A Descriptor System Design Framework for False Data Injection Attack Toward Power Systems*

Aibing Qiu,Zhou Ding,Shengfeng Wang
DOI: https://doi.org/10.1016/j.epsr.2020.106932
IF: 3.818
2021-01-01
Electric Power Systems Research
Abstract:In this paper, a false data injection attack scheme is developed for power systems in the framework of descriptor system. On account of generators dynamics and static power flows, a descriptor system model for power systems is firstly established. Then, a necessary and sufficient condition for perfect attack is given in terms of unstable eigenvector by the eigen-decomposition of system matrices. Based on this, a false data injection attack scheme, which can pass not only the observer detection but also the measurement limit detection, is presented to destabilize the power systems. The proposed scheme has the advantages of concealment and implementation simplicity when compared to the existing static attack counterpart. Additionally, the obtained results can help to understand the weakness of power systems and establish some more secure protective measures. Simulations on the IEEE 9 bus and 14 bus power systems demonstrate the superiority and effectiveness of the proposed method. ABSTRACT In this paper, a false data injection attack scheme is developed for power systems in the framework of descriptor system. On account of generators dynamics and static power flows, a descriptor system model for power systems is firstly established. Then, a necessary and sufficient condition for perfect attack is given in terms of unstable eigenvector by the eigen-decomposition of system matrices. Based on this, a false data injection attack scheme, which can pass not only the observer detection but also the measurement limit detection, is presented to destabilize the power systems. The proposed scheme has the advantages of concealment and implementation simplicity when compared to the existing static attack counterpart. Additionally, the obtained results can help to understand the weakness of power systems and establish some more secure protective measures. Simulations on the IEEE 9 bus and 14 bus power systems demonstrate the superiority and effectiveness of the proposed method.
What problem does this paper attempt to address?