论文标题

在电力系统中识别不可观察的虚假数据注射攻击的结构性约束方法

Structural-constrained Methods for the Identification of Unobservable False Data Injection Attacks in Power Systems

论文作者

Morgenstern, Gal, Routtenberg, Tirza

论文摘要

电力系统功能是根据电力系统状态估计(PSSE)确定的。因此,PSSE的腐败可能会导致严重的后果,例如财务损失,维护损失和电力分配中断。为了确保PSSE可靠性而开发的经典不良数据检测(BDD)方法无法检测到精心设计的攻击,称为无观察到的错误数据注射(FDI)攻击。在本文中,我们开发了新的结构性约束方法,用于检测不可观察的外国直接投资攻击,鉴定受攻击的公共汽车位置以及在存在此类攻击的情况下PSSE。所提出的方法基于对攻击和系统负载的结构,稀疏约束的制定。首先,我们利用这些约束来构成适当的模型选择问题。然后,我们为此问题开发了相关的广义信息标准(GIC)。但是,对于大型网络,GIC方法的计算复杂性随着网络大小而成倍增长。因此,基于提出的结构和稀疏约束,我们开发了两种新型的低复杂性方法,用于无法观察到的FDI攻击识别:1)对最新的正交匹配追求(OMP)的修改; 2)一种利用电源系统中的马尔可夫属性的方法,即系统总线上的电源数据之间的第二邻居关系。在IEEE-30总线测试用例系统上评估了方法的性能。

Power system functionality is determined on the basis of the power system state estimation (PSSE). Thus, corruption of the PSSE may lead to severe consequences, such as financial losses, maintenance damage, and disruptions in electricity distribution. Classical bad data detection (BDD) methods, developed to ensure PSSE reliability, are unable to detect well-designed attacks, named unobservable false data injection (FDI) attacks. In this paper, we develop novel structural-constrained methods for the detection of unobservable FDI attacks, the identification of the attacked buses' locations, and PSSE under the presence of such attacks. The proposed methods are based on formulating structural, sparse constraints on both the attack and the system loads. First, we exploit these constraints in order to compose an appropriate model selection problem. Then, we develop the associated generalized information criterion (GIC) for this problem. However, for large networks, the GIC method's computational complexity grows exponentially with the network size. Thus, based on the proposed structural and sparse constraints, we develop two novel low-complexity methods for unobservable FDI attack identification: 1) a modification of the state-of-the-art orthogonal matching pursuit (OMP); and 2) a method that utilizes the graph Markovian property in power systems, i.e. the second-neighbor relationship between the power data at the system's buses. The methods' performance is evaluated on a IEEE-30 bus test case system.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源