We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

eess.SP

Change to browse by:

References & Citations

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Electrical Engineering and Systems Science > Signal Processing

Title: Structural-constrained Methods for the Identification of Unobservable False Data Injection Attacks in Power Systems

Abstract: Power system functionality is determined on the basis of the power system state estimation (PSSE). Thus, corruption of the PSSE may lead to severe consequences, such as financial losses, maintenance damage, and disruptions in electricity distribution. Classical bad data detection (BDD) methods, developed to ensure PSSE reliability, are unable to detect well-designed attacks, named unobservable false data injection (FDI) attacks. In this paper, we develop novel structural-constrained methods for the detection of unobservable FDI attacks, the identification of the attacked buses' locations, and PSSE under the presence of such attacks. The proposed methods are based on formulating structural, sparse constraints on both the attack and the system loads. First, we exploit these constraints in order to compose an appropriate model selection problem. Then, we develop the associated generalized information criterion (GIC) for this problem. However, for large networks, the GIC method's computational complexity grows exponentially with the network size. Thus, based on the proposed structural and sparse constraints, we develop two novel low-complexity methods for unobservable FDI attack identification: 1) a modification of the state-of-the-art orthogonal matching pursuit (OMP); and 2) a method that utilizes the graph Markovian property in power systems, i.e. the second-neighbor relationship between the power data at the system's buses. The methods' performance is evaluated on a IEEE-30 bus test case system.
Comments: copyright 20XX IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses in any current or future media, including reprinting or republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
Subjects: Signal Processing (eess.SP)
DOI: 10.1109/ACCESS.2022.3202201
Cite as: arXiv:2003.08715 [eess.SP]
  (or arXiv:2003.08715v4 [eess.SP] for this version)

Submission history

From: Gal Morgenstern [view email]
[v1] Thu, 19 Mar 2020 12:29:45 GMT (324kb,D)
[v2] Sat, 5 Jun 2021 17:09:46 GMT (1264kb,D)
[v3] Wed, 1 Dec 2021 18:44:18 GMT (1792kb,D)
[v4] Fri, 26 Aug 2022 17:29:01 GMT (530kb)

Link back to: arXiv, form interface, contact.