4.8 Article

Constrained-Differential-Evolution-Based Stealthy Sparse Cyber-Attack and Countermeasure in an AC Smart Grid

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 18, Issue 8, Pages 5275-5285

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2021.3129487

Keywords

Detectors; Smart grids; Optimization; State estimation; Phasor measurement units; Power system dynamics; Pollution measurement; Constrained differential evolution (CDE); false data injection attack (FDIA); generalized cumulative sum; smart grid security; stealthy sparse cyber-attack

Funding

  1. National Natural Science Foundation of China [U1966202, TII-21-3553]

Ask authors/readers for more resources

This article investigates the stealthy cyber-attack and its countermeasure in smart grids. A stealthy sparse cyber-attack model is proposed, and a constrained optimization problem is formulated to design the model by minimizing the number of contaminated meters. A generalized-cumulative-sum-based detector is developed to detect the proposed cyber-attacks. Numerical studies demonstrate the feasibility and effectiveness of the proposed countermeasure.
As the next-generation power grids, smart grids are integrated with advanced information and communication technology (ICT) to make the grid more efficient and stable than conventional power systems. Given the mounting cyber-attack threats, these critical ICT systems create great security issues for smart grids. Additionally, the clever attackers have the ability to not only access and monitor the smart grid, but also hack it by launching well-established cyber-attacks. Thus, this article is devoted to understanding the potential stealthy cyber-attack and its countermeasure. First, this article proposes a stealthy sparse cyber-attack model in an ac smart grid by considering both the residual test-based detector and the interval-state-estimation-based detector, which is not considered in previous studies. The design model is formulated as a constrained optimization problem by minimizing the number of contaminated meters, where the characteristics of two types of detector are considered simultaneously as the constraints for the first time. A constrained differential evolution (CDE) is proposed as the solver because the optimization problem is NP-hard. Then, a generalized-cumulative-sum-based detector is developed to detect the proposed cyber-attacks, where a fractional-order state transition matrix is originally introduced into the estimator to describe the dynamics of the power system. Numerical studies illustrate the feasibility of CDE-based stealthy sparse cyber-attacks and the effectiveness of the proposed countermeasure.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available