Resilient Power Grid State Estimation Under False Data Injection Attacks

2018 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT)(2018)

引用 9|浏览4
暂无评分
摘要
The problem of finding an optimal defense strategy against false data injection attacks on state estimation for power systems is considered in this paper. The state of the art utilizes measurement residuals to filter faulty measurements and to detect data integrity attacks. A carefully designed coordinated attack on sensor measurements can bypass the bad data detector (BDD) and may inject arbitrary additive error to the true state estimations. In this work, we propose an optimal defense strategy by applying perturbations to the impedance of transmission lines by D-FACTS devices and monitoring their effects on the system. The problem of finding the optimal set of target transmission lines for perturbation is formulated as an optimization problem so that to minimize the maximum additive error to the true state estimations. Additionally, we have considered a game theoretic approach to obtain the optimal probability of choosing an action from the actions set for the attacker and the defender. In this case, the attacker actions are defined as targeting any subset of the set of vulnerable system states and the defender actions are defined as changing the particular choice of a set of candidate transmission lines according to the derived optimal probability for the given game. To obtain the optimal defense strategy, the worst case scenario has considered where the knowledge of the set of transmission lines to be perturbed and their level of perturbations are common information between the attacker and the defender. The effectiveness of the proposed approaches are studied through simulations for a 14-bus system.
更多
查看译文
关键词
coordinated attack,transmission lines,optimal probability,resilient power grid state estimation,vulnerable system states,attacker actions,maximum additive error,optimization problem,arbitrary additive error,bad data detector,sensor measurements,data integrity attacks,faulty measurements,measurement residuals,power systems,optimal defense strategy,false data injection attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要