Revealing a New Vulnerability of Distributed State Estimation: A Data Integrity Attack and an Unsupervised Detection Algorithm

Alireza Shefaei, Mostafa Mohammadpourfard, Behnam Mohammadi-Ivatloo, Yang Weng

Research output: Contribution to journalArticlepeer-review

6 Scopus citations

Abstract

This article proposes a distributed false data injection attack (FDIA) by attacking to the boundary buses in an interconnected power system. The proposed attack utilizes the measurements corresponding to a set of boundary buses in each neighboring areas to inject arbitrary errors to the estimated states of those buses. It is demonstrated that the attack not only gets through the robust distributed estimators but also bypasses the convergence-based detection methods. Furthermore, in an illustrative example, the differences in the attack with the conventional FDIA are briefly explained. Then, finding the optimal attack vector to minimize the maximum difference between the per area errors by considering the attacker's limitations is formulated as a mixed-integer second-order cone programming problem. Finally, an unsupervised machine learning-based detection method is proposed utilizing a kernel density estimation technique along with statistical measures. This follows an outlier detection to filter out attacks. To show the performance of the detector, the n-1 contingency, which changes the probability distribution of data is analyzed. The proposed attack and detector are tested on various IEEE systems such as IEEE 14-bus and IEEE 118-bus test systems and the results are discussed.

Original languageEnglish (US)
Pages (from-to)706-718
Number of pages13
JournalIEEE Transactions on Control of Network Systems
Volume9
Issue number2
DOIs
StatePublished - Jun 1 2022

Keywords

  • Cybersecurity
  • decentralization
  • distributed false data injection attack
  • machine learning
  • smart grid

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Signal Processing
  • Computer Networks and Communications
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Revealing a New Vulnerability of Distributed State Estimation: A Data Integrity Attack and an Unsupervised Detection Algorithm'. Together they form a unique fingerprint.

Cite this