0% found this document useful (0 votes)
54 views2 pages

Robust Detection of Cyber Attacks On State Estimators Using Phasor Measurements

This document discusses a proposed method for detecting cyber attacks on state estimators in power systems. The method uses phasor measurement unit (PMU) measurements to perform two independent state estimations: one using only secure PMU measurements, and another using the remaining SCADA and PMU measurements. It then uses robust projection statistics to check for statistical consistency between the two estimation results, in order to detect the presence of false data injection attacks. Numerical testing validates that the method can effectively detect imperfect attacks using only a limited number of secure PMU measurements.

Uploaded by

pmahesh268
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views2 pages

Robust Detection of Cyber Attacks On State Estimators Using Phasor Measurements

This document discusses a proposed method for detecting cyber attacks on state estimators in power systems. The method uses phasor measurement unit (PMU) measurements to perform two independent state estimations: one using only secure PMU measurements, and another using the remaining SCADA and PMU measurements. It then uses robust projection statistics to check for statistical consistency between the two estimation results, in order to detect the presence of false data injection attacks. Numerical testing validates that the method can effectively detect imperfect attacks using only a limited number of secure PMU measurements.

Uploaded by

pmahesh268
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

This article has been accepted for publication in a future issue of this journal, but has not been

fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2016.2603447, IEEE
Transactions on Power Systems

IEEE POWER ENGINEERING LETTERS, VOL. , NO. , 2016 1

Robust Detection of Cyber Attacks on State Estimators Using


Phasor Measurements
Junbo Zhao, Student Member, IEEE, Gexiang Zhang, Member, IEEE, and Rabih A. Jabr, Fellow, IEEE

Abstract—This letter proposes a statistical consistency check based to be normally distributed with zero mean and covariance matrix R,
imperfect false data injection attacks detector that is more effective than i.e., e ∼ N (0, R). Define W = R−1 , the state can be estimated
the conventional residual-based methods. It is shown that the proposed
by: ( )−1
detector could detect attacks with high probability by using a limited
number of secure PMU measurements even if the probability of false x̂ = H T W H H T W z. (2)
alarm is low. Numerical results validate its effectiveness and practicability.
The commonly used detection algorithms assume the existence of
Index Terms—Phasor measurements, power system security, robust- bad measurements as long as the condition ∥z − H x̂∥ > τ holds,
ness, state estimation. where τ is a pre-defined detection threshold. However, [1] discovered
that if the attack vector a is of the form: a = Hc (also called a
perfect FDIA), then the attacker will bypass the detection algorithm.
I. I NTRODUCTION
The key idea behind perfect FDIAs is to ensure that the measurement
O defend against false data injection attacks (FDIAs), various
T measurement protection based methods have been proposed.
The aim of protecting a subset of measurements is to make the perfect
residual is unchanged so as to be undetectable by the measurement
residual-based detectors. It is almost impossible for any hacker to
launch such perfect FDIAs against practical power systems because
FDIAs [1] completely impossible [2], [3] and at the same time to the hacker is restricted to limited access to system information mainly
increase the cost for a hacker to successfully launch imperfect FDIAs. due to measurement protection schemes and data authentication [3].
Note that an imperfect FDIA cannot keep the measurement residual However, the imperfect FDIAs [2], [4], [5] still pose great challenges
unchanged, thus increasing its possibility of being detected by the to the conventional bad data detection methods. In this letter, a robust
control center. However, good imperfect FDIAs do not increase the detector that makes use of limited PMU measurements is proposed
measurement residual too much and the attacked largest normalized to handle imperfect FDIAs.
residual does not violate the bad data detection threshold. Thus,
imperfect FDIAs are still very challenging for the conventional B. The Proposed Detector
measurement residual-based bad data detection methods [2], [4], [5].
Recall that the objective of an attacker is to alter the estimation
This letter proposes an imperfect FDIAs detector based on a
results by injecting malicious measurements. In other words, once
statistical consistency check using modified projection statistics with
some measurements are compromised, the distribution of the esti-
a limited number of secure measurements. To accomplish the statis-
mated state vector would be perturbed by the attack [6]. If one could
tical test, two independent state estimations are performed: (i) the
find a set of measurements that can produce a close approximation to
secure PMU measurements based robust state estimation and (ii) the
the true estimated state vector and its distribution, then this statistical
hybrid state estimation that processes the remaining SCADA and
information can be further used to double check the estimation results
PMU measurements. The robust projection statistics algorithm is then
obtained from the remaining measurements. This can be done first
used for checking the statistical consistency of the estimation results
by leveraging a small subset of secure PMU measurements, which
from the two independent estimators, and consequently to determine
make the system observable, to obtain the estimation results. A
whether FDIAs exist or not. To the best of our knowledge, there is
statistical consistency check is then performed between the secure
little work on developing an effective imperfect FDIAs detector.
PMU measurements based robust estimation and the hybrid state
estimation that uses the remaining SCADA and PMU measurements,
II. M ETHOD FOR ATTACK D ETECTION to determine whether FDIAs exist or not. Therefore, the challenging
A. Problem Formulation issue is how to perform the statistical consistency check effectively.
For a power system, the state estimation using a linear or linearized In this letter, a robust projection statistics algorithm-based detector
measurement model is: for the state statistical consistency check is proposed. Note that
here, the state estimation model itself is an approximate model with
z = Hx + e, (1) parameter uncertainty, measurement bias, topology uncertainty, etc.
where z and x are the measurement vector and state vector, respec- Thus, a high measurement redundancy is required to get the system
tively; H is the Jacobian matrix that relates the measurements to the approximate true state. This motivates the need to use and correct the
state variables; and e is a measurement error vector that is assumed remaining SCADA and PMU measurements that contribute to system
measurement redundancy improvement and system visualization.
This work was supported in part by the National NSFC under Grants By partitioning the measurement
61170016 and 61373047. The work of J. Zhao was supported by the CSC [ ]T vector[ and the ]Jacobian
T
matrix
into two parts, i.e, z = zpT zlT , H = HpT HlT , and defining
under Grant 201407000013.Corresponding author: Gexiang Zhang
J. Zhao and G. Zhang are with the School of Electrical Engineering, the x̂p and x̂l as the estimated state vectors by using secure PMU
Southwest Jiaotong University, Chengdu 610031, China. J. Zhao is also measurements and the remaining SCADA and PMU measurements,
with the Bradley Department of Electrical Computer Engineering, Virginia respectively, we obtain the following formulations:
Polytechnic Institute and State University, Northern Virginia Center, Falls ( )−1
Church, VA 22043 USA (e-mail: [email protected]; [email protected]). x̂p = Hp T Wp Hp Hp T Wp zp , (3)
R. A. Jabr is with the Department of Electrical and Computer Engineer-
ing, American University of Beirut, Beirut 1107 2020, Lebanon (e-mail: ( )−1
[email protected]). x̂l = Hl T Wl Hl Hl T Wl zl , (4)

0885-8950 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2016.2603447, IEEE
Transactions on Power Systems

IEEE POWER ENGINEERING LETTERS, VOL. , NO. , 2016 2

1 1

0.9 0.9

0.8 0.8

0.7 0.7
Detection Probability

Detection Probability
0.6 0.6

0.5 0.5

0.4 0.4

0.3 0.3

0.2 0.2

J(x) detector J(x) detector


0.1 LNR detector 0.1
LNR detector
Proposed detector Proposed detector
0 0
0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1 1 2 3 4 5 6 7 8 9 10
False Alarm Attack magnitude with different standard deviation errors

Fig. 1. ROC curves for the proposed robust detector on the IEEE 118-bus Fig. 2. Sensitivity of the proposed robust detector for different state attack
test system magnitudes

where the subscripts p and l denote the secure PMU measurements largest normalized residual (LNR) test based detector and the objec-
and the remaining measurements; the weight matrix Wl is determined tive function (J(x̂)) based detector are employed for comparison; all
from the measurement variances, while Wp is determined using the the tests are based on 100 Monte-Carlo simulations.
robust scale and the Huber ψ function [7] for handling the possible Fig. 1 shows the detection probability versus the false alarm
occurrence of bad data in secure PMU measurements. The number probability (ROC curves) for the proposed and classical detectors;
of secure PMU measurements is determined by the method in [3]. it can be observed that the performance of the proposed detector is
Proposed detector based on robust projection statistics: To effec- superior to the traditional ones. Even when the probability of false
tively perform the statistical consistency check, this paper proposes alarm is low, e.g, 5%, there is more than 90% chance to detect the
to apply projection statistics (PS) to the matrix X = [b xp xbl ]T . The attacks by using the proposed method. While for the two traditional
PS of the ith row vector, ℓi in X, is defined as the maximum of detectors, even if the probability of false alarm is at 10%, the chance
the standardized projections of all the ℓi ’s on every direction l that of detecting the attacks does not reach 90%.
originates from the coordinatewise medians that pass through every To test the sensitivity of the proposed method under different attack
data point, and where the standardized projections are based on the scenarios, the attack magnitude is varied from 1 to 10 standard
sample median and the median-absolute-deviation [7]. Formally we deviations with 0.05 false alarm probability. Fig. 2 presents the
have T ( ) simulation results from which it can be observed that the proposed
ℓi l − medj ℓTj l detector has relatively low detection probability to the attacks that
P Si = max ( ) . (5)
∥l∥=1 1.4826 medk ℓT l − medj ℓT l introduce less than 3 times standard deviation error, while it has
k j
very high detection probability to attacks with more than 3 times
The reason why PS is applied to matrix X is that x bp with its standard deviation error. The results of the other two methods have a
associated distribution is close to the SE results using non-attacked similar trend, but their detection performances are much lower than
measurements, and if there is no attack in the remaining SCADA the proposed method. The only limitation of the proposed method is
and PMU measurements, then x bl with its distribution is also close that it requires local measurement redundancy to suppress the possible
bp will deviate from
to the SE results; otherwise, the distribution of x occurrence of bad data in the secure PMU measurements. This is
bl . Therefore, by checking the statistics of x
x bp and x bl , the attacks unlikely to be a concern given the high measurement redundancy in
could be identified. In this letter, the states, whose associated PS transmission networks.
values satisfy P Si > χ22,α [7], are marked as attacked states with
α confidence in the statistical hypothesis testing; α usually varies R EFERENCES
between 0.9 and 0.99.
[1] Y. Liu, P. Ning, M. K. Reiter, “False data injection attacks against state
estimation in electric power grids,” ACM Transactions on Information and
III. N UMERICAL R ESULTS System Security, vol. 14, no. 1, pp. 1-33, May 2011.
[2] X. Liu, Z. Li, “False data attacks against AC state estimation with
The proposed detector is tested on the 118-bus test system. The incomplete network information,” IEEE Trans. Smart Grid, 2016.
number of secure PMUs is chosen according to [3]. The PMU can [3] T. T. Kim, H.V. Poor, “Strategic protection against data injection attacks
measure both the bus voltage angles and the power flows on all on power grids,” IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326–333,
branches incident to that bus. In the simulation, since it is generally 2011.
accepted that the precision of PMU measurements is much higher [4] J. B. Zhao, G. X. Zhang, et al, “Short-term state forecasting-aided method
for detection of smart grid general false data injection attacks,” IEEE
than SCADA measurements, the Gaussian noise for SCADA and Trans. Smart Grid, 2015, DOI: 10.1109/TSG.2015.2492827.
PMU measurements are with zero mean and standard deviations 0.01 [5] J. B. Zhao, G. X. Zhang, Z. Y. Dong, K. P. Wong, “Forecasting-aided
and 0.001, respectively; it is assumed that the adversary targeted imperfect false data injection attacks against power system nonlinear state
attacking the state variable θ5 with 8 times standard deviation error estimation,” IEEE Trans. on Smart Grid, Vol. 7, no. 1, pp. 6–8, 2016.
[6] O Kosut, L Jia, R. J Thomas, L Tong, “Malicious data attacks on the
(please see [2], [4], [5] for more information about how to construct smart grid,” IEEE Trans. Smart Grid, Vol. 2, no. 4, pp. 645-658, 2011.
an imperfect FDIA). The receiver operator characteristic (ROC) [7] L. Mili, M. Cheniae, N. Vichare, P. Rousseeuw, “Robust state estimation
curves [4], [6] are used to depict the tradeoff between the two based on projection statistics,” IEEE Trans. Power Syst., vol. 11, no. 2,
probabilities of attack detection and false alarm. The widely used pp. 1118–1127, May 1996.

0885-8950 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

You might also like