Optimal Power Flow: Closing the Loop over Corrupted Data
2012 (English)In: 2012 American Control Conference (ACC), IEEE Computer Society, 2012, 3534-3540 p.Conference paper (Refereed)
Recently the power system state estimator was shown to be vulnerable to malicious deception attacks on the measurements, resulting in biased estimates. In this work we analyze the behavior of the Optimal Power Flow (OPF) algorithm in the presence of such maliciously biased estimates and the resulting consequences to the system operator. In particular, we characterize the set of attacks that may lead the operator to apply the erroneous OPF recommendation. Such characterization is used to improve a previously proposed security index by also considering the attack impact, which may be used for allocation and prioritization of protective measures. Additionally, we propose an analytical expression for the optimal solution of a simplified OPF problem with corrupted measurements. A small analytical example is discussed to illustrate and motivate our contributions.
Place, publisher, year, edition, pages
IEEE Computer Society, 2012. 3534-3540 p.
, Proceedings of the American Control Conference, ISSN 0743-1619
Power Systems, Optimal Power Flow, Data Corruption, Security
Electrical Engineering, Electronic Engineering, Information Engineering
IdentifiersURN: urn:nbn:se:kth:diva-103332ISI: 000310776203134ScopusID: 2-s2.0-84869427279ISBN: 978-1-4673-2102-0OAI: oai:DiVA.org:kth-103332DiVA: diva2:559767
American Control Conference (ACC), Montreal, QC, Canada, June 27-29, 2012
FunderSwedish Research Council, 2007-6350Swedish Research Council, 2009-4565Knut and Alice Wallenberg FoundationICT - The Next Generation
QC 201211132012-11-132012-10-102013-04-15Bibliographically approved