Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Cyber-attacks against cyber-physical power systems security: : State estimation, attacks reconstruction and defense strategy

Published: 15 January 2022 Publication History

Highlights

A method of security state estimation and attack reconstruction of attacked CPPS based on robust intermediate observer is proposed.
An attack defense strategy based on observer data is proposed.
By adjusting the active power output of the generator, the system achieves attack redistribution while satisfying the economic optimal condition.
The new attack and defense strategy proposed by us adjusts the power variation of the generator under real operation.
The change of the output power of the system before and after the attack is shown intuitively in the whole process, which has more practical application value.

Abstract

In modern power systems, the connection between cyber part and physical part is more and more close and deeply coupled, while cyber-physical power systems (CPPS) can exactly describe the dynamic process of modern power grids. The problem of secure state estimation and attack reconstruction of cyber-attacks corrupting states of CPPS is addressed. First, the classical small signal model of CPPS under disturbance and cyber-attacks is established. Then, an intermediate observer is proposed to realize the security state estimation and state attack reconstruction of CPPS under cyber-attacks, meanwhile, the linear matrix inequality (LMI) is used to solve the parameters of the intermediate observer. Finally, an attack defense strategy satisfying optimal economic dispatch is proposed. Case studies are presented to assess the effectiveness of intermediate observer reconstruction and the effectiveness of defense strategy.

References

[1]
S. Amini, F. Pasqualetti, H. Mohsenian-Rad, Dynamic load altering attacks against power system stability: attack models and protection schemes, IEEE Trans Smart Grid 9 (4) (2018) 2862–2872.
[2]
W. Ao, Y. Song, C. Wen, Adaptive cyber-physical system attack detection and reconstruction with application to power systems, IET Control Theory & Applications 10 (12) (2016) 1458–1468.
[3]
S. Bi, Y.J. Zhang, Graphical methods for defense against false-data injection attacks on power system state estimation, IEEE Trans Smart Grid 5 (3) (2014) 1216–1227.
[4]
M.H. Cintuglu, O.A. Mohammed, K. Akkaya, A.S. Uluagac, A survey on smart grid cyber-physical system testbeds, IEEE Communications Surveys & Tutorials 19 (1) (2017) 446–464.
[5]
M. Corless, T.U. Jay, State and input estimation for a class of uncertain systems, Automatica 34 (6) (1998) 757–764.
[6]
M.L. Corradini, A. Cristofaro, Robust detection and reconstruction of state and sensor attacks for cyber-physical systems using sliding modes, IET Control Theory & Applications 11 (11) (2017) 1756–1766.
[7]
R. Deng, G. Xiao, R. Lu, H. Liang, A.V. Vasilakos, False data injection on state estimation in power systems-attacks, impacts, and defense: a survey, IEEE Trans. Ind. Inf. 13 (2) (2017) 411–423.
[8]
F. Dorfler, F. Bullo, Kron reduction of graphs with applications to electrical networks, IEEE Transactions on Circuits & Systems I Regular Papers 60 (1) (2013) 150–163.
[9]
D. Efimov, L. Fridman, Global sliding-mode observer with adjusted gains for locally lipschitz systems, Automatica 47 (3) (2011) 565–570.
[10]
Z. Feng, H. Shao, L. Shao, Further results on event-triggered H ∞ networked control for neural networks with stochastic cyber-attacks, Appl Math Comput 386 (2020) 125431.
[11]
J. Glover, Power system analysis and design(1987) 827.
[12]
Y. Han, Y. Kao, C. Gao, Robust sliding mode control for uncertain discrete singular systems with time-varying delays and external disturbances, Automatica 75 (2017) 210–216.
[13]
Y. Han, K. Li, F. Ge, Y. Wang, W. Xu, Online fault diagnosis for sucker rod pumping well by optimized density peak clustering, ISA Trans (2021),.
[14]
Y. Han, C.Y. Su, Y. Kao, C. Gao, Non-fragile sliding mode control of discrete switched singular systems with time-varying delays, IET Control Theory & Applications 14 (5) (2020) 726–737.
[15]
X. Huang, J. Dong, A robust dynamic compensation approach for cyber-physical systems against multiple types of actuator attacks, Appl Math Comput 380 (2020) 125284.
[16]
A. Humayed, J. Lin, F. Li, B. Luo, Cyber-physical systems security – a survey, IEEE Internet Things J. 4 (6) (2017) 1802–1831.
[17]
F. Jabbari, R.W. Benson, Observers for stabilization of systems with matched uncertainty, Dynamics & Control 2 (3) (1992) 303–323.
[18]
J. Li, K. Pan, D. Zhang, Q. Su, Robust fault detection and estimation observer design for switched systems, Nonlinear Anal. Hybrid Syst 34 (2019) 30–42.
[19]
C.-Q. Liu, X.-J. Li, Y. Long, J. Sun, Output feedback secure control for cyber-physical systems against sparse sensor attacks, Appl Math Comput 384 (2020) 125384.
[20]
A.Y. Lu, G.H. Yang, Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched luenberger observer, Inf Sci (Ny) 417 (2017) 454–464.
[21]
X. Lyu, Y. Ding, S. Yang, Safety and security risk assessment in cyber-physical systems, IET Cyber-Physical Systems: Theory & Applications 4 (3) (2019) 221–232.
[22]
F. Pasqualetti, A. Bicchi, F. Bullo, A graph-theoretical characterization of power network vulnerabilities, Proceedings of the 2011 American Control Conference, 2011, pp. 3918–3923.
[23]
R. Rajkumar, I. Lee, L. Sha, J. Stankovic, Cyber-physical systems: The next computing revolution, Design Automation Conference, 2010, pp. 731–736.
[24]
H. Shen, Z. Huang, J. Cao, J.H. Park, Exponential H ∞ filtering for continuous-time switched neural networks under persistent dwell-time switching regularity, IEEE Trans Cybern 50 (6) (2020) 2440–2449.
[25]
S. Sridhar, A. Hahn, M. Govindarasu, Cyber-physical system security for the electric power grid, Proc. IEEE 100 (1) (2011) 210–224.
[26]
Q. Su, Z. Fan, T. Lu, Y. Long, J. Li, Fault detection for switched systems with all modes unstable based on interval observer, Inf Sci (Ny) 517 (2020) 167–182.
[27]
Q. Su, S. Li, Y. Gao, X. Huang, J. Li, Observer-based detection and reconstruction of dynamic load altering attack in smart grid, J Franklin Inst (2021),.
[28]
A.F. Taha, J. Qi, J. Wang, J.H. Panchal, Risk mitigation for dynamic state estimation against cyber attacks and unknown inputs, IEEE Trans Smart Grid 9 (2) (2018) 886–899.
[29]
J. Tavčar, I. Horváth, A review of the principles of designing smart cyber-physical systems for run-time adaptation: learned lessons and open issues, IEEE Transactions on Systems, Man, and Cybernetics: Systems 49 (1) (2019) 145–158.
[30]
J. Wang, Z. Huang, Z. Wu, J. Cao, H. Shen, Extended dissipative control for singularly perturbed pdt switched systems and its application, IEEE Trans. Circuits Syst. I Regul. Pap. 67 (12) (2020) 5281–5289.
[31]
J. Wang, Y. Wang, H. Yan, J. Cao, H. Shen, Hybrid event-based leader-following consensus of nonlinear multiagent systems with semi-markov jump parameters, IEEE Syst. J. (2020),.
[32]
J. Wang, J. Xia, H. Shen, M. Xing, J.H. Park, H ∞Synchronization for fuzzy markov jump chaotic systems with piecewise-constant transition probabilities subject to pdt switching rule, IEEE Trans. Fuzzy Syst. (2020),.
[33]
D. Ye, T. Zhang, Summation detector for false data-injection attack in cyber-physical systems, IEEE Trans Cybern 50 (6) (2020) 2338–2345.
[34]
J.W. Zhu, G.H. Yang, H. Wang, F. Wang, Fault estimation for a class of nonlinear systems based on intermediate estimator, IEEE Trans Automat Contr 61 (9) (2016) 2518–2524.
[35]
R.D. Zimmerman, C.E. Murillo-Sanchez, R.J. Thomas, Matpower: steady-state operations, planning, and analysis tools for power systems research and education, IEEE Trans. Power Syst. 26 (1) (2011) 12–19.

Cited By

View all
  • (2024)A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networksVehicular Communications10.1016/j.vehcom.2024.10082649:COnline publication date: 1-Oct-2024
  • (2023)Threat Attribution and Reasoning for Industrial Control System AssetInternational Journal of Ambient Computing and Intelligence10.4018/IJACI.33385315:1(1-27)Online publication date: 17-Nov-2023
  • (2022)Fed-FiSecurity and Communication Networks10.1155/2022/72683472022Online publication date: 1-Jan-2022
  • Show More Cited By

Index Terms

  1. Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Applied Mathematics and Computation
    Applied Mathematics and Computation  Volume 413, Issue C
    Jan 2022
    721 pages

    Publisher

    Elsevier Science Inc.

    United States

    Publication History

    Published: 15 January 2022

    Author Tags

    1. Cyber-physical power systems
    2. Cyber-attacks
    3. Intermediate observer
    4. Secure state estimation
    5. Attack reconstruction
    6. Attack defense

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 23 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networksVehicular Communications10.1016/j.vehcom.2024.10082649:COnline publication date: 1-Oct-2024
    • (2023)Threat Attribution and Reasoning for Industrial Control System AssetInternational Journal of Ambient Computing and Intelligence10.4018/IJACI.33385315:1(1-27)Online publication date: 17-Nov-2023
    • (2022)Fed-FiSecurity and Communication Networks10.1155/2022/72683472022Online publication date: 1-Jan-2022
    • (2022)Event-triggered security adaptive control of uncertain multi-area power systems with cyber attacksApplied Mathematics and Computation10.1016/j.amc.2022.127344432:COnline publication date: 1-Nov-2022

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media