Bilevel Model for Protection-Branch Measurements-Based Topology Attack Against DC and AC State Estimations

Shibin Gao, Zonglun He, Xiaoguang Wei, Yigu Liu, Tao Huang, Jieyu Lei

Research output: Contribution to journalArticleScientificpeer-review

4 Citations (SciVal)
55 Downloads (Pure)

Abstract

A topology attack, as a special class of false data injection attacks, tampers with topology information of a system to mislead the decision of the control center. This article conducts an in-depth study on topology attacks that aim to interfere with the judgment in topology information and pose potential damage by tampering with measurement data and protection information on branches, namely, protection-branch measurements-based topology attacks (PBT attacks). To achieve PBT attacks in actual networks, we study the protection settings and mechanisms in term of branches including transformers and transmission lines. Then, for the first time, we develop a bilevel model based on the protection configuration from the perspective of security-constrained economic dispatch. Meanwhile, since a bilevel model is constructed against dc state estimation, a conversion method in constructing attack vectors under PBT attacks against ac power system is proposed, which makes PBT attacks more suitable for actual power systems and more concealed. In a set of case studies on an IEEE 14-bus system, the simulation results verify the effectiveness of the model we proposed, analyze the vulnerability of network under PBT attacks, and then identify some critical branches that are defended to cope with PBT attacks. In addition, the comparison between PBT attacks and traditional cyber-overloaded attacks also shows a stronger threat of the studied attacks.
Original languageEnglish
Article number9801080
Pages (from-to)5369-5379
Number of pages11
JournalIEEE Systems Journal
Volume16
Issue number4
DOIs
Publication statusPublished - 2022

Bibliographical note

Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • Bilevel model
  • conversion method
  • protection information
  • topology attack

Fingerprint

Dive into the research topics of 'Bilevel Model for Protection-Branch Measurements-Based Topology Attack Against DC and AC State Estimations'. Together they form a unique fingerprint.

Cite this