A New AC False Data Injection Attack Method Without Network Information

被引:33
|
作者
Jiao, Runhai [1 ]
Xun, Gangyi [1 ]
Liu, Xuan [2 ]
Yan, Guangwei [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
[2] Hunan Univ, Sch Elect & Informat Engn, Changsha 410000, Peoples R China
基金
中国国家自然科学基金;
关键词
Power systems; Power measurement; State estimation; Data models; Security; Generative adversarial networks; Computer crime; False data injection attack; AC state estimation; data-driven; generative adversarial network; self-attention mechanism; STATE ESTIMATION; CYBER SECURITY; DEFENSE;
D O I
10.1109/TSG.2021.3102329
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyberattack emerges as a critical concern in Internet-of-Things integrated power systems. Cybersecurity capabilities of power systems rely on a deep understanding of potential cyberattacks for identifying and protecting against cyber vulnerabilities. The common assumption of system network information in most existing works is suspicious, which fails to hold in practical fields. This paper proposes a novel data-driven false data injection attack method, where only easily accessible measurement data are required, i.e., power injections at buses, flows of lines and the tie line information (connection relationship and power measurement data). In the proposed method, generative adversarial network (GAN) is adopted to extract the physical model using historical measurement data, and a self-attention mechanism is integrated to further capture the power flow laws in the data. After offline training, the effective false data can be constructed in a timely fashion without system network information. The effectiveness of the proposed attack method is validated using the IEEE14 and IEEE118 systems, in which the constructed false data injection attack can evade the system residual detection with an average success rate over 90% under different levels of measuring errors.
引用
收藏
页码:5280 / 5289
页数:10
相关论文
共 50 条
  • [21] Detection of Synchrophasor False Data Injection Attack Using Feature Interactive Network
    Qiu, Wei
    Tang, Qiu
    Zhu, Kunzhi
    Wang, Weikang
    Liu, Yilu
    Yao, Wenxuan
    IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (01) : 659 - 670
  • [22] False Data Injection Attack for Switched Systems
    Zhao, Rui
    Zuo, Zhiqiang
    Wang, Yijing
    Zhang, Wentao
    IEEE CONTROL SYSTEMS LETTERS, 2023, 7 : 1754 - 1759
  • [23] False data injection attack detection in dynamic power grid: A recurrent neural network-based method
    Zhang, Feiye
    Yang, Qingyu
    FRONTIERS IN ENERGY RESEARCH, 2022, 10
  • [24] False Data Injection Attack and Its Detection Method for Interactive Demand Response
    Chen L.
    Liu N.
    Liu, Nian (nianliu@ncepu.edu.cn), 1600, Automation of Electric Power Systems Press (45): : 15 - 23
  • [25] A Resilient Control Method Against False Data Injection Attack in DC Microgrids
    Karimi, A.
    Ahmadi, A.
    Shahbazi, Z.
    Shafiee, Q.
    Bevrani, H.
    2021 7TH INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION AND AUTOMATION (ICCIA), 2021, : 437 - 442
  • [26] Defense strategy selection based on incomplete information game for the false data injection attack
    Yi, Na
    Xu, Jianjun
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2024, 55 (14) : 2897 - 2913
  • [27] Modeling of Local False Data Injection Attacks With Reduced Network Information
    Liu, Xuan
    Bao, Zhen
    Lu, Dan
    Li, Zuyi
    IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (04) : 1686 - 1696
  • [28] False Data Injection Attack on Distributed State Estimation over a Wireless Sensor Network
    Lei Li
    Yang Wen
    Yang Chao
    Shi Hongbo
    Yan Huaicheng
    PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 8108 - 8113
  • [29] False Data Attacks Against AC State Estimation With Incomplete Network Information
    Liu, Xuan
    Li, Zuyi
    IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) : 2239 - 2248
  • [30] Distributed elastic recovery strategy of AC/DC hybrid microgrid under false data injection attack
    Wang, Yihe
    Wang, Luyuan
    Xiao, Xiang
    Cui, Haoran
    Lan, Liangsheng
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2023, 8 (04) : 280 - 288