Protection Against Graph-Based False Data Injection Attacks on Power Systems

IF 5 3区 计算机科学 Q2 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Control of Network Systems Pub Date : 2024-02-29 DOI:10.1109/TCNS.2024.3371548
Gal Morgenstern;Jip Kim;James Anderson;Gil Zussman;Tirza Routtenberg
{"title":"Protection Against Graph-Based False Data Injection Attacks on Power Systems","authors":"Gal Morgenstern;Jip Kim;James Anderson;Gil Zussman;Tirza Routtenberg","doi":"10.1109/TCNS.2024.3371548","DOIUrl":null,"url":null,"abstract":"Graph signal processing (GSP) has emerged as a powerful tool for practical network applications, including power system monitoring. Recent research works focused on developing GSP-based methods for state estimation, attack detection, and topology identification using the representation of the power system voltages as smooth graph signals. Within this framework, efficient methods have been developed for detecting false data injection (FDI) attacks, which until now were perceived as nonsmooth with respect to the graph Laplacian matrix. Consequently, these methods may not be effective against smooth FDI attacks. In this article, we propose a graph FDI (GFDI) attack that minimizes the Laplacian-based graph total variation under practical constraints. We present the GFDI attack as the solution for a nonconvex constrained optimization problem. The solution to the GFDI attack problem is obtained through approximating it using <inline-formula><tex-math>$\\ell _{1}$</tex-math></inline-formula> relaxation. A series of quadratic programming problems that are classified as convex optimization problems are solved to obtain the final solution. We then propose a protection scheme that identifies the minimal set of measurements necessary to constrain the GFDI output to a high graph TV, thereby enabling its detection by existing GSP-based detectors. Our numerical simulations on the IEEE-57 and IEEE-118 bus test cases reveal the potential threat posed by well-designed GSP-based FDI attacks. Moreover, we demonstrate that integrating the proposed protection design with GSP-based detection can lead to significant hardware cost savings compared to previous designs of protection methods against FDI attacks.","PeriodicalId":56023,"journal":{"name":"IEEE Transactions on Control of Network Systems","volume":"11 4","pages":"1924-1936"},"PeriodicalIF":5.0000,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Control of Network Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10453975/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Graph signal processing (GSP) has emerged as a powerful tool for practical network applications, including power system monitoring. Recent research works focused on developing GSP-based methods for state estimation, attack detection, and topology identification using the representation of the power system voltages as smooth graph signals. Within this framework, efficient methods have been developed for detecting false data injection (FDI) attacks, which until now were perceived as nonsmooth with respect to the graph Laplacian matrix. Consequently, these methods may not be effective against smooth FDI attacks. In this article, we propose a graph FDI (GFDI) attack that minimizes the Laplacian-based graph total variation under practical constraints. We present the GFDI attack as the solution for a nonconvex constrained optimization problem. The solution to the GFDI attack problem is obtained through approximating it using $\ell _{1}$ relaxation. A series of quadratic programming problems that are classified as convex optimization problems are solved to obtain the final solution. We then propose a protection scheme that identifies the minimal set of measurements necessary to constrain the GFDI output to a high graph TV, thereby enabling its detection by existing GSP-based detectors. Our numerical simulations on the IEEE-57 and IEEE-118 bus test cases reveal the potential threat posed by well-designed GSP-based FDI attacks. Moreover, we demonstrate that integrating the proposed protection design with GSP-based detection can lead to significant hardware cost savings compared to previous designs of protection methods against FDI attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
防范基于图表的电力系统虚假数据注入攻击
图形信号处理(GSP)已成为包括电力系统监测在内的实际网络应用的强大工具。最近的研究工作集中在开发基于gps的方法,用于状态估计、攻击检测和拓扑识别,使用电力系统电压作为平滑图信号的表示。在这个框架内,已经开发出有效的方法来检测虚假数据注入(FDI)攻击,到目前为止,这些攻击被认为是相对于图拉普拉斯矩阵的非光滑的。因此,这些方法可能对平滑的FDI攻击无效。在本文中,我们提出了一种图FDI (GFDI)攻击,该攻击在实际约束下最小化基于拉普拉斯的图总变异。我们将GFDI攻击作为一个非凸约束优化问题的解。通过使用$\ well _{1}$松弛来逼近GFDI攻击问题,得到了该问题的解。求解了一系列被归类为凸优化问题的二次规划问题,得到了最终解。然后,我们提出了一种保护方案,该方案确定了约束GFDI输出到高图形电视所需的最小测量集,从而使其能够被现有的基于gsp的检测器检测到。我们对IEEE-57和IEEE-118总线测试用例的数值模拟揭示了设计良好的基于gsp的FDI攻击所构成的潜在威胁。此外,我们证明,与以前针对FDI攻击的保护方法设计相比,将所提出的保护设计与基于gsp的检测相结合可以显著节省硬件成本。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Control of Network Systems
IEEE Transactions on Control of Network Systems Mathematics-Control and Optimization
CiteScore
7.80
自引率
7.10%
发文量
169
期刊介绍: The IEEE Transactions on Control of Network Systems is committed to the timely publication of high-impact papers at the intersection of control systems and network science. In particular, the journal addresses research on the analysis, design and implementation of networked control systems, as well as control over networks. Relevant work includes the full spectrum from basic research on control systems to the design of engineering solutions for automatic control of, and over, networks. The topics covered by this journal include: Coordinated control and estimation over networks, Control and computation over sensor networks, Control under communication constraints, Control and performance analysis issues that arise in the dynamics of networks used in application areas such as communications, computers, transportation, manufacturing, Web ranking and aggregation, social networks, biology, power systems, economics, Synchronization of activities across a controlled network, Stability analysis of controlled networks, Analysis of networks as hybrid dynamical systems.
期刊最新文献
Global Fixed-Time PPF-Dependent Event-Triggered Adaptive Control for Thermoacoustic Systems With Multiple Unknown Time Delays via FAS Approach A Unified Dual-Consensus Approach to Distributed Optimization With Globally Coupled Constraints Asynchronous Event-Triggered Impulsive Decentralized Control of Complex-Valued Multilayer Large-Scale Systems Under Deception Attacks IEEE Control Systems Society Information 2025 Index IEEE Transactions on Control of Network Systems Vol. 12
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1