The load redistribution (LR) attack, as a special type of false data injection attacks, aims to distort the results of the security-constrained economic dispatch (SCED) and drive the system to non-optimal or even unsecure operating conditions by injecting false data to the node power injection and branch power flow measurements. The LR attack represents a great danger to the safe and reliable operation of the current power grid where the physical infrastructure is increasingly intertwined with cyber components. In this paper, we propose a novel pre-overload vulnerability graph (POV-graph) approach to systematically assess, evaluate, and quantify the system vulnerability under an LR attack. The proposed approach is formulated based on the specific overloading mechanism of the LR attack as well as their cascading patterns. A set of case studies are performed on the IEEE 39-bus, 118-bus, and RTS-96 systems to validate the effectiveness of the proposed approach. Simulation results have shown, for the first time that, by revealing the vulnerability correlations among branches, the proposed approach allows the system operator to better utilize the defense resources and focus on strengthening a limited number of vulnerable branches to enhance the system's overall security against LR attacks.
Pre-Overload-Graph-Based Vulnerable Correlation Identification under Load Redistribution Attacks / Liu, Y.; Gao, S.; Shi, J.; Wei, X.; Han, Z.; Huang, T.. - In: IEEE TRANSACTIONS ON SMART GRID. - ISSN 1949-3053. - 11:6(2020), pp. 5216-5226. [10.1109/TSG.2020.3008515]
Pre-Overload-Graph-Based Vulnerable Correlation Identification under Load Redistribution Attacks
Huang T.
2020
Abstract
The load redistribution (LR) attack, as a special type of false data injection attacks, aims to distort the results of the security-constrained economic dispatch (SCED) and drive the system to non-optimal or even unsecure operating conditions by injecting false data to the node power injection and branch power flow measurements. The LR attack represents a great danger to the safe and reliable operation of the current power grid where the physical infrastructure is increasingly intertwined with cyber components. In this paper, we propose a novel pre-overload vulnerability graph (POV-graph) approach to systematically assess, evaluate, and quantify the system vulnerability under an LR attack. The proposed approach is formulated based on the specific overloading mechanism of the LR attack as well as their cascading patterns. A set of case studies are performed on the IEEE 39-bus, 118-bus, and RTS-96 systems to validate the effectiveness of the proposed approach. Simulation results have shown, for the first time that, by revealing the vulnerability correlations among branches, the proposed approach allows the system operator to better utilize the defense resources and focus on strengthening a limited number of vulnerable branches to enhance the system's overall security against LR attacks.File | Dimensione | Formato | |
---|---|---|---|
09138481.pdf
non disponibili
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
1.83 MB
Formato
Adobe PDF
|
1.83 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2859243