Abstract
Coordinated cyber attacks tamper with measurement data to disrupt the situational awareness of active distribution systems. Various sensors report measurements asynchronously at different rates, which introduces challenges during state estimation. In addition, this forces cyber intruders to exert greater effort to compromise multiple communication channels and launch coordinated attacks. Therefore, multi-channel and asynchronous measurements could be harnessed to develop more secure cyber defense strategies. In this paper, a prediction-correction-based multi-rate observer is designed to exploit the value of asynchronous measurements for the detection of coordinated false data injection (FDI) attacks. First, a time-function-dependent prediction-correction strategy is proposed to adjust the sampling interval for each sensor’s measurement. Then, an observer is designed based on the trade-off between estimation error and the optimal period of the most recent sampling instant, with the convergence of estimation error with the maximum permitted sampling interval. Moreover, the conditions for exponential stability are developed using the Lyapunov–Krasovskii functional technique. Next, a coordinated FDI attack detection strategy is developed based on the dual nonlinear minimization problem. The proposed attack detection and secure state estimation strategies are tested on the IEEE 13-node system. Simulation results show that these schemes are effective in enhancing attack detection based on asynchronous measurements or compromised data.
1. Introduction
In active distribution systems, different sensors and measurement devices (e.g., phasor measurement units (PMUs), smart meters, DERs, and SCADAs) can provide multiple types of sensing information in time and space [1]. The varying sampling rates of these devices can produce asynchronous measurements. However, existing state estimation methodologies are not designed to utilize these asynchronous data [2]. In this context, efficiently utilizing multi-sensor information remains a key challenge for distribution system operation and control. On the other hand, the diverse and open nature of communication networks heightens the vulnerability of distribution system state estimation to cyber attacks [3]. Thus, attackers aim to penetrate communication networks and maintain deception through falsified states long enough to cause severe and unforeseen damage to the physical system. Recently, coordinated false data injection (FDI) attacks have drawn a lot of attention and have severely damaged power systems [4]. For example, BlackEnergy Malware attacked 60 substations of the Ukrainian electricity network in 2015, resulting in a three-hour power outage in western Ukraine. The 2017 incident at a U.S. nuclear power plant and the 2019 power outages in Venezuela show that cyber attacks are a serious threat to the secure operation of power systems [5]. Additionally, hackers launched a denial-of-service (DoS) attack against the American grid using firewall flaws in 2019 [6], which prevented grid operations from monitoring power networks in the states of Wyoming, Utah, and California.
The hypothesis of our research is that we can utilize asynchronous measurements to detect coordinated cyber attacks. It is reasonable to assume that it is almost impossible (or, if possible, very costly) for attackers to compromise multiple different communication channels. Therefore, the motivation of this paper is to exploit multi-channel information for intrusion detection. A few studies on asynchronous measurements and cyber attacks have been reported in the literature, which are briefly summarized below.
First, considering multiple sensors and asynchronous measurements, the authors of [7] developed an optimization-based fusion estimation method for sensor attacks. Dealing with joint FDI attacks, a multiple-state estimation algorithm [8] was established by using a game–theoretic technique. In an online setting, a round-based synchronization mechanism approach was introduced in [9] to estimate asynchronous measurements. In the case of asynchronous measurements with various types of noises, the authors of [10] proposed a suboptimal distributed consensus filter method. Subject to asynchronous modes and energy-limited DoS attacks, non-fragile asynchronous control was proposed based on a hidden Markov model [11]. Corresponding to aperiodic asynchronous measurements, the authors of [12] developed a hybrid observer using a sum-of-squares decomposition approach. A matrix-weighted fusion estimation algorithm was developed in [13] with multiple asynchronous sampling sensors. Based on the contextualization of asynchronous discrete-time measurements, an LMI-dependent time-varying observer was presented in [14].
Several studies have analyzed the impact of cyber attacks on active distribution system state estimation, primarily addressing individual attacks [15]. While each weak component or communication channel is vulnerable to hostile FDI attacks, coordinated FDI attacks can simultaneously target multiple interconnected components or channels, posing a far greater threat to distribution grids [16]. However, there has been a lack of investigation into security issues under coordinated FDI attacks, possibly due to the challenge of properly mathematically modeling the couplings of attack sequences [17]. These factors motivated us to conduct a thorough investigation of coordinated FDI attacks, leverage hidden information from asynchronous measurements, and develop intrusion detection methods grounded in the distributional characteristics of the system state estimation framework.
Despite recent advances, notable gaps continue to exist in the areas of state estimation and cybersecurity for active distribution systems. Specifically, many existing approaches fail to account for asynchronous observations with varying data rates. Consequently, even when measurement data are considered, these approaches lack the capability to detect coordinated FDI attacks. As a result, we pinpoint three major research gaps, which can be summarized as follows:
- The problem of asynchronous measurements in active distribution systems is not sufficiently addressed by current state estimation techniques.
- Conventional secure observer design does not integrate prediction correction functionality and is not capable of dealing with both cyber attacks and asynchronous measurements.
- Current approaches to FDI attack detection often focus on random FDI attacks and do not consider coordinated attacks across multiple devices.
Built upon the works in the literature and the research gaps, this paper further advances the technique and makes the following contributions:
- As a first attempt, a secure state estimation is developed for an active distribution system, where measurement output data are asynchronous and vulnerable to coordinated FDI attacks. In this approach, a sensor time function is proposed to illustrate the asynchronous samplings of measurement devices. Next, in order to adjust the length of the sampling interval of each sensor, we advance the prediction correction algorithm by utilizing the Levenberg–Marquardt strategy and Newton’s method.
- In contrast to traditional secure observer designs, this work introduces a multi-rate observer that leverages a sensor time function and prediction correction outputs to estimate asynchronous and compromised measurements.
- This scheme introduces an attack detection method by using a dual nonlinear optimization approach to automatically filter out possible coordinated FDI attacks.
The structure of the remainder of this paper is as follows: Section 2 introduces the concept of asynchronous measurements and coordinated FDI attacks in an active distribution system. Section 3 introduces the methodology of prediction-correction-based multi-rate observer. Then, Section 4 describes the attack detection approach. Simulation results and analysis are presented in Section 5, and Section 6 summarizes the conclusions.
2. Problem Formulation
Maintaining secure state estimation in active distribution systems has become increasingly challenging due to two major issues: the diversity of measurement sources and the growing vulnerability to cyberattacks. First, different sampling rates are applied to asynchronous data streams generated by various measuring devices. Moreover, these data are susceptible to coordinated false data injection (FDI) attacks that can mislead operators and disrupt system operation. This section introduces coordinated FDI attacks and asynchronous measurements.
2.1. Asynchronous Measurements
In an active distribution system, different measurement devices have different sampling rates. For example, PMU normally sends each measurement per second, SCADA collects each measurement per 2–5 s, AMI normally sends measurements once every 15 min, and economic billing devices send measurements about 5–20 times per hour. As shown in Table 1, there are different devices available in active distribution systems, such as PMU, SCADA, advanced metering infrastructure (AMI), economic billing, and distributed energy resource (DER). represents state estimation for different types of devices. X represents a measurement that is present from a particular device, while 0 represents an absent measurement at any time step. This conceptual structure is defined as the asynchronous measurement of an active distribution system.
Table 1.
Asynchronous measurements in active distribution systems. The red column () indicates the time step when all devices fail to send measurements to the DSO.
In practical applications, the majority of measurement devices cannot send measurements in real time. Therefore, the state estimation system runs only once every 15 min in a distribution network, which creates a major challenge for real-time situational awareness. This paper considers three types of measurements and operation devices: PMUs, which can measure complicated voltages and power injections; smart meters, which can measure voltage magnitudes; and power injections. On the other hand, DER does not act as a measurement device like a PMU or smart meter, but it has monitoring functions (e.g., inverter parameters, SOC, and power output) that can provide operational data.
In general, there are large gaps in the time between measurements and operational data from PMUs, smart meters, and DERs. As a result, we consider a scenario where only a portion of the sensors provides data to the system operator at time , which may not be uniformly distributed. Therefore, without loss of generality, it is assumed that measurements are taken in intervals from a selection of buses, represented by . They are compiled in the measurement vector , modeled as . Here, is the output of the active distribution system, is the state variable, and is the output matrix. Consideing the time-varying situation, the communication graph and the system connected matrix are induced by the communication graph. By limiting communication to the edge set , the prediction correction algorithm and multi-rate observer can be deployed in an active distribution system. In order to simplify the calculation, but without loss of generality, it is assumed that grid operators collect the same amount of measurement and operational data at each sampling interval, i.e., for all t, [18]. The selection matrix chooses the elements collected at timestamp t. Individual parts of the selection matrix depend on the collection of buses measured in . Thus, we can write .
2.2. Coordinated FDI Attacks
FDI attacks occur when adversaries intentionally alter sensor measurements in a deceptive manner, leading to undetectable errors in the estimation of state vectors and corresponding system outputs. In this paper, coordinated FDI attacks are defined based on the attack area as shown in Figure 1.
Figure 1.
An example of coordinated FDI attacks: (a) two FDI attackers inject falsified values in bus 3 and bus 4 coordinately; (b) green bar shows stealthy FDI attacks and red bar shows non-stealthy coordinated attacks.
As shown in Figure 1a, FDI attacker 1 launches at bus 3 and FDI, attacker 2 launches at bus 4, assuming both have the same coordinated objective, which is to destroy the performance of the lines between buses 2–3 and buses 4–5. In addition, when FDI attacks occur at multiple points in the grid, the affected regions can influence nearby unaffected areas, allowing the attack’s impact to spread through the entire network. In this paper, a new class of coordinated FDI attacks is defined, where the duration of attacks is considered as shown in Figure 1b. Mathematically, it can be formulated as
where represents the coordinated FDI attack vector.
In real systems, adversaries can falsify data from PMUs, smart meters, and DERs simultaneously across different nodes, aiming to launch coordinated FDI attacks that degrade system performance over a specific period of time.
3. Methodology
In this section, a multi-rate observer based on the prediction correction algorithm is introduced to utilize the asynchronous measurements for coordinated FDI attack detection. As shown in Figure 2, there are four major blocks in the control framework. First, the sensor unit receives the control signals of distribution grids at different sampling rates. Then, these control signals are sent to the prediction correction unit, where the sampling interval is adjusted to enable all signals within the observer interval. Next, the multi-rate observer unit takes both the adjusted signals and the asynchronous measurements to perform the state estimation. Finally, the attack detection unit receives the estimated states and applies a dual nonlinear optimization method to detect coordinated FDI attacks. The details of each unit are presented as follows.
Figure 2.
Proposed framework of prediction-correction-based observer design.
3.1. Prediction Correction Algorithm
The objective of the prediction correction algorithm is to adjust the sampling intervals of all sensors so that they are synchronized within the observer period at each synchronization time, i.e., . The time interval is adjusted by the prediction correction algorithm. The sampling time (t) has a length between the sensor’s consecutive intervals and , as shown in Equation (2).
where is the time interval between consecutive samples.
Figure 3 shows that multi-time function-based sensors are considered, where each sensor maintains a particular time series. For example, sensor 1 has a square, sensor 2 has a sawtooth, and sensor 3 has a triangle function. The green and red lines represent the next sampling and sampling interval, respectively. It is shown that the data are sampled by multiple sensors at distinct rates and are corrupted by coordinated FDI attacks. Asynchronous measurements can occur at any time within the upper and lower constraints, with sample rates ranging from the maximum to the minimum rates. The vertical black arrows represent measurement arrivals from different sensors at distinct sampling instants within the same control period.
Figure 3.
Adjustable sampling period with prediction correction algorithm.
In the following, a prediction step is introduced to deal with the objective; thus, the Levenberg–Marquardt algorithm can be written [19] as
where is the output solution, is the Hessian of function , is the damping factor at iteration p, and I is the identity matrix.
Remark 1.
The advantage of adopting the Levenberg–Marquardt algorithm is that the prediction process converges faster than the noisy gradient descent algorithm. Also, in the presence of coordinated FDI attacks, it can handle the compromised system model with multiple free parameters that are not precisely known, which is preferable for application in intrusion detection.
We use the Levenberg–Marquardt method in the prediction step because it works as trust-region control by combining the Gauss–Newton and gradient descent algorithms. A crucial function of the damping factor is to avoid divergence with compromised data. Therefore, it makes the algorithm robust in the presence of coordinated FDI attacks and can direct the state estimation process toward a feasibility region.
After the prediction step, it is necessary to refine the estimate using Newton’s method because it achieves quadratic convergence and is highly efficient when estimation is near the true value. In the correction phase, Newton method [20] is applied as
for , where C is the predetermined number of Newton’s steps; is the gradient of function.
In the following, correction step (5) converges to the sampled trajectories within an asymptotic boundary under standard limits on the time step size. Consider the sequence that the prediction correction algorithm develops and assume that coordinated FDI attacks are successful. This algorithm is applied to solve the optimization issue, i.e., to adjust the sampling interval. Let m be the strong convexity constant for convergence. Thus, the underlying variables are defined as and . At the synchronization time, choose a step size such that , , where W is the Lipschitz constant [21]. The contraction property for prediction correction steps [22] verify
According to [23], the quantity of correction steps is then determined as
3.2. Multi-Rate Observer
In order to estimate the state between two successive measurements, the multi-rate observer is constructed based on the output state of the prediction correction algorithm. Considering system matrix , control matrix , and control input , the observer gain L is defined as follows [24]:
The observer gain matrix L is designed in such a way that the estimation error dynamics remain stable with asynchronous measurements and coordinated FDI attacks. For this, L is chosen in practice such that the eigenvalues of the augmented error system fall in the left-half plane to ensure the exponential convergence of the estimation error.
Next, the estimated states and control input can be used to calculate the observer outputs in the following format:
where is the sensor’s time function.
However, the observer is not required to retain estimated states during the entire period. Thus, interval is considered.
The concept of estimation error includes
where is used to denote the period since the last sample instant for each sensor.
For each sensor, the maximum permitted sample interval can be expressed as
Let us characterize an appropriate vector space of function in order to demonstrate the stability of the estimation error. Thus, the function can be defined as follows:
Then, the augmented system is defined as follows:
where
In the augmented system in Equations (16) and (17), the value for each sensor i shows how much time has passed since its last measurement arrived. This time is used in , where represents the most recent available data from sensor i. In this way, the augmented system collects the latest information from all devices. Then, the estimation error is constructed by using this time state. Finally, when a new measurement comes in, the corresponding is reset to zero. This keeps the augmented system consistent with the actual arrival of data.
3.3. Stability Condition
Now we can denote the inequality conditions in order to establish the exponential stability of the estimation error of the multi-rate observer. Take into account the augmented linear dynamic system (16) for the distribution system and an estimated error (17) for a multi-rate observer. Considering the problem of asynchronous measurements and coordinated FDI attacks, the estimation error is globally, uniformly, and exponentially stable, including a rate of decay (≥), with the following augmented vector , which is considered to facilitate the analysis of .
Consequently, can be redefined based on (18) as follows:
There exists at least one period , , with a distance greater than for any period that traverses an interval longer than . In at least one interval with a nonzero value, this makes the final inequality stringent because it conforms to the result of (20). Then, by using Lyapunov–Krasovskii functional [25], Equation (19) satisfies the following inequality conditions:
where is the Lyapunov function candidate with and ; ; and are positive scalars.
There is a finite number of sample intervals , , for any interval of time with a duration less than , as in (2). Thus, the Zeno phenomenon is not present. However, it can be concluded from (20) that, with an overshoot less than and a decay rate greater than , the estimation error is exponentially stable.
4. Attack Detection Method
The observer state estimation may suffer from significant performance deviations due to coordinated attacks. Thus, aggregating these facts, the absolute variation for the state variables of the considered system is constructed as follows:
where and are the upper and lower bounds for the observer state variable, respectively. and are the deviations of the upper and lower limits for the observer state variable, respectively. Since the optimal operating level is represented by , the estimated state is defined as
where is the abnormal state, and is the normal state. represents the estimated state obtained from the observer. Finally, the proposed attack detection strategy based on a dual nonlinear minimization problem [26] is modeled as follows:
where is the vector with value of 1 for the j-th element and 0 for other elements, is the outer variation in the observer state in the upper and lower directions, and is the total power injection in phase p (p ∈ set of phases A, B, and C) in node i. and are the active and reactive powers, respectively; is the voltage angle difference between the p and m phases; and are the reactive and real parts of the admittance matrix; is a binary variable; is the fixed load; is the maximum load. For non-equality constraints, and are the limits of generator real power ; and are the limits of generator reactive power ; and are the line limits; and are the limits of voltage magnitude ; and are the limits of voltage angle .
Remark 2.
The dual nonlinear optimization problem (23)–(32) is dependent on the state variables in (23) and decision variables in (24)–(32). The optimal detection objective (23) maximizes the normal deviation of all states subject to coordinated FDI attacks. Two types of constraints, i.e., equality and inequality, comprise the operating constraints, power balance constraints, load, and injection constraints. The goal is to maximize the estimation error between the estimated and true states, while taking into account the limitations imposed by the attack vector. This requires consistently solving the dual problem to update the Lagrange multipliers [27] and find the optimal state estimates and attack vectors while guaranteeing convergence to the best solution.
5. Simulation Results and Discussion
The proposed method was tested on the IEEE 13-node test feeder [28]. The algorithm code is accessible to everyone from a GitHub repository [29]. As shown in Figure 4, there are four attack regions, including attack region 1 {611C, 652A, 684AC, 671AC}. attack region 2 {645BC, 646BC}, attack region 3 675ABC, 692AC, 671ABC}, and attack region 4 {650HBC, 650LBC, 632BC, 645BC, 646BC, 633BC, 671BC}. The compromised nodes are 611C, 684AC, 646BC, 675ABC, and 633BC. Accordingly, Table 2 shows the state variables of the IEEE 13-node system in the normal state and attacked state (red). The table represents the steady-state normal measurement states at nodes 646, 645, 632, 611, 633, 684, and 692. We injected false data for voltage and angles at different nodes. The third column highlighted in red presents the compromised voltages and angles at phases A, B, and C.
Figure 4.
IEEE 13-node distribution system with coordinated FDI attacks.
Table 2.
Attacked states for different nodes of IEEE 13-node system.
5.1. Estimation Error of Multi-Rate Observer
We inspect the norm of the average power injection estimation error , as represented in Figure 5. Under coordinated FDI attacks, the error goes to the origin at different values for the prediction correction parameter . It is observed that the error converges more quickly to the origin when . But, the blue curve shows larger oscillations. In contrast, when , the yellow curve represents a smoother response. This trend demonstrates a definite trade-off between stability and accuracy in adjustment. Recent research on attack detection and resilient state estimation in power systems has revealed similar results. For example, Liu et al. [30] showed that proper design of control gain and observer gain improves robustness against unknown FDI attacks in microgrids. On the other hand, Lv et al. [31] showed that poor parameter selection can considerably increase estimation errors during cyber attacks.
Figure 5.
Average power injection estimation error under coordinated FDI attacks.
Next, we observe the norm of the average voltage estimation error under coordinated FDI attacks, which are reported in Figure 6. It is observed that the norm of the average error becomes negative under different parameter value () and maintain to be within a bound (). It is clear that the error gradually decreases, but remains bounded below . This behavior indicates stability in the presence of coordinated FDI attacks. However, when , the blue curve shows that the error converges more quickly with low oscillations. In contrast, when , the yellow curve shows a smoother trajectory. However, in this case, the response needs more time to settle. According to other recent research [32], transient stability in the face of cyberattacks depends on bounded error convergence. Overall, this result confirms that careful selection of parameters improves robustness of secure control design in a smart grid network.
Figure 6.
Average voltage estimation error under coordinated FDI attacks.
5.2. Attack Detection Result
The results of the proposed estimation algorithms are summarized in Table 3. The first column represents active and reactive power at different nodes. The second column shows normal power flow without any attacks, and the third column shows the obtained measurements without any estimation method. By using the proposed algorithms, we found compromised measurements in the fourth column. The differences listed in the fifth column show that the compromised measurements fluctuate more than compared to the normal value. This demonstrates that the combination of a prediction correction algorithm, a multi-rate observer, and an optimization method successfully handles asynchronous measurement as well as detects attacked measurements.
Table 3.
Power flow measurements with and without attacks using our proposed method.
This trend is further elaborated and demonstrated in Table 4, which shows the estimation of multi-rate asynchronous measurements under coordinated FDI attacks. The first column shows that measurement devices (PMU, SM, and DER) are placed at nodes 650H, 632, 645, 671, 675, 684, 652, and 611. Then, 44 time steps are observed, and power measurements are obtained. At node 650H, PMU measurements are obtained from time step to . At , the active power measurement deviates from the approximate normal value of 182 kW to 236.71 kW. At node 632, smart meter measurements are observed, and the deviations are found from time steps to . Similarly, at node 675, DER is placed, and a deviation in measurements occurs from time , which clearly shows that the measurements are compromised.
Table 4.
Power flow measurements at different nodes over time. Red values indicate anomalies detected.
The proposed approach is applied to detect coordinated FDI attacks. It is observed that the voltage attack happens at nodes 646, 645, 632, 611, and 692, and the angle attack is launched at nodes 646, 645, 632, 633, 684, 611, and 692, as shown in Table 2. We obtain measurements of falsified data based on the analytical solution of a dual nonlinear minimization problem, which maximizes the deviations of power and voltage. By running the dual nonlinear optimization method, the fluctuation in attacked measurements is clearly shown, where the compromised measurements are usually undetectable without the dual nonlinear minimization approach.
We observe certain limitations in this proposed secure estimation process. First, active distribution system modeling considering asynchronous measurement is difficult in a simulation platform, for example, in the Simulink model with the IEEE 13-bus feeder. Furthermore, a real active distribution system is large and consists of nonlinearity and uncertainty, which are not straightforward to consider in a simulation model. Second, it is quite difficult to validate the proposed controller for a real complex system, considering asynchronous measurements and coordinated cyber attacks because it is challenging to solve a linear minimization problem in real-time implementations.
5.3. Limitations and Future Work
The proposed algorithm is built with a set of well-defined classes that expose clear interfaces for each task, i.e., linear system modeling, asynchronous measurements, and coordinated cyber attacks in the system. Then, a secure observer state is used as the input to the optimization that acts as an attack detector. Such a hypothetical idea for an algorithm has some limitations in terms of modeling, scalability, and data realism. Initially, the algorithm uses a sensor time function to explicitly address heterogeneous sampling. With a multi-rate observer with Lyapunov–Krasovskii guarantees, a prediction step based on the Levenberg–Marquardt algorithm, a corrective step based on the Newton technique, and the asynchronous field behavior are effectively produced in a common simulator, which is challenging. The most important fact is that the real feeder is subject to uncertainty and is large and unbalanced, which are not trivial to encode. Second, the coordinated FDI detector utilizes a dual nonlinear minimization approach that must be solved repeatedly. During multi-device dropouts, larger networks need a time budget for solving constrained issues. Third, even though our research shows that coordinated cyberattacks on voltage magnitudes, angles, and targeted areas on the IEEE-13 feeder can be detected, they still need to be carefully examined and verified using utility-grade datasets.
In future work, we intend to implement three distinct extensions as follows: (i) Scalability and fidelity of physics: We will use full AC power-flow models in place of simplified equivalents. These will feature comprehensive representations of transformers and regulators, including thermal limits and current. The test systems will also be expanded to larger unbalanced feeders, including the IEEE 34-, 37-, and 123-bus networks with distributed energy resources. (ii) Runtime robustness: we will incorporate event-triggered control features with optimization solutions. In addition, we will consider adaptive gains to track operating-point drift, such as load or voltage changes in a power grid. (iii) Data-driven resilience and validation: To provide defense-in-depth against coordinated cyber attacks, we will utilize estimation residuals with cyber logs. The multifaceted operation for adversarial and missing data is performed using distributionally resilient optimization techniques. Tests in the field and with hardware-in-the-loop will be used to assess false-alarm trade-offs, ROC/AUC performance, and latency. Creating a deployable pipeline for secure state estimation in the presence of asynchronous and multi-rate measurements is the objective.
6. Conclusions
This paper proposes a secure state estimation design with asynchronous measurements for active distribution systems, considering coordinated FDI attacks. The estimator is developed with a combination of a multi-rate observer, along with a sensor time function and a prediction correction algorithm. The proposed approach has two attractive characteristics: (1) the approach manages asynchronous measurements in a distribution network, and (2) the detection unit of this proposed framework uses a dual nonlinear optimization method to perform coordinated FDI attack detection. The case study shows that this double estimation (prediction correction and observer) approach can provide secure estimation results. Overall, the proposed estimation process includes two important features, i.e., integrating a multi-rate observer with a prediction correction method. The predictor phase utilizes the Levenberg–Marquardt algorithm to make robust estimations in the presence of coordinated FDI attacks. In addition, the corrector phase refines estimates with Newton’s method to facilitate the prediction of the near-true value of asynchronous measurements. Finally, the secure estimator approach is validated with the IEEE 13-bus feeder, considering bounded sampling intervals and a coordinated FDI attack model.
Future work could be extend to systems larger than 13 busses, for instance, the IEEE 34-bus distribution system with voltage regulators. An unbalanced IEEE 37-bus test feeder could be used with DER integration and cyber attack studies. In addition, considering unbalanced loading with power, impedance, and current, we could utilize a 123-bus feeder to evaluate real-time performance. Furthermore, to improve robustness, observers could utilize a learning-based approach, for example, physics-informed learning that can learn both Kirchhoff’s laws and data measurements.
Author Contributions
Both authors contributed equally to this manuscript. All authors have read and agreed to the published version of this manuscript.
Funding
This work was supported by the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy (EERE) under the Solar Energy Technology Office (SETO) Award Number DE-EE0009339.
Data Availability Statement
The data presented in this study are available on request from the corresponding author.
Conflicts of Interest
The authors declare no conflicts of interest.
References
- Pegoraro, P.A.; Sitzia, C.; Solinas, A.V.; Sulis, S.; Carta, D.; Benigni, A. Improved Fault Detection and Location Method in Three-Phase Distribution Networks Leveraging Traceable PMU Measurements. IEEE Trans. Instrum. Meas. 2025, 74, 9004312. [Google Scholar] [CrossRef]
- Qu, B.; Wang, Z.; Shen, B. Fusion estimation for a class of multi-rate power systems with randomly occurring SCADA measurement delays. Automatica 2021, 125, 109408. [Google Scholar] [CrossRef]
- Dehbozorgi, M.R.; Rastegar, M.; Arani, M.F.M. False Data Injection Attack Detection and Localization Framework in Power Distribution Systems Using a Novel Ensemble of CNNs and Explainable Artificial Intelligence. IEEE Trans. Ind. Appl. 2025, 61, 4801–4811. [Google Scholar] [CrossRef]
- Asghari, M.; Ameli, A.; Ghafouri, M.; Uddin, M.N. Optimal Data Aggregation Reconfiguration Scheme to Mitigate Stealthy False Data Injection Attacks in Energy Management Systems. IEEE Trans. Smart Grid 2025, 16, 3269–3281. [Google Scholar] [CrossRef]
- Presekal, A.; Rajkumar, V.S.; Ştefanov, A.; Pan, K.; Palensky, P. Cyberattacks on Power Systems. In Artificial Intelligence Applications in Modern Power Systems; Parizad, A., Baghaee, H.R., Rahman, S., Eds.; Wiley: Hoboken, NJ, USA, 2025; Chapter 15. [Google Scholar] [CrossRef]
- Mondal, S.; Prudhvi, B.; Khare, P.; Reddy, M.J.B. Real-time Analysis of Cyber Attacks in SCADA Based Power System. Aust. J. Electr. Electron. Eng. 2025, 1–25. [Google Scholar] [CrossRef]
- Hu, Z.; Ni, C. An Optimization-Based Fusion Estimation Method for Multi-Sensor Measurement Considering Node Detection Risk. Measurement 2026, 257 Pt C, 118728. [Google Scholar] [CrossRef]
- Zhang, C.; Ma, Y. Multi-Estimator Framework for Robust FDI Attack Detection in Smart Grids. IEEE Trans. Circuits Syst. I Regul. Pap. 2025, 72, 5092–5105. [Google Scholar] [CrossRef]
- Zhang, X.; Liu, Y.; Gu, S.; Tian, Y.; Gao, Y. Multi-Level Asynchronous Robust State Estimation for Distribution Networks Considering Communication Delays. Energies 2025, 18, 3640. [Google Scholar] [CrossRef]
- Hu, Y.; Lin, X.; Peng, K. Distributed Consensus Filtering over Sensor Networks with Asynchronous Measurements. Int. J. Adapt. Control Signal Process. 2025, 39, 101–115. [Google Scholar] [CrossRef]
- Ni, Z.; Cui, P.; Li, F.; Su, L.; Guo, Y.; Chen, W. Nonfragile H∞ Asynchronous Control for 2-D Roesser Systems with Markov Model-Based Energy-Limited DoS Attacks. Int. J. Dyn. Control 2025, 1–11. [Google Scholar] [CrossRef]
- Landicheff, G.; Ménard, T.; Gehan, O.; Pigeon, E. Continuous–Discrete Time Observer Design for Multi-Output Linear Continuous Systems with Aperiodic Asynchronous Measurements. IEEE Control Syst. Lett. 2022, 6, 3002–3007. [Google Scholar] [CrossRef]
- Sun, S.; Peng, F.; Lin, H. Distributed Asynchronous Fusion Estimator for Stochastic Uncertain Systems with Multiple Sensors of Different Fading Measurement Rates. IEEE Trans. Signal Process. 2018, 66, 641–653. [Google Scholar] [CrossRef]
- Sferlazza, A.; Tarbouriech, S.; Zaccarian, L. Time-Varying Sampled-Data Observer with Asynchronous Measurements. IEEE Trans. Autom. Control 2019, 64, 869–876. [Google Scholar] [CrossRef]
- Wu, Y.; Ru, Y.; Lin, Z.; Liu, C.; Xue, T.; Zhao, X.; Chen, J. Research on Cyber-Attacks and Defensive Measures of Power Communication Network. IEEE Internet Things J. 2023, 10, 7613–7635. [Google Scholar] [CrossRef]
- Li, B.; Lu, R.; Xiao, G.; Li, T.; Choo, K.-K.R. Detection of False Data Injection Attacks on Smart Grids: A Resilience-Enhanced Scheme. IEEE Trans. Power Syst. 2022, 37, 2679–2692. [Google Scholar] [CrossRef]
- Lu, A.-Y.; Yang, G.-H. False Data Injection Attacks against State Estimation without Knowledge of Estimators. IEEE Trans. Autom. Control 2022, 67, 4529–4540. [Google Scholar] [CrossRef]
- Cavraro, G.; Comden, J.; Dall’Anese, E.; Bernstein, A. Real-Time Distribution System State Estimation with Asynchronous Measurements. IEEE Trans. Smart Grid 2022, 13, 3813–3822. [Google Scholar] [CrossRef]
- De Melo, V.H.P.; Hebling, G.M.; Massignan, J.A.D.; London, J.B.A., Jr. Enhancing Performance of State Estimation Algorithms with FACTS. Electr. Power Syst. Res. 2025, 246, 111641. [Google Scholar] [CrossRef]
- Pandey, S.; Prasun, P.; Kamal, S.; Singh, D.; Ghosh, D.; Olaru, S. Optimal Trajectory Tracking Using Newton and Levenberg–Marquardt-Like Algorithms for Constrained Time-Varying Optimization. Optim. Control Appl. Methods 2025, 46, 1800–1813. [Google Scholar] [CrossRef]
- Davydov, A.; Centorrino, V.; Gokhale, A.; Russo, G.; Bullo, F. Time-Varying Convex Optimization: A Contraction and Equilibrium Tracking Approach. IEEE Trans. Autom. Control 2025, 1–15. [Google Scholar] [CrossRef]
- Li, Y.; Xu, H.; Zhang, W. A Balanced Augmented Lagrangian Method with Correction for Linearly Constrained Optimization. J. Sci. Comput. 2025, 104, 20. [Google Scholar] [CrossRef]
- Simonetto, A.; Dall’Anese, E. Prediction-Correction Algorithms for Time-Varying Constrained Optimization. IEEE Trans. Signal Process. 2017, 65, 5481–5494. [Google Scholar] [CrossRef]
- Xu, S.; Ye, D.; Li, G.; Yang, D. Globally Stealthy Attacks against Distributed State Estimation in Smart Grid. IEEE Trans. Autom. Sci. Eng. 2025, 22, 1353–1363. [Google Scholar] [CrossRef]
- Moarref, M.; Rodrigues, L. Observer Design for Linear Models of Multi-Rate Asynchronous Aerospace Systems. Aerosp. Syst. 2020, 3, 127–137. [Google Scholar] [CrossRef]
- Wang, H.; Wen, X.; Xu, Y.; Zhou, B.; Peng, J.-C.; Liu, W. Operating State Reconstruction in Cyber Physical Smart Grid for Automatic Attack Filtering. IEEE Trans. Ind. Inform. 2022, 18, 2909–2922. [Google Scholar] [CrossRef]
- Liu, Z.; Tang, P.; Hou, K.; Zhu, L.; Zhao, J.; Jia, H.; Pei, W. A Lagrange-Multiplier-Based Reliability Assessment for Power Systems Considering Topology and Injection Uncertainties. IEEE Trans. Power Syst. 2024, 39, 1178–1189. [Google Scholar] [CrossRef]
- Sharma, N.K.; Chakrabarti, S.; Sharma, A. Angle Reference Based Three-Phase State Estimation of Power Distribution Systems. IEEE Trans. Ind. Inform. 2025, 1–11. [Google Scholar] [CrossRef]
- Hossain, M.M. State-Estimation with Asynchronous Measurements for Cyber-Attack Detection in Distribution Systems—Simulation Code. GitHub Repository. 2025. Available online: https://github.com/musabbirh/State-Estimation-with-Asynchronous-Measurements-for-Cyber-Attack-Detection-in-Distribution-Systems.git (accessed on 9 October 2025).
- Liu, Y.; Xu, D.; Lee, S.; Zhang, X. Observer-Based Resilient Adaptive Event-Triggered Control for Islanded Microgrids Under DoSAs and Unknown FDI Attacks. IEEE Trans. Autom. Sci. Eng. 2025, 22, 19307–19316. [Google Scholar] [CrossRef]
- Lv, S.; Chen, S.; Wu, Q.; Wei, Z.; Zhang, T.; Xu, J. Cyberattack on Coupled Power-Transportation Networks via User-Side Data Falsifications. IEEE Trans. Power Syst. 2025; early access. [Google Scholar] [CrossRef]
- Ayar, M.; Obuz, S.; Trevizan, R.D.; Bretas, A.S.; Latchman, H.A. A Distributed Control Approach for Enhancing Smart Grid Transient Stability and Resilience. IEEE Trans. Smart Grid 2017, 8, 3035–3044. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).