Phasor measurement unit selection for unobservable electric power data integrity attack detection

https://doi.org/10.1016/j.ijcip.2014.06.001Get rights and content

Abstract

Electric power system operators make critical decisions based on remote measurements. If the measurements are compromised, the decisions made on the basis of the bad measurements could lead to critical consequences. Of particular concern are unobservable attacks where compromised measurements are not flagged as erroneous by bad data detection algorithms. Secure measurement devices, such as phasor measurement units (PMUs), can help to recognize these attacks. This paper presents an algorithm based on integer programming for the optimal placement of PMUs to detect unobservable electric power SCADA data integrity attacks. The algorithm can also be used to identify minimal sets of existing PMUs whose data is needed to detect unobservable bad data attacks. Practical examples drawn from the power engineering literature are used to demonstrate the efficiency of the algorithm.

Introduction

Modern societies and economies are increasingly dependent on services such as electric power, natural gas and water provided by infrastructure systems. These systems are highly complex and are governed by highly non-linear relationships. The complexity makes the systems very difficult to control and operate. Despite the complexity, considerable progress has been made in recent years to improve the control and operation of infrastructure systems. The smart grid initiatives are an example of such an advance [7], [8]. Smart grid control processes are highly dependent on accurate system state data that is remotely measured and transmitted to control systems via advanced supervisory control and data acquisition (SCADA) systems. The transmission of data represents a point of vulnerability of the smart grid to cyber attacks.

This paper focuses on data integrity attacks on SCADA systems used for electric power distribution. Currently, SCADA devices in power systems measure system states such as power injections at substations (buses), power flows at lines and transformers, and voltage values (magnitudes). Historically, such data is measured and transmitted with the expectation that there is noise and error in the measurements and that it does not provide enough information (e.g., voltage phase angles) to completely characterize the system state. As a result, the power engineering community has developed sophisticated techniques to estimate the state of unobserved portions of the power grid and to filter bad data [17]. These techniques are robust to random failures and expected measurement errors in power systems. However, there is increasing concern that it is possible to introduce errors in the data in a coordinated manner that is undetectable by bad data filters [14]. When an error is introduced by a malicious source (e.g., cyber attacker), the error is referred to as a “data integrity attack.” When attack data is provably able to bypass bad data filters, the corresponding attack is referred to as an “unobservable” data integrity attack [14]. In general, an unobservable attack requires the compromise of a large number of sensors and recent work has focused on developing general methods for identifying the worst case scenarios based on the numbers of sensors that are compromised [5], [9], [11], [14]. While these methods are important for assessing system vulnerability, the computational requirements are high and the problems tend to be very difficult to solve.

Some unobservable data integrity attacks only require a small number of compromised sensors. It can be argued that such attacks are more realistic because an attacker has limited resources (e.g., time and information) to plan an attack. These types of attacks are referred to as k-sparse attacks, where k is the number of sensors that are compromised [9], [14]. Recent research [9] has shown that identifying all possible 3- 4- and 5-sparse attacks requires polynomial time, which eliminates the computational challenges associated with more general models. More importantly, perhaps, the research [9] has identified the types of redundant measurements that are required to make unobservable k-sparse attacks detectable. One important measurement for detecting k-sparse attacks is the voltage phase angle (other measurements, such as frequency and line flows, can also be used for this purpose).

Voltage phase angles are typically estimated from other measurements. Since phasor measurement units (PMUs) directly provide these measurements [18], they are candidate devices for detecting unobservable attacks. This paper develops optimization models for optimally placing PMUs to cover undetectable attacks. Alternatively, in the case where PMU deployment is ubiquitous, optimization models can be used to identify the smallest set of PMUs for detecting attacks.

The PMU placement problem is generally an NP-complete problem. As discussed in [9], the specific placement problem considered in this paper is not different. However, limited research has focused on optimizing the placement of PMUs to combat k-sparse attacks. While it is possible to optimize the placement of PMUs using a polynomial time algorithm that is guaranteed to find a sufficient number of PMUs [9], it does not yield the optimal solution. This paper describes a model that is guaranteed to find the optimal solution. In the worst case, the algorithm requires exponential time, but it has proved to be efficient when tested on a wide range of practical problems.

Several researchers have focused on similar PMU placement problems. Some of the research seeks to determine the optimal placement of PMUs to improve system observability [1], [2], [15], [20], [24]. Other research seeks to maximize the amount of mutual information between PMU measurements and power system states [12]. Yet other research [13] considers multi-objective criteria such as observability, cost, importance and security or poses the PMU placement problem in terms of improving state estimation [3], [4], [12]. Interested readers are referred to [26] for a comprehensive coverage of PMU allocation problems and their solutions.

This paper has three main contributions with regard to the detection of electric power data integrity attacks. The first contribution is a mixed integer programming approach for determining the minimal number of PMUs required to defend against an arbitrary set of unobservable attacks. The second is that the models for placing and selecting PMUs to detect k-sparse attacks are based on PMU capabilities; the relative merits of each capability in terms of the number of PMUs required to detect attacks are also discussed. The third contribution is that the models are tractable; this property is verified using empirical studies based on examples drawn from the power engineering literature.

Section snippets

Unobservable smart grid data integrity attacks

For completeness, we first summarize the main results in [9]. Electric power systems are potentially vulnerable to a large number of unobservable data integrity attacks. Data integrity attacks seek to modify data that is measured at remote locations (e.g., by meters and sensors) at sensing or during data transmission to other locations (e.g., control centers). Data integrity attacks that are consistent with power flow physics and do not involve compromised data are called unobservable attacks

PMU allocation and selection

In power systems, the basic physics of power flows force power to flow from high voltage phase angles to low voltage phase angles. The amount of flow is proportional to the phase angle difference between the source and the sink. Regardless of the flows, the differences in phase angles are important because large deviations cause system instability. While state estimation computes the phase angles in slow time scales (five minutes or more), instability can occur on much more rapid time scales.

Optimization models

This section develops mixed integer programming models for determining the optimal PMU placement in order to detect k-sparse attacks. The first set of models minimizes the cost of undetected attacks when PMU resources are limited (Section 4.1). The second set of models minimizes the total number of PMUs required to detect all the attacks (Section 4.2).

Experimental results

This section discusses the experimental results and demonstrates that the approach is computationally tractable for a variety of systems. First, the results are presented for the objective specified by Eq. (15), i.e., the goal is to minimize the total number of PMUs required to cover all the attacks. Next, the results are presented for the objective specified by Eq. (1), i.e., the goal is to minimize the cost of the uncovered attacks when the number of PMUs is limited.

Conclusions

Recent years have seen increased efforts at understanding the vulnerabilities of electric power grids to cyber attacks. Recent work [5], [9], [11], [14] has shown that it is possible for an attacker to falsify information sent to a grid operator so that the incorrect information remains consistent with other measurements reported to the operator. The mixed integer programming model described in this paper can be used for the optimal deployment of PMUs and for the optimal selection of existing

Acknowledgments

This research was partially supported by the Los Alamos National Laboratory Director׳s Fellowship entitled Cyber Security of the Smart Grid and by the Center for Nonlinear Studies (CNLS (Grant no. DE-AC52-06NA25396)).

References (27)

  • F. Aminifar, A. Khodaei, M. Fotuhi-Firuzabad, M. Shahidehpour, Contingency-constrained PMU placement in power networks,...
  • T. Cai, Q. Ai, Research of PMU optimal placement in power systems, in:Proceedings of the Fifth WSEAS/IASME...
  • S. Chakrabarti, E. Kyriakides, M. Albu, Uncertainty in power system state variables obtained through synchronized...
  • J. Chen, A. Abur, Placement of PMUs to enable bad data detection in state estimation, IEEE Transactions on Power...
  • G. Dan, H. Sandberg, Stealth attacks and protection schemes for state estimators in power systems, in: Proceedings of...
  • S. D׳Antonio, L. Coppolino, I. Elia, V. Formicola, Security issues of a phasor data concentrator for smart grid...
  • X. Fang, S. Misra, G. Xue, D. Yang, Smart grid—The new and improved power grid: A survey, IEEE Communications Surveys...
  • H. Farhangi, The path of the smart grid, IEEE Power and Energy8 (1) (2010)...
  • A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, K. Poolla, Smart grid data integrity attacks, IEEE...
  • A. Giani, F. Pan, R. Bent, K. Poolla, Phasor Measurement Unit Placement for Unobservable Attack Detection, Technical...
  • O. Kosut, L. Jia, R. Thomas and L. Tong, Malicious data attacks on the smart grid, IEEE Transactions on Smart Grid2 (4)...
  • Q. Li, T. Cui, Y. Weng, R. Negi, F. Franchetti, M Ilic, An information-theoretic approach to PMU placement in electric...
  • O. Linda, A. Giani, M. Manic, M. McQueen, Multi-criteria based staging of optimal PMU placement using fuzzy weighted...
  • Cited by (0)

    View full text