Bad Data Detection in Smart Grid
Bad Data Detection in Smart Grid
Chapter 6
Abstract: This chapter will discuss bad data detection techniques and their
sensor measurements and sending manipulated readings. Such approach can result
6.1 Introduction
Due to the increasing dependency of digital measurements for monitoring and
successfully attacked, its stored information can be compromised [1-4]. Given the
criticality of power systems in the context of the national security, wide area
attractive attack target [5]. If a PMU is successfully attacked, its stored information
and identify data-attacks as an adversary can choose the site of attack judiciously
Many methods have been proposed to identify abnormal data segments and isolate
attacked sensors in recent years. Most of them are published to enhance static
application like state estimation [6, 12-13], power flow analysis [8-9, 14], and
the operating point of the system and address slow dynamics in the range of
minutes to hours [15]. In contrast, few have been proposed for dynamics
less.
6.2 Possible Approaches
6.2.1 State Estimation
Several methodologies in the areas of state estimations were developed over the
past decades. Literature on the types of state estimation algorithms were presented
estimation or multi area state estimation [20]. Depending on the timing and
evolution of the estimates, state estimation schemes may be broadly classified into
two basic distinct paradigms: static state estimation and dynamic state estimation
[21]. Another extension of static state estimation also included the Sequential state
estimation which has the advantage of being able to perform updates with partial
measurement set [22]. This enabled the method to address the problem of data loss
and bad data. A static state estimation algorithm based on linear programming
known as least absolute value was also developed in [23, 24]. Generally, under
that changes steadily but slowly [17]. Therefore, in order to continuously monitor
the power system, state estimators must be executed at short intervals of time. But
with the inherent expansion of power systems, with the increase of generations and
loads, the system becomes extremely large for state estimation to be executed at
technique known as tracking state estimation [25, 26] was developed. Once state
estimates were calculated, the method simply update the next instant of time using
a new measurement set obtained for that instant, instead of again running the entire
having to execute the entire state estimation algorithm. This allows continuous
One of the most commonly used types of static state estimation in utilities is the
problem with a notion of minimizing the squares of the differences between the
measured and estimated values calculated using the corresponding power flow
equations. The weighted least square uses the Newton-Raphson algorithm to obtain
the state estimates. There have been numerous findings on different variations of
weighted least square further to improve specific aspects of the algorithm. Fast
decoupled state estimator [27, 28] is an example in which voltage magnitudes and
phase angles are processed separately. The voltage magnitude values are concerned
with the reactive power measurements while angles were related to active power
measurements. Regularized least square for power systems in [29] proposed a type
of weighted least square that was able to function in cases of partial observability.
The Extended Kalman Filter (EKF) is the most widely used algorithm to perform
dynamic state estimation [30]. Other forms of Kalman filters like unscented
Kalman filter [31], and Iterative EKF [32] were also proposed in the literature.
Neural networks (ANN) [33] and Fuzzy logic [34] which are also computationally
complex. Generally dynamic state estimations are well suited when the dynamics
of the power systems are smooth and follow the historical value. In other words,
they could fail to accurately estimate when there exists a bigger changes in
operating points.
and to identify and eliminate them accordingly [35]. Bad data analysis could be
weighted least squares estimation algorithm for state estimation, detection and
identification of bad data is done after the estimation process by processing the
Chi-squares test for bad data detection was presented in [36, 37]. It uses the
objective function of weighted least squares. Chi-squares test was able to detect
Alternatively, normalized residual test was able to detect as well as identify the
locations of occurrences [35, 36, 38]. Normalized residual test was developed
in the hypothesis testing identification methods [35, 36, 39]. Although both
methods used the residual sensitivity matrix to represent the sensitivity of the
residuals. Hence, hypothesis testing identification was used to detect and identify
bad data in this thesis. However, hypothesis testing identification was observed to
exhibit some limitations as noted in [36]. The primary limitation was the inability
PMUs. Today, various types of oscillation detection schemes have been installed in
many transmission utilities to monitor the inter-area oscillations within critical tie-
injection attacks than other dynamic monitoring applications [5]. Moreover, these
installed in substations.
inaccurate monitoring and time complexity of the algorithms. 1) If the PMU data is
schemes, the perceived observable state of the system will be wrong. This may
lead to improper control actions endangering the security of the system. 2) The
malicious intent might not be to hide the attack. An example is the denial of
service, where the system operator loses the observability in a critical region.
6.3.3 Distinction between a Fault and a Cyber-Attack:
Although both types of perturbations can lead to abnormal operations, the notion of
events that affect the power grid behavior, where the inherent transient dynamics
are observable in neighboring substations and can be correlated in a time scale [43-
Thus, the false dynamics embedded inside attacked measurements may not
correlate with other locations in time. The key is to establish a link with
transients caused by system perturbations. Another concern is the reaction time for
addressing transient dynamics are much less in comparison with static applications
like state estimation. Despite significant efforts have been invested in preventing
have not fully investigated the impact of cyber-attacks for monitoring inter-area
is still an emerging research where main focus to date has been towards application
development [16-18]. Hence, novel methodologies are needed to prevent cyber-
system applications, the notion is to become less dependent on classic models and
Therefore, system parameters are not extracted from offline predetermined power
system models. Instead, the proposed method extracts desired parameters from
PMU measurements.
(1)
where α is the constant matrix, is the nonlinear function representing the state
transition model, is the state variable, and the superscript r is the number of
monitored dynamic modes. For the case of oscillation detection, the state variable
distributed scheme that processes the estimated oscillatory dynamics of each PMU
nodes at a centralized track fusion center. The observation vector zi for extracting
(2)
Note that the ith node may be subjected to an attack. The term and pi is the
(3)
where Xt, Wt, and Vt are assumed to have Gaussian probability distribution
domain.
(4)
Ak is the complex amplitude of the kth mode, and are the corresponding
represented as Ts.
However, estimating oscillatory parameters for an accurate WAMS will require the
considering the fact that installed PMUs may also malfunction during an attack.
modeling.
the oscillatory states at ith node are p( , and the observation matrix is p( .
The resultant posterior distribution over the observations can be represented by the
oscillatory states and the observation matrix. Let represent the predicted
p( z ipr ,t | zti ) = ∑ ∫ dH ti p( z ipr | H ti , xti , zti ) p( H ti | xti , zti ) p( xti | zti ) (6)
xti
This distribution will later assist in the development of the probability of attack
vectors.
20
18 Fault Injection
Bus 16
16
12
10
0
0 10 20 30 40 50 60
time window (s)
(a)
18
Fault Injection
16 Bus 17
14
voltage phase angle (degree)
12
10 Deception Attack
0
0 10 20 30 40 50 60
time window (s)
(b)
Once all the information about the covariance and estimated states are collected
from local PMU nodes, they will be treated at the distributed fusion center which is
viewpoint, we can assume attacked nodes are local as wide-area attacks are less
feasible from a geographical perspective. Based on these considerations, it is not
covariance matrix and state vector. As a result, a centralized track fusion center is
proposed. Similar to (5), the observation model of the track fusion center can
be expressed as:
(10)
will require the complete observability of the oscillation observation matrix. This
requires the calculation of correlation information from the initial estimates of the
observation model. Treated correlation information will then assist in the removal
matrix generated is then sent back to each monitoring node to improve the
the computational effort of determining the initial estimates and the error
covariance matrix at each PMU node, diagonalization of the system model into
of robust eigenvalue placement, the system (4) and (5) can be decomposed into L
*
α 0 κ 0 ψ 1 i H1i
Lα R = 1 , Lκ R = 1 , Lψ R = , H R = i (11)
α 2
0 κ 2 κ 3 ψ
2 H2
triangular, κ3 ∈ Rn ×n is
2 2
non-singular lower-triangular. Transforming
xt = R[ x1,* t x2,* t ]* , where x1,t ∈ R n1 , x2,t ∈ R n2 . The system can be transformed into the
i i
zti = H t x1,t + v t (14)
where x1,t and x2,t are the states of subsystem 1 and subsystem 2, respectively.
only first subsystem will have the prediction and filtering stage, whereas the rest of
N −1 subsystems will only have filtering stage. Each subsystem is a smaller matrix
than the original model, which would then improve the computing speed required
to update the covariance matrix at each monitoring instance. Once the subsystems
are constructed from the system affected by the data-injection attacks, the
interactions between them shall be evaluated. Moreover, by handling the noise and
state constraints of (3), the immunity of the estimation results during data-injection
can be increased. Referring to (12)–(14), the resultant noises wt and ν t will have
wt
E 1 , wt ν t = Qt1,2δ t1,2
* 2*
ν t
where Qt1,2 is the process noise correlation factor between subsystem 1 and 2, δ t1,2
is the Kronecker delta function used for shifting the integer variable after the
from attacked sensor nodes while providing accurate covariance matrix for the
can be improved.
taking the difference between the given and predicted observation of the oscillation
state:
T
Ζit +1 = [ zti+1 − z ipr ,t +1 ] = ∑ψ t*−1θtH (1) ∆H ti + υti (15)
t =1
where the vector Ζit +1 is the innovation calculated for i-th node. zti+1 and z ipr ,t +1 are
δ zti
respectively. ∆H = ∆H − H is the perturbation in H . θ =
i i i i i
is the gradient
t d ,t t
δ H ti*t t
used to identify the perturbation due to data-injection attacks. ψ t is the data vector
Bibliography
[3] V. Shukla and D. Qiao, "Distinguishing data transience from false injection
Sensor, Mesh and Ad Hoc Communications and Networks, 2007, pp. 41-50.
Control Systems," IEEE Control Systems, vol. 35, pp. 110-127, 2015.
[5] H. M. Khalid and J. C.-H. Peng, "Immunity toward data-injection attacks
2715-2729, 2013.
[7] X. Le, M. Yilin, and B. Sinopoli, "Integrity data attacks in power market
altering attacks against smart power grids," IEEE Transactions on Smart Grid, vol.
attacks on power grids," IEEE Transactions on Smart Grid, vol. 2, pp. 326-333,
2011.
data-injection attack and detection in the smart grid: A detailed look at enriching
detection solutions," IEEE Signal Processing Magazine, vol. 29, pp. 106-115,
2012.
attack construction and state estimation in the smart grid: Centralized and
distributed models," IEEE Journal on Selected Areas in Communications, vol. 31,
[13] H. Fawzi, P. Tabuada, and S. Diggavi, "Secure estimation and control for
[14] Y. Yuan, Z. Li, and K. Ren, "Modeling load redistribution attacks in power
al., "Wide area monitoring and control for transmission capability enhancement,"
[17] N. Shivakumar and A. Jain, "A review of power system dynamic state
pp. 1-6.
[18] W.-g. Li, J. Li, A. Gao, and J.-h. Yang, "Review and Research Trends on
estimation (1968-1989)," Power Systems, IEEE Transactions on, vol. 5, pp. 950-
961, 1990.
[20] A. Gómez-Expósito, A. de la Villa Jaén, C. Gómez-Quiles, P. Rousseaux,
and T. Van Cutsem, "A taxonomy of multi-area state estimation methods," Electric
requirements of the future grid," Signal Processing Magazine, IEEE, vol. 29, pp.
33-43, 2012.
algorithm for power system sequential state estimation," Power Apparatus and
[23] A. Abur and M. K. Celik, "Least absolute value state estimation with
equality and inequality constraints," Power Systems, IEEE Transactions on, vol. 8,
[24] M. K. Celik and A. Abur, "A robust WLAV state estimator using
1992.
[25] A. S. Debs and R. Larson, "A dynamic estimator for tracking the state of a
power system," Power Apparatus and Systems, IEEE Transactions on, pp. 1670-
1678, 1970.
estimation and bad data processing," Power Apparatus and Systems, IEEE
and bad data processing," Power Apparatus and Systems, IEEE Transactions on,
squares power system state estimation," Power Systems, IEEE Transactions on,
Kalman filter based state estimation for first order nonlinear dynamic systems," in
Decision and Control, 2003. Proceedings. 42nd IEEE Conference on, 2003, pp.
1386-1391.
[31] G. Valverde and V. Terzija, "Unscented Kalman filter for power system
dynamic state estimation," IET generation, transmission & distribution, vol. 5, pp.
29-37, 2011.
estimation—Part I: Panorama," Power Systems, IEEE Transactions on, vol. 24, pp.
1667-1677, 2009.
[33] A. Sinha and J. Mondal, "Dynamic state estimator using ANN based bus
load prediction," Power Systems, IEEE Transactions on, vol. 14, pp. 1219-1225,
1999.
[34] J.-M. Lin, S.-J. Huang, and K.-R. Shih, "Application of sliding surface-
enhanced fuzzy control for dynamic state estimation of a power system," Power
for power system state estimation," Power Apparatus and Systems, IEEE
[36] A. Abur and A. G. Exposito, Power system state estimation: theory and
static state estimation," Power Apparatus and Systems, IEEE Transactions on, pp.
2718-2725, 1971.
[38] J. Chen and A. Abur, "Placement of PMUs to enable bad data detection in
state estimation," Power Systems, IEEE Transactions on, vol. 21, pp. 1608-1615,
2006.
identification: a new method for bad data analysis in power system state
estimation," Power Apparatus and Systems, IEEE Transactions on, pp. 3239-3252,
1984.
[40] C. Lu, B. Shi, X. Wu, and H. Sun, "Advancing China's smart grid: Phasor
overview of WAM systems used in Italy and Switzerland," IEEE Power and
tolerant control systems," Annual reviews in control, vol. 32, pp. 229-252, 2008.
Springer, 2006.
[47] F. Skopik and P. D. Smith, Smart grid security: Innovative solutions for a
content and equivalent models for measured power system response," IEEE
Haris M. Khalid (M'13) received his B.S. (Hons.) degree in Mechatronics and
(UET), Lahore, Pakistan, in 2007, and the M.S. and Ph.D. degrees in Control
Research Fellow. In 2013, he joined as a Research Fellow with the Power Systems
His research interests are power systems, cyber-physical systems, electric vehicles,
International Conferences.
Electrical and Computer Engineering from the Ohio State University in 2005,
2007, and 2010, respectively. For his M. Sc. degree, he investigated the application
systems. He conducted his PhD research at the Center for Automotive Research in
the Ohio State University on the applications of modern estimation and control
Dhabi, UAE. He obtained the PI Research & Scholarship Award for Junior Faculty
in 2014. He has one U.S. Patent Application and co-published one book titled
“Modeling and Control Aspects of Wind Power Systems.” His research interests
are application of estimation and control theory in power system stability, Micro
and Smart Grids, renewable energy, and process control. He has published over 80
scientific articles in Journals, International Conferences, and book chapters. Dr.