Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Advanced algorithm to detect stealthy cyber attacks on automatic generation control in smart grid

One of the basic requirements of today's sophisticated world is the availability of electrical energy, and neglect of this matter may have irreparable damages such as an extensive blackout. The problems which were introduced about the traditional power grid, and also, the growing advances in smart technologies make the traditional power grid go towards smart power grid. Although widespread utilisation of telecommunication networks in smart power grid enhances the efficiency of the system, it will create a critical platform for cyber attacks and penetration into the system. Automatic generation control (AGC) is a fundamental control system in the power grid, and it is responsible for controlling the frequency of the grid. An attack on the data transmitted through the telecommunications link from the sensors to the AGC will cause frequency deviation, resulting in disconnection of the load, generators and ultimately global blackout. In this study, by using a Kalman filter and a proposed detector, a solution has been presented to detect the attack before it can affect the system. Contrary to existing methods, this method is able to detect attacks that are stealthy from the area control error signal and χ2-detector. Simulations confirm the effectiveness of this method.

References

    1. 1)
      • 22. Brumback, B., Srinath, M.: ‘A chi-square test for fault-detection in Kalman filters’, IEEE Trans. Autom. Control, 1987, 32, (6), pp. 552554.
    2. 2)
      • 18. Teixeira, A., Sou, K. C., Sandberg, H., et al: ‘Secure control systems: a quantitative risk management approach’, IEEE Control Syst. Mag., 2015, 35, (1), pp. 2445.
    3. 3)
      • 19. Tan, R., Nguyen, H.H., Foo, E.Y., et al: ‘Optimal false data injection attack against automatic generation control in power grids’. Proc. Int. Conf. Cyber-Physical Systems, Vienna, Austria, April 2016, pp. 110.
    4. 4)
      • 23. Dixon, W. J., Massey, F. J.: ‘Introduction to statistical analysis’ (McGraw-Hill, New York, USA, 1969), pp. 344345.
    5. 5)
      • 17. Bevrani, H.: ‘Robust power system frequency control’ (Power Electronics and Power Systems, Springer, Cham, 2014).
    6. 6)
      • 9. Li, B., Xiao, G., Lu, R., et al: ‘On feasibility and limitations of detecting false data injection attacks on power grid state estimation using D-FACTS devices’, IEEE Trans. Ind. Inf., 2019, 16, pp. 854864.
    7. 7)
      • 13. Lou, X., Tran, C., Tan, R., et al: ‘Assessing and mitigating impact of time delay attack: case studies for power grid controls’, IEEE J. Sel. Areas Commun., 2019, 38, pp. 141155.
    8. 8)
      • 21. Simon, D.: ‘Optimal state estimation: kalman, H infinity, and nonlinear approaches’ (John Wiley & Sons, USA., 2006).
    9. 9)
      • 14. Sridhar, S., Govindarasu, M.: ‘Model-based attack detection and mitigation for automatic generation control’, IEEE Trans. Smart Grid, 2014, 5, (2), pp. 580591.
    10. 10)
      • 12. Li, Y., Zhang, P., Ma, L.: ‘Denial of service attack and defense method on load frequency control system’, J. Franklin Inst., 2019, 356, (15), pp. 86258645.
    11. 11)
      • 5. Liu, A., Bai, L.: ‘Distributed model predictive control for wide area measurement power systems under malicious attacks’, IET Cyber-Phys. Syst.: Theory Appl., 2018, 3, (3), pp. 111118.
    12. 12)
      • 20. Kundur, P., Balu, N.J., Lauby, M.G.: ‘Power system stability and control’ (N.Y. McGraw-hill, New York, 1994), pp. 581610.
    13. 13)
      • 10. Bi, S., Wang, T., Wang, L., et al: ‘A novel cyber fault prognosis and resilience control for cyber-physical systems’, IET Cyber-Phys. Syst., Theory Appl., 2019, 4, (4), pp. 304312.
    14. 14)
      • 11. Roy, S.D., Debbarma, S.: ‘Detection and mitigation of cyber-attacks on AGC systems of low inertia power grid’, IEEE Syst. J., 2019, 14, pp. 20232031.
    15. 15)
      • 3. Conti, J. P.: ‘The day the samba stopped’, Eng. Technol., 2010, 5, (4), pp. 4647.
    16. 16)
      • 1. Kuvshinkova, S.: ‘SOL slammer worm lessons learned for consideration by the electricity sector’. North Am. Electr. Reliab. Council, 2003, 1, (2), pp. 15.
    17. 17)
      • 16. Akbarian, F., Ramezani, A., Hamidi-Beheshti, M. T., et al: ‘Intrusion detection on critical smart grid infrastructure’. Smart Grid Conf. (SGC), Kurdistan, Iran, November 2018, pp. 16.
    18. 18)
      • 8. Nazari, S., Shafai, B., Moradmand, A.: ‘Robust intrusion detection in dynamic networks’. Proc. Conf. Control Technology and Applications, Kowloon, HONG KONG, August 2019, pp. 988993.
    19. 19)
      • 2. Farwell, J. P., Rohozinski, R.: ‘Stuxnet and the future of cyber war’, Survival, 2011, 53, (1), pp. 2340.
    20. 20)
      • 6. Shafai, B., Moradmand, A., Nazari, S.: ‘Observer-based controller design for systems with derivative inputs’. Proc. Conf. Communication, Control, and Computing (Allerton), Allerton Park and Retreat Center, Monticello, IL, USA, September 2019, pp. 10381044.
    21. 21)
      • 7. Di Giorgio, A., Pietrabissa, A., DelliPriscoli, F., et al: ‘Robust protection scheme against cyber-physical attacks in power systems’, IET Control Theory Applic., 2018, 12, (13), pp. 17921801.
    22. 22)
      • 4. Ao, W., Song, Y., Wen, C.: ‘Adaptive cyber-physical system attack detection and reconstruction with application to power systems’, IET Control Theory Applic., 2016, 10, (12), pp. 14581468.
    23. 23)
      • 15. Tan, R., Nguyen, H.H., Foo, E.Y., et al: ‘Modeling and mitigating impact of false data injection attacks on automatic generation control’, IEEE Trans. Inf. Forensics Sec., 2017, 12, (7), pp. 16091624.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2019.0074
Loading

Related content

content/journals/10.1049/iet-cps.2019.0074
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address