Introduction
Compared with the traditional power grids, a smart grid tends to be much more reliable, efficient, and intelligent due to the remarkable advancements in sensing, monitoring, control technologies, and also the tight integration with cyber infrastructure and advanced computing and communication technologies [1]. However, this integration can lead to new vulnerabilities to cyber attacks on the power systems. Cyber attacks are reported as one of the main potential threats to the reliable operation of the power system [2], [3]. In this paper, we consider false data injection attacks (FDIAs) against the supervisory control and data acquisition (SCADA) system in smart grids.
A power grid transmission system is a sophisticated network which connects a number of electric power generators to various consumers through extensive power lines. It is extremely important to monitor the state of this complex system such that various control and planning tasks can be performed and the reliable operation of the power system is guaranteed. In power systems, state estimation [4], [5] is used to estimate system state variables through a number of power measurements and is a useful and necessary function in energy management systems (EMS).
The SCADA system obtains power status information such as transmission line power flows, bus voltages, and also circuit-braker signals through remote terminal units (RTUs). These measurements are then used for the state estimation process in EMS, which builds real-time electricity network models. In smart grids, the complex network connections as well as the Internet make SCADA systems susceptible to potential FDIAs, in which adversaries aim to contaminate the measurements collected from RTUs and bias the state estimation at the transmission level to mislead the operation of the power system. Fig. 1 presents a block diagram of the power grid, communication network, SCADA, and control center. It is critically important to understand the behavior of adversaries so that appropriate countermeasures can be designed to either protect the system from attacks beforehand or identify the malicious false data injections in the measurements.
Recently, the problem of FDIAs as well as countermeasures has attracted a lot of attention among researchers. False data in state estimation were first discussed by Schweppe et al. in their pioneering work about state estimation [6]. It was not well researched until Liu et al. [7] proposed that if adversaries possess the knowledge of power grid topology, they may inject coordinated data attacks, which could evade detection by the bad data detection (BDD) system in state estimator. Based on this strategy, plenty of efforts have been made to design effective attack algorithms and the corresponding countermeasures, such as [8]–[11].
Adversaries may launch attacks through hacking RTUs such as sensors in substations. In consideration of the accessibility of RTUs and also hacking cost, attackers always tend to control only a few RTUs to implement a successful attack [7]. Kim and Poor [8] developed a general optimization framework-based formulation for constructing sparse attack vectors when a subset of measurements is protected, while Ozay et al. [12] extended the sparse attack construction model to a distributed framework. Sandberg et al. [13] considered sparse attacks with injections into critical measurements, which are essential for the observability of the power grids and sensitive to attacks. In [14], methods of finding both strong stealth attacks and also optimal weak malicious data attacks (when power grid topology is unknown) with the aim of reducing the number of compromised measurements were discussed. It has been proposed that even when the power grid information is unavailable, stealth attacks can still be accomplished [15], [16]. Zhang et al. [17] investigated the attack strategy with consideration of communication rate constraint in cyber–physical systems.
Illustration of the power grid, communication network, SCADA, and control center. The warning signs indicate the vulnerabilities to FDIAs.
There are two approaches to defend against the malicious data attacks. The first is to protect the system beforehand from being attacked by adversaries. This can be achieved by either protecting a number of measurements to prevent stealth attacks [18], [19], or monitoring state information directly by the deployment of phasor measurements units (PMU) [8], [20]. In practice, it is not feasible to secure all measurements to prevent attacks due to the high cost. Instead, stealth malicious attacks can be prevented by protecting a carefully selected subset of measurements. A challenge of this approach is to search the effective small measurement subset to make them immune to attacks. Bobba et al. [18] chose the subsets for small power test systems using brute-force search.
The second approach to deal with malicious attacks is to identify the injected false data in measurements and then either abandon the contaminated data or correct them. Traditional false data detection methods are based on residue test [6], [21]. They cannot protect state estimation from carefully designed stealth attacks. Recently, with the advancement of smart grid, new detection methods have been proposed. A survey of the existing detection methods was provided in [22]. In [14], generalized likelihood ratio test is introduced to detect weak FDIAs. The cumulative sum (CUSUM) test-based detection mechanism introduced in [16] is also designed for nonstealth attacks. Esmalifalak et al. [23] discussed stealth false data detection methods using machine learning. Graphical methods are used to design defending mechanisms in [24]. In [11], an effective method capable of detecting false data as well as recovering the real state information was proposed. In [25], both the attack and detection algorithms were discussed, but the subset protection method was not considered. Additionally, only preliminary results regarding the attack strategies were presented in [25]. This paper substantially discusses the methods of sparse attack construction, the strategy of system protection from attacks, and the algorithm of stealth attack detection.
This paper has made three contributions: First, methods of constructing stealth attacks are proposed for two typical scenarios. We consider a general scenario in which adversaries can access arbitrary measurements to change arbitrary state variables in state estimation. To the best of our knowledge, there is no feasible algorithm that can efficiently construct highly sparse undetectable attack vectors in this case. In [7], it is observed that the optimal undetectable attack vector to compromise the minimum number of measurements can be found using brute-force search. However, this is not practical due to the high complexity. We propose an efficient and effective attack vector construction algorithm which can quickly generate highly sparse attack vectors in this scenario.
Liu et al. [7] also have demonstrated that stealth attack vectors always exist when the number of measurements that can be contaminated exceeds a certain value. However, it is shown in this paper that our proposed method can launch stealth attacks by manipulating only a much smaller number of measurements with high probability. Additionally, stealth attacks in a specific scenario are also considered in this paper. An optimization-based algorithm is introduced to generate sparse targeted attack vectors to bias specified state variables with the consideration that a subset of measurements is protected.
A fast greedy search method is then proposed to quickly find a subset of measurements to be protected to defend against stealth attacks. This fast method can find a subset with the same size as brute-force search in nearly all cases. Finally, inspired by Liu et al. [11], we introduce a detection algorithm considering the noise case with partial observations. The proposed algorithm extends the method in [11] to address the problem of detecting stealth attacks as well as recovering true state information with only partially collected contaminated measurements. The performance of the proposed algorithms is investigated using IEEE test systems with software MATPOWER [26].
This paper is organized as follows. Section II introduces power system model and the stealth attack problem in state estimation. In Section III, proposed attack strategies for different scenarios are introduced. Section IV provides the measurement protection algorithm and Section V presents the false data detection method. Simulation results are presented in Section VI. Section VII concludes the paper.
Power Grid and Attack Model
In this paper, we consider a power transmission grid which consists of
A. State Estimation
The state estimation problem is to use power measurements to timely estimate the state of the power system. Specifically, power system state refers to bus voltage angles \begin{equation}{\boldsymbol z}=\mathbf{H\theta+e}\end{equation}
\begin{equation}P_{ij}=\left(\theta_{i}-\theta_{j}\right)d_{ij}\end{equation}
The state vector can be estimated from measurements using the weighted least-square (WLS) method [4]. In particular, system states are estimated as \begin{equation}\mathbf{\hat{\theta}=}\left(\mathbf{H}^{T}\mathbf{WH}\right)^{-1}\mathbf{H}^{T}\mathbf{W}{\boldsymbol z}=\mathbf{K}{\boldsymbol z}\end{equation}
B. False Data Injection Attacks
Malicious false data can be injected by manipulating the RTU measurements to bias the estimated states. System measurements with malicious data becomes \begin{equation}\boldsymbol{z}_{\mathbf{ a}}={\mathbf{ H\theta}}+{\boldsymbol a}+\mathbf{e}\end{equation}
Bad data in measurements can lead to incorrect state estimation and cause severe outcomes. Traditional methods to detect bad data are mostly based on the residue test. The residue vector \begin{equation}\boldsymbol{r=z}-\mathbf{H}\hat{\theta}.\end{equation}
However, carefully designed malicious data attacks can bypass residue-based BDD. If attackers have knowledge about the power grid topology information, or \begin{equation}\boldsymbol{a}=\mathbf{Hc}.\end{equation}
\begin{equation}\boldsymbol{z}_{\mathbf{ a}}=\mathbf{H}\left(\mathbf{\theta}+{\boldsymbol c}\right)+\mathbf{e}\end{equation}
Stealth Attack Strategies
In order to evade detection in the control center, attack vectors are designed to satisfy (6). Additionally, attackers would tend to compromise as few measurements as possible in effort to launch attacks with least effort. Therefore attack strategies are expected to be able to construct highly sparse attack vectors. The stealth sparse attacks were first discussed in [7], in which the authors proposed that attackers can modify state variables in state estimation without being detected by modifying a small number of carefully chosen RTU measurements. In this paper, two methods are introduced to construct sparse attack vectors for two typical scenarios: random attacks in which arbitrary measurements can be compromised and targeted attacks in which specific state variables need to be biased.
A. Random Attacks
In this scenario, it is assumed that no measurements are protected, and the changes of state variables are not specified. Attackers can hack arbitrary measurements to bias arbitrary state variables. Thus, the aim is solely to find highly sparse vector
Liu et al. [7] also proposed that a projection matrix \begin{equation*}\begin{split}\mathbf{P}{\boldsymbol a}=\mathbf{H\left(\mathbf{H}^{T}{H}\right)^{-1}{H}^{T}}{\mathbf{ H}}{\boldsymbol c}={\mathbf{ H}}{\boldsymbol c}\\\mathbf{\left(P-I\right)}{\boldsymbol a}=0.\end{split}\end{equation*}
\begin{equation}\mathbf{B}{\boldsymbol a}=0.\end{equation}
This criterion can be used to generate attack vectors in certain scenarios such as when a subset of measurements is protected [7]. For random attacks, this criterion can also be utilized. A straightforward way to find sparse attack vectors can be formulated using the following optimization problem: \begin{equation}\begin{aligned}\min & \:\left\Vert \boldsymbol{a}\right\Vert _{0}\\ {\rm{ s.t.}} & \:\mathbf{B}{\boldsymbol a}=0,\:\boldsymbol{a}\neq0\end{aligned}\end{equation}
\begin{equation}{\rm{ Null}}(\mathbf{B})=\left\{ \mathbf{v}\in\mathbb{R}^{m}\left\vert \mathbf{Bv}=0\right.\right\}.\end{equation}
Proposed algorithm. Measurements are always subject to noise due to the errors in the measuring process and the noise in the communication channels. The noise can be modeled as Gaussian distributed with variance \begin{equation}\mathcal{S}_{t}\left(x\right):=\begin{cases}\dfrac{x}{\left\vert x\right\vert -t}\max\left(\left\vert x\right\vert -t,\:0\right), & \left\vert x\right\vert \neq t\\\: x, & \left\vert x\right\vert =t.\end{cases}\end{equation}
The attack vector construction procedure can then be designed as follows. Given matrix measurement matrix \begin{equation}\boldsymbol{u}=\arg\max_{i}\left({\rm{ var}}\left(\mathbf{u}_{i}\right)\right)\end{equation}
\begin{equation}\mathbf{a}=\mathcal{S}_{t}\left(\epsilon\boldsymbol {u}\right)\end{equation}
Algorithm 1 concludes the whole process of attack vector construction. It is notable that threshold
Algorithm 1 Sparse stealth attacks construction
Input:
Procedure:
1) Compute
2) Get the standard basis matrix
3) Find column vector
4) Scale up/down vector
5) Shrink the vector using the threshold
Output:
Proposition 1:
If an attack vector \begin{equation}P_{l}(t)=\frac{1}{2}\left[1+{\rm{erf}}\left(\frac{3\sigma-t}{\sigma\sqrt{2}}\right)\right]\end{equation}
Proof:
Since the vector \begin{equation}\begin{split}\boldsymbol {r}^{\prime}&= \boldsymbol {z}_{\mathbf{a}}-\mathbf{H\hat{\theta}_{\mathbf{a}}}=\boldsymbol {z+a}+{\mathbf{ e-}}\mathbf{HK}\boldsymbol{(z+a}+{\mathbf{ e)}} \\&= \mathbf{Hx+\epsilon H}{\boldsymbol c}-\boldsymbol {u}_{\mathit{t}}+\mathbf{e-H(KHx{+} K\epsilon H}{\boldsymbol c}{-}\mathbf{K}{\boldsymbol u}_{\mathit{t}}{+}\mathbf{Ke)}\\ &= \mathbf{Hx+\epsilon H}{\boldsymbol c}-{\boldsymbol u}_{\mathit{t}}+\mathbf{e-Hx-\epsilon H}{\boldsymbol c}+\mathbf{HK}{\boldsymbol u}_{\mathit{t}}-\mathbf{HKe}\\ &= \mathbf{(I-HK)(e-u_{\mathit{t}})}.\end{split}\end{equation}
\begin{equation}P_{l}(t)=\intop_{-3\sigma}^{3\sigma}\frac{1}{\sigma2\pi}\exp\left(-\frac{\left(k+t\right)^{2}}{2\sigma^{2}}\right)dk.\end{equation}
B. Targeted Attacks
In practice, adversaries may intend to modify specific state variables. In this case, the amounts in the targeted subset in the vector
Let \begin{equation}\boldsymbol {a}={\mathbf{ H}}{\boldsymbol c}=\sum_{i\in\mathcal{I}}\mathbf{h}_{i}c_{i}+\sum_{j\in\bar{\mathcal{I}}}\mathbf{h}_{j}c_{j}.\end{equation}
\begin{equation}\begin{aligned}\mathbf{P_{\bar{\mathcal{I}}}}\boldsymbol {\left(a-b\right)}&= \mathbf{P_{\bar{\mathcal{I}}}}\mathbf{H}_{\bar{\mathcal{I}}}\boldsymbol {c}_{\bar{\mathcal{I}}} \\&= \mathbf{H}_{\bar{\mathcal{I}}}\left(\mathbf{H}_{\bar{\mathcal{I}}}^{T}\mathbf{H}_{\bar{\mathcal{I}}}\right)^{-1}\mathbf{H}_{\bar{\mathcal{I}}}^{T}\mathbf{H}_{\bar{\mathcal{I}}}\boldsymbol {c}_{\bar{\mathcal{I}}} \\&= \mathbf{H}_{\bar{\mathcal{I}}}\boldsymbol {c}_{\bar{\mathcal{I}}}=\boldsymbol {a-b}\end{aligned}\end{equation}
We can then easily obtain that \begin{equation}\mathbf{B}_{\bar{\mathcal{I}}}\boldsymbol {a}=\mathbf{B}_{\bar{\mathcal{I}}}\boldsymbol {b}\end{equation}
Since a subset of measurements is protected, those elements in attack vector \begin{equation}\begin{aligned}\min_{\mathbf{c}} & \left\Vert \mathbf{H}{\boldsymbol c}\right\Vert _{1} \\{\rm{ s.t.}} & \:\mathbf{\mathbf{B}_{\bar{\mathcal{I}}}\mathbf{H}}{\boldsymbol c}={\mathbf{ y}}\\ & \:\mathbf{H}^{p}\boldsymbol {c}=0\end{aligned}\end{equation}
Strategic Protection
Increasing the number of protected measurements can make the stealth attacks more difficult to be accomplished. It is obvious that stealth attacks can be completely prevented by securing all measurements. However, it is not economical or necessary to secure all measurement devices to defend against stealth attacks. Bobba et al. [18] explored the minimal measurement subset that is required to be protected to defend against attacks using brute-force search. This method is time-consuming and only feasible for small-sized power grids. In this section, an efficient algorithm is proposed to quickly find measurement protection subsets, which have the same sizes as that from brute-force method in nearly all cases.
Let the set \begin{equation}\begin{aligned}\min_{\boldsymbol {c}} & \left\Vert \mathbf{H^{\bar{\mathcal{P}}}}{\boldsymbol c}\right\Vert _{1} \\{\rm s.t.} & \mathbf{\mathbf{B}_{\bar{\mathcal{I}}}\mathbf{H}}{\boldsymbol c}={\mathbf y} \\ & \mathbf{H^{\mathcal{P}}}{\boldsymbol c}=0. \end{aligned}\end{equation}
If the protection set
When a certain measurement is secured, attackers need to compromise more measurements or inject extra errors into the rest of the measurements to launch targeted attacks. From (17), we have \begin{equation}\boldsymbol {a=}\mathbf{H}\boldsymbol {c}=\boldsymbol {b+}\mathbf{H}_{\mathcal{\overline{I}}}\boldsymbol {c}_{\mathcal{\bar{I}}}\end{equation}
\begin{align}\boldsymbol {a}_{\mathcal{P}} & =\boldsymbol {b}_{\mathcal{P}}+\mathbf{H}_{\mathcal{\bar{I}}}^{\mathcal{P}}\boldsymbol {c}_{\mathcal{\bar{I}}}=0\\-\boldsymbol {b}_{\mathcal{P}} & =\mathbf{H}_{\mathcal{\bar{I}}}^{\mathcal{P}}\boldsymbol {c}_{\mathcal{\bar{I}}}.\end{align}
Algorithm 2 presents the greedy search method to find a small protection subset of measurements with the knowledge of existing protection set and targeted vector
Greedy subset searching Algorithm
Input:
Initialize:
Iteration: At the
Compute the complementary set
Put the
Checking the feasibility of finding
Compute
Find index
Update set
Output:
For a large power grid system, it is not feasible to find the smallest protection subset to prevent any of undetectable attacks that satisfy
Minimal subset selection algorithm
Input:
Initialize:
Let
Find
Output:
This method cannot guarantee the smallest subset that can be found, but it provides at least a quasi-optimal subset that contains a slightly larger number of elements. Most importantly, this method is fast and feasible in practice. In the worst case, to find a protection set with \begin{equation}\mathcal{K}_{a}=mk-\frac{k\left(k-1\right)}{2}.\end{equation}
Robust Detection
Traditional residue testing-based false data detection methods cannot provide protection of state estimation from carefully designed stealth attacks. Therefore, new detection methods need to be designed to detect random errors as well as stealth attacks. It is shown that a series of measurement data exhibit low rank and sparse structure, which can be employed in anomaly detection method [11]. In practice, measurements tend to be contaminated with noise. Additionally, it may also happen that some of the measurements are lost due to the measurement device failures or disrupted communication links. In this section, these situations are addressed.
Considering a time interval \begin{equation}\mathbf{Z_{a}=Z+A+E}\end{equation}
It is known that fast system dynamics are usually well damped in the power system. This implies that the system states would change gradually in a small period \begin{equation}\begin{aligned}\min & \left\Vert \mathbf{Z}\right\Vert _{*}+\lambda\left\Vert \mathbf{A}\right\Vert _{1}\\ {\rm{ s.t.}} & \left\Vert \mathbf{Z_{a}}-\mathbf{Z-A}\right\Vert _{F}\leq\delta\end{aligned}\end{equation}
Unlike coordinated malicious attacks, the missing data in the measurements can result in residue changes in (5). These incomplete measurement data, as well as the measurements with errors, would be identified as bad data by traditional BDD algorithms. The proposed algorithm can not only detect the missing and inaccurate measurement data but also detect the carefully designed stealth attacks, which is undetectable to traditional methods. More importantly, the proposed algorithm can recover the true measurements from the incomplete measurements.
In order to address the problem that only noise-contaminated partial measurements are collected, the PCA problem can be extended to the following form with element-wise error constraints:\begin{equation}\begin{aligned}[b]\min & \left\Vert \mathbf{Z}\right\Vert _{*}+\lambda\left\Vert \mathbf{A}\right\Vert _{1} \\{\rm s.t.} & \left\vert \mathcal{P}_{\Omega}\left(\mathbf{Z_{a}}\right)-\mathcal{P}_{\Omega}\left(\mathbf{Z+A}\right)\right\vert \preceq\epsilon \end{aligned}\end{equation}
\begin{equation}\begin{aligned}\min & \left\Vert \mathbf{Z}\right\Vert _{*}+\lambda\left\Vert \mathcal{T}(\mathbf{A},\tilde{\epsilon})\right\Vert _{1}\\{\rm{ s.t.}} & \mathbf{\, Z_{a}=Z+A} \end{aligned}\end{equation}
\begin{equation}\mathcal{T}\left(a_{ij},\epsilon\right)={\rm{sign}}\left(a_{ij}\right)\cdot\max\left\{ \left\vert a_{ij}\right\vert -\epsilon,0\right\}.\end{equation}
Probabilities of successful attack injections (a) under different SNRs for IEEE-57 bus system, SR is 0.4; (b) for different bus systems, SR is 0.4 and
A variant of the augmented Lagrangian method (ALM), which is also known as the alternating direction method of multipliers (ADMM) algorithm [32], is used to solve the problem defined by (29). The Lagrangian corresponding to this problem is \begin{align}\mathcal{L}\left(\mathbf{Z,A,Y,}\mu\right)=\left\Vert \mathbf{Z}\right\Vert _{*}+\lambda\left\Vert \mathbf{\mathcal{T}(\mathbf{A},\tilde{\epsilon})}\right\Vert _{1}+\left\langle \mathbf{Y,H}\right\rangle +\frac{\mu}{2}\left\Vert \mathbf{H}\right\Vert _{2}^{2}\end{align}
\begin{equation*}\mathcal{D}\left(\mathbf{X},\tau\right)=\mathbf{U}\mathcal{T}\left(\Sigma,\tau\right)\mathbf{V}^{T}\end{equation*}
RPCA with entry wise constraints
Input:
Initialize
1) Update the value of low rank matrix
2) Compute the value of sparse matrix
3) Update the Lagrange multiplier
4) Update
5) Update
Output
It is notable that when incomplete measurements are collected, Algorithm 4 will take the missing data to be sparse anomalies and it can also recover the low-rank true measurement matrix and sparse anomaly matrix. However, the recovery accuracy would be impacted as the sparsity is changed. The recovered sparse attack matrix can ignore those injected data outside the observation set. Thus, it is more difficult to identify all malicious attacks with partial observations.
Numerical Results
In this section, the algorithms introduced above are evaluated by simulations performed based on the IEEE test systems [33]. The MATLAB package MATPOWER [26] is used to simulate the power system. The convex optimization problems are solved using the convex optimization toolbox CVX [34].
A. Performance of Stealth Attack Construction
The performance of Algorithm 1 which generates highly sparse undetectable attack vectors is tested in different scenarios. Figs. 2 and 6 show the probabilities of successfully generating undetectable attack vectors with different levels of sparsity and different attack level ratios (ALRs), respectively. An attack is regarded as successful when the maximum value in residue vector does not exceed that without attacks. Sparsity ratio (SR) is defined as
The noise in the simulation is modeled as Gaussian distributed with zero-mean. The signal-to-noise ratio (SNR) indicates the noise level compared with true measurements in the simulation. The noise may be due to measuring devices and process, or due to the communication channel noise. It is clear in Figs. 2(a) and 6(a) that in a relatively noisy case, the probability of a successful attack is extremely high (close to 1). In the low noise case, there is also high probability of injecting a successful highly sparse undetectable malicious attack. The algorithm is also assessed using different power grid system models, which is shown in Figs. 2(b) and 6(b). It is notable that in a larger bus system, Algorithm 1 can provide a better performance even for extremely sparse attacks and high ALRs. For example, the success ratio is around 90% for IEEE 118-bus system to generate stealth attacks with SR lower than 0.1, compared with 75% for IEEE 14-bus system shown in Fig. 2(b). This probability is 100% for IEEE 118-bus system to generate attacks with
Additionally, it can be seen from Fig. 2 that it is always harder to inject sparser attacks while Fig. 6 reveals that attacks with higher values would be more likely to be detected. Figs. 2(c) and 6(c) display the performance when injecting attacks with different SRs and ALRs. It is notable that in Fig. 6(c), the algorithm utilizes randomly selected columns in a basis matrix of
It is known that stealth attacks having
Number of protected measurements to protect every single state variable from being targeted. (a) IEEE-9 bus system. (b) IEEE-14 bus system.
Targeted attack construction method in (20) is assessed under different attack conditions in which different percentage of total state variables are assumed to be modified. The targeted set is randomly selected and the protected measurement is also randomly chosen. It can be observed from Fig. 3 that, in order to precisely alter specified state variables, the coordinated attack vectors cannot be highly sparse. Thus, attackers need to compromise a number of measurements to launch targeted attacks. Highly sparse attacks can only be achieved when the percentage of targeted state variables is extremely low for certain test systems. For example, SR can be less than 0.1 for IEEE 39-bus system when a small number of state variables are targeted. The figure also shows that in some cases, SR of attacks are 0. They correspond to the cases that: for certain targeted set of state variables, no feasible attack vectors exist when the
B. Performance of Strategic Protection
This section evaluates our proposed protection algorithm. To compare the protection subset generated by the proposed algorithm with that from brute-force method, we apply IEEE-9 bus system, which contain 17 total measurements, and IEEE-14 bus system with 33 total measurements. Table I shows the number of measurements in protection subset found by two methods. The results from the proposed algorithm for other larger test systems are also provided. In the first two test systems, the smallest protection sets generated from the proposed algorithm contain only slightly more measurements than that from brute-force method. In IEEE-14 bus system, the difference of this number is quite small compared to the total number of 33 measurements. Thus, Algorithm 2 can find protection subsets with similar number of elements but spend much less time than brute-force method.
Probabilities of successful attack injections (a) under different SNRs for IEEE-57 bus system, ALR is 0.5; (b) for different bus systems, ALR is 0.5 and
Fig. 4 displays the number of elements in the smallest protection subsets to protect every single state variable from being targeted by adversaries. The whole system protection subsets shown in Table I are the unions of the protection subsets for protecting single variables. From both figures, it can be seen that in most cases the proposed algorithm can find a protection subset having the same size as that found by brute-force method. The size differences are only 1 or 2 when the two methods find subsets with different number of elements. This number is quite small compared with the total number of 33 measurements in IEEE-14 bus.
Table II compares the complexities of the two algorithms in terms of the number of feasibility testing times. The results correspond with the simulation shown in Fig. 4 in which measurement protection subsets are searched for protecting every single state variable. It is obvious that when the size of protection subset exceeds 3, the difference of the two methods becomes significant. This difference is more significant when the size of protection subset is bigger as the brute-force search needs to exhaust all subset combinations with smaller sizes. It is also clear that in a larger power system, the difference is much larger for two algorithms to find a subset with same size as that in a smaller system. The testing times of the proposed algorithm will increase only slightly when the size of protection subset and the system scale grow, which is also described by (25). In a real power system, while brute-force method is infeasible because of the combinatorial complexity, the proposed method instead is fast and practical.
C. Performance of Detection
The performance of the detection algorithm is tested on IEEE 14-bus system and IEEE 57-bus system. The malicious attack vectors are constructed using our proposed Algorithm 1. In order to obtain sparsity in the rows of the attack block matrix, different column vectors in the null space in Algorithm 1 are utilized. The SR of the attacks is chosen as 15%. In Fig. 6(c), it is shown that when
We use the false alarm rate (FAR) which is the probability of positive alarm when there are no attacks. The noise performance of the algorithm compared to RPCA with Frobenius constraints in (27) has been extensively studied in [31]. In this paper, we focus on identifying anomalies in different scenarios when undetectable attacks are injected in power systems.
Fig. 5 shows the error tolerance performance in the IEEE 14-bus system. It is shown that when FAR exceeds 10%, the algorithm can identify attacks with high probabilities which are approaching 100%. This probability is still quite high in the presence of highly dense noise (95%). When FAR decreases, the system will absorb more noise and detection probability decreases. It can be seen that there is still a high chance of detecting anomalies: more than 90% when FAR decreases to an extremely low level (0.025) under
In the case where partial measurements are collected, missing data are regarded as sparse anomalies in Algorithm 4. Additionally, nonzero entries in sparse matrix
Conclusion
In this paper, we looked into the problem of malicious FDIAs in power grid state estimation. We proposed stealth attack construction strategies for different scenarios and also introduced the countermeasures. It is shown that our proposed random attack construction algorithm can generate extremely sparse attack vectors. These optimal or quasi-optimal attacks can be achieved with high probability of success. The targeted undetectable attacks are obtained based on a optimization framework. The results show that attack vectors in this scenario cannot be extremely sparse, which is also discussed in literature. An efficient protection scheme is proposed in this paper to find an effective measurement protection subset to defend from the stealth attacks. The simulation results reveal that this subset searching algorithm can find a subset with almost the same size as that from the brute-force method. Additionally, a detection algorithm is introduced to detect the stealth attacks as well as other false data. This algorithm considers the case in which only partial measurements are collected in the presence of noise. The performance is demonstrated via the simulation results based on IEEE test power systems.
ACKNOWLEDGMENT
The authors would like to thank their colleagues at Toshiba Research Europe Ltd., for the fruitful discussions and the support of its directors.