4.7 Article

Optimal Partial Feedback Attacks in Cyber-Physical Power Systems

期刊

IEEE TRANSACTIONS ON AUTOMATIC CONTROL
卷 65, 期 9, 页码 3919-3926

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TAC.2020.2981915

关键词

Switches; Generators; Frequency measurement; Frequency control; Sun; Power grids; Convex relaxation; location-switching attacks; mixed integer; partial feedback; switching condition

资金

  1. Shanghai Super Postdoctoral Funding Program
  2. National Natural Science Foundation of China (NSFC) [U19A2069]
  3. National Science Foundation [1711471, 1901134]
  4. NSFC [61720106011, 61925303]
  5. NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization [U1509215]
  6. Direct For Computer & Info Scie & Enginr
  7. Division of Computing and Communication Foundations [1901134] Funding Source: National Science Foundation

向作者/读者索取更多资源

This article considers false data injection attacks constructed based on partial feedback of generator frequencies in a cyber-physical power system. The goal of the attacker is to destabilize the system, by compromising a subset of frequency control signals with false data injection, without consuming much energy. In this context, two attack design problems are studied, considering both location-fixed attacks and location-switching attacks based on measurable generator bus frequencies. They are further modeled as switched control problems, for which closed-form solutions can be attained. Leveraging the maximum principle, the diagonal partial feedback matrix is optimized by solving a convex optimization problem. The convexified switching variables describing the switching behavior are solved in a quadratic optimization problem and a fractional optimization problem, respectively. As a result, optimal switching conditions to select the best attack locations are obtained, along with optimal partial feedback attack matrices. Case studies on the IEEE 9-bus test system validate the practical merits of theory and numerical effectiveness of the proposed attack schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据