You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

2 April 2021

Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems

and
Computer Engineering Department, King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Cybersecurity and Privacy-Preserving in Modern Smart Grid

Abstract

Cyber-security of modern power systems has captured a significant interest. The vulnerabilities in the cyber infrastructure of the power systems provide an avenue for adversaries to launch cyber attacks. An example of such cyber attacks is False Data Injection Attacks (FDIA). The main contribution of this paper is to analyze the impact of FDIA on the cost of power generation and the physical component of the power systems. Furthermore, We introduce a new FDIA strategy that intends to maximize the cost of power generation. The viability of the attack is shown using simulations on the standard IEEE bus systems using the MATPOWER MATLAB package. We used the genetic algorithm (GA), simulated annealing (SA) algorithm, tabu search (TS), and particle swarm optimization (PSO) to find the suitable attack targets and execute FDIA in the power systems. The proposed FDIA increases the generation cost by up to 15.6%, 45.1%, 60.12%, and 74.02% on the 6-bus, 9-bus, 30-bus, and 118-bus systems, respectively. Finally, a rule-based FDIA detection and prevention mechanism is proposed to mitigate such attacks on power systems.

1. Introduction

Smart power systems are complicated cyber-physical systems. An example of such a system is the modern power systems, which consist of physical infrastructure and cyber-infrastructure. The physical infrastructure is responsible for generating, transmitting, and distributing electric power. On the other hand, the cyber infrastructure includes the telemetry and the communication equipment connected to the power systems. The cyber components help in enhancing decision-making and monitoring of the power systems. Furthermore, cyber components, such as meters, are used to measure parameters, such as the load demand of a particular node (i.e., bus), within the power system network. The energy management system is composed of network topology, economic dispatch calculations, Power Systems State Estimator (PSSE), Automatic Generation Control (AGC), contingency analysis, and Optimal Power Flow (OPF). Moreover, the energy management system is responsible for the controlling, monitoring, and optimizing the performance of the performance of the power systems [1].
Recently, the cyber-security of power systems has captured a significant interest. The analysis of electric grid security under terrorist threat is presented in Reference [2]. A model of load redistribution attacks is studied in Reference [3]. In Reference [4], Cyber-security of smart grid infrastructure is studied. Similarly, the cyber-security and privacy issues in smart grids are studied in Reference [5]. A survey on the cyber-security of smart grid is presented in References [6,7]. Authors in Reference [8] use sparse optimization to detect false data injection attacks in power systems. The effect of FDIA and contingency is studied in References [9,10,11]. Authors in Reference [12] presented an FDIA identification mechanism in smart grids. This is because the world has seen a surge in cyber-attacks on power systems. Example of such attacks include the USA generator explosion in 2007 [13], the Ukraine blackout in 2015 [14], and the Turkey oil explosion in 2008 [13]. Table 1 presents examples of some major attacks that happened in the energy industry. In these attacks, an adversary leverages the vulnerabilities in the cyber infrastructure to attack the power systems. This leads to catastrophic consequences that impact the physical components of the power systems.
Table 1. Examples of cyber attacks on power systems [13].
The proposed attacks and defensive strategies can be implemented in real power systems. The adversary can compromise measurement equipment physically, such as electric meters and sensors. The attacker can intercept data packets in the power system network while they are transferred to the control center. In addition, the attacker can modify the database of the control center through unauthorized access. This unauthorized falsification of data can mislead the operation of the power systems which leads to an increase in the generation cost. The proposed defensive mechanism can be implemented on the real power systems control centers. Subsequently, This can enhance decision-making and help in detecting and preventing false data injection attacks against real power systems. In addition, it is important to note that the standard IEEE bus systems are a simple approximation of the real power systems. Hence, we used them to evaluate the performance of the attacks and defensive mechanism.
The main contribution of this paper is the detailed analysis of the impact of False Data Injection Attack (FDIA) on the power systems. In particular, we proposed an Advanced Persistence Threat (APT)-based FDIA that intends to maximize the negative impact on the cost of power generation and the physical component of the power systems. The novel APT-based FDIA strategy allows attackers to attack multiple nodes to maximize the impacts of the attacks on power systems. We formulated the attack model as an optimization problem with the objective to maximize the cost of power generation. The main difference between our proposed APT-based FDIA and the existing FDIA from the literature is that we usee metaheuristics techniques, namely genetic algorithm (GA), simulated annealing (SA), and particle swarm optimization (PSO), to conduct the attack. Then, we evaluate the attack by running simulations on the standard IEEE bus systems using MATPOWER in MATLAB [15]. In addition, we proposed a rule-based detection mechanism to mitigate FDIA in power systems. We used accuracy metrics to evaluate the performance of the developed rule-based FDIA detection and prevention system.
The remaining sections of this paper are as follow. Section 2 presents the related work and highlights the background concept of this thesis. Section 3 presents the proposed attack strategy. Section 4 presents the proposed FDIA detection system. Section 5 discusses our findings. Finally, the conclusion and future work are presented in Section 6.

3. Advanced Persistent Threat-Based False Data Injection Attacks

There are three ways for an attacker to manipulate measurements in FDIA [14]. The attackers can compromise measurement equipment physically. The attacker can intercept data packets in the power system network while they are transferred to the control center. In addition, the attacker can modify the database of the control center through unauthorized access. The attacker cannot launch an attack on the power systems generators, because they are assumed to be secure [1]. That is, measurements related to the power generators are not available to the attacker. Therefore, only the load demand is available for the attacker to falsify. The attacker can instigate a collusive strategy to manipulate at least two nodes simultaneously. The attacker reduces load demand of one node and increases the load demand of another node by the same amount, such that the total load demand on the system before the attack is equal to the total load demand on the system after the attack in order to reserves the OPF constraints. This is because the system will be unstable if the OPF constraints are not satisfied. The currently proposed FDIA models are not effective because there is no consideration of imposing maximum damage to the system. Therefore, another approach is to use the APT strategy to execute FDIA. In APT strategy, an adversary sustains prolonged access to the network and injects false data stealthily in order to impose maximum damage to the system. Moreover, the attacker can only falsify power demand information. The attacker has information related to the actual power flow and power limitations on the transmission lines of the power system network. The attacker intends to launch an attack to maximize the cost of power generation in power systems using the APT strategy.

3.1. Methodology

This section represent the methodology of this paper. The section is divided to two sections. First, from the attackers perspective, we highlighted the FDIA attack plan. Second, from the defensive perspective we highlighted the FDIA mitigation. In Section 5, we compared our results with the results presented in Reference [1] from the literature. We selected this particular paper because they have achieved better results compared to the other papers from the literature, specifically, looking from the attackers perspective with the aim of imposing maximum damage to the system in terms of the increase in generation cost. To the best of our knowledge, the authors have achieved the highest increase in generation cost when the standard IEEE bus systems are under FDIA attacks.

3.1.1. False Data Injection Attacks Plan

In this paper, we analyze the impact of FDIA on the power systems in terms of the generation cost and the performance of power systems generators. Then, we introduce a novel APT-based attack strategy with the objective to maximize the operation cost of power generation. We model the attack strategy as an optimization problem, and we use metaheuristics to solve the formulated optimization problem. In particular, four metaheuristics are used, namely simulated annealing, genetic algorithm, particle swarm optimization, and tabu search, to solve the optimization problem and obtain the attack plan. The reason behind using metaheuristics is because they are considered one of the most practical methods for solving many optimization problems, and it is applies to the real-world problems that have the nature of combinatorial optimization problems.
The output of the solved optimization problem are the set of targets and the load demand to falsify. Figure 4 highlight a simple flowchart of the attack plan. First, we start with the FDIA Modeling, the output of the FDIA model is the formulated optimization problem. Next, the formulated optimization problem is solved using metaheuristics. The output of the solution is the attack targets and the amount of load demand that is feasible to falsify. This provides the attack plan for the attacker to be able to execute FDIA in power systems to maximize the impact of the attack on the power systems. Since the problem is formulated as an optimization problem, we need to have a mechanism to know how good is the solution in order to decide whether to accept the solution or not. In simulated annealing (SA), starting from the maximum temperature ( T m a x ) to minimum temperature ( T m i n ), a scenario to determine the suitable attack target is formulated as follows. First, we find the initial cost ( C i n i t ) of power generation without falsifying any load demand.
Figure 4. Flowchart of the Attack plan.
To change the state of the system from one state to another, an arbitrary transmission line is selected and falsify the load demand of the buses at the two ends of the transmission line. Then, the difference between the initial cost and the current cost ( Δ C i , j ) is calculated. If the difference is positive, we accept the new systems state, else we accept the new systems state only if e x p ( Δ C i , j T ) is greater than rand(0,1). The rand(0,1) gives a uniformly distributed random number on the interval of zero to one. This process is repeated until the system state with the maximum cost is found. The simulated annealing algorithm is similar to the metropolis hasting algorithm that combines both the notion of exploring and exploiting. Exploring is the idea of visiting more search space with the hope that the algorithm will get a better solution. However, the notion of exploiting is that the algorithm is always trying to find a global optimum as quickly as possible, this can lead it to stuck at a local optimum. That is, during the hill-climbing, the algorithm always wanted to exploit. Combining the two notions of exploring and exploiting means that the algorithm does not always improve, sometimes the algorithm diverge from the current system state with the hope of finding a better system state in next iteration.
To solve the formulated optimization using a genetic algorithm, we follow the following steps. The first step starts with a random selection of the initial set of solutions. That is, selecting arbitrary transmission lines to attack and selecting arbitrary load demand value to falsify. This selected initial set of solutions are called “chromosomes”, and this first step is also known as initializing population. The population is the sets of all chromosomes. That is, the set of all possible attack targets and the possible load demand values to falsify. A random uniform distribution function is used to generate the initial possible values of load demand to falsify and the possible attack targets.
In the second step, the value of the objective function of the chromosomes are calculated. This is also known as the fitness value. This step is called “selection”. This is because only the fittest chromosomes are chosen from the initial population generated in step 1. Hence, subsequent operations are applied to the selected fittest chromosomes in order to get better results.
The next step is known as “crossover’”. Here, the chromosomes are represented in terms of genes. This is done by changing the values of the chromosomes into binary. That is, the values are expressed in only zeros (0) and ones (1). As an example, the binary representation of a decimal number 8 is 1000. Moreover, crossover simply means a change in a single gene or group of genes of parents chromosomes to reproduce offspring chromosomes. This process is also known the mate of two parent chromosomes.
The next step is known as “mutation”. In this step, value of genes are altered by replacing zeros (0) with ones (1). For example, if the offspring chromosome is 1100, it becomes 0011 after the process of mutation. After the process of mutation, chromosomes in binary values are all converted to the decimal form. Then, fitness are calculated accordingly until the chromosomes produces the target fitness (the highest cost of generation).
PSO algorithm is also used to solve the formulated optimization problem. It is a swarm intelligence-based metaheuristics. A population, called swarms, of particles (candidate solutions) are used. In simple words, PSO algorithms mimic a group of birds flying and searching for food in an area known as a search space. Therefore, the algorithm is inspired by the social behavior of birds. Each candidate solution changes its position and velocity in order to move toward the optimal solution of the problem. The movement of the candidate solutions is influenced by the group’s best position and the individual’s best-known position. This guides the movement of individual particle towards the best-known position in the search space which will lead to the optimal solution. The search space can be large or small depending on the bus system under investigation. It also represents the range in which the algorithm calculates the optimal values. In this paper, each particle represents a candidate solution of a target transmission line to attack and the value of load demand to falsify. This candidate solution changes at random and moves toward a value that provides the maximum increase in generation cost in the power systems.
Another metaheuristic, called tabu search, is used to solve the formulated optimization problem. Tabu search are widely used to solve combinatorial optimization problems. This metaheuristic is a form of neighborhood search approach. It guides a local search to explore the whole solution search space beyond just local optimum. This is being done by the use of a list, called tabu list. A flexible storage is used to restrict the next iteration solution choice to some subset of neighbors of the current solutions. In this paper, the instances of the tabu list are the set of the target transmission lines and the set of the suitable load demand value to falsify that incur the highest increase in the generation cost of the power systems.
Finally, the output of the solved optimization problem (i.e., the set of target transmission lines and the set of load demand values to falsify) are used to execute the FDIA. The attacker falsify the load demand of the targets. This causes highest increase in generation cost of the power systems.

3.1.2. FDIA Mitigation

As explained in Section 3, a rule-based detection and prevention mechanism is developed to metigate the FDIAs with primary and secondary detection features. In addition, we used accuracy metrics to evaluate the performance of the detection and prevention mechanism. The accuracy metrics are the True Positive (TP) rate, True Negative (TN) rate, False Positive (FP) rate, and False Negative (PN) rate. The results of the accuracy metrics are compared with the results presented in Reference [1].

3.2. APT-Based Attack Strategy

The proposed APT-based attack strategy addresses the following questions. Which set of transmission lines to attack? In which order should the transmission lines be attacked? What values of load demand on the nodes connecting the target transmission lines are feasible to falsify? The problem of finding the attack targets in power systems can be viewed as a search problem. There are different combinations of buses to attack and load demand values to falsify, each of which will impose different impacts on the power systems. The search space depends on the bus system network topology. We formulate the attack strategy as the following.

3.2.1. Initialization

We assume that the losses in the transmission lines are all zero. Therefore, the sum of the active power output of all generators is equals to the sum of the load active power of all nodes in the power systems network [1]. The objective of our attack is to maximize the cost of power generation in the power system. Therefore, we use Equation (1) as an objective function for our attack strategy. We denote the set of the attacked transmission line as T L x Ω L . Furthermore, we denote the false load demand value for the attacked transmission lines as Δ T L x .

3.2.2. Optimization Problem

We model the APT-based attack strategy as an optimization problem with the objective to maximize the cost function modeled in Equation (6). The outcomes of the optimization problem are the set T L x and Δ T L x . The problem is formulated is the following.
max Δ T L x , T L x F P g i , s . t .
| T L x | | α Ω L | , α 1 ,
Δ T L x P d i m a x ,
P g i m i n P g i P g i m a x ,
| P i j | P i j m a x , i , j Ω n e t ,
P i j = B i j ( δ i δ j ) , i , j Ω n e t ,
P g i P d i j Ω n e t P i j = 0 , i Ω n e t .
This optimization problem is similar to the problem modeled by Equations (1)–(5). However, two inequality constraints have been added. In particular, Equation (7) bounds the number of attacked transmission lines using a defined parameter α . Equation (8) bounds the amount load demand the attacker can falsify. To compute P d i m a x , we find the set of values of load demands that increases the power flow on each transmission line to its maximum. The remaining constraints are used to check that the system satisfies the constraints in Equations (2)–(5).
FDIA can be executed in a naive way by falsifying the load demand of randomly selected nodes without consideration of imposing maximum damage to the system. In this paper, we use an APT strategy [55] to execute FDIA to impose maximum damage to the system. Algorithm 1 presents the pseudocode for the FDIA attack. In the algorithm, the attacker performs a reconnaissance phase. The first step is to explore information related to power systems. The second step highlights how the attacker executes FDIA on power systems.
Algorithm 1: Attack algorithm
  • STEP 1: Collection of information
  • F r o m _ N o d e N o d e o n o n e e n d o f a t r a n s m i s s i o n l i n e s
  • T o _ N o d e N o d e o n t h e o t h e r e n d o f a t r a n s m i s s i o n l i n e s
  • P d i P o w e r d e m a n d a t n o d e i
  • Δ T L x l o a d d e m a n d t o f a l s i f y
  • Ω n e t S e t o f a l l n o d e s
  • T L x T a r g e t
  • STEP 2: Attack execution
  • P d F r o m _ N o d e T L x = P d F r o m _ N o d e T L X Δ T L x
  • P d T o _ N o d e T L x = P d T o _ N o d e T L x + Δ T L x
  • i = 1 Ω n e t P d ( Before attack ) i = i = 1 Ω n e t P d ( After attack ) i

3.3. FDIA Targets in the Power Systems

In power systems, the potential and most critical FDIA targets are load demand (power demand), power supply (generation), network state, and electricity pricing [56]. Load demand is one of the most critical attack targets as it can easily increase both the cost of power generation and customer cost of power consumption. Moreover, FDIA on energy demand can render the power system unstable. This can happen when the falsified energy demand is far more than the actual energy required by the customers, or when the falsified energy demand is much less than the actual energy required by the customers. The amount of actual power generation is provided by the power generation nodes within the power systems network. FDIA on power generation can lead to starvation of the load demand nodes or an increase in the cost of power generation. Power systems network parameters, such as the transmission line capacity and the network topology, are also potential targets for false data injection attacks. An attacker can isolate a node within the power system network. This can mislead the power distribution process of the power system. In addition, electricity pricing is another potential target for FDIA. False electricity pricing would lead to the loss of revenue to the power generation companies.

3.4. Minimum Effort FDIA

FDIA can be executed with minimum effort from the attackers’ perspective. The effort is in terms of the number of buses to compromise and the amount of false information to be injected into the attack targets. Therefore, the objective of the attacker is to compromise the minimum number of buses and inject a minimum amount of false information. To attack the system with the minimum effort from the attacker’s perspective, the transmission line with the smallest difference between power limitation and actual power flow is selected as the target line. The nodes that connect this particular line are selected as nodes to compromise [1]. Algorithm 2 presents the pseudocode for the FDIA with minimum effort from the attackers’ perspective.
Algorithm 2: Minimum effort attack algorithm
Sensors 21 02478 i001
To evaluate the performance of the FDIA with a minimum effort from the attackers’ perspective, we conducted a series of experiments on the standard IEEE 6, 9, 30, and 118 bus systems. We found that there is no significant increase in the power generation cost when different bus systems are attacked with minimum effort from the attackers’ perspective. As shown in Table 3, the attack deviates the minimum cost of power generation by up to 0.41%, 0.008%, 0.0004% for the IEEE 6-bus, 9-bus, and 118-bus, respectively. Hence, the attack with minimum effort does not have a significant impact on the cost of power generation. Therefore, we need to formulate an attack strategy that will provide a significant impact on the bus systems.
Table 3. Generation cost increase under minimum effort False Data Injection Attacks (FDIA) ($/hr).

4. Rule-Based Detection System for FDIA

This section presents the detection and prevention system for the FDIA in power systems. We extract one primary detection feature and four secondary detection features. Both primary and secondary detection features help in detecting and preventing FDIA in power systems. First, the detection and prevention mechanism checks the primary detection feature. If the primary detection feature is true, the system proceed to check the secondary detection features.
The primary detection feature is a surge in generation cost that is greater than a threshold value denoted by C t h r e s h o l d . The secondary detection features are checked as follows. For the first secondary detection feature, the detection and prevention system checks if there is a change in load demand and the changes is an increase and decrease in load demand in the power systems. This is performed by comparing the present load demand value and the previous load demand value of every node in the power systems. The first secondary detection feature is donated by + / .
For the second secondary detection feature, the detection and prevention mechanism checks if the increase in load demands happened on one node and the decrease in load demands happened on another node in the power systems network. This detection feature is donated by T-N which represent the target nodes and it is the second secondary detection feature that helps in determining if the system is under FDIA attacks or not. For the third detection feature, the detection and prevention mechanism checks if the load demand increases and decreases by the same amount on different nodes within the power systems. This secondary detection feature is donated by ± P d . It is the third detection feature that helps us determine if the power system is under FDIA attacks or not. Finally, for the fourth secondary detection feature, the detection and prevention mechanism checks if the change in load demand, that is increase in load demand on one node and decrease in load demand on another node happened at the same time. This detection feature is donated by δ t . If all the secondary detection feature are satisified, the detection and prevention system triggers an attack alarm and reverts the system configuration to the previous normal system configuration. This prevents the impact of the FDIA on the cost of power generation and the impact on the physical components of the power systems.
To evaluate the performance of the detection and prevention system, we used the accuracy metrics TP rate, TN rate, FP rate, and FN rate. A threshold parameter τ p d is used to control the accuracy metrics of the detection systems. Throughout our simulation studies, we found that the value of FP is zero for all the standard bus systems under investigation, this means that our detection mechanism never indicates the presence of an attack when there is no actual attack happening in the system. Therefore, the only important metrics that shows the performance of our detection systems are the TP, TN, and FN. To determine the sensitivity of the detection system, we find the threshold value that minimizes the number of FP. The threshold parameter is donated by τ p d , and it is determined by running multiple simulations on the IEEE bus systems. To prevent FDIA, after the system detected there is an attack, the system reverts the power system state and configuration to the previously known normal operation state of the system. This helps in combating the increase in generation costs incurred by the FDIA.

5. Results and Discussions

In this section, we first present the simulation environment and the simulation setup. Next, we present our simulation results of FDIA with minimum and unbounded effort from the attackers’ perspective. Next, we present the results of our proposed APT-based FDIA that intends to maximize the power generation cost and the detection mechanism that intends to mitigate such attacks in power systems. Last we compare our results with the previously proposed FDIA from the literature.

5.1. Simulation Setup

The impact of FDIA on the power systems is studied using simulation. Specifically, the impact on the cost of power generation and the impact on the operation of the generators in power systems is investigated. In addition, the attacks are simulated on the IEEE bus systems using MATPOWER MATLAB package [15]. MATPOWER is an open-source and free tool for electric power systems simulations. All simulations are carried out on a 2.3 GHz Intel Core i5 CPU and 8 GB RAM laptop.
Table 4 present the simulation parameters that include the maximum temperature and cooling rate for the simulated annealing, the population size for the genetic algorithm and particle swarm optimization algorithms, tabu list does not have a specific value because the is dynamic, the initial cost of all the standard IEEE bus systems under investigation. We chose a very high temperature and a small cooling rate in order to observe the behavior of simulated annealing when solving the optimization problem. Furthermore, we chose a population size of 50, which is enough to observe the behavior of genetic and particle warm optimization algorithms. The initial cost of 3046.03 dollars per hour, 5216.03 dollars per hour, 951.62 dollars per hour, 125,947.9 dollars per hour are the normal cost of power generation when the system is under normal operation without FDIA attacks.
Table 4. Simulation parameters.
C t h r e s h o l d represent the cost increase threshold which is a dynamic value. The C t h r e s h o l d unit is in dollar per hour and it the value the system can afford to lose. This cost increase threshold lead to the relationship between the generation cost of the power system and the accuracy metrics of the detection and prevention system. When the attacker falsify the load demand and the increase in generation cost in less than the C t h r e s h o l d the detection system will not be able to detect this attack because is incur negligible effect on the system. This leads to the occurrence of the FN. That is is an actual attack and the detection system detects no attack in the systems due to the negligible impact of the attack.
In the coming sections, we present the simulation results of our proposed APT-based FDIA strategy using the IEEE 6-Bus, 9-bus, IEEE 30-Bus, and IEEE 118-Bus. The results are summarized in Table 5. We compare our attack model with the attack in Reference [1] as shown in Table 6. Each simulation is repeated 10 times to get better confidence in determining the maximum increase in generation cost.
Table 5. Minimum, average, and Maximum cost increase under attack on different bus systems.
Table 6. Comparison between our work and the work in Reference [1].

5.2. APT-Based FDIA on IEEE 6 Bus Systems

To evaluate the proposed FDIA, the IEEE 6-bus system is used as a test case to investigate the impact of FDIA against OPF in power systems. The system is composed of six buses with three generators at bus numbers 1, 2, and 3. Moreover, eleven transmission lines connect all buses to form a power system network. Figure 5a presents the results of attacks on 6-bus systems. From the figures, the attacker is able to achieve an up to 15.6% increase in the cost of power generation when the standard IEEE 6-bus system is attacked. Moreover, to analyze the effect of the FDIA on generators, we recorded the generator out variation of all generators in the system both before and after the attack execution. Figure 5b presents the generator output variation. As shown in the figure, the output of the generator at bus number 1 increases from 50 MW to 120.28 MW due to the FDIA attack. Therefore, the attack cause a significant impact on the generator at bus number 1. Moreover, as shown in Figure 5a, Figure 6a, Figure 7a, and Figure 8a, we observed a fluctuation when solving the optimization problem using simulated annealing. This is because the simulated annealing algorithm is a single solution-based metaheuristics, and it combines both the notion of exploring and exploiting. Exploring is the idea of visiting more search space with the hope that the algorithm will get a better solution. However, the notion of exploiting is that the algorithm is always trying to find a global optimum as quickly as possible, this can lead it to stuck at a local optimum. That is, during the hill-climbing, the algorithm always wanted to exploit.
Figure 5. 6-bus systems increase in generation cost and generator output variation.
Figure 6. 9-bus systems increase in generation cost and generator output variation.
Figure 7. 30-bus systems increase in generation cost and generator output variation.
Figure 8. 118-bus systems increase in generation cost and generator output variation.

5.3. APT-Based FDIA on IEEE 9-Bus System

The IEEE 9-bus system consists of nine buses with three generators at bus number 1, bus number 2, and bus number 3. Moreover, nine transmission lines connect all buses in the system to form a power system network. Figure 6a presents the results of attacks on 9-bus systems. From the figures, the attacker can achieve an up to 45.1% increase in the cost of power generation when the standard IEEE 9-bus system is attacked. Moreover, as shown in Figure 6b, the attack cause a significant impact on the generator at bus number 2 for the standard 9-bus systems. The output of the generator increases from 134.38 MW to 269.30 MW due to the FDIA attack. This the major factor that leads to an increase in power generation cost.

5.4. APT-Based FDIA on IEEE 30-Bus System

The 30-bus system consists of thirty buses. Moreover, these buses are connected with 41 transmission lines to form the power system network. The system also consists of six generators connected to bus numbers 1, 2, 5, 8, 11, and 13.
Figure 7a presents the results of attacks on the 30-bus systems. From the figures, the attacker can achieve an average of up to 57.7% increase in the cost of power generation when the standard IEEE 30-bus systems is attacked. As shown in Figure 7b, the attacks cause a significant impact on the generator at bus number 1. The output of the generator increases by about 70 MW due to the FDIA attack. Consequently, it leads to the increase in the fuel cost.

5.5. APT-Based FDIA on IEEE 118-Bus System

The 118-bus system consists of 118 buses with 54 generator buses. The buses are connected by 186 transmission lines to form the power system network. Figure 8a presents the results of attacks on the 118-bus systems. From the figures, the attacker can achieve an average of up to 71.7% increase in the cost of power generation when the standard IEEE 118-bus system is attacked. As shown in Figure 8b, the attack cause a significant impact on the generator at bus number 69. The output of the generator increases from 500.43 MW to 796.06 MW due to the FDIA attack.

5.6. FDIA Detection Results

In this section, we present the simulation results of our proposed detection and prevention mechanism for the IEEE 6-Bus, 9-bus, IEEE 30-Bus, and IEEE 118-Bus. The detection and prevention mechanism is simulated using MATPOWER MATLAB package [15]. All simulations are carried out on a 2.3 GHz Intel Core i5 CPU and 8 GB RAM laptop. Figure 9a, Figure 10a, Figure 11a, and Figure 12a present the generation cost both before and after deploying our detection and prevention system. The figures show that our detection and prevention system is capable of detecting and blocking the FDIA and take the systems back to the normal operation state. Accuracy metrics are used to evaluate the performance of the developed rule-based FDIA detection and prevention system.
Figure 9. 6-bus systems increase in cost before and after detection and prevention and percentage of False Negatives (FN) accuracy metric vs. Threshold.
Figure 10. 9-bus systems increase in cost before and after detection and prevention and percentage of False Negatives (FN) accuracy metric vs. Threshold.
Figure 11. 30-bus systems increase in cost before and after detection and prevention and percentage of False Negatives (FN) accuracy metric vs. Threshold.
Figure 12. 118-bus systems increase in cost before and after detection and prevention and percentage of False Negatives (FN) accuracy metric vs. Threshold.
Figure 9b, Figure 10b, Figure 11b, and Figure 12b present the percentage occurrence of the accuracy metrics at a specific load demand threshold value. The accuracy metrics are the True Positive (TP) rate, True Negative (TN) rate, False Positive (FP) rate, and False Negative (PN) rate. We observed that the rate of the accuracy metric True Positive (TP) is greater than 90% for the all the IEEE standard 6, 9, 30, and 118 bus systems. This shows the good performance of our detection and prevention system. It also shows that the system almost always accurately detect the presence of an attack when there is an actual attack on the power systems. We conducted several simulations to evaluate the sensitivity of the load demand threshold τ P d . In addition, we observed that the rate of the FP is always zero (0) on all the bus systems under investigation. This also shows the good performance of our detection and prevention system. This is because the accuracy metric FP indicates when there is no attack and a detection system detects an attack in the system. Therefore, when the value of FP is zero (0), this means that the detection and prevention never indicate the presence of an attack when there is no actual attack on the system. In addition, the reason for the FP becoming zero (0) in our system is because there is no presence of noise during our simulation.
As shown in Figure 13a,b and Figure 14a,b, we found that the False Negatives (FN) rates become significantly low as the value of load demand threshold τ p d increases. Specifically, the FN rates approaches 0 when τ p d > 130 MW, τ p d > 300 MW, τ p d > 150 MW, and τ p d > 1200 MW for the standard IEEE 6-bus, 9-bus, 30-bus, and 118-bus systems, respectively.
Figure 13. 6-bus and 9-bus systems accuracy metrics.
Figure 14. 30-bus and 118 bus systems accuracy metrics.
Figure 15a,b present the comparison of the percentage of occurrence of the accuracy metrics in our proposed detection and prevention system and the detection mechanism in Reference [1] from the literature. From the figure the false positive rates of the detection mechanism proposed in in in Reference [1] becomes significantly low as the value of load active power threshold approaches 40 MW on both IEEE 30, and 118 bus systems. This means that their system performs better when the threshold value is greater than 40 MW. On the other hand, our proposed detection and prevention system performs better when the threshold values approaches 150 MW and 1200 MW on the standard IEEE 30 and 118 bus systems, respectively.
Figure 15. Comparison of accuracy metrics rates on 30 and 118-bus systems.

6. Conclusions and Future Work

OPF is one of the most important modules in power systems that ensure the optimal operation of power systems. In this paper, we analyzed the impact of FDIA against OPF in power systems. Then, we, namely, simulated annealing, genetic algorithm, and particle swarm optimization. OPF is one of the most important modules in power systems that ensure the optimal operation of power systems. In addition, we introduced a novel APT-based attack strategy with the objective to maximize the operation cost of power generation. We modeled the attack strategy as an optimization problem. We used metaheuristic algorithms, namely: genetic algorithm (GA), simulated annealing (SA) algorithm, tabu search (TS), and particle swarm optimization (PSO) to solve the proposed optimization problem and obtain the attack plan. We conducted several simulation scenarios and observed that our proposed attack strategy can increase the power generation cost by up to 15.6%, 45.1%, 60.12%, and 74.02% on the 6-bus, 9-bus, 30-bus, and 118-bus systems, respectively. In addition, we observed a fluctuation when solving the optimization problem using simulated annealing. This is expected, because the simulated annealing algorithm is a single solution-based metaheuristics, and it combines both the notion of exploring and exploiting. That is, during the hill-climbing, the algorithm always wanted to exploit. In addition, the attacks cause significant impact on the generators performance on the bus number 1, 2, and 69 for the 6-bus, 9-bus, 30-bus, and 118-bus systems, respectively. We developed a rule-based FDIA detection and prevention system with primary and secondary detection features. The system is able to detect and Prevent FDIA in power systems. Moreover, accuracy metrics are used to evaluate the performance of the developed rule-based FDIA detection and prevention system. We found that the False Negatives (FN) rates become significantly low as the value of load demand threshold τ p d increases. Specifically, the FN rates approaches 0 when τ p d > 130 MW, τ p d > 300 MW, τ p d > 150 MW, and τ p d > 1200 MW for the standard IEEE 6-bus, 9-bus, 30-bus, and 118-bus systems, respectively. In the future, we intend to use other metaheuristics algorithms to check the possibility of improving our results. Finally, the main limitation of this work is the use of only DC optimal power flow without considering the AC optimal power flow. This is because the DC optimal power flow is the most extreme approximation of the power flow. Another reason for choosing DC over AC is due to problems related to the AC optimal power flow. Although AC optimal power flow solutions should be more accurate than DC optimal power flow, its convergence problem is quite severe. The main challenge faced in this study is the challenge related to the optimal power flow learning curve. That is, the steep learning curve of the OPF before the final solutions are obtained. Therefore, early solutions of the OPF must be carefully examined.

Author Contributions

Conceptualization, M.F.; Formal analysis, S.U.; Methodology, S.U.; Supervision, M.F.; Writing—original draft, S.U.; Writing—review & editing, M.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by project number SR191009 by the Deanship of Scientific Research at KFUPM.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would to thank the Deanship of Scientific Research at KFUPM for the unwavering support. Also, the authors would like to thank Yahya Osais

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
FDIAFalse Data Injections attacks
OPFOptimal power flow
GAGenetic Algorithm
SASimulated Annealing
TSTabu Search
PSOParticle Swarm Optimization
PSSEPower Systems State Estimator
AGCAutomatic Generation Control
APTAdvanced Persistence Threat
KNNk-nearest neighbor
ENNExtended Nearest Neighbor
SVMsupport vector machine
ANNArtificial Neural Networks
TPTrue Positive
TNTrue Negative
FPFalse Positive
FNFalse Negative

References

  1. Yang, Q.; Li, D.; Yu, W.; Liu, Y.; An, D.; Yang, X.; Lin, J. Toward data integrity attacks against optimal power flow in smart grid. IEEE Internet Things J. 2017, 4, 1726–1738. [Google Scholar] [CrossRef]
  2. Salmeron, J.; Wood, K.; Baldick, R. Analysis of electric grid security under terrorist threat. IEEE Trans. Power Syst. 2004, 19, 905–912. [Google Scholar] [CrossRef]
  3. Yuan, Y.; Li, Z.; Ren, K. Modeling load redistribution attacks in power systems. IEEE Trans. Smart Grid 2011, 2, 382–390. [Google Scholar] [CrossRef]
  4. Mo, Y.; Kim, T.H.J.; Brancik, K.; Dickinson, D.; Lee, H.; Perrig, A.; Sinopoli, B. Cyber–physical security of a smart grid infrastructure. Proc. IEEE 2011, 100, 195–209. [Google Scholar]
  5. Liu, J.; Xiao, Y.; Li, S.; Liang, W.; Chen, C.P. Cyber security and privacy issues in smart grids. IEEE Commun. Surv. Tutor. 2012, 14, 981–997. [Google Scholar] [CrossRef]
  6. Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A survey on cyber security for smart grid communications. IEEE Commun. Surv. Tutor. 2012, 14, 998–1010. [Google Scholar] [CrossRef]
  7. Wang, W.; Lu, Z. Cyber security in the smart grid: Survey and challenges. Comput. Netw. 2013, 57, 1344–1371. [Google Scholar] [CrossRef]
  8. Liu, L.; Esmalifalak, M.; Ding, Q.; Emesih, V.A.; Han, Z. Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid 2014, 5, 612–621. [Google Scholar] [CrossRef]
  9. Ambekar, R.; Mangalvedekar, H. Power system state estimation by linear programming under false data injection attack and contingency. In Proceedings of the 2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bengaluru, India, 21–23 February 2017; pp. 698–703. [Google Scholar]
  10. Zhao, J.; Zhang, G.; Dong, Z.Y.; Wong, K.P. Forecasting-aided imperfect false data injection attacks against power system nonlinear state estimation. IEEE Trans. Smart Grid 2015, 7, 6–8. [Google Scholar] [CrossRef]
  11. Kosut, O.; Jia, L.; Thomas, R.J.; Tong, L. Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures. In Proceedings of the 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010; pp. 220–225. [Google Scholar]
  12. Hu, Z.; Wang, Y.; Tian, X.; Yang, X.; Meng, D.; Fan, R. False data injection attacks identification for smart grids. In Proceedings of the 2015 Third International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), Beirut, Lebanon, 29 April–1 May 2015; pp. 139–143. [Google Scholar]
  13. Musleh, A.S.; Chen, G.; Dong, Z.Y. A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids. IEEE Trans. Smart Grid 2019, 11, 2218–2234. [Google Scholar] [CrossRef]
  14. Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. The 2015 ukraine blackout: Implications for false data injection attacks. IEEE Trans. Power Syst. 2016, 32, 3317–3318. [Google Scholar] [CrossRef]
  15. Zimmerman, R.D.; Murillo-Sánchez, C.E.; Thomas, R.J. MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 2010, 26, 12–19. [Google Scholar] [CrossRef]
  16. Sun, C.C.; Hahn, A.; Liu, C.C. Cyber security of a power grid: State-of-the-art. Int. J. Electr. Power Energy Syst. 2018, 99, 45–56. [Google Scholar] [CrossRef]
  17. Lopes, Y.; Fernandes, N.C.; de Castro, T.B.; dos Santos Farias, V.; Noce, J.D.; Marques, J.P.; Muchaluat-Saade, D.C. Vulnerabilities and threats in smart grid communication networks. In Security Solutions and Applied Cryptography in Smart Grid Communications; IGI Global: Hershey, PA, USA, 2017; pp. 1–28. [Google Scholar]
  18. El Mrabet, Z.; Kaabouch, N.; El Ghazi, H.; El Ghazi, H. Cyber-security in smart grid: Survey and challenges. Comput. Electr. Eng. 2018, 67, 469–482. [Google Scholar] [CrossRef]
  19. He, H.; Yan, J. Cyber-physical attacks and defences in the smart grid: A survey. IET Cyber-Phys. Syst. Theory Appl. 2016, 1, 13–27. [Google Scholar] [CrossRef]
  20. Amin, B.R.; Taghizadeh, S.; Rahman, M.S.; Hossain, M.J.; Varadharajan, V.; Chen, Z. Cyber attacks in smart grid–dynamic impacts, analyses and recommendations. IET Cyber-Phys. Syst. Theory Appl. 2020. [Google Scholar] [CrossRef]
  21. Aliyu, F.; Sheltami, T.; Shakshuki, E.M. A detection and prevention technique for man in the middle attack in fog computing. Procedia Comput. Sci. 2018, 141, 24–31. [Google Scholar] [CrossRef]
  22. Foster, J.S., Jr.; Gjelde, E.; Graham, W.R.; Hermann, R.J.; Kluepfel, H.M.; Lawson, R.L.; Soper, G.K.; Wood, L.L.; Woodard, J.B. Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack: Critical National Infrastructures; Technical Report; Electromagnetic Pulse (EMP) Commission: Mclean, VA, USA, 2008. [Google Scholar]
  23. Peng, L.; Cao, X.; Shi, H.; Sun, C. Optimal jamming attack schedule for remote state estimation with two sensors. J. Frankl. Inst. 2018, 355, 6859–6876. [Google Scholar] [CrossRef]
  24. Li, B.; Lu, R.; Wang, W.; Choo, K.K.R. Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. J. Parallel Distrib. Comput. 2017, 103, 32–41. [Google Scholar] [CrossRef]
  25. Ding, Y.; Liu, J. Real-time false data injection attack detection in energy internet using online robust principal component analysis. In Proceedings of the 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, China, 26–28 November 2017; pp. 1–6. [Google Scholar]
  26. Beg, O.A.; Nguyen, L.V.; Johnson, T.T.; Davoudi, A. Signal temporal logic-based attack detection in DC microgrids. IEEE Trans. Smart Grid 2018, 10, 3585–3595. [Google Scholar] [CrossRef]
  27. Adhikari, U.; Morris, T.H.; Pan, S. Applying non-nested generalized exemplars classification for cyber-power event and intrusion detection. IEEE Trans. Smart Grid 2016, 9, 3928–3941. [Google Scholar] [CrossRef]
  28. Kurt, M.N.; Ogundijo, O.; Li, C.; Wang, X. Online cyber-attack detection in smart grid: A reinforcement learning approach. IEEE Trans. Smart Grid 2018, 10, 5174–5185. [Google Scholar] [CrossRef]
  29. Li, B.; Lu, R.; Xiao, G. HMM-based fast detection of false data injections in advanced metering infrastructure. In Proceedings of the GLOBECOM 2017-2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar]
  30. He, Y.; Mendis, G.J.; Wei, J. Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 2017, 8, 2505–2516. [Google Scholar] [CrossRef]
  31. Sedghi, H.; Jonckheere, E. Statistical structure learning of smart grid for detection of false data injection. In Proceedings of the 2013 IEEE Power & Energy Society General Meeting, Vancouver, BC, Canada, 21–25 July 2013; pp. 1–5. [Google Scholar]
  32. Esmalifalak, M.; Liu, L.; Nguyen, N.; Zheng, R.; Han, Z. Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst. J. 2014, 11, 1644–1652. [Google Scholar] [CrossRef]
  33. Yan, J.; Tang, B.; He, H. Detection of false data attacks in smart grid with supervised learning. In Proceedings of the 2016 International Joint Conference on Neural Networks (IJCNN), Vancouver, BC, Canada, 24–29 July 2016; pp. 1395–1402. [Google Scholar]
  34. Ferragut, E.M.; Laska, J.; Olama, M.M.; Ozmen, O. Real-Time Cyber-Physical False Data Attack Detection in Smart Grids Using Neural Networks. In Proceedings of the 2017 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 14–16 December 2017; pp. 1–6. [Google Scholar]
  35. Ahmed, S.; Lee, Y.; Hyun, S.H.; Koo, I. Unsupervised machine learning-based detection of covert data integrity assault in smart grid networks utilizing isolation forest. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2765–2777. [Google Scholar] [CrossRef]
  36. Duan, J.; Zeng, W.; Chow, M.Y. Resilient distributed DC optimal power flow against data integrity attack. IEEE Trans. Smart Grid 2016, 9, 3543–3552. [Google Scholar] [CrossRef]
  37. Rahman, M.A.; Al-Shaer, E.; Kavasseri, R.G. A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids. In Proceedings of the 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), Berlin, Germany, 14–17 April 2014; pp. 175–186. [Google Scholar]
  38. Khanna, K.; Panigrahi, B.K.; Joshi, A. Bi-level modelling of false data injection attacks on security constrained optimal power flow. IET Gener. Transm. Distrib. 2017, 11, 3586–3593. [Google Scholar] [CrossRef]
  39. Abdallah, A.; Shen, X.S. Efficient prevention technique for false data injection attack in smart grid. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–6. [Google Scholar]
  40. Manandhar, K.; Cao, X.; Hu, F.; Liu, Y. Combating false data injection attacks in smart grid using kalman filter. In Proceedings of the 2014 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 3–6 February 2014; pp. 16–20. [Google Scholar]
  41. Wei, L.; Gao, D.; Luo, C. False data injection attacks detection with deep belief networks in smart grid. In Proceedings of the 2018 Chinese Automation Congress (CAC), Xi’an, China, 30 November–2 December 2018; pp. 2621–2625. [Google Scholar]
  42. Zhang, T.Y.; Ye, D. False data injection attacks with complete stealthiness in cyber–physical systems: A self-generated approach. Automatica 2020, 120, 109117. [Google Scholar] [CrossRef]
  43. Lu, A.Y.; Yang, G.H. False data injection attacks against state estimation in the presence of sensor failures. Inf. Sci. 2020, 508, 92–104. [Google Scholar] [CrossRef]
  44. Sayghe, A.; Hu, Y.; Zografopoulos, I.; Liu, X.; Dutta, R.G.; Jin, Y.; Konstantinou, C. Survey of machine learning methods for detecting false data injection attacks in power systems. IET Smart Grid 2020. [Google Scholar] [CrossRef]
  45. Ashrafuzzaman, M.; Das, S.; Chakhchoukh, Y.; Shiva, S.; Sheldon, F.T. Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning. Comput. Secur. 2020, 97, 101994. [Google Scholar] [CrossRef]
  46. Saadat, H. Power System Analysis; McGraw-Hill Series in Electrical and Computer Engineering; WCB/McGraw-Hill: New York, NY, USA, 1999. [Google Scholar]
  47. Kundur, D.; Feng, X.; Liu, S.; Zourntos, T.; Butler-Purry, K.L. Towards a framework for cyber attack impact analysis of the electric smart grid. In Proceedings of the 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010; pp. 244–249. [Google Scholar]
  48. Sivasubramani, S.; Swarup, K. Multi-objective harmony search algorithm for optimal power flow problem. Int. J. Electr. Power Energy Syst. 2011, 33, 745–752. [Google Scholar] [CrossRef]
  49. Selim, S.Z.; Alsultan, K. A simulated annealing algorithm for the clustering problem. Pattern Recognit. 1991, 24, 1003–1008. [Google Scholar] [CrossRef]
  50. Kirkpatrick, S.; Gelatt, C.D., Jr.; Vecchi, M.P. Optimization by simulated annealing. Optim. Simmul. Annealing. Sci. 1983, 220, 671–680. [Google Scholar]
  51. Dowsland, K.A.; Thompson, J. Simulated annealing. In Handbook of Natural Computing; Springer: Berlin/Heidelberg, Gemany, 2012; pp. 1623–1655. [Google Scholar]
  52. Kramer, O. Genetic Algorithm Essentials; Springer: Berlin/Heidelberg, Germany, 2017; Volume 679. [Google Scholar]
  53. Elbes, M.; Alzubi, S.; Kanan, T.; Al-Fuqaha, A.; Hawashin, B. A survey on particle swarm optimization with emphasis on engineering and network applications. Evol. Intell. 2019, 1–17. [Google Scholar] [CrossRef]
  54. Gallego, R.A.; Romero, R.; Monticelli, A.J. Tabu search algorithm for network synthesis. IEEE Trans. Power Syst. 2000, 15, 490–495. [Google Scholar] [CrossRef]
  55. Ghafir, I.; Prenosil, V. Advanced persistent threat attack detection: An overview. Int. J. Adv. Comput. Netw. Secur. 2014, 4, 5054. [Google Scholar]
  56. Chen, P.Y.; Yang, S.; McCann, J.A.; Lin, J.; Yang, X. Detection of false data injection attacks in smart-grid systems. IEEE Commun. Mag. 2015, 53, 206–213. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.