Skip to main content
Log in

Static Detection of False Data in the Power Grid by Fusing Structure and Attributes of Node

  • Original Article
  • Published:
Journal of Electrical Engineering & Technology Aims and scope Submit manuscript

Abstract

False data injection attack can evade the traditional state estimation in the power system, resulting in the historical data may have been polluted. Under such circumstances, the contaminated historical data cannot provide the priori data, so data-driven detection cannot be carried out. Hence, this paper proposes a static detection method of false data based on the similarity characteristics of network nodes at a certain time, where structure and attributes of nodes are fused to express nodes based on the egonet model of power grid. In addition, to improve the accuracy of clustering, the detection rate is adopted in the clustering method. The method is tested in IEEE118-bus and 2383-bus systems. The simulation results show that proposed method is effective, and can detect the possible false data injection problems in the power system over 80%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Griffioen P, Weerakkody S, Ozel O, Mo Y, Sinopoli B, IEEE (2019) A tutorial on detecting security attacks on cyber-physical systems. In: 18th European control conference (ECC), Naples, ITALY, 2019. Jun 25–28 2019, pp 979–984. <Go to ISI>://WOS:000490488301001. <Go to ISI>://WOS:000490488301001

  2. Sridhar S, Hahn A, Govindarasu M (2012) Cyber-physical system security for the electric power grid. Proc IEEE 100(1):210–224. https://doi.org/10.1109/JPROC.2011.2165269

    Article  Google Scholar 

  3. Liang G, Weller SR, Zhao J, Luo F, Dong ZY (2017) The 2015 Ukraine blackout: implications for false data injection attacks. IEEE Trans Power Syst 32(4):3317–3318. https://doi.org/10.1109/TPWRS.2016.2631891

    Article  Google Scholar 

  4. Liu Y, Ning P, Reiter MK (2011) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur. https://doi.org/10.1145/1952982.1952995

    Article  Google Scholar 

  5. Xie CH, Yang GH (2018) Observer-based attack-resilient control for linear systems against FDI attacks on communication links from controller to actuators. Int J Robust Nonlinear Control 28(15):4382–4403. https://doi.org/10.1002/rnc.4236

    Article  MathSciNet  MATH  Google Scholar 

  6. Liu X, Li ZY (2017) False data attacks against AC state estimation with incomplete network information. IEEE Trans Smart Grid 8(5):2239–2248. https://doi.org/10.1109/TSG.2016.2521178

    Article  Google Scholar 

  7. Xie L, Mo YL, Sinopoli B (2011) Integrity data attacks in power market operations. IEEE Trans Smart Grid 2(4):659–666. https://doi.org/10.1109/TSG.2011.2161892

    Article  Google Scholar 

  8. Sandberg H, Teixeira AMH, Johansson KH (2010) On security indices for state estimators in power networks

  9. Dan G, Sandberg H, IEEE (2010) Stealth attacks and protection schemes for state estimators in power systems. In: 2010 IEEE 1st international conference on smart grid communications (SMARTGRIDCOMM), pp 214–219

  10. Musleh AS, Chen G, Dong ZY, Wang C, Chen SP, IEEE (2020) Vulnerabilities, threats, and impacts of false data injection attacks in smart grids: an overview. In: 2020 international conference on smart grids and energy systems (SGES 2020), pp 77–82. https://doi.org/10.1109/SGES51519.2020.00021

  11. Deng RL, Xiao GX, Lu RX (2017) Defending against false data injection attacks on power system state estimation. IEEE Trans Ind Inform 13(1):198–207. https://doi.org/10.1109/TII.2015.2470218. (in English)

    Article  Google Scholar 

  12. Li S, Pandey A, Hooi B, Faloutsos C, Pileggi L (2022) Dynamic graph-based anomaly detection in the electrical grid. IEEE Trans Power Syst 37(5):3422

    Article  Google Scholar 

  13. Wang SC, Ren W, IEEE (2014) Stealthy false data injection attacks against state estimation in power systems: switching network topologies (in English). In: 2014 American control conference (ACC)

  14. Gu CJ, Jirutitijaroen P, Motani M (2015) Detecting false data injection attacks in AC state estimation. IEEE Trans Smart Grid 6(5):2476–2483. https://doi.org/10.1109/TSG.2015.2388545. (in English)

    Article  Google Scholar 

  15. Mo YL et al (2012) Cyber-physical security of a smart grid infrastructure. Proc IEEE 100(1):195–209. https://doi.org/10.1109/JPROC.2011.2161428. (in English)

    Article  Google Scholar 

  16. Musleh AS, Chen G, Dong ZY (2020) A survey on the detection algorithms for false data injection attacks in smart grids. IEEE Trans Smart Grid 11(3):2218–2234. https://doi.org/10.1109/TSG.2019.2949998

    Article  Google Scholar 

  17. Li BD, Ding T, Huang C, Zhao JB, Yang YH, Chen Y (2019) Detecting false data injection attacks against power system state estimation with fast go-decomposition approach. IEEE Trans Ind Inform 15(5):2892–2904. https://doi.org/10.1109/TII.2018.2875529

    Article  Google Scholar 

  18. Kurt MN, Yilmaz Y, Wang XD (2019) Real-time detection of hybrid and stealthy cyber-attacks in smart grid. IEEE Trans Inf Foren Sec 14(2):498–513. https://doi.org/10.1109/TIFS.2018.2854745. (in English)

    Article  Google Scholar 

  19. Esmalifalak M, Liu LC, Nguyen N, Zheng R, Han Z (2017) Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst J 11(3):1644–1652. https://doi.org/10.1109/JSYST.2014.2341597. (in English)

    Article  Google Scholar 

  20. Jeh G, Widom J (2002) SimRank: a measure of structural-context similarity. In: Presented at the proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, Edmonton, Alberta, Canada, 2002. https://doi.org/10.1145/775047.775126

  21. Trevizan RD, Reno M, IEEE (2022) Detection of false data injection attacks in power system state estimation using sensor encoding. In: IEEE Kansas power and energy conference (KPEC), Manhattan, KS, 2022. Apr 25–26 2022. https://doi.org/10.1109/kpec54747.2022.9814723. <Go to ISI>://WOS:000853634000008

  22. Rashed M, Kamruzzaman J, Gondal I, Islam S (2022) False data detection in a clustered smart grid using unscented Kalman filter. IEEE Access 10:78548–78556. https://doi.org/10.1109/access.2022.3193781

    Article  Google Scholar 

  23. Mukherjee D, Chakraborty S, Ghosh S (2022) Deep learning-based multilabel classification for locational detection of false data injection attack in smart grids. Electr Eng 104(1):282. https://doi.org/10.1007/s00202-021-01278-6

    Article  Google Scholar 

  24. Wang SY, Bi SZ, Zhang YJA (2020) Locational detection of the false data injection attack in a smart grid: a multilabel classification approach. IEEE Internet Things 7(9):8218–8227. https://doi.org/10.1109/JIOT.2020.2983911

    Article  Google Scholar 

  25. Hong J, Liu C-C, Govindarasu M (2014) Integrated anomaly detection for cyber security of the substations. IEEE Trans Smart Grid 5(4):1643–1653. https://doi.org/10.1109/tsg.2013.2294473

    Article  Google Scholar 

  26. Chen J et al (2016) Impact analysis of false data injection attacks on power system static security assessment. J Mod Power Syst Clean Energy 4(3):496–505. https://doi.org/10.1007/s40565-016-0223-6

    Article  Google Scholar 

  27. Liu X, Bao Z, Lu D, Li ZY (2015) Modeling of local false data injection attacks with reduced network information. IEEE Trans Smart Grid 6(4):1686–1696. https://doi.org/10.1109/TSG.2015.2394358. (in English)

    Article  Google Scholar 

  28. Wang Y, Wang L, Yang J (2020) Egonet based anomaly detection in E-bank transaction networks. IOP Conf Ser Mater Sci Eng 715:012038. https://doi.org/10.1088/1757-899X/715/1/012038

    Article  Google Scholar 

  29. de Amorim RC, Mirkin B (2012) Minkowski metric, feature weighting and anomalous cluster initializing in K-Means clustering. Pattern Recognit 45(3):1061–1075. https://doi.org/10.1016/j.patcog.2011.08.012

    Article  Google Scholar 

  30. Geris S, Karimipour H (2019) Joint state estimation and cyber-attack detection based on feature grouping, p 30

Download references

Acknowledgements

The authors are very grateful to the helpful comments from the editors and reviewers which significantly improved the quality of this paper. This work is supported in part by National Natural Science Foundation of China (No. 61473246) and Natural Science Foundation of Hebei Province (No. E2021203004).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xueping Li.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, X., Li, X. & Lu, Z. Static Detection of False Data in the Power Grid by Fusing Structure and Attributes of Node. J. Electr. Eng. Technol. 18, 4079–4090 (2023). https://doi.org/10.1007/s42835-023-01494-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42835-023-01494-z

Keywords

Navigation