Journal of Modern Power Systems and Clean Energy

ISSN 2196-5625 CN 32-1884/TK

网刊加载中。。。

使用Chrome浏览器效果最佳,继续浏览,你可能不会看到最佳的展示效果,

确定继续浏览么?

复制成功,请在其他浏览器进行阅读

Adaptive Two-stage Unscented Kalman Filter for Dynamic State Estimation of Synchronous Generator Under Cyber Attacks Against Measurements  PDF

  • Dongchen Hou 1,2 (Student Member, IEEE)
  • Yonghui Sun 1 (Member, IEEE)
  • Venkata Dinavahi 2 (Fellow,IEEE,)
  • Yi Wang 3,4 (Member, IEEE,)
1. School of Electrical and Power Engineering, Hohai University, Nanjing 210098, China,; 2. Department of Electrical and Computer Engineering, University of Alberta, Edmonton, AB T6G 2V4, Canada; 3. School of Electrical and Information Engineering, Zhengzhou University, Zhengzhou 450001, China; 4. Henan Engineering Research Center of Power Electronics and Energy Systems, Zhengzhou 450001, China

Updated:2024-09-25

DOI:10.35833/MPCE.2023.000352

  • Full Text
  • Figs & Tabs
  • References
  • Authors
  • About
CITE
OUTLINE

Abstract

This paper develops an adaptive two-stage unscented Kalman filter (ATSUKF) to accurately track operation states of the synchronous generator (SG) under cyber attacks. To achieve high fidelity, considering the excitation system of SGs, a detailed 9th-order SG model for dynamic state estimation is established. Then, for several common cyber attacks against measurements, a two-stage unscented Kalman filter is proposed to estimate the model state and the bias in parallel. Subsequently, to solve the deterioration problem of state estimation performance caused by the mismatch between noise statistical characteristics and model assumptions, a multi-dimensional adaptive factor matrix is derived to modify the noise covariance matrix. Finally, a large number of simulation experiments are carried out on the IEEE 39-bus system, which shows that the proposed filter can accurately track the SG state under different abnormal test conditions.

I. Introduction

DUE to the development of monitoring, sensing, and communication technologies, a great quantity of intelligent devices are applied to modern power systems, making the information exchange between power systems and cyber systems increasingly frequent. Because of such features, the power system relies on critical cyber infrastructure, making it vulnerable to cyber attacks [

1]-[5]. As one of the core functions of the energy management system (EMS), the dynamic state estimation (DSE) can help operators perceive the system state and its results can be used as the basis for other advanced functions of power grid [6]. However, the results of state estimation are often limited by the quality of measurements and the understanding of system parameters. This allows attackers to compromise the information and transmission of the measurement by exploiting the security vulnerabilities in communication, authentication, and data collection of the device [7]. Once the attack succeeds, the operator’s awareness of the power system state will be diminished, resulting in system failures or outages and huge financial losses. Therefore, cyber attacks are gradually becoming one of the important factors threatening the security and stability of modern power systems.

At present, a great quantity of phasor measurement units (PMUs) have been installed in the wide-area measurement system (WAMS), which provides significant measurement data for DSE. The operators can dynamically track operation states of the system [

8]. In this situation, Kalman filtering and its extension methods have attracted wide attention [9]-[13]. In [14], considering the parameter changes of the state-space model caused by cyber attacks, a robust forecasting-aided state estimation method based on extended Kalman filter (EKF) was proposed to estimate the distribution system state. In [15], based on EKF, the batch-mode regression and S-estimator were used to identify and suppress the impact of outliers to ensure the accuracy of state estimation results under cyber attacks. In [16], a fast detection strategy of network attack based on EKF was proposed by using generalized likelihood ratio. In [17], an optimal two-stage Kalman filter (OTSKF) method was developed to estimate system state vectors and attack vectors in automatic generation control (AGC) system. Estimating attack vectors can help operators understand cyber attacks more deeply, which can provide effective information for tracing network attack sources and formulating defense strategies.

Moreover, to avoid the error caused by EKF, a derivative-free unscented Kalman filter (UKF) was proposed in [

18]-[20]. In [21], based on the robust control theory, an adaptive UKF was proposed to suppress the estimation error of synchronous generator (SG) caused by cyber attacks or unpredictable changes of model parameters. In [22], a new decentralized DSE method was proposed to estimate unknown inputs by using statistical linearization method. A method was presented to improve the numerical stability of UKF in [23]. Based on the separation deviation theory, a two-stage unscented Kalman filter (TSUKF) was presented in [24]. To reduce the computation burden, an improved TSUKF based on non-augmented UKF is proposed in [25]. Nevertheless, in a Kalman filter, noise statistical parameters will directly affect the performance of DSE. Due to the interference of uncertain factors in actual systems, it is difficult to obtain the noise statistical parameters accurately, which leads to the decrease in estimation accuracy or deviation from the true value [26], [27].

In an effort to address these problems, an adaptive two-stage unscented Kalman filter (ATSUKF) is developed based on the adaptive noise correction method, which is suitable for the DSE of SGs. The contributions of this work are as follows.

1) To effectively reflect the operation states of SGs, the DSE model is extended based on the consideration of d-axis windings and q-axis damping windings. Considering the excitation system of SGs, a novel 9th-order SG model is proposed for DSE.

2) A TSUKF for DSE of SGs is proposed to separate the bias caused by cyber attacks or noise signals, which can estimate the state and the bias in parallel.

3) Considering the influence of unknown noise statistical characteristics caused by uncertainties on the performance of state estimation, an adaptive noise correction method is proposed and the multi-dimensional adaptive factor matrix is derived.

The remainder of this paper is organized as follows. A novel 9th-order SG model including an excitation system is introduced in Section II. In Section III, an ATSUKF is presented to estimate the state and bias of SGs in parallel. In Section IV, by using the constructed 9th-order SG model, a large number of simulation and numerical results are used to prove the advantages of the proposed filter. Finally, the conclusions are given in Section V.

II. Novel 9th-order SG Model

The detailed SG model can reflect operation states of the generator more comprehensively [

28], [29]. Therefore, a detailed 9th-order SG model is utilized for DSE, which will help operators accurately predict operation states of the generator. Two mechanical equations, four electrical equations, and an excitation system model are included in the model.

The two mechanical equations can be expressed as:

δ˙=ωRΔω (1)
ω˙=ωR2HTm-Te-DΔω (2)

where δ is the rotor position; ω is the rotor speed in per unit; ωR is the synchronous speed; Δω is the rotor speed deviation in per unit and Δω=ω-ωR/ωR; Te is the electrical torque; Tm is the mechanical torque; H is the inertia constant; and D is the damping coefficient.

The four electrical equations of the field winding and damper winding fluxes are expressed as [

30]:

ψ˙fd=ωRefd+ψad-ψfdLfdRfd (3)
ψ˙1d=ωRe1d+ψad-ψ1dL1dR1d (4)
ψ˙1q=ωRe1q+ψaq-ψ1qL1qR1q (5)
ψ˙2q=ωRe2q+ψaq-ψ2qL2qR2q (6)

where e is the voltage; ψ is the flux; L is the leakage reactance; R is the resistance; the subscripts fd, 1d, and iq represent the field winding, d-axis damper winding, and q-axis damper winding i (i=1,2), respectively; and the fluxes ψad and ψaq can be calculated by:

ψad=Lad-id+ψfdLfd+ψ1dL1d (7)
ψaq=Laq-iq+ψ1qL1q+ψ2qL2q (8)
Lad=1Lad-1+Lfd-1+L1d-1 (9)
Laq=1Laq-1+L1q-1+L2q-1 (10)

where id and iq are the d- and q-axis currents, respectively; and Lad and Laq are the saturated values of the d- and q-axis mutual inductances, respectively [

31].

Then, the electric torque Te can be expressed as:

Te=ψadiq-ψaqid (11)

In addition, the currents can be written in terms of fluxes as:

ifd=ψfd-ψadLfd (12)
i1d=ψ1d-ψadL1d (13)
i1q=ψ1q-ψaqL1q (14)
i2q=ψ2q-ψaqL2q (15)

The excitation system model including the power system stabilizer (PSS) and automatic voltage regulator (AVR) is shown in Fig. 1. The equations of the excitation system model are expressed as:

v˙1=1TRvt-v1 (16)
v˙2=KSTABΔω˙-1Twv2 (17)
v˙3=1T2T1v˙2+v2-v3 (18)

Fig. 1  Excitation system model of SGs.

where v1-v3 are the excitation system state variables; KSTAB is the stabilizer gain; Tw is washout time constant; T1 is the time constant of lead compensator; TR is the time constant of terminal voltage transducer; T2 is the time constant of lag compensator; and vt is the generator terminal voltage.

For convenience, the above equations can be written in the following form:

x˙=fx,u+wy=hx,u+v (19)

where f is the system function; h is the measurement function; x is the state vector; u is the input vector; y is the measurement vector; and w and v represent the process and measurement noises, respectively.

x=δ,ω,ψfd,ψ1d,ψ1q,ψ2q,v1,v2,v3T (20)
u=efd,e1d,e1q,e2q,Tm,id,iq,vtT (21)
y=δ,ω,ifd,i1d,i1q,i2q,v1,v2,v3T (22)

Considering the discrete nature of the measured data, (19) can be rewritten in the discrete-time form as:

xk+1=fxk,uk+wkyk=hxk,uk+vk (23)

where k is a discrete time factor.

III. Proposed ATSUKF

A. Measurement Data Attack Model

To successfully gain access, the attacker needs to know the complete knowledge about the target before attacking [

32]. However, it is difficult for attackers to obtain the system parameters because there are a large number of measures to protect information in actual power systems, such as identity authentication, intrusion detection, and firewalls [33]. The measurement equipment relies on the network to transmit the measurement data, and has frequent communication with the outside world, so its defense is relatively vulnerable. Therefore, accessing the measurement data becomes one of the most common methods to attack systems. The measurement vector yk=y1,k,y2,k,,yN,kT can be written as:

yk=hxk,uk+Gbk+vk    kτ (24)

where bk=b1,k,b2,k,,bN,kT is the attack/bias vector at time k; τ is the moment when the attacker successfully accesses the measurement data; G is the attack distribution matrix of measurement variables; and vk=v1,k,v2,k,,vN,kT is the measurement noise vector at time k.

yn,k=hnxk,uk+vn,k              nSkf,kτhnxk,uk+bn,k+vn,k    nSkf,kτ (25)

where hn is the measurement function of the nth measurement variable; Skf1,2,,N is the set of the measurement variable affected by cyber attacks; and n1,2,,N.

Several common cyber attacks against measurement data can be expressed in the following forms.

1) False Data Injection (FDI)

FDI, as the most common type of cyber attack, injects false data bn,kFDI into real data to affect the operator’s awareness of the system:

yn,k=hnxk,uk+vn,knSkf,kτhnxk,uk+bn,kFDI+vn,knSkf,kτ (26)

2) Scaling Attack

The attacker can scale down/up the measurement through scaling factors λa:

yn,k=hnxk,uk+vn,k        nSkf,kτλahnxk,uk+vn,k    nSkf,kτ (27)

3) Data Replay Attack

The attacker can inject previous data yn,k-t in place of real measurements:

yn,k=hnxk,uk+vn,knSkf,kτyn,k-t+vn,knSkf,kτ (28)

4) Ramp Attack

By utilizing the growth factor rb, the injected data bn,kRA=rbk-τ will change over time.

yn,k=hnxk,uk+vn,knSkf,kτhnxk,uk+bn,kRA+vn,knSkf,kτ (29)

B. TSUKF

Consider the nonlinear discrete system with attack/bias, and then (23) can be written as:

xk+1=fxk,uk+Fbk+wkyk=hxk,uk+Gbk+vk (30)

where F is the attack distribution matrix of state variables.

TSUKF is an extension of UKF. The attack-/bias-free estimation and attack/bias estimation processes of TSUKF are as follows:

x^k+1k+1=x˜k+1k+1+βk+1k+1b^k+1k+1 (31)
Pk+1k+1x=P˜k+1k+1x+βk+1k+1Pk+1k+1bβk+1k+1T (32)

where βk+1k+1 is the coupling matrix; x˜k+1k+1 is the state vector of attack-/bias-free estimation; P˜k+1k+1x is the variance matrix of attack-/bias-free estimation; and b^k+1k+1 and Pk+1k+1b are the state vector and its variance matrix of attack/bias estimation, respectively.

In the attack-/bias-free estimation, the expected value of the estimator is equal to the true value. There is a deviation between the expected value and the true value of the estimator in the attack/bias estimation. When the measurement is attacked, the results of attack-/bias-free estimation will deviate from the true value. Therefore, it is necessary to estimate the bias caused by cyber attacks through attack/bias estimation to suppress the impact of false measurements.

1) Attack-/bias-free Estimation

Similar to UKF, by utilising the unscented transform, the sigma points can be selected as:

χk0=x^kk (33)
χkj=x^kk±n+λPkkxei    j=1,2,,n (34)

where λ is the scaling parameter; and ei is the column vector where the ith element is 1 and the other elements are 0.

Using the state transfer function to propagate sigma points, the predicted state vector mk and its corresponding error covariance matrix P˜k+1kx can be obtained by:

mk=j=02nWjsfχkj (35)
x^k+1k=mk+Fb^kk (36)
Pk+1kx=j=02nWjcfχkj-mkfχkj-mkT-MkβkkPkkbβkkTMkT+RkPkkbRkT+Wx (37)
x˜k+1k=x^k+1k-βk+1kb^k+1k (38)
P˜k+1kx=Pk+1kx-βk+1kPk+1kbβk+1kT (39)

where Mk and Rk are the coupling matrices that can be obtained through the calculation of the coupling equations; Wx is the process noise variance matrix; and the weights Wjs and Wjc are defined as:

W0s=λn+λW0c=λn+λ+1-αc2+βc (40)
Wjs=Wjc=12n+λ    j=1,2,,2n (41)

where αc is the scaling factor that can control the range of sigma point sets; and βc is a constant used to reflect the high-order information characteristics of state information.

After that, using the measurement function to instantiate sigma points, the measurement vector nk+1 and its corresponding error covariance matrix P˜k+1kyy can be obtained by:

nk+1=j=02nWjshχk+1j (42)
y˜k+1k=nk+1-Nk+1βk+1kb^k+1k (43)
P˜k+1kyy=j=02nWjchχk+1j-nk+1hχk+1j-nk+1T-Nk+1βk+1kPk+1kbβk+1kTNk+1T+Vx (44)

where y˜k+1k is the predicted measurement vector; Nk+1 is a coupling matrix; and Vx is the measurement noise variance matrix.

The gain matrix Kk+1x and filtered states P˜k+1k+1x and x˜k+1k+1 can be calculated by:

Kk+1x=P˜k+1kxNk+1TP˜k+1kyy-1 (45)
P˜k+1k+1x=P˜k+1kx-Kk+1xP˜k+1kyyKk+1xT (46)
x˜k+1k+1=x˜k+1k+Kk+1xyk+1-y˜k+1k (47)

2) Attack/bias Estimation

Notably, the attack-/bias-free estimation and the attack/bias estimation run in parallel.

b^k+1k=b^kk (48)
Pk+1kb=Pkkb+Wb (49)
y^k+1k=nk+1+Gb^k+1k (50)
Pk+1kby=Pk+1kbHk+1kT (51)
Pk+1kyy=P˜k+1kyy+Hk+1kPk+1kbHk+1kT (52)
Kk+1b=Pk+1kbyPk+1kyy-1 (53)
Pk+1k+1b=Pk+1kb-Kk+1bPk+1kyyKk+1bT (54)
b^k+1k+1=b^k+1k+Kk+1byk+1-y^k+1k (55)

where y^k+1k is the predicted measurement vector of attack/bias estimation; Pk+1kyy is the predicted measurement covariance matrix; Hk+1k is the coupling matrix in the prediction process of bias estimation; Kk+1b is the gain matrix of attack/bias estimation; and Wb and Pk+1kby are the process noise variance matrix and cross-covariance matrix in attack-/bias-free estimation, respectively.

3) Coupling Equations

Rk=Mkβkk+F (56)
βk+1k=RkPkkbPkkb+Wb-1 (57)
Hk+1k=Nk+1βk+1k+G (58)
βk+1k+1=βk+1k-Kk+1xHk+1k (59)
Mk=12n+λj=1nfχkj-fχkj+neiTPkkx-1 (60)
Nk+1=12n+λj=1nhχk+1j-hχk+1j+neiTPk+1kx-1 (61)

C. Noise Modification

Similar to the Kalman filter, TSUKF has good estimation effects only when accurate knowledge about DSE model can be obtained [

34]. However, in the actual system, due to unknown factors such as cyber attacks, equipment aging, and environmental changes, the statistical parameters of the DSE model may change and cannot be accurately obtained [35]-[37]. Under these circumstances, the performance of TSUKF is significantly degraded and it is difficult to track the dynamic changes of the model state. This limits the use of TSUKF method in DSE. Considering the error caused by the uncertainty of noise prior statistics, a multi-dimensional adaptive factor matrix is introduced to modify the noise statistics, so that TSUKF can adapt to the statistical characteristics of noise. The scaling matrix Sk+1 is used to realize the adaptive modification of measurement noise covariance, and the measurement variance can be expressed as:

P˜k+1kyy=Cy+Sk+1Vx (62)
Cy=j=02nWjchχk+1j-nk+1hχk+1j-nk+1T-Nk+1βk+1kPk+1kbβk+1kTNk+1T (63)

According to the actual measurement, the covariance matrix can be obtained as:

P¯k+1kyy=1l-1j=k-l+2k+1ε˜jε˜jT (64)

where l is the size of the window; and ε˜j is the residual vector of attack-free estimation at time j, and ε˜j=yj-Njx˜jj-1.

Therefore, the equation relationship is as follows:

1l-1j=k-l+2k+1ε˜jε˜jT=Cy+Sk+1Vx (65)

The scaling matrix Sk+1 can be written as:

Sk+1=P¯k+1kyy-CyVx-1 (66)

If the noise variance matches the system model, the scaling matrix is the unit matrix. However, the scaling matrix Sk+1 obtained by (66) may not be a diagonal matrix, and the diagonal elements may be less than or equal to 0. To avoid this, the scaling matrix needs to be modified as:

Sk+1=diags1,s2,,si    i=1,2,,n (67)

where si=max1,Sk+1,ii is the diagonal element of the modified scaling matrix, and Sk+1,ii is the diagonal element of matrix Sk+1 before modification. By using the scaling matrix in (67), the covariance matrix P˜k+1kyy and filter gain matrix Kk+1x can be recalculated.

In addition, the adaptive scaling matrix of the system and the noise variance matrix Wx and Wb can be obtained in the same way. By using (65), the scaling matrix Sk+1x can be expressed as:

1l-1j=k-l+2k+1ε˜jε˜jT=Nk+1Cx+Sk+1xWxNk+1T+Vx (68)
Cx=j=02nWjcfχkj-mkfχkj-mkT+RkPkkbRkT-MkβkkPkkbβkkTMkT-βk+1kPk+1kbβk+1kT (69)

By using matrix operations, (68) can be simplified as:

Sk+1x=Nk+1-1P¯k+1kyy-Nk+1CxNk+1T-VxWxNk+1T-1 (70)

The scaling matrix Sk+1x can be defined as:

Sk+1x=diags1x,s2x,,six    i=1,2,,n (71)

where six=max1,Sk+1,iix is the diagonal element of the modified scaling matrix, and Sk+1,iix is the diagonal element of matrix Sk+1x before modification.

The covariance matrix P˜k+1kx can be recalculated as:

P˜k+1kx=Cx+Sk+1xWx (72)

For the scaling matrix Sk+1b, the residual vector ε˜jb and covariance matrix P^k+1kyy are defined as:

ε˜jb=yj-Njx˜jj-1-Hjj-1bjj-1 (73)
P^k+1kyy=1l-1j=k-l+2k+1ε˜jbε˜jbT (74)
1l-1j=k-l+2k+1ε˜jbε˜jbT=P˜k+1kyy+Hk+1kPkkb+Sk+1bWbHk+1kT (75)

The adaptive scaling matrix can be obtained by:

Sk+1b=Hk+1k-1P^k+1kyy-P˜k+1kyy-Hk+1kPkkbHk+1kTWbHk+1kT-1 (76)
Sk+1b=diags1b,s2b,,sib    i=1,2,,n (77)

where sib=max1,Sk+1,iib is the diagonal element of the modified scaling matrix, and Sk+1,iib is the diagonal element of matrix Sk+1b before modification.

The covariance matrix Pk+1kb can be recalculated as:

Pk+1kb=Pkkb+Sk+1bWb (78)

For convenience, the proposed ATSUKF based on adaptive noise correction method can be presented as Algorithm 1.

Remark 1: in order to track the operation states of SGs, the 4th-order model of generators is usually used for DSE [

21], [26]. However, the detailed SG model can reflect the operation states of SGs more comprehensively. Thereby, the DSE model was extended based on the consideration of d-axis damping windings and q-axis damping windings, and a 9th-order SG model including an excitation system is proposed for DSE.

Remark 2: generally, in the DSE algorithm based on Kalman filter [

21]-[23], the estimation accuracy under cyber attacks is guaranteed by enhancing the robustness of the algorithm. Considering the nonlinear characteristics of the model equation, a TSUKF is proposed to separate the bias caused by cyber attacks. To deal with the deterioration of the state estimation performance caused by mismatches between the statistical characteristics of the measurement noise and model assumptions, a multi-dimensional adaptive factor matrix is derived to modify the measurement noise covariance matrix. On this basis, considering the impact of system fault on noise, the application of adaptive scaling matrix is extended to adaptively modify process noise of attack-free estimation and attack estimation. Compared with the method in [24] and [25], a multi-dimensional adaptive factor matrix is introduced in the proposed ATSUKF to modify the noise statistics, which effectively decreases the error caused by the uncertainty of noise prior statistics.

Algorithm 1  : proposed ATSUKF based on adaptive noise correction method

Initialization: parameter initialization

Input: uk, yk, and the number of iterations Nt

While k=0 to Nt

Step 1: generate the predicted state of attack-/bias-free estimation by (33)-(39)

Step 2: calculate the scaling matrix Sk+1x by (68)-(72) and recalculate the covariance matrix P˜k+1kx

Step 3: obtain the predicted measurement of attack-/bias-free estimation by (42)-(45)

Step 4: obtain the scaling matrix Sk+1 by (62)-(67) and recalculate the covariance matrix P˜k+1kyy

Step 5: complete the attack-/bias-free estimation

  x˜k+1k+1=x˜k+1k+Kk+1xyk+1-y˜k+1k

  P˜k+1k+1x=P˜k+1kx-Kk+1xP˜k+1kyyKk+1xT

Step 6: generate the predicted state of attack/bias estimation by (48)-(53)

Step 7: obtain the scaling matrix Sk+1b by (73)-(78) and recalculate the covariance matrix Pk+1kb

Step 8: complete the attack/bias estimation

  b̂k+1k+1=b̂k+1k+Kk+1byk+1k-ŷk+1k

  Pk+1k+1b=Pk+1kb-Kk+1bPk+1kyyKk+1bT

Step 9: complete the estimation by utilizing the results of attack/bias estimation and attack-/bias-free estimation

  x̂k+1k+1=x˜k+1k+1+βk+1k+1b̂k+1k+1

  Pk+1k+1x=P˜k+1k+1x+βk+1k+1Pk+1k+1bβk+1k+1T

Step 10: output x̂k+1k+1 and Pk+1k+1x and update time instant

End while

IV. Numerical Results

To access the performance of the proposed ATSUKF under unknown noise statistics and cyber attack interference, extensive simulations are carried out in the IEEE 39-bus system by using the detailed 9th-order SG model developed in Section II. The topology of IEEE 39-bus system is shown in Fig. 2, and its parameters can be obtained from [

38]. PSCAD/EMTDC® is used to simulate the dynamic change process of power system to obtain the real states and measurements. To simulate the system operation, it is assumed that a three-phase grounding fault occurs at Bus 16 when t=0.5 s, and the fault is cleared when t=0.7 s. Due to space limitation, only the DSE results of Generator 8 (G8) are shown in this section.

Fig. 2  Topology of IEEE 39-bus system.

Because of the interference of uncertain factors and the change of system operation state, it is difficult for operators to obtain accurate prior knowledge of noise. Furthermore, malicious cyber attacks against power systems will also lead to the deterioration of DSE performance. Consequently, considering the interference of uncertain factors in the actual power system, simulation scenarios are set up as follows.

Scenario 1: the UKF, TSUKF, and proposed ATSUKF are compared and discussed under normal operation conditions.

Scenario 2: the above-mentioned filters are analyzed and compared in the test system with unknown noise statistics.

Scenario 3: the robustness of above-mentioned filters is discussed under the malicious network attack against the measurement data.

In addition, set the number of Monte Carlo simulations Nm as 200. The average state estimation error index E is utilized to appraise the performance of the discussed filters:

E=1Nmj=1Nm1Ntk=1Ntx^i,k-xi,k2 (79)

where xi,k is the true value; and x^i,k is the estimation value.

A. Scenario 1

Without loss of generality, we assume that operators can master the knowledge of system model and accurate prior noise statistics. Assuming that the process noise and measurement noise are zero-mean Gaussian noise, the standard deviations of the process noise and measurement noise are both 10-4. At this time, the actual noise variance matches the system model, and the multi-dimensional adaptive factor matrices are all unity matrices.

The estimation results of rotor speed and rotor angle of G8 are shown in Fig. 3. The estimation results of field winding and damper winding fluxes of G8 are shown in Figs. 4 and 5. By using UKF, TSUKF, and the proposed ATSUKF to track the states of G8 in Scenario 1, the estimation results of SG excitation system state variables of G8 can be observed in Fig. 6. Additionally, the average estimation error results in Scenario 1 are given in Table I. From the results of numerical simulation, it can be observed that the proposed ATSUKF and TSUKF inherit the advantages of UKF and can accurately track the changes of generator operation states. Notably, because of the bias estimation, the proposed ATSUKF and TSUKF have small deviations from the results of UKF in tracking the state change of the excitation system, which can be ignored. When the actual noise variance matches the system model, the proposed ATSUKF and TSUKF have the same estimation performance.

Fig. 3  Estimation results of rotor speed and rotor angle of G8 in Scenario 1.

Fig. 4  Estimation results of field winding and d-axis damper winding fluxes of G8 in Scenario 1.

Fig. 5  Estimation results of q-axis damper winding fluxes of G8 in Scenario 1.

Fig. 6  Estimation results of SG excitation system state variables of G8 in Scenario 1.

Table I  Average Estimation Error Results in Scenario 1
VariableAverage estimation error
UKFTSUKFATSUKF
δ 0.000097 0.000097 0.000097
ω 0.000096 0.000096 0.000096
ψfd 0.000368 0.000404 0.000404
ψ1d 0.000168 0.000168 0.000169
ψ1q 0.000021 0.000021 0.000021
ψ2q 0.000713 0.000713 0.000713
v1 0.000099 0.000099 0.000099
v2 0.007440 0.007444 0.007445
v3 0.000102 0.000102 0.000102

B. Scenario 2

In the actual power system, the statistical characteristics of noise are easily disturbed by many factors.

Under the interference of uncertain factors such as network attacks, equipment aging, and environmental changes, the prior statistical information of noise cannot be accurately known by the operator, resulting in the mismatch between noise statistics and model assumptions. In order to simulate the influence of this situation on the performance of estimation, it is assumed that the statistical characteristics of noise do not match the model assumptions. The standard deviations of the process noise and measurement noise are set to be 10-2 and 10-3, respectively, which deviate from the true values 10-4 and 10-4.

The estimation results of field winding fluxes and d-axis damper winding fluxes in Scenario 2 are shown in Fig. 7. The estimation results of SG excitation system state variables in Scenario 2 are shown in Fig. 8. It is worth mentioning that UKF and TSUKF perform well in the estimation of δ, ω, ψ1q, and ψ2q. As can be observed in Fig. 7 and Fig. 8, when ψfd and v2 are estimated by UKF, the result seriously deviates from the true value and can only track the approximate trend of the change of the state variable. Additionally, the average estimation error results in Scenario 2 are given in Table II. Due to unknown prior noise statistics, TSUKF has errors in the process of no-attack estimation, resulting in inaccurate attack estimation. This problem degrades the estimation performance of TSUKF significantly. Compared with other filters, the proposed ATSUKF can accurately track the dynamic changes of state variables by using multi-dimensional adaptive factor matrices to correct the estimation error covariance.

Fig. 7  Estimation results of field winding and d-axis damper winding fluxes of G8 in Scenario 2.

Fig. 8  Estimation results of SG excitation system state variables of G8 in Scenario 2.

Table II  Average Estimation Error Results in Scenario 2
VariableAverage estimation error
UKFTSUKFATSUKF
δ 0.000255 0.001265 0.000101
ω 0.001021 0.000111 0.000099
ψfd 0.364208 0.544942 0.003684
ψ1d 0.000174 0.000173 0.000173
ψ1q 0.000176 0.000091 0.000072
ψ2q 0.000708 0.000698 0.000765
v1 0.001088 0.002760 0.000101
v2 0.115421 0.117418 0.008041
v3 0.000813 0.001639 0.000116

C. Scenario 3

Accessing the measurement data has become one of the most common ways to attack power systems. Attackers can compromise the authenticity of data by injecting attack data into the data collected by the measuring device. Once the real measurement is altered, the state estimation results will deviate from the actual state, which will cause the operator to make a wrong decision. The common measurement cyber attack methods include false data injection, scaling attack, data replay attack, and ramp attack. To analyze the effectiveness of state estimation algorithms under cyber attacks, it is assumed that the measurement data v3 are accessed by multiple types of malicious network attacks.

The following four attack conditions are considered.

1) Condition 1: the measurement is successfully accessed by FDI at t=2 s and the attack stops at t=8 s. Once the attack succeeds, false data injection attacks will inject false data bkFDI=0.02 into the measurement.

2) Condition 2: when the measurement device is manipulated by the data replay attack at t=5 s, the device will repeatedly transmit the same measurement data.

3) Condition 3: the attacker uses scaling attacks to scale up the measurement after t=4 s, and the scaling factor λa is set to be 1.5.

4) Condition 4: the attacker uses ramp attacks to inject data into the measurement data after t=6 s. The data injected through ramp attacks will grow over time and rb=3×10-4.

The estimation results of v3 under FDI attacks are shown in Fig. 9. When the data replay attack occurs, the measurement device will continuously transmit the measurement data from t=5 s to replace real measurements. The estimation results of v3 under data replay attack are shown in Fig. 10.

Fig. 9  Estimation results of v3 under FDI attack.

Fig. 10  Estimation results of v3 under data replay attack.

For the scaling attacks, suppose that the attacker scales up the measurement by using scaling factor λa=1.5 after t=4 s, and the result comparison is given in Fig. 11. When the ramp attack occurs at t=6 s, the estimation results of v3 are shown in Fig. 12. Additionally, the average estimation error results of v3 under four common cyber attacks are given in Table III. As can be observed from the above results, the estimation effect of the proposed ATSUKF is significantly superior to other filters. Since there is no way to separate the deviations caused by cyber attacks during state estimation, UKF is vulnerable to cyber attacks. As expected, due to the inability to update the error covariance matrix, TSUKF cannot quickly and accurately track the attack signal. In contrast, the proposed ATSUKF can adaptively update the covariance matrix during the process of attack/bias estimation to obtain better results.

Fig. 11  Estimation results of v3 under scaling attack.

Fig. 12  Estimation results of v3 under ramp attack.

Table III  Average Estimation Error Results in Scenario 3
Attack modeAverage estimation error
UKFTSUKFATSUKF
FDI attack 0.015490 0.006696 0.000112
Data replay attack 0.019197 0.006615 0.000132
Scaling attack 0.024678 0.006707 0.000103
Ramp attack 0.021983 0.008893 0.000143

In order to compare the computational efficiency of different filters discussed under different conditions, simulations are implemented on a system with an Intel i7-7700 CPU and 16 GB of RAM in the MATLAB environment. The execution time of different filters under different conditions is shown in Table IV. The results in Table IV are achieved without complete optimization and the computational time can be further reduced by using C code. Since the state and the bias can be estimated in parallel, the proposed ATSUKF and TSUKF exhibit similar computational efficiency to UKF under all designed conditions. A multi-dimensional adaptive factor matrix is introduced in the proposed ATSUKF to modify the noise statistics, which effectively decreases the error caused by the uncertainty of noise prior statistics. Therefore, the computational efficiency of the proposed ATSUKF will be lower than that of TSUKF. It is worth mentioning that when the attacker accesses multiple measurement data simultaneously, the computational burden of attack/bias estimation will further increase and the computational efficiency of the filter will decrease.

Table IV  Execution Time of Different Filters Under Different Conditions
ConditionExecution time (ms)
UKFTSUKFATSUKF
Normal operation condition 7565 7617 7693
Unknown noise statistics condition 7670 7651 7728
Condition 1 7850 7961 8014
Condition 2 7849 7919 8187
Condition 3 7992 7988 8210
Condition 4 7940 7957 8203

V. Conclusion

In this study, an adaptive DSE algorithm is proposed against cyber attacks. Considering the nonlinear characteristics of the model equation, a filter is proposed based on the unscented transform technology and two-stage Kalman filtering theory, which can suppress the impact of cyber attacks on the estimation results. On this basis, the adaptive scaling matrix is utilized to modify the error covariance matrix in the estimation process of the TSUKF, which can effectively deal with the problem when the statistical parameters of noise do not match the model assumptions. Compared with other filters, the effectiveness of the proposed ATSUKF is illustrated under cyber attacks.

As it turns out, the proposed ATSUKF can effectively estimate the system state vector and attack vector in parallel. When the statistical parameters of generator model noise are unknown, the proposed ATSUKF is still effective. In the future, we will build more types of cyber attack models and extend the proposed ATSUKF to bound the uncertainty caused by cyber attacks to provide effective information for tracing the source of cyber attacks and formulating defense strategies. In addition, we will design an effective attack detection strategy to distinguish between noise signals and cyber attacks, thereby reducing unnecessary calculations and improving the computational efficiency of the proposed ASUKF.

References

1

H. Long, Z. Wu, C. Fang et al., “Cyber-attack detection strategy based on distribution system state estimation,” Journal of Modern Power Systems and Clean Energy, vol. 8, no. 4, pp. 669-678, Jul. 2020. [Baidu Scholar] 

2

T. Duan and V. Dinavahi, “Starlink space network-enhanced cyber-physical power system,” IEEE Transactions on Smart Grid, vol. 12, no. 4, pp. 3673-3675, Jul. 2021. [Baidu Scholar] 

3

C. Chen, K. Zhang, M. Ni et al., “Cyber-attack-tolerant frequency control of power systems,” Journal of Modern Power Systems and Clean Energy, vol. 9, no. 2, pp. 307-315, Mar. 2021. [Baidu Scholar] 

4

M. Ni, M. Li, J. Li et al., “Concept and research framework for coordinated situation awareness and active defense of cyber-physical power systems against cyber-attacks,” Journal of Modern Power Systems and Clean Energy, vol. 9, no. 3, pp. 477-484, May 2021. [Baidu Scholar] 

5

D. Hou, Y. Sun, J. Wang et al., “Dynamic state estimation of power systems with uncertainties based on robust adaptive unscented Kalman filter,” Journal of Modern Power Systems and Clean Energy, vol. 11, no. 4, pp. 1065-1074, Jul. 2023. [Baidu Scholar] 

6

Y. Chen, Y. Yao, Y. Lin et al., “Dynamic state estimation for integrated electricity-gas systems based on Kalman filter,” CSEE Journal of Power and Energy Systems, vol. 8, no. 1, pp. 293-303, Jan. 2022. [Baidu Scholar] 

7

H. Karimipour and V. Dinavahi, “Extended Kalman filter-based parallel dynamic state estimation,” IEEE Transactions on Smart Grid, vol. 6, no. 3, pp. 1539-1549, May 2015. [Baidu Scholar] 

8

T. Ahmad and N. Senroy, “An information theoretic approach to power-substation level dynamic state estimation with non-Gaussian noise,” IEEE Transactions on Power Systems, vol. 35, no. 2, pp. 1642-1645, Mar. 2020. [Baidu Scholar] 

9

S. Wang, W. Gao, and A. P. S. Meliopoulos, “An alternative method for power system dynamic state estimation based on unscented transform,” IEEE Transactions on Power Systems, vol. 27, no. 2, pp. 942-950, May 2012. [Baidu Scholar] 

10

P. Risbud, N. Gatsis, and A. Taha, “Multi-period power system state estimation with PMUs under GPS spoofing attacks,” Journal of Modern Power Systems and Clean Energy, vol. 8, no. 4, pp. 597-606, Jul. 2020. [Baidu Scholar] 

11

B. Tan, J. Zhao, and M. Netto, “A general decentralized dynamic state estimation with synchronous generator magnetic saturation,” IEEE Transactions on Power Systems, vol. 38, no. 1, pp. 960-963, Jan. 2023. [Baidu Scholar] 

12

E. Ghahremani and I. Kamwa, “Dynamic state estimation in power system by applying the extended Kalman filter with unknown inputs to phasor measurements,” IEEE Transactions on Power Systems, vol. 26, no. 4, pp. 2556-2566, Nov. 2011. [Baidu Scholar] 

13

Y. Wang, Y. Wang, Y. Sun et al., “Resilient dynamic state estimation for multi-machine power system with partial missing measurements,” IEEE Transactions on Power Systems. doi: 10.1109/TPWRS.2023. 3287151 [Baidu Scholar] 

14

Y. Wang, Y. Sun, and V. Dinavahi, “Robust forecasting-aided state estimation for power system against uncertainties,” IEEE Transactions on Power Systems, vol. 35, no. 1, pp. 691-702, Jan. 2020. [Baidu Scholar] 

15

Y. Chakhchoukh, H. Lei, and B. K. Johnson, “Diagnosis of outliers and cyber attacks in dynamic PMU-based power state estimation,” IEEE Transactions on Power Systems, vol. 35, no. 2, pp. 1188-1197, Mar. 2020. [Baidu Scholar] 

16

S. Li, Y. Yilmaz, and X. Wang, “Quickest detection of false data injection attack in wide-area smart grids,” IEEE Transactions on Smart Grid, vol. 6, no. 6, pp. 2725-2735, Nov. 2015. [Baidu Scholar] 

17

A. S. L. V. Tummala and R. K. Inapakurthi, “A two-stage Kalman filter for cyber-attack detection in automatic generation control system,” Journal of Modern Power Systems and Clean Energy, vol. 10, no. 1, pp. 50-59, Jan. 2022. [Baidu Scholar] 

18

H. Liu, F. Hu, J. Su et al., “Comparisons on Kalman-filter-based dynamic state estimation algorithms of power systems,” IEEE Access, vol. 8, pp. 51035-51043, Mar. 2020. [Baidu Scholar] 

19

H. Zhao and B. Tian, “Robust power system forecasting-aided state estimation with generalized maximum mixture correntropy unscented Kalman filter,” IEEE Transactions on Instrumentation and Measurement, vol. 71, pp. 1-10, Mar. 2022. [Baidu Scholar] 

20

W. Ma, J. Qiu, X. Liu et al., “Unscented Kalman filter with generalized correntropy loss for robust power system forecasting-aided state estimation,” IEEE Transactions on Industrial Informatics, vol. 15, no. 11, pp. 6091-6100, Nov. 2019. [Baidu Scholar] 

21

Y. Wang, Y. Sun, V. Dinavahi et al., “Robust dynamic state estimation of power systems with model uncertainties based on adaptive unscented filter,” IET Generation, Transmission & Distribution, vol. 13, no. 12, pp. 2455-2463, Jun. 2019. [Baidu Scholar] 

22

G. Anagnostou and B. C. Pal, “Derivative-free Kalman filtering based approaches to dynamic state estimation for power systems with unknown inputs,” IEEE Transactions on Power Systems, vol. 33, no. 1, pp. 116-130, Jan. 2018. [Baidu Scholar] 

23

J. Qi, K. Sun, J. Wang et al., “Dynamic state estimation for multi-machine power system by unscented Kalman filter with enhanced numerical stability,” IEEE Transactions on Smart Grid, vol. 9, no. 2, pp. 1184-1196, Mar. 2018. [Baidu Scholar] 

24

J. Xu, Y. Jing, G. M. Dimirovski et al., “Two-stage unscented Kalman filter for nonlinear systems in the presence of unknown random bias,” in Proceedings of 2008 American Control Conference, Seattle, USA, Jun. 2008, pp. 3530-3535. [Baidu Scholar] 

25

X. Chen, R. Sun, F. Wang et al., “Two-stage unscented Kalman filter algorithm for fault estimation in spacecraft attitude control system,” IET Control Theory & Applications, vol. 12, no. 13, pp. 1781-1791, Sept. 2018. [Baidu Scholar] 

26

Y. Wang, Y. Sun, V. Dinavahi et al., “Adaptive robust cubature Kalman filter for power system dynamic state estimation against outliers,” IEEE Access, vol. 7, pp. 105872-105881, Jul. 2019. [Baidu Scholar] 

27

Y. Wang, Z. Yang, Y. Wang et al., “Robust dynamic state estimation for power system based on adaptive cubature Kalman filter with generalized correntropy loss,” IEEE Transactions on Instrumentation and Measurement, vol. 71, pp. 1-11, May 2022. [Baidu Scholar] 

28

S. Cao, N. Lin, and V. Dinavahi, “Faster-than-real-time hardware emulation of extensive contingencies for dynamic security analysis of large-scale integrated AC/DC grid,” IEEE Transactions on Power Systems, vol. 38, no. 1, pp. 861-871, Jan. 2023. [Baidu Scholar] 

29

S. Cao, N. Lin, and V. Dinavahi, “Damping of subsynchronous control interactions in large-scale PV installations through faster-than-real-time dynamic emulation,” IEEE Access, vol. 9, pp. 128481-128493, Sept. 2021. [Baidu Scholar] 

30

G. Valverde, E. Kyriakides, G. T. Heydt et al., “Nonlinear estimation of synchronous machine parameters using operating data,” IEEE Transactions on Energy Conversion, vol. 26, no. 3, pp. 831-839, Sept. 2011. [Baidu Scholar] 

31

P. Kundur, N. Balu, and M. Lauby, Power System Stability and Control. New York: McGraw-Hill, 1994. [Baidu Scholar] 

32

K. Lu and Z. Wu, “Constrained-differential-evolution-based stealthy sparse cyber-attack and countermeasure in an AC smart grid,” IEEE Transactions on Industrial Informatics, vol. 18, no. 8, pp. 5275-5285, Aug. 2022. [Baidu Scholar] 

33

K. Lu and Z. Wu, “Genetic algorithm-based cumulative sum method for jamming attack detection of cyber-physical power systems,” IEEE Transactions on Instrumentation Measurement, vol. 71, p. 3186360, Jan. 2022. [Baidu Scholar] 

34

L. Dang, B. Chen, S. Wang et al., “Robust power system state estimation with minimum error entropy unscented Kalman filter,” IEEE Transactions on Instrumentation and Measurement, vol. 69, no. 11, pp. 8797-8808, Nov. 2020. [Baidu Scholar] 

35

J. Zhao, J. Qi, Z. Huang et al., “Power system dynamic state estimation: motivations, definitions, methodologies, and future work,” IEEE Transactions on Power Systems, vol. 34, no. 4, pp. 3188-3198, Jul. 2019. [Baidu Scholar] 

36

S. Wang, W. Zhang, Y. Sun et al., “Wind power forecasting in the presence of data scarcity: a very short-term conditional probabilistic modeling framework,” Energy. doi: 10.1016/j.energy.2024.130305 [Baidu Scholar] 

37

C. Hajiyev and H. E. Soken, “Robust adaptive Kalman filter for estimation of UAV dynamics in the presence of sensor/actuator faults,” Aerospace Science and Technology, vol. 28, no. 1, pp. 376-383, Jul. 2013. [Baidu Scholar] 

38

C. Canizares, T. Fernandes, E. Geraldi et al., “Benchmark models for the analysis and control of small-signal oscillatory dynamics in power systems,” IEEE Transactions on Power Systems, vol. 32, no. 1, pp. 715-722, Jan. 2017. [Baidu Scholar]