Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/155303
Title: | On feasibility and limitations of detecting false data injection attacks on power grid state estimation using D-FACTS devices | Authors: | Li, Beibei Xiao, Gaoxi Lu, Rongxing Deng, Ruilong Bao, Haiyong |
Keywords: | Engineering::Electrical and electronic engineering | Issue Date: | 2019 | Source: | Li, B., Xiao, G., Lu, R., Deng, R. & Bao, H. (2019). On feasibility and limitations of detecting false data injection attacks on power grid state estimation using D-FACTS devices. IEEE Transactions On Industrial Informatics, 16(2), 854-864. https://dx.doi.org/10.1109/TII.2019.2922215 | Project: | MOE2016-T2-1-119 M4082287 RGANS1906 |
Journal: | IEEE Transactions on Industrial Informatics | Abstract: | Recent studies have investigated the possibilities of proactively detecting the high-profile false data injection (FDI) attacks on power grid state estimation by using the distributed flexible ac transmission system (D-FACTS) devices, termed as proactive false data detection (PFDD) approach. However, the feasibility and limitations of such an approach have not been systematically studied in the existing literature. In this paper, we explore the feasibility and limitations of adopting the PFDD approach to thwart FDI attacks on power grid state estimation. Specifically, we thoroughly study the feasibility of using PFDD to detect FDI attacks by considering single-bus, uncoordinated multiple-bus, and coordinated multiple-bus FDI attacks, respectively. We prove that PFDD can detect all these three types of FDI attacks targeted on buses or super-buses with degrees larger than 1, if and only if the deployment of D-FACTS devices covers branches at least containing a spanning tree of the grid graph. The minimum efforts required for activating D-FACTS devices to detect each type of FDI attacks are, respectively, evaluated. In addition, we also discuss the limitations of this approach; it is strictly proved that PFDD is not able to detect FDI attacks targeted on buses or super-buses with degrees equalling 1. | URI: | https://hdl.handle.net/10356/155303 | ISSN: | 1551-3203 | DOI: | 10.1109/TII.2019.2922215 | Schools: | School of Electrical and Electronic Engineering School of Computer Science and Engineering |
Rights: | © 2019 IEEE. All rights reserved. | Fulltext Permission: | none | Fulltext Availability: | No Fulltext |
Appears in Collections: | EEE Journal Articles SCSE Journal Articles |
SCOPUSTM
Citations
5
107
Updated on May 26, 2023
Web of ScienceTM
Citations
5
103
Updated on May 29, 2023
Page view(s)
48
Updated on Jun 1, 2023
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.