Professional Documents
Culture Documents
Good Paper 8
Good Paper 8
Iranian Journal of Electrical and Electronic Engineering, Vol. 18, No. 4, 2022 1
Resilient Configuration of Distribution System… R. Behnam and G. B. Gharehpetian
[7]; two indices have been used to quantify the least system operator by injecting false data to change SE
effort needed to perform a successful FDI attack (bus voltage) data. The main contributions of this
against particular measurements. The attackers paper are as follows:
require to know the entire network topology to • An objective function is proposed to determine
increase the successful attack rate, but access to all the impacts of FDI attacks against SE (voltage
information is difficult for attackers [8-9]. FDI bus) on active and reactive power measurements.
attacks with incomplete information have been • Network reconfiguration is used as a strategy to
investigated in [10]. In [11], a FDI attack has been reduce FDI attacks effects.
executed on automatic synchronization systems in • The best configuration of the distribution system
microgrids, the attack has manipulated the is determined to decrease FDI attacks effects on
synchronization, and also the attack has led to the each bus.
microgrid blackout. • (MSOE) method are applied as a strategy to
Simple FDI can be detected by bad data reconfigure the network.
The rest of the paper is organized as follows:
detection and identification algorithms. Currently,
The FDI attacks against SE and the objective
the detection strategy of FDI is categorized into three
function are presented in section II and section III,
types: state-estimation-based, trace-prediction-
respectively. Section IV introduces network
based, and artificial-intelligence-based strategy. A
reconfiguration as an algorithm to reduce FDI
matrix separation was used for the detection of FDI
attacks and shows the proposed network
attacks on the power grid in [12]. In [13], two
reconfiguration procedure. The impacts of the
machine learning-based techniques have been used
proposed algorithm on the IEEE 33-bus and 69-bus
to detect FDI attacks in smart grids. In [14], a
systems are studied in section V. Finally, in section
strategy based on a dimensionality-reduction
VI, the conclusions are drawn, and the direction for
method and a Gaussian mixture model has been
prospective research is suggested.
proposed to detect cyber-attacks. In [15], the authors
have used a neural-network algorithm to detect the
2 State estimation Estimation
FDI attack in real time. In [16], the authors have used
a neural-network based algorithm to detect the FDI
In [21], the authors have proposed the
attack in real time. However, the proposed algorithm
distribution system state estimation model based on
could not reduce the impacts of FDI attacks. In [17],
the nodal voltage. For the reliability of distribution
an image processing algorithm and deep
systems, it is necessary real-time monitoring of the
convolutional neural network have been used to
system. Meters are used to monitor the distribution
detect FDI attacks. Graph signal processing has been
systems, and operators estimate the state of the
used to detect FDI attacks, and the Graph Fourier
system by these meter measurements. A set of
Transform of the phase angles has been used for FDI
variables (usually voltage magnitudes and phase
attack detection.
angles) for calculating the other quantities of a
Normally closed (sectionalizing) and normally
distribution system, if they are known, is called the
opened (tie) switches are the two types of switches
system state. So, the distribution system operating
in distribution systems. Network reconfiguration is
point is determined by the system state. It is assumed
based on changing the status of switches. Network
that m meters are usually used to monitor a
topologies have been assumed to have a fixed
distribution system with s state variables (m>s which
structure in most of the research, but operators alter
indicates measurement redundancy). As a result, the
the topology of the network for different reasons.
distribution system can be seen/observed by these
The topology of conventional distribution systems is
meters. The state estimation involves estimating
usually radial with unidirectional power flows [18].
state variables x∈ R when they are based on meter
Many recent types of research on network
measurements z∈R, where noise e∈R is independent
reconfiguration have focused on issues such as;
and follows a distribution with zero mean. The
reconfiguration for power loss reduction in
relation between meter measurements z and state
distribution systems [19]. In [20], the objective
variables x is represented, as follows:
function of reconfiguration was to improve
reliability and reduce power losses. In this paper, z = h( x) + e (1)
network reconfiguration will be used as a strategy to
where, h(x) = [h1(x), … , hi(x), … , hm(x)] are
take action against FDI attacks. In this paper, it is
measurements and functions of x.
assumed that attackers mislead the distribution
Iranian Journal of Electrical and Electronic Engineering, Vol. 18, No. 4, 2022
2
Resilient Configuration of Distribution System… R. Behnam and G. B. Gharehpetian
The purpose of state estimation is to estimate measurements of the bus i under the cyber-attack
state variables x that is the best fit of meter are:
measurements z according to the equation 1.
Weighed least squares (WLS) are the basic approach Pi + jQi + Pi + jQi
Vi , are + jVi , aim
to the state estimation. The WLS based state (8)
estimation is to solve the following optimization (
= ( I i , re + jI i ,im ) + aIi ,re + jaIi ,im )
problem:
m where, Vi , are and Vi , aim stand for the real and
min J ( x) = wi [ zi − hi ( x)]2
x
i =1 (2) imaginary part of the voltage at bus i after the FDI
= [ z − h( x)]T W [ z − h( x)]
attack, respectively. Thus, Vi , are = Vi , re + Vi , re and
where, wi represents the weight associated with Vi , aim = Vi ,im + Vi ,im . Vi , re and Vi ,im represent the
the meter measurement zi. The solution of the
optimization problem 2 gives the best estimated state change of the real and imaginary parts of the bus
x̂ which must satisfy the following optimization voltage state after a cyber-attack, respectively. Pi
condition: and Qi are the active and reactive powers injection at
the bus i , respectively. Pi and Qi represent the
J ( x) / x = 0 H T ( xˆ )W [ z − h( xˆ )] = 0 (3)
change of the active and reactive powers injection at
where, H(x)=∂h(x)/∂x is the Jacobian matrix of
the bus i , respectively. I i , re and I i ,im denote the real
the measurement functions h(x). The solution of this
nonlinear equation can be obtained by different and imaginary part of the current injection at bus i.
iterative methods. To compute the correction x k , aIi ,re and aIi ,im are the real and imaginary parts of the
an equation of the following type is solved at each FDI in the current measurement, respectively.
iteration:
Under cyber-attack, the changes of the active and
[G ( x k )]x k = H T ( x k )W [ z − h( x k )] (4) reactive powers following out of bus i are rewritten,
where, k∈N denotes the index of iterations. This as follows:
equation is called the normal equation of the WLS [( Pi + Pi )Vi , are + (Qi + Qi )Vi , aim ]
based state estimation, where G(x) is called the gain Vi ,2are + Vi ,2aim
function and is usually chosen as: [( P + Pi )Vi , aim − (Qi + Qi )Vi , are ] (9)
+j i
Vi ,2are + Vi ,2aim
G ( x) = H ( x)WH ( x)
( ) ( )
T
(5)
= I i , re + aIi ,re + j I i ,im + aIi ,im
The AC state estimation has been represented in
detail in [22]. According to equation (9), Pi and Qi will
obtain, as follows:
3 FDI Attacks Model
( Pi + Pi )Vi , are + (Qi + Qi )Vi ,aim
In this paper, the attacker can manipulate the ( )
= I i , re + aIi ,re (Vi ,2are + jVi ,2aim )
(10)
voltage of buses during the SE procedure. The FDI
( Pi + Pi )Vi , aim − (Qi + Qi )Vi , are
( )
in a distribution system SE model is introduced as (11)
= I i ,im + aIi ,im (Vi ,2are + jVi ,2aim )
follows:
Vi , mea = aVi (6) Considering I i , re and I i ,im , as follows:
where, aVi is defined as the FDI in the bus i
i i , re + QV
PV
voltage. The FDI on the bus voltage causes a change I i , re = i i , im
(12)
Vi ,2re + Vi ,2im
in the current measurement. The change of the
i i , im − QV
PV
original current measurement is expressed as I i ,im = i i , re
(13)
Vi ,2re + Vi ,2im
follows:
I i , mea = aI i (7) According to equations (12) and (13), the
equations (10) and (11) will be rewritten as follows:
where, a I i is the change in the original current
measurement. The changes of the original power
Iranian Journal of Electrical and Electronic Engineering, Vol. 18, No. 4, 2022
3
Resilient Configuration of Distribution System… R. Behnam and G. B. Gharehpetian
aIi ,im = −(Vi , reYi ,im + Vi ,imYi ,re ) (26) where, FFDI , j is the objective function, given by
So, equations (16) and (17) are rewritten as equation (29), when FDI attack has occurred on bus
follows: j. N and j are the number of buses in the system
Pi = and weighting factors, respectively. It is assumed
(Vi , re + Vi , re )( − (Vi , reYi , re − Vi ,imYi ,im ) − K i ) that the importance of the busses is the same.
(Vi , re + Vi , re ) 2 + (Vi ,im + Vi ,im ) 2 (27) To minimize the objective function given in
(Vi ,im + Vi ,im )( − (Vi , reYi ,im + Vi ,imYi , re ) − J i ) (30), some constraints should be considered. These
+
(Vi , re + Vi , re ) 2 + (Vi ,im + Vi ,im ) 2 constraints are described as follows:
Iranian Journal of Electrical and Electronic Engineering, Vol. 18, No. 4, 2022
4
Resilient Configuration of Distribution System… R. Behnam and G. B. Gharehpetian
• Power source limit: Total loads of a network five tie switches; the dashed line s33, s34, s35, s36,
must lie under the capacity limit of the power and s37 represent the tie switches. The location and
source. number of the measurements are the same as the line
• Voltage constraint: The voltage magnitude of numbers.
each bus must lie within allowable limits.
• Current constraint: Current magnitude of each
branch cannot exceed the permission ranges. The initial situation of each switch is set to be closed
4 Proposed Algorithm
Remove switches in the same loop of the open switch
5 Case Studies
Iranian Journal of Electrical and Electronic Engineering, Vol. 18, No. 4, 2022
5
Resilient Configuration of Distribution System… R. Behnam and G. B. Gharehpetian
Iranian Journal of Electrical and Electronic Engineering, Vol. 18, No. 4, 2022
6
Resilient Configuration of Distribution System… R. Behnam and G. B. Gharehpetian
independent of the location of the FDI attack. So, the table show that the reconfigured system can reduce
configuration which minimizes FFDI,total (equation the impacts of the FDI attack on the power
30) is presented in Table 4. In this table, it is assumed measurements.
V = +0.01 −0.1 p.u. According to this table, by
To evaluate the performance of the proposed
opening s10, s14, s19, s26, and s31 switches the method and the resilience of systems, the energy not
minimum of the FFDI,total will be achieved. Table 5 supplied (ENS) index is defined as follows:
represents the impact of network reconfiguration on
FFDI,total in IEEE 69-bus system. U i = i .ri (31)
N
In the next stage, our purpose is to compare the ENS = PU
i i (32)
results of the initial configuration with the i =1
reconfigured system obtained in Table 4. It is where, i and ri are the failure rate and repair
assumed that the attacker can change the voltage of
rate of a component, respectively. In the final stage,
each bus by V = −0.01 −0.1 . Table 6 compares the the effect of network reconfiguration on ENS index
changes of active and reactive measurements in the is presented in Table 7. According to the results of
initial configuration and the reconfigured system if Table 7, network reconfiguration has a significant
the attack happens in each bus. The results of this impact on ENS.
Iranian Journal of Electrical and Electronic Engineering, Vol. 18, No. 4, 2022
7
Resilient Configuration of Distribution System… R. Behnam and G. B. Gharehpetian
Iranian Journal of Electrical and Electronic Engineering, Vol. 18, No. 4, 2022
8
Resilient Configuration of Distribution System… R. Behnam and G. B. Gharehpetian
property associated with this work and that there are Johansson, "On security indices for state
no impediments to publication, including the timing estimators in power networks," in First
to publication, with respect to intellectual property. Workshop on Secure Control Systems (SCS),
Stockholm, 2010, 2010.
Funding [8] N. Živković and A. T. Sarić, "Detection of
false data injection attacks using unscented
No funding was received for this work.
Kalman filter," Journal of Modern Power
CRediT Authorship Contribution Statement Systems and Clean Energy, vol. 6, no. 5, pp.
847-859, 2018.
R. Behnam: Methodology, Software, Validation, [9] A. Anwar, A. N. Mahmood, and M. Ahmed,
Formal analysis, Writing-Original Draft, "False data injection attack targeting the LTC
Visualization. G. B. Gharehpetian: transformers to disrupt smart grid operation,"
Conceptualization, Methodology, Formal analysis, in International Conference on Security and
Writing-Review & Editing, Visualization Privacy in Communication Networks, 2014,
Springer, pp. 252-266.
Declaration of Competing Interest [10] H. Margossian, M. A. Sayed, W. Fawaz, and
The authors hereby confirm that the submitted Z. Nakad, "Partial grid false data injection
manuscript is an original work and has not been attacks against state estimation,"
International Journal of Electrical Power &
published so far, is not under consideration for
Energy Systems, vol. 110, pp. 623-629, 2019.
publication by any other journal and will not be [11] A. S. Mohamed, M. F. M. Arani, A. A.
submitted to any other journal until the decision will Jahromi, and D. Kundur, "False data injection
be made by this journal. All authors have approved attacks against synchronization systems in
the manuscript and agree with its submission to microgrids," IEEE Transactions on Smart
“Iranian Journal of Electrical and Electronic Grid, vol. 12, no. 5, pp. 4471-4483, 2021.
[12] L. Liu, M. Esmalifalak, Q. Ding, V. A.
Engineering”.
Emesih, and Z. Han, "Detecting false data
injection attacks on power grid by sparse
References optimization," IEEE Transactions on Smart
Grid, vol. 5, no. 2, pp. 612-621, 2014.
[1] M. Ashrafuzzaman, S. Das, Y. Chakhchoukh, [13] M. Esmalifalak, L. Liu, N. Nguyen, R. Zheng,
S. Shiva, and F. T. Sheldon, "Detecting and Z. Han, "Detecting stealthy false data
stealthy false data injection attacks in the injection using machine learning in smart
smart grid using ensemble-based machine grid," IEEE Systems Journal, vol. 11, no. 3,
learning," Computers & Security, vol. 97, p. pp. 1644-1652, 2014.
101994, 2020. [14] H. Shi, L. Xie, and L. Peng, "Detection of
[2] T. Liu and T. Shu, "On the security of ANN- false data injection attacks in smart grid based
based AC state estimation in smart grid," on a new dimensionality-reduction method,"
Computers & Security, vol. 105, p. 102265, Computers & Electrical Engineering, vol. 91,
2021. p. 107058, 2021.
[3] H. Long, Z. Wu, C. Fang, W. Gu, X. Wei, and [15] C. Liu, R. Deng, W. He, H. Liang, and W. Du,
H. Zhan, "Cyber-attack detection strategy "Optimal coding schemes for detecting false
based on distribution system state data injection attacks in power system state
estimation," Journal of Modern Power estimation," IEEE Transactions on Smart
Systems and Clean Energy, vol. 8, no. 4, pp. Grid, vol. 13, no. 1, pp. 738-749, 2021.
669-678, 2020. [16] H. Moayyed, M. Mohammadpourfard, C.
[4] M. A. Rahman, A. Datta, and E. Al-Shaer, Konstantinou, A. Moradzadeh, B.
"Security design against stealthy attacks on Mohammadi-Ivatloo, and A. P. Aguiar,
power system state estimation: A formal "Image processing based approach for false
approach," Computers & security, vol. 84, pp. data injection attacks detection in power
301-317, 2019. systems," IEEE Access, vol. 10, pp. 12412-
[5] Y. Liu, P. Ning, and M. K. Reiter, "False data 12420, 2021.
injection attacks against state estimation in [17] E. Drayer and T. Routtenberg. Detection of
electric power grids," ACM Transactions on false data injection attacks in power systems
Information and System Security (TISSEC), with graph fourier transform. In 2018 IEEE
vol. 14, no. 1, pp. 1-33, 2011. Global Conference on Signal and Information
[6] Y. Isozaki et al., "Detection of cyber attacks Processing (GlobalSIP), pp. 890-894, 2018.
against voltage control in distribution power [18] B. Mahdad, "Optimal reconfiguration and
grids with PVs," IEEE Transactions on Smart reactive power planning based fractal search
Grid, vol. 7, no. 4, pp. 1824-1835, 2015. algorithm: A case study of the Algerian
[7] H. Sandberg, A. Teixeira, and K. H.
Iranian Journal of Electrical and Electronic Engineering, Vol. 18, No. 4, 2022
9
Resilient Configuration of Distribution System… R. Behnam and G. B. Gharehpetian
© 2022 by the authors. Licensee IUST, Tehran, Iran. This article is an open-access article
distributed under the terms and conditions of the Creative Commons Attribution-
NonCommercial 4.0 International (CC BY-NC 4.0)
license (https://creativecommons.org/licenses/by-nc/4.0/).
Iranian Journal of Electrical and Electronic Engineering, Vol. 18, No. 4, 2022
10