Gal Morgenstern;Jip Kim;James Anderson;Gil Zussman;Tirza Routtenberg
{"title":"Protection Against Graph-Based False Data Injection Attacks on Power Systems","authors":"Gal Morgenstern;Jip Kim;James Anderson;Gil Zussman;Tirza Routtenberg","doi":"10.1109/TCNS.2024.3371548","DOIUrl":null,"url":null,"abstract":"Graph signal processing (GSP) has emerged as a powerful tool for practical network applications, including power system monitoring. Recent research works focused on developing GSP-based methods for state estimation, attack detection, and topology identification using the representation of the power system voltages as smooth graph signals. Within this framework, efficient methods have been developed for detecting false data injection (FDI) attacks, which until now were perceived as nonsmooth with respect to the graph Laplacian matrix. Consequently, these methods may not be effective against smooth FDI attacks. In this article, we propose a graph FDI (GFDI) attack that minimizes the Laplacian-based graph total variation under practical constraints. We present the GFDI attack as the solution for a nonconvex constrained optimization problem. The solution to the GFDI attack problem is obtained through approximating it using <inline-formula><tex-math>$\\ell _{1}$</tex-math></inline-formula> relaxation. A series of quadratic programming problems that are classified as convex optimization problems are solved to obtain the final solution. We then propose a protection scheme that identifies the minimal set of measurements necessary to constrain the GFDI output to a high graph TV, thereby enabling its detection by existing GSP-based detectors. Our numerical simulations on the IEEE-57 and IEEE-118 bus test cases reveal the potential threat posed by well-designed GSP-based FDI attacks. Moreover, we demonstrate that integrating the proposed protection design with GSP-based detection can lead to significant hardware cost savings compared to previous designs of protection methods against FDI attacks.","PeriodicalId":56023,"journal":{"name":"IEEE Transactions on Control of Network Systems","volume":"11 4","pages":"1924-1936"},"PeriodicalIF":5.0000,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Control of Network Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10453975/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Graph signal processing (GSP) has emerged as a powerful tool for practical network applications, including power system monitoring. Recent research works focused on developing GSP-based methods for state estimation, attack detection, and topology identification using the representation of the power system voltages as smooth graph signals. Within this framework, efficient methods have been developed for detecting false data injection (FDI) attacks, which until now were perceived as nonsmooth with respect to the graph Laplacian matrix. Consequently, these methods may not be effective against smooth FDI attacks. In this article, we propose a graph FDI (GFDI) attack that minimizes the Laplacian-based graph total variation under practical constraints. We present the GFDI attack as the solution for a nonconvex constrained optimization problem. The solution to the GFDI attack problem is obtained through approximating it using $\ell _{1}$ relaxation. A series of quadratic programming problems that are classified as convex optimization problems are solved to obtain the final solution. We then propose a protection scheme that identifies the minimal set of measurements necessary to constrain the GFDI output to a high graph TV, thereby enabling its detection by existing GSP-based detectors. Our numerical simulations on the IEEE-57 and IEEE-118 bus test cases reveal the potential threat posed by well-designed GSP-based FDI attacks. Moreover, we demonstrate that integrating the proposed protection design with GSP-based detection can lead to significant hardware cost savings compared to previous designs of protection methods against FDI attacks.
图形信号处理(GSP)已成为包括电力系统监测在内的实际网络应用的强大工具。最近的研究工作集中在开发基于gps的方法,用于状态估计、攻击检测和拓扑识别,使用电力系统电压作为平滑图信号的表示。在这个框架内,已经开发出有效的方法来检测虚假数据注入(FDI)攻击,到目前为止,这些攻击被认为是相对于图拉普拉斯矩阵的非光滑的。因此,这些方法可能对平滑的FDI攻击无效。在本文中,我们提出了一种图FDI (GFDI)攻击,该攻击在实际约束下最小化基于拉普拉斯的图总变异。我们将GFDI攻击作为一个非凸约束优化问题的解。通过使用$\ well _{1}$松弛来逼近GFDI攻击问题,得到了该问题的解。求解了一系列被归类为凸优化问题的二次规划问题,得到了最终解。然后,我们提出了一种保护方案,该方案确定了约束GFDI输出到高图形电视所需的最小测量集,从而使其能够被现有的基于gsp的检测器检测到。我们对IEEE-57和IEEE-118总线测试用例的数值模拟揭示了设计良好的基于gsp的FDI攻击所构成的潜在威胁。此外,我们证明,与以前针对FDI攻击的保护方法设计相比,将所提出的保护设计与基于gsp的检测相结合可以显著节省硬件成本。
期刊介绍:
The IEEE Transactions on Control of Network Systems is committed to the timely publication of high-impact papers at the intersection of control systems and network science. In particular, the journal addresses research on the analysis, design and implementation of networked control systems, as well as control over networks. Relevant work includes the full spectrum from basic research on control systems to the design of engineering solutions for automatic control of, and over, networks. The topics covered by this journal include: Coordinated control and estimation over networks, Control and computation over sensor networks, Control under communication constraints, Control and performance analysis issues that arise in the dynamics of networks used in application areas such as communications, computers, transportation, manufacturing, Web ranking and aggregation, social networks, biology, power systems, economics, Synchronization of activities across a controlled network, Stability analysis of controlled networks, Analysis of networks as hybrid dynamical systems.