Abstract
False data injection attack can evade the traditional state estimation in the power system, resulting in the historical data may have been polluted. Under such circumstances, the contaminated historical data cannot provide the priori data, so data-driven detection cannot be carried out. Hence, this paper proposes a static detection method of false data based on the similarity characteristics of network nodes at a certain time, where structure and attributes of nodes are fused to express nodes based on the egonet model of power grid. In addition, to improve the accuracy of clustering, the detection rate is adopted in the clustering method. The method is tested in IEEE118-bus and 2383-bus systems. The simulation results show that proposed method is effective, and can detect the possible false data injection problems in the power system over 80%.
Similar content being viewed by others
References
Griffioen P, Weerakkody S, Ozel O, Mo Y, Sinopoli B, IEEE (2019) A tutorial on detecting security attacks on cyber-physical systems. In: 18th European control conference (ECC), Naples, ITALY, 2019. Jun 25–28 2019, pp 979–984. <Go to ISI>://WOS:000490488301001. <Go to ISI>://WOS:000490488301001
Sridhar S, Hahn A, Govindarasu M (2012) Cyber-physical system security for the electric power grid. Proc IEEE 100(1):210–224. https://doi.org/10.1109/JPROC.2011.2165269
Liang G, Weller SR, Zhao J, Luo F, Dong ZY (2017) The 2015 Ukraine blackout: implications for false data injection attacks. IEEE Trans Power Syst 32(4):3317–3318. https://doi.org/10.1109/TPWRS.2016.2631891
Liu Y, Ning P, Reiter MK (2011) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur. https://doi.org/10.1145/1952982.1952995
Xie CH, Yang GH (2018) Observer-based attack-resilient control for linear systems against FDI attacks on communication links from controller to actuators. Int J Robust Nonlinear Control 28(15):4382–4403. https://doi.org/10.1002/rnc.4236
Liu X, Li ZY (2017) False data attacks against AC state estimation with incomplete network information. IEEE Trans Smart Grid 8(5):2239–2248. https://doi.org/10.1109/TSG.2016.2521178
Xie L, Mo YL, Sinopoli B (2011) Integrity data attacks in power market operations. IEEE Trans Smart Grid 2(4):659–666. https://doi.org/10.1109/TSG.2011.2161892
Sandberg H, Teixeira AMH, Johansson KH (2010) On security indices for state estimators in power networks
Dan G, Sandberg H, IEEE (2010) Stealth attacks and protection schemes for state estimators in power systems. In: 2010 IEEE 1st international conference on smart grid communications (SMARTGRIDCOMM), pp 214–219
Musleh AS, Chen G, Dong ZY, Wang C, Chen SP, IEEE (2020) Vulnerabilities, threats, and impacts of false data injection attacks in smart grids: an overview. In: 2020 international conference on smart grids and energy systems (SGES 2020), pp 77–82. https://doi.org/10.1109/SGES51519.2020.00021
Deng RL, Xiao GX, Lu RX (2017) Defending against false data injection attacks on power system state estimation. IEEE Trans Ind Inform 13(1):198–207. https://doi.org/10.1109/TII.2015.2470218. (in English)
Li S, Pandey A, Hooi B, Faloutsos C, Pileggi L (2022) Dynamic graph-based anomaly detection in the electrical grid. IEEE Trans Power Syst 37(5):3422
Wang SC, Ren W, IEEE (2014) Stealthy false data injection attacks against state estimation in power systems: switching network topologies (in English). In: 2014 American control conference (ACC)
Gu CJ, Jirutitijaroen P, Motani M (2015) Detecting false data injection attacks in AC state estimation. IEEE Trans Smart Grid 6(5):2476–2483. https://doi.org/10.1109/TSG.2015.2388545. (in English)
Mo YL et al (2012) Cyber-physical security of a smart grid infrastructure. Proc IEEE 100(1):195–209. https://doi.org/10.1109/JPROC.2011.2161428. (in English)
Musleh AS, Chen G, Dong ZY (2020) A survey on the detection algorithms for false data injection attacks in smart grids. IEEE Trans Smart Grid 11(3):2218–2234. https://doi.org/10.1109/TSG.2019.2949998
Li BD, Ding T, Huang C, Zhao JB, Yang YH, Chen Y (2019) Detecting false data injection attacks against power system state estimation with fast go-decomposition approach. IEEE Trans Ind Inform 15(5):2892–2904. https://doi.org/10.1109/TII.2018.2875529
Kurt MN, Yilmaz Y, Wang XD (2019) Real-time detection of hybrid and stealthy cyber-attacks in smart grid. IEEE Trans Inf Foren Sec 14(2):498–513. https://doi.org/10.1109/TIFS.2018.2854745. (in English)
Esmalifalak M, Liu LC, Nguyen N, Zheng R, Han Z (2017) Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst J 11(3):1644–1652. https://doi.org/10.1109/JSYST.2014.2341597. (in English)
Jeh G, Widom J (2002) SimRank: a measure of structural-context similarity. In: Presented at the proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, Edmonton, Alberta, Canada, 2002. https://doi.org/10.1145/775047.775126
Trevizan RD, Reno M, IEEE (2022) Detection of false data injection attacks in power system state estimation using sensor encoding. In: IEEE Kansas power and energy conference (KPEC), Manhattan, KS, 2022. Apr 25–26 2022. https://doi.org/10.1109/kpec54747.2022.9814723. <Go to ISI>://WOS:000853634000008
Rashed M, Kamruzzaman J, Gondal I, Islam S (2022) False data detection in a clustered smart grid using unscented Kalman filter. IEEE Access 10:78548–78556. https://doi.org/10.1109/access.2022.3193781
Mukherjee D, Chakraborty S, Ghosh S (2022) Deep learning-based multilabel classification for locational detection of false data injection attack in smart grids. Electr Eng 104(1):282. https://doi.org/10.1007/s00202-021-01278-6
Wang SY, Bi SZ, Zhang YJA (2020) Locational detection of the false data injection attack in a smart grid: a multilabel classification approach. IEEE Internet Things 7(9):8218–8227. https://doi.org/10.1109/JIOT.2020.2983911
Hong J, Liu C-C, Govindarasu M (2014) Integrated anomaly detection for cyber security of the substations. IEEE Trans Smart Grid 5(4):1643–1653. https://doi.org/10.1109/tsg.2013.2294473
Chen J et al (2016) Impact analysis of false data injection attacks on power system static security assessment. J Mod Power Syst Clean Energy 4(3):496–505. https://doi.org/10.1007/s40565-016-0223-6
Liu X, Bao Z, Lu D, Li ZY (2015) Modeling of local false data injection attacks with reduced network information. IEEE Trans Smart Grid 6(4):1686–1696. https://doi.org/10.1109/TSG.2015.2394358. (in English)
Wang Y, Wang L, Yang J (2020) Egonet based anomaly detection in E-bank transaction networks. IOP Conf Ser Mater Sci Eng 715:012038. https://doi.org/10.1088/1757-899X/715/1/012038
de Amorim RC, Mirkin B (2012) Minkowski metric, feature weighting and anomalous cluster initializing in K-Means clustering. Pattern Recognit 45(3):1061–1075. https://doi.org/10.1016/j.patcog.2011.08.012
Geris S, Karimipour H (2019) Joint state estimation and cyber-attack detection based on feature grouping, p 30
Acknowledgements
The authors are very grateful to the helpful comments from the editors and reviewers which significantly improved the quality of this paper. This work is supported in part by National Natural Science Foundation of China (No. 61473246) and Natural Science Foundation of Hebei Province (No. E2021203004).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Li, X., Li, X. & Lu, Z. Static Detection of False Data in the Power Grid by Fusing Structure and Attributes of Node. J. Electr. Eng. Technol. 18, 4079–4090 (2023). https://doi.org/10.1007/s42835-023-01494-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s42835-023-01494-z