-
CiteScore
2.31
Impact Factor
Chinese Journal of Information Fusion, 2024, Volume 1, Issue 3: 212-225

Free to Read | Research Article | 30 December 2024
1 Key Laboratory of Smart Manufacturing in Energy Chemical Process, Ministry of Education, East China University of Science and Technology, Shanghai 200237, China
* Corresponding Author: Wen Yang, [email protected]
Received: 11 November 2024, Accepted: 29 December 2024, Published: 30 December 2024  
Abstract
Cyber security in power systems has become increasingly critical with the rise of network attacks such as Denial-of-Service (DoS) attacks and False Data Injection (FDI) attacks. These threats can severely compromise the integrity and reliability of state estimation, which are fundamental to the operation and control of power systems. In this manuscript, an estimation algorithm based on the fusion of information from multiple estimators is proposed to ensure that state estimation at critical buses can function properly in case of attacks. Our approach leverages a network of estimators that can dynamically adjust to maintain system stability and accuracy. Furthermore, a new detector is adopted based on Kullback-Leibler divergence to detect linear FDI attacks. To address stealthy attacks that may evade detection, we propose a novel weighting scheme that reduces the impact of attacks on estimation results. Numerical experiments demonstrate the effectiveness and accuracy of our proposed estimation algorithm under cyber attacks.

Graphical Abstract
Robust Distributed State Estimation in Power Systems: A Multi-Estimator Data Fusion Approach to Counteract Cyber-Attacks

Keywords
state estimation
smart grid
data fusion
Kullback-Leibler divergence
cyber attack

Funding
This work was supported in part by the National Key R&D Program of China under Grant 2023YFF1204805; in part by the National Natural Science Foundation of China under Grant 62336005, Grant 62122026; in part by the projects sponsored by the Programme of Introducing Talents of Discipline to Universities (the 111 Project) under Grant B17017; and in part by the Shuguang Program supported by Shanghai Education Development Foundation and Shanghai Municipal Education Commission.

Cite This Article
APA Style
Jin, S., Yang, W., Yuan, H., Ding, W., Wu, H. & Wang, J. (2024). Robust Distributed State Estimation in Power Systems: A Multi-Estimator Data Fusion Approach to Counteract Cyber-Attacks. Chinese Journal of Information Fusion, 1(3), 212–225. https://doi.org/10.62762/CJIF.2024.740709

References
  1. Abdelkader, S., Amissah, J., Kinga, S., Mugerwa, G., Emmanuel, E., Mansour, D. E. A., ... & Prokop, L. (2024). Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks. Results in engineering, 102647.
    [Google Scholar]
  2. Li, F., Yan, X., Xie, Y., Sang, Z., & Yuan, X. (2019, October). A review of cyber-attack methods in cyber-physical power system. In 2019 IEEE 8th International Conference on Advanced Power System Automation and Protection (APAP) (pp. 1335-1339). IEEE.
    [Google Scholar]
  3. Irfan, M., Sadighian, A., Tanveer, A., Al-Naimi, S. J., & Oligeri, G. (2023). False data injection attacks in smart grids: State of the art and way forward. arXiv preprint arXiv:2308.10268.
    [Google Scholar]
  4. Reda, H. T., Anwar, A., & Mahmood, A. (2022). Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts. Renewable and Sustainable Energy Reviews, 163, 112423.
    [Google Scholar]
  5. Musleh, A. S., Chen, G., & Dong, Z. Y. (2019). A survey on the detection algorithms for false data injection attacks in smart grids. IEEE Transactions on Smart Grid, 11(3), 2218-2234.
    [Google Scholar]
  6. Husnoo, M. A., Anwar, A., Hosseinzadeh, N., Islam, S. N., Mahmood, A. N., & Doss, R. (2023). False data injection threats in active distribution systems: A comprehensive survey. Future Generation Computer Systems, 140, 344-364.
    [Google Scholar]
  7. Salehghaffari, H., & Khorrami, F. (2018, February). Resilient power grid state estimation under false data injection attacks. In 2018 IEEE Power \& Energy Society Innovative Smart Grid Technologies Conference (ISGT) (pp. 1-5). IEEE.
    [Google Scholar]
  8. Jafari, M., Rahman, M. A., & Paudyal, S. (2022). Optimal false data injection attacks against power system frequency stability. IEEE Transactions on Smart Grid, 14(2), 1276-1288.
    [Google Scholar]
  9. Tian, M., Dong, Z., & Wang, X. (2021). Analysis of false data injection attacks in power systems: A dynamic Bayesian game-theoretic approach. ISA transactions, 115, 108-123.
    [Google Scholar]
  10. Zhang, Z., Deng, R., Cheng, P., & Chow, M. Y. (2021). Strategic protection against FDI attacks with moving target defense in power grids. IEEE Transactions on Control of Network Systems, 9(1), 245-256.
    [Google Scholar]
  11. Liu, B., & Wu, H. (2020). Optimal D-FACTS placement in moving target defense against false data injection attacks. IEEE Transactions on Smart Grid, 11(5), 4345-4357.
    [Google Scholar]
  12. Xu, W., Jaimoukha, I. M., & Teng, F. (2022). Robust moving target defence against false data injection attacks in power grids. IEEE Transactions on Information Forensics and Security, 18, 29-40.
    [Google Scholar]
  13. Liu, M., Zhao, C., Zhang, Z., & Deng, R. (2022). Explicit analysis on effectiveness and hiddenness of moving target defense in AC power systems. IEEE Transactions on Power Systems, 37(6), 4732-4746.
    [Google Scholar]
  14. Lakshminarayana, S., Belmega, E. V., & Poor, H. V. (2021). Moving-target defense against cyber-physical attacks in power grids via game theory. IEEE Transactions on Smart Grid, 12(6), 5244-5257.
    [Google Scholar]
  15. Shafei, H., Farhangi, M., Aguilera, R. P., & Alhelou, H. H. (2024). A Novel Cyber-Attack Detection and Mitigation for Coupled Power and Information Networks in Microgrids Using Distributed Sliding Mode Unknown Input Observer. IEEE Transactions on Smart Grid.
    [Google Scholar]
  16. Garza, L., & Mandal, P. (2023, October). Detection and Classification of False Data Injection Attacks in Power Grids Using Machine Learning and Hyperparameter Optimization Methods. In 2023 IEEE Industry Applications Society Annual Meeting (IAS) (pp. 1-8). IEEE.
    [Google Scholar]
  17. Kumar, A., Saxena, N., & Choi, B. J. (2021, January). Machine learning algorithm for detection of false data injection attack in power system. In 2021 International Conference on Information Networking (ICOIN) (pp. 385-390). IEEE.
    [Google Scholar]
  18. Tebianian, H., & Jeyasurya, B. (2013, August). Dynamic state estimation in power systems using Kalman filters. In 2013 IEEE electrical power & energy conference (pp. 1-5). IEEE.
    [Google Scholar]
  19. Li, C., & Zhang, J. (2023, October). Dynamic State Estimation of Power Systems Based on Extended Kalman Particle Filter. In 2023 3rd International Conference on Intelligent Power and Systems (ICIPS) (pp. 638-644). IEEE.
    [Google Scholar]
  20. Zhu, M., Liu, H., & Bi, T. (2021, July). Dynamic State Estimation of Power System Based on a Robust H-infinity Cubature Kalman Filter. In 2021 IEEE Power & Energy Society General Meeting (PESGM) (pp. 1-5). IEEE.
    [Google Scholar]
  21. Zhao, J., & Mili, L. (2017). Robust unscented Kalman filter for power system dynamic state estimation with unknown noise statistics. IEEE Transactions on Smart Grid, 10(2), 1215-1224.
    [Google Scholar]
  22. Zhang, Z., & Feng, X. (2023, July). Performance Analysis of Chi-square Detection for False Data Injection Attack. In 2023 3rd International Conference on Electrical Engineering and Mechatronics Technology (ICEEMT) (pp. 560-564). IEEE.
    [Google Scholar]
  23. Ye, D., & Wang, J. (2019, May). False data injection attack design in multi-sensor systems based on KL divergence theory. In 2019 IEEE 8th Data Driven Control and Learning Systems Conference (DDCLS) (pp. 333-337). IEEE.
    [Google Scholar]
  24. Guo, Z., Shi, D., Johansson, K. H., & Shi, L. (2018). Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica, 89, 117-124.
    [Google Scholar]
  25. Hu, K., Li, L., Tao, X., Velásquez, J. D., & Delaney, P. (2023). Information fusion in crime event analysis: A decade survey on data, features and models. Information Fusion, 100, 101904.
    [Google Scholar]
  26. Li, T., Liang, H., Xiao, B., Pan, Q., & He, Y. (2023). Finite mixture modeling in time series: A survey of Bayesian filters and fusion approaches. Information Fusion, 98, 101827.
    [Google Scholar]
  27. Hu, L., Zhang, J., Zhang, J., Cheng, S., Wang, Y., Zhang, W., & Yu, N. (2025). Security analysis and adaptive false data injection against multi-sensor fusion localization for autonomous driving. Information Fusion, 117, 102822.
    [Google Scholar]
  28. Bhalla, V., & Prajapat, G. P. (2024, June). Proficiency Analysis of Unscented Kalman Filter for Bad Data Detection During State Estimation. In 2024 IEEE 3rd International Conference on Electrical Power and Energy Systems (ICEPES) (pp. 1-5). IEEE.
    [Google Scholar]
  29. Yang, Q., Min, R., An, D., Yu, W., & Yang, X. (2016, March). Towards optimal pmu placement against data integrity attacks in smart grid. In 2016 Annual Conference on Information Science and Systems (CISS) (pp. 54-58). IEEE.
    [Google Scholar]
  30. Hao, J., & Zhang, Y. (2020, December). Consensus Kalman filtering for sensor networks based on FDI attack detection. In 2020 16th International Conference on Control, Automation, Robotics and Vision (ICARCV) (pp. 160-165). IEEE.
    [Google Scholar]
  31. Li, T., Song, Y., Song, E., & Fan, H. (2024). Arithmetic average density fusion-Part I: Some statistic and information-theoretic results. Information Fusion, 104, 102199.
    [Google Scholar]
  32. Wang, G., Zhu, Z., Yang, C., Ma, L., Dai, W., & Chen, X. (2024). Distributed Multi-Kernel Maximum Correntropy State-Constrained Kalman Filter Under Deception Attacks. IEEE Transactions on Network Science and Engineering.
    [Google Scholar]
  33. Li, T., Corchado, J. M., & Sun, S. (2018). Partial consensus and conservative fusion of Gaussian mixtures for distributed PHD fusion. IEEE Transactions on Aerospace and Electronic Systems, 55(5), 2150-2163.
    [Google Scholar]
  34. Yang, H., Li, T., Yan, J., & Elvira, V. (2024). Hierarchical Average Fusion With GM-PHD Filters Against FDI and DoS Attacks. IEEE Signal Processing Letters.
    [Google Scholar]
  35. Bi, T., Liu, H., Zhang, D., & Yang, Q. (2012, July). The PMU dynamic performance evaluation and the comparison of PMU standards. In 2012 IEEE Power and Energy Society General Meeting (pp. 1-5). IEEE.
    [Google Scholar]
  36. IEEE. (2013). IEEE guide for synchronization, calibration, testing, and installation of phasor measurement units (PMUs) for power system protection and control (IEEE Std C37.242-2013, pp. 1–107).
    [Google Scholar]

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 286
PDF Downloads: 61

Publisher's Note
IECE stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions
IECE or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
Chinese Journal of Information Fusion

Chinese Journal of Information Fusion

ISSN: 2998-3371 (Online) | ISSN: 2998-3363 (Print)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/iece/

Copyright © 2024 Institute of Emerging and Computer Engineers Inc.