Fully Distributed Power System State Estimation Security: Attacks and Mitigation

Gyorgy Dan

KTH Royal Institute of Technology, Stockholm,


Résumé:

Abstract: State estimation plays an essential role in the monitoring and supervision of power systems. In today's power systems state estimation is typically done in a centralized or in a hierarchical way, but as power systems will be increasingly interconnected in the future smart grid, distributed state estimation will become an important alternative to centralized and hierarchical solutions. As the future smart grid may rely on distributed state estimation, it is essential to understand the potential vulnerabilities that distributed state estimation may have. In this talk, we outline the problem of distributed power system state estimation, and we describe some recent algorithms for solving the problem. We then show that an attacker that compromises the control center of a region in an interconnected power system can actually perform a denial of service attack against state-of-the-art distributed state estimation algorithms. As an effect the attacker can blind the operators of the entire system. As a solution to mitigate such a denial of service attack, we propose a fully distributed algorithm for attack detection. Furthermore, we propose a fully distributed algorithm that identifies the most likely attack location based on the individual regions' beliefs about the attack location. We use numerical results to illustrate the attack and the mitigation scheme on the IEEE 118 bus benchmark power system. Bio: György Dán is an associate professor at KTH Royal Institute of Technology, Stockholm, Sweden. He received the M.Sc. degree in computer engineering from the Budapest University of Technology and Economics, Hungary in 1999, the M.Sc. degree in business administration from the Corvinus University of Budapest, Hungary in 2003, and the Ph.D. in Telecommunications from KTH in 2006. He worked as a consultant in the field of access networks, streaming media and videoconferencing 1999-2001. He was a visiting researcher at the Swedish Institute of Computer Science in 2008, and a Fulbright research scholar at the Information Trust Institute at University of Illinois Urbana-Champaign in 2012-2013. He received the best paper award at IFIP/TC6 Networking 2008 and at IEEE P2P 2010, and the best student paper award at ITC 23 in 2011. His research interests include the design and analysis of content management systems, game theoretical models of networked systems, and cyber-physical system security in power systems.


[Gyorgy Dan]
KTH Royal Institute of Technology, Stockholm,