Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow

dc.contributor.authorKhanna, Kush
dc.contributor.authorJoshi, Anupam
dc.contributor.authorPanigrahi, Bijaya Ketan
dc.date.accessioned2018-10-17T16:43:14Z
dc.date.available2018-10-17T16:43:14Z
dc.date.issued2017-06-12
dc.description.abstractConventional power system was originally designed to provide efficient and reliable power. With the integration of information technology and advanced metering infrastructure, the power grid has become smart. The smart meters have allowed the system operators to continuously monitor the power system in real time and take necessary action to avoid system failures. Malicious actor, with access to the smart meters can modify sensor measurements to disrupt the operation of power system. To make the power system resilient to such cyber-attacks, it is important to study all possible outcomes of cyber-intrusions. In this paper, we present an attack on security constrained optimum power flow. We show with the help of case studies how an attacker, by injecting false data in load measurement sensors, can force system operator to change the dispatch and hence make the power system N–1 in-compliant. The attack is modeled as a bi-level optimization problem, aiming to find the minimum set of sensors required to launch the attack. From the system operator's perspective, critical lines and critical generators vulnerable to false data injection (FDI) attack are identified. IEEE 14 bus and 30 bus test systems are used to test the vulnerability of the power system against FDI attacks.en_US
dc.description.urihttp://digital-library.theiet.org/content/journals/10.1049/iet-gtd.2017.0226en_US
dc.format.extent21 pagesen_US
dc.genrejournal article post-printen_US
dc.identifierdoi:10.13016/M2Z31NS4V
dc.identifier.citationKush Khanna, Bijaya Ketan Panigrahi, Anupam Joshi, Bi-level modelling of false data injection attacks on security constrained optimal power flow, Volume 11, Issue 14, 12 June 2017, p. 3586 – 3593, DOI: 10.1049/iet-gtd.2017.0226en_US
dc.identifier.uri10.1049/iet-gtd.2017.0226
dc.identifier.urihttp://hdl.handle.net/11603/11579
dc.language.isoen_USen_US
dc.publisherIETen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rightsThis paper is a postprint of a paper submitted to and accepted for publication in [journal] and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library
dc.subjectCyber securityen_US
dc.subjectfalse data injectionen_US
dc.subjectpower system optimizationen_US
dc.subjectsmart griden_US
dc.subjectOptimisation techniquesen_US
dc.subjectsensor measurementsen_US
dc.subjectbi-level modellingen_US
dc.subjectsystem operatorsen_US
dc.subjectadvanced metering infrastructureen_US
dc.subjectIEEE 30 bus test systemsen_US
dc.subjectUMBC Ebiquity Research Groupen_US
dc.subjectcyber-intrusionsen_US
dc.titleBi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flowen_US
dc.typeTexten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
864.pd.pdf
Size:
277.94 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.68 KB
Format:
Item-specific license agreed upon to submission
Description: