A New AC False Data Injection Attack Method Without Network Information

被引:33
|
作者
Jiao, Runhai [1 ]
Xun, Gangyi [1 ]
Liu, Xuan [2 ]
Yan, Guangwei [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
[2] Hunan Univ, Sch Elect & Informat Engn, Changsha 410000, Peoples R China
基金
中国国家自然科学基金;
关键词
Power systems; Power measurement; State estimation; Data models; Security; Generative adversarial networks; Computer crime; False data injection attack; AC state estimation; data-driven; generative adversarial network; self-attention mechanism; STATE ESTIMATION; CYBER SECURITY; DEFENSE;
D O I
10.1109/TSG.2021.3102329
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyberattack emerges as a critical concern in Internet-of-Things integrated power systems. Cybersecurity capabilities of power systems rely on a deep understanding of potential cyberattacks for identifying and protecting against cyber vulnerabilities. The common assumption of system network information in most existing works is suspicious, which fails to hold in practical fields. This paper proposes a novel data-driven false data injection attack method, where only easily accessible measurement data are required, i.e., power injections at buses, flows of lines and the tie line information (connection relationship and power measurement data). In the proposed method, generative adversarial network (GAN) is adopted to extract the physical model using historical measurement data, and a self-attention mechanism is integrated to further capture the power flow laws in the data. After offline training, the effective false data can be constructed in a timely fashion without system network information. The effectiveness of the proposed attack method is validated using the IEEE14 and IEEE118 systems, in which the constructed false data injection attack can evade the system residual detection with an average success rate over 90% under different levels of measuring errors.
引用
收藏
页码:5280 / 5289
页数:10
相关论文
共 50 条
  • [11] AC False Data Injection Attack Based on Robust Tensor Principle Component Analysis
    Yang, Haosen
    Zhang, Wenjie
    Chung, C. Y.
    Wang, Ziqiang
    Qiu, Wei
    Liang, Zipeng
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (08) : 9887 - 9897
  • [12] Measurements Processing Method of Distribution Network State Estimation and Anti False Data Injection Attack Strategy
    He X.
    Tu C.
    Yu L.
    Gaodianya Jishu/High Voltage Engineering, 2021, 47 (07): : 2342 - 2349
  • [13] Detection Method of False Data Injection Attack on Power Grid Based on Improved Convolutional Neural Network
    Li Y.
    Zeng J.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2019, 43 (20): : 97 - 104
  • [14] A False Data Injection Attack Detection Method for Cooperative Charging Systems
    Jiang, Fu
    Liu, Bowen
    Li, Heng
    Liao, Hongtao
    Zhang, Hang
    Lu, Xianqi
    Peng, Jun
    Huang, Zhiwu
    IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2022, 58 (03) : 3946 - 3956
  • [15] A False Data Injection Attack Method for Generator Dynamic State Estimation
    Li Y.
    Li Z.
    Chen L.
    Li G.
    Diangong Jishu Xuebao/Transactions of China Electrotechnical Society, 2020, 35 (07): : 1476 - 1488
  • [16] False Data Injection Attack and Defense Method on Load Frequency Control
    Li, Yuancheng
    Huang, Rong
    Ma, Longqiang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04): : 2910 - 2919
  • [17] Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack
    Dehghani, Moslem
    Ghiasi, Mohammad
    Niknam, Taher
    Kavousi-Fard, Abdollah
    Tajik, Elham
    Padmanaban, Sanjeevikumar
    Aliev, Hamdulah
    IEEE ACCESS, 2021, 9 : 16488 - 16507
  • [18] Resilient System for Secure Sharing Of Information against False Data Injection Attack
    Sulochana, S.
    Manjula, V.
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [19] Evaluating Criticality of Nodes in Consensus Network Under False Data Injection Attack
    Sawant, Vishal
    Wisniewski, Rafal
    IEEE CONTROL SYSTEMS LETTERS, 2023, 7 : 1435 - 1440
  • [20] An effective secure routing for false data injection attack in wireless sensor network
    Zhu, Zhengjian
    Tan, Qingping
    Zhu, Peidong
    MANAGING NEXT GENERATION NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4773 : 457 - +