Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2017.2675960, IEEE
Transactions on Smart Grid
IEEE TRANSACTIONS ON SMART GRID, MAY 2016 1
AbstractRecent studies have shown that an attacker can lead to catastrophic consequences such as blackouts in large
compromise some of the power grid measurements to mislead geographic areas. Among different cyber attacks, false data
the conventional state estimators (SEs), since the manipulated injections have attracted significant research interest, since the
measurements can pass the SE residue tests. Statistical structure
learning-based approaches have been recently introduced as a attacker with enough knowledge of the power grid topology
powerful tool to detect some of the most complicated cyber can initiate an attack in a way that it passes residue-based bad
attacks. However, the expensive computational complexity of the data detection tests, commonly used in power systems SE,
learning process limits the applicability of these approaches for thereby remaining undetected [5], [6].
real time cyber attack detection. This paper proposes a fast
and decentralized approach for cyber attack detection based A. Related work
on a maximum likelihood (ML) estimation which exploits the
near chordal sparsity of power grids to establish an efficient Two security indices were proposed in [2] and [8] providing
framework to solve the associated ML estimation problem. The the size of the smallest measurement set that should be
proposed detection method is then decomposed to several local compromised by the attacker in order to launch a successful
ML estimation problems; this would ensure privacy and reduce unobservable false data injection attack. Using the graph the-
the complexity of the underlying problem. The simulation studies
validate the efficiency of the proposed method in detecting truly oretic tools in [2], it was proven that the security index is only
complicated stealthy false data injection attacks. dependent on the power grid configuration. To detect stealthy
attacks, a new algorithm has been proposed in [9] for PMUs
Index TermsSmart grids; False data injection attack; Maxi-
mum likelihood (ML) estimation; Chordal sparsity. placement; however, due to the complexity of the problem, the
proposed method is not practical when the number of attacked
nodes is more than five. Also, the proposed method requires a
I. I NTRODUCTION new hardware installation which is impractical in many cases.
1949-3053 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2017.2675960, IEEE
Transactions on Smart Grid
IEEE TRANSACTIONS ON SMART GRID, MAY 2016 2
by adding a relatively small number of edges), the original Definition 1. A random vector x = (x1 , x2 , ..., xn )T is a
ML estimation problem could be reformulated in the chordal GMRF with respect to the dependency graph G = (V, E) if x
embedding space in which the number of optimization vari- has a joint Gaussian distribution as
ables and equality constraints reduce significantly. As a result,
1
the obtained optimization problem can be solved efficiently (x) = (2)n/2 |Q|1/2 exp (x )T Q(x ) ,
2
through the use of standard tools.
In the next step, we elaborate that to construct information Qij 6= 0 {i, j} E, i, j V, i 6= j.
matrix of the phase angles Gaussian Markov random field
(GMRF), utilities require to share their measurements and Graph G is called a Markov graph or the graphical Markov
outputs of their state estimations. Also, due to the size of model associated with the joint Gaussian distribution (x).
ML estimation problem in large scale power systems, a
large number of corrupted measurement samples is needed
to accurately capture the conditional dependencies between B. Structure Learning of GMRF
random variables. To cope with the aforementioned challenges, In the context of GMRF, structure learning or covariance
the detection algorithm proposed in this paper is decentralized selection aims at estimating and of a multivariate normal
by breaking the underlying optimization problem into several variable x N (, ) based on a (sufficient) number of
smaller anomaly detection problems that can be solved locally samples of those random variables. Both convex and non-
and without the need for any communication among the convex, also called greedy, methods have been proposed in
regions. To achieve this, the Kron reduction technique is the literature to learn the structure of graphical models. Due
applied to find the sparsity and properties of GMRF for each to the availability of powerful tools in convex optimization,
regions phase angles with respect to the rest of the power grid the convex methods and specifically maximum likelihood es-
phase angles. Applying the proposed decentralized approach timation approaches are preferred over others. The maximum
reduces the complexity of the problem at hand and, at the likelihood estimation problem for a GMRF can be formulated
same time, ensures privacy among utilities in smart grids. as follows.
II. P RELIMINARIES AND N OTATIONS 1) Maximum Likelihood (ML) Estimation: In this section,
we discuss the ML estimation problem as the best estimate
Throughout this paper, R, x, X, xij , XIJ , and X T denote
of the parameters of a probability distribution based on ob-
the set of real numbers, a real column vector, a matrix, the
servations yi subject to constraints given that any pairs of the
entry in row i and column j of matrix X, the submatrix of X
variables are conditionally independent (xi xj | xV\{i,j} ).
with rows indexed by I and columns indexed by J, and the
Let V be the set of upper triangular positions of informa-
transpose of the matrix X, respectively. Also, Sn , Sn+ , Sn++
tion matrix Q which can be non-zero. Therefore, the above
denote the set of symmetric, symmetric positive semidefinite,
conditional independency between random variables can be
and symmetric positive definite matrices, respectively. The
expressed as
sets of symmetric positive semidefinite and symmetric positive
definite matrices of size n n with sparsity patterns V
Qij = (1 )ij = 0 (i, j) 6 V.
are shown by SnV , SnV + , SnV ++ , respectively. Also, PV (X)
denotes the projection of X Sn on SnV . Given two jointly Up to a constant factor, the log-likelihood function is
distributed random variables x and y, x|y means x given y.
Furthermore, x y denotes that x is independent of y, and
K
x y|z means that x is independent of y given z. Finally, K 1X
L(, ) = log det (yi )T 1 (yi )
the undirected connected graph with node set V = {1, . . . , n} 2 2 i=1 (1)
and edge set E V V is represented by G = (V, E). A\B K 1 T 1
denotes {i : i A, i 6 B} and A0 means V\A. = log det tr( ) ( ) ( ) ,
2
xi xj | xV\{i,j} Qij = 0. with the matrix variable Q S n . Since the objective function
is concave on the set of positive definite matrices, the ML
Given above descriptions, a GMRF is defined below [13]. estimation problem is a convex optimization problem.
1949-3053 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2017.2675960, IEEE
Transactions on Smart Grid
IEEE TRANSACTIONS ON SMART GRID, MAY 2016 3
C. Measurements and the State Estimation in Power Systems According to [14], due to the loads uncertainties and con-
To ensure the continuous and uninterrupted operation of sidering that generations and loads are balanced, the injected
power systems under different conditions, it is important power can be modeled as a random variable. Furthermore,
to monitor grid components. Meters are usually deployed considering injection power at each node as the sum of many
throughout the grid to read measurements such as active power random variables, and using Lyapunov central limit theory
injections and power flows of buses and branches, respectively, (CLT) [15], it has been shown in [12] that the injected power
and send these measurements to the control center. Then, the can be modeled as a Gaussian distribution. Since Lyapunov
control center uses these measurements to estimate the power condition is met in power grids [16], for each node, the
system state variables, i.e., buses phase angles. injected power pi is modeled as a Gaussian random variable
In this paper, it is assumed that for an N -bus grid, the N 1 that is statistically independent of other injected power random
phase angles x = [x1 , x2 , ..., xN 1 ]T (slack bus phase angle variables. The Gaussian model assumption for injected powers
is excluded) are to be estimated using M installed meters z = in transmission systems is widely accepted and has been
[z1 , z2 , ..., zM ]T that measure buses power injection and lines validated in [27], [28] and used in different power networks
power flows. Given the DC power flow model, the relationship analysis studies such as cyber security [12] and probabilistic
between measurements and state variables is described by optimal power flow analysis [29]. Therefore, considering the
linear relationship in (6), the phasor angles xi can be modeled
z = Hx + e, (3) as Gaussian random variables as well [10][12].
M (N 1)
where H R is the measurement matrix and
e N (0, W ) is the measurement noise vector, where W B. False Data Injection Against State Estimation
is a diagonal matrix whose elements are reciprocals of the
False data injection is a cyber attack made against data in-
variances of meter errors. In this paper, it is assumed that
tegrity in smart grids, in which an adversary injects malicious
M = N + 2L meters are deployed throughout the grid to
measurements in order to mislead system state estimation
measure buses real power injections and lines power flows,
algorithm while circumventing conventional detection methods
where L is the number of transmission lines. According to (3),
such as a bad measurement detector. Let za represent the
the maximum-likelihood estimation of x can be determined by
vector of observed measurements that contains manipulated
[5]
measurements as za = z + a, where a is called attack vector
= Kz,
x K = (H T W H)1 H T W . (4) whose elements ai have nonzero mean values to account for
meters compromised by the adversary.
III. P ROBLEM F ORMULATION The state estimation in the presence of the attack vector a
In this section, the application of covariance selection to is determined by
detect false data injection attacks is described. Based on the a = Kza = x
x + Ka, (8)
DC power flow model of the power grids, it is shown that
the phase angles can be considered as the random variables a is the vector of estimated state variables obtained
where x
of a GMRF. Then, the ML estimation is employed to find the from za .
anomalous behaviors of phase angles.
C. Detection of the False Data Injection by Evaluating
A. GMRF of Phase Angles
Markov Graph Changes
Under the normal steady state operation of power systems,
Based on our earlier discussion of this section, since the
the DC power flow is considered to be a reliable tool to analyze
CLT conditions are satisfied for a typical power system,
and control the power systems. Provided that the phase angle
the power injection at different nodes can be considered as
differences are small, for a transmission line connecting bus i
independent Gaussian random variables. As shown in (5),
to bus j, the active power is given by
the random variables mean values do not appear in the final
pij = bij (xi xj ), (5) formulation of the ML problem, and hence without the loss of
where xi and xj are the phasor angles at bus i and j, generality, it is assumed that the mean value of injected power
respectively, and bij denotes the inverse of line inductive at each node is equal to zero. Therefore, the density function of
T
reactance. The power injected to bus i is equal to the algebraic the power injections can be represented as (p) e1/2p p .
summation of active power flowing away from bus i through Given the linear relationship (6) between phasor angles and
the transmission lines connected to it, and hence injection powers, phasor angles (except for the slack bus) can
be represented as a Gaussian random variable with density
T T
1949-3053 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2017.2675960, IEEE
Transactions on Smart Grid
IEEE TRANSACTIONS ON SMART GRID, MAY 2016 4
1949-3053 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2017.2675960, IEEE
Transactions on Smart Grid
IEEE TRANSACTIONS ON SMART GRID, MAY 2016 5
For the case of bulk practical smart grids, it seems almost and every parent in the tree has a lower index than its
impossible to solve the ML estimation problem in real time to children.
detect anomaly in the outcomes of SE. However, since in smart (iii) Define Si and Ui for each node Ci of the clique tree as
grids, the Markov graph of the phase angles is sparse, it can Si = Ci \ (C1 C2 ... Ci1 ),
be chordalized by adding a relatively small number of edges. Ui = Ci (C1 C2 ... Ci1 ).
In this paper, we exploit the aforementioned characteristics of
Markov graph of the phase angles and solve the underlying These definitions for chordal graph can be simplified as
ML estimation problem efficiently by employing the chordal S i = Ci \ CK , U i = Ci CK ,
embedding sparsity of phase angles Markov graph as proposed
in [17]. Throughout this section, we use the algorithms initially where CK is the parent of Ci in the clique tree.
developed in [17] to establish a fast and efficient framework (iv) Renumber the nodes of GVe as S1 = {1, 2, ..., | S1 |} and
for real time detection of false data injection attacks. K1
X K1
X
Let us consider the matrix Q of phase angles GMRF with SK = { |Sj | + 1, ... |Sj | + |SK |} for K > 1,
the sparsity pattern V and a chordal sparsity pattern Ve that j=1 j=1
contains V . Then, Ve is called the chordal embedding of where |SK | is the cardinality of the set SK .
V . For highly sparse graphs, minimal triangulation methods Cholesky factorization: Any symmetric matrix Q Sn++
based on minimal elimination order are efficient to triangulate can be factorized as
the graph by adding a few number of edges. For years,
LEX M algorithm [18] had been considered as the origin Q = RDRT , (10)
of other minimal triangulation algorithms that either used or
enhanced it; however, recently, a more efficient algorithm, where D is a block diagonal matrix and R is a unit upper
called maximum cardinality search (MCS), was introduced triangular matrix with the same size as Q. If Q SnVe ++ ,
in [19] which avoids the extra sorting step. This approach then the Cholesky factorization can be computed efficiently
is employed in this paper to find the minimum triangulation using the clique tree and the defined sets SK and UK . The
of the Markov graph of the phase angles in a reasonable time. following algorithm overwrites nonzero elements of Q with
If the information matrix Q in the ML estimation problem the elements of D and R. At the end of the proposed recursive
(2) is restricted to the sparsity of chordal embedding SnVe , this algorithm, the diagonal blocks of D and nonzero elements of
convex optimization problem can be formulated as R are found as DSK SK = QSK SK and RUK SK = QUK SK ,
min log det Q tr(CQ) respectively, for cliques K = 1, 2, ...l.
(9)
subject to Qij = 0 (i, j) Ve \ V, Algorithm 1 Cholesky factorization with chordal sparsity
pattern [17].
where Q SnVe and C = PV ().
Changing variable space from Sn to SnVe has two advantages. Load SK and UK for cliques in the clique tree CK for K =
Firstly, the number of optimization constraints reduces dramat- 1, 2, ..., l.
ically, and secondly, the Gradient and Hessian of log det Q For K = l, l 1, ..., 2 compute
can be calculated efficiently using Cholesky factorization and QUK SK = QUK SK Q1
SK SK ,
without the need for computation of Q1 . In the next subsec- QUK UK = QSK SK QUK SK QSK SK QTUK SK .
tions, it is shown how the ML estimation problem of phase
angles can be solved efficiently using the chordal embedding To solve the ML estimation problem, the Gradient and
Hessian of f (Q) = log det Q1 have to be calculated at each
sparsity of the phase angles chordal graphs. iteration. The gradient of f (Q) is calculated as
1) Calculating the Gradient and Hessian of log det Q for 5f (Q) = PVe (Q1 ). (11)
Chordal Sparsity Pattern: We assume that the chordal embed-
ding sparsity pattern Ve of phase angles GMRF V has been Since, in general, Q1 is a dense matrix, the task of finding the
found using the MCS approach and the chordal embedding gradient of log det Q1 when the dimension of the problem
graph is denoted by GVe . Before calculating the Gradient and increases is computationally intensive. However, as proven in
Hessian of Q SnVe , following steps should be taken: [17], the gradient of log det Q1 can be computed efficiently
(i) Find the clique graph of the undirected graph GVe defined using Cholesky factorization when the sparsity pattern Ve is
by the sparsity pattern Ve . The clique graph of GVe chordal. The recursive procedure shown in Algorithm 2 writes
is obtained by considering the maximal cliques of GVe the gradient of log det Q1 to the matrix Y .
as the nodes of the clique graph and assigning edges The Hessian of f (Q) applied to a matrix 4Q SnVe is
between any two nodes if their corresponding cliques are calculated as
intersected. 52 f (Q)[4Q] = PVe (Q1 4 Q Q1 ). (12)
(ii) Obtain the clique tree of GVe as a maximum weight
spanning tree of its clique graph obtained in (i) using Again, since Q SnVe ++ , the Hessian matrix can be computed
the efficient approach proposed in [20]. Assuming that efficiently by employing the Cholesky factorization of Q
the clique tree has l cliques C1 , C2 , ..., Cl , the cliques as shown in the procedure of Algorithm 3. At the end of
are renumbered in a way that C1 is the root of the tree Algorithm 3, 4Q is overwritten by PVe (Q1 4 Q Q1 ).
1949-3053 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2017.2675960, IEEE
Transactions on Smart Grid
IEEE TRANSACTIONS ON SMART GRID, MAY 2016 6
Algorithm 3 Hessian of log det Q1 using chordal sparsity first equation in (14) can be decomposed into m + 1 linear
pattern [17]. equations as
Load SK and UK for cliques in clique tree Ci for PVe (Q1 4 Q0 Q1 ) = PVe (Q1 ) C
i = 1, 2, ..., l. (16)
PVe (Q1 4 Qk Q1 ) = Ak k = 1, ..., m.
Calculate Cholesky factorization Q = RDRT using
Algorithm 1. These equations can be solved separately for 4Qi s using
Calculate the gradient of log det Q1 using Algorithm 2. algorithms 1-3. By substituting 4Q in the second group of
For K = 1, 2, ..., l, run the recursion equations in (14) and solving this set of equations for wi s, the
Newton step 4Q can be obtained using (15). The complete
4XUK UK 4XUK SK I RUK SK
= algorithm for solving the ML estimation problem using the
4XSK UK 4XSK SK 0 I proposed Newtons-based method using chordal embedding
4XUK UK 4XUK SK I 0 sparsity is shown in Fig. 2. It is noted that finding chordal
. embedding, calculation of the clique tree, and finding Sk , Uk
T
4XSK UK 4XSK SK RU K SK
I
for all cliques are carried out only when the topology of the
For K = 1, 2, ..., l compute power grid changes, and therefore under normal operation,
4QSK SK = DS1
K SK
4 QSK SK DS1
K SK
, these parameters remain unchanged.
4QUK SK = (Q )UK UK 4 QUK SK DS1
1
K SK
.
For K = 1, 2, ..., l run the recursion Input new set of
estimated states
Update sparsity pattern V based on
changes in the grid configuration
4QUK UK 4QUK SK I 0 Find the covariance mtarix of input data
= Find sparsity of minimal chordal
T
4QSK UK 4QSK SK RU K SK
I embedding of V using MCS method
Guess initial value for Q
Find clique tree SK and UK for all cliques
4QUK UK 4QUK SK I RUK SK Construct Cholesky factorization Using
. Algorithm 1
4QSK UK 4QSK SK 0 I
Calculate the Gradient of LogdetQ-1
using Algorithm 2
1949-3053 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2017.2675960, IEEE
Transactions on Smart Grid
IEEE TRANSACTIONS ON SMART GRID, MAY 2016 7
attacked system. Furthermore, utilities need to share their state following integral
estimations to construct the information matrix of the whole Z
system, which is not practical given the privacy of utilities. 1
(xRi ) = (xRi , xR0 ) dxR0 exp( xTRi 1
Ri Ri xRi ).
In this section, we address the aforementioned problems, i i 2
(17)
where instead of the Markov graph of the whole system,
the marginal Markov graph of each region is implemented Graph Grd = (Vrd , Erd ) is defined as the Markov graph of
to detect false data injection attack. Hence, the problem of the marginal joint probability distribution of xRi with respect
detecting false data injections is transformed into that of to xR0 , where Vrd = Ri and Erd Ri Ri . Defining Qrdi =
solving the ML estimation of marginal GMRF for each region, i
1
Ri Ri , Qrdi is the adjacency matrix of graph Grd , according
that can be carried out locally. The proposed deployment
to (17). Also, Grd is |xRi | |xRi | dimensional Kron-reduced
allows each region to estimate phase angles of the immediate
graph of G according to the definition of Kron reduction, since
neighbor nodes in other regions. Therefore, each local GMRF
1
Ri Ri is the Schur complement of the block QRi Ri of the
0 0
is considered as local buses plus immediate neighbor buses in
matrix Q such that
the regions. As an illustrative example, the proposed localiza-
tion is illustrated in Fig. 3 for the IEEE 14-bus system divided
into three regions. Qrdi = 1 1
Ri Ri = QRi Ri QRi R0 QR0 R0 QR0 Ri . (18)
i i i i
6
11
10
the only difference between Grd and corresponding part of G
is only some possible additional edges between the boundary
nodes. Furthermore, since the sparsity of Q is consistent with
4 7
that of the matrix B, the only changes in the grid topology that
3
8
add or remove edges between boundary nodes are the changes
2
1
GMRF1 Region 1
in the transmission lines topology which remove or create
GMRF2
GMRF3
Region 2
Region 3
paths only between boundary nodes k, m that pass through
0
{k, m} Ri .
Fig. 3. The IEEE 14-bus system with three utility regions and their local
GMRFs.
Therefore, the false data injection problem can be reformu-
lated as statistical learning of the marginal GMRF of phase
Theorem 1 provides some major properties of the marginal angles in each region. That is, instead of learning (estimating)
distribution function of the phase angles in each region and the information matrix Q, each region uses estimated local
the properties of the local Markov graph associated with each phase angles as the samples to solve the ML estimation
marginal GMRF. problem to learn Qrdi . Since the number of random variables
for each local ML problem p is considerably less than that of
Theorem 1. Let xRi be all |xRi | measurable phase angles
random variables in the original ML estimation problem (i.e.,
for ith region, xRiB xRi phase angles located at boundary
n), the proposed algorithm can be implemented with a small
node of the region and consider all the other phase angles as
number of samples indicating a decrease in detection time.
xR0 . Then, the Markov graph underlying the joint probability
i
distribution xRi : Remark. Due to the mesh topology of real transmission
(i) is obtained by |xRi | |xRi | dimensional Kron-reduced systems, the regions are not the separators of the power
Markov graph of the entire phase angles. system graph, and hence based on the above theorem, all the
(ii) can have some additional edges between its boundary boundary nodes in each region are usually connected to each
nodes compared to the original Markov graph of entire phase other. Furthermore, in practical transmission systems, there
angles. Also, no edge is added (or removed) between the are several paths between any two nodes, and hence, under
boundary nodes k, m under any topology changes in the grid usual single or even double lines outages, some paths between
0
topology except the changes that create (remove) only a path two boundary nodes k, m that pass through S = {k, m} Ri
0
between nodes k and m that passes through S = {k, m} Ri . remain connected. Therefore, the topology of the regional
Markov graphs does not usually change due to the changes in
Proof. Let the Gaussian distribution of phase angles be rep-
resented as topology of other regions.
T It is noted that even if the transmission lines topology
1
1 xRi Ri Ri alters, Ri R0 xRi
which leads to a change in the sparsity of Brdi , the
(xRi , xRi0 ) exp( i ).
2 xR 0 R0 Ri
R0 R0 xRi0 regional information sparsity should be updated. Fortunately,
i i i i
a sub-network connection graph is available online from the
The marginal distribution of xRi with respect to xR0 can protection system at each sub-network and can be readily used
i
be calculated using matrix operations, as the solution of the to construct the network connection graph of the whole system.
1949-3053 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2017.2675960, IEEE
Transactions on Smart Grid
IEEE TRANSACTIONS ON SMART GRID, MAY 2016 8
1949-3053 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2017.2675960, IEEE
Transactions on Smart Grid
IEEE TRANSACTIONS ON SMART GRID, MAY 2016 9
performance (i.e., detection rate and false alarm rate) as the TABLE I
centralized approach. Given above discussion, it is expected E LEMENTS OF THE INFORMATION MATRIX OF PHASE ANGLES GMRF
EMPLOYING THE PROPOSED CHORDAL EMBEDDING ML ESTIMATION
that the optimal thresholds (i.e., i s) obtained for the regional
detection problems in the decentralized case are smaller com- Nodes Case 1 Case 2 Nodes Case 1 Case 2
pared to those calculated for the centralized approach. 4-9 9.59 9.60 6-13 -4.22 -10.69
2-4 3.84 4.12 12-13 -17.12 -0.33
V. S IMULATION R ESULTS 5-6 -1.97 -2.13 6-12 -10.18 -0.15
In this section, we evaluate the efficiency of the proposed
false data injection methods through simulation studies. The
results are obtained using MATPOWER simulation package In the second set of simulations, the test system is divided
[22]. Power injections at different buses are considered to be into three regions as shown in Fig. 3. Using the topology of the
independent random variables with mean values equal to their entire grid, each region finds the structure of its reduced graph
nominal values and standard deviations equal to 20% of their by applying the Kron reduction method with respect to the
nominal values. Then, the phase angles of the buses are calcu- rest of the network. To evaluate the efficiency of the proposed
lated for each generated sample using MATPOWER package. decentralized ML estimation approach, the aforementioned
The performance of the proposed detection approaches are false data injection attack against the phase angle estimation at
evaluated through comprehensive simulation studies using the buses 12 and 13 is launched, and the obtained anomaly scores
IEEE 14-bus test system while the IEEE 118-bus system are calculated and shown in Fig. 5. As illustrated in this figure,
[23] is selected as a standard benchmark to demonstrates the third region triggers attack alarm and selects nodes 12 and
computational efficiency of the proposed approaches. 13 as possible compromised nodes while anomaly scores for
In the first step, the proposed chordal embedding ML nodes in other regions are very small and do not exceed the
estimation is implemented on the IEEE 14-bus system. The threshold value. Further, to show the capability of the proposed
triangulated graph of the phase angles Markov graph this decentralized approach to cope with inter-regional attacks, we
system is obtained by only adding six edges. A total of 1,200 simulate an attack in which the attacker is manipulating data
samples is considered for the statistical learning purposes. to compromise the estimate of phase angles at buses 10 and
Two scenarios are studied to demonstrate the capabilities of 11 (located in both second and third regions). The calculated
the proposed approach. In the first case, the grid is assumed anomaly scores shown in Fig. 6 confirm that both regions
to operate normally with no adversary present, while in the detect the launched attack and the compromised nodes are
second scenario, an adversary changes measurements at buses identified successfully since they have highest anomaly scores.
12, 13 and lines connected to them to manipulate the estimates Finally, it should be noted that there are some additional edges
of the phase angles with an attack size of 1 (The attack size between boundary nodes of regions that do not appear in the
refers to the expected value of the Euclidean norm of the centralized approach. Ignoring these edges (as in [12]) leads to
attack vector). Given the reference information matrix Qref , an error in the ML estimation that could result in false alarm
the anomaly scores calculated for both cases are shown in Fig. triggering.
4. Obtained scores demonstrate that dref ref
12 and d13 are much
greater than the threshold value = 0.02 and other nodes 1.8
anomaly scores, and hence the attack alarm is triggered and
Region 1
nodes 12 and 13 are selected as compromised nodes. 1.6
Region 2
Region 3
1.4
2 1.2
Anomaly score
1.4
0.6
1.2
0.4
1
0.2
0.8
0
0.6 2 4 6 8 10 12 14
Bus number
0.4
Fig. 4. Anomaly scores obtained for compromised and un-compromised A. Threshold Design and Performance Analysis
scenarios. To select a practical threshold value is a critical step for
an effective detection algorithm. To determine the false alarm
1949-3053 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2017.2675960, IEEE
Transactions on Smart Grid
IEEE TRANSACTIONS ON SMART GRID, MAY 2016 10
2.5 and the performances of the two methods are almost the same
2
even for the case where the regions are small. Also, in the case
of significant changes of the boundary nodes under the Kron
1.5
reduction, the threshold values could be tuned for each region
1 separately to achieve the same performance as the centralized
approach.
0.5
In order to evaluate the statistical performance of the
0
2 4 6 8 10 12 14
proposed approach to detect early stage false data injection
Bus number attacks, we perform a set of experiments, in which the adver-
sary starts to manipulate the measurements, and the number
Fig. 6. Anomaly scores obtained by the proposed decentralized approach of corrupted samples in a sample set starts to increase. For
when phase angles at nodes 10 and 11 are compromised.
the IEEE 14-bus network, we assume that the nodes 2-4
are under attack, and we evaluate the detection rate of the
proposed approach when only a portion of the samples is
rate, the information matrix is obtained 10,000 times for corrupted. To make the simulations more realistic, we restrict
different sample sets in the absence of attacks. Due to the the attack size to be less than 1 and the attacked nodes to
convexity of the problem and sufficient number of samples in be connected. Based on the simulation results shown in Fig.
the sample set, the results of the proposed ML estimation are 7, when the adversary starts to manipulate the measurements,
very accurate and lead to very small anomaly scores during the the sample covariance matrix starts to deviate from its normal
normal operation (i.e., when there is no attack). The simulation value. For a very small number of corrupted measurements,
results confirm that the nodes anomaly scores are always less the Markov graph of the power angles still follows the true
than 0.02 when there is no false data injection attack in the information matrix; however, as adversary continues tampering
measurement set. Hence, to prevent a false alarm, we select with the data, the discrepancy between the estimated and
the threshold value to be = 0.02, which results in a false reference information matrices increases, and hence the chance
alarm rate of less than 0.01%. of detecting the launched attack increases. As shown in Fig. 7,
In the next step, we perform comprehensive simulation with more than 140 corrupted samples, the proposed detection
studies to obtain the false data injection attack detection rate. method is almost successful to detect all different cases of
We consider a case, when the nodes 24 are under attack early stage attacks. The obtained results along with the fact
(with two constraints: (i) attacked nodes are connected, and that we have restricted the attack size to 1 (which makes
(ii) attack vector size is less than 1) and generate 10,000 attack the obtained detection rate conservative) concludes that the
scenarios with different attacked nodes, attack vector size and proposed ML estimation approach shows a slight performance
covariance matrix. Based on the simulation results with the improvement compared with the conditional covariance thresh-
threshold of 0.02, the proposed approach is able to detect old test (CMIT) [30] used in [12] to detect early stage attacks.
99.97% of launched attacks. Therefore, our simulation results
with = 0.02 show that the proposed approach has a very
100
high detection rate and at the same time very low false alarm
90
rate. Comparing the obtained threshold value with = 0.3
assigned in [12] confirms that the proposed detection approach 80
1949-3053 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2017.2675960, IEEE
Transactions on Smart Grid
IEEE TRANSACTIONS ON SMART GRID, MAY 2016 11
Region 1
TABLE II
Region 3
C OMPARISON OF THE COMPUTATIONAL COMPLEXITY BETWEEN
PROPOSED APPROACHES AND STANDARD ML ESTIMATION .
Region 6
1949-3053 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TSG.2017.2675960, IEEE
Transactions on Smart Grid
IEEE TRANSACTIONS ON SMART GRID, MAY 2016 12
[9] A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and Ramin Moslemi received his B.Sc. in electrical en-
K. Poolla Smart grid data integrity attacks, IEEE Trans. Smart Grid, gineering from K. N. Toosi University of Technology
vol. 4, no. 3, pp. 1244-1253, Sep. 2013. in 2008, and M.Sc. in electrical engineering form
[10] M. He and J. Zhang, A dependency graph approach for fault detection Iran University of Science and Technology in 2011.
and localization towards secure smart grid, IEEE Trans. Smart Grid, vol. He is currently working toward the Ph.D. degree
2, no. 2, pp. 342-351, Jun. 2011. with the Department of Electrical Engineering, Uni-
[11] H. Sedghi and E. Jonckheere, Statistical structure learning of smart grid versity of Georgia. His research interests include
for detection of false data injection, in Proc. IEEE Power Energy Soc. control of smart grids, microgrids energy manage-
Gen. Meeting (PES), Vancouver, BC, Canada, 2013, pp. 1-5. ment systems, smart grids data integrity, control and
[12] H. Sedghi and E. Jonckheere, Statistical structure learning to ensure operation of the behind the meter battery storages.
data integrity in smart grid, IEEE Trans. Smart Grid, vol. 6, no. 4, pp.
1924-1933, Jul. 2015.
[13] H. Rue and L. Held, Gaussian Markov random fields: theory and
applications. CRC Press, 2005.
[14] P. Zhang and S. T. Lee, Probabilistic load flow computation using
the method of combined cumulants and Gram-Charlier expansion, IEEE
Trans. Power Syst., vol. 19, no. 1, pp. 676-682, Feb. 2004.
[15] B. De Finetti, Theory of Probability. Wiley, 1975.
[16] H. Sedghi and E. Jonckheere, On conditional mutual information in
Gauss-Markov structured grids, in Information and Control in Networks
(Lecture Notes in Control and Information Sciences), vol. 450, G. Como,
B. Bernhardson, and A. Rantzer, Eds. Berlin, Germany: Springer-Verlag, Afshin Mesbahi received his B.Sc. degree in elec-
2014, pp. 277-297. trical engineering from Semnan University in 2007.
[17] J. Dahl, V. Roychowdhury, and L. Vandenberghe, Covariance selection He received his M.Sc. and Ph.D. degrees in electrical
for nonchordal graphs via chordal embedding, Optim. Methods Softw., engineering from Sharif University of Technology in
vol. 23, no. 4, pp. 501-520, 2008. 2009 and 2014 respectively.
[18] D. J. Rose, R. Tarjan, and G. Lueker, Algorithmic aspects of vertex Dr. Mesbahi is currently working as a Postdoctoral
elimination on graphs, SIAM J. computing, vol. 5, pp. 146-160, 1976. Research Associate with Rohani Lab at University
[19] A. Berry, J. Blair, and P. Heggernes, Maximum cardinality search for of Georgia. Previously, he was a Postdoctoral Re-
computing minimal triangulations, Graph theoretic concepts in computer search Associate with the Complex Systems Con-
science, Springer, Berlin Heidelberg, 2002. trol Laboratory at University of Georgia (November
[20] R. E. Tarjan and M. Yannakakis, Simple linear-time algorithms to test 2014-April 2016) and one of the Visiting Research
chordality of graphs, test acyclicity of hypergraphs, and selectively reduce Scholars with New Mexico State University (March 2013- June 2013 ) and
acyclic hypergraphs, SIAM Journal on Computing, vol. 13, no. 3, pp. University of LAquila in Italy (October 2012-February 2013).
566-579, 1984. His current research interests focus primarily on distributed coordination
[21] F. Dorfler and F. Bullo, Kron reduction of graphs with applications algorithms, matrix decomposition, power grids, stochastic modeling of epi-
to electrical networks, IEEE Trans. Circuits Syst. I, vol. 60, no. 1, pp. demiology, and generally lie in the area of modeling, analysis, and control of
150-163, 2013. large-scale networks.
[22] R. D. Zimmerman, C. E. Murillo-Sanchez, and R. J. Thomas, MAT-
POWER steady state operations, planning and analysis tools for power
systems research and education, IEEE Trans. Power Syst., vol. 26, no.
1, pp. 12-19, Feb. 2011.
[23] [Online] Available: http://www.ee.washington.edu/research/pstca/
[24] K. Jinsub, L. Tong, and R. J. Thomas, Dynamic attacks on power
systems economic dispatch, Proc. 48th Asilomar Conf., 2014, pp. 345-
349.
[25] T. Ide, A. C. Lozano, N. Abe, and Y. Liu, Proximity-based anomaly
detection using sparse structure learning, in Proc. SIAM Int. Conf. Data
Min., Philadelphia, PA, USA, 2009, pp. 97108.
[26] L. Xie, Y. Mo, and B. Sinopoli, Integrity data attacks in power market Javad Mohammadpour Velni received BS and
operations, IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 659-666, 2011. MS degrees in electrical engineering from Sharif
[27] J. Dopazo, O. Klitin, and A. Sasson, Stochastic load flows, IEEE University of Technology and University of Tehran,
Trans. Power App. Syst., vol. PAS-94, pp. 299309, 1975. Iran, respectively, and PhD degree in mechanical
[28] J. Mur-Amada and J. Salln-Arasanz, From turbine to wind farms engineering from University of Houston, TX. He
Technical requirements and spin-off products, in Phase Transitions and joined the University of Georgia as an assistant
Critical Phenomena, vol. 18, G. Krause, Ed. Rijeka, Croatia: In Tech, pp. professor of electrical engineering in Aug. 2012.
101132, 2011. Prior to that, he was with the University of Michigan,
[29] A. Schellenberg, W. Rosehart, and J. Aguado, Cumulant-based proba- where he worked in the naval architecture & marine
bilistic optimal power flow (P-OPF) with Gaussian and Gamma distribu- engineering dept. from Oct. 2011 to Jul. 2012. He
tions, IEEE Trans. Power Syst., vol. 20, no. 2, pp. 773-781, 2005. was also a Research Assistant Professor of mechan-
[30] A. Anandkumar, V. Tan, F. Huang, and A. Willsky, High-dimensional ical engineering at University of Houston from Oct. 2008 to Sep. 2011 and
Gaussian graphical model selection: Walk summability and local sepa- a Research Associate at the same institution from Jan. 2008 to Sep. 2008.
ration criterion, J. Mach. Learn. Res., vol. 13, no. 1, pp. 22932337, He has published over 100 articles in international journals and conference
Aug. 2012 proceedings, served in the editorial boards of ASME and IEEE conferences
on control systems and edited two books on control of large-scale systems
(published in 2010) and LPV systems modeling, control and applications
(published in 2012). His current research interests are in secure control of
cyber physical systems (and in particular, smart grids), coverage control of
heterogeneous multi-agent systems, and data-driven approaches for model
learning and control of complex distributed systems.
1949-3053 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.