Skip to main content

2019 | OriginalPaper | Buchkapitel

Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids

verfasst von : Yawei Wang, Donghui Chen, Cheng Zhang, Xi Chen, Baogui Huang, Xiuzhen Cheng

Erschienen in: Wireless Algorithms, Systems, and Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A smart grid is a complex system using power transmission and distribution networks to connect electric power generators to consumers across a large geographical area. Due to their heavy dependencies on information and communication technologies, smart grid applications, such as state estimation, are vulnerable to various cyber-attacks. False data injection attacks (FDIA), considered as the most severe threats for state estimation, can bypass conventional bad data detection mechanisms and render a significant threat to smart grids. In this paper, we propose a novel FDIA detection mechanism based on a wide and recurrent neural networks (RNN) model to address the above concerns. Simulations over IEEE 39-bus system indicate that the proposed mechanism can achieve a satisfactory FDIA detection accuracy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Athay, T., Podmore, R., Virmani, S.: A practical method for the direct analysis of transient stability. IEEE Trans. Power Apparatus Syst. 2, 573–584 (1979) Athay, T., Podmore, R., Virmani, S.: A practical method for the direct analysis of transient stability. IEEE Trans. Power Apparatus Syst. 2, 573–584 (1979)
2.
Zurück zum Zitat Bertaccini, A., Duduk, B., Paltrinieri, S., Contaldo, N.: Phytoplasmas and phytoplasma diseases: a severe threat to agriculture. Am. J. Plant Sci. 5(12), 1763 (2014) Bertaccini, A., Duduk, B., Paltrinieri, S., Contaldo, N.: Phytoplasmas and phytoplasma diseases: a severe threat to agriculture. Am. J. Plant Sci. 5(12), 1763 (2014)
3.
Zurück zum Zitat Cheng, H.T., et al.: Wide & deep learning for recommender systems. In: Proceedings of the 1st Workshop on Deep Learning for Recommender Systems, pp. 7–10. ACM (2016) Cheng, H.T., et al.: Wide & deep learning for recommender systems. In: Proceedings of the 1st Workshop on Deep Learning for Recommender Systems, pp. 7–10. ACM (2016)
4.
Zurück zum Zitat Deng, R., Xiao, G., Lu, R.: Defending against false data injection attacks on power system state estimation. IEEE Trans. Industr. Inf. 13(1), 198–207 (2017) Deng, R., Xiao, G., Lu, R.: Defending against false data injection attacks on power system state estimation. IEEE Trans. Industr. Inf. 13(1), 198–207 (2017)
5.
Zurück zum Zitat Deng, R., Xiao, G., Lu, R., Liang, H., Vasilakos, A.V.: False data injection on state estimation in power systems-attacks, impacts, and defense: a survey. IEEE Trans. Industr. Inf. 13(2), 411–423 (2017) Deng, R., Xiao, G., Lu, R., Liang, H., Vasilakos, A.V.: False data injection on state estimation in power systems-attacks, impacts, and defense: a survey. IEEE Trans. Industr. Inf. 13(2), 411–423 (2017)
6.
Zurück zum Zitat Esmalifalak, M., Liu, L., Nguyen, N., Zheng, R., Han, Z.: Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst. J. 11(3), 1644–1652 (2017) Esmalifalak, M., Liu, L., Nguyen, N., Zheng, R., Han, Z.: Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst. J. 11(3), 1644–1652 (2017)
7.
Zurück zum Zitat Grid, N.S.: Introduction to NISTIR 7628 guidelines for smart grid cyber security. Guideline, September 2010 Grid, N.S.: Introduction to NISTIR 7628 guidelines for smart grid cyber security. Guideline, September 2010
8.
Zurück zum Zitat Guan, Y., Ge, X.: Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Trans. Signal Inf. Process. Over Netw. 4(1), 48–59 (2018) Guan, Y., Ge, X.: Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Trans. Signal Inf. Process. Over Netw. 4(1), 48–59 (2018)
9.
Zurück zum Zitat He, Y., Mendis, G.J., Wei, J.: Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 8(5), 2505–2516 (2017) He, Y., Mendis, G.J., Wei, J.: Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 8(5), 2505–2516 (2017)
10.
Zurück zum Zitat Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997) Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)
11.
Zurück zum Zitat Ikbal, A., Aftab, M.A., Hussain, S.S.: Performance comparison of IEC 61850–90-5 and IEEE C37. 118.2 based wide area PMU communication networks. J. Mod. Power Syst. Clean Energy 4(3), 487–495 (2016) Ikbal, A., Aftab, M.A., Hussain, S.S.: Performance comparison of IEC 61850–90-5 and IEEE C37. 118.2 based wide area PMU communication networks. J. Mod. Power Syst. Clean Energy 4(3), 487–495 (2016)
12.
Zurück zum Zitat James, J., Hill, D.J., Lam, A.Y., Gu, J., Li, V.O.: Intelligent time-adaptive transient stability assessment system. IEEE Trans. Power Syst. 33(1), 1049–1058 (2018) James, J., Hill, D.J., Lam, A.Y., Gu, J., Li, V.O.: Intelligent time-adaptive transient stability assessment system. IEEE Trans. Power Syst. 33(1), 1049–1058 (2018)
13.
Zurück zum Zitat Kim, T.T., Poor, H.V.: Strategic protection against data injection attacks on power grids. IEEE Trans. Smart Grid 2(2), 326–333 (2011) Kim, T.T., Poor, H.V.: Strategic protection against data injection attacks on power grids. IEEE Trans. Smart Grid 2(2), 326–333 (2011)
14.
Zurück zum Zitat Kosut, O., Jia, L., Thomas, R.J., Tong, L.: Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2(4), 645–658 (2011) Kosut, O., Jia, L., Thomas, R.J., Tong, L.: Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2(4), 645–658 (2011)
15.
Zurück zum Zitat Liang, G., Zhao, J., Luo, F., Weller, S.R., Dong, Z.Y.: A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 8(4), 1630–1638 (2017) Liang, G., Zhao, J., Luo, F., Weller, S.R., Dong, Z.Y.: A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 8(4), 1630–1638 (2017)
16.
Zurück zum Zitat Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. 32(4), 8–14 (2018) Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. 32(4), 8–14 (2018)
17.
Zurück zum Zitat Lin, J., Yu, W., Yang, X., Xu, G., Zhao, W.: On false data injection attacks against distributed energy routing in smart grid. In: Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, pp. 183–192. IEEE Computer Society (2012) Lin, J., Yu, W., Yang, X., Xu, G., Zhao, W.: On false data injection attacks against distributed energy routing in smart grid. In: Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, pp. 183–192. IEEE Computer Society (2012)
19.
Zurück zum Zitat Liu, L., Esmalifalak, M., Ding, Q., Emesih, V.A., Han, Z.: Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid 5(2), 612–621 (2014) Liu, L., Esmalifalak, M., Ding, Q., Emesih, V.A., Han, Z.: Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid 5(2), 612–621 (2014)
21.
Zurück zum Zitat Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011) Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)
23.
Zurück zum Zitat Manandhar, K., Cao, X., Hu, F., Liu, Y.: Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control Netw. Syst. 1(4), 370–379 (2014) Manandhar, K., Cao, X., Hu, F., Liu, Y.: Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control Netw. Syst. 1(4), 370–379 (2014)
24.
Zurück zum Zitat Monticelli, A.: Electric power system state estimation. Proc. IEEE 88(2), 262–282 (2000) Monticelli, A.: Electric power system state estimation. Proc. IEEE 88(2), 262–282 (2000)
26.
Zurück zum Zitat Ozay, M., Esnaola, I., Vural, F.T.Y., Kulkarni, S.R., Poor, H.V.: Machine learning methods for attack detection in the smart grid. IEEE Trans. Neural Netw. Learn. Syst. 27(8), 1773–1786 (2016) Ozay, M., Esnaola, I., Vural, F.T.Y., Kulkarni, S.R., Poor, H.V.: Machine learning methods for attack detection in the smart grid. IEEE Trans. Neural Netw. Learn. Syst. 27(8), 1773–1786 (2016)
27.
Zurück zum Zitat Phadke, A.G., Thorp, J.S., Karimi, K.: State estimlatjon with phasor measurements. IEEE Transactions on Power Systems 1(1), 233–238 (1986) Phadke, A.G., Thorp, J.S., Karimi, K.: State estimlatjon with phasor measurements. IEEE Transactions on Power Systems 1(1), 233–238 (1986)
28.
Zurück zum Zitat Rahman, M.A., Mohsenian-Rad, H.: False data injection attacks against nonlinear state estimation in smart power grids. In: 2013 IEEE Power & Energy Society General Meeting, pp. 1–5. IEEE (2013) Rahman, M.A., Mohsenian-Rad, H.: False data injection attacks against nonlinear state estimation in smart power grids. In: 2013 IEEE Power & Energy Society General Meeting, pp. 1–5. IEEE (2013)
29.
Zurück zum Zitat Schweppe, F.C.: Power system static-state estimation, Part III: Implementation. IEEE Trans. Power Appar. Syst. PAS–89(1), 130–135 (1970) Schweppe, F.C.: Power system static-state estimation, Part III: Implementation. IEEE Trans. Power Appar. Syst. PAS–89(1), 130–135 (1970)
30.
Zurück zum Zitat Schweppe, F.C., Rom, D.B.: Power system static-state estimation, Part II: approximate model. IEEE Trans. Power Appar. Syst. PAS–89(1), 125–130 (1970) Schweppe, F.C., Rom, D.B.: Power system static-state estimation, Part II: approximate model. IEEE Trans. Power Appar. Syst. PAS–89(1), 125–130 (1970)
31.
Zurück zum Zitat Schweppe, F.C., Wildes, J.: Power system static-state estimation, Part I: exact model. IEEE Trans. Power Appar. Syst. PAS–89(1), 120–125 (1970) Schweppe, F.C., Wildes, J.: Power system static-state estimation, Part I: exact model. IEEE Trans. Power Appar. Syst. PAS–89(1), 120–125 (1970)
32.
Zurück zum Zitat Ten, C.W., Manimaran, G., Liu, C.C.: Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum. 40(4), 853–865 (2010) Ten, C.W., Manimaran, G., Liu, C.C.: Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum. 40(4), 853–865 (2010)
34.
Zurück zum Zitat Wu, F.F.: Power system state estimation: a survey. Int. J. Electr. Power Energy Syst. 12(2), 80–87 (1990) Wu, F.F.: Power system state estimation: a survey. Int. J. Electr. Power Energy Syst. 12(2), 80–87 (1990)
35.
Zurück zum Zitat Yuan, Y., Li, Z., Ren, K.: Modeling load redistribution attacks in power systems. IEEE Trans. Smart Grid 2(2), 382–390 (2011) Yuan, Y., Li, Z., Ren, K.: Modeling load redistribution attacks in power systems. IEEE Trans. Smart Grid 2(2), 382–390 (2011)
36.
Zurück zum Zitat Zheng, Z., Yang, Y., Niu, X., Dai, H.N., Zhou, Y.: Wide and deep convolutional neural networks for electricity-theft detection to secure smart grids. IEEE Trans. Industr. Inf. 14(4), 1606–1615 (2018) Zheng, Z., Yang, Y., Niu, X., Dai, H.N., Zhou, Y.: Wide and deep convolutional neural networks for electricity-theft detection to secure smart grids. IEEE Trans. Industr. Inf. 14(4), 1606–1615 (2018)
37.
Zurück zum Zitat Zimmerman, R.D., Murillo-Sanchez, C.E.: Matpower 4.1 user’s manual. Power Systems Engineering Research Center, Cornell University, Ithaca, NY (2011) Zimmerman, R.D., Murillo-Sanchez, C.E.: Matpower 4.1 user’s manual. Power Systems Engineering Research Center, Cornell University, Ithaca, NY (2011)
Metadaten
Titel
Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids
verfasst von
Yawei Wang
Donghui Chen
Cheng Zhang
Xi Chen
Baogui Huang
Xiuzhen Cheng
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-23597-0_27

Premium Partner