Structural-Constrained Methods for the Identification of False Data Injection Attacks in Power Systems

Power system functionality is determined on the basis of power system state estimation (PSSE). Thus, corruption of the PSSE may lead to severe consequences, such as disruptions in electricity distribution, maintenance damage, and financial losses. Classical bad data detection (BDD) methods, develope...

Full description

Bibliographic Details
Main Authors: Gal Morgenstern, Tirza Routtenberg
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9868350/
_version_ 1811268220383920128
author Gal Morgenstern
Tirza Routtenberg
author_facet Gal Morgenstern
Tirza Routtenberg
author_sort Gal Morgenstern
collection DOAJ
description Power system functionality is determined on the basis of power system state estimation (PSSE). Thus, corruption of the PSSE may lead to severe consequences, such as disruptions in electricity distribution, maintenance damage, and financial losses. Classical bad data detection (BDD) methods, developed to ensure PSSE reliability, are unable to detect well-designed attacks, named unobservable false data injection (FDI) attacks. In this paper, we develop novel structural-constrained methods for the detection of unobservable FDI attacks and the identification of the attacked buses. The proposed methods are based on formulating structural, sparse constraints on both the attack and the system loads. First, we exploit these constraints in order to compose an appropriate model selection problem. Then, we develop the associated generalized information criterion (GIC) for this problem. However, the GIC method’s computational complexity grows exponentially with the network size, which may be prohibitive for large networks. Therefore, based on the proposed structural and sparse constraints, we develop two novel low-complexity methods for the practical identification of unobservable FDI attacks: 1) a modification of the state-of-the-art orthogonal matching pursuit (OMP) method; and 2) a method that utilizes the graph Markovian property in power systems, i.e. the second-neighbor relationship between the power data at the system’s buses. In order to analyze the performance of the proposed methods, the appropriate oracle and clairvoyant detectors are also derived. The performance of the proposed methods is evaluated on the IEEE-30 bus test case.
first_indexed 2024-04-12T21:17:54Z
format Article
id doaj.art-37b3c652b71d449aa2ba18783d980862
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-04-12T21:17:54Z
publishDate 2022-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-37b3c652b71d449aa2ba18783d9808622022-12-22T03:16:23ZengIEEEIEEE Access2169-35362022-01-0110941699418510.1109/ACCESS.2022.32022019868350Structural-Constrained Methods for the Identification of False Data Injection Attacks in Power SystemsGal Morgenstern0https://orcid.org/0000-0002-1991-5644Tirza Routtenberg1https://orcid.org/0000-0002-7238-7764School of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Beer Sheva, IsraelSchool of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Beer Sheva, IsraelPower system functionality is determined on the basis of power system state estimation (PSSE). Thus, corruption of the PSSE may lead to severe consequences, such as disruptions in electricity distribution, maintenance damage, and financial losses. Classical bad data detection (BDD) methods, developed to ensure PSSE reliability, are unable to detect well-designed attacks, named unobservable false data injection (FDI) attacks. In this paper, we develop novel structural-constrained methods for the detection of unobservable FDI attacks and the identification of the attacked buses. The proposed methods are based on formulating structural, sparse constraints on both the attack and the system loads. First, we exploit these constraints in order to compose an appropriate model selection problem. Then, we develop the associated generalized information criterion (GIC) for this problem. However, the GIC method’s computational complexity grows exponentially with the network size, which may be prohibitive for large networks. Therefore, based on the proposed structural and sparse constraints, we develop two novel low-complexity methods for the practical identification of unobservable FDI attacks: 1) a modification of the state-of-the-art orthogonal matching pursuit (OMP) method; and 2) a method that utilizes the graph Markovian property in power systems, i.e. the second-neighbor relationship between the power data at the system’s buses. In order to analyze the performance of the proposed methods, the appropriate oracle and clairvoyant detectors are also derived. The performance of the proposed methods is evaluated on the IEEE-30 bus test case.https://ieeexplore.ieee.org/document/9868350/Attack detection and identificationfalse data injection (FDI) attacksgraph Markovian propertymodel selectionstructural constraints
spellingShingle Gal Morgenstern
Tirza Routtenberg
Structural-Constrained Methods for the Identification of False Data Injection Attacks in Power Systems
IEEE Access
Attack detection and identification
false data injection (FDI) attacks
graph Markovian property
model selection
structural constraints
title Structural-Constrained Methods for the Identification of False Data Injection Attacks in Power Systems
title_full Structural-Constrained Methods for the Identification of False Data Injection Attacks in Power Systems
title_fullStr Structural-Constrained Methods for the Identification of False Data Injection Attacks in Power Systems
title_full_unstemmed Structural-Constrained Methods for the Identification of False Data Injection Attacks in Power Systems
title_short Structural-Constrained Methods for the Identification of False Data Injection Attacks in Power Systems
title_sort structural constrained methods for the identification of false data injection attacks in power systems
topic Attack detection and identification
false data injection (FDI) attacks
graph Markovian property
model selection
structural constraints
url https://ieeexplore.ieee.org/document/9868350/
work_keys_str_mv AT galmorgenstern structuralconstrainedmethodsfortheidentificationoffalsedatainjectionattacksinpowersystems
AT tirzarouttenberg structuralconstrainedmethodsfortheidentificationoffalsedatainjectionattacksinpowersystems