A Stealth Cyber-Attack Detection Strategy for DC Microgrids

被引:161
|
作者
Sahoo, Subham [1 ]
Mishra, Sukumar [2 ]
Peng, Jimmy Chih-Hsien [1 ]
Dragicevic, Tomislav [3 ]
机构
[1] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 119007, Singapore
[2] Indian Inst Technol Delhi, Dept Elect Engn, New Delhi 110016, India
[3] Aalborg Univ, DK-9220 Aalborg, Denmark
关键词
DC microgrid; distributed control; false data injection; stealth attack; DISTRIBUTED CONTROL; CONSENSUS; SYSTEMS;
D O I
10.1109/TPEL.2018.2879886
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a cooperative mechanism for detecting potentially deceptive cyber attacks that attempt to disregard average voltage regulation and current sharing in cyber-physical dc microgrids. Considering a set of conventional cyber attacks, the detection becomes fairly easy for distributed observer based techniques. However, a well-planned set of balanced attacks, termed as the stealth attack, can bypass the conventional observer based detection theory as the control objectives are met without any physical error involved. In this paper, we discuss the formulation and associated scope of instability from stealth attacks to deceive distributed observers realizing the necessary and sufficient conditions to model such attacks. To address this issue, a novel cooperative vulnerability factor (CVF) framework for each agent is introduced, which accurately identifies the attacked agent(s) under various scenarios. To facilitate detection under worst cases, the CVFs from the secondary voltage control sublayer is strategically cross coupled to the current sublayer, which ultimately disorients the control objectives in the presence of stealth attacks and provides a clear norm for triggering defense mechanisms. Finally, the performance of the proposed detection strategy is simulated in MATLAB/SIMULINK environment and experimentally validated for false data injection and stealth attacks on sensors and communication links.
引用
收藏
页码:8162 / 8174
页数:13
相关论文
共 50 条
  • [21] Distributed Control Microgrids: Cyber-Attack Models, Impacts and Remedial Strategies
    Tadepalli, Phani Swecha
    Pullaguram, Deepak
    [J]. IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2022, 8 : 1008 - 1023
  • [22] Cyber-Attack Attributes
    Kadivar, Mehdi
    [J]. TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2014, : 22 - 27
  • [23] The Law of Cyber-Attack
    Hathaway, Oona A.
    Crootof, Rebecca
    Levitz, Philip
    Nix, Haley
    Nowlan, Aileen
    Perdue, William
    Spiegel, Julia
    [J]. CALIFORNIA LAW REVIEW, 2012, 100 (04) : 817 - 885
  • [24] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
  • [25] Cyber-attack detection based on controlled invariant sets
    Rosich, Albert
    Voos, Holger
    Darouach, Mohamed
    [J]. 2014 EUROPEAN CONTROL CONFERENCE (ECC), 2014, : 2176 - 2181
  • [26] Performance and Vulnerability of Distributed Secondary Control of AC Microgrids under Cyber-Attack
    Shahbazi, Zahra
    Ahmadi, Abbas
    Karimi, Abdulbaset
    Shafiee, Qobad
    [J]. 2021 7TH INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION AND AUTOMATION (ICCIA), 2021, : 388 - 393
  • [27] A Cyber-Attack Detection Model Based on Multivariate Analyses
    Sakai, Yuto
    Rinsaka, Koichiro
    Dohi, Tadashi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (07) : 1585 - 1592
  • [28] Rapid Cyber-Attack Detection System with Low Probability of Missed Attack Warnings
    Vidanapathirana, Dushani
    Mohammad, Azeem
    Halgamuge, Malka N.
    [J]. 2022 IEEE 17TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2022, : 1423 - 1429
  • [29] Understanding of Cyber-Attack Vulnerabilities During Natural Disasters and Discussing A Cyber-Attack Resiliency Framework
    Chakraborty, Suryadip
    Mombeshora, Elton M.
    Clark, Kyra P.
    Mbavarira, Tanaka S.
    [J]. SOUTHEASTCON 2024, 2024, : 466 - 471
  • [30] Optimization of Cyber-Attack Detection Using the Deep Learning Network
    Van Duong, Lai
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (07): : 159 - 163