Abstract
This paper formulates targeted and coordinated attacks on an electrical power system infrastructure as an optimization problem to (a) investigate the impacts of such attacks on the electric power grid and (b) to study the extent of damages to the grid depending on attacker’s resources and level of protection employed in the grid. In this research, we consider the coordinated load redistribution (LR) attack, which is a variant of false data injection attack on electrical power systems. The bi-level formulation is investigated through a problem in which the goal of the hacker is to maximize load curtailment and that of the power system operator is to minimize load curtailment. The resulting nonlinear mixed-integer bilevel programming formulation is converted into an equivalent single-level mixed-integer linear program by solving the inner optimization by KKT optimality conditions. The case studies are conducted based on an IEEE 14-bus system. From the results, it is observed that the hacker could maximize the damages to the power grid, even with limited attack resources, by simultaneously targeting the physical system and deceiving the operator with a false power dispatch. This study can provide meaningful insights on the relation between hacker’s available resources, existing security measures and resulting disruption in the power system. The results can be used to design methods to prevent and mitigate such coordinated attacks to improve the reliability of the electric grid.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
MATPOWER V6.1 was used: MATPOWER is a free program for numerical computation with strong MATLAB compatibility.
References
Arroyo, J.M., Galiana, F.D.: On the solution of the bi-level programming formulation of the terrorist threat problem. IEEE Trans. Power Syst. 20(2), 789–797 (2005)
Xiang, Y., Wang, L., Liu, N.: Coordinated attacks on electric power systems in a cyber-physical environment. Electr. Power Syst. Res. 149, 156–168 (2017)
Yuan, Y., Li, Z., Ren, K.: Modeling load redistribution attacks in power systems. IEEE Trans. Smart Grid 2(2), 382–390 (2011)
Yuan, Y., Li, Z., Ren, K.: Quantitative analysis of load redistribution attacks in power systems. IEEE Trans. Parallel Distrib. Syst. 23, 1731–1738 (2012)
https://www.cnbc.com/2014/01/03/attacks-on-the-electricity-grid-us-vulnerable-to-physical-and-cyberthreats.html. Accessed 28 March 2019
https://www.cfr.org/report/cyberattack-us-power-grid. Accessed 28 March 2019
Zhu, Y., Yan, J., Tang, Y., Sun, Y.L., He, H.: Coordinated attacks against substations and transmission lines in power grids. IEEE Global Communications Conference, Austin, TX, pp. 655–661 (2014). https://doi.org/10.1109/glocom.2014.7036882
Yan, J., Tang, Y., He, H., Sun, Y.: Cascading failure analysis with DC power flow model and transient stability analysis. IEEE Trans. Power Syst. 30(1), 285–297 (2014)
Albert, R., Albert, I., Nakarado, G.L.: Structural vulnerability of the North American power grid. Phys. Rev. E 69, 025103 (2004)
Crucitti, P., Latora, V., Marchiori, M.: Model for cascading failures in complex networks. Phys. Rev. E 69, 045104 (2004)
Kinney, R., Crucitti, P., Albert, R., Latora, V.: Modeling cascading failures in the North American power grid. Eur. Phys. J. B 46(1), 101–107 (2005)
Wang, J., Rong, L., Zhang, L., Zhang, Z.: Attack vulnerability of scale-free networks due to cascading failures. Phys. A 387, 6671–6678 (2008)
Wang, W., Cai, Q., Sun, Y., He, H.: Risk-aware attacks and catastrophic cascading failures in U.S. power grid. In: Proceedings of IEEE Global Telecommunications Conference, Houston, Texas, USA (2011)
Zhu, Y., Sun, Y., He, H.: Load distribution vector-based attack strategies against power grid systems. In: Proceedings of IEEE Global Telecommunications Conference, Anaheim, CA, USA (2012)
Hines, P., Cotilla-Sanchez, E., Blumsack, S.: Do topological models provide good information about vulnerability in electric power networks? Chaos 20. arXiv preprint arXiv:1002.2268 (2010)
Yan, J., Zhu, Y., He, H., Sun, Y.: Multi-contingency cascading analysis of smart grid based on self-organizing map. IEEE Trans. Inf. Forensics Secur. 8(4), 646–656 (2013)
Zhu, Y., Yan, J., Sun, Y., He, H.: Risk-aware vulnerability analysis of electric grids from attacker’s perspective. In: Proceedings of IEEE Innovative Smart Grid Technologies Conference, Washington, USA (2013)
Dobson, I., Carreras, B.A., Newman, D.E.: A loading-dependent model of probabilistic cascading failure. Probab. Eng. Inf. Sci. 19(1), 15–32 (2005)
Nedic, D.P., Dobson, I., Kirschen, D.S., Carreras, B., Lynch, V.E.: Criticality in a cascading failure blackout model. Electr. Power Energy Syst. 28(1), 627–633 (2006)
Mei, S., Ni, Y., Wang, G., Wu, S.: A study of selforganized criticality of power system under cascading failures based on AC-OPF with voltage stability margin. IEEE Trans. Power Syst. 23(4), 1719–1726 (2008)
Chen, Q., McCalley, J.D.: Identifying high risk n-k contingencies for online security assessment. IEEE Trans. Power Syst. 20, 823–834 (2005)
Liu, Y., Ning, P., Reiter, M.: False data injection attacks against state estimation in electric power grids. In: Proceedings of 16th ACM Conference on Computer and Communication Security, pp. 21–32, November 2009
Liu, X., Li, Z.: False data attack models, impact analyses and defense strategies in the electricity grid. Electr. J. 30(4), 35–42 (2017)
Yuan, Y., Li, Z., Ren, K.: Quantitative analysis of load redistribution attacks in power systems. IEEE Trans. Parallel Distrib. Syst. 23(9), 1731–1738 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix A
Appendix A
Indices | Definitions |
---|---|
\( d \) | Index for load demands |
\( g \) | Index for generators on each bus |
\( l \) | Index for transmission lines |
Constants | |
\( N_{d} \) | Number of loads |
\( N_{g} \) | Number of generators |
\( N_{l} \) | Number of transmission lines |
\( P_{g}^{max} \) | Maximum generation output of generator ‘g’ |
\( P_{g}^{min} \) | Minimum generation output of generator ‘g’ |
\( PL_{l}^{max} \) | Maximum capacity of transmission line ‘l’ |
\( C_{D,d} \) | Cost required to attack load demand measurements |
\( C_{F,l} \) | Cost required to attack line flow measurements |
\( C_{G,g} \) | Cost required to attack the generators |
\( \Delta D_{d} \) | Attack on the load demand measurements |
\( SF \) | Shifting factor matrix |
\( KP \) | Bus-generator incidence matrix |
\( KD \) | Bus-load incidence matrix |
\( M \) | Sufficiently large positive constant |
\( R_{C} \) | Cyber-attack resource |
\( \varepsilon \) | Sufficiently small positive constant |
\( \tau \) | Upper bound of the attack magnitude on the load demand measurements |
\( C_{0} , C_{1} , C_{2} \) | Cost coefficients of generators |
Variables | |
\( S_{d} \) | Load shedding of load ‘d’ |
\( \Delta D_{d} \) | Attack on the load demand measurements |
\( P_{g} \) | Generation output of generator ‘g’ |
\( PL_{l} \) | Power flow on line ‘l’ |
\( \Delta PL_{l} \) | Attack on power flow measurements |
\( \nu_{G,g} \) | Binary variable indicating whether the ‘g’th generator is attacked |
\( \left( {\delta_{D + ,d} , \delta_{D - ,d} ,\delta_{D,d} } \right) \) | Binary variables indicating whether the load measurement at ‘d’th generator is attacked |
\( (\delta_{PL + ,l} , \delta_{PL - ,l} ,\delta_{PL,l} ) \) | Binary variables indicating whether the load measurement at ‘d’th generator is attacked |
\( \lambda \) | LaGrange multiplier associated with the power balance equation of the system |
\( \mu_{l} \) | LaGrange multiplier associated with the power flow equation of line ‘l’ |
\( \left( {\underline{\gamma }}_{d} ,\underline{\gamma }_{d} \right) \) | LaGrange multipliers associated with the lower and upper bounds for the shedding of load ‘d’ |
\( \left( {\underline{\alpha }}_{l} ,\underline{\alpha }_{l} \right) \) | LaGrange multipliers associated with the lower and upper bounds for power flow of line ‘l’ |
\( (\underline{\beta }_{g} ,\underline{\beta }_{g} ) \) | LaGrange multipliers associated with the lower and upper bounds for power output of generator ‘g’ |
\( (\omega_{{\underline{\alpha } ,l}} ,\omega_{{\underline{\alpha } ,l}} ) \) | Binary variables to represent the complementary slackness of the power flow constraints of line ‘l’ |
\( (\omega_{{\underline{\beta } ,g}} ,\omega_{{\underline{\beta } ,g}} ) \) | Binary variables to represent the complementary slackness of the generation output constraints of generator ‘g’ |
\( (\omega_{{\underline{\gamma } ,d}} ,\omega_{{\underline{\gamma } ,d}} ) \) | Binary variables to represent the complementary slackness of the load shedding constraints of load ‘d’ |
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
John, C., Ramachandran, B., Kalaimannan, E. (2020). Impact of Targeted Cyber Attacks on Electrical Power Systems. In: Choo, KK., Morris, T., Peterson, G. (eds) National Cyber Summit (NCS) Research Track. NCS 2019. Advances in Intelligent Systems and Computing, vol 1055. Springer, Cham. https://doi.org/10.1007/978-3-030-31239-8_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-31239-8_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-31238-1
Online ISBN: 978-3-030-31239-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)