Journal of Modern Power Systems and Clean Energy

ISSN 2196-5625 CN 32-1884/TK

网刊加载中。。。

使用Chrome浏览器效果最佳,继续浏览,你可能不会看到最佳的展示效果,

确定继续浏览么?

复制成功,请在其他浏览器进行阅读

Detection and Estimation of False Data Injection Attacks for Load Frequency Control Systems  PDF

  • Jun Ye
  • Xiang Yu
the Hangzhou Innovation Institute, Beihang University, Hangzhou, China; the School of Automation Science and Electrical Engineering, Beihang University, Beijing, China

Updated:2022-07-15

DOI:10.35833/MPCE.2020.000928

  • Full Text
  • Figs & Tabs
  • References
  • Authors
  • About
CITE
OUTLINE

Abstract

False data injection attacks (FDIAs) against the load frequency control (LFC) system can lead to unstable operation of power systems. In this paper, the problems of detecting and estimating the FDIAs for the LFC system in the presence of external disturbances are investigated. First, the LFC system model with FDIAs against frequency and tie-line power measurements is established. Then, a design procedure for the unknown input observer (UIO) is presented and the residual signal is generated to detect the FDIAs. The UIO is designed to decouple the effect of the unknown external disturbance on the residual signal. After that, an attack estimation method based on a robust adaptive observer (RAO) is proposed to estimate the state and the FDIAs simultaneously. In order to improve the performance of attack estimation, the H technique is employed to minimize the effect of external disturbance on estimation errors, and the uniform boundedness of the state and attack estimation errors is proven using Lyapunov stability theory. Finally, a two-area interconnected power system is simulated to demonstrate the effectiveness of the proposed attack detection and estimation algorithms.

I. Introduction

MAINTAINING the balance between the electricity supply and demand is one of the most important issues in power systems. The power imbalance will lead to the deviation of the grid frequency from its nominal value, which might affect the power system stability and security [

1]. Load frequency control (LFC) system is a networked control system which keeps the frequency and power interchanges with neighborhood areas at desired values by adjusting the power outputs of generators [2], [3]. In the LFC system, the input control signal called area control error (ACE) is composed of local-area frequency and tie-line power measurements. By tracking the ACE signal, the power outputs of generators are modified to balance random load fluctuation and then the frequency is maintained within an acceptable range around the nominal value [4], [5].

However, due to the heavy reliance on communication networks, the power system is vulnerable to cyber attacks [

6], [7]. Cyber attacks on the LFC system will affect the frequency stability of the system, and even trigger remedial actions such as disconnecting generators or customer loads. Such unexpected actions may cause equipment damage and cascading failures leading to massive blackouts [8]. For instance, in December 2015, Ukrainian power grid suffered a cyber attack, causing a blackout and affecting approximately 225000 customers for several hours [9].

False data injection attack (FDIA) is one of most severe types of cyber attacks on smart grids. A malicious attacker can compromise the communication networks and inject false data into the LFC system, which may cause huge damage to the power system [

10]. Therefore, it is of great significance to detect and estimate the FDIAs that may occur in the LFC system.

There have been several detection techniques for FDIAs on LFC systems. For instance, in [

11], a new full-order state observer is designed for attack detection. In [12], a distributed interval observer is proposed to detect bias injection attacks. Furthermore, a robust adaptive observer-based algorithm is proposed in [13] to detect the bias load injection attacks. In [14], the FDIAs are detected by checking the consistency between the observed and predicted frequency deviations. In [15], a multi-layer perception classifier based method is introduced to extract the features of ACE signals, thus distinguishing compromised signals from normal ones. In [16], a support vector domain description based method is proposed to extract the features of normal LFC signals and then detect the FDIAs. In [17], the forecasted ACE data are utilized for the detection of FDIAs. In [18], global positioning system (GPS) spoofing attacks on the LFC system are studied. An attack detection technique consisting of a Luenberger observer and an artificial neural network observer is proposed to detect this type of FDIA.

After the attack is detected, the next step is attack estimation. The estimation of the attack vector is very worthwhile to discover the attackers’ strategies and helps the decision maker take further actions. In recent years, various types of estimation methods have been proposed. In [

19], a dynamic state estimator is proposed to estimate the state and unknown inputs considering the attacks on phasor measurement units of the power grid. In [20], an adaptive sliding mode observer with online parameter estimators is designed to estimate the state and attack of power systems. An unknown input functional observer is proposed to estimate the dynamic states of the LFC system in [21]. In [22], the attack signal is dealt with an unknown input and estimated using a three-step recursive filter. In [23], a co-estimation of the power system states and attack vector based on unknown input observer and Kalman filter is investigated. In [24], model-free defense strategies are proposed to handle the load altering attack with the aid of reinforcement learning and deep neural network techniques. In addition, the attack estimation is somewhat similar to fault reconstructions. Certain relevant techniques such as adaptive observer [25], [26], disturbance observer [27]-[29], and learning observer [30], [31] can be used.

Although some achievements have been made on the detection and estimation of FDIAs in power systems, some issues still remain to be addressed. ① To detect and estimate the attacks, the system model under FDIAs must be obtained. Thus, how to establish the model of the LFC system with the attacks of frequency and tie-line power measurement needs an explicit investigation. ② Both the abrupt load fluctuation and FDIAs will lead to the abnormal operation of power systems. The above-mentioned methods cannot distinguish the FDIAs from the load variation. The wrong distinction may lead to wrong decisions. ③ The accurate estimation of the FDIAs when the attacks and the load disturbance are mixed together is challenging and has rarely been addressed.

To resolve these shortcomings, this paper focuses on the problems of the detection and estimation of FDIAs for the LFC system. An unknown input observer (UIO) is then developed to detect the FDIAs for the LFC system. Furthermore, inspired by the composite hierarchical anti-disturbance control theory [

27], a robust adaptive observer (RAO) is developed to investigate the problem of simultaneously estimating the state and attacks in the presence of the load disturbance.

The main contributions of this paper are listed and discussed as follows.

1) A new model for describing the attacked LFC system is proposed. This model can be used for analyzing the system during the attacks of frequency and tie-line power measurements. Different from the existing research works [

15], [22], the attacks of frequency and tie-line power measurements are modeled as a lumped attack in order to attain better detection and estimation performance due to the existence of both disturbances and multiple attacks. Furthermore, three types of FDIAs are modeled and analyzed considering the impact of the attacks on the LFC system.

2) A UIO-based attack detection method against FDIAs is designed for the LFC system. The load fluctuation is modeled as an unknown input and can be completely decoupled from the residual signal. Thus, the residual signal is sensitive to the attacks and robust to the disturbance. FDIAs are then detected by comparing the residual signal and the prescribed threshold.

3) An RAO is developed to estimate the state and the attack signal simultaneously for the LFC system. In order to improve the accuracy of attack estimation, the H technique is applied and the disturbance attenuation level is minimized by employing the linear matrix inequality (LMI) based optimization approach. The stability of the proposed RAO is proven by using Lyapunov stability theory. Compared with the traditional adaptive observer [

32], the proposed RAO can attenuate the influence of the external disturbance on the attack estimation error.

Throughout the paper, the vector norm is defined as x=xTx and the matrix norm is defined as A=σmax(A)=λmax(ATA)σmax(A), where λmax(A) is the maximum singular value; x2 is the L2-norm defined as x2=0x2dt; and I is an identity matrix of appropriate dimension. For a matrix Y, sym(Y)=Y+YT.

The rest of this paper is organized as follows. Section II presents the modeling and analysis of LFC system subject to FDIAs. Section III presents the UIO-based attack detection. Section IV presents the RAO-based attack estimation. In Section V, simulation results of a two-area power system are presented to illustrate the effectiveness of the proposed UIO-based attack detection and RAO-based attack estimation method. Finally, Section VI concludes this paper.

II. Modeling and Analysis of LFC System Subject to FDIAs

A. LFC System Model

Large power systems usually consist of several power areas connected together by tie-lines. The LFC system is a large-scale networked control system which regulates the power flow between different power areas while keeping the desired frequency and power interchanges at the desired level. The mathematical model of the ith LFC system under FDIAs can be represented by an equivalent linear model [

33] shown in Fig. 1.

Fig. 1  Mathematical model of ith LFC system under FDIAs.

According the transfer function given in Fig.1, it can be obtained that:

Δf˙i=1Mi(ΔPGi-DiΔfi-ΔPdi-ΔPtie,i)ΔP˙Gi=1Ttu,i(ΔPvi-ΔPGi)ΔP˙vi=1Tg,iui-ΔPvi-1RiΔfiΔP˙tie,i=2πj=1,jinTi,jΔfi (1)

where i is the area number; ΔPGi, Δfi, ΔPvi, ΔPdi, and ΔPtie,i are the generator power deviation, frequency deviation, turbine valve position, load deviation, and tie-line power deviation, respectively; Mi, Di, Ri ,Tg,i, and Ttu,i are the moment of inertia of generator, speed-drop coefficient, damping coefficient, time constant of the governor, and time constant of the turbine for the ith power area, respectively; ui is the control input; and Ti,j is the stiffness constant between the ith and jth power areas.

Furthermore, the LFC center receives the ACE signal, which is a linear combination of the frequency deviation and tie-line power deviation. Then, the LFC center sends the LFC command to the plants, which can mitigate the power imbalance in power areas, thus achieving the stability of frequency and tie-line power. The ACE signal under attack-free conditions can be defined as:

ACEi=βiΔfi+ΔPtie,i (2)

where βi is the frequency bias factor. Using the ACE signal as a corresponding control input of load frequency controller, a proportional-integral (PI) controller is designed as:

ui=-KPiACEi-KIiACEidt (3)

where KPi and KIi are the proportional and integral gains, respectively.

Combining the above analyses, the state-space equation of the ith LFC power area under attack-free conditions can be described as:

x˙(t)=Ax(t)+Bu(t)+Ed(t)y(t)=Cx(t) (4)

where x(t)Rn, u(t)Rm, d(t)Rd, and y(t)Rp are the state variable vector, input vector, disturbance vector, and output vector, respectively; x(t)=Δfi,ΔPGi,ΔPvi,ΔPtie,iACEidtT and y(t)=ACEi,ACEidtT are the state variable matrix and output matrix, respectively; and A, B, C, and E are the state, input, output, and disturbance matrices, respectively. These matrices can be determined as:

A=-DiMi1Mi0-1Mi00-1Ttu,i1Ttu,i00-1RiTg,i0-1Tg,i002πj=1,jiNTi,j0000βi0010 (5)
B=001Tg,i00T (6)
C=00001βi0010 (7)
E=-1Mi0000T (8)

The power areas are connected to the centralized LFC system. The LFC system sends control signals to the plants and receives signals through sensor measurements. As depicted in Fig. 1, two main measurements of the LFC system are considered as potential attack targets. The false data can be injected to the tie-line and frequency measurements by intruding the susceptible communication channels. When the measurements of the ith area are attacked by the FDIAs, the ACE signal is modified to:

ACEFDIA,i(t)=ΔPtie,i(t)+fFDIA,tie(t)+βi(Δfi(t)+fFDIA,fr(t))=ACEtrue,i(t)+fFDIA,tie(t)+βifFDIA,fr(t) (9)

where ACEFDIA,i(t) and ACEtrue,i(t) are the compromised and true ACE signals, respectively; and fFDIA,tie(t) and fFDIA,fr(t) are the false signals added to the frequency and tie-line power measurements, respectively.

According to the above analyses, the state-space equation of the ith power area during attacks can be modified as:

x˙(t)=Ax(t)+Bu(t)+Ed(t)+FfFDIA(t)y(t)=Cx(t) (10)

where F is the attack matrix; and fFDIA(t)Rr denotes the FDIAs, which can be expressed as:

F=00001T (11)
fFDIA(t)=fFDIA,tie(t)+βifFDIA,fr(t) (12)

Remark 1: since the ACE signal is the control input of the LFC system and it is a linear combination of the frequency deviation and tie-line power deviation. Either the attack on the frequency measurement or on the tie-line power measurement will be reflected in the ACE signal. Therefore, a lumped attack term is adopted to represent the combined effect of the attacks of frequency and tie-line power measurements.

B. Modeling and Analysis of FDIAs

In this paper, three types of attack modes are considered and listed as follows.

1) Attack mode 1: bias attack on the tie-line power measurement.

In this mode, attackers add certain bias vector on tie-line power measurement. Then, the compromised ACE signal ACEFDIA,i(t), which is used to generate frequency control commands in LFC center of area i, can be expressed as a linear combination of the true measurement ACEtrue,i(t) and an attack term fbias(t):

ACEFDIA,i(t)=ΔPtie,i(t)+fbias(t)+βiΔfi(t)=ACEtrue,i(t)+fbias(t) (13)

The attack model can be described as:

fFDIA(t)=fFDIA,tie(t)=fbias(t) (14)

2) Attack mode 2: harmonic attack on the frequency measurement.

In this mode, attackers add harmonic vector on the frequency measurement. The harmonic attack can be expressed as:

fFDIA,fr(t)=Ahsin(wht+φ) (15)

where Ah, wh, and φ are the amplitude, frequency, and phase of the harmonic attack, respectively.

The attack model can be expressed as:

fFDIA(t)=βifFDIA,fr(t)=βiAhsin(wht+φ) (16)

Since the system frequency of the power system usually fluctuates periodically due to load fluctuation, the harmonic attack on the frequency measurement is difficult to detect by the system operator.

3) Attack mode 3: simultaneous attacks on the frequency measurement and tie-line power measurement.

In this mode, attackers inject the bias attack on tie-line power measurement and the harmonic attack on frequency measurement simultaneously. The attack model can be expressed as:

fFDIA(t)=fFDIA,tie(t)+βifFDIA,fr(t)=fbias(t)+βiAhsin(wht+φ) (17)

The impacts of FDIAs on power systems are shown in Table I. From this table, it can be observed that the FDIAs will have direct impacts on the power system and may lead to load shedding or generator tripping, which would cause severe damages to the power system. Therefore, detection and estimation of the FDIAs are urgent, which can be achieved by the proposed methods.

TABLE I  Impacts of FDIAs on Power Systems
Attack modeDirect impactIndirect impactSevere impact
Bias attack (fbias(t)>0) Frequency drops below nominal value Generation deficit and load shedding Massive blackout
Bias attack (fbias(t)<0) Frequency exceeds nominal value Generation redundancy and generator tripping Cascading failures
Harmonic attack Frequency fluctuation Load shedding or generator tripping Massive blackout
Composite attack Frequency fluctuation Load shedding or generator tripping Massive blackout

Remark 2: there exist other types of FDIAs such as scaling attack and ramp attack. In this paper, we only focus on the bias attack and harmonic attack. The modeling and analysis of the FDIAs can lay a good foundation for the attack detection and estimation.

III. UIO-based Attack Detection

A. Design Procedure of UIO

A UIO-based attack detection method is proposed to decouple the external disturbance and detect the FDIAs. The dynamic model of the UIO for the system in (10) can be represented as:

z˙(t)=Fz(t)+TBu(t)+Ky(t)x̂(t)=z(t)+Hy(t) (18)

where z(t) is the state vector of the UIO system; x̂(t) is the estimated state vector of x(t); and F, T, H, and K are the gain matrices, which should be designed to achieve unknown input decoupling. Figure 2 depicts the block diagram of UIO in (18), which has the capability of decoupling the estimation error of the dynamic states from the disturbance in the original system.

Fig. 2  Block diagram of UIO for LFC system under FDIAs.

In order to select proper gain matrices for designing the UIO, the state estimation error dynamics can be expanded as:

e˙(t)=x˙(t)-x̂˙(t)=(A-HCA-K1C)e(t)+[F-(A-HCA-K1C)]z(t)-[K2-(A-HCA-K1C)H]y(t)-[T-(I-HC)]Bu(t)+(I-HC)Ed(t)+(I-HC)FfFDIA(t) (19)

where K=K1+K2. The parametric matrices of the UIO can be obtained by solving:

F=A-HCA-K1CK2=(A-HCA-K1C)HT=I-HC(I-HC)E=0 (20)

If the above conditions are satisfied, then the state estimation error dynamics will be:

e˙(t)=Fe(t)+(I-HC)FfFDIA(t) (21)

It is clear from (21) that the estimation error is decoupled from the unknown input d(t). If the matrix F is Hurwitz and the system is attack-free, the estimation error of the designed UIO will approach zero asymptotically.

It is proven in [

34] that the necessary and sufficient conditions for the existence of the UIO are: ①rank(CE)= rank(E); ② the pair (C,  A1) is a detectable pair as:

A1=A-E[(CE)TCE]-1(CE)TCA (22)

A flow chart that describes the design procedure of the UIO is depicted in Fig. 3. The first step is to check the existence of the UIO by checking whether rank(CE)=rank(E). If this condition is not met, the UIO does not exist. To solve this problem, the matrix C can be changed by defining new virtual outputs to satisfy the rank condition. If the rank condition is met, the matrices H, T, and A1 can be calculated. The next step is to check the observability of the pair (C, A1). If this condition is satisfied, the matrix K1 can be easily computed by using the pole placement method. Otherwise, a transformation matrix P1 should be constructed by performing the observable canonical decomposition method on the pair (C, A1), as demonstrated in (23) and (24).

P1A1P1-1=A110A12A22    A11Rn1×n1 (23)
CP1-1=C*0    C*Rm×n1 (24)

Fig. 3  Flow chart of design procedure of UIO.

where n1 is the rank of the observability matrix for the pair (C,  A1) in which the pair (C*,  A11) is observable. The unobservable modes are combined in the eigenvalues of A22. More details about the observable canonical decomposition method can be found in [

35].

B. Residual Generation

In order to use the UIO for attack detection purposes, a residual signal is needed. In this paper, the difference between the measured output and estimated output is considered as a residual signal.

r(t)=y(t)-ŷ(t)=C(x(t)-x̂(t))=Cex(t) (25)

where r(t) and ŷ(t) are the residual and estimated output vectors, respectively. It can be seen from (21) and (25) that the residual signal will converge to zero with the state estimation error ex(t) approaching zero in the absence of FDIAs. When FDIAs occur, the residual signal will deviate from zero if the gain matrix H is designed such that (I-HC)F0. Then, the detection logic under FDIAs can be expressed as:

Alarm=1r(t)>α0r(t)α (26)

where Alarm=1 means the FDIAs have been injected into the LFC system and Alarm=0 otherwise; and α is the detection threshold, which set to be zero under ideal conditions. However, due to the existence of estimation errors and measurement noises, the threshold should be set to a small value to avoid false positive alarms.

Remark 3: the threshold selection is very important since a high threshold would result in high false negative rates and a low threshold would result in high false positive rates (FPR). The detection threshold can be set either by minimizing false attack detection rate under attack-free conditions, or by using hypothesis testing methods such as χ2-test [

36]. In this paper, an empirical method [37] is applied to obtain the threshold value of the proposed attack detection algorithm as follows.

Step 1:   define a maximum acceptable FPR.

Step 2:   generate measurement noises based on the noise distribution.

Step 3:   increase the detection threshold from zero until the FPR meets the desired FPR, e.g., 1%. This step is done to fine tune the detection thresholds for a low FPR.

Step 4:   perform the above process (Steps 2 and 3) for a large number of trials due to the random nature of measurements noises.

Step 5:   obtain the mean values of the detection thresholds for the trials.

Step 6:   select the mean value of the detection thresholds as the final detection threshold.

Note that the system model could contain uncertainties, e.g., the parameter uncertainty. The uncertainties would influence the detection accuracy of the UIO. One method to deal with the uncertainties is to obtain a priori knowledge of the upper and lower bounds of the uncertainties. Then, the detection threshold can be adaptively adjusted according to the upper and lower bounds. For example, the adaptive threshold can be obtained by using the L2-norm method [

11]. FDIAs can be detected by comparing the residual signal with the adaptive threshold.

IV. RAO-based Attack Estimation

A. Observer Design

For system (10), a robust adaptive attack observer can be designed as:

x̂˙(t)=Ax̂(t)+Bu(t)+Ff̂FDIA(t)+L(y(t)-ŷ(t))ŷ(t)=Cx̂(t)f̂FDIA(t)=ΓQ(e˙y(t)+σey(t)) (27)

where f̂FDIA(t) is the attack estimate vector; ey(t)=y(t)-ŷ(t) is the output error vector; Γ>0 is a positive learning ratio; LRn×p is the observer gain matrix; QRr×p is the matrix to be determined; and σ is the positive scalar.

The state estimate error ex(t), output estimate error ey(t), and attack estimate error ef(t) can be defined as:

ex(t)=x(t)-x̂(t)ey(t)=y(t)-ŷ(t)ef(t)=fFDIA(t)-f̂FDIA(t) (28)

Then, the error dynamics is described by:

e˙x(t)=(A-LC)ex(t)+Ed(t)+Fef(t)e˙y(t)=Cex(t) (29)

B. Stability Analysis

Before the main results are presented, three assumptions and a lemma are given.

Assumption 1: pair (A, C) is observable and rank(CF)=rank(F)=r.

Assumption 2: the load disturbance d(t)L2[0,) is bounded, i.e., d(t)2d1, where d1 is an unknown constant.

Assumption 3: the derivative of fFDIA(t) with respect to time is norm bounded, i.e.,

f˙FDIA(t)f1 (30)

where f1>0 is an unknown constant. It is evident that the aforementioned three types of FDIAs satisfy this assumption.

Lemma 1 [

32]: given a scalar μ>0 and a symmetric positive definite matrix G, the inequality (31) holds.

2xTy1μxTGx+μyTG-1y    x,yRn (31)

Theorem 1: consider system (10). Under Assumptions 1-3 and given scalars σ,μ,γ>0, if there exist positive definite symmetric matrices PRn×n, GRr×r, and other matrices YRn×p and QRr×p, such that the following conditions hold:

sym(PA-YC)+CTC-1σ(ATPF-CTYTF)PE*-2σFTPF+1σμG1σFTPE**-γ2I<0 (32)
FTP=QC (33)

where * represents the symmetric elements in a symmetric matrix, then the proposed robust adaptive observer (27) with Y=PL can ensure that the state estimate error ex(t) and the attack estimate error ef(t) are uniformly bounded and output estimate error for the external disturbance satisfies the H performance ey(t)2γd(t)2.

Proof: consider the following Lyapunov function as:

V(t)=exT(t)Pex(t)+1σefT(t)Γ-1ef(t) (34)

The derivative of the Lyapunov candidate with respect to time can be derived as:

V˙(t)=e˙xT(t)Pex(t)+exT(t)Pe˙x(t)+2σefT(t)Γ-1e˙f(t)=ex[(A-LC)TP+P(A-LC)]ex(t)+2exTPFef(t)+2exTPEd(t)-2σefTQ(e˙y(t)+σey(t))+2σefT(t)Γ-1f˙FDIA(t) (35)

According to (33), we can obtain:

-2σefT(t)Q(e˙y(t)+σey(t))=-2σefTFTP(e˙x(t)+σex(t)) (36)

Substituting (36) into (35) yields:

V˙(t)=e˙xT(t)Pex(t)+exT(t)Pe˙x(t)+2σefT(t)Γ-1e˙f(t)=ex(t)[(A-LC)TP+P(A-LC)]ex(t)+2exTPEd(t)-2σefT(t)(A-LC)TPFex(t)-2σefT(t)FTPFefT(t)-2σefT(t)FTPEd(t)+2σefT(t)Γ-1f˙FDIA(t) (37)

From Lemma 1 and Assumption 3, we can obtain:

2σefT(t)Γ-1f˙FDIA(t)1σμefT(t)Gef(t)+μσf˙FDIAT(t)Γ-1GΓ-1f˙FDIA(t)1σμefT(t)Gef(t)+μσf12λmax(Γ-1GΓ-1) (38)

Substituting (38) into (37), we can further obtain:

V˙(t)ex(t)[(A-LC)TP+P(A-LC)]ex(t)+2exTPEd(t)-2σefT(t)(A-LC)TPFex(t)-2σefT(t)FTPFefT(t)-2σefT(t)FTPEd(t)+1σμefT(t)Gef(t)+μσf12λmax(Γ-1GΓ-1) (39)

To guarantee that the proposed adaptive observer is robust to the external unknown disturbance d(t), an H performance index function is introduced as:

J=0[eyT(t)ey(t)-γ2dT(t)d(t)]dt (40)

Under the zero initial conditions, we have V(0)=0 and V()0, which leads to:

J=0[eyT(t)ey(t)-γ2dT(t)d(t)+V˙(t)]dt-V()+V(0)0[eyT(t)ey(t)-γ2dT(t)d(t)+V˙(t)]dt (41)

It follows from (41) that:

eyT(t)ey(t)-γ2dT(t)d(t)+V˙(t)ex(t)[(A-LC)TP+P(A-LC)+CTC]ex(t)+2exTPEd(t)-γ2dT(t)d(t)-2σefT(t)(A-LC)TPFex(t)-2σefT(t)FTPFefT(t)-2σefT(t)FTPEd(t)+1σμefT(t)Gef(t)+μσf12λmax(Γ-1GΓ-1)=ξTΞξ+μσf12λmax(Γ-1GΓ-1)Ξ=sym(P(A-LC))+CTC-1σ(A-LC)TPFPE*-2σFTPF+1σμG-1σFTPE**-γ2Iξ=[ex(t)ef(t)d(t)]T (42)

If conditions (32) and (33) hold, we can obtain:

J=0[eyT(t)ey(t)-γ2dT(t)d(t)]dt<0-εξ2+μσf12λmax(Γ-1GΓ-1)dt (43)

where ε=λmin(-Ξ). Then J<0, which indicates ey(t)2γd(t)2 for :

εξ2>μσf12λmax(Γ-1GΓ-1) (44)

Note that Theorem 1 is deduced from the three assumptions and Lemma 1. Specially, Assumption 1 provides a sufficient condition for the existence of the robust adaptive observer. Assumption 2 is used to illustrate the existence of the H performance index in Theorem 1. Assumption 3 and Lemma 1 are used to deduce (38).

Therefore, both the state estimate error ex(t)and the attack estimate error ef(t) converge to a small set while the output estimate error ey(t) for the external disturbance d(t) satisfies the H performance ey(t)2γd(t)2. This completes the proof.

Remark 4: as illustrated in Theorem 1, compared with the traditional adaptive observer [

32], the RAO can suppress the impact of the external disturbance on the attack estimation error. In addition, different from the disturbance observer-based methods [29], the attacks of frequency and tie-line power measurements are modeled as a lumped attack and can be estimated under the condition that the derivative of the attack is bounded.

Remark 5: the effect of the disturbance d(t) on the output estimate error ey(t) is bounded by the value of γ. The accuracy of state and attack estimations increases with a decrease in the value of γ. Therefore, the robustness of the proposed adaptive observer can be enhanced by minimizing γ. The minimum γ can be obtained by solving the following optimization problem:

min γ2s.t.  (32) and (33) (45)

Remark 6: in Theorem 1, the condition (32) can be solved by using standard LMI toolbox. However, it is difficult to solve (32) and (33) simultaneously. To solve this problem, we can transform (33) into the following LMI-based convex optimization problem:

min ηs.t.  ηIFTP-QC*ηI>0 (46)

With this method, a sufficiently small positive scalar η can be selected such that matrices P and Q can be computed to make FTP approximately equal to QC with satisfactory accuracy.

Using (46), we can transform (45) into the following optimization problem:

min (γ2+ρη)s.t.  (32)       ηIFTP-QC*ηI>0 (47)

where ρ is a constant that is large enough to guarantee that the optimal value of η is a sufficiently small positive scalar. This optimization problem seeks two objectives. The first one is to find proper matrices P, G, Y, and Q such that the proposed adaptive observer can ensure that the state estimate error ex(t)and the attack estimate error ef(t)are uniformly bounded. The other objective is to boost the robustness of the observer against the external disturbance d(t) by minimizing the disturbance attenuation level γ while satisfying the relevant constraints.

V. Simulation Results

In this section, the effectiveness of the proposed detection and estimation methods is illustrated with a two-area interconnected power system. The classical LFC model in Fig. 1 is used. The stiffness constant between the two areas is T1,2=0.2. The parameters of two-area interconnected power system are listed in Table II. Attackers compromise the measurements in area 1, while the measurements in area 2 are intact. The load fluctuation is considered as:

dt=00t50.025<t200.0320<t40040<t60 (48)
TABLE II  Parameters of Two-area Interconnected Power System
Area iMiDiRiTg,iTtu,iβi
1 10 1.0 0.05 0.10 0.3 21.0
2 12 1.5 0.05 0.17 0.4 21.5

Several simulation scenarios have been carried out for the three aforementioned attack modes. The bias attack on the tie-line power measurement is considered as:

fbias(t)=00t100.0510<t30030<t60 (49)

The harmonic attack on the frequency measurement is considered as:

fhar(t)=00t200.002sin(3t-10)20<t40040<t60 (50)

A. Simulation Results of Attack Detection

In this subsection, the performance of the proposed UIO-based attack detection scheme is investigated. Firstly, the existence of the UIO has been checked by validating the rank condition, rank(CE)=rank(E)=1. Then, the residual used for designing the attack detector in the LFC system is chosen as the error between the measured ACE signal and the estimated ones. The simulation results for the three attack modes are shown in Fig. 4.

Fig. 4  Simulation results for three attack modes. (a) Bias attack. (b) Harmonic attack. (c) Composite attack.

The threshold is chosen to be higher than the maximum value of these residuals in case of no attacks. As shown in Fig.4, the attack signals can be immediately detected by comparing the norm of the residuals with the predefined threshold. To demonstrate the superiority of the proposed attack detection method, a comparison between the proposed UIO-based detection method and the detection method designed in [

11] is conducted. The comparison results shown in Fig. 4 reveal that the accuracy of attack detection of the UIO is much higher than the observer designed in [11]. The reason lies in that the observer designed in [11] cannot decouple the residual signal from the disturbance and the residual exceeds the threshold at certain times under attack-free conditions.

In order to assess the robustness of the proposed approach against the measurement noises, a Gaussian white noise with zero mean and covariance matrix Q=0.002I is added to the measurement vector. The maximum acceptable FPR is set to be 0.5%. By using the proposed threshold selection method, the threshold is set to be 0.19×10-2 p.u.. The detection results for the three types of FDIAs are shown in Fig. 5. As can be seen, before the attacks occur, the residuals are always below the threshold and thus, no detection alarm is issued. However, when the attacks are launched, the residual signals exceed the threshold. Therefore, it can be concluded that the designed attack detection scheme can effectively detect the occurrence of FDIAs in the presence of measurement noises.

Fig. 5  Detection results for three types of FDIA.

B. Simulation Results of Attack Estimation

In this subsection, the accuracy of the proposed RAO-based attack estimation scheme is studied. For the RAO (27), the parameters are chosen such that σ=1,μ=1, Γ=0.01. Using Theorem 1 and solving (47), we can obtain:

η=6.0320×10-11γ=1.0448×10-3P=106×0.03200.00000.00000.00000.00000.00003.4244-0.00500.00000.00000.0000-0.00503.43930.0000-0.00120.00000.00000.00003.42170.00590.00000.0000-0.00120.00593.6604L=75.42140.0859-13.864070.89110.01460.0003-2.82801.6609-0.0000-0.0000-0.11491.6634-9.50520.00020.00010.59200.0000-0.00020.5000-0.000741.00130.00050.00050.99880.3722 (51)

The simulation results shown in Figs. 6-8 indicate that the proposed RAO leads to an accurate estimation for the bias, harmonic and composite attacks with the load disturbance. However, as shown in Figs.6-8, the estimation accuracy of the traditional adaptive observer (AO) [

32] or the adaptive sliding mode observer (ASMO) [38] is much lower than that of the RAO with the same disturbance. By combining the above simulation results, we can see that the proposed RAO is not disturbance-sensitive. The reason lies in that the proposed RAO can attenuate the influence of the external disturbance on the attack estimation error, and therefore it can be concluded that the proposed observer is robust to the external disturbance.

Fig. 6  Bias attack and its estimate with RAO, traditional AO, and ASMO.

Fig. 7  Harmonic attack and its estimate with RAO, traditional AO, and ASMO.

Fig. 8  Composite attack and its estimate with RAO, traditional AO, and ASMO

Furthermore, to demonstrate the effectiveness of the proposed method more quantitatively, the root mean squared error (RMSE) is utilized as a measure to evaluate the accuracy of the observers. The RMSE for the attack signals is calculated using the following formula:

RMSE=t=1mfFDIA(t)-f̂FDIA(t)2m (52)

where m is the total number of sample points. A Gaussian white noise with zero mean and covariance matrix Q = 0.002I is also added to the measurement vector. The RMSEs for the three types of estimated attack signals using the RAO and traditional adaptive observer are shown in Table III. It is observed that the proposed method is superior for its higher accuracy in the estimation of the attack signals in the presence of measurement noises.

TABLE III  Comparison Between Proposed RAO and Traditional AO
Attack modeRMSE with traditional AORMSE with proposed RAO

Improvement

rate (%)

Bias attack 0.009699 0.004175 56.95
Harmonic attack 0.005879 0.003884 33.93
Composite attack 0.010121 0.004166 58.83

VI. Conclusion

In this paper, the problem of cyber attacks on the LFC system is studied. Firstly, the dynamic model of the LFC system subject to external disturbance and FDIAs is established and three attack modes are modeled and analyzed considering the FDIAs on frequency measurements and tie-line power measurements. Then, an attack detection and an attack estimation algorithm are proposed for the LFC system in the presence of FDIAs. Based on the UIO, a design procedure for the residual generation to detect the attack is presented. By designing the parameters in the observer, the unknown external disturbance is decoupled from the residual signal. An RAO-based attack estimation method is proposed to estimate the state and the attack signal simultaneously. In order to improve the robustness against the external disturbance, the H technique is introduced by minimizing the disturbance attenuation level. Finally, three attack modes are simulated with a two-area power system. The simulation results show that the proposed detection method is able to effectively detect the attacks and the estimation method can accurately estimate the attacks for the LFC system in the presence of the external unknown disturbance. How to mitigate the impact of FDIAs on the LFC system will become our next consideration.

References

1

K. Liao and Y. Xu, “A robust load frequency control scheme for power systems based on second-order sliding mode and extended disturbance observer,” IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3076-3086, Jul. 2018. [Baidu Scholar] 

2

K. Lu, G. Zeng, X. Luo et al., “An adaptive resilient load frequency controller for smart grids with DoS attacks,” IEEE Transactions on Vehicular Technology, vol. 69, no. 5, pp. 4689-4699, May 2020. [Baidu Scholar] 

3

T. N. Pham, H. Trinh, and L. V. Hien, “Load frequency control of power systems with electric vehicles and diverse transmission links using distributed functional observers,” IEEE Transactions on Smart Grid, vol. 7, no. 1, pp. 238-252, Jun. 2016. [Baidu Scholar] 

4

S. Wen, X. Yu, Z. Zeng et al., “Event-triggering load frequency control for multiarea power systems with communication delays,”IEEE Transactions on Industrial Electronics, vol. 63, no. 2, pp. 1308-1317, Feb. 2016. [Baidu Scholar] 

5

R. Patel, L. Meegahapola, L. Wang et al., “Automatic generation control of multi-area power system with network constraints and communication delays,” Journal of Modern Power Systems and Clean Energy, vol. 8, no. 3, pp. 454-463, May 2020. [Baidu Scholar] 

6

C. Zhou, B. Hu, Y. Shi et al., “A unified architectural approach for cyberattack-resilient industrial control systems,” Proceedings of the IEEE, vol. 109, no. 4, pp. 1-25, Nov. 2020. [Baidu Scholar] 

7

E. Kontouras, A. Tzes, and L. Dritsas, “Set-theoretic detection of data corruption attacks on cyber physical power systems,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 872-886, Sept. 2018. [Baidu Scholar] 

8

G. Liang, S. R. Weller, J. Zhao et al., “The 2015 Ukraine blackout: implications for false data injection attacks,” IEEE Transactions on Power Systems, vol. 32, no. 4, pp. 3317-3318, Jul. 2017. [Baidu Scholar] 

9

S. Sridhar and M. Govindarasu, “Model-based attack detection and mitigation for automatic generation control,” IEEE Transactions on Smart Grid, vol. 5, no. 2, pp. 580-591, Mar. 2014. [Baidu Scholar] 

10

C. Peng, J. Li, and M. Fei, “Resilient event-triggering H load frequency control for multi-area power systems with energy-limited DoS attacks,” IEEE Transactions on Power Systems, vol. 32, no. 5, pp. 4110-4118, Sept. 2017. [Baidu Scholar] 

11

X. Luo, Q. Yao, X. Wang et al., “Observer-based cyber attack detection and isolation in smart grids,” International Journal of Electrical Power & Energy Systems, vol. 101, pp. 127-138, Oct. 2018. [Baidu Scholar] 

12

X. Luo, X. Wang, M. Zhang et al., “Distributed detection and isolation of bias injection attack in smart energy grid via interval observer,” Applied Energy, vol. 256, p. 113703, Dec. 2019. [Baidu Scholar] 

13

X. Wang, X. Luo, X. Pan et al., “Detection and location of bias load injection attack in smart grid via robust adaptive observer,” IEEE Systems Journal, vol. 14, no. 3, pp. 4454-4465, Sept. 2020. [Baidu Scholar] 

14

R. Tan, H. H. Nguyen, Y. S. Foo et al., “Modeling and mitigating impact of false data injection attacks on automatic generation control,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 7, pp. 1609-1624, Jul. 2017. [Baidu Scholar] 

15

C. Chen, K. Zhang, K. Yuan et al., “Novel detection scheme design considering cyber attacks on load frequency control,” IEEE Transactions on Industrial Informatics, vol. 14, no. 5, pp. 1932-1941, May 2018. [Baidu Scholar] 

16

W. Bi, K. Zhang, Y. Li et al., “Detection scheme against cyber-physical attacks on load frequency control based on dynamic characteristics analysis,” IEEE Systems Journal, vol. 13, no. 3, pp. 2859-2868, Sept. 2019. [Baidu Scholar] 

17

S. D. Roy and S. Debbarma, “Detection and mitigation of cyber-attacks on AGC systems of low inertia power grid,” IEEE Systems Journal, vol. 14, no. 2, pp. 2023-2031, Jun. 2020. [Baidu Scholar] 

18

A. Abbaspour, A. Sargolzaei, P. Forouzannezhad et al., “Resilient control design for load frequency control system under false data injection attacks,” IEEE Transactions on Industrial Electronics, vol. 67, no. 9, pp. 7951-7962, Sept. 2020. [Baidu Scholar] 

19

A. F. Taha, J. Qi, J. Wang et al., “Risk mitigation for dynamic state estimation against cyber attacks and unknown inputs,” IEEE Transactions on Smart Grid, vol. 9, no. 2, pp. 886-899, Mar. 2018. [Baidu Scholar] 

20

W. Ao, Y. Song, and C. Wen, “Adaptive cyber-physical system attack detection and reconstruction with application to power systems,” IET Control Theory & Applications, vol. 10, no. 12, pp. 1458-1468, Aug. 2016. [Baidu Scholar] 

21

H. H. Alhelou, M. E. H. Golshan, and N. D. Hatziargyriou, “A decentralized functional observer based optimal LFC considering unknown inputs, uncertainties, and cyber-attacks,” IEEE Transactions on Power Systems, vol. 34, no. 6, pp. 4408-4417, Nov. 2019. [Baidu Scholar] 

22

M. Khalaf, A. Youssef, and E. El-Saadany, “Joint detection and mitigation of false data injection attacks in AGC systems,” IEEE Transactions on Smart Grid, vol. 10, no. 5, pp. 4985-4995, Sept. 2019. [Baidu Scholar] 

23

Z. Kazemi, A. A. Safavi, F. Naseri et al., “A secure hybrid dynamic-state estimation approach for power systems under false data injection attacks,” IEEE Transactions on Industrial Informatics, vol. 16, no. 12, pp. 7275-7286, Dec. 2020. [Baidu Scholar] 

24

C. Chen, M. Cui, X. Fang et al., “Load altering attack-tolerant defense strategy for load frequency control system,” Applied Energy, vol. 280, p. 116015, Oct. 2020. [Baidu Scholar] 

25

B. Jiang, J. Wang, and Y. C. Soh, “An adaptive technique for robust diagnosis of faults with independent effects on system outputs,” International Journal of Control, vol. 75, no. 11, pp. 792-802, Oct. 2002. [Baidu Scholar] 

26

J. Zhang, A. K. Swain, and S. K. Nguang, “Robust H adaptive descriptor observer design for fault estimation of uncertain nonlinear systems,” Journal of the Franklin Institute, vol. 351, no. 11, pp. 5162-5181, Sept. 2014. [Baidu Scholar] 

27

L. Guo and W. Chen, “Disturbance attenuation and rejection for systems with nonlinearity via DOBC approach,” International Journal of Robust and Nonlinear Control, vol. 15, no. 3, pp. 109-125, Dec. 2005. [Baidu Scholar] 

28

L. Guo and S. Cao, “Anti-disturbance control theory for systems with multiple disturbances: a survey,” ISA Transactions, vol. 53, no. 4, pp. 846-849, Jan. 2014. [Baidu Scholar] 

29

W. Chen, J. Yang, L. Guo et al., “Disturbance-observer-based control and related methods–an overview,” IEEE Transactions on Industrial Electronics, vol. 63, no. 2, pp. 1083-1095, Sept. 2016. [Baidu Scholar] 

30

Q. Jia, W. Chen, Y. Zhang et al., “Robust fault reconstruction via learning observers in linear parameter-varying systems subject to loss of actuator effectiveness,” IET Control Theory & Applications, vol. 8, no. 1, pp. 42-50, Sept. 2014. [Baidu Scholar] 

31

Q. Jia, W. Chen, Y. Zhang et al., “Fault reconstruction and accommodation in linear parameter-varying systems via learning unknown-input observers,” Journal of Dynamic Systems, Measurement, and Control, vol. 137, no. 6, pp. 1-9, Jan. 2015. [Baidu Scholar] 

32

Z. Ke, B. Jiang, and C. Vincent, “Adaptive observer-based fast fault estimation,” International Journal of Control, Automation, and Systems, vol. 6, no. 3, pp. 320-326, Jun. 2008. [Baidu Scholar] 

33

J. Liu, Y. Gu, L. Zha et al., “Event-triggered H load frequency control for multiarea power systems under hybrid cyber attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 8, pp. 1665-1678, Aug. 2019. [Baidu Scholar] 

34

J. Chen and R. J. Patton, Robust Model-based Fault Diagnosis for Dynamic Systems. New York: Springer Science & Business Media, 1999. [Baidu Scholar] 

35

H. H. Alhelou, M. E. H. Golshan, and J. Askari-Marnani, “Robust sensor fault detection and isolation scheme for interconnected smart power systems in presence of RER and EVs using unknown input observer,” International Journal of Electrical Power & Energy Systems, vol. 99, pp. 682-694, Jul. 2018. [Baidu Scholar] 

36

Y. Mo, R. Chabukswar, and B. Sinopoli, “Detecting integrity attacks on SCADA systems,” IEEE Transactions on Control Systems Technology, vol. 22, no. 4, pp. 1396-1407, Jul. 2014. [Baidu Scholar] 

37

A. Ashok, M. Govindarasu, and V. Ajjarapu, “Online detection of stealthy false data injection attacks in power system state estimation,” IEEE Transactions on Smart Grid, vol. 9, no. 3, pp. 1636-1646, Jul. 2016. [Baidu Scholar] 

38

A. Taherkhani and F. Bayat, “Wind turbines robust fault reconstruction using adaptive sliding mode observer,” IET Generation, Transmission & Distribution, vol. 13, no. 14, pp. 3096-3104, Jul. 2019. [Baidu Scholar]