Title :
Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks
Author :
VukovicÌ, Ognjen ; DaÌn, György
Author_Institution :
Lab. for Commun. Networks, KTH R. Inst. of Technol., Stockholm, Sweden
Abstract :
State estimation (SE) plays an essential role in the monitoring and supervision of power systems. In today´s power systems, SE is typically done in a centralized or in a hierarchical way, but as power systems will be increasingly interconnected in the future smart grid, distributed SE will become an important alternative to centralized and hierarchical solutions. As the future smart grid may rely on distributed SE, it is essential to understand the potential vulnerabilities that distributed SE may have. In this paper, we show that an attacker that compromises the communication infrastructure of a single control center in an interconnected power system can successfully perform a denial-of-service attack against state-of-the-art distributed SE, and consequently, it can blind the system operators of every region. As a solution to mitigate such a denial-of-service attack, we propose a fully distributed algorithm for attack detection. Furthermore, we propose a fully distributed algorithm that identifies the most likely attack location based on the individual regions´ beliefs about the attack location, isolates the identified region, and then reruns the distributed SE. We validate the proposed algorithms on the IEEE 118 bus benchmark power system.
Keywords :
computer network security; data integrity; distributed algorithms; power system interconnection; power system security; power system state estimation; IEEE 118 bus benchmark power system; attack detection; attack location; communication infrastructure; control center; data integrity attacks; denial-of-service attack; distributed SE; fully distributed algorithm; fully distributed power system state estimation; future smart grid; interconnected power system; Convergence; Power measurement; Power system stability; Security; State estimation; Vectors; Distributed power system state estimation; data integrity attacks; detection; false data injection; mitigation; security;
Journal_Title :
Selected Areas in Communications, IEEE Journal on
DOI :
10.1109/JSAC.2014.2332106