4.7 Article

N-1 Reliability Makes It Difficult for False Data Injection Attacks to Cause Physical Consequences

Journal

IEEE TRANSACTIONS ON POWER SYSTEMS
Volume 36, Issue 5, Pages 3897-3906

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TPWRS.2021.3061480

Keywords

Bi-level optimization; cyber-security; false data injection attack; vulnerability of N-1 reliable power systems

Funding

  1. theNational Science Foundation (NSF) [CNS1449080, OAC-1934766]

Ask authors/readers for more resources

This paper demonstrates that false data injection (FDI) attacks are extremely limited in their ability to cause physical consequences on N - 1 reliable power systems operating with real-time contingency analysis (RTCA) and security constrained economic dispatch (SCED). Attacks designed using DCOPF fail to cause overflows on N - 1 reliable systems because the system response modeled is inaccurate. Therefore, it requires an extremely sophisticated attacker to cause physical consequences on N - 1 reliable power systems operated with RTCA and SCED.
This paper demonstrates that false data injection (FDI) attacks are extremely limited in their ability to cause physical consequences on N - 1 reliable power systems operating with real-time contingency analysis (RTCA) and security constrained economic dispatch (SCED). Prior work has shown that FDI attacks can be designed via an attacker-defender bi-level linear program (ADBLP) to cause physical overflows after re-dispatch using DCOPF. In this paper, it is shown that attacks designed using DCOPF fail to cause overflows on N - 1 reliable systems because the system response modeled is inaccurate. An ADBLP that accurately models the system response is proposed to find the worst-case physical consequences, thereby modeling a strong attacker with system level knowledge. Simulation results on the synthetic Texas system with 2000 buses show that even with the new enhanced attacks, for systems operated conservatively due to N - 1 constraints, the designed attacks only lead to post-contingency overflows. Moreover, the attacker must control a large portion of measurements and physically create a contingency in the system to cause consequences. Therefore, it is conceivable but requires an extremely sophisticated attacker to cause physical consequences on N - 1 reliable power systems operated with RTCA and SCED.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available