4.6 Article

Coordinated False Data Injection Attacks in AGC System and Its Countermeasure

Journal

IEEE ACCESS
Volume 8, Issue -, Pages 194640-194651

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2020.3033566

Keywords

Automatic generation control; Power system stability; Frequency synchronization; Time-frequency analysis; Automatic frequency control; False data injection attack; automatic generation control (AGC); pattern recognition; area control error (ACE)

Funding

  1. National Key Research and Development Program of China [2017YFB0902900]
  2. Provincial Educational Department Fund for Excellent Young Scholars [19B137]
  3. National College Students Innovative and Entrepreneurship Training Scheme [S202011528005]
  4. Provincial College Teaching Reform and Research Project [HNJG-2020-1062]

Ask authors/readers for more resources

The Automatic Generation Control (AGC) system is vital for power system frequency stability. The frequency and tie-line power flow are measured and transmitted to the control room to form Area Control Error (ACE), which is then sent to each generator for power generation adjustment. Due to the vulnerability of the Inter-Control Center Communication (ICCP) protocol, which is used for data transmission, many attacks such as Denial of Service, timing de-synchronization, and False Data Injection (FDI) attack can be inflicted upon the compromised system. In this paper, we investigated the attacking mechanism and the impact of the coordinated FDI attack. Compared with the single attack model, the coordinated FDI attack has a smaller Time to Emergency (TTE) value and wider parameter ranges. Therefore, it is stealthier and more harmful to the AGC system. However, it is found that the pattern of the corrupted ACEs (attacked by a specific coordination FDI attack) follows a specific fashion. Therefore, we proposed a self-learning and evolving approach to detect this stealthy attack. The real data from an electric company helps to train and test the pattern recognition model. The coordinated attack is simulated and compared in a 3-area AGC system, while the proposed detection method is verified via the IEEE 39-bus test system.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available