4.7 Article

Optimal Partial Feedback Attacks in Cyber-Physical Power Systems

Journal

IEEE TRANSACTIONS ON AUTOMATIC CONTROL
Volume 65, Issue 9, Pages 3919-3926

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TAC.2020.2981915

Keywords

Switches; Generators; Frequency measurement; Frequency control; Sun; Power grids; Convex relaxation; location-switching attacks; mixed integer; partial feedback; switching condition

Funding

  1. Shanghai Super Postdoctoral Funding Program
  2. National Natural Science Foundation of China (NSFC) [U19A2069]
  3. National Science Foundation [1711471, 1901134]
  4. NSFC [61720106011, 61925303]
  5. NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization [U1509215]
  6. Direct For Computer & Info Scie & Enginr
  7. Division of Computing and Communication Foundations [1901134] Funding Source: National Science Foundation

Ask authors/readers for more resources

This article considers false data injection attacks constructed based on partial feedback of generator frequencies in a cyber-physical power system. The goal of the attacker is to destabilize the system, by compromising a subset of frequency control signals with false data injection, without consuming much energy. In this context, two attack design problems are studied, considering both location-fixed attacks and location-switching attacks based on measurable generator bus frequencies. They are further modeled as switched control problems, for which closed-form solutions can be attained. Leveraging the maximum principle, the diagonal partial feedback matrix is optimized by solving a convex optimization problem. The convexified switching variables describing the switching behavior are solved in a quadratic optimization problem and a fractional optimization problem, respectively. As a result, optimal switching conditions to select the best attack locations are obtained, along with optimal partial feedback attack matrices. Case studies on the IEEE 9-bus test system validate the practical merits of theory and numerical effectiveness of the proposed attack schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available