Skip to main content

Impact of Targeted Cyber Attacks on Electrical Power Systems

  • Conference paper
  • First Online:
National Cyber Summit (NCS) Research Track (NCS 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1055))

Included in the following conference series:

Abstract

This paper formulates targeted and coordinated attacks on an electrical power system infrastructure as an optimization problem to (a) investigate the impacts of such attacks on the electric power grid and (b) to study the extent of damages to the grid depending on attacker’s resources and level of protection employed in the grid. In this research, we consider the coordinated load redistribution (LR) attack, which is a variant of false data injection attack on electrical power systems. The bi-level formulation is investigated through a problem in which the goal of the hacker is to maximize load curtailment and that of the power system operator is to minimize load curtailment. The resulting nonlinear mixed-integer bilevel programming formulation is converted into an equivalent single-level mixed-integer linear program by solving the inner optimization by KKT optimality conditions. The case studies are conducted based on an IEEE 14-bus system. From the results, it is observed that the hacker could maximize the damages to the power grid, even with limited attack resources, by simultaneously targeting the physical system and deceiving the operator with a false power dispatch. This study can provide meaningful insights on the relation between hacker’s available resources, existing security measures and resulting disruption in the power system. The results can be used to design methods to prevent and mitigate such coordinated attacks to improve the reliability of the electric grid.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    MATPOWER V6.1 was used: MATPOWER is a free program for numerical computation with strong MATLAB compatibility.

References

  1. Arroyo, J.M., Galiana, F.D.: On the solution of the bi-level programming formulation of the terrorist threat problem. IEEE Trans. Power Syst. 20(2), 789–797 (2005)

    Article  Google Scholar 

  2. Xiang, Y., Wang, L., Liu, N.: Coordinated attacks on electric power systems in a cyber-physical environment. Electr. Power Syst. Res. 149, 156–168 (2017)

    Article  Google Scholar 

  3. Yuan, Y., Li, Z., Ren, K.: Modeling load redistribution attacks in power systems. IEEE Trans. Smart Grid 2(2), 382–390 (2011)

    Article  Google Scholar 

  4. Yuan, Y., Li, Z., Ren, K.: Quantitative analysis of load redistribution attacks in power systems. IEEE Trans. Parallel Distrib. Syst. 23, 1731–1738 (2012)

    Article  Google Scholar 

  5. https://www.cnbc.com/2014/01/03/attacks-on-the-electricity-grid-us-vulnerable-to-physical-and-cyberthreats.html. Accessed 28 March 2019

  6. https://www.cfr.org/report/cyberattack-us-power-grid. Accessed 28 March 2019

  7. Zhu, Y., Yan, J., Tang, Y., Sun, Y.L., He, H.: Coordinated attacks against substations and transmission lines in power grids. IEEE Global Communications Conference, Austin, TX, pp. 655–661 (2014). https://doi.org/10.1109/glocom.2014.7036882

  8. Yan, J., Tang, Y., He, H., Sun, Y.: Cascading failure analysis with DC power flow model and transient stability analysis. IEEE Trans. Power Syst. 30(1), 285–297 (2014)

    Article  Google Scholar 

  9. Albert, R., Albert, I., Nakarado, G.L.: Structural vulnerability of the North American power grid. Phys. Rev. E 69, 025103 (2004)

    Article  Google Scholar 

  10. Crucitti, P., Latora, V., Marchiori, M.: Model for cascading failures in complex networks. Phys. Rev. E 69, 045104 (2004)

    Article  Google Scholar 

  11. Kinney, R., Crucitti, P., Albert, R., Latora, V.: Modeling cascading failures in the North American power grid. Eur. Phys. J. B 46(1), 101–107 (2005)

    Article  Google Scholar 

  12. Wang, J., Rong, L., Zhang, L., Zhang, Z.: Attack vulnerability of scale-free networks due to cascading failures. Phys. A 387, 6671–6678 (2008)

    Article  Google Scholar 

  13. Wang, W., Cai, Q., Sun, Y., He, H.: Risk-aware attacks and catastrophic cascading failures in U.S. power grid. In: Proceedings of IEEE Global Telecommunications Conference, Houston, Texas, USA (2011)

    Google Scholar 

  14. Zhu, Y., Sun, Y., He, H.: Load distribution vector-based attack strategies against power grid systems. In: Proceedings of IEEE Global Telecommunications Conference, Anaheim, CA, USA (2012)

    Google Scholar 

  15. Hines, P., Cotilla-Sanchez, E., Blumsack, S.: Do topological models provide good information about vulnerability in electric power networks? Chaos 20. arXiv preprint arXiv:1002.2268 (2010)

  16. Yan, J., Zhu, Y., He, H., Sun, Y.: Multi-contingency cascading analysis of smart grid based on self-organizing map. IEEE Trans. Inf. Forensics Secur. 8(4), 646–656 (2013)

    Article  Google Scholar 

  17. Zhu, Y., Yan, J., Sun, Y., He, H.: Risk-aware vulnerability analysis of electric grids from attacker’s perspective. In: Proceedings of IEEE Innovative Smart Grid Technologies Conference, Washington, USA (2013)

    Google Scholar 

  18. Dobson, I., Carreras, B.A., Newman, D.E.: A loading-dependent model of probabilistic cascading failure. Probab. Eng. Inf. Sci. 19(1), 15–32 (2005)

    Article  MathSciNet  Google Scholar 

  19. Nedic, D.P., Dobson, I., Kirschen, D.S., Carreras, B., Lynch, V.E.: Criticality in a cascading failure blackout model. Electr. Power Energy Syst. 28(1), 627–633 (2006)

    Article  Google Scholar 

  20. Mei, S., Ni, Y., Wang, G., Wu, S.: A study of selforganized criticality of power system under cascading failures based on AC-OPF with voltage stability margin. IEEE Trans. Power Syst. 23(4), 1719–1726 (2008)

    Article  Google Scholar 

  21. Chen, Q., McCalley, J.D.: Identifying high risk n-k contingencies for online security assessment. IEEE Trans. Power Syst. 20, 823–834 (2005)

    Article  Google Scholar 

  22. Liu, Y., Ning, P., Reiter, M.: False data injection attacks against state estimation in electric power grids. In: Proceedings of 16th ACM Conference on Computer and Communication Security, pp. 21–32, November 2009

    Google Scholar 

  23. Liu, X., Li, Z.: False data attack models, impact analyses and defense strategies in the electricity grid. Electr. J. 30(4), 35–42 (2017)

    Article  Google Scholar 

  24. Yuan, Y., Li, Z., Ren, K.: Quantitative analysis of load redistribution attacks in power systems. IEEE Trans. Parallel Distrib. Syst. 23(9), 1731–1738 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Caroline John .

Editor information

Editors and Affiliations

Appendix A

Appendix A

Indices

Definitions

\( d \)

Index for load demands

\( g \)

Index for generators on each bus

\( l \)

Index for transmission lines

Constants

\( N_{d} \)

Number of loads

\( N_{g} \)

Number of generators

\( N_{l} \)

Number of transmission lines

\( P_{g}^{max} \)

Maximum generation output of generator ‘g’

\( P_{g}^{min} \)

Minimum generation output of generator ‘g’

\( PL_{l}^{max} \)

Maximum capacity of transmission line ‘l’

\( C_{D,d} \)

Cost required to attack load demand measurements

\( C_{F,l} \)

Cost required to attack line flow measurements

\( C_{G,g} \)

Cost required to attack the generators

\( \Delta D_{d} \)

Attack on the load demand measurements

\( SF \)

Shifting factor matrix

\( KP \)

Bus-generator incidence matrix

\( KD \)

Bus-load incidence matrix

\( M \)

Sufficiently large positive constant

\( R_{C} \)

Cyber-attack resource

\( \varepsilon \)

Sufficiently small positive constant

\( \tau \)

Upper bound of the attack magnitude on the load demand measurements

\( C_{0} , C_{1} , C_{2} \)

Cost coefficients of generators

Variables

\( S_{d} \)

Load shedding of load ‘d’

\( \Delta D_{d} \)

Attack on the load demand measurements

\( P_{g} \)

Generation output of generator ‘g’

\( PL_{l} \)

Power flow on line ‘l’

\( \Delta PL_{l} \)

Attack on power flow measurements

\( \nu_{G,g} \)

Binary variable indicating whether the ‘g’th generator is attacked

\( \left( {\delta_{D + ,d} , \delta_{D - ,d} ,\delta_{D,d} } \right) \)

Binary variables indicating whether the load measurement at ‘d’th generator is attacked

\( (\delta_{PL + ,l} , \delta_{PL - ,l} ,\delta_{PL,l} ) \)

Binary variables indicating whether the load measurement at ‘d’th generator is attacked

\( \lambda \)

LaGrange multiplier associated with the power balance equation of the system

\( \mu_{l} \)

LaGrange multiplier associated with the power flow equation of line ‘l’

\( \left( {\underline{\gamma }}_{d} ,\underline{\gamma }_{d} \right) \)

LaGrange multipliers associated with the lower and upper bounds for the shedding of load ‘d’

\( \left( {\underline{\alpha }}_{l} ,\underline{\alpha }_{l} \right) \)

LaGrange multipliers associated with the lower and upper bounds for power flow of line ‘l’

\( (\underline{\beta }_{g} ,\underline{\beta }_{g} ) \)

LaGrange multipliers associated with the lower and upper bounds for power output of generator ‘g’

\( (\omega_{{\underline{\alpha } ,l}} ,\omega_{{\underline{\alpha } ,l}} ) \)

Binary variables to represent the complementary slackness of the power flow constraints of line ‘l’

\( (\omega_{{\underline{\beta } ,g}} ,\omega_{{\underline{\beta } ,g}} ) \)

Binary variables to represent the complementary slackness of the generation output constraints of generator ‘g’

\( (\omega_{{\underline{\gamma } ,d}} ,\omega_{{\underline{\gamma } ,d}} ) \)

Binary variables to represent the complementary slackness of the load shedding constraints of load ‘d’

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

John, C., Ramachandran, B., Kalaimannan, E. (2020). Impact of Targeted Cyber Attacks on Electrical Power Systems. In: Choo, KK., Morris, T., Peterson, G. (eds) National Cyber Summit (NCS) Research Track. NCS 2019. Advances in Intelligent Systems and Computing, vol 1055. Springer, Cham. https://doi.org/10.1007/978-3-030-31239-8_21

Download citation

Publish with us

Policies and ethics