False Data Injection Attacks On LFC Systems An AI-Based Detection and Countermeasure Strategy
False Data Injection Attacks On LFC Systems An AI-Based Detection and Countermeasure Strategy
Abstract— The development of integrated energy system has enable real-time monitoring, dynamic control, and information
promoted the development of the power system into the largest services through seamless integration of computing systems,
and most complex cyber-physical energy system, where the communication networks, and physical entities [4], [5], the
change in the openness of the load frequency control (LFC)
system has also increased its susceptibility to false data LFC system has evolved into an open system. Due to its
injection attacks (FDIAs). This paper porposes an artificial openness, the LFC system may be exposed to various potential
intelligence (AI) based detection and countermeasure strategy safety hazards, primarily because the phasor measurement
to protect LFC systems from FDIAs. First, The levenberg- unit (PMU) in the LFC system engages in high-speed, real-
marquarelt-back propagation (LM-BP) neural networks (NNs) is time data collection, and complex cryptography, which can
trained by collecting the historical data of frequency deviation,
power deviation of contact line, and active power load deviation. impact the PMUs’ performance. Applying complex cryptog-
Second, the output control signal of LM-BP NNs is tested against raphy to PMUs is not a feasible solution, rendering the LFC
the output of the system controller for residuals to determine system susceptible to cyber attacks [6].
whether has FDIAs. Furthermore, to resist the negative effects Malicious cyber attacks have the potential to go undetected
of FDIAs, the control signal calculated by the LM-BP NNs by the power system, leading to various negative conse-
will replace the traditional proportion integration differenti-
ation (PID) output. Finally, The advantages of the proposed quences, such as heightened generation costs, transmission
strategy are illustrated by the two interconnected power systems. line outages, and cascading failures [7], [8]. These attacks
come in different forms, including Denial of Service (DoS)
Index Terms— LFC system, LM-BP NNs, false data injection
attack, detection, countermeasure. attacks [9], topology attacks [10], and false data injection
attacks (FDIAs) [11]. Among these, FDIAs are considered
I. I NTRODUCTION particularly challenging as they pose a significant threat to
power system stability.
T HE system frequency is a significant metric for measuring
the power condition of the smart grid, as its stability
ensures the power system’s efficient operation and the delivery
Regarding FDIAs, extensive research has been dedicated
to detecting and devising countermeasure strategies for var-
of high-quality power to consumers [1]. The load frequency ious application scenarios in smart grids, including DC/AC
control (LFC) system, an integral element of power sys- transmission or estimation systems [12], [13], [14], [15],
tems’ energy management, plays a critical role in the normal distribution systems [16], and LFC systems [17]. In one
functioning of the power system [2], [3]. However, with the study [18], a greedy algorithm was developed to defend
advent of modern power cyber-physical systems (CPS), which against FDIAs through the strategic placement of secure PMU
equipment. Jiang et al. [19] monitored changes in measure-
Manuscript received 31 May 2023; revised 25 July 2023; ments and states between two time slots as a means of
accepted 16 August 2023. This work was supported in part by the
National Natural Science Foundation of China under Grant 61703095, Grant
detecting FDIAs. Additionally, some effective deep learning
61833005, Grant 61973078, and Grant 51977032; in part by the Natural and neural network methods were proposed for the detection
Science Foundation of Jiangsu Province of China under Grant BK20231416; and defense against FDIAs [16], [20], [21]. Furthermore,
and in part by the Zhishan Youth Scholar Program from Southeast University
under Grant 2242022R40042. This article was recommended by Associate
from the attackers’ perspective, FDIAs have been known to
Editor G. Chen. (Corresponding author: Jianqiang Hu.) exploit incomplete power grid information or reduced network
Zhixun Zhang is with the School of Cyber Science and Engineering, South- information to target power systems [10], [22], [23].
east University, Nanjing 210096, China (e-mail: [email protected]).
Jianqiang Hu is with the School of Mathematics, Southeast University, In the LFC system, Bad data detection (BDD) systems
Nanjing 211189, China (e-mail: [email protected]). are commonly employed as the primary defense against
Jianquan Lu is with the School of Mathematics, Southeast University, attacks [24]. However, crafty attackers may attempt to design
Nanjing 211189, China, and also with the School of Electronic Information
and Electrical Engineering, Chengdu University, Sichuan Chengdu 610106 FDIAs in a way that circumvents BDD detection by lever-
P.R. China (e-mail: [email protected]). aging the system’s structure and status [25]. Of all the cyber
Jinde Cao is with the School of Mathematics, Southeast University, Nanjing attacks on LFC systems, FDIAs significantly impact the stable
211189, China, and also with the Yonsei Frontier Laboratory, Yonsei Univer-
sity, Seoul 03722, South Korea (e-mail: [email protected]). operation of the smart grid. These attacks can disrupt the state
Jie Yu is with the School of Electrical Engineering, Southeast University, estimator and manipulate it to produce erroneous commands in
Nanjing 210096, China. the power system [26]. Furthermore, FDIAs exploit loopholes
Color versions of one or more figures in this article are available at
https://doi.org/10.1109/TCSI.2023.3307821. in the LFC system’s bad data detection process, enabling
Digital Object Identifier 10.1109/TCSI.2023.3307821 malicious tampering with state estimation results. This, in turn,
1549-8328 © 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: National Institute of Technology Andhra Pradesh. Downloaded on September 05,2023 at 09:54:41 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Authorized licensed use limited to: National Institute of Technology Andhra Pradesh. Downloaded on September 05,2023 at 09:54:41 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
ZHANG et al.: FDIAs ON LFC SYSTEMS: AN AI-BASED DETECTION AND COUNTERMEASURE STRATEGY 3
Authorized licensed use limited to: National Institute of Technology Andhra Pradesh. Downloaded on September 05,2023 at 09:54:41 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Authorized licensed use limited to: National Institute of Technology Andhra Pradesh. Downloaded on September 05,2023 at 09:54:41 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
ZHANG et al.: FDIAs ON LFC SYSTEMS: AN AI-BASED DETECTION AND COUNTERMEASURE STRATEGY 5
Authorized licensed use limited to: National Institute of Technology Andhra Pradesh. Downloaded on September 05,2023 at 09:54:41 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
TABLE I
PARAMETERS OF THE T WO I NTERCONNECTED LFC S YSTEMS
TABLE II
T HE D IVISION OF THE DATA S ET
TABLE III
PARAMETERS C ONFIGURATION OF LM-BP N EURAL N ETWORK
Authorized licensed use limited to: National Institute of Technology Andhra Pradesh. Downloaded on September 05,2023 at 09:54:41 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
ZHANG et al.: FDIAs ON LFC SYSTEMS: AN AI-BASED DETECTION AND COUNTERMEASURE STRATEGY 7
Fig. 12. P I D adjustment under the frequency attack in the 1th area. Fig. 16. 1Ptie under the second FDIAs experiment in 1th area.
Fig. 14. 1Ptie with proposed mechanism under the frequency attack in Fig. 18. 1 f with defense method under the second FDIAs experiment
the 1th area. in 1th area.
Authorized licensed use limited to: National Institute of Technology Andhra Pradesh. Downloaded on September 05,2023 at 09:54:41 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Authorized licensed use limited to: National Institute of Technology Andhra Pradesh. Downloaded on September 05,2023 at 09:54:41 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
ZHANG et al.: FDIAs ON LFC SYSTEMS: AN AI-BASED DETECTION AND COUNTERMEASURE STRATEGY 9
[26] H. M. Merrill and F. C. Schweppe, “Bad data suppression in power sys- Jianqiang Hu (Member, IEEE) received the
tem static state estimation,” IEEE Trans. Power App. Syst., vol. PAS-90, B.S. degree in mathematics and applied mathematics
no. 6, pp. 2718–2725, Nov. 1971. from the North China University of Water Resources
[27] H. Liu, Y. Ni, L. Xie, and K. H. Johansson, “How vulnerable is and Electric Power, Zhengzhou, China, in 2010, and
innovation-based remote state estimation: Fundamental limits under the M.S. degree in applied mathematics and the
linear attacks,” Automatica, vol. 136, Feb. 2022, Art. no. 110079. Ph.D. degree in control theory and control engi-
[28] G. Liang, J. Zhao, F. Luo, S. R. Weller, and Z. Y. Dong, “A review of neering from Southeast University, Nanjing, China,
false data injection attacks against modern power systems,” IEEE Trans. in 2013 and 2016, respectively. Currently, he is an
Smart Grid, vol. 8, no. 4, pp. 1630–1638, Jul. 2017. Associate Professor with the Jiangsu Provincial Key
[29] H. Zhang, W. Meng, J. Qi, X. Wang, and W. X. Zheng, “Distributed Laboratory of Networked Collective Intelligence and
load sharing under false data injection attack in an inverter-based the Department of System Science, School of Math-
microgrid,” IEEE Trans. Ind. Electron., vol. 66, no. 2, pp. 1543–1551, ematics, Southeast University, China. His current research interests include the
Feb. 2019. distributed optimization and control of multiagent systems, and demand-side
[30] C. Chen, M. Cui, X. Wang, K. Zhang, and S. Yin, “An investigation control in smart grids.
of coordinated attack on load frequency control,” IEEE Access, vol. 6,
pp. 30414–30423, 2018.
[31] A. M. Mohan, N. Meskin, and H. Mehrjerdi, “Covert attack in load Jianquan Lu (Senior Member, IEEE) received
frequency control of power systems,” in Proc. 6th IEEE Int. Energy the B.S. degree in mathematics from Zhejiang
Conf. (ENERGYCon), Sep. 2020, pp. 802–807. Normal University, Zhejiang, China, in 2003, the
[32] A. Abbaspour, A. Sargolzaei, and K. Yen, “Detection of false data M.S. degree in mathematics from Southeast Univer-
injection attack on load frequency control in distributed power sys- sity, Nanjing, China, in 2006, and the Ph.D. degree
tems,” in Proc. North Amer. Power Symp. (NAPS), Sep. 2017, in applied mathematics from the City University of
pp. 1–6. Hong Kong, Hong Kong, in 2009.
[33] M. Khalaf, A. Youssef, and E. El-Saadany, “A particle filter-based From 2010 to 2012, he was an Alexander von
approach for the detection of false data injection attacks on automatic Humboldt Research Fellow of PIK, Germany. He is
generation control systems,” in Proc. IEEE Electr. Power Energy Conf. currently a Professor with the Department of Sys-
(EPEC), Oct. 2018, pp. 1–6. tems Science, School of Mathematics, Southeast
[34] Ö. Aydın, Ş. Sönmez, and S. Ayasun, “Determination of stability delay University. His current research interests include collective behavior in
margins for multi-area load frequency control systems with incommen- complex dynamical networks and multi-agent systems, logical networks, and
surate time delays through eigenvalue tracing method,” Int. J. Electr. hybrid systems. He has published over 100 articles in refereed international
Power Energy Syst., vol. 137, May 2022, Art. no. 107821. journals. He was named as a Highly Cited Researcher by Clarivate Analytics
in 2018 for three consecutive years, and he was elected Most Cited Chinese
[35] A. S. Bretas, N. G. Bretas, and B. E. B. Carvalho, “Further contributions
Researchers by Elsevier (2014–2019). He is an Associate Editor of Neural
to smart grids cyber-physical security as a malicious data attack: Proof
Processing Letters, Journal of Franklin Institute, and Neural Computing and
and properties of the parameter error spreading out to the measurements
Applications, and a Guest Editor of Science China: Information Sciences and
and a relaxed correction model,” Int. J. Electr. Power Energy Syst.,
IET Control Theory and Applications.
vol. 104, pp. 43–51, Jan. 2019.
[36] W. Jin, Z. J. Li, L. S. Wei, and H. Zhen, “The improvements of
BP neural network learning algorithm,” in Proc. 5th Int. Conf. Sig-
Jinde Cao (Fellow, IEEE) received the B.S. degree
nal Process. (WCC-ICSP), 16th World Comput. Congr., vol. 3, 2000,
in mathematics/applied mathematics from Anhui
pp. 1647–1649.
Normal University, Wuhu, China, in 1986, the
[37] Y.-J. Sun, S. Zhang, C.-X. Miao, and J.-M. Li, “Improved BP neural M.S. degree in mathematics/applied mathematics
network for transformer fault diagnosis,” J. China Univ. Mining Technol., from Yunnan University, Kunming, China, in 1989,
vol. 17, no. 1, pp. 138–142, Mar. 2007. and the Ph.D. degree in mathematics/applied math-
[38] J. J. Moré, “The Levenberg–Marquardt algorithm: Implementation ematics from Sichuan University, Chengdu, China,
and theory,” in Numerical Analysis. Berlin, Germany: Springer, 1978, in 1998.
pp. 105–116. He was a Postdoctoral Research Fellow at the
[39] S. Yang and G. Yang, “Emotion recognition of EMG based on Department of Automation and Computer-Aided
improved L-M BP neural network and SVM,” J. Softw., vol. 6, no. 8, Engineering, Chinese University of Hong Kong,
pp. 1529–1536, Aug. 2011. Hong Kong, from 2001 to 2002. He is an Endowed Chair Professor, the Dean
[40] X. Li and Y. Wang, “Prediction model of biogas production for anaerobic of the School of Mathematics and the Director of the Research Center for
digestion process of food waste based on LM-BP neural network and Complex Systems and Network Sciences at Southeast University (SEU). He
particle swarm algorithm optimization,” in Proc. Chin. Autom. Congr. is also the Director of the National Center for Applied Mathematics at SEU-
(CAC), Oct. 2017, pp. 7629–7633. Jiangsu of China and the Director of the Jiangsu Provincial Key Laboratory
of Networked Collective Intelligence of China.
Prof. Cao was a recipient of the National Innovation Award of China,
the Obada Prize, and the Highly Cited Researcher Award in Engineering,
Computer Science, and Mathematics by Thomson Reuters/Clarivate Analytics.
He is elected as a member of Russian Academy of Sciences, a member of
the Academy of Europe, a member of Russian Academy of Engineering, a
member of the European Academy of Sciences and Arts, a member of the
Lithuanian Academy of Sciences, a fellow of African Academy of Sciences,
and a fellow of Pakistan Academy of Sciences.
Authorized licensed use limited to: National Institute of Technology Andhra Pradesh. Downloaded on September 05,2023 at 09:54:41 UTC from IEEE Xplore. Restrictions apply.