Not AvailableDC microgrid systems commonly feature a hierarchical control architecture with multiple interconnected distributed generation units (DGUs), requiring the integration of communication layers. This integration introduces a potential vulnerability, as malicious attackers can exploit the system by injecting false data, which could result in a shift in the operating point of the system or make the entire system unstable. To overcome this issue, this article proposes a data-driven unknown input observer (UIO) to detect and identify false data injection attacks (FDIAs) in the system. The data-driven UIOs are designed using only historical input/output data, which can be collected through simulations or experimental results. The developed UIOs do not require knowledge of the microgrid parameters. The proposed data-driven UIOs are then validated through Simulink and hardware-in-the-loop real-time simulation case studies to detect FDIAs in the secondary control of dc microgrids. The results show that the proposed observers can effectively detect and localize FDIAs in the communication links of the system.
more »
« less
An Ergodic CuSum Algorithm for False Data Injection Attacks Detection in DC Microgrids
DC microgrids have widely adopted hierarchical control architecture through distributed generation units (DGUs) to enhance reliability and scalability. However, this makes the system vulnerable to false data injection attacks (FDIAs), which can disrupt system stability or shift the operating point. While observers are commonly used to detect FDIAs, some FDIAs can be stealthy, or observers lack sufficient sensitivity for reliable identification. To address this, we propose a quickest change detection (QCD) method based on an unknown input observer (UIO) estimation error model to detect the FDIAs that are stealthy to the UIOs. The Ergodic CuSum algorithm is designed and can be efficiently updated using estimation error observations. The approach is validated through Simulink and real-time simulations.
more »
« less
- Award ID(s):
- 2339434
- PAR ID:
- 10663027
- Publisher / Repository:
- IEEE
- Date Published:
- Page Range / eLocation ID:
- 1 to 7
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
A composite detection technique against stealthy data manipulations is developed in this paper for distribution networks that are low observable. Attack detection strategies typically rely on state estimation which becomes challenging when limited measurements are available. In this paper, a modified matrix completion approach provides estimates of the system state and its error variances for the locations in the network where measurements are unavailable. Using the error statistics and their corresponding state estimates, bad data detection can be carried out using the chi-squared test. The proposed approach employs a moving target defence strategy (MTD) where the network parameters are perturbed through distributed flexible AC transmission system (D-FACTS) devices such that stealthy data manipulation attacks can be exposed in the form of bad data. Thus, the bad data detection approach developed in this paper can detect stealthy attacks using the MTD strategy. This technique is implemented on 37-bus and 123-bus three-phase unbalanced distribution networks to demonstrate the attack detection accuracy even for a low observable system.more » « less
-
This work is to present a learning observer-based method for simultaneous detection and estimation of false data injection attacks (FDIAs) to the cyber-physical battery systems. The original battery system in a state-space formulation is transformed into two separate subsystems: one contains both disturbances and the FDIAs and the second one is free from disturbances but subject to FDIAs. A learning observer is then designed for the second subsystem such that the FDIA signals can be estimated and further detected without being affected by the disturbances. This makes the proposed learning observer-based detection and estimation method is robust to disturbances and false declaration of FDIAs can be avoided. Another advantage of the proposed method is that the computing load is low because of the design of a reduced-order learning observer. With a three-cell battery string, a simulation study is employed to verify the effectiveness of proposed detection and estimation method for the FDIAs.more » « less
-
Finding collision-free paths is crucial for autonomous multi-robots (AMRs) to complete assigned missions, ranging from search operations to military tasks. To achieve this, AMRs rely on collaborative collision avoidance algorithms. Unfortunately, the robustness of these algorithms against false data injection attacks (FDIAs) remains unexplored. In this paper, we introduce Raven, a tool to identify effective and stealthy semantic attacks (eg, herding). Effective attacks minimize positional displacement and the number of false data injections by using temporal logic and stochastic optimization techniques. Stealthy attacks remain within sensor noise ranges and maintain spatiotemporal consistency. We evaluate Raven against two state-of-the-art collision avoidance algorithms, ORCA and GLAS. Our results show that a single false data injection impacts multi-robot systems by causing position deviation or even collisions. We evaluate Raven on three testbeds–a numerical simulator, a high-fidelity simulator, and Crazyflie drones. Our results reveal five design flaws in these algorithms and underscore the importance of developing robust defenses against FDIAs. Finally, we propose countermeasures to mitigate the attacks we have uncovered.more » « less
-
Optimal Power Flow (OPF) is a crucial part of the Energy Management System (EMS) as it determines individual generator outputs that minimize generation cost while satisfying transmission, generation, and system level operating constraints. OPF relies on a core EMS routine, namely state estimation, which computes system states, principally bus voltages/phase angles at the buses. However, state estimation is vulnerable to false data injection attacks in which an adversary can alter certain measurements to corrupt the estimator's solution without being detected. It is also shown that a stealthy attack on state estimation can increase the OPF cost. However, the impact of stealthy attacks on the economic and secure operation of the system cannot be comprehensively analyzed due to the very large size of the attack space. In this paper, we present a hybrid framework that combines formal analytics with Simulink-based system modeling to investigate the feasibility of stealthy attacks and their influence on OPF in a time-efficient manner. The proposed approach is illustrated on synthetic case studies demonstrating the impact of stealthy attacks in different attack scenarios. We also evaluate the impact analysis time by running experiments on standard IEEE test cases and the results show significant scalability of the framework.more » « less
An official website of the United States government

