scholarly journals An Efficient Data-Driven False Data Injection Attack in Smart Grids

Author(s):  
Fuxi Wen ◽  
Wei Liu
Complexity ◽  
2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Huixin Zhong ◽  
Dajun Du ◽  
Chuanjiang Li ◽  
Xue Li

The paper investigates a novel sparse false data injection attack method in a smart grid (SG) with incomplete power network information. Most existing methods usually require the known complete power network information of SG. The main objective of this paper is to propose an effective sparse false data injection attack strategy under a more practical situation where attackers can only have incomplete power network information and limited attack resources to access the measurements. Firstly, according to the obtained measurements and power network information, some incomplete power network information is compensated by using the power flow equation approach. Then, the fault tolerance range of bad data detection (BDD) for the attack residual increment is estimated by calculating the detection threshold of the residual L2-norm test. Finally, an effective sparse imperfect strategy is proposed by converting the choice of measurements into a subset selection problem, which is solved by the locally regularized fast recursive (LRFR) algorithm to effectively improve the sparsity of attack vectors. Simulation results on an IEEE 30-bus system and a real distribution network system confirm the feasibility and effectiveness of the proposed new attack construction method.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Jiwei Tian ◽  
Buhong Wang ◽  
Xia Li

Recent researches on data-driven and low-sparsity data injection attacks have been presented, respectively. To combine the two main goals (data-driven and low-sparsity) of research, this paper presents a data-driven and low-sparsity false data injection attack strategy. The proposed attacking strategy (EID: Eliminate-Infer-Determine) is divided into three stages. In the first step, the intercepted data is preprocessed by sparse optimization techniques to eliminate the outliers. The recovered data is then exploited to learn about the system matrix based on the parallel factorization algorithm in the second step. In the third step, the approximated system matrix is applied for the design of sparse attack vector based on the convex optimization. The simulation results show that the EID attack strategy achieves a better performance than the improved ICA-based attack strategy in constructing perfect sparse attack vectors. What is more, data-driven implementation of the proposed strategy is also presented which ensures attack performance even without the prior information of the system.


Sign in / Sign up

Export Citation Format

Share Document