z-logo
open-access-imgOpen Access
Bi‐level modelling of false data injection attacks on security constrained optimal power flow
Author(s) -
Khanna Kush,
Panigrahi Bijaya Ketan,
Joshi Anupam
Publication year - 2017
Publication title -
iet generation, transmission and distribution
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.92
H-Index - 110
eISSN - 1751-8695
pISSN - 1751-8687
DOI - 10.1049/iet-gtd.2017.0226
Subject(s) - electric power system , vulnerability (computing) , computer science , smart grid , metering mode , power (physics) , computer security , operator (biology) , real time computing , reliability engineering , engineering , electrical engineering , physics , quantum mechanics , mechanical engineering , biochemistry , chemistry , repressor , transcription factor , gene
Conventional power system was originally designed to provide efficient and reliable power. With the integration of information technology and advanced metering infrastructure, the power grid has become smart. The smart meters have allowed the system operators to continuously monitor the power system in real time and take necessary action to avoid system failures. Malicious actor, with access to the smart meters can modify sensor measurements to disrupt the operation of power system. To make the power system resilient to such cyber‐attacks, it is important to study all possible outcomes of cyber‐intrusions. In this paper, we present an attack on security constrained optimum power flow. We show with the help of case studies how an attacker, by injecting false data in load measurement sensors, can force system operator to change the dispatch and hence make the power system N –1 in‐compliant. The attack is modeled as a bi‐level optimization problem, aiming to find the minimum set of sensors required to launch the attack. From the system operator's perspective, critical lines and critical generators vulnerable to false data injection (FDI) attack are identified. IEEE 14 bus and 30 bus test systems are used to test the vulnerability of the power system against FDI attacks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here