Abstract
This article offers a novel perspective on identifying the critical branches under load redistribution (LR) attacks. Compared to the existing literature that is largely disruption-driven and based on dc state estimation, we propose to address the threat from LR attacks on a more fundamental level by modeling and analyzing the circulation of false data within the cyber network resulting from the coordinated branch and node measurement manipulation based on ac state estimation. We reveal the underlying mechanism that disturbing the coordinated and reconciled interactions among false data injections can effectively sever the completeness and consistency of the LR attack, thus reducing its damaging effect. We then develop a scalable and computationally efficient critical branch identification approach that evaluates and ranks branches in terms of their criticality according to the graph model of the false data circulation. Case studies are conducted on IEEE 14-, 39-, 118-bus systems and several large-scale models to validate the effectiveness and computational efficiency of the proposed approach. Simulation results show that the proposed approach scales well with the size of the system and can effectively mitigate the damaging effects of the LR attack in terms of operation cost and load shedding.
| Original language | English |
|---|---|
| Pages (from-to) | 4079-4091 |
| Number of pages | 13 |
| Journal | IEEE Transactions on Industrial Informatics |
| Volume | 20 |
| Issue number | 3 |
| DOIs | |
| Publication status | Published - 2023 |
Bibliographical note
Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-careOtherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.
Keywords
- Computational modeling
- Critical branch identification
- cyber-physical power systems
- Data models
- flow graph
- Jacobian matrices
- load redistribution (LR) attack
- Measurement units
- Power measurement
- Security
- Transmission line measurements
Fingerprint
Dive into the research topics of 'A Flow Graph-Based Scalable Critical Branch Identification Approach for AC State Estimation Under Load Redistribution Attacks'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver