版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、Bad Data Injection in Smart Grid: Attack and Defense MechanismsZhu HanUniversity of HoustonOverviewIntroduction to Smart GridPower System State Estimation ModelBad Data InjectionDefender Mechanism Quickest DetectionAttacker Learning SchemeIndependent Component AnalysisFuture WorkA Few Topics in Smar
2、t Grid Communication ConclusionsQuick View of Amigo Lab“Smarter Power GridSensing, measurement, and control devices with two-way communications between the suppliers and customers.Benefits both utilities, consumers & environment:Reduce supply while fitting demand Save money, optimal usage.Improve re
3、liability and efficiency of grid Integration of green energy, reduction of CO2 More than 3.4 billion from US federal stimulus bill is targeted.Obama stimulus planOne of hottest topic in research communityBut what are the problems from signal processing, communication and networking points of view?Sm
4、art GridAre more easily integrated into power sys. Less depend on fossil fuelConnect grid to charge overnight when demand is lowRealtime analysis, Manage, plan, and forecast the energy system to meets the needsCan generate own and sellback excess energyGather, monitor the usage so the supply more ef
5、ficiently and anticipate challenging peaksUse sophisticated comm. Technology to find/fix problems faster, enhancing reliabilityin-home management tool to track usageSupervisory Control and Data Acquisition CenterReal-time data acquisitionNoisy analog measurementsVoltage, current, power flowDigital m
6、easurementsState estimationMaintain system in normal stateFault detectionPower flow optimizationSupply vs. demandSCADA TX data from/to Remote Terminal Units (RTUs), the substations in the gridPrivacy & Security Concern More connections, more technology are linked to the obsolete infrastructure. Add-
7、on network technology: sensors and controls estimationMore substations are automated/unmannedVulnerable to manipulate by third partyPurposely blackout Financial gainStory of EnronHow to tackle this issue at this moment?Provide one example nextPower System State Estimation ModelTransmitted active pow
8、er from bus i to bus jHigh reactance over resistance ratioLinear approximation for small varianceState vector , measure noise e with covariance e Actual power flow measurement for m active power-flow branchesDefine the Jacobian matrix We have the linear approximation H is known to the power system b
9、ut not known to the attackersBad Data Injection and Detection State estimation from zBad data detectionResidual vector Without attackerwhereBad data detection (with threshold )without attacker: with attacker:otherwiseStealth (unobservable) attack: z=Hx+c+e, where c=HxHypothesis test would fail in de
10、tecting the attacker, since the control center believes that the true state is x + x.OverviewIntroduction to Smart GridPower System State Estimation ModelBad Data InjectionDefender Mechanism Quickest DetectionAttacker Learning SchemeIndependent Component AnalysisFuture WorkA Few Topics in Smart Grid
11、 Communication ConclusionsQuick View of Amigo LabBasics of Quickest Detection (QD)Detect distribution changes of a sequence of observations as quick as possible with the constraint of false alarm or detection probability. min processing time s.t. Prob(true estimated) ClassificationBayesian framework
12、: known prior information on probability SPRT (e.g. quality control, drug test, )Non-Bayesian framework: unknown distribution and no prior CUSUM (e.g. spectrum sensing, abnormal detection ) QD System Model Assuming Bayesian framework with non-stealthy attackthe state variables are random with The bi
13、nary hypothesis test:The distribution of measurement z under binary hyp: (differ only in mean) We want a detectorFalse alarm and detection probabilities Detection Model - NonBayesianNon-Bayesian approach unknown prior probability, attacker statistic modelThe unknown parameter exists in the post-chan
14、ge distribution and may changes over the detection process. You do not know how attacker attacks.Minimizing the worst-case effect via detection delay:We want to detect the intruder as soon as possible while maintaining PD.Actual time of active attackDetection timeDetection delayMulti-thread CUSUM Al
15、gorithmCUSUM Statistic: where Likelihood ratio term of m measurements:By recursion, CUSUM Statistic St at time t:Average run length (ARL) for declaring attack with threshold hHow about the unknown?Declare the attacker is existing!Otherwise, continuous to the process. Linear Solver for the UnknownRao
16、 test asymptotically equivalent model of GLRT:The linear unknown solver for m measurements:Recursive CUSUM Statistic w/ linear unknown parameter solve:Modified CUSUM statisticsThe unknown is no long involvedSimulation: Adaptive CUSUM algorithm2 different detection tests: FAR: 1% and 0.1%Active attac
17、k starts at time 5Detection of attack at time 7 and 8, for different FARsMarkov Chain based Analytical ModelDivide statistic space into discrete states between 0 and thresholdObtain the transition probabilitiesObtain expectation of detection delay, false alarm rate and missing probabilityOverviewInt
18、roduction to Smart GridPower System State Estimation ModelBad Data InjectionDefender Mechanism Quickest DetectionAttacker Learning SchemeIndependent Component AnalysisFuture WorkA Few Topics in Smart Grid Communication ConclusionsQuick View of Amigo LabIndependent Component Analysis (ICA)Linear Inde
19、pendent Component Analysisfind a linear representation of the data so that components are as statistically independent as possible.i.e., among the data, find how many independent sources.Question for bad data injection:Without knowing H, the attacker can be caught. Could attacker launch stealthy att
20、ack to the system even without knowledge about H?Using ICA, attacker could estimate H and consequently, lunch an undetectable attack. ICA BasicsA special case of blind source separationu = G vu = ui, i = 1, 2, m: observable vectorG = gij, i = 1, 2, m, j = 1, 2, n: mixing matrix(unknown)v = vi, i = 1
21、, 2, n: source vector (unknown)Linear ICA implementation: FastICA from HyvrinenStealth False Data Injection with ICASupposing that the noise is small, then we what to do the mapping:u = G v z = H xProblem: state vector x is highly correlatedConsider: x = A y, whereA: constant matrix that can be esti
22、matedy: independent random vectorsThen we can apply Linear ICA on z = HA yWe cannot know H, but we can know HAStealthy attack: Z=Hx+HAy+eNumerical Simulation SettingSimulation setup4-Bus test system, IEEE 14-Bus and 30-busMatpowerNumerical Results MSE of ICA inference (z-Gy) vs. the number of observ
23、ations (14-bus case).Performance of the AttackThe PDF is the same w or w/o attacking. So log likelihood is equal to 1 unable to detectOverviewIntroduction to Smart GridPower System State Estimation ModelBad Data InjectionDefender Mechanism Quickest DetectionAttacker Learning SchemeIndependent Compon
24、ent AnalysisFuture WorkA Few Topics in Smart Grid Communication ConclusionsQuick View of Amigo Lab1. Distributed Smart Grid State Estimation The deregulation has led to the creation of many regional transmission organizations within a large interconnected power system.A distributed estimation and co
25、ntrol is need .Distributed observability analysisBad data detectionChallenges:Bottleneck and reliability problems with one coordination center.Need for wide area monitoring and controlConvergence and optimality Fully-Distributed State EstimationWith N substations/nodesBy iteratively exchanging infor
26、mation with neighbors All local control center can achieve an unbiased consensus of system-wide state estimation.Local observation matrixUnknown StateLocal Jacobian matrixUseful information to be detected2. Optimality of Fault Detection Algorithm Detecting the attack as an intermediate step towards
27、obtaining a reliable estimate about the injected false dataFacilitates eliminating the disruptive effects of the false dataJoint estimation and detection problemDefine an estimation performance measure Seek to the optimize it while ensuring satisfactory of the detection performancePerformance measur
28、ement3. Manipulate Electricity Market Example: Ex Post MarketMarket that recalculate optimal points for generation and consumption based on real-time data Min : St:28Generation CostPower Balance Generation & Transmission limits 4. PMUPMU can measure voltage angle directlyDefender: placement problem,
29、 no need to place nearby Attackers new strategy with existence of PMU1625734PMUPMUPMUPMUPMUPMUPMU295. Game Theory Analysis(attacker,defender)NAN(0,0)(b,-b)D(c,-c)(-a,a)a, b, c tHow to formulate the game?A Few Topics in Smart Grid CommunicationsBad data injectionDemand side managementPeak to average
30、ratioScheduling problemRenewable energyThe renewable energy is unreliable. Have to use diesel generators during shortageNot cheap and not greenPHEV routing, scheduling and resource allocationCommunication link effect on the smart gridConclusionsBad data injection problem formulationFrom defender point of viewdetect malicious bad data injection attack as quick
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2021屆浙江省寧波市九校高一上學(xué)期期末聯(lián)考數(shù)學(xué)試題(解析版)
- 人教版八年級(jí)上學(xué)期期中考試數(shù)學(xué)試卷-(含答案)
- 天津市和平區(qū)2023-2024學(xué)年高三上學(xué)期期末質(zhì)量調(diào)查英語(yǔ)試卷
- 醫(yī)藥行業(yè)前臺(tái)接待工作心得
- 家政服務(wù)保姆照顧技能培訓(xùn)總結(jié)
- 環(huán)保行業(yè)美工工作總結(jié)
- 貴州省安順市紫云縣2021-2022學(xué)年九年級(jí)上學(xué)期期末化學(xué)試題
- 整形美容行業(yè)安全工作總結(jié)
- 廣東省深圳市鹽田區(qū)2023-2024學(xué)年六年級(jí)上學(xué)期英語(yǔ)期末試卷
- 醫(yī)療器械采購(gòu)實(shí)踐分享
- 高中生物課件
- 物業(yè)年會(huì)講話稿范文
- TCUWA40055-2023排水管道工程自密實(shí)回填材料應(yīng)用技術(shù)規(guī)程
- 2024年國(guó)家公務(wù)員考試《申論》真題(地市級(jí))及答案解析
- 公眾號(hào)年終總結(jié)個(gè)人
- 私募股權(quán)投資基金績(jī)效考核制度
- 初三生活學(xué)習(xí)總結(jié)模板
- 2024-2025學(xué)年第一學(xué)期期中考試 初一語(yǔ)文 試卷
- 單位內(nèi)部發(fā)生治安案件、涉嫌刑事犯罪事件的報(bào)告制度
- 2023年心理學(xué)基礎(chǔ)知識(shí)試題及答案
- 湖南省岳陽(yáng)市2023-2024學(xué)年高三上學(xué)期教學(xué)質(zhì)量監(jiān)測(cè)(一)(一模) 英語(yǔ) 含解析
評(píng)論
0/150
提交評(píng)論