacks on power systems. IEEE Trans. Smart Grid 7(5), 2260–2272 (2016)
M. Tian, M. Cui, Z. Dong, X. Wang, S. Yin, L. Zhao, Multilevel programming-based coordinated cyber physical attacks and countermeasures in smart grid. IEEE Access 7, 9836–9847 (2019)
J. Liang, L. Sankar, O. Kosut, Vulnerability analysis and consequences of false data injection attack on power system state estimation. IEEE Trans. Power Syst. 31(5), 3864–3872 (2016)
X. Liu, Z. Li, Trilevel modeling of cyber attacks on transmission lines. IEEE Trans. Smart Grid 8(2), 720–729 (2017)
Y. Tan, Y. Li, Y. Cao, M. Shahidehpour, Cyber-attack on overloading multiple lines: a bilevel mixed-integer linear programming model. IEEE Trans. Smart Grid 9(2), 1534–1536 (2018)
G. Giannakis, V. Kekatos, N. Gatsis, S.-J. Kim, H. Zhu, B. Wollenberg, Monitoring and optimization for power grids: a signal processing perspective. IEEE Signal Process. Mag. 30(5), 107–128 (2013)
A.J. Wood, B.F. Wollenberg, G.B. Sheblé, Power Generation, Operation, and Control (Wiley, New York, 2013)
Y. Yuan, Z. Li, K. Ren, Modeling load redistribution attacks in power systems. IEEE Trans. Smart Grid 2(2), 382–390 (2011)
G. Dantzig, Linear Programming and Extensions (Princeton University Press, Princeton, 2016)
A. Gholami, T. Shekari, M.H. Amirioun, F. Aminifar, M.H. Amini, A. Sargolzaei, Toward a consensus on the definition and taxonomy of power system resilience. IEEE Access 6, 32035–32053 (2018)
M.H. Amini, M. Rahmani, K.G. Boroojeni, G. Atia, S.S. Iyengar, O. Karabasoglu, Sparsity-based error detection in dc power flow state estimation, in 2016 IEEE International Conference on Electro Information Technology (EIT) (IEEE, Grand Forks, 2016), pp. 0263–0268
M. Rahmani, G.K. Atia, High dimensional low rank plus sparse matrix decomposition. IEEE Trans. Signal Process. 65(8), 2004–2019 (2017)
E. Candes, J. Romberg, Sparsity and incoherence in compressive sampling. Inverse Probl. 23(3), 969 (2007)
E.J. Candès, J. Romberg, T. Tao, Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 52(2), 489–509 (2006)
E.J. Candes, T. Tao, Near-optimal signal recovery from random projections: universal encoding strategies? IEEE Trans. Inf. Theory 52(12), 5406–5425 (2006)
E.J. Candes, T. Tao, Decoding by linear programming. IEEE Trans. Inf. Theory 51(12), 4203–4215 (2005)
R.D. Zimmerman, C.E. Murillo-Sanchez, R.J. Thomas, MATPOWER: steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 26(1), 12–19 (2011)
Acknowledgements
This work was under support from Penn State’s Center for Security Research and Education (CSRE) seed grant 2019.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Amini, M.H., Khazaei, J., Khezrimotlagh, D., Asrari, A. (2020). Bi-level Adversary-Operator Cyberattack Framework and Algorithms for Transmission Networks in Smart Grids. In: Amini, M. (eds) Optimization, Learning, and Control for Interdependent Complex Networks. Advances in Intelligent Systems and Computing, vol 1123. Springer, Cham. https://doi.org/10.1007/978-3-030-34094-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-34094-0_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34093-3
Online ISBN: 978-3-030-34094-0
eBook Packages: EngineeringEngineering (R0)