EXPOSE the Line Failures Following a Cyber-Physical Attack on the Power Grid

被引:24
作者
Soltan, Saleh [1 ,2 ]
Zussman, Gil [3 ]
机构
[1] Columbia Univ, New York, NY 10027 USA
[2] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[3] Columbia Univ, Dept Elect Engn, New York, NY 10027 USA
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2019年 / 6卷 / 01期
关键词
AC power flows; cyber attack; line failures detection; physical attack; state estimation; OPTIMIZATION; IDENTIFICATION; VULNERABILITY; PROTECTION; PLACEMENT; OUTAGES; SYSTEMS;
D O I
10.1109/TCNS.2018.2844244
中图分类号
TP [自动化技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
Recent attacks on power grids demonstrated their vulnerability to cyber and physical attacks. To analyze this vulnerability, we study cyber-physical attacks that affect both the power grid physical infrastructure and its underlying supervisory control and data acquisition system. We assume that an adversary attacks an area by : (i) disconnecting some lines within that area, and (ii) obstructing the information (e.g., status of the lines and voltage measurements) from within the area to reach the control center. We leverage the algebraic properties of the ac power flows to introduce the efficient expose algorithm for detecting line failures and recovering voltages inside that attacked area after such an attack. The expose algorithm outperforms the state-of-the-art algorithm for detecting line failures using partial information under the ac power flow model in terms of scalability and accuracy. The main advantages of the expose algorithm are that its running time is independent of the size of the grid and number of line failures, and that it provides accurate information recovery under some conditions on the attacked area. Moreover, it approximately recovers the information and provides the confidence of the solution when these conditions do not hold.
引用
收藏
页码:451 / 461
页数:11
相关论文
共 34 条
[1]
[Anonymous], 2016, ANAL CYBER ATTACK UK
[2]
[Anonymous], 2014, ASSAULT CALIFORNIA P
[3]
[Anonymous], IEEE T CONTROL NETW
[4]
Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid [J].
Ashok, Aditya ;
Govindarasu, Manimaran ;
Wang, Jianhui .
PROCEEDINGS OF THE IEEE, 2017, 105 (07) :1389-1407
[5]
Bapat RB, 2010, GRAPHS MATRICES
[6]
Bernstein Andrey, 2012, Performance Evaluation Review, V40, P33
[7]
Bienstock D., 2016, Electrical transmission system cascades and vulnerability - an operations research viewpoint, volume 22 of MOS-SIAM Series on Optimization
[8]
Dán G, 2010, INT CONF SMART GRID, P214, DOI 10.1109/SMARTGRID.2010.5622046
[9]
CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid [J].
Deng, Ruilong ;
Zhuang, Peng ;
Liang, Hao .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2420-2430
[10]
Complex systems analysis of series of blackouts: Cascading failure, critical points, and self-organization [J].
Dobson, Ian ;
Carreras, Benjamin A. ;
Lynch, Vickie E. ;
Newman, David E. .
CHAOS, 2007, 17 (02)