Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3208903.3208912acmconferencesArticle/Chapter ViewAbstractPublication Pagese-energyConference Proceedingsconference-collections
research-article
Public Access

Adversarial Attacks to Distributed Voltage Control in Power Distribution Networks with DERs

Published: 12 June 2018 Publication History

Abstract

It has been recently proposed that the reactive power injection of distributed energy resources (DERs) can be used to regulate the voltage across the power distribution network, and simple distributed control laws have been recently developed in the literature for performing such distributed Volt/VAR control. However, enabling the reactive-power injection capability of DERs also opens the door for potential adversarial attacks. Specifically, the adversary can compromise a subset of the DERs and use their reactive power to disrupt the voltage profile across the distribution network. In this paper, we study the potential damage (in terms of the voltage disruption) of such adversarial attacks and how to mitigate the damage by controlling the allowable range of reactive power injection at each bus. Somewhat surprisingly and contrary to the intuition that the reactive power injection at legitimate buses should help mitigating the voltage disruption inflicted by the adversary, we demonstrate that an intelligent attacker can actually exploit the response of the legitimate buses to amplify the damage by two times. Such a higher level of damage can be attained even when the adversary has no information about the network topology. We then formulate an optimization problem to limit the potential damage of such adversarial attacks. Our formulation sets the range of the reactive power injection on each bus so that the damage by the adversary is minimized, subject to the constraint that the voltage mismatch (without attack) can still be maintained within a given threshold under an uncertainty set of external inputs. Numerical results demonstrate the validity of our analysis and the effectiveness of our approach to mitigate the damage caused by such attacks.

References

[1]
NISTIR 7628, Guidelines for Smart Cyber Security. Standard, the National Institute of Standards and Technology (NIST) Computer Security Division, Aug. 2010.
[2]
Ahmadi, H., Martí, J. R., and Dommel, H. W. A framework for Volt-VAR optimization in distribution systems. IEEE Transactions on Smart Grid 6, 3 (May 2015), 1473--1483.
[3]
Amin, S., Cárdenas, A. A., and Sastry, S. S. Safe and secure networked control systems under denial-of-service attacks. In Hybrid Systems: Computation and Control (2009), pp. 31--45.
[4]
Antsaklis, P. J., and Michel, A. N. Linear Systems. McGraw-Hill, 1997.
[5]
Baran, M. E., and Wu, F. F. Optimal capacitor placement on radial distribution systems. IEEE Transactions on Power Delivery 4, 1 (Jan. 1989), 725--734.
[6]
Ben-Tal, A., Ghaoui, L. E., and Nemirovski, A. Robust Optimization. Princeton University Press, 2009.
[7]
Ben-Tal, A., Goryashko, A., Guslitzer, E., and Nemirovski, A. Adjustable robust solutions of uncertain linear programs. Mathematical Programming 99, 2 (2004), 351--376.
[8]
Dan, G., and Sandberg, H. Stealth attacks and protection schemes for state estimators in power systems. In 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm) (Oct. 2010), pp. 214--219.
[9]
Distribution System Analysis Subcommittee. IEEE 34 Node Test Feeder, 2010. Available: http://ewh.ieee.org/soc/pes/dsacom/testfeeders/index.html.
[10]
Douglas B. West. Introduction to Graph Theory, 2nd ed. Upper Saddle River: Prentice hall, 2001.
[11]
Evangelopoulos, V. A., Georgilakis, P. S., and Hatziargyriou, N. D. Optimal operation of smart distribution networks: A review of models, methods and future research. Electric Power Systems Research 140 (2016), 95--106.
[12]
Farivar, M., Chen, L., and Low, S. Equilibrium and dynamics of local voltage control in distribution systems. In 2013 52nd IEEE Conference on Decision and Control (Florence, Italy, Dec. 2013), pp. 4329--4334.
[13]
Farivar, M., Neal, R., Clarke, C., and Low, S. Optimal inverter VAR control in distribution systems with high PV penetration. In IEEE Power and Energy Society General Meeting (San Diego, CA, USA, July 2012), pp. 1--7.
[14]
Hwang, S.-G. Cauchy's interlace theorem for eigenvalues of hermitian matrices. The American Mathematical Monthly 111, 2 (Feb. 2004), 157--159.
[15]
Jahangiri, P., and Aliprantis, D. C. Distributed Volt/VAr control by PV inverters. IEEE Transactions on Power Systems 28, 3 (Aug. 2013), 3429--3439.
[16]
Liu, H. J., Shi, W., and Zhu, H. Decentralized dynamic optimization for power network voltage control. IEEE Transactions on Signal and Information Processing over Networks 3, 3 (Sept. 2017), 568--579.
[17]
Liu, Y., Ning, P., and Reiter, M. K. False data injection attacks against state estimation in electric power grids. In Proceedings of the 16th ACM conference on Computer and Communications Security (Chicago, Illinois, USA, Nov. 2009), pp. 21--32.
[18]
Ma, M., Teixeira, A. M., van den Berg, J., and Palensky, P. Voltage control in distributed generation under measurement falsification attacks. IFAC- PapersOnLine 50, 1 (2017), 8379--8384. 20th IFAC World Congress.
[19]
Majumdar, A., Agalgaonkar, Y. P., Pal, B. C., and Gottschalg, R. Centralized volt-var optimization strategy considering malicious attack on distributed energy resources control. IEEE Transactions on Sustainable Energy 9, 1 (Jan. 2018), 148--156.
[20]
Mo, Y., and Sinopoli, B. Secure control against replay attacks. In 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Monticello, IL, USA, 2009), pp. 911--918.
[21]
Moghe, R., Tholomier, D., Divan, D., Schatz, J., and Lewis, D. Grid edge control: A new approach for volt-var optimization. In Proceedings of the IEEE Power Engineering Society Transmission and Distribution Conference (Dallas, TX, USA, May 2016), pp. 1--5.
[22]
Mohsenian-Rad, A. H., and Leon-Garcia, A. Distributed internet-based load altering attacks against smart power grids. IEEE Transactions on Smart Grid 2, 4 (Dec. 2011), 667--674.
[23]
Pasqualetti, F., Dörfler, F., and Bullo, F. Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control 58, 11 (Nov. 2013), 2715--2729.
[24]
Robbins, B. A, Hadjicostis, C. N., and Dominguez-Garcia, A. D. A two-stage distributed architecture for voltage control in power distribution systems. IEEE Transactions on Power Systems 28, 2 (May 2013), 1470--1482.
[25]
Singh, S., and Singh, S. P. A smart volt-var optimization engine for energy distribution system. In International Conference on Emerging Trends in Electrical, Electronics and Sustainable Energy Systems (ICETEESES) (Sultanpur, India, Mar. 2016), pp. 35--41.
[26]
Smith, R. S. A decoupled feedback structure for covertly appropriating networked control systems. IFAC Proceedings Volumes 44, 1 (Jan. 2011), 90--95.
[27]
Sridhar, S., Hahn, A., and Govindarasu, M. Cyber--physical system security for the electric power grid. Proceedings of the IEEE 100, 1 (Jan. 2012), 210--224.
[28]
Sridhar, S., and Manimaran, G. Data integrity attack and its impacts on voltage control loop in power grid. In IEEE Power and Energy Society General Meeting (Detroit, MI, USA, July 2011), pp. 1--6.
[29]
Teixeira, A., Dán, G., Sandberg, H., Berthier, R., Bobba, R. B., and Valdes, A. Security of smart distribution grids: Data integrity attacks on integrated volt/var control and countermeasures. In 2014 American Control Conference (June 2014), pp. 4372--4378.
[30]
Turitsyn, K., Šulc, P., Backhaus, S., and Chertkov, M. Options for control of reactive power by distributed photovoltaic generators. Proceedings of the IEEE 99, 6 (June 2011), 1063--1073.
[31]
Zhu, H., and LI, N. Asynchronous local voltage control in power distribution networks. In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (Shanghai, China, Mar. 2016), pp. 3461--3465.
[32]
Zhu, H., and Liu, H. J. Fast local voltage control under limited reactive power: Optimality and stability analysis. IEEE Transactions on Power Systems 31, 5 (Sept. 2016), 3794--3803.

Cited By

View all
  • (2024)Robust Low-Overhead Control of DER Reactive Power Under Adversarial Attacks and UncertaintyICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622426(3097-3103)Online publication date: 9-Jun-2024
  • (2024)CFDI: Coordinated false data injection attack in active distribution networkIET Generation, Transmission & Distribution10.1049/gtd2.1321718:15(2556-2569)Online publication date: 8-Jul-2024
  • (2021)Towards reinforcement learning for vulnerability analysis in power-economic systemsEnergy Informatics10.1186/s42162-021-00181-54:S3Online publication date: 13-Sep-2021
  • Show More Cited By

Index Terms

  1. Adversarial Attacks to Distributed Voltage Control in Power Distribution Networks with DERs

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        e-Energy '18: Proceedings of the Ninth International Conference on Future Energy Systems
        June 2018
        657 pages
        ISBN:9781450357678
        DOI:10.1145/3208903
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 12 June 2018

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. adversarial attacks
        2. affinely adjustable robust optimization
        3. distributed energy resources
        4. distributed voltage control

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        Conference

        e-Energy '18
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 160 of 446 submissions, 36%

        Upcoming Conference

        E-Energy '25

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)93
        • Downloads (Last 6 weeks)13
        Reflects downloads up to 26 Sep 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Robust Low-Overhead Control of DER Reactive Power Under Adversarial Attacks and UncertaintyICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622426(3097-3103)Online publication date: 9-Jun-2024
        • (2024)CFDI: Coordinated false data injection attack in active distribution networkIET Generation, Transmission & Distribution10.1049/gtd2.1321718:15(2556-2569)Online publication date: 8-Jul-2024
        • (2021)Towards reinforcement learning for vulnerability analysis in power-economic systemsEnergy Informatics10.1186/s42162-021-00181-54:S3Online publication date: 13-Sep-2021
        • (2021)Fault Classification by Intelligent Systems to Ensure Electromagnetic Compatibility of Vehicles2021 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)10.1109/ICIEAM51226.2021.9446335(976-981)Online publication date: 17-May-2021
        • (2021)Detection of Cyber Attacks on Voltage Regulation in Distribution Systems Using Machine LearningIEEE Access10.1109/ACCESS.2021.30646899(40402-40416)Online publication date: 2021
        • (2020)Detecting Malicious Signal Manipulation in Smart Grids Using Intelligent Analysis of Contextual Data13th International Conference on Security of Information and Networks10.1145/3433174.3433613(1-8)Online publication date: 4-Nov-2020
        • (2019)Analyzing Cyber-Physical Systems from the Perspective of Artificial IntelligenceProceedings of the 2019 International Conference on Artificial Intelligence, Robotics and Control10.1145/3388218.3388222(85-95)Online publication date: 14-Dec-2019
        • (2019)Compensation for Voltage Disruption in a Smart Grid during Cyber–Attack2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)10.1109/ICASERT.2019.8934803(1-5)Online publication date: May-2019
        • (2019)Bridge Strength Preservation by Automatic Traffic Density Control: an IoT Application2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)10.1109/ICASERT.2019.8934520(1-5)Online publication date: May-2019
        • (2019)Power system effects and mitigation recommendations for DER cyberattacksIET Cyber-Physical Systems: Theory & Applications10.1049/iet-cps.2018.50144:3(240-249)Online publication date: 22-Feb-2019

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media