Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

نویسندگان

چکیده مقاله:

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfiguration as a strategy to decrease FDI attacks on distribution system state estimation. It is well-known that network reconfiguration is a common approach in distribution systems to improve the system’s operation. In this paper, a modified switch opening and exchange (MSOE) method is used to reconfigure the network. The proposed method is tested on the IEEE 33-bus system. It is shown that network reconfiguration decreases the power measurements manipulation under false data injection attacks. Also, the resilient configuration of the distribution system is achieved, and the best particular configuration for reducing FDI attacks on each bus is obtained.   

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting False Data Injection Attacks on DC State Estimation

State estimation is an important power system application that is used to estimate the state of the power transmission networks using (usually) a redundant set of sensor measurements and network topology information. Many power system applications such as contingency analysis rely on the output of the state estimator. Until recently it was assumed that the techniques used to detect and identify...

متن کامل

Extended Distributed State Estimation: A Detection Method against Tolerable False Data Injection Attacks in Smart Grids

False data injection (FDI) is considered to be one of the most dangerous cyber-attacks in smart grids, as it may lead to energy theft from end users, false dispatch in the distribution process, and device breakdown during power generation. In this paper, a novel kind of FDI attack, named tolerable false data injection (TFDI), is constructed. Such attacks exploit the traditional detector’s toler...

متن کامل

False Data Injection Attacks in Control Systems

This paper analyzes the effects of false data injection attacks on Control System. We assume that the system, equipped with a Kalman filter and LQG controller, is used to monitor and control a discrete linear time invariant Gaussian system. We further assume that the system is equipped with a failure detector. An attacker wishes to destabilize the system by compromising a subset of sensors and ...

متن کامل

Vulnerabilities of Smart Grid State Estimation against False Data Injection Attack

In recent years, Information Security has become a notable issue in the energy sector. After the invention of ‘The Stuxnet worm’ [1] in 2010, data integrity, privacy and confidentiality has received significant importance in the real-time operation of the control centres. New methods and frameworks are being developed to protect the National Critical Infrastructures likeenergy sector. In the re...

متن کامل

Consequences of False Data Injection on Power System State Estimation by

The electric power system is one of the largest, most complicated, and most important cyber-physical systems in the world. The link between the cyber and physical level is the Supervisory Control and Data Acquisition (SCADA) systems and Energy Management Systems (EMS). Their functions include monitoring the real-time system operation through state estimation (SE), controlling the system to oper...

متن کامل

A Security Method for Multiple Attacks in Sensor Networks: against False-report Injection, False-vote Injection, and Wormhole Attacks

In a large-scale wireless sensor network, damage spreads rapidly in the network when under false report injection, false votes injection, or wormhole attacks. These attacks cause finite energy resources to be drained, legitimate reports to be dropped, and data to be intercepted by adversary nodes. A probabilistic voting-based filtering scheme (PVFS) and localized encryption and authentication p...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 18  شماره 4

صفحات  2569- 2569

تاریخ انتشار 2022-12

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

کلمات کلیدی

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023