skip to main content
10.1145/3018981.3018987acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicssConference Proceedingsconference-collections
research-article

Multi-agent System for Detecting False Data Injection Attacks Against the Power Grid

Published: 06 December 2016 Publication History

Abstract

A class of cyber-attacks called False Data Injection attacks that target measurement data used for state estimation in the power grid are currently under study by the research community. These attacks modify sensor readings obtained from meters with the aim of misleading the control center into taking ill-advised response action. It has been shown that an attacker with knowledge of the network topology can craft an attack that bypasses existing bad data detection schemes (largely based on residual generation) employed in the power grid. We propose a multi-agent system for detecting false data injection attacks against state estimation. The multi-agent system is composed of software implemented agents created for each substation. The agents facilitate the exchange of information including measurement data and state variables among substations. We demonstrate that the information exchanged among substations, even untrusted, enables agents cooperatively detect disparities between local state variables at the substation and global state variables computed by the state estimator. We show that a false data injection attack that passes bad data detection for the entire system does not pass bad data detection for each agent.

References

[1]
E. Handschin, F. C. Schweppe, J. Kohlas and A. Fiechter, "Bad data analysis for power system state estimation," in IEEE Transactions on Power Apparatus and Systems, vol. 94, no. 2, pp. 329--337, Mar 1975.
[2]
Liu, Yao, Peng Ning, and Michael K. Reiter. "False data injection attacks against state estimation in electric power grids." ACM Transactions on Information and System Security 14.1 (2011).
[3]
G. Hug and J. A. Giampapa, "Vulnerability Assessment of AC State Estimation With Respect to False Data Injection CyberAttacks," Smart Grid, IEEE Transactions on, vol. 3, pp. 1362--1370, 2012
[4]
O. Kosut, J. Liyan, R. J. Thomas, and T. Lang, "Malicious Data Attacks on the Smart Grid," Smart Grid, IEEE Transactions on, vol. 2, pp. 645--658, 2011.
[5]
Le Xie, M. Yilin and B. Sinopoli, "False Data Injection Attacks in Electricity Markets," in Smart Grid Communications (SmartGridComm), 2010 First IEEE international Conference on, pp. 226--231, 2010.
[6]
Bobba, Rakesh B., et al. "Detecting false data injection attacks on dc state estimation." Preprints of the First Workshop on Secure Control Systems, CPSWEEK. Vol. 2010. 2010.
[7]
G. Dan and H. Sandberg, "Stealth Attacks and Protection Schemes for State Estimators in Power Systems," Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, Gaithersburg, MD, 2010, pp. 214--219.
[8]
S. Bi and Y. J. Zhang, "Defending mechanisms against false-data injection attacks in the power system state estimation," 2011 IEEE GLOBECOM Workshops (GC Wkshps), Houston, TX, 2011, pp. 1162--1167.
[9]
D. Wei, M. Jafari and Y. Lu, "On Protecting Industrial Automation and Control Systems against Electronic Attacks," 2007 IEEE International Conference on Automation Science and Engineering, Scottsdale, AZ, 2007, pp. 176--181.
[10]
Q. Yang, J. Yang, W. Yu, D. An, N. Zhang and W. Zhao, "On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures," in IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 3, pp. 717--729, March 2014.
[11]
O. Kosut, Liyan Jia, R. J. Thomas and Lang Tong, "Limiting false data attacks on power system state estimation," Information Sciences and Systems (CISS), 2010 44th Annual Conference on, Princeton, NJ, 2010, pp. 1--6.
[12]
J. Wei, D. Kundur, T. Zourntos, and K. Butler-Purry, "Probing the telltale physics: Towards a cyber-physical protocol to mitigate information corruption in smart grid systems," in Proc. IEEE 3rd Int. Conf. Smart Grid Commun. (SmartGridComm), 2012, pp. 372--377.
[13]
T. Liu, Y. Gu, D. Wang, Y. Gui, and X. Guan, "A novel method to detect bad data injection attack in smart grid," in Proc. IEEE INFOCOM, 2013, pp. 3423--3428
[14]
IEEE Standard Communication Delivery Time Performance Requirements for Electric Power Substation Automation," in IEEE Std 1646-2004, vol., no., pp. 1--24, 2005
[15]
Z. Wang, A. Scaglione and R. J. Thomas, "Generating Statistically Correct Random Topologies for Testing Smart Grid Communication and Control Networks," in IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 28--39, June 2010.
[16]
R. D. Zimmerman, C. E. Murillo-SÃąnchez, and R. J. Thomas, "MATPOWER: Steady-State Operations, Planning and Analysis Tools for Power Systems Research and Education," Power Systems, IEEE Transactions on, vol. 26, no. 1, pp. 12--19, Feb. 2011.
[17]
A. Monticelli, State Estimation in Power Systems. Boston: Kluwer Academic Publishers, 1999
[18]
A. Wood and B. Wollenberg. Power generation, operation, and control. John Wiley and Sons, 2nd edition, 1996
[19]
V. K. Balakrishnan, Graph Theory. New York: McGraw-Hill, 1997

Cited By

View all
  • (2024)Securing Bipartite Nonlinear Fractional-Order Multi-Agent Systems against False Data Injection Attacks (FDIAs) Considering Hostile EnvironmentFractal and Fractional10.3390/fractalfract80704308:7(430)Online publication date: 22-Jul-2024
  • (2023)Impact of FDI Attack in Grid with Minimal Information2023 3rd Asian Conference on Innovation in Technology (ASIANCON)10.1109/ASIANCON58793.2023.10270082(1-6)Online publication date: 25-Aug-2023
  • (2020)In Memoriam: Dan DobberpuhlComputer10.1109/MC.2020.297622653:3(83-83)Online publication date: 11-Mar-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICSS '16: Proceedings of the 2nd Annual Industrial Control System Security Workshop
December 2016
57 pages
ISBN:9781450347884
DOI:10.1145/3018981
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 December 2016

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICSS '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Securing Bipartite Nonlinear Fractional-Order Multi-Agent Systems against False Data Injection Attacks (FDIAs) Considering Hostile EnvironmentFractal and Fractional10.3390/fractalfract80704308:7(430)Online publication date: 22-Jul-2024
  • (2023)Impact of FDI Attack in Grid with Minimal Information2023 3rd Asian Conference on Innovation in Technology (ASIANCON)10.1109/ASIANCON58793.2023.10270082(1-6)Online publication date: 25-Aug-2023
  • (2020)In Memoriam: Dan DobberpuhlComputer10.1109/MC.2020.297622653:3(83-83)Online publication date: 11-Mar-2020
  • (2020)50 & 25 Years AgoComputer10.1109/MC.2020.296488953:3(7-10)Online publication date: 11-Mar-2020
  • (2020)Challenges and Opportunities in the Detection of Safety-Critical Cyberphysical AttacksComputer10.1109/MC.2019.291504553:3(26-37)Online publication date: 11-Mar-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media