Reinforcement Learning Based Vulnerability Analysis of Data Injection Attack for Smart Grids

被引:0
|
作者
Luo, Weifeng [1 ]
Xiao, Liang [2 ,3 ]
机构
[1] Shenzhen Power Supply Bur Co Ltd, China Southern Power Grid, Senzhen 440304, Peoples R China
[2] Xiamen Univ, Xiamen 361005, Peoples R China
[3] Beijing Key Lab Mobile Comp & Pervas Device, 6 Kexueyuan South Rd, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
Smart grid; data injection attacks; vulnerability analysis; reinforcement learning; STATE ESTIMATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart grids have to protect meter measurements against false data injection attacks. By modifying the meter measurements, the attacker misleads the control decisions of the control center, which results in physical damages of power systems. In this paper, we propose a reinforcement learning based vulnerability analysis scheme for data injection attack without relying on the power system topology. This scheme enables the attacker to choose the data injection attack vector based on the meter measurements, the power system status, the previous injected errors and the number of meters to compromise. By combining deep reinforcement learning with prioritized experience replay, the proposed scheme more frequently replays the successful vulnerability detection experiences while bypassing the bad data detection, which is able to accelerate the learning speed. Simulation results based on the IEEE 14 bus system show that this scheme increases the probability of successful vulnerability detection and reduce the number of meters to compromise compared with the benchmark scheme.
引用
收藏
页码:6788 / 6792
页数:5
相关论文
共 50 条
  • [31] Deep learning based method for false data injection attack detection in AC smart islands
    Dehghani, Moslem
    Kavousi-Fard, Abdollah
    Dabbaghjamanesh, Morteza
    Avatefipour, Omid
    IET Generation, Transmission and Distribution, 2020, 14 (24): : 5816 - 5822
  • [32] Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder
    Yang, Liqun
    Zhai, You
    Li, Zhoujun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 193 (193)
  • [33] Detection and isolation of false data injection attack for smart grids via unknown input observers
    Luo, Xiaoyuan
    Wang, Xinyu
    Pan, Xueyang
    Guan, Xinping
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2019, 13 (08) : 1277 - 1286
  • [34] Vulnerability Analysis of Smart Grids to GPS Spoofing
    Risbud, Paresh
    Gatsis, Nikolaos
    Taha, Ahmad
    2018 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2018,
  • [35] Vulnerability Analysis of Smart Grids to GPS Spoofing
    Risbud, Paresh
    Gatsis, Nikolaos
    Taha, Ahmad
    IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (04) : 3535 - 3548
  • [36] Analysis of the Vulnerability of Smart Grids to Social Network-Based Attacks
    Tang, Daogui
    Fang, Yiping
    Zio, Enrico
    Ramirez-Marquez, Jose Emmanuel
    2018 3RD INTERNATIONAL CONFERENCE ON SYSTEM RELIABILITY AND SAFETY (ICSRS), 2018, : 130 - 134
  • [37] Reinforcement Learning-based Electricity Market Vulnerability Analysis under Cyber-Topology Attack
    Dey, Arnab
    Salapaka, Murti V.
    2023 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE, ISGT, 2023,
  • [38] A Novel Data Analytical Approach for False Data Injection Cyber-Physical Attack Mitigation in Smart Grids
    Wang, Yi
    Amin, Mahmoud M.
    Fu, Jian
    Moussa, Heba B.
    IEEE ACCESS, 2017, 5 : 26022 - 26033
  • [39] Detection of False Data Injection Attacks in Smart Grids Based on Forecasts
    Kallitsis, Michael G.
    Bhattacharya, Shrijita
    Michailidis, George
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONTROL, AND COMPUTING TECHNOLOGIES FOR SMART GRIDS (SMARTGRIDCOMM), 2018,
  • [40] An Efficient Privacy-Enhancing Cross-Silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids
    Tran, Hong-Yen
    Hu, Jiankun
    Yin, Xuefei
    Pota, Hemanshu R.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2538 - 2552