Skip to main content
Log in

False data separation for data security in smart grids

  • Regular Paper
  • Published:
Knowledge and Information Systems Aims and scope Submit manuscript

Abstract

The smart grid is emerging as an efficient paradigm for electric power generation, transmission, and consumption, based on optimized decision making and control that leverage the measurement data of sensors and meters in the grid. False data injection is a new type of power grid attacks aiming to tamper such important data. For the security and robustness of the grid, it is critical to separate the false data injected by such attacks and recover the original measurement data. Nonetheless, the existing approaches often neglect the true changes on original measurement data that are caused by the real perturbations on grid states and hence have a risk of removing these true changes as injected false data during the data recovery. In this paper, we preserve these true changes by modeling the false data problem as a rank-bounded \(L_1\) norm optimization and propose both offline and online algorithms to filter out the injected false data and recover original measurement data. Trace-driven simulations verify the efficacy of our solution.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Abur A, Exposito A G (2004) Power system state estimation: theory and implementation. Marcel Dekker Inc., New York

    Book  Google Scholar 

  2. Bi S, Zhang YJ (2014) Graphical methods for defense against false-data injection attacks on power system state estimation. IEEE Trans Smart Grid 5(3):1216–1227

    Article  Google Scholar 

  3. Bobba RB, Rogers KM, Wang Q, Khurana H, Nahrstedt K, Overbye, TJ(2010) Detecting false data injection attacks on dc state estimation. In: Preprints of the First Workshop on Secure Control Systems (SCS’10), CPSWEEK’10

  4. Boyd S, Parikh N, Chu E, Peleato B, Eckstein J (2011) Distributed optimization and statistical learning via the alternating direction method of multipliers. Found Trends Mach Learn 3(1):1–122

    Article  MATH  Google Scholar 

  5. Candès EJ, Li X, Ma Y, Wright J (2011) Robust principal component analysis? J ACM 58(3):11

    Article  MathSciNet  MATH  Google Scholar 

  6. Caro E, Conejo AJ, Minguez R (2009) Power system state estimation considering measurement dependencies. IEEE Trans Power Syst 24(4):1875–1885

    Article  Google Scholar 

  7. Ganeshy A, Wright J, Li X, Candes EJ, Ma Y (2010) Dense error correction for low-rank matrices via principal component pursuit. In: Proceedings of the 2010 IEEE International Symposium on Information Theory (ISIT’10), pp. 1513–1517

  8. Haldar JP, Hernando D (2009) Rank-constrained solutions to linear matrix equations using powerfactorization. IEEE Signal Process Lett 16(7):584–587

    Article  Google Scholar 

  9. Kim TT, Poor HV (2011) Strategic protection against data injection attacks on power grids. IEEE Trans Smart Grid 2(2):326–333

    Article  Google Scholar 

  10. Kosut O, Jia L, Thomas RJ, Tong L (2010) On malicious data attacks on power system state estimation. In: Proceedings of the 45th International Universities Power Engineering Conference (UPEC’10), pp. 1–6

  11. Kushner HJ, Yin GG (2003) Stochastic approximation and recursive algorithms and applications, vol 35. Springer, Berlin

    MATH  Google Scholar 

  12. Liu Y, Ning P, Reiter MK (2010) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur 14(1):21–32

    Google Scholar 

  13. Liu L, Esmalifalak M, Ding Q, Emesih VE, Han Z (2014) Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans Smart Grid 5(2):612–621

    Article  Google Scholar 

  14. Morales JM, Baringo L, Conejo AJ, Mínguez R (2010) Probabilistic power flow with correlated wind sources. IET Gener Transm Distrib 4(5):641–651

    Article  Google Scholar 

  15. Niesen U, Shah D, Wornell GW (2009) Adaptive alternating minimization algorithms. IEEE Trans Inf Theory 55(3):1423–1429

    Article  MathSciNet  Google Scholar 

  16. Shen Y, Wen Z, Zhang Y (2014) Augmented Lagrangian alternating direction method for matrix separation based on low-rank factorization. Optim Methods Softw 29(2):239–263

    Article  MathSciNet  MATH  Google Scholar 

  17. Siobhan G (2009) Electricity grid in U.S. penetrated by spies. http://online.wsj.com/articles/SB123914-805204099085

  18. Wen Z, Yin W, Zhang Y (2012) Solving a low-rank factorization model for matrix completion by a nonlinear successive over-relaxation algorithm. Math Program Comput 4(4):333–361

    Article  MathSciNet  MATH  Google Scholar 

  19. Xu W, Wang M, Tang A (2011) On state estimation with bad data detection. In: Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC’11), pp. 5989–5994

  20. Yang Q, Yang J, Yu W, An D, Zhang N, Zhao W (2014) On false data-injection attacks against power system state estimation: modeling and countermeasures. IEEE Trans Parallel Distrib Syst 25(3):717–729

    Article  Google Scholar 

  21. Yuan X, Yang J (2009) Sparse and low rank matrix decomposition via alternating direction method. Pac J Optim 9(1):1–11

    MathSciNet  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China (61502347, 61502504, and 61628209), the Nature Science Foundation of Hubei Province of China (2016CFB384 and 2016CFA030), the Fundamental Research Funds for the Central Universities (2042015kf0038), the Research Funds of Renmin University of China (15XNLF09), and the Research Funds for Introduced Talents of Wuhan University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Lu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, H., Yan, Q., Zhao, Y. et al. False data separation for data security in smart grids. Knowl Inf Syst 52, 815–834 (2017). https://doi.org/10.1007/s10115-016-1019-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10115-016-1019-8

Keywords

Navigation