3.8 Proceedings Paper

State Estimator and Machine Learning Analysis of Residual Differences to Detect and Identify FDI and Parameter Errors in Smart Grids

出版社

IEEE
DOI: 10.1109/NAPS50074.2021.9449772

关键词

smart grid; machine learning; state estimation; parameter attack; cyber-security

资金

  1. National Science Foundation [1809739]
  2. Directorate For Engineering
  3. Div Of Electrical, Commun & Cyber Sys [1809739] Funding Source: National Science Foundation

向作者/读者索取更多资源

Security in the modern Smart Grid is a significant topic, with attackers potentially misleading State Estimation through False Data Injection or attacking network parameters. Machine learning techniques are being used to enhance detection of FDI attacks, while distinguishing between parameter attacks remains a challenge.
In the modern Smart Grid (SG), cyber-security is an increasingly important topic of research. An attacker can mislead the State Estimation (SE) process through a False Data Injection (FDI) on real-time measurement values or they can attack the parameters of the network that represent the system topology. While research has been done in SE bad data analysis, parameter attacks have proven to be difficult to distinguish from FDI attacks using physics-based techniques. Machine learning (ML) techniques have recently been used to enhance the detection of FDI attacks in an algorithm called Ensemble CorrDet with Adaptive Statistics (ECD-AS). ECD-AS, as developed, analyzes the real-time measurement values throughout the SG to detect FDI attacks. Parameter attacks, on the other hand, don't impact the measurements. Instead, the estimate of state variables of SE will be affected. This paper presents a collaborative framework of ML and SE for detection and identification of errors in system measurements and parameters. The residual difference space is introduced, created from the physics-based SE and ML-based measurement estimation processes, and analyzed by ECD-AS. A case study on the IEEE 118-bus system is presented. Numerical results show that the presented framework outperforms state-of-the-art method in detecting and identifying both FDI and parameter attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据