Detecting False Data Injection Attacks Against Power System State Estimation with Fast Go-Decomposition Approach

Boda Li, Tao Ding, Can Huang, Junbo Zhao, Yongheng Yang, Ying Chen

Research output: Contribution to journalJournal articleResearchpeer-review

86 Citations (Scopus)
506 Downloads (Pure)

Abstract

State estimation is a fundamental function in modern energy management system, but its results may be vulnerable to false data injection attacks (FDIAs). FDIA is able to change the estimation results without being detected by the traditional bad data detection algorithms. In this paper, we propose an accurate and computational attractive approach for FDIA detection. We first rely on the low rank characteristic of the measurement matrix and the sparsity of the attack matrix to reformulate the FDIA detection as a matrix separation problem. Then, four algorithms that solve this problem are presented and compared, including the traditional augmented Lagrange multipliers (ALMs), double-noise-dual-problem (DNDP) ALM, the low rank matrix factorization, and the proposed new 'Go Decomposition (GoDec).' Numerical simulation results show that our GoDec algorithm outperforms the other three alternatives and demonstrates a much higher computational efficiency. Furthermore, GoDec is shown to be able to handle measurement noise and applicable for large-scale attacks.

Original languageEnglish
Article number8489956
JournalI E E E Transactions on Industrial Informatics
Volume15
Issue number5
Pages (from-to)2892-2904
Number of pages13
ISSN1551-3203
DOIs
Publication statusPublished - May 2019

Keywords

  • Cyber security
  • False data injection attacks (FDIA)
  • Matrix separation
  • Smart grid
  • State estimation (SE)
  • matrix separation
  • state estimation (SE)
  • smart grid
  • false data injection attacks (FDIA)

Fingerprint

Dive into the research topics of 'Detecting False Data Injection Attacks Against Power System State Estimation with Fast Go-Decomposition Approach'. Together they form a unique fingerprint.

Cite this