Vulnerability assessment of large-scale power systems to false data injection attacks

Zhigang Chu, Jiazi Zhang, Oliver Kosut, Lalitha Sankar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

This paper studies the vulnerability of large-scale power systems to false data injection (FDI) attacks through their physical consequences. An attacker-defender bi-level linear program (ADBLP) can be used to determine the worst-case consequences of FDI attacks aiming to maximize the physical power flow on a target line. This ADBLP can be transformed into a single-level mixed-integer linear program (MILP), but it is numerically intractable for power systems with a large number of buses and branches. In this paper, a modified Benders' decomposition algorithm is proposed to solve the ADBLP on large power systems without converting it to the MILP. Of more general interest, the proposed algorithm can be used to solve any ADBLP. Vulnerability of the IEEE 118-bus system and the Polish system with 2383 buses to FDI attacks is assessed using the proposed algorithm.

Original languageEnglish (US)
Title of host publication2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728161273
DOIs
StatePublished - Nov 11 2020
Event2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2020 - Tempe, United States
Duration: Nov 11 2020Nov 13 2020

Publication series

Name2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2020

Conference

Conference2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2020
Country/TerritoryUnited States
CityTempe
Period11/11/2011/13/20

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Energy Engineering and Power Technology
  • Electrical and Electronic Engineering
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Vulnerability assessment of large-scale power systems to false data injection attacks'. Together they form a unique fingerprint.

Cite this