11,078 research outputs found

    State estimation within ied based smart grid using kalman estimates

    Get PDF
    State Estimation is a traditional and reliable technique within power distribution and control systems. It is used for building a topology of the power grid network based on state measurements and current operational state of different nodes & buses. The protection of sensors and measurement units such as Intelligent Electronic Devices (IED) in Central Energy Management System (CEMS) against False Data Injection Attacks (FDIAs) is a big concern to grid operators. These are special kind of cyber-attacks that are directed towards the state & measurement data in such a way that mislead the CEMS into making incorrect decisions and create generation load imbalance. These are known to bypass the traditional bad data detection systems within central estimators. This paper presents the use of an additional novel state estimator based on Kalman filter along with traditional Distributed State Estimation (DSE) which is based on Weighted Least Square (WLS). Kalman filter is a feedback control mechanism that constantly updates itself based on state prediction and state correction technique and shows improvement in the estimates. The additional estimator output is compared with the results of DSE in order to identify anomalies and injection of false data. We evaluated our methodology by simulating proposed technique using MATPOWER over IEEE-14, IEEE-30, IEEE-118, IEEE-300 bus. The results clearly demonstrate the superiority of the proposed method over traditional state estimation. Β© 2021 by the authors. Licensee MDPI, Basel, Switzerland

    좜λ ₯μ œμ–΄ μ΅œμ†Œν™”λ₯Ό μœ„ν•œ 가상 λ°œμ „μ†Œ μ‚¬μ—…μžμ˜ ν—ˆμœ„μ •λ³΄μ£Όμž…κ³΅κ²©

    Get PDF
    ν•™μœ„λ…Όλ¬Έ(석사) -- μ„œμšΈλŒ€ν•™κ΅λŒ€ν•™μ› : κ³΅κ³ΌλŒ€ν•™ 전기·정보곡학뢀, 2023. 2. μœ€μš©νƒœ.Studies on false data injection attacks (FDIA) against state estimation were mainly conducted on the transmission system. However, recently, as entities such as distributed energy resources (DERs), virtual power plants (VPPs), energy storage systems (ESSs), and EV charging stations, that are vulnerable to cyber-attacks, began to appear in the distribution system, research on FDIA in the distribution system is being actively conducted. Among them, this paper deals with the FDIA that VPPs attempt in the distribution system. As the number of DERs in the distribution system increases, the curtailment for DERs owned by VPP increases. This paper proposes FDIA model by VPPs to avoid curtailment under the realistic conditions. In the model, VPPs can implement an FDIA that deceives the distribution system operator (DSO)s state estimation with only information obtained from the DERs they own. To verify this, IEEE 33 test feeder was used and the result shows that the attack was successful without being caught in the DSO's bad data detection (BDD). This paper provides the basic concept of VPPs FDIA and shows that future DSOs need algorithms to defend against VPPs FDIA.μƒνƒœμΆ”μ •μ— λŒ€ν•œ ν—ˆμœ„μ •λ³΄μ£Όμž…κ³΅κ²© μ—°κ΅¬λŠ” 주둜 솑전계톡을 λŒ€μƒμœΌλ‘œ μ—°κ΅¬λ˜μ–΄ μ™”λ‹€. ν•˜μ§€λ§Œ μ†Œκ·œλͺ¨ λΆ„μ‚° μžμ›, 가상 λ°œμ „μ†Œ, μ—λ„ˆμ§€ μ €μž₯μž₯치, μ „κΈ°μ°¨ μΆ©μ „μ†Œ λ“± 가상곡격에 μ·¨μ•½ν•œ μžμ›λ“€μ΄ 배전계톡에 λ“±μž₯ν•˜λ©΄μ„œ 배전계톡에 λŒ€ν•œ ν—ˆμœ„μ •λ³΄μ£Όμž…κ³΅κ²© κ΄€λ ¨ 연ꡬ가 졜근 ν™œλ°œνžˆ μ—°κ΅¬λ˜κ³  μžˆλ‹€. κ·Έ 쀑, 이 μ—°κ΅¬λŠ” 가상 λ°œμ „μ†Œ μ‚¬μ—…μžκ°€ 배전계톡 λ‚΄μ—μ„œ μ‹œλ„ν•  수 μžˆλŠ” ν—ˆμœ„μ •λ³΄μ£Όμž…κ³΅κ²©μ„ 닀룬닀. 배전계톡 λ‚΄ νƒœμ–‘κ΄‘ λ°œμ „μ†Œμ™€ 같은 μ†Œκ·œλͺ¨ λΆ„μ‚°μžμ›λ“€μ΄ μ¦κ°€ν•˜λ©΄μ„œ 가상 λ°œμ „μ†Œ μ‚¬μ—…μžκ°€ μ†Œμœ ν•œ νƒœμ–‘κ΄‘ λ°œμ „μ†Œμ— λ‚΄λ €μ§€λŠ” 좜λ ₯μ œμ–΄ μ‘°μΉ˜κ°€ ν•¨κ»˜ μ¦κ°€ν•˜κ³  μžˆλ‹€. 이 μ—°κ΅¬λŠ” ν˜„μ‹€μ μΈ μ‘°κ±΄ν•˜μ— 가상 λ°œμ „μ†Œ μ‚¬μ—…μžκ°€ 좜λ ₯μ œμ–΄ 쑰치λ₯Ό ν”Όν•˜κΈ° μœ„ν•΄ μ‹œλ„ν•  수 μžˆλŠ” ν—ˆμœ„μ •λ³΄μ£Όμž…κ³΅κ²© λͺ¨λΈμ„ μ œμ‹œν•œλ‹€. 이 곡격λͺ¨λΈμ€ 가상 λ°œμ „μ†Œ μ‚¬μ—…μžκ°€ μžμ‹ λ“€μ΄ μ†Œμœ ν•œ νƒœμ–‘κ΄‘ λ°œμ „μ†Œμ—μ„œ μ–»λŠ” μ •λ³΄λ§ŒμœΌλ‘œ 배전계톡 운영자의 μƒνƒœμΆ”μ •μ„ μ†μ΄λŠ” 곡격이 κ°€λŠ₯함을 보인닀. 이λ₯Ό 증λͺ…ν•˜κΈ° μœ„ν•΄, IEEE 33 ν…ŒμŠ€νŠΈ 계톡을 μ‚¬μš©ν•΄ λ³Έ λͺ¨λΈμ΄ 배전계톡 운영자의 거짓정보감지λ₯Ό μš°νšŒν•  수 μžˆμŒμ„ λ³΄μ˜€λ‹€. λ³Έ μ—°κ΅¬λŠ” λ―Έλž˜μ— λ°œμƒν•  수 μžˆλŠ” 가상 λ°œμ „μ†Œ μ‚¬μ—…μžμ˜ ν—ˆμœ„μ •λ³΄μ£Όμž…κ³΅κ²©μ— λŒ€ν•œ κΈ°λ³Έ κ°œλ…μ„ μ œμ‹œν•˜κ³  미래 배전계톡 μš΄μ˜μžκ°€ λ³Έ 연ꡬ에 μ œμ‹œν•œ ν—ˆμœ„μ •λ³΄μ£Όμž…κ³΅κ²©μ„ λ°©μ–΄ν•  수 μžˆλŠ” μ•Œκ³ λ¦¬μ¦˜μ΄ ν•„μš”ν•¨μ„ 보인닀.1 Introduction 1 1.1 Research background and motivation 1 1.2 Research objective and contents 4 1.3 Research procedure 5 2 Literature review and contribution 6 2.1 Attempting false data injection attack in various condition 6 2.2 Impact of false data injection attack 7 2.3 Cyber-attack related to distributed energy resources 8 2.4 Contribution of this study 9 3 Theoretical background 10 3.1 State estimation 10 3.2 Distribution System State Estimation (DSSE) 12 3.3 Bad data detection (BDD) 15 3.4 False data injection attack (FDIA) 16 4 VPP's local false data injection attack 18 4.1 DSO assumptions 18 4.2 VPP assumptions 20 5 Simulation Setting and Results 24 5.1 Simulation Environment 24 5.2 Non-intelligent attack 28 5.3 Intelligent attack 30 6 Conclusion 33 Bibliography 35 초둝 38석

    Detection of False Data Injection Attacks in Smart Grid under Colored Gaussian Noise

    Full text link
    In this paper, we consider the problems of state estimation and false data injection detection in smart grid when the measurements are corrupted by colored Gaussian noise. By modeling the noise with the autoregressive process, we estimate the state of the power transmission networks and develop a generalized likelihood ratio test (GLRT) detector for the detection of false data injection attacks. We show that the conventional approach with the assumption of Gaussian noise is a special case of the proposed method, and thus the new approach has more applicability. {The proposed detector is also tested on an independent component analysis (ICA) based unobservable false data attack scheme that utilizes similar assumptions of sample observation.} We evaluate the performance of the proposed state estimator and attack detector on the IEEE 30-bus power system with comparison to conventional Gaussian noise based detector. The superior performance of {both observable and unobservable false data attacks} demonstrates the effectiveness of the proposed approach and indicates a wide application on the power signal processing.Comment: 8 pages, 4 figures in IEEE Conference on Communications and Network Security (CNS) 201

    False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis

    Get PDF
    In this paper, we propose a class of false analog data injection attack that can misguide the system as if topology errors had occurred. By utilizing the measurement redundancy with respect to the state variables, the adversary who knows the system configuration is shown to be capable of computing the corresponding measurement value with the intentionally misguided topology. The attack is designed such that the state as well as residue distribution after state estimation will converge to those in the system with a topology error. It is shown that the attack can be launched even if the attacker is constrained to some specific meters. The attack is detrimental to the system since manipulation of analog data will lead to a forged digital topology status, and the state after the error is identified and modified will be significantly biased with the intended wrong topology. The feasibility of the proposed attack is demonstrated with an IEEE 14-bus system.Comment: 5 pages, 7 figures, Proc. of 2018 IEEE Power and Energy Society General Meetin

    Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements

    Full text link
    The false data injection (FDI) attack cannot be detected by the traditional anomaly detection techniques used in the energy system state estimators. In this paper, we demonstrate how FDI attacks can be constructed blindly, i.e., without system knowledge, including topological connectivity and line reactance information. Our analysis reveals that existing FDI attacks become detectable (consequently unsuccessful) by the state estimator if the data contains grossly corrupted measurements such as device malfunction and communication errors. The proposed sparse optimization based stealthy attacks construction strategy overcomes this limitation by separating the gross errors from the measurement matrix. Extensive theoretical modeling and experimental evaluation show that the proposed technique performs more stealthily (has less relative error) and efficiently (fast enough to maintain time requirement) compared to other methods on IEEE benchmark test systems.Comment: Keywords: Smart grid, False data injection, Blind attack, Principal component analysis (PCA), Journal of Computer and System Sciences, Elsevier, 201
    • …
    corecore