Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

SPECIAL SECTION ON SECURITY ANALYTICS AND

INTELLIGENCE FOR CYBER PHYSICAL SYSTEMS

Received June 2, 2017, accepted June 18, 2017, date of publication July 18, 2017, date of current version August 8, 2017.
Digital Object Identifier 10.1109/ACCESS.2017.2728681

Achieving Efficient Detection Against False


Data Injection Attacks in Smart Grid
RUZHI XU1 , RUI WANG1 , ZHITAO GUAN1 , (Member, IEEE), LONGFEI WU2 ,
JUN WU3 , (Member, IEEE), AND XIAOJIANG DU2 , (Senior Member, IEEE)
1 School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China
2 Department of Computer and Information Sciences, Temple University, Philadelphia, PA 19122, USA
3 College of Information Security Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
Corresponding author: Zhitao Guan (guan@ncepu.edu.cn)
This work was supported in part by the Natural Science Foundation of China under Grant 61402171 and Grant 61471328, in part by the
Fundamental Research Funds for the Central Universities under Grant 2016MS29, and in part by the U.S. National Science Foundation
under Grant CNS-1564128.

ABSTRACT Internet of Things (IoT) technologies have been broadly applied in smart grid for monitoring
physical or environmental conditions. Especially, state estimation is an important IoT-based application
in smart grid, which is used in system monitoring to get the best estimate of the power grid state
through an analysis of the meter measurements and power system topologies. However, false data injection
attack (FDIA) is a severe threat to state estimation, which is known for the difficulty of detection. In this
paper, we propose an efficient detection scheme against FDIA. First, two parameters that reflect the physical
property of smart grid are investigated. One parameter is the control signal from the controller to the
static Var compensator (CSSVC). A large CSSVC indicates there exists the intense voltage fluctuation.
The other parameter is the quantitative node voltage stability index (NVSI). A larger NVSI indicates a
higher vulnerability level. Second, according to the values of the CSSVC and NVSI, an optimized clustering
algorithm is proposed to distribute the potential vulnerable nodes into several classes. Finally, based on these
classes, a detection method is proposed for the real-time detection of the FDIA. The simulation results show
that the proposed scheme can detect the FDIA effectively.

INDEX TERMS Smart grid, state estimation, false data injection attack, control signal, node voltage stability
index.

I. INTRODUCTION from information system to smart grid [4]–[7]. For instance,


As the next generation power supply system, the smart grid false data injection attack (FDIA) is one dangerous security
can achieve reliable and effective transmission of electric- threat in wireless sensor networks. In FDIA, the attackers
ity from power generators to factories or household electric inject malicious packets into the targeted network to dis-
appliances with the support of the recent communication rupt network services, by either compromising the sensor
and information technologies [1]–[3]. Taking advantage of nodes or hijacking the communication channel. Liu et al
the Internet of Things (IoT) technology, different compo- firstly demonstrated that FDIA can also become a serious
nents in smart grid can collaborate and exchange information, threat in smart grid; they presented two FDIA attack scenarios
so the control center can monitor the physical conditions of in which they can successfully inject malicious data to the
the power grid and make the proper decisions. As shown state estimation in smart grid [8], [9].
in Fig. 1, the monitoring data in smart grid is collected Power system monitoring is crucial to guarantee the secure
by field devices, like sensors, meters and remote terminal and steady operation of power grid. As shown in Fig. 1,
units (RTUs). Electrical power grid is integrated together with first, the monitoring data is collected and transferred to the
communication and information networks; besides power supervisory control and data acquisition (SCADA) system.
flow, information flow is also transmitted on most of the It usually includes the active and reactive power flows of
network links. branches, the active and reactive power injections of buses,
However, there are cons and pros in applying information and the bus voltages in every subsystem of the smart grid.
technology to smart grid. Cyber security threats also extend Second, the optimal power grid state estimation is performed

2169-3536
2017 IEEE. Translations and content mining are permitted for academic research only.
VOLUME 5, 2017 Personal use is also permitted, but republication/redistribution requires IEEE permission. 13787
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
R. Xu et al.: Achieving Efficient Detection Against FDIA in Smart Grid

FIGURE 1. False Data Injection Attack (FDIA) in smart grid.

through analyzing the monitoring data and the power sys- In this paper, based on analyzing the impact of FDIA on
tem topologies. The outputs of state estimation are some the voltage stability, we present an efficient detection method
immeasurable state variables like the voltage amplitude val- against FDIA. And the main contributions of our work can be
ues and voltage phase angles, which can be used as the summarized as following:
input of many EMS (Energy Management System) appli- G We describe the FDIA problem with a unified logic for
cations, i.e., the power dispatch, accident analysis, power state estimation, and give the formal model of FDIA,
flow analysis. Therefore, state estimation is an important which can deal with complex environment of smart grid
application to assist the smart grid to operate safely and with high dynamics.
reliably. G We investigate the relationship between two physical
In Fig. 1, the illustration of FDIA in smart grid is shown. parameters and FDIA. The first parameter is the Control
The attackers may inject the falsified monitoring data by three Signal from the Controller to the Static Var Compen-
means: compromising the smart meters, sensors or RTUs; sator (CSSVC), which can be used to analyze the node
hijacking the communication between sensor networks and voltage fluctuation to get the impact of FDIA on voltage
the SCADA system; or intruding the SCADA system. As the deviation. The second parameter is the Node Voltage
result, incorrect estimate of the smart grid state will be derived Stability Index (NVSI), we also studied the relationship
due to the false ‘‘measurements’’. This will further mislead between FDIA and the node voltage stability, which can
the control center to make wrong decisions and operations, be used to quantitatively depict the impact of FDIA on
such as bad real-time electricity pricing and even large-area the system measurements.
power failure accidents [9], [10]. G An optimized clustering algorithm is proposed, which
To tackle with such threats, great attentions have been takes the topology of the power system, and the values
paid to the identification, filtering, and detection of of CSSVC and NVSI as the input, and distributes the
FDIA [8]–[11]. However, existing FDIA detection methods potential vulnerable nodes into different classes.
seldom take the correlation between FDIA and the power sys- G Based on the above, we propose a state forecasting
tem physical parameters into consideration. In fact, the values method to make state prediction and detect FDIA. And
of physical parameters are closely related to the status of the we perform the simulation in the IEEE 39-bus and IEEE
power system. For instance, under certain initial operating 118-bus systems to verify the efficiency and perfor-
condition, the voltage stability reflects the ability of the power mance of the proposed scheme.
system to return the stable state after suffered from a physical The rest of this paper is organized as follows.
interference [12]. Section II introduces the related works. In Section III,

13788 VOLUME 5, 2017


R. Xu et al.: Achieving Efficient Detection Against FDIA in Smart Grid

TABLE 1. The compared result of each detection method.

the preliminaries are given. The node vulnerability level iden- apply distributed state estimation (DSE) into fully distributed
tification method is stated in Section IV. In Section V, based power systems for the detection of FDIA. Cramer et al. [26]
on the results of Section IV, the FDIA detecting method propose a bad data detection method based on an extended
is stated. In Section VI, the performance of the proposed distributed state estimation (EDSE). In EDSE, each power
scheme is evaluated. The paper is concluded in Section VII. system is divided into several subsystems by using graph
partition algorithms. Buses are divided into three categories in
II. RELATED WORK each subsystem: internal bus, boundary bus and adjacent bus.
FDIA, as a typical data integrity attack, is one of the most Simulation results indicate that the EDSE-based method has
threatening cyber-attacks in smart grid. It is first presented higher overall detection accuracy than the traditional method.
in [8]. To mitigate this serious vulnerability, many algo- However, the EDSE-based method has lower computation
rithms have been proposed to detect FDIA [13], such as complexity.
the geometrically designed residual filter and generalized Many feasible false data injection attack detection methods
likelihood ratio test [5]. The cumulative sum (CUSUM) test- have been proposed in existing literatures. In this paper,
based detection mechanism introduced in [14] and [15] is also we analyzed and compared the advantages and disadvantages
designed to counter FDIA. Other works [16], [17] use the of these methods. The results are summarized in Table 1.
machine learning method to deal with the stealthy false data. Most of the existing detection methods have their respec-
In [18], the relationship between the physical characteristics tive advantages and disadvantages, and each detection
of the power system and FDIA is analyzed, and the vulnerable method is generally adapted to one specific scenario. Besides,
nodes can be identified. Moreover, how to deploy Precision various methods have been proposed to address the problems
Measurement Units (PMUs) economically and effectively to of false data injection attacks in Smart Grid. It is one novel
assist the state estimator and improve FDIA detection has approach to utilize the physical parameters of the power
become a valuable question [19], [20]. In [21], a detection system to detect FDIA [18].
method based on PMU is proposed; the authors assume that In this paper, inspired by the work [18], we also
the measurements in part of the system are guaranteed to study the relationship between the physical parameters of
be reliable due to the physically protected hardware, for the power system and FDIA. Only one physical param-
example, the attackers couldn’t tamper the protected meters; eter is taken into consideration in [18], while multiple
otherwise it will be detected as an attack and enforce a physical parameters are analyzed together in our work.
restraint to the attackers’ behavior. With the increasingly In [18], all nodes are identified the level of vulnerability,
interconnected power systems in smart grid, distributed state which can needs much computational cost. While, in our
estimation (DSE) has become an important alternative to the work, only some of key nodes, the reactive compensation
centralized and hierarchical solutions [22], [23]. In [24], two leading nodes, will be considered for vulnerability level
new methods of distributed state estimation are proposed, one identification, which can reduce the computational cost
method uses the incremental mode of cooperation, and the significantly and is more suitable for large scale power
other is based on diffusive interaction pattern. The work [25] system. In addition, we propose an efficient FDIA detection

VOLUME 5, 2017 13789


R. Xu et al.: Achieving Efficient Detection Against FDIA in Smart Grid

method based on the results of vulnerable nodes 1) Improving the accuracy of data measurements. The
identification. noise and disturbance in data acquisition and trans-
mission may cause data error. Using state estimation,
III. PRELIMINARIES the best estimate of the system status can be got.
In this section, all important notations are listed. The state 2) Detecting and identifying the bad data. Then, delete or
estimation in power system is introduced. Next, the control correct bad data, and improve the reliability of the data
of voltage stability and the node voltage stability index are measurements.
briefly discussed. 3) Forecasting the future trend and possible state of the
system. The forecast data enriches the contents of the
A. NOTATIONS database, and provides the necessary conditions for the
The important notations used in this paper are listed in Table safety analysis and operation planning.
2. The procedure of state estimation is shown in Fig. 2.

TABLE 2. Description for Notations.

FIGURE 2. The flowchart of state estimation.

The states in smart grid usually include the voltage magni-


tude and the bus phase angles. In this paper, the state vector
is denoted by v. If a system contains n buses, the state vector
will be written as:

v = [v1 , v2 , . . . , vn ]T (vi ∈ R) (1)

Where vi indicates the state variable at the i-th bus, usually


includes the voltage angle or voltage amplitude.
Take measurement vector z into account. For a system
contains n buses, the measurement vector is denoted as
z ∈ Rm×1 , m>2n-1.Then, z should be:
B. PROBLEM FORMULATION
1) STATE ESTIMATION
z = [z1 , z2 , . . . , zm ]T (zi ∈ R) (2)
State estimation is of vital significance in connecting mea- For nonideal sensors, there exsit some errors between mea-
surements collected via the communication network and con- surement function values and actual measurement values.
trolling the physical operations in a smart grid. Using the Take measurement errors into account, state estimation in
redundancy of real-time measurement system to improve the actual electric power system can be described as:
data accuracy, the state estimation automatically eliminates
h1 (v1 , v2 , . . . , vn )
     
the error information caused by random interferences, esti- z1 e1
mate or predict system operating state. The main task of the  z2  ..  h2 (v1 , v2 , . . . , vn )   e2 
z =  . =   +  . . .  = h(v) + e
... ...
     
state estimators is conducted in a control center with the
following three main functions: zm hm (v1 , v2 , . . . , vn ) em

13790 VOLUME 5, 2017


R. Xu et al.: Achieving Efficient Detection Against FDIA in Smart Grid

where, 2) FDIA

h1 (v1 , v2 , . . . , vn )
 
e1

v1
  Bad data is generated due to the random errors of measure-
 h2 (v1 , v2 , . . . , vn )   e2   v2  ments, while false data is deliberately constructed by the
h(v) =  , e =  , v =   malicious attackers. Traditional bad data detection method in
     
 ...  ... ... state estimation work efficiently for detecting bad data, but it
hm (v1 , v2 , . . . , vn ) em vn is ineffective for detecting FDIA.
(3) Under FDIA, the falsified data b is maliciously injected
into the power flow measurement vector as:
Here, v is the state vector, e is the Gaussian
P error noise
with a zero mean and a covariance matrix e and h(v) is z = Hv + b + e (8)
the theoretical calculation of measurement z. We all know The observed measuring zf is represented as
that h(v) is used to describe Alternating Current (AC) power
system. So it is a set of nonlinear functions of the state zf = [zf1 , zf2 , . . . , zfm ]T (9)
variables. However, if the load flow equations submitted to
And the injected false data vector is
Direct Current (DC) approximations, h(v) would be a set of
linear functions. Hence, the DC power model for the real b = [b1 , b2 , . . . , bm ]T (10)
power measurements can be represented in a compact vector-
matrix form as: Then, zf will be equaled with

z = Hv + e (4) zf = z + b (11)
When there exist false data injected by some attackers, b

where, H = ∂h(v)∂v v=v0 is an invariable Jacobi matrix.

will be a nonzero vector.
State estimation aims to find an estimated value of v, The estimation state variable v0 will be changed into v0F due
denoted by v0 . v0 is the optimal solution for the equa- to the injected false data and there is v0F = v0 +c, where c is an
tion z = Hv + e. The Weighted Least Squares Algo- n-dimensional and nonzero vector. Assuming that the injected
rithm is often used to solve such problems. The form of data vector zf equals to Hc, b will be ignored by the traditional
state estimation is transformed into a quadratic optimization detection method as mentioned above. This is because
problem:
zf − Hv0 = z + b − H (v0 + c) = z − Hv0 (12)

X F
J (v) = [z − Hv]T e−1 [z − Hv] (5)
Thus FDIA is able to escape from traditional detections.
And the estimated linearized state vector v’ is given by
X X C. CSSVC
v0 = (H T e−1 H )−1 H T e−1 z (6)
CSSVC is the control signal from the controller to the Static
Let Q = (H T
P −1 −1 T P −1
e H) H e , and then the mea- Var Compensator (SVC), which is used to support reactive
surement residuals ψ can be expressed as: power compensation and voltage control of the corresponding
nodes. SVC is with a complicated higher-order nonlinear
ψ = z − Hv0 = (I − Q)(Hv + e) = (I − Q)e (7) model, and it is usually controlled by the Proportion Integral
Differential (PID) controller. So CSSVC can be calculated by
The Weighted Least Squares estimation method takes the
PID algorithm, which is shown as follows,
minimum square residual as the objective function f . Most of Z
the existing detection methods are based on the Chi-square d1Ui
CSSVC(Ni ) = Kp 1Ui + Ki 1Ui dt + Kd (13)
test or the Residual test. Taking Chi-square test as an example, dt
the identification basis of this method is shown in Table 3, When the power system works in normal status, the voltage
where v0 is a vector of estimation state variable and τ is of each node will only float in a small range (±5%) around the
a threshold [8]. The definition of the constant τ is a key rated value. In (13), 1Ui is the deviation between the voltage
issue. Assuming that all the variables are mutual independent magnitude of node i and its rated value. The first part contains
and that
the 0measuring
2 errors follow the normal distribu- the current status information in the voltage control process;
tion, z − Hv will follow Chi-squared distribution, whose

the second integral part contains the past status information;
degree of freedom is m-n. and the differential part contains the future status information.
To sum up, CSSVC reflects the fluctuation of voltage in the
TABLE 3. Criterion of bad data detection. power system.
When the power grid is under FDIA, the voltage of relevant
nodes will fluctuate for a period of time, so there will exist
deviation between the voltage magnitude of these nodes and
their rated value. The controller will be triggered by the volt-
age deviation to send abnormal high CSSVC to the control

VOLUME 5, 2017 13791


R. Xu et al.: Achieving Efficient Detection Against FDIA in Smart Grid

center, and the system administrator can analyze the abnormal help the administrator to locate the injected points. The details
data to locate the fault point. are as follows.
With the increasing complexity of the higher voltage level
and network structure, voltage stability control is becom- A. THE INFLUENCE OF FDIA ON CSSVC
ing more difficult. In this work, the method for partitioning For the real-time control system, CSSVC can be transmitted
the power system at the voltage stability critical point is to the control center through the communication network.
adopted [31], which is proved effective to solve the volt- However, if an attacker has launched FDIA, the state variables
age control problem of complex power grid. In each parti- such as voltage of reactive compensation nodes might be
tion, the appropriate reactive compensation node is selected changed. We analysis the voltage control system as a close
according to the sensitivity analysis. SVC is installed in these loop system and take the tampered state variable as the feed-
reactive power compensation leading nodes, and more details back, as shown in Fig. 3.
is stated in Section IV-C.

D. NVSI
Voltage stability is an important concern for power systems.
NVSI is one of the key factor regarding voltage stability,
which can reveal the real-time status of voltage stability
and help to prevent the occurrence of voltage collapse acci-
dents [32]. It has been found that the main advantages of using
NVSI are its accuracy in modeling and calculating, and ease
of measurement in real time or on-line applications. The val-
ues of NVSI alert us the existence of vulnerable nodes. These
FIGURE 3. Structural block diagram of PID voltage regulator.
vulnerable nodes may cause the system instability. When
the system load parameter is close to collapse critical value,
After being attacked, the true value of the node voltage Ui
NVSI values may also take effect. Administrators can use
measured by the system is replaced by false data Ui0 , which
NVSI values on-line to monitor the system stability and even
leads to a deviation 1Ui between the voltage magnitude of
make the prediction. Based on NVSI values, administrators
node i and its rated value Urated . The deviation 1Ui triggers
can take proper action to prevent voltage collapse. So, in this
PID controller, and PID controller produces the CSSVC. SVC
paper, we identify the vulnerable nodes by means of the
accepts a false command and changes the true node voltage.
CSSVC and NVSI at first, and then perform the detection for
We take IEEE 39-bus system as an example for sim-
FDIA at each node according to the vulnerability level.
ulation. Due to space limitation, we display voltage fluc-
In our scheme, we use the method presented in [32] for
tuations for only one of the reactive power compensation
calculating the NVSI of each reactive power compensation
nodes under FDIA. From Fig. 4 we can see that after FDIA,
leading node in the power system, as follows,
the true value of the node voltage varies with the false value.
NVSI (Ni ) = 4Uj−4 (RQi − XPi )2 − 4Uj−2 (XQi + RPj ) (14) We compare the values of CSSVC before and after attack
in Table 4. In general, the more intensive the voltage fluc-
The NVSI only needs measurements information about tuation is, the larger the CSSVC is. The weaker the voltage
nodes, which can be easily obtained from the synchronized fluctuation is, the smaller the CSSVC is.
PMUs or the existing state estimator of EMS at control
TABLE 4. The values of CSSVC before/after attack.
centers. It can be calculated in a very short time so that it
can be applied in real-time or on-line environment.
In (14), NVSI (Ni ) is the voltage stability index at the node
i, Uj is the voltage magnitude of node j. Pi , Qi are the sum-
mation of the real power and reactive power. Besides, R is
the resistance of branch. X is the reactance of branch. We can
obtain R and X from the power network electric topological
database. By doing a successful power flow solution, all
parameters of (14) can be obtained, and the NVSI of each
reactive power compensation leading node can be calculated
in short order.
B. THE INFLUENCE OF FDIA ON NVSI
IV. NODE VULNERABILITY LEVEL IDENTIFICATION The system operation data can be obtained in real-
In this section, we use the CSSVC and NVSI to analyze time or extended real-time operation easily. For instance,
the impact of FDIA. We use an optimization algorithm to the operation data can be obtained from synchronized
distinguish which nodes are tend to be attacked, which can PMUs or the existing state estimator of EMS at control center.

13792 VOLUME 5, 2017


R. Xu et al.: Achieving Efficient Detection Against FDIA in Smart Grid

The k-means clustering is popular in datamining field.


It is a vector quantization method developed from signal
processing. However, its defiect is that it randomly selects
K points as the initial cluster centroids at the beginning, and
it is easily trapped in the local optimum. We adopt a valid
method to get better clustering results. The improved k-means
clustering based on the particle swarm optimization (PSO) is
efficient to obtain the quality cluster centroids initially. The
steps of the method are as follows:
Step 1). Algorithm initialization
K nodes are selected randomly as the initial center
of clustering. The encoding of particle i is expressed
FIGURE 4. Voltage fluctuation after attack. as follows:
par(i) = {loc[], vel[], fit} (15)
However, if some or all of the measurements are accessible
for an attacker, these measurements will be modified and The position encoding of the particle i is expressed
injected by false data. Once the measurements are tampered, as follows:
the real and reactive power measurements Pi , Qi and Uj par(i).loc[] = [X θ1 , X θ2 , · · · , X θK ] (16)
will be changed, and the value of NVSI will change corre-
spondingly. In general, the smaller the NVSI is, the better Where X θj represents the θj th cluster centroid cal-
the system node voltage stability is; the greater the NVSI is, culated by particle par(i).
the worse the system node voltage stability is. In the worst The velocity encoding of the particle is expressed
condition, the node voltage will collapse when it approaches as follows:
the system voltage collapse critical point. So, the system
par(i).vel[] = [V1 , V2 , . . . , VK ] (17)
administrator should be vigilant to the vulnerable nodes and
keep the system from FDIA attacks or the verge of instability. The location of a particle corresponds to the set of
We try to imitate the attackers who inject the false data and K cluster centers.
tamper the measurements. In the simulations, we assume that Step 2). Fitness calculation
the state variable Pi , Qi and Uj are gradually and proportion- According to the clustering algorithm criteria,
ally increased to stress the system with a constant factor §, the definition of the fitness of par(i) in swarm is
which can be seen as the attack intensity. For each state as equation below:
variable in the power system, we use § times its real estimate
K P 2
as the injected error. § is set to 1, 1.5, 2, 2.5, 3 respectively, and P
(Xi − X (θj ) )
the results of IEEE 14-bus system and IEEE30-bus system are j=1 Xi ∈θj
shown in Fig. 5 and Fig. 6. Here, §=1 indicates that there is par(i).fit = (18)
Mp
no attack. From the two figures, we can see that the value
of NVSI increases as the attack intensity § increases, which Where Mp is the input size of clustering
reflects that the node becomes unstable. algorithm.
Step 3). If the iteration number reaches the maximum
limitation, then turn to Step 8, if not, turn to
C. THE METHODS OF IDENTIFYING THE NODE
Step 4.
VULNERABILITY LEVEL
Step 4). Store the best centroids
According to the CSSVC and NVSI values of all reactive If par(i) gets a smaller fitness, store the particle
power compensation nodes, we can identify the vulnerable as the individual optimal solution pid . The position
nodes in the power system preliminarily. Therefore, the vul- of particle with the minimum fitness among all the
nerable nodes can easily trigger an emergent remedial action particles is stored as pgd .
scheme to remind the administrator to detect the FDIA and Step 5). Swarm regeneration
take appropriate measures to protect the system. It is worth The position updating algorithm is as follows:
thinking how to identify these vulnerable nodes in the power
system. Next, we will analyze our methods. par(i).vel[] = ς ∗ par(i)vel[]
According to the similarity between different data sources,
clustering algorithms can classify the data sources into dif- − c1 ∗ r1 (pid (i).loc[] − par(i).loc)
ferent clusters. If clustering the vulnerable nodes with larger + c2 ∗ r2 (pgd .loc[] − par(i).loc[])
value of NVSI and higher CSSVC into the same cluster, it will
(19)
not be hard to distinguish these vulnerable nodes, which can
help the administrator to identify the injected data roughly. par(i).loc[] = par(i).loc[] + par(i).vel[] (20)

VOLUME 5, 2017 13793


R. Xu et al.: Achieving Efficient Detection Against FDIA in Smart Grid

FIGURE 5. The value of NVSI under different attack intensity of IEEE 14-bus system.

FIGURE 6. The value of NVSI under different attack intensity of IEEE 30-bus system.

Where ς is the inertia weight of velocity updating. Step 6). Inertia weight regeneration
The initial value of ς is 1. According to the following equation to renew the
If par(i) falls beyond the range of possible solu- inertia weight ς :
0 , X 0 ], then the location of par(i) is
tions [Xmin ςmax − ςmin
ς = ςmax − iter
max
0 or X 0 ; similarly if a new generated (21)
set to Xmin max itermax
velocity of par(i) is beyond the velocity range
Where iter is the present iteration number, and
0 , V 0 ], the new generated velocity will be set
[Vmin max itermax is the maximum limitation of iteration num-
0 or V 0 .
to Vmin max
ber, ςmax = 1,. ςmin = 0

13794 VOLUME 5, 2017


R. Xu et al.: Achieving Efficient Detection Against FDIA in Smart Grid

Step 7). If the global best of the swarm, pgd , keep stable for
a number of iterations, turn to Step 8; if not, turn to
Step 3.
Step 8). Use the traditional k-means algorithm to complete
the clustering program.
We summarize the total steps of the vulnerable node iden-
tification procedure as follows:

1) READ THE SYSTEM DATA AND CALCULATE THE NVSI OF


EACH REACTIVE POWER COMPENSATION LEADING NODE
Usually, the system administrator can easily obtain the power
data from synchronized PMUs or the existing state estimator
of EMS at the control center. So it is convenient to calculate
the NVSI quickly. The CSSVC is transmitted to the control
center in real time. In our work, we use the test data obtaining
from the power simulation package, MATPOWER [33]. And FIGURE 7. The node vulnerability level of IEEE 39-bus system.
we calculate the NVSI of two IEEE standard test systems,
IEEE 39-bus and IEEE 118-bus.
namely Level.1. Similarly, blue represents Level.2 and green
2) OBTAIN THE HIGH-QUALITY CLUSTERING CENTROIDS represents Level.3.
FROM IMPROVED ALGORITHM, AND CLUSTER THE After the vulnerable nodes are found, the administrator
SYSTEM NODES INTO DIFFERENT CLASSES can treat them as the suspicious false data injection attacks
In this procedure, we set K = 3, which means that we will targets. Then, they should take a precise detection measures
cluster all nodes into three different classes. Most impor- immediately.
tantly, if we want to get better cluster results, we need three
better centroids firstly and each centroid obtained from the V. DETECTING FDIA
PSO algorithm. Then, the high-quality centroids will be used In Section IV, the most vulnerable nodes are recognized. It is
as the real initial cluster centroids to perform the standard expected to decrease the cost of detecting FDIA greatly since
k-means algorithm again and cluster the reactive compensa- the recognized vulnerable nodes that are the most suspicious
tion nodes into three classes according to their CSSVC and targets of FDIA will be checked preferentially.
NVSI, each of the classes represents one different vulnera- Next, we propose a FDIA detection method named
bility level. State Forecasting Detection (SFD), in which two steps are
included.
3) IDENTIFY THE NODES VULNERABILITY LEVEL Step 1 (Measurement Forecasting): It needs to get the real
OF DIFFERENT CLASSES measurement and the forecasted measurement of a specific
In order to identify the vulnerable nodes, we use each of the moment. The forecasted measurement is got based on the
classes to represent one vulnerability level. For example, the short-term forecasting technology. The short-term forecast-
Level.1 indicates the most vulnerable level with higher value ing technologies have been used in many fields [35], [36].
of CSSVC and higher value of NVSI, the Level.2 indicates Based on the historical measurements, the next measurement
vulnerable level and the Level.3 indicates the stable level, can be forecasted. The short-term prediction methods include
respectively. Therefore, we can easily identify the vulnerable statistical regression method, time series method, neural net-
nodes according to the different nodes vulnerability levels. work method, etc. In our scheme, the auto-regressive model
We conduct experiments using the measurements at the is adopted for FDIA detection. Consider two consecutive
moment t in the IEEE 39-bus and IEEE 118-bus. Firstly, moments t − 1 and t, using the measurement zt−1 of t − 1
we try to inject the false data into the measurements of some moment, we can estimate the measurement − →zt of t moment.
nodes and then calculate the NVSI of each reactive power We can also get the measurement zt of t moment.
compensation leading node quickly. Secondly, we get PID The details of step 1 is as follows.
output of these nodes at moment t. Then, it is easy to cluster
v0t = Gt−1 vt−1 + Qt−1 (22)
all reactive power compensation leading nodes into three
classes and determine the vulnerability level of these nodes where Gt−1 is the state transition matrix, vt−1 is the esti-
by the improved algorithm proposed above. The simulation mated state value and Qt−1 is the nonzero diagonal matrix at
results of the two standard systems are shown in Fig. 7 and t − 1 moment. Considering two sampling time t − 1 and t,
Fig. 8. In order to make it easier to observe, we use different we calculate the forecasting measurements of time t as:
colors to distinguish the node vulnerability levels. Specif-
ically, the red color represents the most vulnerable level, −

zt = Hv0t (23)

VOLUME 5, 2017 13795


R. Xu et al.: Achieving Efficient Detection Against FDIA in Smart Grid

FIGURE 8. The node vulnerability level of IEEE 118-bus system.

At time t, we obtain the measurement vector zt , and detect the SFD with two traditional methods for detecting FDIA
the FDIA by verifying the consistence of the measurements on vulnerable nodes, Largest Normalized Residue (LNR)
and the forecasting measurements. The premise of the pre- method and the Object Detection J (v) method. For J (v) is
diction is the assuming that the system measurements at t − 1 the most widely used method for FDIA detection; and the
moment are not under any attack. That is, the state variable proposed SFD method is proposed based on LNR method.
vt−1 is not under attack.
Step 2 (Detecting FDIA): Using − →
zt and zt as the input,
(zt − − →

zt ) ≤ τ, H0 is true
H0 assumption : √


R + H 6H T

(zt − − →

 zt ) > τ, H0 is false

H1 assumption :


R + H 6H T ∞

(24)

where H0 is the null hypothesis and H1 is the alterna-


tive hypothesis. R is diagonal covariance matrix of the
measurement. τ is the detection threshold. If H0 is true,
no attack is being found; on the contrary, if H0 is false,
there exists FDIA. The proposed detection method is verified
effective and accurate in IEEE 39-bus and IEEE 118-bus
power system.

VI. PERFORMANCE EVALUATION FIGURE 9. The detecting results in IEEE 39-bus system.
The simulation environment is set up using
MATPOWER [33], and the test data is obtained from it. In Fig. 9 and Fig. 10, the detecting results in IEEE 39-bus
We construct the false data vectors using the similar way system and IEEE 118-bus system are shown. It can be
as [14]. After vulnerable nodes are recognized, we compare seen that the detection rate increase with the false alarm

13796 VOLUME 5, 2017


R. Xu et al.: Achieving Efficient Detection Against FDIA in Smart Grid

demonstrate that the proposed mechanism can effectively


detect FDIA in smart grid. In future work, we will verify the
proposed scheme in larger system, such as IEEE 300-bus and
IEEE 1354-bus system.

REFERENCES
[1] X. Fang, S. Misra, G. Xue, and D. Yang, ‘‘Smart grid—The new and
improved power grid: A survey,’’ IEEE Commun. Surveys Tuts., vol. 14,
no. 4, pp. 944–980, 4th Quart., 2012.
[2] N. Kayastha, D. Niyato, E. Hossain, and Z. Han, ‘‘Smart grid sensor
data collection, communication, and networking: A tutorial,’’ Wireless
Commun. Mobile Comput., vol. 14, no. 11, pp. 1055–1087, Aug. 2014.
[3] X. Hei and X. Du, ‘‘Biometric-based two-level secure access control for
Implantable Medical Devices during emergencies,’’ in Proc. IEEE INFO-
COM, Apr. 2011, pp. 346–350.
[4] T. Liu et al., ‘‘Abnormal traffic-indexed state estimation: A cyber-
physical fusion approach for Smart Grid attack detection,’’ Future Generat.
Comput. Syst., vol. 49, no. 48, pp. 94–103, Aug. 2015.
[5] F. Pasqualetti, F. Dorfler, and F. Bullo, ‘‘Cyber-physical attacks in power
FIGURE 10. The detecting results in IEEE 118-bus system.
networks: Models, fundamental limitations and monitor design,’’ in Proc.
Decision Control Eur. Control Conf., 2011, pp. 2195–2201.
[6] S. Liang and X. Du, ‘‘Permission-combination-based scheme for Android
mobile malware detection,’’ in Proc. IEEE ICC, Jun. 2014, pp. 2301–2306.
probability gradually. From Fig. 9, it can be seen in IEEE [7] X. Hei, X. Du, S. Lin, I. Lee, and O. Sokolsky, ‘‘Patient infusion pattern
based access control schemes for wireless insulin pump system,’’ IEEE
39-bus system, when the percentage of the attacked measure- Trans. Parallel Distrib. Syst., vol. 26, no. 11, pp. 3108–3121, Nov. 2015.
ments is low, the three methods are not effective for detection. [8] Y. Liu, P. Ning, and M. K. Reiter, ‘‘False data injection attacks against state
No matter how large the percentage is, the three methods estimation in electric power grids,’’ ACM Trans. Inf. Syst. Security, vol. 14,
no. 1, pp. 1–33, May 2011.
cannot detect all the attacks. That is because the system is [9] Z. Guan, P. An, and T. Yang, ‘‘Matrix partition-based detection scheme for
not large enough so that the changes of FDIA on the system false data injection in smart grid,’’ Int. J. Wireless Mobile Comput., vol. 9,
is not very obvious. Among the three methods, the pro- no. 3, pp. 250–256, Jan. 2015.
[10] Z. Guan, N. Sun, Y. Xu, and T. Yang, ‘‘A comprehensive survey of false
posed SFD has a higher detection rate at the same attack data injection in smart grid,’’ Int. J. Wireless Mobile Comput., vol. 8, no. 1,
percentage. From Fig. 10, it can be seen in IEEE 118-bus pp. 27–33, 2015.
system, when the percentage of attacked measurements is [11] E. N. Asada, A. V. Garcia, and R. Romero, ‘‘Identifying multiple interact-
ing bad data in power system state estimation,’’ in Proc. IEEE Power Eng.
low, all the three methods can detect a small part of attacks. Soc. General Meeting, Jun. 2015, pp. 571–577.
With the increase of the attack percentage, the detection rates [12] T. Zabaiou, L. A. Dessaint, and I. Kamwa, ‘‘Preventive control approach
of the three methods increase. When all the measurements for voltage stability improvement using voltage stability constrained
optimal power flow based on static line voltage stability indices,’’ IET
in the system are under attack, the detection rate of SFD Generat., Transm. Distrib., vol. 8, no. 5, pp. 924–934, May 2014.
can reach 90%. From Fig. 9 and Fig. 10, we find that SFD [13] S. Cui, Z. Han, S. Kar, T. T. Kim, H. Poor, and A. Tajer, ‘‘Coordinated
have higher accuracy and higher detection rate. On the other data-injection attack and detection in the smart grid: A detailed look at
enriching detection solutions,’’ IEEE Signal Process. Mag., vol. 29, no. 5,
hand, we compare two different systems and find that there pp. 106–115, Sep. 2012.
is a higher detection rate and accuracy in larger systems. In a [14] O. Kosut, L. Jia, R. J. Thomas, and L. Tong, ‘‘Malicious data attacks on the
word, the effectiveness of SFD is verified by the simulation. smart grid,’’ IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645–658, Oct. 2011.
[15] S. Li, Y. Yilmaz, and X. Wang, ‘‘Quickest detection of false data injection
attack in wide-area smart grids,’’ IEEE Trans. Smart Grid, vol. 6, no. 6,
VII. CONCLUSION pp. 2725–2735, Dec. 2014.
To deal with the problem of FDIA in smart grid, which may [16] L. Liu, M. Esmalifalak, Q. Ding, V. A. Emesih, and Z. Han, ‘‘Detecting
lead to wrong decision makings in power dispatch or elec- false data injection attacks on power grid by sparse optimization,’’ IEEE
Trans. Smart Grid, vol. 5, no. 2, pp. 612–621, Mar. 2014.
tric power market operations, we propose an efficient FDIA [17] Y. Xiao, H. H. Chen, X. Du, and M. Guizani, ‘‘Stream-based cipher
detection scheme based on power system physical parame- feedback mode in wireless error channel,’’ IEEE Trans. Wireless Commun.,
ters. Firstly, we analyze the power system and investigate the vol. 8, no. 2, pp. 662–666, Feb. 2009.
[18] A. Anwar, A. N. Mahmood, and Z. Tari, ‘‘Identification of vulnerable node
CSSVC and NVSI to identify the vulnerability level of nodes clusters against false data injection attack in an AMI based smart grid,’’ Inf.
in the power system. As the result, we define three levels Syst., vol. 53, pp. 201–212, Oct. 2015.
to cluster the nodes into three swarms. In the progress of [19] R. Deng, G. Xiao, and R. Lu, ‘‘Defending against false data injection
attacks on power system state estimation,’’ IEEE Trans. Ind. Informat.,
clustering, we use an improved cluster algorithm for nodes vol. 13, no. 1, pp. 198–207, Aug. 2015.
clustering. This step helps us to find the suspicious false [20] S. Bi and Y. J. Zhang, ‘‘Graphical methods for defense against false-data
data injection nodes easily. Then we use the state forecasting injection attacks on power system state estimation,’’ IEEE Trans. Smart
Grid, vol. 5, no. 3, pp. 1216–1227, May 2014.
method to obtain the states of power system. In addition, [21] A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla,
the results based on state forecasting detection methods are ‘‘Smart grid data integrity attacks,’’ IEEE Trans. Smart Grid, vol. 4, no. 3,
used to find the sensitive measurement vectors. In the simula- pp. 1244–1253, Sep. 2013.
[22] T. T. Kim and H. V. Poor, ‘‘Strategic protection against data injec-
tion, we built different types of attack vectors, which gives us tion attacks on power grids,’’ IEEE Trans. Smart Grid, vol. 2, no. 2,
sufficient experimental results. Finally, the simulation results pp. 326–333, Jun. 2011.

VOLUME 5, 2017 13797


R. Xu et al.: Achieving Efficient Detection Against FDIA in Smart Grid

[23] V. Kekatos and G. B. Giannakis, ‘‘Distributed robust power system state ZHITAO GUAN (M’13) received the B.Eng. and Ph.D. degrees in computer
estimation,’’ IEEE Trans. Power Syst., vol. 28, no. 2, pp. 1617–1626, application from the Beijing Institute of Technology, China, in 2002 and
Oct. 2012. 2008, respectively. He is currently an Associate Professor with the School of
[24] M. Ozay, I. Esnaola, F. Vural, S. Kulkarni, and H. Poor, ‘‘Distributed Control and Computer Engineering, North China Electric Power University.
models for sparse attack construction and state vector estimation in the He has authored over 30 peer-reviewed journal and conference papers in
smart grid,’’ in Proc. IEEE 3rd Int. Conf. Smart Grid Commun., Nov. 2012, these areas. His current research focuses on smart grid security, wireless
pp. 306–311. security, and cloud security.
[25] Y. Gu, T. Liu, D. Wang, and X. Guan, ‘‘Bad data detection method for
smart grids based on distributed state estimation,’’ in Proc. IEEE Int. Conf.
Commun. (ICC), Jun. 2013, pp. 4483–4487.
[26] M. Cramer, P. Goergens, and A. Schnettler, ‘‘Bad data detection and han-
dling in distribution grid state estimation using artificial neural networks,’’
in Proc. IEEE Eindhoven PowerTech, Jun. 2015, pp. 1–6.
[27] O. Kosut, L. Jia, R. J. Thomas, and L. Tong, ‘‘Limiting false data attacks
on power system state estimation,’’ in Proc. Inf. Sci. Syst., 2010, pp. 1–6.
[28] D. Wang, X. Guan, T. Gu, C. Chen, and Z. Xu, ‘‘Extended distributed state
LONGFEI WU received the bachelor’s degree in telecommunication engi-
estimation: A detection method against tolerable false data injection attacks
neering from the Beijing University of Posts and Telecommunications,
in smart grids,’’ Energies, vol. 7, no. 3, pp. 1517–1538, Mar. 2014.
[29] O. Kosut, L. Jia, R. J. Thomas, and L. Tong, ‘‘On malicious data attacks Beijing, China, in 2012. He is currently pursuing the Ph.D. degree with
on power system state estimation,’’ in Proc. Universities Power Eng. the Department of Computer and Information Sciences, Temple University,
Conf. (UPEC), 2010, pp. 1–6. Philadelphia, PA, advised by Dr. X. Du. His research focuses on the security
[30] K. Manandhar, X. Cao, F. Hu, and Y. Liu, ‘‘Detection of faults and attacks and privacy issues of modern computing systems and devices, including
including false data injection attack in smart grid using Kalman filter,’’ mobile devices, medical devices, Internet of Things, wireless network and
IEEE Trans. control Netw. Syst., vol. 1, no. 4, pp. 370–379, Sep. 2014. security, big data security, and mobile computing.
[31] Y.-C. Huang, H.-T. Yang, and C.-L. Huang, ‘‘Solving the capacitor place-
ment problem in a radial distribution system using tabu search approach,’’
IEEE Trans. Power Syst., vol. 11, no. 4, pp. 1868–1873, Nov. 1996.
[32] G. B. Jasmon and L. H. C. C. Lee, ‘‘New contingency ranking tech-
nique incorporating a voltage stability criterion,’’ IEE Proc. C Generat., JUN WU (M’08) received the Ph.D. degree in information and telecommu-
Transmiss. Distrib., vol. 140, no. 2, pp. 87–90, Mar. 1993. nication from Waseda University, Japan. He was a Post-Doctoral Researcher
[33] R. Zimmerman and C. Murillo. (Dec. 2016). MATPOWER—A with the Research Institute for Secure Systems, National Institute of
MATLAB Power System Simulation Package. [Online]. Available:
Advanced Industrial Science and Technology, Japan, from 2011 to 2012.
http://www.pserc.cornell.edu//matpower/
He was a Researcher with the Global Information and Telecommunication
[34] R. C. Eberhart and Y. Shi, ‘‘Comparing inertia weights and constriction
factors in particle swarm optimization,’’ in Proc. Congr. Evol. Comput., Institute, Waseda University, Japan, from 2011 to 2013. He is currently an
2000, pp. 84–88. Associate Professor of electronic information and electrical engineering with
[35] Z. Wang and Z. Huang, ‘‘An analysis and discussion on short-term traffic Shanghai Jiao Tong University, China. He has hosted and participated in sev-
flow forecasting,’’ Syst. Eng., vol. 21, no. 6, pp. 97–100, Jun. 2003. eral research projects for the National Natural Science Foundation of China,
[36] A. Ding, X. Zhao, and L. Jiao, ‘‘Traffic flow time series prediction based National 863 Plan, and 973 Plan projects. His research interests include
on statistics learning theory,’’ in Proc. Intell. Transp. Syst., Sep. 2002, the advanced computation and communications techniques of smart sensors,
pp. 727–730. wireless communication systems, industrial control systems, wireless sensor
networks, and smart grids. He is a Guest Editor of the IEEE SENSORS JOURNAL
and a TPC Member of several international conferences, including WINCON
2011 and GLOBECOM 2015.

RUZHI XU received the B.Eng. degree in electric engineering from the


Huazhong University of Science and Technology, China, in 1986, and the
Ph.D. degree in computer application from North China Electric Power XIAOJIANG (JAMES) DU (M’04–SM’09) received the B.S. and M.S.
University (NCEPU), China, in 2011. She is currently an Associate Professor degrees in electrical engineering from Tsinghua University, Beijing, China,
with the School of Control and Computer Engineering, NCEPU. Her current in 1996 and 1998, respectively, and the M.S. and Ph.D. degrees in electrical
research focuses on smart grid security. engineering from the University of Maryland at College Park, College Park,
in 2002 and 2003, respectively. He was an Assistant Professor with the
Department of Computer Science, North Dakota State University, from 2004
to 2009, where he received the Excellence in Research Award in 2009. He
has authored over 150 journal and conference papers in these areas. He
is currently an Associate Professor with the Department of Computer and
RUI WANG received the B.Eng. degree from North China Electric Power Information Sciences, Temple University. His research interests are security,
University in 2016, where she is currently pursuing the master’s degree cloud computing, wireless networks, computer networks and systems. Dr.
with the School of Control and Computer Engineering. Her current research Du is a Life Member of the ACM.
focuses on smart grid security.

13798 VOLUME 5, 2017

You might also like