Bi-level adversary-operator cyberattack framework and algorithms for transmission networks in smart grids

M. Hadi Amini, Javad Khazaei, Darius Khezrimotlagh, Arash Asrari

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Scopus citations

Abstract

Transmission system is one of the most important assets in secure power delivery. Recent advancements toward automation of smart grids and application of supervisory control and data acquisition (SCADA) systems have increased vulnerability of power grids to cyberattacks. Cyberattacks on transmission network, specifically the power transmission lines, are among crucial emerging challenges for the operators. If not identified properly and in a timely fashion, they can cause cascading failures leading to blackouts. This chapter tackles false data injection modeling from the attacker’s perspective. It further develops an algorithm for detection of false data injections in transmission lines. To this end, first, a bi-level mixed integer programming problem is introduced to model the attack scenario, where the attacker can target a transmission line in the system and inject false data in load measurements on targeted buses in the system to overflow the targeted line. Second, the problem is analyzed from the operator’s viewpoint and a detection algorithm is proposed using l1 norm minimization approach to identify the bad measurement vector in data readings. In order to evaluate the effectiveness of the proposed attack model, case studies have been conducted on IEEE 57-bus test system.

Original languageEnglish (US)
Title of host publicationAdvances in Intelligent Systems and Computing
PublisherSpringer
Pages183-202
Number of pages20
DOIs
StatePublished - 2020

Publication series

NameAdvances in Intelligent Systems and Computing
Volume1123
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • General Computer Science

Fingerprint

Dive into the research topics of 'Bi-level adversary-operator cyberattack framework and algorithms for transmission networks in smart grids'. Together they form a unique fingerprint.

Cite this