skip to main content

Title: Residual Saturation Based Kalman Filter for Smart Grid State Estimation Under Cyber Attacks
Most of the traditional state estimation algorithms are provided false alarm when there is attack. This paper proposes an attack-resilient algorithm where attack is automatically ignored, and the state estimation process is continuing which acts a grid-eye for monitoring whole power systems. After modeling the smart grid incorporating distributed energy resources, the smart sensors are deployed to gather measurement information where sensors are prone to attacks. Based on the noisy and cyber attack measurement information, the optimal state estimation algorithm is designed. When the attack is happened, the measurement residual error dynamic goes high and it can ignore using proposed saturation function. Moreover, the proposed saturation function is automatically computed in a dynamic way considering residual error and deigned parameters. Combing the aforementioned approaches, the Kalman filter algorithm is modified which is applied to the smart grid state estimation. The simulation results show that the proposed algorithm provides high estimation accuracy.
Authors:
; ;
Award ID(s):
1837472
Publication Date:
NSF-PAR ID:
10120569
Journal Name:
Proceedings of 9th IEEE International Conference on CYBER Technology in Automation, Control and Intelligent Systems (IEEE-CYBER 2019)
Sponsoring Org:
National Science Foundation
More Like this
  1. In the modern power system networks, grid observability has greatly increased due to the deployment of various metering technologies. Such technologies enhanced the real-time monitoring of the grid. The collection of observations are processed by the state estimator in which many applications have relied on. Traditionally, state estimation on power grids has been done considering a centralized architecture. With grid deregulation, and awareness of information privacy and security, much attention has been given to multi-area state estimation. Considering such, state-of-the-art solutions consider a weighted norm of residual measurement model, which might hinder masked gross errors contained in the null-space of the Jacobian matrix. Towards the solution of this, a distributed innovation-based model is presented. Measurement innovation is used towards error composition. The measurement error is an independent random variable, where the residual is not. Thus, the masked component is recovered through measurement innovation. Model solution is obtained through an Alternating Direction Method of Multipliers (ADMM), which requires minimal information communication. The presented framework is validated using the IEEE 14 and IEEE 118 bus systems. Easy-to-implement model, build-on the classical weighted norm of the residual solution, and without hard-to-design parameters highlight potential aspects towards real-life implementation.
  2. Recent advances in machine learning enable wider applications of prediction models in cyber-physical systems. Smart grids are increasingly using distributed sensor settings for distributed sensor fusion and information processing. Load forecasting systems use these sensors to predict future loads to incorporate into dynamic pricing of power and grid maintenance. However, these inference predictors are highly complex and thus vulnerable to adversarial attacks. Moreover, the adversarial attacks are synthetic norm-bounded modifications to a limited number of sensors that can greatly affect the accuracy of the overall predictor. It can be much cheaper and effective to incorporate elements of security and resilience at the earliest stages of design. In this paper, we demonstrate how to analyze the security and resilience of learning-based prediction models in power distribution networks by utilizing a domain-specific deep-learning and testing framework. This framework is developed using DeepForge and enables rapid design and analysis of attack scenarios against distributed smart meters in a power distribution network. It runs the attack simulations in the cloud backend. In addition to the predictor model, we have integrated an anomaly detector to detect adversarial attacks targeting the predictor. We formulate the stealthy adversarial attacks as an optimization problem to maximize prediction lossmore »while minimizing the required perturbations. Under the worst-case setting, where the attacker has full knowledge of both the predictor and the detector, an iterative attack method has been developed to solve for the adversarial perturbation. We demonstrate the framework capabilities using a GridLAB-D based power distribution network model and show how stealthy adversarial attacks can affect smart grid prediction systems even with a partial control of network.« less
  3. To promote energy-efficient operations in residential and office buildings, non-intrusive load monitoring (NILM) techniques have been proposed to infer the fine-grained power consumption and usage patterns of appliances from power-line measurement data. Fine-grained monitoring of everyday appliances (such as toasters and coffee makers) can not only promote energy-efficient building operations, but also provide unique insights into the context and activities of individuals. Current building-level NILM techniques are unable to identify the consumption characteristics of relatively low-load appliances, whereas smart-plug based solutions incur significant deployment and maintenance costs. In this paper, we investigate an intermediate architecture, where smart circuit breakers provide measurements of aggregate power consumption at room (or section) level granularity. We then investigate techniques to identify the usage and energy consumption of individual appliances from such measurements. We first develop a novel correlation-based approach called CBPA to identify individual appliances based on both their unique transient and steady-state power signatures. While promising, CBPA fails when the set of candidate appliances is too large. To further improve the accuracy of appliance level usage estimation, we then propose a hybrid system called AARPA, which uses mobile sensing to first infer high-level activities of daily living (ADLs), and then uses knowledge ofmore »such ADLs to effectively reduce the set of candidate appliances that potentially contribute to the aggregate readings at any point. We evaluate two variants of this algorithm, and show, using real-life data traces gathered from 10 domestic users, that our fusion of mobile and power-line sensing is very promising: it identified all devices that were used in each data trace, and it identified the usage duration and energy consumption of low-load consumer appliances with 87% accuracy.« less
  4. This paper focuses on the detection of cyber-attack on a communication channel and simultaneous radar health monitoring for a connected vehicle. A semi-autonomous adaptive cruise control (SA-ACC) vehicle is considered which has wireless communication with its immediately preceding vehicle to operate at small time-gap distances without creating string instability. However, the reliability of the wireless connectivity is critical for ensuring safe vehicle operation. The presence of two unknown inputs related to both sensor failure and cyber-attack seemingly poses a difficult estimation challenge. The dynamic system is first represented in descriptor system form. An observer with estimation error dynamics decoupled from the cyber-attack signal is developed. The performance of the observer is extensively evaluated in simulations. The estimation system is able to detect either a fault in the velocity measurement radar channel or a cyber-attack. Also, the proposed observer-based controller achieves resilient SA-ACC system under the cyber-attacks. The fundamental estimation algorithm developed herein can be extended in the future to enable cyber-attack detection in more complex connected vehicle architectures.
  5. https://arxiv.org/abs/2007.14539 As in standard linear regression, in truncated linear regression, we are given access to observations (Ai,yi)i whose dependent variable equals yi=ATi⋅x∗+ηi, where x∗ is some fixed unknown vector of interest and ηi is independent noise; except we are only given an observation if its dependent variable yi lies in some "truncation set" S⊂ℝ. The goal is to recover x∗ under some favorable conditions on the Ai's and the noise distribution. We prove that there exists a computationally and statistically efficient method for recovering k-sparse n-dimensional vectors x∗ from m truncated samples, which attains an optimal ℓ2 reconstruction error of O((klogn)/m‾‾‾‾‾‾‾‾‾‾√). As a corollary, our guarantees imply a computationally efficient and information-theoretically optimal algorithm for compressed sensing with truncation, which may arise from measurement saturation effects. Our result follows from a statistical and computational analysis of the Stochastic Gradient Descent (SGD) algorithm for solving a natural adaptation of the LASSO optimization problem that accommodates truncation. This generalizes the works of both: (1) [Daskalakis et al. 2018], where no regularization is needed due to the low-dimensionality of the data, and (2) [Wainright 2009], where the objective function is simple due to the absence of truncation. In order to deal with bothmore »truncation and high-dimensionality at the same time, we develop new techniques that not only generalize the existing ones but we believe are of independent interest.« less