Distributed Detection and Isolation of Topology Attacks in Power Networks
2012 (English)In: HiCoNS'12 - Proceedings of the 1st ACM International Conference on High Confidence Networked Systems, Association for Computing Machinery (ACM), 2012, 65-71 p.Conference paper (Refereed)
This paper addresses the issue of detecting and isolating topology attacks in power networks. A topology attack, unlike a data attack and power injection attack, alters the physical dynamics of the power network by removing bus interconnections. These attacks can manifest as both cyber and physical attacks. A physical topology attack occurs when a bus interconnection is physically broken, while a cyber topology attack occurs when incorrect information about the network topology is transmitted to the system estimator and incorporated as the truth. To detect topology attacks, a stochastic hypothesis testing problem is considered assuming noisy measurements are obtained by periodically sampling a dynamic process described by the networked swing equation dynamics, modified to assume stochastic power injections. A centralized approach to network topology detection and isolation is introduced as a two-part scheme consisting of topology detection followed by topology isolation, assuming a topology attack exists. To address the complexity issues arising with performing centralized detection in large-scale power networks, a decentralized approach is presented that uses only local measurements to detect the presence of a topology attack. Simulation results illustrate that both the centralized and decentralized approaches accurately detect and isolate topology attacks.
Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2012. 65-71 p.
Distributed hypothesis testing, Distributed fault detection, Power networks
IdentifiersURN: urn:nbn:se:kth:diva-96746DOI: 10.1145/2185505.2185516ISI: 000304070900008ScopusID: 2-s2.0-84860619383ISBN: 978-1-4503-1263-9OAI: oai:DiVA.org:kth-96746DiVA: diva2:533249
2012 1st ACM International Conference on High Confidence Networked Systems, HiCoNS'12; Beijing; 17 April 2012 through 19 April 2012
FunderICT - The Next Generation
QC 201206132012-06-132012-06-112013-09-11Bibliographically approved