Next Article in Journal
Uni-Messe: Unified Rule-Based Message Delivery Service for Efficient Context-Aware Service Integration
Previous Article in Journal
Deriving Current Cost Requirements from Future Targets: Case Studies for Emerging Offshore Renewable Energy Technologies
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Earth-Mover-Distance-Based Detection of False Data Injection Attacks in Smart Grids

1
State Key Laboratory of Power Grid Safety and Energy Conservation, China Electric Power Research Institute, Beijing 100192, China
2
School of Electrical Engineering, Yanshan University, Qinghuangdao 066004, China
*
Author to whom correspondence should be addressed.
Energies 2022, 15(5), 1733; https://doi.org/10.3390/en15051733
Submission received: 22 January 2022 / Revised: 19 February 2022 / Accepted: 22 February 2022 / Published: 25 February 2022

Abstract

:
The high integration of power information physical system improves the efficiency of power transmission, but it also brings new threats to power grid. False data injection attacks can use traditional bad data to detect vulnerabilities and maliciously tamper with measurement data to affect the state estimation results. In order to achieve a higher security level for power systems, we propose an earth mover distance method to detect false data injection attacks in smart grids. The proposed method is built on the dynamic correlation of measurement data between adjacent moments. Firstly, a joint-image-transformation-based scheme is proposed to preprocess the measurement data variation, so that the distribution characteristics of measurement data variation are more significant. Secondly, the deviation between the probability distribution of measurement data variation and the histogram are obtained based on the earth’s mover distance. Finally, a reasonable detection threshold is selected to judge whether there are false data injection attacks. The proposed method is tested using IEEE 14 bus system considering the state variable attacks on different nodes. The results verified that the proposed method has a high detection accuracy against false data injection attacks.

1. Introduction

In recent years, sensing, communication, and control technologies have been able to realize the seamless integration in smart grids. Hence, the physical and network fields of the power system are deeply integrated to form a cyber-physical system [1]. After collecting measurement data through remote terminal units (RTUs), the smart grid relies on the state estimation algorithm to achieve its regulation. Thus, the main purpose of cyberattacks is to undermine or to mislead the state estimation mechanism, leading to incorrect decision-making in the energy management system (EMS). In a highly complex and automated environment, a cyber-attack may propagate to the entire system, triggering grid paralysis, mass outage incidents, and so on, such as the massive power outage that occurred in Venezuela on 7 March 2019 [2].
False data injection attacks (FDIAs), as a covert cyber-attack method, pose a huge challenge to the safe and stable operation of smart grids by illegally hacking into power systems to tamper with measurement data and thus undermine data integrity [3,4,5]. In [6], Liu et al. first proposed the concept of FDIAs and mentioned that attackers can use power system topology and parameter information to construct a well- designed attack vector that bypasses traditional bad data detections (BDDs) and destroys the integrity of smart grid information. Since attackers can construct extremely hidden FDIAs without relying on system configuration information, it is difficult for traditional model-based detection methods and boundary protection systems to handle such FDIAs. In order to run the power grid safely and steadily, an effective FDIAs testing scheme needs to be studied and developed, which has been intensively studied by many researchers.
From the perspective of defenders, some methods have been improved for the state estimation algorithm in the study of FDIAs detection. The improved state estimation methods mainly include residual detection method [7], measurement transformation detection method [8], and some detection methods related to the use of Kalman filters [9,10]. The FDIAs detection method based on state estimation is mainly used for static analysis and detection of attacks at specific moments. When the power system fluctuates, it is prone to missed detection and false detection [11].
The increase in the deployment of wide-area measurement system provides massive data for the analysis of power system data. Therefore, artificial intelligence technology should be gradually increased in the FDIAs detection, mainly including support vector machine [12], extreme learning machine [13], fuzzy c-means clustering [14], deep learning [15,16], integrated learning [17], etc. The advantages of such methods are that they do not need to solve complex power system time domain equations and their calculation speed is fast. However, the disadvantage is that the test results are highly dependent on the training process of the model. Improper selection of training samples can directly affect detection performance.
Since the power system is in continuous dynamic operation and a space-time correlation exists between different measurement data or state variables, most attacks are continuous. Therefore, it is feasible to consider using historical data for trajectory prediction analysis to detect FDIAs, which mainly includes statistical consistency detection, sequence consistency detection and sensor trajectory prediction.
Kurt et al. [18] used the generalized cumulative sum (CUSUM) algorithm for quickest detection of FDIAs. This method is robust to time-varying state, attack and attacked instruments in both centralized and distributed environments. Similarly, Li et al. [19] proposed a sequence detector based on a broad analogy for sequential detection of FDIAs in the smart grid. This detector is significantly superior to first order CUSUM detector in terms of robustness and average detection delay performance. In [20], Malhotra et al. proposed a stacked LSTM prediction network to effectively detect time series anomalies or failures, modeling the prediction error as a multivariate Gaussian distribution to evaluate abnormal behavior. By analyzing and learning the original measurement data, [21,22] used different methods to detect abnormal data which did not conform to the historical measurement distribution, which however failed to detect false data matching the historical measurement distribution. Khalid et al. [23] proposed multi- sensor track fusion-based model prediction for malicious attacks in PMUs, which can use smoothing algorithm based on Kalman particle filter to detect attacks at each monitoring node. The online FDIAs detection process of SCADA and PMU hybrid measurement is proposed in [24], which can effectively find the spatial hidden FDIAs based on multi-matching state prediction. However, when conditions such as load mutation or equipment failure occur, the state prediction results are seriously misaligned and thus affect the detection results.
Considering the time correlation of node measurement, Zhao et al. [25] compared prediction data with collected data based on short-term state prediction method, and further built detection index in combination with traditional measurement residual analysis. In order to solve the problem that it is impossible to detect attacks similar to historical data, Gu et al. [26] considered the characteristics of measured data variation and proposed a detection method based on Kullback-Leibler distance (KLD). However, the method failed to detect attacks on some nodes. A real-time detection scheme of FDIAs based on joint transformation is proposed in [27], but the detection accuracy is reduced when the attack is less intense.
The detection method based on trajectory prediction analysis is mainly used to predict the distribution of state variables according to the operation law of the system state and of the historical database. By comparing the running track, various types of FDIAs can be detected effectively. However, there are two problems when the probability density function is used to represent the data running track. One is the problem of overlapping distributions, and the other is the difficulty of detecting historical data replay attacks.
The control center monitors the operation state of the power system in real time to arrange the optimal scheduling and saves the historical running data. Assuming that the database of the historical running state will not be destroyed by FDIAs. For ordinary attacks, the method of judging whether FDIAs have been suffered by comparing whether the difference between current data and historical data is within a reasonable threshold is effective. However, if the attacker has mastered the historical operation data and used the obtained historical data to tamper with the current operation data, then this method of directly comparing the difference between current data and historical data will not be able to determine whether the attack has been suffered. Regardless of how FDIAs are constructed, the fundamental goal is to tamper with measurement data. Based on the statistical characteristics of the differences of measurement data before and after the attack, the research on FDIAs detection methods which do not rely on a specific mathematical model has stronger universal applicability. Therefore, this paper proposes a FDIAs detection method based on Earth-Mover Distance (EMD), which can measure the distance between two probability distributions. The main contributions of this paper can be listed as follows:
(1)
It has been found that the differences between the probability distributions of data variation in different periods may overlap with each other, and the results are unsatisfactory if they are used directly for attack detection. Therefore, Joint Image Transformation (JIT) is used to map the variation of measurement data. The proposed method makes the probability distribution of data variation more significant by stretching and compressing, which provides a data basis for accurate detection of FDIAs.
(2)
Considering the dynamic correlation of adjacent moment measurement data, a FDIAs detection method based on Earth-Mover Distance (EMD) is proposed. The difference between the probability distribution of different measurement data variation is compared through EMD.
(3)
The detection method of this paper has been proven to have high accuracy through case studies.
The rest of this paper is organized as follows: Section 2 describes the background of system model, bad data detection, and false data injection attacks. In Section 3, the method of detecting FDIAs is put forward. Section 4 introduces case simulation. The result analysis is given in Section 5. Section 6 is the summary of this paper.

2. Background

2.1. System Model

Assuming that the grid has N+1 nodes and M measurement devices. Based on the common linear DC model, measurement equation and state equation of discrete linear power system are given as follows:
z t = h ( x t ) + e t
x t = f ( x t 1 ) + v t
where h ( · ) is the measurement function; z t = [ z 1 , t T , z 2 , t T , , z M , t T ] T is the measured vector at time t ; z M , t = [ z M , t , 1 , z M , t , 2 , , z M , t , λ ] T is the measured vector of the M-th measurement device; e t = [ e 1 , t T , e 2 , t T , , e M , t T ] T N ( 0 , σ e 2 I M λ ) is the measured noise vector; f ( · ) is the transfer function of state vector x at time t 1 ; x t = [ x 1 , t , x 2 , t , , x N , t ] T is the state vector; v t = [ v 1 , t , v 2 , t , , v N , t ] T N ( 0 , σ v 2 I N ) is the process noise vector; I N is the unit matrix.
In (1) and (2), between each time interval t 1 and t , λ { 1 , 2 , 3 , } is usually small. Therefore, the collected measurement data between time t 1 and t needs to be processed at time t .

2.2. Bad Data Detection and Identification

System with data acquisition and monitoring control can collect real-time measurement data and make state estimation. In order to eliminate the error caused by non-human factors [28] and ensure the reliability of the state estimation results, there is a built-in BDD scheme in EMS for bad data detection and identification. The essence of the traditional method of detecting and identifying bad data can be summed up as residual method. The residual vector r is first determined by calculation, and then different detection standards are used for judgment. In other words, bad data can be detected by calculating r as follows:
r = z z ^ = h ( x ) + e ( h ( x ) + H ( x x ^ ) ) = e H ( H T R 1 H ) 1 H T R 1 e = ( I H ( H T R 1 H ) 1 H T R 1 ) e = S e
where r is the residual vector; I is the unit matrix; e is the measurement error; R 1 is the weight matrix; S = I H ( H T R 1 H ) 1 H T R 1 is the residual sensitivity matrix of order m × m .
Taking the extremum detection method of objective function [29] as an example. The extremum of objective function established by residual vector is as follows:
J ( x ^ ) = [ z h ( x ^ ) T ] R 1 [ z h ( x ^ ) ] = r T R 1 r
where J ( x ^ ) approximates the χ 2 distribution of m n degrees of freedom. Given the detection confidence interval, bad data exists when the detection indicator exceeds the threshold γ 0 and the probability is p , where γ 0 = χ ( m n ) , p 2 , p = P r ( J ( x ^ ) χ ( m n ) , p 2 ) . Define the target function detector:
D J ( x ^ ) ( z ) = { 1 J ( x ^ ) > γ 0 , bad   data 0 J ( x ^ ) γ 0 , no   bad   data
In order to further eliminate bad data by identifying them, the generally adopted criterion is the “ 3 σ ” principle. When the system has bad data, the measurement corresponding to the maximum residual should be corrected and the above detection process should be repeated until all elements in the residual vector are within the threshold.

2.3. Principle of False Data Injection Attack

Attacker can successfully inject into measurement data by constructing the effective attack vector. Traditional FDIAs are typically given as follows:
z a = z + a = h ( x ) + a + e
where a is the injected false data attack vector; z a is the attacked measurement vector; x is the estimation vector of original measurement vector z without attack.
If z can bypass the traditional bad data detector based on residuals, then a can also bypass BDD, satisfying the following equation:
a = H c
where c = [ c 1 , c 2 , , c n ] T is the arbitrary non-zero vector of n × 1 , which represents the vector that is deviated by the system state vector after FDIAs. x a = ( H T R 1 H ) 1 H T R 1 z a   = x + c is the vector of n × 1 , which represents the state estimator of z a . The purpose of FDIAs is to mislead the system operator to take x a as the state vector, so the expressions of z a and residual r a are respectively as follows:
z a = H x + H c + e = H ( x + c ) + e = H x a + e
r a = z a H x = z + a H ( x + c ) = z H x
At this point, the traditional method of bad data detection and identification fails to FDIAs, which allows attacker to tamper with the measurement data at will.

3. Methodology

3.1. Proposed Schemes

By designing the attack vector, the measurement and state of the power system can be tampered with, which causes the measurement residuals are very small or even not. However, this method makes the system residuals still less than the threshold of BDD mechanism, resulting in the success of FDIAs. Earth-mover distance (EMD), also known as Wasserstein distance or bulldozer distance, was first introduced by Rubner et al. [30] and used to measure color and texture differences. The EMD-based detection method proposed in this paper is completely independent of the residuals of state estimation. EMD can measure the difference between the probability distribution of measurement data variation under normal operating conditions and under FDIAs. Specifically, the value of EMD is proportional to the difference in the distribution of the two data used to detect the system FDIAs. Successful detection of injected false data is indicated when a large range of EMD is obtained.
The proposed method consists of the following parts: get the grid measurement data, process the measurement data variation by joint image transformation (JIT), calculate EMD, and select the threshold for attack detection. The specific detection process is shown in Figure 1.
This method determines whether the current system is suffering from FDIAs by analyzing the temporal variation of the measurement data and comparing the distance between the probability distributions of the measurement data variation between adjacent moments in different time periods. When FDIAs exist, the probability distribution of detection data variation will deviate from the probability distribution of the measurement data variation under normal operating conditions, which will lead to the deviation from the normal value of EMD.

3.2. Earth-Mover Distance

In the measurement space, EMD is a metric that can be used to determine the similarity between two histograms of probability distributions by calculating the distance between them. The advantage is that it can reflect smoothly the specific differences between the two probability distributions, which is how they change from one distribution to the other. In fact, EMD is used to calculate the optimal solution of the mobility solution in the transportation problem, as shown in Figure 2. It is assumed that goods need to be transported from P factories to Q warehouses, where P factories have m piles of goods and Q warehouses have n storage spaces. Now, all the piles of goods in the factories should be moved to the storage spaces of the warehouses with the minimum work. It can be expressed as follows:
P = { ( p 1 , w p 1 ) , , ( p m , w p m ) } Q = { ( q 1 , w q 1 ) , , ( q n , w q n ) }
where the weight of p i is w p i , and the capacity of q j is w q j . Define the ground distance matrix D = [ d i j ] m × n , where d i j represents the distance from p i to q j . Therefore, we want to find a matrix flow F = [ f i j ] m × n , where that f i j represents the number of flows from p i to q j , thereby minimizing the overall cost function:
WORK ( P , Q , F ) = i = 1 m j = 1 n d i j f i j
where distance d i j is predefined and transport volume f i j is the only variable in the upper formula. f i j meets the following four constraints:
(1)
It can be moved from P to Q and cannot be moved from Q to P .
f i j 0 1 i m , 1 j n
(2)
The sum of supply weights moved from p i to Q cannot exceed total weight w p i .
j = 1 n f i j w p i 1 i m
(3)
The sum of supply weights gained by q j in Q cannot exceed total capacity w q j .
i = 1 m f i j w q i 1 j n
(4)
The total number of movements to the minimum of the total supply weight in P and the total capacity in Q .
i = 1 m j = 1 n f i j = min ( i = 1 m w p i , j = 1 n w q j )
Therefore, EMD can also be defined as a normalized expression of the minimum cost of moving from one probability distribution to another:
EMD ( P , Q ) = i = 1 m j = 1 n d i j f i j i = 1 m j = 1 n f i j
In addition, EMD can also be expressed as follows:
EMD ( P , Q ) = inf γ ( P , Q ) E ( x , y ) γ [ x y ]
where P and Q are the edge distributions of ( P , Q ) . γ obeys the joint distribution. Samples x and y can be obtained according to ( x , y ) γ , and then the distance expectation E ( x , y ) γ [ x y ] can be calculated. Therefore, in the union distribution collection, EMD is defined as the lower bound inf γ ( P , Q ) E ( x , y ) γ [ x y ] .
As shown in Figure 2, according to the selected path planning, the distance expectation is the consumption required to move the elements in P to Q , while EMD is the minimum consumption under the optimal path planning. EMD naturally extends the concept of distance between individual elements to the distance between element collections or distributions. Therefore, EMD also satisfies the characteristics of distance measurement, that is, the three characteristics of distance: non-negativity, symmetry, and triangular inequality.

3.3. Joint Image Transformation Technology

In the field of image processing, joint image transformation (JIT) is commonly used to enhance image quality. Power-law (Gamma) transformation and logarithmic transformation are one of the most widely used image transformation technologies [31]. In this paper, JIT is applied to the measurement system to preprocess the variation of measurement data and change the mapping of the variation range of measurement data, which can improve the resolution (scale) of probability distribution function, solve the problem that the probability distribution of measurement data variation is difficult to detect FDIAs and improve the accuracy of attack detection.
The measured data collected at t time are processed, and the range of measured data before and after transformation is represented by r and s respectively. Therefore, it can be shown as follows:
{ r = z ( t ) z ( t 1 ) s = T ( r )
T ( r ) is the image transformation function which represents the transition relationship between input and output values. In this paper, power-law and logarithmic transformations are used in combination. Power-law transformation is used to process the map of measurement data variation when setting the detection threshold. Logarithmic transformation is used to handle the map of measurement data variation when calculating the attack.
(1)
Power-Law transformation
s = c r γ
where c and γ are positive constants. If γ > 1 , power-law transformation can map small range of input measurement data variation into wide range. Similarly, it can also map the broader range into narrower range. Here, power-law transformation is used to map a wide range of measured data variation as input to a narrower range of measured data variation output.
(2)
Logarithmic transformation
s = c log ( 1 + r )
where c is scale proportional constant. In the field of image processing, logarithmic transformation transforms the brightness by expanding the value of dark pixels in the image and compressing the higher brightness value. Here, logarithmic transform is used to map a narrow range of measured data variation as input to a wider range of measured data variation output.

3.4. Threshold Determination

Threshold indicates the tolerance of a detection method to the difference in the probability distribution of measurement data variation. Choosing the appropriate threshold is key to affecting detection accuracy. In order to accurately detect FDIAs, a large number of normal measurements near the current moment is needed. The EMD range obtained by the difference between the probability distribution of measurement variation in the previous period and the probability distribution of benchmark measurement variation is marked as range A. The EMD range obtained by the difference between the probability distribution of measurement variation need to be detected and the probability distribution of benchmark measurement variation is marked as range B. Considering that range A and range B have overlapping regions. In other words, the data in the overlapping area cannot determine whether they are false data. Therefore, this paper uses 99% confidence interval to determine the attack detection threshold.
The distance between the probability distribution of benchmark measurement variation and the probability distribution of measurement variation one month before attack is denoted as EMD 1 . Selected threshold is the value of its sample set. Mean and standard deviation are calculated according to the size and quantity of each distance value. Assuming the mean is μ , the standard deviation is σ . The upper interval limit of 99% confidence level of EMD 1 is used as FDIAs detection threshold. Therefore, threshold can indicate as follows:
ε = M a x { ( μ n α / 2 σ , μ + n α / 2 σ ) }
where n α / 2 corresponds to the standard score of coverage area within the distribution of non-confidence level. The resulting detection threshold depends on the network topology. When topological changes are considered, the historical measurement dataset is updated based on the topology change. Therefore, for different network topology, the detection threshold is different
The distance between the probability distribution of benchmark measurement variation and the probability distribution of measurement variation in attack is denoted as EMD 2 . Compare EMD 2 with ε to determine if the power system has been attacked by false data injection. If the threshold ε is exceeded, FDIAs are currently present. Similarly, if the resulting EMD range is small, which means no more than the threshold ε , the current measurement data is normal. As shown below:
{ { EMD 2 } ε , no   attack { EMD 2 } > ε , attack

4. Case Simulation

4.1. Test System

In order to simulate the real power system operation as much as possible, the real load data are integrated into MATPOWER to test the performance of the detection method. The simulation environment is Matlab2017a. This paper is based on the IEEE 14 bus system, as shown in Figure 3. The measurement data used in the test is the load data of the New York Independent System Operator (NYISO) in 2012, which includes 11 regions, as the actual power profile, as shown in Figure 4. The time interval of actual load data is 5 min, that is, about 288 power values per day. Due to the lack of system state data, system state data can be generated based on NYISO load data. In other words, the system state data can be obtained by MATPOWER flow calculation and the system measurement data can be calculated by the measurement equation. Then, the proposed method can be evaluated based on these data. Consider each bus of IEEE 14 bus system as a node and set No. 1 as a balanced node. The specific process of data per 5 min interval is as follows:
(1)
Correspond the NYISO regional loads (CAPITL, CENTRL, DUNWOD, GENESE, HUD VL, LONGIL, MHK VL, MILLWD, N.Y.C., NORTH, WEST) to 11 load nodes:
( 2 3 4 5 6 9 10 11 12 13 14 1 2 3 4 5 6 7 8 9 10 11 )
where, the first line is the node number of IEEE14 bus system. The second line is the corresponding NYISO region number.
(2)
Standardize the NYISO load data according to IEEE 14 standard system of active power of initial load node and generator node, so that the test system runs within the initial value range of the state. Due to the lack of system node reactive load, it is assumed that the system has a constant power factor to calculate the reactive power of each node at a 5min interval.
(3)
Calculate the ratio of new total load to initial total load of IEEE14 standard system to change the active and reactive power, and then obtain the active and reactive power every 5min interval. Here, it is assumed that the growth rate of active power from generator is the same as that of the total load, which can be adjusted by the system operator who knows the power generation plan in advance.
(4)
Calculate the power flow to get the system state vector, that is, the voltage and phase angle of each node.
(5)
Calculate measurement vector according to the measurement equation z = h ( x ) + e .

4.2. Simulate FDIAs

Attackers could launch different attacks depending on the attack model. Thus, there may be a single affected state or multiple affected states. By injecting malicious attacks into the meter, the attacker can alter the measurement data used for state estimation. Therefore, this paper IEEE 14 system has 68 measurements per time step, including node active and reactive power injection, transmission line active and reactive power. For example, if the target is to inject -10% false data into the state θ 2 , the attack vector can be expressed as:
c = [ 0 , 0 V [ 1 × N b u s ] , 0.1 θ 2 , 0 , , 0 θ [ 1 × ( N b u s 1 ) ] ]
To verify this method, FDIAs are simulated using the attack algorithm proposed in [32]. It is known that there are 27 state vectors (14 voltage amplitudes and 13 phase angles) in the IEEE14 bus system. FDIAs are simulated for different node state variables of the system. The state vector after attack is expressed as x b a d = x ^ + c , and the measurement corresponding to the state variables of the manipulated system is shown as:
z b a d = h ( x b a d ) + e

4.3. Probability Distribution of Measurement Variation

The power system is a quasi-static system, which means that the measurement data collected from RTUs should change slowly. At the same time, there is a correlation between the variation of historical data at adjacent times and that of current operational data at adjacent times. The measurement data is expressed as z ( t ) at time t . Therefore, the measurement data variation is defined as z ( t ) z ( t 1 ) . Figure 5 is the histogram of probability distribution of measurement variation from January to October 2012, at which there is no FDIAs. As can be seen from the histogram, most of measurement variations are very small, which are close to zero.
In the absence of FDIAs, the probability distribution of measurement variation between months is similar. Power-law transformation is used to deal with measurement variation in November 2012, so that the probability distribution histogram of measurement variation before and after transformation without FDIAs is obtained, as shown in Figure 6. After power-law transformation, the range of measurement variation is smaller, which makes the setting of detection threshold more accurate.
However, when an attacker injects false data into power system, the probability distribution histogram is offset. In order to illustrate the effect of FDIAs on measurement variation, the experiment simulates the state θ 2 of each day in December 2012 with a +5% false data injection attack. Logarithmic transformation will be used to deal with measurement variation at this time, to obtain measurement variation before and after attack of the probability distribution histogram, as shown in Figure 7. It shows that FDIAs affect the probability distribution of measurement variation.

4.4. Detection Metric and Detection Threshold

EMD, as a similarity metric, quantifies the difference between two probability distributions. Therefore, it can be tested as a detection indicator for FDIAs detection. EMD contains the probability distributions P and Q based on measurement variation between adjacent moments. Among them, Q comes from the probability distribution of benchmark measurement variation (obtained from Figure 5). P includes P 1 and P 2 , which respectively come from the probability distribution of measurement variation in the previous period (obtained from Figure 6) and the probability distribution of measurement variation need to be detected (obtained from Figure 7). The EMD histogram without attack can be obtained by Q and P 1 , and the EMD histogram with FDIAs can be obtained by Q and P 2 , as shown in Figure 8.
Figure 8a is the EMD histogram between the probability distribution of measurement variation under normal operating conditions, which is used to calculate threshold, where the EMD range is (0.09 to 2.62). At the same time, Figure 8b shows the EMD range (3.22 to 5.91) for FDIA in December.
It is clear that FDIA will increase EMD and make the EMD histogram shift to the right. Meanwhile, there is little overlap between EMD histograms in Figure 8, indicating that EMD is an ideal indicator for detecting FDIAs. In other words, there are almost no missing and mis-testing problems with FDIAs based on Earth-Mover Distance.
Assuming that network topology of the test system remains unchanged. It is known from the EMD range without attack that the mean is μ = 0.38 and the standard deviation is σ = 0.21 . By searching the normal distribution z value table, it can be seen that z α / 2 = 2.58 when the confidence level is 99%, so the detection threshold is ε = μ + z α / 2 σ = 0.9218 .
Compare the threshold with the EMD range obtained by the probability distribution of measurement variation need to be detected. It can be seen that the EMD values are all greater than the threshold ε , then FDIAs are detected.

4.5. Effect of JIT on Detection Accuracy

Both transformations contain parameters c and γ . Among them, the measurement data variation s 2 after logarithmic transformation is proportional to c . In order to select the appropriate parameters, a set of c values can be preset firstly, and then the detection rate under different γ values can be obtained by changing the size of γ . Then, in order to analyze the influence of c on the performance of the proposed method, a value of γ can be set first, and the detection rate under different c values can be obtained by changing the size of c , so as to find the relatively optimal parameters c and γ , as shown in Figure 9.
It shows that γ needs to be greater than 1 to have a higher check-out rate (CO%). As shown in Figure 9a, when FDIAs are injected into all nodes, a fixed set of c is taken to obtain CO% at different γ values. As can be seen from line figure, on the one hand, CO% is smaller at γ < 1 , while CO% is higher at γ 1 . On the other hand, for c is 1.5 or 2, CO% is 100% when γ is 1.2 to 1.5.
Similarly, in order to analyze the effect of c on the performance of the proposed detection method, the size of c can be changed on the basis of preset γ value. As shown in Figure 9b, take γ = 1.2 to observe CO% under different c . With the increase of c , CO% is increased. When c 1 , CO% is higher. Therefore, it is desirable to consider CO% under different c and different γ values, c = 1.5 , γ = 1.2 can be taken as the parameter of JIT technology.

5. Results Analysis

This paper introduces the damage degree D, which is defined as the difference between true measurement and attacked measurement. D is generated by different injection attack intensity (IA%). That is, each time FDIAs are initiated, the system state is reduced or increased by a certain percentage of its original value. For example, 0D indicates no attack (IA% = 0), 10D indicates attack intensity is 0.1 (IA% = +10%). Different IA% of single-state and multi-state variables are simulated to observe the influence of different D on the EMD range of the probability distribution of the variation of the measured data to be detected in December, as shown in Table 1. Wherein, the EMD value is very small in attack-free. At the same time, when injecting false data that can evade BDD, the EMD range is shifted to the right, and the offset of the EMD range increases as the attack intensity increases.
In order to test the accuracy of this method on FDIAs detection, and to further observe the impact of D on attacking the state variables of different nodes, FDIA with different damage degrees is simulated for each node state variable. The result is expressed in the form of undetected rate (UD%), which is equal to the number of undetected samples divided by the total number of samples. In other words, the overlapping areas between the two EMD histograms represent UD samples.
The results are compared with [26] and [27]. In [26], based on KL dispersion, FDIAs are detected by using the difference between the probability distribution of measurement variation directly. [27] is based on joint transformation technology to detect FDIAs. In this paper, the direct detection of FDIAs based on EMD and the detection based on EMD&JIT are both simulated and verified. The results show that the FDIAs detection accuracy based on EMD&JIT is better, as shown in Table 2.
In this test, 8992 samples are set for each attack. Each row in Table 2 represents a target system state. FDIAs with +5%, +10%, −5%, −10% attack intensity and normal condition without attack are simulated for each target node state. When the attack intensity is 0D, the simulation results show that 99% of the test samples are determined to be attack-free, indicating that none of the four methods in the table is likely to misjudge an unattacked measurement as false data. However, FDIAs detection method based on KL dispersion has a certain degree of UD% on nodes 2, 3, 7, 8, 12 and 14. Meanwhile, FDIAs detection method based on JIT has UD% on nodes 3 and 8. In addition, FDIAs detection method based directly on EMD has improved, but UD% still exists for nodes 3, 8 and 12. Differently, FDIAs detection method based on EMD&JIT has UD% of close to 0% for all target node state attacks. Therefore, it is shown that for all nodes in power system, the proposed method can detect the vast majority of attack samples, which also reflects the high detection accuracy.

6. Conclusions

FDIAs pose a great threat to power grid operation. In this paper, a new method is proposed to detect FDIAs in smart grids. This detection method is based on the earth-mover distance concept which considers the dynamic correlation of measured data variation at adjacent times. In this paper, EMD is used to measure the deviation between the probability distributions of different measurement variation. 99% confidence interval is considered to set the attack detection threshold. FDIAs are detected by comparing EMD under attack with the preset detection threshold. Furthermore, JIT is used to map the probability distribution of measurement variation to make its distribution characteristics more significant, so as to improve the detection accuracy of FDIAs. It is shown with the simulation results that this method can detect FDIAs for each node well, which has high detection rate and low false detection rate.

Author Contributions

Conceptualization, Z.Q.; Methodology, J.Y.; Data Curation, Y.W.; Writing—Original Draft Preparation, X.G.; Writing—Review and Editing, X.H.; Resources, Y.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Open Fund of State Key Laboratory of Power Grid Safety and Energy Conservation (China Electric Power Research Institute) [No. DZB51202101257].

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Publicly available datasets were analyzed in this study. This data can be found here: https://www.nyiso.com/load-data, accessed on 21 December 2021.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Tang, Y.; Chen, Q.; Mengya, L.I.; Wang, Q.; Ming, N.I.; Liang, Y. Overview on cyber-attacks against cyber physical power system. Autom. Electr. Power Syst. 2016, 40, 59–69. [Google Scholar]
  2. Xian, G. Analysis of Venezuela’s blackouts and suggestions on network security of critical infrastructure. Inf. Technol. Netw. Secur. 2019, 38, 1–2. [Google Scholar]
  3. Deng, R.; Xiao, G.; Lu, R.; Liang, H.; Vasilakos, A.V. False data injection on state estimation in power systems attacks, impacts, and defense: A survey. IEEE Trans. Ind. Inform. 2017, 13, 411–423. [Google Scholar] [CrossRef]
  4. Li, Q.; Sun, H.; Sheng, T.; Zhang, B.; Wu, W.; Guo, Q. Injection attack analysis of transformer false data in substation state estimation. Autom. Electr. Power Syst. 2016, 40, 79–86. [Google Scholar]
  5. Qi, W.; Wei, T.; Yi, T.; Ming, N. A review of the false data injection attack against the cyber physical power system. Acta Autom. Sin. 2019, 45, 74–85. [Google Scholar]
  6. Liu, Y.; Ning, P.; Reiter, M.K. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 2011, 14, 1–33. [Google Scholar] [CrossRef]
  7. Kosut, O.; Jia, L.; Thomas, R.; Tong, L. Limiting false data attacks on power system state estimation. In Proceedings of the 44th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 17–19 March 2010; pp. 1–6. [Google Scholar]
  8. Hu, Z.; Yong, W.; Tian, X.; Yang, X.; Fan, R. False data injection attacks identification for smart grids. In Proceedings of the Third International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), Beirut, Lebanon, 29 April–1 May 2015; pp. 139–143. [Google Scholar]
  9. Qu, Z.; Dong, Y.; Wang, Y.; Chen, L. Improved robust unscented Kalman filtering algorithm for dynamic state estimation of power systems. Autom. Electr. Power Syst. 2018, 42, 87–92. [Google Scholar]
  10. Chen, B.; Li, H.; Li, B. Application research on pseudo measurement modeling and AUKF in FDIAs identification of distribution network. Power Syst. Technol. 2019, 43, 3226–3236. [Google Scholar]
  11. Wang, D.; Guan, X.; Gu, T.; Shen, C.; Xu, Z. Extended distributed state estimation: A detection method against tolerable false data injection attacks in smart grids. Energies 2014, 7, 1517–1538. [Google Scholar] [CrossRef] [Green Version]
  12. Ahmed, S.; Lee, Y.; Hyun, S.-H.; Koo, I. Feature selection-based detection of covert cyber deception assaults in smart grid communications networks using machine learning. IEEE Access 2018, 6, 27518–27529. [Google Scholar] [CrossRef]
  13. Xue, D.; Jing, X.; Liu, H. Detection of false data injection attacks in smart grid utilizing ELM-based OCON framework. IEEE Access 2019, 10, 31762–31773. [Google Scholar] [CrossRef]
  14. Mostafa, M.; Ashkan, S.; Seifi, A.R. A statistical unsupervised method against false data injection attacks: A visualization-based approach. Expert Syst. Appl. 2017, 10, 1016–1035. [Google Scholar]
  15. Li, Y.; Zeng, J. Detection method of false data injection attack on power grid based on improved convolutional neural network. Autom. Electr. Power Syst. 2019, 43, 97–104. [Google Scholar] [CrossRef]
  16. Ahmed, S.; Lee, Y.; Hyun, S.; Koo, I. Unsupervised machine learning-based detection of covert data integrity assault in smart grid networks utilizing isolation forest. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2765–2777. [Google Scholar] [CrossRef]
  17. Wang, D.; Wang, X.; Zhang, Y.; Jin, L. Detection of power grid disturbances and cyber-attacks based on machine learning. J. Inf. Secur. Appl. 2019, 46, 42–52. [Google Scholar] [CrossRef]
  18. Kurt, M.N.; Yilmaz, Y.; Wang, X. Distributed quickest detection of cyberattacks in smart grid. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2015–2030. [Google Scholar] [CrossRef]
  19. Li, S.; Yilmaz, Y.; Wang, X. Quickest detection of false data injection attack in wide-area smart grids. IEEE Trans. Smart Grid 2015, 6, 2725–2735. [Google Scholar] [CrossRef]
  20. Malhotra, P.; Vig, L.; Shroff, G.; Agarwal, P. Long short term memory networks for Anomaly detection in time series. In Proceedings of the 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Bruges, Belgium, 22–24 April 2015; pp. 89–94. [Google Scholar]
  21. Liu, L.; Esmalifalak, M.; Ding, Q.; Emesih, V.A.; Han, Z. Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid 2014, 5, 612–621. [Google Scholar] [CrossRef]
  22. Mestav, K.R.; Tong, L. Universal Data Anomaly Detection via Inverse Generative Adversary Network. IEEE Signal Process. Lett. 2020, 27, 511–515. [Google Scholar] [CrossRef]
  23. Khalid, H.M.; Peng, J. Immunity toward data-injection attacks using multisensor track fusion-based model prediction. IEEE Trans. Smart Grid 2017, 8, 697–707. [Google Scholar] [CrossRef]
  24. Liu, X.; Wu, Z. Online defense research of spatial-hidden malicious data injection attacks in smart grid. Proc. Chin. Soc. Electr. Eng. 2020, 13, 1520–1534. [Google Scholar]
  25. Zhao, J.; Zhang, G.; Scala, M.L.; Dong, Z.Y.; Chen, C.; Wang, J. Short-term state forecasting-aided method for detection of smart grid general false data injection attacks. IEEE Trans. Smart Grid 2017, 4, 1580–1590. [Google Scholar] [CrossRef]
  26. Gu, C.; Jirutitijaroen, P.; Motani, M. Detecting false data injection attacks in ac state estimation. IEEE Trans. Smart Grid 2015, 5, 2476–2483. [Google Scholar]
  27. Singh, S.K.; Khanna, K.; Bose, R.; Panigrahi, B.K.; Joshi, A. Joint-transformation-based detection of false data injection attacks in smart grid. IEEE Trans. Ind. Inform. 2018, 14, 89–97. [Google Scholar] [CrossRef]
  28. Cheng, G.; Lin, Y.; Chen, Y.; Bi, T. Adaptive State Estimation for Power Systems Measured by PMUs With Unknown and Time-Varying Error Statistics. IEEE Trans. Power Syst. 2021, 36, 4482–4491. [Google Scholar] [CrossRef]
  29. Abur, A.; Exposito, A.G. Power System State Estimation: Theory and Implementation, 3rd ed.; CRC Press: Boca Raton, FL, USA, 2004. [Google Scholar]
  30. Rubner, Y.; Tomasi, C.; Guibas, L.J. The Earth Mover’s Distance as a metric for image retrieval. Int. J. Comput. Vis. 2000, 40, 99–121. [Google Scholar] [CrossRef]
  31. Gonzalez, R.C.; Woods, R.E. Digital Image Processing, 3rd ed.; Pearson: Upper Saddle River, NJ, USA, 2008. [Google Scholar]
  32. Hug, G.; Giampapa, J.A. Vulnerability assessment of ac state estimation with respect to false data injection cyber-attacks. IEEE Trans. Smart Grid 2012, 3, 1362–1370. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Process of FDIAs detection method.
Figure 1. Process of FDIAs detection method.
Energies 15 01733 g001
Figure 2. EMD optimal transport.
Figure 2. EMD optimal transport.
Energies 15 01733 g002
Figure 3. IEEE 14 bus system.
Figure 3. IEEE 14 bus system.
Energies 15 01733 g003
Figure 4. NYISO map.
Figure 4. NYISO map.
Energies 15 01733 g004
Figure 5. Histogram of measurement variation from January to October.
Figure 5. Histogram of measurement variation from January to October.
Energies 15 01733 g005
Figure 6. Histogram of measurement variation in November. (a) Before power-law transformation. (b) After power-law transformation.
Figure 6. Histogram of measurement variation in November. (a) Before power-law transformation. (b) After power-law transformation.
Energies 15 01733 g006
Figure 7. Histogram of measurement variation in December with FDIAs ( θ 5 with +5% FDIAs). (a) Before logarithmic transformation. (b) After logarithmic transformation.
Figure 7. Histogram of measurement variation in December with FDIAs ( θ 5 with +5% FDIAs). (a) Before logarithmic transformation. (b) After logarithmic transformation.
Energies 15 01733 g007
Figure 8. Histogram of EMD values. (a) No attack. (b) +5% θ 5 FDIAs.
Figure 8. Histogram of EMD values. (a) No attack. (b) +5% θ 5 FDIAs.
Energies 15 01733 g008
Figure 9. Parameter setting of JIT. (a) Check-out rates (CO%) at different values γ . (b) Check-out rates (CO%) at different values c .
Figure 9. Parameter setting of JIT. (a) Check-out rates (CO%) at different values γ . (b) Check-out rates (CO%) at different values c .
Energies 15 01733 g009
Table 1. Consider the range of EMD under different attack intensity.
Table 1. Consider the range of EMD under different attack intensity.
Attack StateAttack Intensity (IA%)EMD Range
No attack0D(0.08~2.37)
θ 5 1D(0.88~3.34)
5D(2.61~4.38)
10D(2.98~4.83)
θ 5 , θ 9 , θ 10 1D(2.35~5.31)
5D(5.90~7.67)
10D(6.46~8.02)
Table 2. FDIAs test results for each node.
Table 2. FDIAs test results for each node.
StateKLD[26]
UD% for IA%
Joint Transformation[27]
UD% for IA%
5D10D–5D–10D5D10D–5D–10D
θ 2 20100000
θ 3 563255220.030.020. 160.14
θ 4 00000000
θ 5 00000000
θ 6 00000000
θ 7 706170580000
θ 8 9595969646.6046.60
θ 9 00000000
θ 10 00000000
θ 11 00000000
θ 12 20100000
θ 13 00000000
θ 14 70500000
StateEMD UD% for IA%EMD&JIT UD% for IA%
5D10D–5D–10D5D10D–5D–10D
θ 2 00000000
θ 3 0.0100.0100000
θ 4 00000000
θ 5 00000000
θ 6 00000000
θ 7 00000000
θ 8 1.020.921.020.920000
θ 9 00000000
θ 10 00000000
θ 11 00000000
θ 12 0.0300.0300000
θ 13 00000000
θ 14 00000000
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Qu, Z.; Yang, J.; Lang, Y.; Wang, Y.; Han, X.; Guo, X. Earth-Mover-Distance-Based Detection of False Data Injection Attacks in Smart Grids. Energies 2022, 15, 1733. https://doi.org/10.3390/en15051733

AMA Style

Qu Z, Yang J, Lang Y, Wang Y, Han X, Guo X. Earth-Mover-Distance-Based Detection of False Data Injection Attacks in Smart Grids. Energies. 2022; 15(5):1733. https://doi.org/10.3390/en15051733

Chicago/Turabian Style

Qu, Zhengwei, Jingchuan Yang, Yansheng Lang, Yunjing Wang, Xiaoming Han, and Xinyue Guo. 2022. "Earth-Mover-Distance-Based Detection of False Data Injection Attacks in Smart Grids" Energies 15, no. 5: 1733. https://doi.org/10.3390/en15051733

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop