The load redistribution (LR) attack, as a special type of false data injection attacks, aims to distort the results of the security-constrained economic dispatch (SCED) and drive the system to non-optimal or even unsecure operating conditions by injecting false data to the node power injection and branch power flow measurements. The LR attack represents a great danger to the safe and reliable operation of the current power grid where the physical infrastructure is increasingly intertwined with cyber components. In this paper, we propose a novel pre-overload vulnerability graph (POV-graph) approach to systematically assess, evaluate, and quantify the system vulnerability under an LR attack. The proposed approach is formulated based on the specific overloading mechanism of the LR attack as well as their cascading patterns. A set of case studies are performed on the IEEE 39-bus, 118-bus, and RTS-96 systems to validate the effectiveness of the proposed approach. Simulation results have shown, for the first time that, by revealing the vulnerability correlations among branches, the proposed approach allows the system operator to better utilize the defense resources and focus on strengthening a limited number of vulnerable branches to enhance the system's overall security against LR attacks.

Pre-Overload-Graph-Based Vulnerable Correlation Identification under Load Redistribution Attacks / Liu, Y.; Gao, S.; Shi, J.; Wei, X.; Han, Z.; Huang, T.. - In: IEEE TRANSACTIONS ON SMART GRID. - ISSN 1949-3053. - 11:6(2020), pp. 5216-5226. [10.1109/TSG.2020.3008515]

Pre-Overload-Graph-Based Vulnerable Correlation Identification under Load Redistribution Attacks

Huang T.
2020

Abstract

The load redistribution (LR) attack, as a special type of false data injection attacks, aims to distort the results of the security-constrained economic dispatch (SCED) and drive the system to non-optimal or even unsecure operating conditions by injecting false data to the node power injection and branch power flow measurements. The LR attack represents a great danger to the safe and reliable operation of the current power grid where the physical infrastructure is increasingly intertwined with cyber components. In this paper, we propose a novel pre-overload vulnerability graph (POV-graph) approach to systematically assess, evaluate, and quantify the system vulnerability under an LR attack. The proposed approach is formulated based on the specific overloading mechanism of the LR attack as well as their cascading patterns. A set of case studies are performed on the IEEE 39-bus, 118-bus, and RTS-96 systems to validate the effectiveness of the proposed approach. Simulation results have shown, for the first time that, by revealing the vulnerability correlations among branches, the proposed approach allows the system operator to better utilize the defense resources and focus on strengthening a limited number of vulnerable branches to enhance the system's overall security against LR attacks.
File in questo prodotto:
File Dimensione Formato  
09138481.pdf

non disponibili

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 1.83 MB
Formato Adobe PDF
1.83 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2859243