Title | Two-Stage Optimization Framework for Detecting and Correcting Parameter Cyber-Attacks in Power System State Estimation |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Aljohani, Nader, Bretas, Arturo, Bretas, Newton G |
Conference Name | 2022 IEEE International Conference on Environment and Electrical Engineering and 2022 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe) |
Date Published | jun |
Keywords | composability, CPS modeling, Cyber-physical security, Databases, false data injections, Linear programming, Metrics, power grids, pubcrawl, real-time monitoring, resilience, Resiliency, security, simulation, Software, state estimation, two-stage optimization |
Abstract | One major tool of Energy Management Systems for monitoring the status of the power grid is State Estimation (SE). Since the results of state estimation are used within the energy management system, the security of the power system state estimation tool is most important. The research in this area is targeting detection of False Data Injection attacks on measurements. Though this aspect is crucial, SE also depends on database that are used to describe the relationship between measurements and systems' states. This paper presents a two-stage optimization framework to not only detect, but also correct cyber-attacks pertaining the measurements' model parameters used by the SE routine. In the first stage, an estimate of the line parameters ratios are obtained. In the second stage, the estimated ratios from stage I are used in a Bi-Level model for obtaining a final estimate of the measurements' model parameters. Hence, the presented framework does not only unify the detection and correction in a single optimization run, but also provide a monitoring scheme for the SE database that is typically considered static. In addition, in the two stages, linear programming framework is preserved. For validation, the IEEE 118 bus system is used for implementation. The results illustrate the effectiveness of the proposed model for detecting attacks in the database used in the state estimation process. |
DOI | 10.1109/EEEIC/ICPSEurope54979.2022.9854590 |
Citation Key | aljohani_two-stage_2022 |