A graph and diffusion theory-based approach for localization and recovery of false data injection attacks in power systems

被引:1
|
作者
He, Yixuan [1 ]
Wang, Jingyu [1 ]
Yang, Chen [1 ]
Shi, Dongyuan [1 ]
机构
[1] Huazhong Univ Sci & Technol, State Key Lab Adv Electromagnet Technol, Wuhan 430074, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
FDIA localization; Data recovery; Denoising diffusion graph models; Denoising diffusion implicit models; Line graph; Line message passing neural network;
D O I
10.1016/j.epsr.2024.111184
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
False Data Injection Attacks (FDIAs) pose a serious threat to power systems by interfering with state estimation and jeopardizing their safety and reliability. Detecting and recovering from FDIAs is thus critical for maintaining power system integrity. The increasing integration of renewable energy sources and the extensive use of power electronic devices introduce significant randomness in both power generation and loads, leading to significant power fluctuations and dynamic changes in power flows. These variations challenge the accuracy of existing FDIA detection and recovery methods. To address these challenges, an innovative data recovery framework is proposed, comprising two key stages: the FDIA localization stage and the FDIA data recovery stage. In the first stage, a Line Message Passing Neural Network (LMPNN) based FDIA localization model is employed to precisely identify the attacked data and generate a mask input for the recovery stage. In the data recovery stage, an FDIA data recovery model, named Denoising Diffusion Graph Models (DDGM), is designed to recover data with minimal error while conforming to the physical laws of the grid. Both models utilize node graph and line graph representations to depict measurements on buses and branches. By leveraging an optimized graph neural network, and inviting a loop-structured framework that combines a denoising diffusion model with a graph neural network these models effectively extract data features and inherent dynamic properties, enabling superior localization of FDIAs both in node and edge spaces and ensuring accurate recovery of compromised data even in the presence of high uncertainty and significant power fluctuations. By incorporating physical laws through a customized loss function embedding Kirchhoff's circuit laws into the training process of DDGM, the model ensures the recovered data to be physically consistent with power system dynamics. Experimental validations on IEEE 39-bus and 118-bus test systems, under conditions of high fluctuations in generation and loads, demonstrate that the proposed models outperform existing methods, achieving significant improvements inaccuracy and robustness.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Detection of False Data Injection Attacks in Smart Grids Based on Graph Signal Processing
    Drayer, Elisabeth
    Routtenberg, Tirza
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1886 - 1896
  • [32] Graph-Based Assessment of Vulnerability to False Data Injection Attacks in Distribution Networks
    Sreeram, T. S.
    Krishna, S.
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2024, 39 (02) : 4510 - 4520
  • [33] A penalty-based adaptive secure estimation for power systems under false data injection attacks
    Yang, Minjing
    Zhang, Hao
    Peng, Chen
    Wang, Yulong
    INFORMATION SCIENCES, 2020, 508 : 380 - 392
  • [34] Detecting False Data Injection Attacks on Modern Power Systems Based on Jensen-Shannon Distance
    Huang Manyun
    Ni Ming
    Li Manli
    Wei Zhinong
    Sun Guoqiang
    Zang Haixiang
    Liu Zhongxi
    2018 IEEE 8TH ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (IEEE-CYBER), 2018, : 1154 - 1159
  • [35] Deep Reinforcement Learning-Based Detection Framework for False Data Injection Attacks in Power Systems
    Prabhu, T. N.
    Ranjeethkumar, C.
    Mohankumar, B.
    Rajaram, A.
    INTERNATIONAL JOURNAL OF RENEWABLE ENERGY RESEARCH, 2024, 14 (02): : 311 - 323
  • [36] Advanced Persistent False Data Injection Attacks Against Optimal Power Flow in Power Systems
    Umar, Sani
    Felemban, Muhamad
    Osais, Yahya
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 469 - 474
  • [37] A Secure Hybrid Dynamic-State Estimation Approach for Power Systems Under False Data Injection Attacks
    Kazemi, Zahra
    Safavi, Ali Akbar
    Naseri, Farshid
    Urbas, Leon
    Setoodeh, Peyman
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (12) : 7275 - 7286
  • [38] False data injection attacks on networked control systems
    Pasha, Syed Ahmed
    Safdar, Rijha
    Ali, Syed Taha
    JOURNAL OF CONTROL AND DECISION, 2024, 11 (04) : 650 - 659
  • [39] False Data Injection Attacks in Bilateral Teleoperation Systems
    Dong, Yimeng
    Gupta, Nirupam
    Chopra, Nikhil
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2020, 28 (03) : 1168 - 1176
  • [40] A Blockchain-Based Approach to Secure Networked Control Systems Against False Data Injection Attacks
    Mohamed, Mohamed Vall Ould
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2023, 18 (03) : 2335 - 2342