False Data Injection Attacks on Hybrid AC/HVDC Interconnected Systems with Virtual Inertia-Vulnerability, Impact and Detection

Kaikai Pan, Elyas Rakhshani, Peter Palensky

Research output: Contribution to journalArticleScientificpeer-review

27 Citations (Scopus)
42 Downloads (Pure)

Abstract

Power systems are moving towards hybrid AC/DC grids with the integration of HVDC links, renewable resources and energy storage modules. The load frequency control (LFC) of tomorrow has to consider the complex interactions between these components. Meanwhile, more attention should be paid to cyber security concerns as the LFC loop highly depends on data communications which may be exposed to cyber attacks. In this regard, this article aims to analyze the false data injection (FDI) attacks on the AC/DC interconnected LFC system with inertia emulation and develop advanced diagnosis tools to reveal their occurrence. We build an optimization-based framework for the purpose of vulnerability analysis. Considering the attack impact on frequency stability, it is shown that the multi-area LFC system with parallel AC/DC links and emulated inertia by storage devices is more vulnerable to FDI attacks, compared to the one without inertia emulation and the normal AC system. We then propose a detection approach to detect and isolate each FDI intrusion with a sufficient fast response, and even recover the attack value. In addition to theoretical results, the effectiveness of the proposed method is validated through simulations on the two-area AC/DC interconnected LFC system with inertia emulation capabilities.

Original languageEnglish
Article number9154681
Pages (from-to)141932-141945
Number of pages14
JournalIEEE Access
Volume8
DOIs
Publication statusPublished - 2020

Keywords

  • AC/DC system
  • false data injection attacks
  • inertia emulation
  • load frequency control

Fingerprint

Dive into the research topics of 'False Data Injection Attacks on Hybrid AC/HVDC Interconnected Systems with Virtual Inertia-Vulnerability, Impact and Detection'. Together they form a unique fingerprint.

Cite this