Hybrid Detection of Intermittent Cyber-Attacks in Networked Power Systems
Efstathios Kontouras,
Anthony Tzes and
Leonidas Dritsas
Additional contact information
Efstathios Kontouras: Electrical & Computer Engineering Department, University of Patras, 26500 Rio, Greece
Anthony Tzes: Electrical & Computer Engineering Program, New York University Abu Dhabi, Abu Dhabi P.O. Box 129188, UAE
Leonidas Dritsas: Department of Electrical & Electronic Engineering Educators, School of Pedagogical & Technological Education, ASPETE, 14121 Athens, Greece
Energies, 2019, vol. 12, issue 24, 1-29
Abstract:
This article addresses the concept of a compound attack detection mechanism, that links estimation-based and set-theoretic methods, and is mainly focused on the disclosure of intermittent data corruption cyber-attacks. The detection mechanism is developed as a security enhancing tool for the load-frequency control loop of a networked power system that consists of several interconnected control areas. The dynamics of the power network are derived in observable form in the discrete-time domain, considering that an adversary corrupts the frequency measurements of certain control areas by means of a bias injection cyber-attack. Simulations indicate that an estimation-based detector is unable to discern an intermittent attack, especially when the latter one occurs at the same time as changes in the power load. The detector can be improved by exploiting the safe operation constraints imposed on the state variables of the system. It is shown that the disclosure of intermittent data corruption cyber-attacks in the presence of unknown power load changes is guaranteed only when the estimation-based detector is combined with its set-theoretic counterpart. To this end, a robust invariant set for the networked power system is computed and an alarm is triggered whenever the state vector exits this set. Simulations indicate that the above detectors can operate jointly in terms of a hybrid scheme, which enhances their detection capabilities.
Keywords: cyber-attacks; load-frequency control; power systems; set-theoretic methods; state estimation (search for similar items in EconPapers)
JEL-codes: Q Q0 Q4 Q40 Q41 Q42 Q43 Q47 Q48 Q49 (search for similar items in EconPapers)
Date: 2019
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)
Downloads: (external link)
https://www.mdpi.com/1996-1073/12/24/4625/pdf (application/pdf)
https://www.mdpi.com/1996-1073/12/24/4625/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jeners:v:12:y:2019:i:24:p:4625-:d:294627
Access Statistics for this article
Energies is currently edited by Ms. Agatha Cao
More articles in Energies from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().