TY - JOUR
T1 - Attack Power System State Estimation by Implicitly Learning the Underlying Models
AU - Costilla-Enriquez, Napoleon
AU - Weng, Yang
N1 - Funding Information:
This work was supported in part by the U.S. Department of Energy s Office of Energy Efficiency and Renewable Energy (EERE) through the solar Energy Technologies Office under Award DE-EE0009355; in part by the Department of Energy under Grant DEAR00001858-1631; in part by the National Science Foundation (NSF) under Grant ECCS-1810537 and Grant ECCS-2048288; and in part by the Fondo de Sustentabilidad Energetica CONACYT-SENER, Mexico, under Grant 708642.
Publisher Copyright:
© 2010-2012 IEEE.
PY - 2023/1/1
Y1 - 2023/1/1
N2 - False data injection attacks (FDIAs) are a real and latent threat in modern power systems networks due to the unprecedented integration of data acquisition systems. It is of utmost importance to understand attacking mechanisms to design countermeasures. To successfully deploy a FDIA, most past FDIA strategies need privileged power system information, which is carefully held by the power system operator. Newer approaches circumvent this issue by solely relying on intercepted measurement data, but they lack mathematical warranties of succeeding. This paper exposes power systems' vulnerability by showing that it is possible to deploy an attack without confidential information and, at the same time, to have a high probability of being successful. We present a scheme that learns (1) the implicit power system measurement distribution and (2) a surrogate of the unknown state estimator model. The proposed framework utilizes a Wasserstein generative adversarial network to learn the measurement distribution and an autoencoder to learn the unknown state estimator model. Additionally, we present a convergence proof that ensures that the proposed framework converges to the power system measurement distribution. The proposed method is demonstrated to be successful via extensive simulation on IEEE 9-, 14-, 57-, 118-, and 300-bus test cases.
AB - False data injection attacks (FDIAs) are a real and latent threat in modern power systems networks due to the unprecedented integration of data acquisition systems. It is of utmost importance to understand attacking mechanisms to design countermeasures. To successfully deploy a FDIA, most past FDIA strategies need privileged power system information, which is carefully held by the power system operator. Newer approaches circumvent this issue by solely relying on intercepted measurement data, but they lack mathematical warranties of succeeding. This paper exposes power systems' vulnerability by showing that it is possible to deploy an attack without confidential information and, at the same time, to have a high probability of being successful. We present a scheme that learns (1) the implicit power system measurement distribution and (2) a surrogate of the unknown state estimator model. The proposed framework utilizes a Wasserstein generative adversarial network to learn the measurement distribution and an autoencoder to learn the unknown state estimator model. Additionally, we present a convergence proof that ensures that the proposed framework converges to the power system measurement distribution. The proposed method is demonstrated to be successful via extensive simulation on IEEE 9-, 14-, 57-, 118-, and 300-bus test cases.
KW - False data injection attack
KW - Wasserstein generative adversarial networks (WGANs)
KW - adversarial examples
KW - autoencoder (AE)
KW - no system information
KW - state estimation
UR - http://www.scopus.com/inward/record.url?scp=85136153044&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85136153044&partnerID=8YFLogxK
U2 - 10.1109/TSG.2022.3197770
DO - 10.1109/TSG.2022.3197770
M3 - Article
AN - SCOPUS:85136153044
SN - 1949-3053
VL - 14
SP - 649
EP - 662
JO - IEEE Transactions on Smart Grid
JF - IEEE Transactions on Smart Grid
IS - 1
ER -