IDEAS home Printed from https://ideas.repec.org/a/gam/jeners/v15y2022i5p1754-d759672.html
   My bibliography  Save this article

Reachability-Based False Data Injection Attacks and Defence Mechanisms for Cyberpower System

Author

Listed:
  • Ren Liu

    (State Key Laboratory of HVDC, National Energy Power Grid Technology R&D Centre, Guangdong Provincial Key Laboratory of Intelligent Operation and Control for New Energy Power System, CSG Key Laboratory for Power System Simulation, Electric Power Research Institute, China Southern Power Grid, Guangzhou 510663, China)

  • Hussain M. Mustafa

    (Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26506, USA)

  • Zhijie Nie

    (GE Digital, Bothell, WA 98011, USA)

  • Anurag K. Srivastava

    (Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26506, USA)

Abstract

With the push for higher efficiency and reliability, an increasing number of intelligent electronic devices (IEDs) and associated information and communication technology (ICT) are integrated into the Internet of Things (IoT)-enabled smart grid. These advanced technologies and IEDs also bring potential vulnerabilities to the intelligent cyber–physical smart grid. State estimation, as a primary step of system monitoring and situational awareness, is a potential target for attackers. A number of other smart grid applications, such as voltage stability assessment and contingency screening, utilize state estimation results as input data. False data injection (FDI) is a specific way to attack state estimation by manipulating input data. Existing research mainly focuses on the mathematical analysis of FDI attacks; however, in these methods, discussions of reachability requirements to compromise measurements considering cyberinfrastructure are limited. Reachability is defined as a measure that estimates the number of hosts to compromise for the possible FDI. Most of the existing FDI attack methods require the simultaneous manipulation on multiple measurement devices in different substations, in order to bypass the bad data detection, which may be impractical. In this paper, a new type of reachability-based FDI attack considering the cybernetwork with a practical attack is proposed and validated on two IEEE test systems. The corresponding defence mechanisms are (a) decentralized state estimation (DSE), (b) DSE with additional backup computational nodes, (c) communication network rerouting, and (d) intrusion detection system, and they were developed and presented with validation for two IEEE test systems with superior performance for an IoT-enabled intelligent smart grid system.

Suggested Citation

  • Ren Liu & Hussain M. Mustafa & Zhijie Nie & Anurag K. Srivastava, 2022. "Reachability-Based False Data Injection Attacks and Defence Mechanisms for Cyberpower System," Energies, MDPI, vol. 15(5), pages 1-18, February.
  • Handle: RePEc:gam:jeners:v:15:y:2022:i:5:p:1754-:d:759672
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1996-1073/15/5/1754/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1996-1073/15/5/1754/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Derya Betul Unsal & Taha Selim Ustun & S. M. Suhail Hussain & Ahmet Onen, 2021. "Enhancing Cybersecurity in Smart Grids: False Data Injection and Its Mitigation," Energies, MDPI, vol. 14(9), pages 1-36, May.
    2. Chenyang Liu & Yazeed Alrowaili & Neetesh Saxena & Charalambos Konstantinou, 2021. "Cyber Risks to Critical Smart Grid Assets of Industrial Control Systems," Energies, MDPI, vol. 14(17), pages 1-19, September.
    3. Liang Ma & Gang Xu, 2020. "Distributed Resilient Voltage and Reactive Power Control for Islanded Microgrids under False Data Injection Attacks," Energies, MDPI, vol. 13(15), pages 1-27, July.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Miroslaw Parol & Jacek Wasilewski & Tomasz Wojtowicz & Bartlomiej Arendarski & Przemyslaw Komarnicki, 2022. "Reliability Analysis of MV Electric Distribution Networks Including Distributed Generation and ICT Infrastructure," Energies, MDPI, vol. 15(14), pages 1-34, July.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ahmed H. EL-Ebiary & Mohamed Mokhtar & Atef M. Mansour & Fathy H. Awad & Mostafa I. Marei & Mahmoud A. Attia, 2022. "Distributed Mitigation Layers for Voltages and Currents Cyber-Attacks on DC Microgrids Interfacing Converters," Energies, MDPI, vol. 15(24), pages 1-32, December.
    2. Aiman J. Albarakati & Mohamed Azeroual & Younes Boujoudar & Lahcen EL Iysaouy & Ayman Aljarbouh & Asifa Tassaddiq & Hassane EL Markhi, 2022. "Multi-Agent-Based Fault Location and Cyber-Attack Detection in Distribution System," Energies, MDPI, vol. 16(1), pages 1-16, December.
    3. Chengshun Yang & Shuangfei Ni & Yuchen Dai & Xiaoning Huang & Dongdong Zhang, 2020. "Anti-Disturbance Finite-Time Adaptive Sliding Mode Backstepping Control for PV Inverter in Master–Slave-Organized Islanded Microgrid," Energies, MDPI, vol. 13(17), pages 1-19, August.
    4. Taha Selim Ustun, 2022. "Cybersecurity in Smart Grids," Energies, MDPI, vol. 15(15), pages 1-3, July.
    5. Seppo Borenius & Pavithra Gopalakrishnan & Lina Bertling Tjernberg & Raimo Kantola, 2022. "Expert-Guided Security Risk Assessment of Evolving Power Grids," Energies, MDPI, vol. 15(9), pages 1-25, April.
    6. Nakkeeran Murugesan & Anantha Narayanan Velu & Bagavathi Sivakumar Palaniappan & Balamurugan Sukumar & Md. Jahangir Hossain, 2024. "Mitigating Missing Rate and Early Cyberattack Discrimination Using Optimal Statistical Approach with Machine Learning Techniques in a Smart Grid," Energies, MDPI, vol. 17(8), pages 1-34, April.
    7. Olga Zhironkina & Sergey Zhironkin, 2023. "Technological and Intellectual Transition to Mining 4.0: A Review," Energies, MDPI, vol. 16(3), pages 1-37, February.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:15:y:2022:i:5:p:1754-:d:759672. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.