Skip to main content

FDIA-Identified Overloaded Power Lines

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11933))

Abstract

Blackout events indicate that the overloaded power lines are the chief culprit to trigger the large-scale cascading failures hidden in the power grid. In order to protect the grid from the cascading failures, this paper aims to design a false data injection attack for the operators to identify the overloaded power lines. A leader-follower game-theoretic bi-level optimization model is formulated to maximize the set of overloaded power lines. To evaluate the performance of our proposed method, numerical simulations are performed on the IEEE 14-bus, 30-bus, 57-bus, and 118-bus systems. The results of Monte Carlo experiments indicate that the occurrence frequency of overloaded power lines is the most in our method.

Supported in part by National Key R&D Program of China under Grant 2018YFC0809001.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cintuglu, M.H., Mohammed, O.A., Akkaya, K., Uluagac, A.S.: A survey on smart grid cyber-physical system testbeds. IEEE Commun. Surv. Tutor. 19(1), 446–464 (2017)

    Article  Google Scholar 

  2. U.S.-Canada Power System Outage Task Force: Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations. https://www.energy.gov/sites/prod/files/oeprod/DocumentsandMedia/BlackoutFinal-Web.pdf. Accessed Apr 2004

  3. Carreras, B.A., Lynch, V.E., Dobson, I., Newman, D.E.: Critical points and transitions in an electric power transmission model for cascading failure blackouts. Chaos 12(4), 985–994 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  4. Mei, S., He, F., Zhang, X., Wu, S., Wang, G.: An improved OPA model and blackout risk assessment. IEEE Trans. Power Syst. 24(2), 814–823 (2009)

    Google Scholar 

  5. Youwei, J., Ke, M., Zhao, X.: N-k induced cascading contingency screening. IEEE Trans. Power Syst. 30(5), 2824–2825 (2015)

    Article  Google Scholar 

  6. Qi, J., Sun, K., Mei, S.: An interaction model for simulation and mitigation of cascading failures. IEEE Trans. Power Syst. 30(2), 804–819 (2014)

    Article  Google Scholar 

  7. Schafer, B., Witthaut, D., Timme, M., Latora, V.: Dynamically induced cascading failures in power grids. Nat. commun. 9(1), 1975 (2018)

    Article  Google Scholar 

  8. Buldyrev, S.V., Parshani, R., Paul, G., Stanley, H.E., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464(7291), 1025 (2010)

    Google Scholar 

  9. Daqing, L., Yinan, J., Rui, K., Havlin, S.: Spatial correlation analysis of cascading failures: congestions and blackouts. Sci. Rep. 4, 5381 (2014)

    Article  Google Scholar 

  10. Xi, Z., Chi, K.T.: Assessment of robustness of power systems from a network perspective. IEEE J. Emerg. Sel. Top Circ. Syst. 5(3), 456–464 (2015)

    Article  Google Scholar 

  11. E-ISAC, SANS: Analysis of the cyber attack on the Ukrainian power grid: Defense use case (2016). https://ics.sans.org/duc5

  12. ICS Alert: Cyber-attack against Ukrainian critical infrastructure (2018). https://www.us-cert.gov/ics/alerts/IR-ALERT-H-16-056-01

  13. Liang, G., Weller, S.R., Zhao, J., Luo, F., Dong, Z.Y.: The 2015 ukraine blackout: implications for false data injection attacks. IEEE Trans. Power Syst. 32(4), 3317–3318 (2017)

    Article  Google Scholar 

  14. Tan, Y., Li, Y., Cao, Y., Shahidehpour, M.: Cyber-attack on overloading multiple lines: a bilevel mixed-integer linear programming model. IEEE Trans. Smart Grid 9(2), 1534–1536 (2018)

    Article  Google Scholar 

  15. Tan, Y., Li, Y., Cao, Y., Shahidehpour, M., Cai, Y.: Severe cyber attack for maximizing the total loadings of large-scale attacked branches. IEEE Trans. Smart Grid 9(6), 6998–7000 (2018)

    Article  Google Scholar 

  16. Che, L., Liu, X., Wen, Y., Li, Z.: A mixed integer programming model for evaluating the hidden probabilities of N-k line contingencies in smart grids. IEEE Trans. Smart Grid 10(1), 1036–1045 (2019)

    Article  Google Scholar 

  17. Che, L., Liu, X., Ding, T., Li, Z.: Revealing impacts of cyber attacks on power grids vulnerability to cascading failures. IEEE Trans. Circ. Syst. II Exp. Briefs 66(6), 1058–1062 (2019)

    Google Scholar 

  18. Che, L., Liu, X., Li, Z., Wen, Y.: False data injection attacks induced sequential outages in power systems. IEEE Trans. Power Syst. 34(2), 1513–1523 (2019)

    Article  Google Scholar 

  19. Liu, X., Li, Z.: Trilevel modeling of cyber attacks on transmission lines. IEEE Trans. Smart Grid 8(2), 720–729 (2017)

    Article  Google Scholar 

  20. Henneaux, P.: Probability of failure of overloaded lines in cascading failures. Int. J. Electr. Power Energy Syst. 73, 141–148 (2015)

    Article  Google Scholar 

  21. Zima, M., Andersson, G.: On security criteria in power systems operation. In: Proceedings of the IEEE Power Engineering Society General Meeting, San Francisco, CA, USA, pp. 3089–3093 (2005). https://doi.org/10.1109/PES.2005.1489533

  22. Chen, J., Thorp, J.S., Dobson, I.: Cascading dynamics and mitigation assessment in power system disturbances via a hidden failure model. Int. J. Electr. Power Energy Syst. 27(4), 318–326 (2005)

    Article  Google Scholar 

  23. Grant, M., Boyd, S.: CVX: Matlab software for disciplined convex programming, version 2.1. http://cvxr.com/cvx. Accessed Dec 2018

  24. Zimmerman, R.D., Murillo-Sanchez, C.E., Thomas, R.J.: MATPOWER: steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 26(1), 12–19 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Da-Tian Peng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Peng, DT., Dong, J., Peng, Q., Zeng, B., Mao, ZH. (2019). FDIA-Identified Overloaded Power Lines. In: Liu, F., Xu, J., Xu, S., Yung, M. (eds) Science of Cyber Security. SciSec 2019. Lecture Notes in Computer Science(), vol 11933. Springer, Cham. https://doi.org/10.1007/978-3-030-34637-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34637-9_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34636-2

  • Online ISBN: 978-3-030-34637-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics