Robustness Analysis of Power Grid under False Data Attacks Against AC State Estimation

Similar documents
THE convergence of automation and information technology. Power Grid AC-based State Estimation: Vulnerability Analysis Against Cyber Attacks

A Semidefinite Programming Relaxation under False Data Injection Attacks against Power Grid AC State Estimation

Quantifying Cyber Security for Networked Control Systems

False Data Injection Attacks Against Nonlinear State Estimation in Smart Power Grids

Various Techniques for Nonlinear Energy-Related Optimizations. Javad Lavaei. Department of Electrical Engineering Columbia University

Preliminaries Overview OPF and Extensions. Convex Optimization. Lecture 8 - Applications in Smart Grids. Instructor: Yuanzhang Xiao

THE electric power system is a complex cyber-physical

Malicious Data Detection in State Estimation Leveraging System Losses & Estimation of Perturbed Parameters

Optimal Power Flow. S. Bose, M. Chandy, M. Farivar, D. Gayme S. Low. C. Clarke. Southern California Edison. Caltech. March 2012

WITH the increasing integration of real-time monitoring,

The N k Problem using AC Power Flows

Cyber Attacks, Detection and Protection in Smart Grid State Estimation

arxiv: v1 [math.oc] 8 Nov 2010

Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model

Joint State Estimation and Sparse Topology Error Detection for Nonlinear Power Systems

Convex Relaxations of AC Optimal Power Flow under Uncertainty

Detection and Identification of Data Attacks in Power System

Convexification of Bad Data and Topology Error Detection and Identification Problems in AC Electric Power Systems

Power System State Estimation and Bad Data Detection by Means of Conic Relaxation

STATE ESTIMATION IN DISTRIBUTION SYSTEMS

Branch Flow Model. Computing + Math Sciences Electrical Engineering

PROTECTING energy infrastructures against progressive

THE future smart grid, which leverages advanced information. CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid

Equivalent relaxations of optimal power flow

Role of Synchronized Measurements In Operation of Smart Grids

Zero Duality Gap in Optimal Power Flow Problem

SIGNIFICANT increase in amount of private distributed

Convex Relaxation of Optimal Power Flow

Optimal Tap Settings for Voltage Regulation Transformers in Distribution Networks

Conic Optimization for Robust Quadratic Regression: Deterministic Bounds and Statistical Analysis

CHAPTER 2 LOAD FLOW ANALYSIS FOR RADIAL DISTRIBUTION SYSTEM

CRITICAL infrastructure is undergoing a cyber-enablement

A Decomposition Based Approach for Solving a General Bilevel Linear Programming

Weighted Least Squares Topology Error Detection And Identification

Coding Sensor Outputs for Injection Attacks Detection

Convex Relaxations for Optimization of AC and HVDC Grids under Uncertainty

New Developments on OPF Problems. Daniel Bienstock, Columbia University. April 2016

Empirical analysis of l 1 -norm for state estimation in power systems

Convex Relaxation of Optimal Power Flow

Control Systems Security Metrics and Risk Management

Computational Methods for Nonlinear Optimization Problems: Theory and Applications. Ramtin Madani

Identification of False Data Injection Attacks with Considering the Impact of Wind Generation and Topology Reconfigurations

Minimum Sparsity of Unobservable. Power Network Attacks

Strong SOCP Relaxations for the Optimal Power Flow Problem

arxiv: v2 [math.oc] 15 Feb 2013

On Optimal Link Removals for Controllability Degradation in Dynamical Networks

Detecting Data Tampering in Synchrophasors using Power Flow Entropy

Semidefinite Relaxation of Optimal Power Flow for ac-dc Grids

Minimization of Energy Loss using Integrated Evolutionary Approaches

An Approach to Achieving Global Optimum of AC Electric Power System State Estimators

Optimization Methods for Power Grid Reliability

The AR OPF: an Exact Convex Formulation for the Optimal Power Flow in Radial Distribution Networks

Power grid vulnerability analysis

Optimal Power Flow in Distribution Networks

Moving Target Defense for Hardening the Security of the Power System State Estimation

ECEN 615 Methods of Electric Power Systems Analysis Lecture 18: Least Squares, State Estimation

Cascading Outages in Power Systems. Rui Yao

Electric Power Network Security Analysis via Minimum Cut Relaxation

Geometry of power flows and convex-relaxed power flows in distribution networks with high penetration of renewables

ENHANCING OBSERVABILITY IN POWER DISTRIBUTION GRIDS

Real Time Voltage Control using Genetic Algorithm

A DC Power Flow Extension

Power System Security. S. Chakrabarti

Self-Calibration and Biconvex Compressive Sensing

Local Cyber-physical Attack with Leveraging Detection in Smart Grid

Recent Advances in Solving AC OPF & Robust UC

Impacts of Bad Data and Cyber Attacks on Electricity Market Operations

An Abrupt Change Detection Heuristic with Applications to Cyber Data Attacks on Power Systems π

Dynamic Attacks on Power Systems Economic Dispatch

Developing Correlation Indices to Identify Coordinated Cyber-Attacks on Power Grids

Low-Rank Factorization Models for Matrix Completion and Matrix Separation

Design of Spectrally Shaped Binary Sequences via Randomized Convex Relaxations

A Julia JuMP-based module for polynomial optimization with complex variables applied to ACOPF

Dynamic State Estimation in the Presence of Compromised Sensory Data

PowerApps Optimal Power Flow Formulation

New Formulations of the Optimal Power Flow Problem

Tutorial 2: Modelling Transmission

EXPOSE the Line Failures following a Cyber-Physical Attack on the Power Grid

EE 581 Power Systems. Admittance Matrix: Development, Direct and Iterative solutions

A Data-driven Voltage Control Framework for Power Distribution Systems

A Modular AC Optimal Power Flow Implementation for Distribution Grid Planning

Optimal Power Flow in Tree Networks

Software Tools: Congestion Management

Construction of power flow feasibility sets

Believability Evaluation of a State Estimation Result

Proper Security Criteria Determination in a Power System with High Penetration of Renewable Resources

Inexact Convex Relaxations for AC Optimal Power Flow: Towards AC Feasibility

Fault Detection and Mitigation in Kirchhoff Networks

Cascading Failures in Power Grids - Analysis and Algorithms

On SDP and ESDP Relaxation of Sensor Network Localization

Mathematical Study of Complex Networks: Brain, Internet, and Power Grid

Convex Optimization Approach to the Optimal Power Flow Problem in DC-Microgrids with Energy Storage

Sparse PCA with applications in finance

Optimal Value Function Methods in Numerical Optimization Level Set Methods

Analyzing the Effect of Loadability in the

Convex Optimization M2

A direct formulation for sparse PCA using semidefinite programming

SINGLE OBJECTIVE RISK- BASED TRANSMISSION EXPANSION

The DC Optimal Power Flow

ECEN 615 Methods of Electric Power Systems Analysis Lecture 19: State Estimation

Transcription:

Robustness Analysis of Power Grid under False Data Attacks Against AC State Estimation Presenter: Ming Jin INFORMS 2017 Ming Jin, Prof Javad Lavaei, and Prof Karl Johansson 1

Power system resilience against cyber attack has become a critical issue 2

Outline Power system modeling and state estimation False data injection attack (FDIA) framework Semidefinite programming relaxation Experiments Conclusion 3

Power system modeled as a graph A power system G = (N, L) Transmission lines, buses, and transformers Complex voltage: v = v *, v +,, v -. C - Nodal current injection: i = Yv Injected complex power: p + qj = diag(vi ) 4

Nodal and line measurements p G,H Bus k Bus k v = p = Voltage magnitude and nodal power injections: v = + = Tr(E = vv ), p = = Tr(Y =,? vv ), q = = Tr(Y =,? vv ) where E = = e = e =., Y =,? = * + (Y E = + E = Y), Y =,@ = A + (E =Y Y E = ) ~ Branch active and reactive power flows: p G,H = Tr(Y G,?I vv ), p G,J = Tr(Y G,?K vv ) q G,H = Tr(Y G,@I vv ), q G,J = Tr(Y G,@K vv ) All quantities are quadratic functions of complex voltage, which is the state of the system 5

Power system state estimation Problem statement: Given noisy measurements m N = vv, M N + w N + b N measurement unknown state noise bad data estimate the unknown state v. Why state estimation? Provides real-time power system conditions Constitutes the core of online security analysis Provides diagnostics for modeling and maintenance (Zhang, Madani, Lavaei, 2017) 6

Cyber attack vs.resilience Adversary Generators, DERs Substations Telemetry & communication Breaker/switch status indications Network topology Analog measurements Generator outputs Automatic generation control System updates State estimator BDD Securityconstrained optimal power flow (SC-OPF) Outputs: power system states Security analysis Overload & voltage Contingency analysis Contingency selection

FDIA is stealthy if the spurious data correspond to a valid state State estimation: Quadratic measurements subject to noise and bad data m N = vv, M N + w N + b N measurement unknown state noise adversarial data Can be solved by Gauss-Newton or SDP Stealth attack: Bad data detection Residuals: m N vrvr, M N b N = m N vsvs, M N 8

FDIA causes spurious state estimation by tampering sensor data DC-based: (Liu et al., 2010) (Kosut et al., 2010) (Sandberg et al., 2010) (Dan and Sandberg, 2010) (Yuan et al., 2011) (Sou et al., 2013) (Hendrickx et al., 2014) Negative impact: Electricity market (Xie et al., 2010), Load redistribution (Yuan et al., 2011) AC-based (Rahman and Mohsenian- Rad, 2013) (Hug and Giampapa, 2012) Stealth vs. sparsity 9

State estimation can be falsified.. 10

..with sparse sensor data attack 11

Would it be possible for an adversary to attack the state estimator by tampering few sensor data in stealth? 12

General FDIA framework with cardinality / stealth constraints min vs C Z h vs [,b RZ^ s.t. b N = m N vsvs, M N b ` k Objective function h(vs) Target state attack: h vs = vs v JU + + Voltage collapse attack: h vs = vs + + State deviation attack: h vs = vs v JNVW + + 13

Semidefinite programming (SDP) SDP standard form: min C, W s.t. x f = W, M N W 0 Definition: a Hermitian matrix W H - is positive semidefinite (PSD), W 0 iff: All eigenvalues of W are non-negative x Wx 0 for all x C - Wide applications in systems and control theory, robust optimization, nonconvex optimization 14

Convexification procedure min vsvs, M JU s.t. b N = m N vsvs, M N b ` k + 2Re{v JU vs} min W, M JU + 2Re{v JU vs} Transformation: Replace vsvs with W The augmented matrix Z = 1 vs vs is positive semidefinite and rank 1 W Relaxation: relax the rank 1 constraint Penalty: add penalty for the rank and cardinality constraint s.t. b N = m N W, M N 1 vs vs W b ` k min W, M JU 0, rank=1 + 2Re{v JU vs} + α b * + W, M?W-vGJw s.t. b N = m N W, M N 1 vs vs W 0 If the rank-1 constraint is satisfied, then we can recover a near-global stealthy attack solution 15

Key result: rank penalty design and performance bounds Theorem: For carefully designed M?W-vGJw and α, if the measurements include real and reactive branch power flows, and nodal voltage magnitudes, we have The attack b is stealthy, and sparse for large α The performance difference compared to an oracle by solving the original nonconvex problem is bounded Relation to compressed sensing: the trace penalty is equivalent to choosing M?W-vGJw as the identity matrix Extends the low-rank optimization method to deal with the augmented matrix rank 1 vs = 1, needed in a wide vs W range of problems 16

Experiment on IEEE 30-bus Target attack: h vs = vs v JU + + Solve for the stealth attack b using SDP relaxation Estimate the spurious state using Gauss-Newton in MATPOWER Check for BDD 17

FDIA tricks the operator to believe a potential voltage sag Falsified phase Falsified V 20 10 0-10 -20-20 -10 0 10 20 Actual phase 1.04 1 0.96 FDIA on voltage phase FDIA on voltage magnitude Falls out of the normal operation region 0.96 1 1.04 Actual V 18

The sparsity is controlled by the l1 penalty weight α Upper bound by (Hug and Gimpapa 2012) 60 Attack sparsity vs. regularization Card(b) 40 20 Upper bound SDP-FDIA 0 0 0.5 1 1.5 regularization 19

FDIA is triggered by tampering a small set of sensors system α Rank(Z) Card(b) Upper bound Pass BDD 6-bus.4 1 18 40 Yes 14-bus.2 1 16 46 Yes 30-bus 1.16 1 21 54 Yes 39-bus 1.82 1 18 36 Yes 57-bus.5 1 30 92 Yes 20

Our results analyze the potential threat of cyber attack on power grid AC-based state estimation. It should be used to inform new designs of Bad Data Detection. 21

Theoretical contributions Formulation of the nonconvex FDIA problem for AC grid Convex relaxation of the problem with cardinality constraint using Semidefinite programming design proper penalty matrix to induce rank 1 solution Prove performance bounds of the nearoptimal solution compared to the original problem 22