Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Research Article

Improved Wasserstein Generative Adversarial Networks Defense Method Against Data Integrity Attack on Smart Grid

Author(s): Yuancheng Li*, Xiao Wang and Jing Zeng

Volume 15, Issue 3, 2022

Published on: 06 July, 2022

Page: [243 - 254] Pages: 12

DOI: 10.2174/2352096515666220506213526

Price: $65

Abstract

Background: As the integration of communication networks with power systems is getting closer, the number of malicious attacks against the cyber-physical power system is increasing substantially. The data integrity attack can tamper with the measurement information collected by Supervisory Control and Data Acquisition (SCADA), which can affect important decisions of the power grid and pose a significant threat to normal operation.

Objective: In order to defend against the data integrity attack, and safeguard the normal operation of the power system, we propose a defense method based on improved WGAN (Wasserstein Generative Adversarial Networks).

Methods: Firstly, through the training of the discriminator and generator, the discriminator identifies and eliminates the measurements damaged by the data integrity attack, and the generator uses the temporal and spatial correlation of the power grid measurements to generate complementary measurements which are infinitely close to the original normal data. Meanwhile, using the improved WGAN, the training stability and the convergence speed are significantly improved, and the quality of complementary data is much higher.

Results: Extensive simulation experiments were carried out in the IEEE-14 and IEEE-118 standard bus systems. By comparing the deviations between the complementary data and normal data under different iteration times and methods, the mean squared error of the deviations with the proposed method is greatly reduced than traditional methods. The excellent recovery performance of the defense method based on improved WGAN is verified.

Conclusion: A smart grid data integrity attack defense method based on improved WGAN is proposed to detect data integrity attacks, and the experimental results demonstrate the recovery effectiveness of the proposed method.

Keywords: Smart grid, improved WGAN, data integrity attack, defense mechanism, FDIAs, BDD.

Graphical Abstract

[1]
G. Liang, J. Zhao, F. Luo, S.R. Weller, and Z.Y. Dong, "A review of false data injection attacks against modern power systems", IEEE Trans. Smart Grid, vol. 8, no. 4, pp. 1630-1638, 2017.
[http://dx.doi.org/10.1109/TSG.2015.2495133]
[2]
Z. Jing, Research on Defense Methods of Data Integrity Attack in Smart Grid. M.D. dissertation, North China Electric Power University, 2019.
[3]
J.H. Zhao, "Lessons learnt from Ukrainian blackout: Protecting power grids against false data injection attacks", Dianli Xitong Zidonghua, vol. 40, no. 7, pp. 149-151, 2016.
[4]
X.P. Wang, "Survey of false data injection attacks in power transmission systems", Power Syst. Technol., vol. 40, no. 11, pp. 3406-3414, 2016.
[5]
Y. Liu, P. Ning, and M.K. Reiter, "False data injection attacks against state estimation in electric power grids", ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 1-33, 2011.
[http://dx.doi.org/10.1145/1952982.1952995]
[6]
Z. Zhao, Y. Huang, Z. Zhen, and Y. Li, "Data-driven false data-injection attack design and detection in cyber-physical systems", IEEE Trans. Cybern., vol. 51, no. 12, pp. 6179-6187, 2021.
[http://dx.doi.org/10.1109/TCYB.2020.2969320] [PMID: 32086230]
[7]
Y.C. Li, R.X. Qiu, and J. Zeng, "Blind online false data injection attack using kernel principal component analysis in smart grid", Power Syst. Technol., vol. 7, p. 32, 2018.
[8]
X. Liu, Y. Song, and Z. Li, "Dummy data attacks in power systems", IEEE Trans. Smart Grid, vol. 11, no. 2, pp. 1792-1795, 2020.
[http://dx.doi.org/10.1109/TSG.2019.2929702]
[9]
S. Lakshminarayana, A. Kammoun, M. Debbah, and H.V. Poor, "Data-driven false data injection attacks against power grids: a random matrix approach", IEEE Trans. Smart Grid, vol. 12, no. 1, pp. 635-646, 2021.
[http://dx.doi.org/10.1109/TSG.2020.3011391]
[10]
J. Zhu, "Overview of fraudulent data attack on power system state estimation and defense mechanism", Power Syst. Technol., vol. 40, no. 8, pp. 2406-2415, 2016.
[11]
J. Hao, E. Kang, J. Sun, Z. Wang, Z. Meng, X. Li, and Z. Ming, "An adaptive Markov strategy for defending smart grid false data injection from malicious attackers", IEEE Trans. Smart Grid, vol. 9, no. 4, pp. 2398-2408, 2016.
[http://dx.doi.org/10.1109/TSG.2016.2610582]
[12]
O. Boyaci, M.R. Narimani, K. Davis, M. Ismail, T.J. Overbye, and E. Serpedin, "Joint detection and localization of stealth false data injec-tion attacks in smart grids using graph neural networks", IEEE Trans. Smart Grid, vol. 13, no. 1, pp. 807-819, 2022.
[http://dx.doi.org/10.1109/TSG.2021.3117977]
[13]
E. Drayer, and T. Routtenberg, "Detection of false data injection attacks in smart grids based on graph signal processing", IEEE Syst. J., vol. 14, no. 2, pp. 1886-1896, 2020.
[http://dx.doi.org/10.1109/JSYST.2019.2927469]
[14]
I.J. Goodfellow, "Generative adversarial networks", Adv. Neural Inf. Process. Syst.. vol. 3, pp. 06, 2014.
[15]
Y. Li, Y. Wang, and S. Hu, "Online generative adversary network based measurement recovery in false data injection attacks: A cyber-physical approach", IEEE Trans. Industr. Inform., vol. 16, no. 3, pp. 2031-2043, 2019.
[http://dx.doi.org/10.1109/TII.2019.2921106]
[16]
I. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, and A.C. Courville, "Improved training of wasserstein gans", Adv. Neural Inf. Process. Syst., p. 2017, pp. 30, .
[17]
G. Liang, S.R. Weller, F. Luo, J. Zhao, and Z.Y. Dong, "Distributed blockchain-based data protection framework for modern power sys-tems against cyber attacks", IEEE Trans. Smart Grid, vol. 10, no. 3, pp. 3162-3173, 2018.
[http://dx.doi.org/10.1109/TSG.2018.2819663]
[18]
Q. Yang, D. An, R. Min, W. Yu, X. Yang, and W. Zhao, "On optimal PMU placement-based defense against data integrity attacks in smart grid", IEEE Trans. Inf. Forensics Security, vol. 12, no. 7, pp. 1735-1750, 2017.
[http://dx.doi.org/10.1109/TIFS.2017.2686367]
[19]
C. Pei, Y. Xiao, W. Liang, and X. Han, "PMU placement protection against coordinated false data injection attacks in smart grid", IEEE Trans. Ind. Appl., vol. 56, no. 4, pp. 4381-4393, 2020.
[http://dx.doi.org/10.1109/TIA.2020.2979793]
[20]
H. Wang, J. Ruan, G. Wang, B. Zhou, Y. Liu, X. Fu, and J. Peng, "Deep learning-based interval state estimation of AC smart grids against sparse cyber attacks", IEEE Trans. Industr. Inform., vol. 14, no. 11, pp. 4766-4778, 2018.
[http://dx.doi.org/10.1109/TII.2018.2804669]
[21]
R. Deng, G. Xiao, and R. Lu, "Defending against false data injection attacks on power system state estimation", IEEE Trans. Industr. Inform., vol. 13, no. 1, pp. 198-207, 2015.
[http://dx.doi.org/10.1109/TII.2015.2470218]
[22]
J. Tian, B. Wang, T. Li, F. Shang, K. Cao, and R. Guo, "TOTAL: Optimal protection strategy against perfect and imperfect false data injec-tion attacks on power grid cyber–physical systems", IEEE Internet Things J.l, p. vol. 8. 2021, no. 2, pp. 1001-1015.
[http://dx.doi.org/10.1109/JIOT.2020.3009330]
[23]
M. Jorjani, H. Seifi, A.Y. Varjani, and H. Delkhosh, "An optimization-based approach to recover the detected attacked grid variables after false data injection attack", IEEE Trans. Smart Grid, vol. 12, no. 6, pp. 5322-5334, 2021.
[http://dx.doi.org/10.1109/TSG.2021.3103556]
[24]
A.S. Musleh, G. Chen, and Z.Y. Dong, "A survey on the detection algorithms for false data injection attacks in smart grids", IEEE Trans. Smart Grid, vol. 11, no. 3, pp. 2218-2234, 2020.
[http://dx.doi.org/10.1109/TSG.2019.2949998]
[25]
J. Duan, W. Zeng, and M.Y. Chow, "Resilient distributed DC optimal power flow against data integrity attack", IEEE Trans. Smart Grid, vol. 9, no. 4, pp. 3543-3552, 2018.
[http://dx.doi.org/10.1109/TSG.2016.2633943]
[26]
M. Jorjani, H. Seifi, and A.Y. Varjani, "A graph theory-based approach to detect false data injection attacks in power system AC state esti-mation", IEEE Trans. Industr. Inform., vol. 17, no. 4, pp. 2465-2475, 2021.
[http://dx.doi.org/10.1109/TII.2020.2999571]
[27]
X. Yin, Y. Zhu, and J. Hu, "A subgrid-oriented privacy-preserving microservice framework based on deep neural network for false data injection attack detection in smart grids", IEEE Trans. Industr. Inform., vol. 18, no. 3, pp. 1957-1967, 2022.
[http://dx.doi.org/10.1109/TII.2021.3102332]
[28]
S. Bi, and J.Z. Ying, "Graphical methods for defense against false-data injection attacks on power system state estimation", IEEE Trans. Smart Grid, vol. 5, no. 3, pp. 1216-1227, 2014.
[http://dx.doi.org/10.1109/TSG.2013.2294966]
[29]
J. Tian, B. Wang, F. Shang, and S. Liu, "Sparse false data injection attacks based on data driven", Electr. Power Autom. Equip., vol. 37, no. 12, pp. 52-59, 2017.
[30]
Y. Li, and Y. Wang, "State summation for detecting false data attack on smart grid", Int. J. Electr. Power Energy Syst., vol. 57, pp. 156-163, 2014.
[http://dx.doi.org/10.1016/j.ijepes.2013.11.057]
[31]
L. Yang, Y. Li, and Z. Li, "Improved-ELM method for detecting false data attack in smart grid", Int. J. Electr. Power Energy Syst., vol. 91, pp. 183-191, 2017.
[http://dx.doi.org/10.1016/j.ijepes.2017.03.011]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy