A graph and diffusion theory-based approach for localization and recovery of false data injection attacks in power systems

被引:1
|
作者
He, Yixuan [1 ]
Wang, Jingyu [1 ]
Yang, Chen [1 ]
Shi, Dongyuan [1 ]
机构
[1] Huazhong Univ Sci & Technol, State Key Lab Adv Electromagnet Technol, Wuhan 430074, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
FDIA localization; Data recovery; Denoising diffusion graph models; Denoising diffusion implicit models; Line graph; Line message passing neural network;
D O I
10.1016/j.epsr.2024.111184
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
False Data Injection Attacks (FDIAs) pose a serious threat to power systems by interfering with state estimation and jeopardizing their safety and reliability. Detecting and recovering from FDIAs is thus critical for maintaining power system integrity. The increasing integration of renewable energy sources and the extensive use of power electronic devices introduce significant randomness in both power generation and loads, leading to significant power fluctuations and dynamic changes in power flows. These variations challenge the accuracy of existing FDIA detection and recovery methods. To address these challenges, an innovative data recovery framework is proposed, comprising two key stages: the FDIA localization stage and the FDIA data recovery stage. In the first stage, a Line Message Passing Neural Network (LMPNN) based FDIA localization model is employed to precisely identify the attacked data and generate a mask input for the recovery stage. In the data recovery stage, an FDIA data recovery model, named Denoising Diffusion Graph Models (DDGM), is designed to recover data with minimal error while conforming to the physical laws of the grid. Both models utilize node graph and line graph representations to depict measurements on buses and branches. By leveraging an optimized graph neural network, and inviting a loop-structured framework that combines a denoising diffusion model with a graph neural network these models effectively extract data features and inherent dynamic properties, enabling superior localization of FDIAs both in node and edge spaces and ensuring accurate recovery of compromised data even in the presence of high uncertainty and significant power fluctuations. By incorporating physical laws through a customized loss function embedding Kirchhoff's circuit laws into the training process of DDGM, the model ensures the recovered data to be physically consistent with power system dynamics. Experimental validations on IEEE 39-bus and 118-bus test systems, under conditions of high fluctuations in generation and loads, demonstrate that the proposed models outperform existing methods, achieving significant improvements inaccuracy and robustness.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] A Blockchain-Based Approach to Secure Networked Control Systems Against False Data Injection Attacks
    Mohamed vall Ould Mohamed
    Journal of Electrical Engineering & Technology, 2023, 18 : 2335 - 2342
  • [42] Datadriven false data injection attacks against cyber-physical power systems
    Tian, Jiwei
    Wang, Buhong
    Li, Jing
    Konstantinou, Charalambos
    COMPUTERS & SECURITY, 2022, 121
  • [43] Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems
    Tian, Jiwei
    Wang, Buhong
    Wang, Zhen
    Cao, Kunrui
    Li, Jing
    Ozay, Mete
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (12) : 13699 - 13713
  • [44] Modelling and Countermeasures of False Data Injection Attacks Against State Estimation in Power Systems
    Alayande, Akintunde Samson
    Nwulu, Nnamdi
    Bakare, Ayodeji Emmanuel
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 129 - 134
  • [45] Prevention and Detection of Coordinated False Data Injection Attacks on Integrated Power and Gas Systems
    Zadsar, Masoud
    Abazari, Ahmadreza
    Ameli, Amir
    Yan, Jun
    Ghafouri, Mohsen
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2023, 38 (05) : 4252 - 4268
  • [46] Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems
    Lakshminarayana, Subhash
    Teng, Teo Zhan
    Tan, Rui
    Yau, David K. Y.
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2018, 2 (04)
  • [47] Structural-Constrained Methods for the Identification of False Data Injection Attacks in Power Systems
    Morgenstern, Gal
    Routtenberg, Tirza
    IEEE ACCESS, 2022, 10 : 94169 - 94185
  • [48] Survey of machine learning methods for detecting false data injection attacks in power systems
    Sayghe, Ali
    Hu, Yaodan
    Zografopoulos, Ioannis
    Liu, XiaoRui
    Dutta, Raj Gautam
    Jin, Yier
    Konstantinou, Charalambos
    IET SMART GRID, 2020, 3 (05) : 581 - 595
  • [49] False Data Injection Attacks in Power Distribution Systems Considering the Characteristics of Distributed Photovoltaic
    Liu, Yang
    Wen, Mi
    Wen, Hong
    Deng, Ruilong
    Peng, Sha
    Guo, Naiwang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2025, 21 (03) : 2023 - 2032
  • [50] Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids Using Graph Neural Networks
    Boyaci, Osman
    Narimani, Mohammad Rasoul
    Davis, Katherine R.
    Ismail, Muhammad
    Overbye, Thomas J.
    Serpedin, Erchin
    IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (01) : 807 - 819