Next Article in Journal
Textronic Glove Translating Polish Sign Language
Next Article in Special Issue
The Use of Computational Geometry Techniques to Resolve the Issues of Coverage and Connectivity in Wireless Sensor Networks
Previous Article in Journal
Exploratory Research on Sweetness Perception: Decision Trees to Study Electroencephalographic Data and Its Relationship with the Explicit Response to Sweet Odor, Taste, and Flavor
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment

1
College of Electronic Engineering, Chengdu University of Information Technology, Chengdu 610225, China
2
School of Aeronautics and Astronautics, University of Electronic Science and Technology of China, Chengdu 611731, China
3
CMA Key Laboratory of Atmospheric Sounding, Chengdu 610225, China
4
College of Technological Innovation, Zayed University, Abu Dhabi 144534, United Arab Emirates
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(18), 6789; https://doi.org/10.3390/s22186789
Submission received: 5 July 2022 / Revised: 27 August 2022 / Accepted: 29 August 2022 / Published: 8 September 2022
(This article belongs to the Special Issue Security and Privacy in Wireless Communications and Networking)

Abstract

:
With the wide application of advanced communication and information technology, false data injection attack (FDIA) has become one of the significant potential threats to the security of smart grid. Malicious attack detection is the primary task of defense. Therefore, this paper proposes a method of FDIA detection based on vector auto-regression (VAR), aiming to improve safe operation and reliable power supply in smart grid applications. The proposed method is characterized by incorporating with VAR model and measurement residual analysis based on infinite norm and 2-norm to achieve the FDIA detection under the edge computing architecture, where the VAR model is used to make a short-term prediction of FDIA, and the infinite norm and 2-norm are utilized to generate the classification detector. To assess the performance of the proposed method, we conducted experiments by the IEEE 14-bus system power grid model. The experimental results demonstrate that the method based on VAR model has a better detection of FDIA compared to the method based on auto-regressive (AR) model.

1. Introduction

The stable and reliable operation of power system is very important for all walks of life [1,2,3,4]. The function of power system state estimation is to estimate the current operation state of power system according to various measurement information of power system. Accurate power system state estimation is conducive to the reliable operation and real-time control of power system [5,6,7]. It enables the management system to perform various important control and planning tasks, such as emergency analysis, voltage stability studies and optimized power flow analysis [8]. Therefore, power system security is extremely important.
With the development of smart grid, the efficiency and reliability of power system are gradually improving, at the same time, the power system is also facing the potential risk of network attack. In the past twenty years, the power grid has been subjected to major security threats several times [9,10,11,12]. On 25 January 2016, the Israeli power system was subjected to a massive cyber attack intrusion due to the unintentional execution of malicious code by staff members, triggering the urgent removal of a large number of power industrial control computers from operational status [13]. In June 2018, hackers successfully attacked a French company, named as Ingerop, and successfully stole confidential documents related to the nuclear power plant, which made the nuclear power plant and its staff expose to the threat of terrorist plots [11]. In September 2020, Pakistan’s largest power supplier, K-Electric, was attacked by blackmail software and stolen unencrypted files. This attack directly led to the interruption of billing and online services, resulting in the supplier’s customers being unable to access the online resources of their accounts [12].
For resisting network attacks, researchers have proposed a lot of security schemes, such as firewalls and conventional intrusion detection systems [14,15,16,17], false data detection system [18]. In the false data attacks, there are mainly two categories of research on constructing false data for injection attack [19]: one is that the attacker previously obtains the network topology information of the target for attack; the other is that the attacker has no the topology information of the target for attack in advance, but constructs the attack vector with the only intercepted measurements information.
For the first category of attack methods, one of the representative methods is the false data injection attack (FDIA) method proposed by Liu against power grid state estimation [20]. The attacker distorts the measurement data collected by the supervisory control and data acquisition (SCADA) system. That is, the attacker tampers with the measurement data collected by the intelligent terminal, which would destroy the data availability and integrity in power networks [21,22]. In addition, the literature [23,24] introduce an in-depth study on how to attack while the attacker has information about the target of the attack. However, the information of the target to be attacked is usually in a confidential state, so the possibility of obtaining this information is small.
As for the second type of attack methods, the representative literatures are [25,26], in which they present the singular value decomposition (SVD) and the principal component analysis (PCA) based attack vector construction methods, respectively. Compared with the first category of attacks, the second category of attacks is more feasible and poses a greater threat to the smart grid system. Nevertheless, the efforts made specifically for the smart grid are very limited against the network security.
In addition, due to the proximity of the attacker to the endpoints, malicious attacks on the terminals will be easier to launch. If the attackers know the topology of the smart grid, they are easy to construct the FDIA vector without changing the measurement residuals and thus affect the overall system state estimation. So, detection and identification of bad data is very important for the computing center [27,28,29]. In the actual system, the measurement data of the terminal is collected from the field and then transmitted to the control center. Unfortunately, the attacker’s FDIA behavior may be ignored by the bad data detection (BDD) system. This will pose a threat to the state estimation of the smart grid and affect the smart grid decisions [30].
Previous works have introduced several methods to detect false data injection attacks. For instance, Liu et al. proposed a false data detection mechanism based on the separation of nominal power grid states and anomalies [31]. Li et al. presented a method of detecting FDIAs against power system state estimation with fast Go-decomposition approach [32]. Zhao et al. introduced an FDIA dectection method based on short-term state forecasting by checking the statistical consistency between forecasted and gathered measurements [33]. Ashok et al. put forward an online FDIA detection method that availed of load forecasts, generation schedules, and synchrophasor data to detect measurement anomalies [34]. In addition, there are also several FDIA detection methods based on AC state estimation. For example, Du et al. [35] proposed a FDIA model against nonlinear state estimation by leveraging the intrinsic load dynamics inside the attacking region and drawing upon the regression theorem of the Ornstein–Uhlenbeck process and weighted least square estimations. Boyaci et al. [36] presented a FDIA detector based on graph neural network (GNN) by incorporating the inherent physical connections of modern AC power grids and exploiting the spatial correlations of the measurement. Cheng et al. [37] put forward a false data injection attack detector named the k-smallest residual similarity test based on the rationale that perfect false data injection attacks can hardly be achieved in AC state estimation. Although the nonlinear AC model based FDIA detection methods have been proved to be safer than the DC model based methods in most occasions of power system, the linear DC state estimation model based methods are still widely applied to the power system because of their linear expression and rapidity.
Besides, smart grid under edge computing architecture has many advantages, such as low latency, high speed, high reliability, and high security [38,39,40,41]. The edge devices usually have higher capacity than the intelligent terminals. Making full use of the computation power and memory of edge computing to implement FDIA detection is very important and practical for the development and safe operation of smart grid. For the FDIA detection, there are three main directions, which are before, during, and after the completion of state estimation based on the detection time. Most of the current detection methods are the “after state estimation”. However, the detection time of the detection scheme that works best, in theory, should be before the state estimation. This will minimize the effect of spurious data on the state estimation results. Therefore, this paper proposes a method of FDIA detection based on VAR to detect spurious data before state estimation in edge computing environment. Thus, it is conducive to the safe and stable operation of smart grid.
The contributions of this paper are summarized as follows:
(1)
Develop a VAR-based FDIA detection method, aiming to improve safe operation and reliable power supply for smart grid applications in terms of accuracy of voltage phase prediction state and FDIA detection rate.
(2)
Introduce the FDIA detection procedure of the proposed method in detail. The proposed method is characterized by incorporating with VAR model and measurement residual analysis based on infinite norm and 2-norm to achieve the FDIA detection under the edge computing architecture.
(3)
Launch different simulation via IEEE 14-bus system to verify the proposed VAR-based FDIA detection method. The results indicate that the proposed method is more efficient than the comparison.
The remainder of the paper is organized as follows. Section 2 describes the background knowledge of vector auto-regression. Section 3 illustrates the FDIA model of the study. Section 4 introduces the proposed VAR-based FDIA detection method. The performance evaluation and analysis of the proposed method is given by Section 5. Finally, the paper is concluded in Section 6.

2. Background

Vector Auto-Regression

Vector auto-regression (VAR) is a statistical model used to capture the relationship between multiple variables as they change over time. It is an extension of auto-regression (AR) model. Like the auto-regressive model, each variable in the VAR model has an equation modelling its evolution over time. The specific form of VAR is expressed as Equation (1):
x k = T k 1 × x k 1 + + T k p × x k p + ε k
where x represents variable vector, k denotes time, and p is a constant. Compare to x k , the x k 1 ,⋯, x k p are the variable vector from lag phase 1 to lag phase p, respectively. T is a time-invariant parameter matrix. ε k is an interference error term at k time.
Vector auto-regression model is widely used in economics and the natural sciences [42]. Literature [43] uses VAR model with graph regularization to predict microbial interactions. Literature [44] studies the causal relationship between rainfall and temperature by simultaneously constructing and predicting bivariate VAR model. H. Wang et al. utilize time-varying vector auto-regressive model to recognize the multi-task motor imagery EEG (electroencephalogram) signals in literature [45]. It verifies that the time-varying vector auto-regressive model is useful to analyze autocovariance nonstationary vector process. Inspired by the previous application of VAR, we propose a VAR-based FDIA detection method for the smart grid application under edge computing structure.

3. FDIA Model

This section introduces the FDIA model in edge computing environment, which is shown in Figure 1. The attacker launches FDIA on the data collected from the intelligent power terminal lines, thereby affecting the state estimation of edge devices. However, the bad data detection (BDD) system could not detect the FDIA, thus the decision-making system will make wrong decisions on such as the power flow analysis, accident analysis, economic dispatch analysis and so on. The FDIA is modeled as Equation (2):
z ˜ = H × x ^ + v + a
where H denotes the measurement Jacobian matrix, which is determined by the structure of the system; x ^ presents the state estimation of power system; v is the measurement error; and a R N is an attack vector.
Generally, the attacker randomly selects a non-zero vector and calculates the attack vector a shown as Equation (3):
a = H × c
where c = ( c 1 , c 2 , , c n ) T is an any non-zero n-dimensional vector.
After adding the attack vector a, the new state estimation vector is presented as Equation (4):
x ^ a = ( H T × R 1 × H ) 1 × H T × R 1 × z a = x ^ + c
where R denotes attack matrix, R 1 is the inverse of R, and z a is the measured value after being attacked.
Then, the residual error r a is shown as Equation (5):
r a = z a H × x ^ a = z + a H × ( x ^ + c ) = z H × x ^ + ( a H × c ) = z H × x ^ = r

4. FDIA Detection Method Based on Vector Auto-Regression

This section mainly introduce the FDIA detection method based on vector auto-regression model in edge computing environment.
If the Vector auto-regression model is set as p = 1 [46], it means that the samples at the first k time are used to predict the state at k + 1 time. When the linear state estimation is employed, the voltage phase angle of the state estimation vector x is θ , and the voltage amplitude V is always 1, the prediction model of system state is modeled as Equation (6):
θ ˜ k + 1 = T k × θ ^ k + ε k + 1
where θ ˜ k + 1 and T k are predicted state voltage phase angle and parameter matrix, respectively. k and k + 1 are sampling time. θ ^ k represents the voltage phase angle obtained from the state estimation at k time, whose dimension is n × 1 . ε k + 1 is the error of system model and the Gaussian white noise with zero mean.
Then, we obtain the covariance matrix R x ˜ k + 1 of state prediction voltage phase angle vector θ ˜ k + 1 by calculating the mathematic expectation on both sides of Equation (6) at the same time. The covariance matrix is shown as follow:
R θ ˜ k + 1 = T k × R θ ^ k × T k T + R ε k + 1
R θ ^ k = E [ ( θ k θ ^ k ) · ( θ k θ ^ k ) T ]
R ε k + 1 = E ( ε k × ε k + 1 )
where R θ ^ k is the state prediction error matrix at time k, which is usually assumed to be a normal distribution. θ ^ k is the vector of state estimates at the time sample k before. E ( · ) is the expectation operator. Because R θ ^ k and ε k obey normal distribution, it is easy to prove that R θ ˜ k + 1 obeys normal distribution. Therefore, the predicted value of measured active power P ˜ k + 1 at time sample point k + 1 can be calculated from the predicted value of state voltage phase angle θ ˜ k + 1 , P ˜ k + 1 is expressed as Equation (10):
P ˜ k + 1 = H × θ ˜ k + 1
The prediction error covariance matrix is expressed as Equation (11):
C o v ( P ˜ ) = H × C o v ( θ ˜ ) H T = H × R θ ˜ × H T
To simplify equations, Equation (11) and all the following equations omit the time index. Residual of the measured observed and predicted values are obtained in Equation (12):
r ˜ = P ˜ P
In theory, the residual r ˜ follows the Gaussian distribution with a mean value of 0 and covariance matrix of N, where N is obtained by Equation (13).
N = R + H × R θ ˜ × H T
The measurement residual analysis method based on L 2 norm has been used in the control center for many years [47], and it has been proved to have good performance in dealing with bad data. Inspired by this, this paper innovatively proposes an enhanced and efficient FDI attack detection method, which is integrated the measurement residual analysis method based on norm and L 2 norm into the FDIA attack detector shown as Equation (14):
D ( z ) = 1 , P H θ ^ 2 τ 1 or P ˜ P σ N τ 2 0 , o t h e r
where σ N = d i a g ( N ) . If D ( z ) = 1 , it indicates that there is the FDIA; otherwise D ( z ) = 0 , it indicates that there is no FDIA. There are two thresholds τ 1 and τ 2 in the detector, which indicate the significance level of the hypothesis test. In the existing detector-based integration methods, the traditional residual-based bad data detection method, that is, the detection threshold τ 1 remains the same, and τ 1 is fixed to obtain the required error warning probability. The detection threshold τ 2 as an alternative method is changed to test the performance of the detector. The time correlation under the normal operation state of the system shows that the measurement difference between the predicted measurement value and the observed measurement value should be consistent. Once the false injection data is applied to the measurement value, the consistency will be destroyed, so that the attack behavior can be detected.
If there is no FDIA, the state estimation result is reliable. Otherwise, detect the FDIA and process the measured value of the attacked, so as to re-estimate the state and obtain accurate estimation results. One way to deal with these attacked metrics is to delete them from the set of metrics so that they will not affect the final state estimation results. However, removing the attacked measurements may make the system unobservable. Here, the predicted measurements are used to replace these attacked measurements, and then the linear state estimation based on the mixing quantity is carried out to obtain a new and accurate system operation state. On the other hand, the predicted measurements can be further used as pseudo measurements to improve the observability of the system. In order to analyze and evaluate the prediction performance more intuitively, literature [33] uses the prediction method based on autoregressive model as a comparison. The attack vector is generated based on a random false data injection attack scheme. State vector θ ^ a is updated from θ ^ to θ ^ + c . Each row vector of c vector is randomly generated by Gaussian distribution, and the variance is σ c 2 . The value of σ c 2 is determined by the signal-to-noise ratio. Here, the signal-to-noise ratio is specified as 10 dB, that is, S N R = 10 . The definition of the signal-to-noise ratio is expressed as Equation (15):
S N R = 10 l o g σ θ a 2 σ n 2
σ θ a 2 = σ θ 2 + σ c 2
where σ θ a 2 and σ θ 2 denote the variance of each component of θ a and θ , respectively.

5. Experimental Analysis

In this section, we firstly present our experimental overall setting in Section 5.1. Secondly, the evaluation index of the proposed method is introduced in Section 5.2. Finally, experimental results analysis are also demonstrated in Section 5.3.

5.1. Experimental Parameter Setting

In the experiment, we simulate the structure of the power grid through the IEEE 14-bus system power grid model, as shown in Figure 2 [48,49]. First, we use the VAR model for short-term forecasting. Then, the difference between predicted data and observed values is detected by using a classification detector. Finally, the results of above state prediction and detection are evaluated in comparison with the AR model.
We use MATPOWER [50] to generate the data of IEEE 14-bus system, including a topology matrix with corresponding parameters, status and measured values of the system. The formats of MATPOWER bus data and branch data are shown in Table 1 and Table 2, respectively.
Here, the bus data is represented by a large matrix, and each line corresponds to a single bus. “ b u s _ i ” represents bus number, “ t y p e ” represents bus type, “ P d ” represents active power, “ Q d ” represents reactive power of the load, “ G s ” represents conductance in parallel with a single node, generally set to 0. “ B s ” represents susceptance in parallel with a single node, generally set to 0. “ a r e a ” represents bus section number, generally set to 1. “ V m ” represents initial voltage amplitude, “ V a ” represents initial voltage phase angle, “ b a s e K V ” represents reference voltage, “ z o n e ” represents bus loss saving area, and “ V m a x ” represents maximum acceptable voltage, “ V m i n ” represents minimum acceptable voltage. Field “ b r a n c h d a t a ” represents a matrix for setting parameters of each branch in power grid. Each line corresponds to a single branch. “ f b u s ” represents starting node number of the branch, “ t b u s ” represents ending node number of the branch. “r”, “x” and “b” are resistance, reactance and charging charge of the branch, respectively. “ r a t e A ”, “ r a t e B ” and “ r a t e C ” are long-term, short-term and emergency allowable power of the branch, respectively. “ r a t i o ” represents transformation ratio of the branch, and “ a n g l e ” represents the phase angle of the branch. “ s t a t u s ” represents working state of the branch, 1 represents input, and 0 represents exit. “ a n g m i n ” and “ a n g m a x ” represents the minimum and maximum difference of the phase angle of the branch, respectively.
In terms of the attacker’s access to information, it can be divided into access to global information [51] and local information [52]. In the experiment, we assume that the attacker has access to limited real-time data for online state estimation. Firstly, we make a linear approximation to an AC optimal power flow model. After that, it is transformed into a DC optimal power flow model for linear state estimation. Finally, a false data injection attack is simulated for the DC optimal power flow model. In this experiment, state quantity x and measured value z include the voltage phase angle θ and active power P, respectively. In addition, the voltage amplitude is set to V = 1 . It is assumed that the attacker has full knowledge of the target system’s topology and destroys the state estimation by injecting false data into the device. The measured value z in this paper is obtained by z = P + v . The error of the measured value collected by the data acquisition system usually follows the Gaussian distribution, which has a variance σ between 0.005 and 0.02 of the measured value without noise. We set the variance to 0.01 of the normal measured value. The attack vector used in this paper is generated by a random false data injection scheme. In the case of FDIA, attack nodes are randomly selected. In addition, the attack lasts for 20 min.

5.2. Evaluation Index

To evaluate the prediction performance of the detection scheme proposed in this paper, the mean square error (MSE) is used as the performance index for comparison. The MSE function is shown as follow:
M S E = 1 M k = 1 M e k 2
e k = θ k θ ˜ k
where θ k , θ ˜ k and M are observed state voltage phase angle values, predicted state voltage phase angle values of k-time sampling point and the number of time points, respectively.
To analyze the detection performance, the receiver operating characteristic (ROC) curve is used for evaluation. The ROC curve depicts the relative balance relationship between false-positive rate and true-positive rate.
The true positive rate is the proportion of false data detected out of the total false data, which is referred to as the probability of detection in this paper and expressed as Equation (19):
P d = N H i t N H i t + N M i s s
The false positive rate is the proportion of all normal data that are falsely detected as being false, and is expressed as Equation (20):
P f = N F l a s e N F l a s e + N C o r r e c t
The false-alarm rate is the percentage of all false data that are falsely detected as normal data, and is expressed as Equation (21):
P m = N M i s s N F l a s e + N C o r r e c t
Among them, N H i t is the number of true-positive successfully detected by false data. N M i s s is the number of false-negative not detected by false data. N F a l s e is the number of false-positive wrongly detected by normal data, and N C o r r e c t is the number of true-negatives normally detected by normal data. The ideal situation is that the false positive rate is inversely proportional to the detection probability, that is, the lower the false positive rate, the higher the detection accuracy. This is because the false positive rate has a great impact on the power grid decision-making. The measured data increases continuously due to the growth of time, and the impact of the false positive rate increases in geometric multiples. Therefore, the final goal of the experiment is to achieve the P c highest value and the P f lowest value.
The attacker may have limited privileges, a limited budget, or the control center may have encrypted the historical data so that it is not available. In this paper, we assume that the attacker can only access a limited amount of real-time data for online state estimation, make a linear approximation of the AC tidal model, transform it into a DC tidal model for linear state estimation, and simulate a false data injection attack for the DC tidal model. The experiments in this paper use a state quantity x containing the voltage phase angle θ , a measurement z containing the active power P, and a constant voltage magnitude V of 1. It is assumed that the attacker knows the full structure of the Jacobi matrix H, i.e., has full knowledge of the topology of the target system, and corrupts the state estimate by feeding false data into the device. The measurement value z in this paper is obtained from z = P + v . The error of the measurement value collected by the supervisory control and data acquisition system usually obeys a Gaussian distribution, which has a variance σ of size 0.5% to 2% of the measurement value without noise. Thus, the variance σ is set to 0.01 of the normal measurement value in the experiment.
Figure 3 demonstrates the state change curve of one of the sudden false data injection attacks, where, in the case of sudden FDIA, the attack nodes are randomly selected and the attack lasts for 20 min. From Figure 3, we notice that the voltage phase angle values after the attack are very similar to the original voltage phase angle values. This makes the FDIA extremely stealthy, which makes it difficult to detect the attack by using common defense mechanisms.

5.3. Result Analysis

5.3.1. Prediction Performance Analysis of VAR and AR Schemes

From Table 3, we find that the MSE of VAR-based method and AR-based method are 0.3613 and 1.5945, respectively. This indicates that the VAR-based scheme predicts better than the AR-based scheme. The results demonstrate that the data of each node in the grid is time-correlated, which is not only related to its own data on the current node but also related to the data on other nodes. Therefore, the prediction scheme should consider the correlation between nodes, which will improve the prediction performance.

5.3.2. Analysis of Detection Performance of VAR and AR Schemes

Before analyzing the detection performance, we need to consider two things: one is whether the value of sliding window length M affects the detection effect, and the other is whether the number of non-zero values of non-zero vector c will affect the test results after participating in the construction of attack vector. In this regard, the following analysis is carried out.
(a)
Influence of sliding window length M.
Here, the influence of M on the detection rate is discussed. According to the control variable method, we set P f = 0.05 and the non-zero number in c is 2. Firstly, the state transfer matrix T k is calculated by updating M. Then, state prediction θ ˜ k + 1 is calculated, followed by the calculation of measurement prediction P ˜ k + 1 to obtain the detection result. Finally, the detection rate is varied by changing the value of M to different detection rates. The experimental results are shown in Figure 4.
From Figure 4, we can notice that the detection performance of both schemes can be significantly improved at appropriate M, while inappropriate M value leads to deterioration of detection performance. The detection rate of the detection scheme predicted by the initial VAR scheme is not as high as that of the detection scheme predicted by the AR scheme. However, when specific limit values are exceeded, the detection rate of the prediction-based scheme using VAR is steadily higher than that of the AR scheme.
By analyzing the situation shown in Figure 4, we can draw the following conclusions.
In the case of linear prediction model, the accuracy of prediction is closely related to the state transition matrix of the model. The state transition matrix of the VAR model and AR model compared in this paper is related to redundancy g. Further, it is related to least square estimation. Because the least square estimation needs to calculate the coefficients of IEEE14 power system, and in the VAR model, we need to consider the influence of its own node and other nodes on this node, so the VAR model needs to calculate 13 × 13 = 169 coefficients, while the AR model only needs to calculate 13 coefficients. Even if the M value divided for power data is the same, the redundancy of the two models is different.
At the beginning, the initial value of sliding window length M is small, and the VAR model is not good enough, resulting in the imperfect prediction performance. The detection rate of the scheme predicted by VAR model is lower than that predicted by AR model. When the redundancy increases with the increase of M, the prediction accuracy of VAR model increases, and the detection rate of the corresponding detection scheme increases, which is higher than that of AR scheme. In the last stage, the redundancy is too high, which exceeds the computing power of the two regression models, so the value of M is 120 in the next simulation.
(b)
Impact of the number of non-zero values in c.
From the above analysis (related Figure 4), we notice that a larger M value for the sliding window length is not better. Therefore, it is necessary to make a trade-off comparison between prediction accuracy and calculation speed. Here, the value of M is 120. This part discusses the influence of non-zero quantity in c on the detection rate. According to the control variable method, setting P f = 0.05 . By changing the non-zero number in c to update the attack vector, a new state estimation value is obtained. The remaining steps are similar to the above (a), and different detection rate is shown in Figure 5.
Figure 5 shows the relationship between the different numbers of non-zero and the detection rate, where n is the number of non-zero. From Figure 5, we find that the early detection rate is proportional to the increase in n. The reason is that the increase in n leads to the increase of the number of non-zero in the attack vector, which increases the risk of measured value being attacked. This will greatly increase the difference between the observed and predicted value and facilitates control center to detect the attack.
After considering the impact of M and c on the detection rate, we set M = 120 and the number non-zero of c to 2 in the experiment of attack detection.
From Figure 6, we notice that VAR-based scheme prediction is very effective in detecting FDIA. Even if the false detection rate is very low, the detection rate can reach more than 0.87. For example, when the false detection rate is 0.05, the detection rate has reached 0.95. Moreover, the performance of the detection scheme using the VAR scheme prediction is better than the AR scheme in general. The reason is that with the current sliding window length M and a non-zero number of 2 for c, the redundancy is sufficient for the VAR model. Therefore, its prediction performance is better than the AR model and the classifier can detect better.

6. Conclusions

This paper focuses on the FDIA and innovatively proposes a VAR-based FDIA detection method for the smart grid application, which is integrated the measurement residual analysis method based on norm and L 2 norm into the FDIA attack detector. this paper proposes an enhanced and efficient FDI attack detection method. Then, We also introduce the proposed method in detail. The VAR model is used for prediction, and classifier is used for FDIA detection. Finally, we conduct the FDIA simulation experiments by computer. The results show that the proposed FDIA detection method based on VAR is better than the AR-based method in FDIA detection rate. Even when the false detection rate is low, the detection rate is higher than 0.87.
In the follow-up work, we will consider the effects of false data injection attack on different models and methods, and compare them with the proposed FDIA detection scheme based on VAR in this paper. In addition, we think that it is meaningful to analyze the impact of different noises in different scenarios on the performance of the FDIA detection scheme. Furthermore, it is also worthwhile to find new and effective measures to enhance the capability of defense system for smart grid.

Author Contributions

Conceptualization, Y.C.; data curation, Q.L.; formal analysis, Q.L.; funding acquisition, K.H., L.Y., J.T. and H.W.; investigation, Q.Z., J.M. and Q.L.; methodology, Q.L.; project administration, H.W.; resources, L.Y. and H.W.; supervision, J.T. and H.W.; visualization, Y.C.; writing—original draft preparation, Y.C., Q.Z. and J.M.; writing—review and editing, Y.C., K.H., L.Y., J.T. and H.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Key Research and Development Program of China Research Fund Grant under Grand 2017YFC1501701, the Zayed University under the Cluster Research Grant R20140, the Sichuan Science and Technology Program under Grand 2022YFH0098, the Scientific Research Foundation of CUIT, and the National Natural Science Foundation of China under Grand 61801060.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data used to support the findings of this study are included within the article.

Acknowledgments

We thank the anonymous reviewers for their valuable feedback.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Khurana, H.; Hadley, M.; Lu, N.; Frincke, D.A. Smart-grid security issues. IEEE Secur. Priv. 2010, 8, 81–85. [Google Scholar] [CrossRef]
  2. Metke, A.R.; Ekl, R.L. Smart grid security technology. In Proceedings of the Innovative Smart Grid Technologies (ISGT), Gaithersburg, MD, USA, 19–21 January 2010; pp. 1–7. [Google Scholar]
  3. Gusrialdi, A.; Qu, Z. Smart grid security: Attacks and defenses. In Smart Grid Control: Overview and Research Opportunities; Springer: Cham, Switzerland, 2019; pp. 199–223. [Google Scholar]
  4. Flick, T.; Morehouse, J. Securing the Smart Grid: Next Generation Power Grid Security; Syngress: Burlington, MA, USA, 2010. [Google Scholar]
  5. Zhao, J.; Zhang, G.; Das, K.; Korres, G.N.; Manousakis, N.M.; Sinha, A.K.; He, Z. Power system real-time monitoring by using PMU-based robust state estimation method. IEEE Trans. Smart Grid 2015, 7, 300–309. [Google Scholar] [CrossRef]
  6. Weng, Y.; Negi, R.; Ilić, M.D. Historical data-driven state estimation for electric power systems. In Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, BC, Canada, 21–24 October 2013; pp. 97–102. [Google Scholar]
  7. Gol, M.; Abur, A.; Galvan, F. Metrics for success: Performance metrics for power system state estimators and measurement designs. IEEE Power Energy Mag. 2012, 10, 50–57. [Google Scholar] [CrossRef]
  8. Ni, M.; Yan, J.; Bo, R.; Tang, Y. Power system cyber attack and its defense. Autom. Electr. Power Syst. 2016, 40, 148–151. [Google Scholar]
  9. Anwar, A.; Mahmood, A.N. Vulnerabilities of smart grid state estimation against false data injection attack. In Renewable Energy Integration: Challenges and Solutions; Springer: Singapore, 2014; pp. 411–428. [Google Scholar]
  10. Li, Z.; Tong, W.; Jin, X. Construction of cyber security defense hierarchy and cyber security testing system of smart grid: Thinking and enlightenment for network attack events to national power grid of Ukraine and Israel. Autom. Electr. Power Syst. 2016, 40, 147–151. [Google Scholar]
  11. Mantha, B.R.; García de Soto, B. Cybersecurity in Construction: Where Do We Stand and How Do We Get Better Prepared. Front. Built Environ. 2021, 7, 612668. [Google Scholar] [CrossRef]
  12. Zheng, T.; Liu, M.; Puthal, D.; Yi, P.; Wu, Y.; He, X. Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin. arXiv 2022, arXiv:2205.11783. [Google Scholar]
  13. Li, M.; Yang, Z.; He, L.; Teng, Y. Research and Application of Information Security Offense and Defense Exercise in Electric Power Industry. In Proceedings of the 2018 3rd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2018), Chongqing, China, 15–16 December 2018; pp. 50–53. [Google Scholar]
  14. Murray, W.H. An Introduction to Internet Security and Firewall Policies. In The Network Manager’s Handbook; Auerbach Publications: Boca Raton, FL, USA, 2021; pp. 227–246. [Google Scholar]
  15. Uçtu, G.; Alkan, M.; Doğru, İ.A.; Dörterler, M. A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls. Future Gener. Comput. Syst. 2021, 124, 56–67. [Google Scholar] [CrossRef]
  16. Modi, C.; Patel, D.; Borisaniya, B.; Patel, H.; Patel, A.; Rajarajan, M. A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 2013, 36, 42–57. [Google Scholar] [CrossRef]
  17. Wang, Y.; Ma, J.; Sharma, A.; Singh, P.K.; Gaba, G.S.; Masud, M.; Baz, M. An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks. J. Sens. 2021, 2021, 5558860. [Google Scholar] [CrossRef]
  18. Yu, W.; Griffith, D.; Ge, L.; Bhattarai, S.; Golmie, N. An integrated detection system against false data injection attacks in the smart grid. Secur. Commun. Netw. 2015, 8, 91–109. [Google Scholar] [CrossRef]
  19. Jiwei, T.; Buhong, W.; Fute, S. False data injection attacks based on robust principal component analysis in smart grid. J. Comput. Appl. 2017, 37, 1943. [Google Scholar]
  20. Liu, Y.; Ning, P.; Reiter, M.K. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 2011, 14, 1–33. [Google Scholar] [CrossRef]
  21. Li, Y.; Huo, W.; Qiu, R.; Zeng, J. Efficient detection of false data injection attack with invertible automatic encoder and long-short-term memory. IET Cyber-Phys. Syst. Theory Appl. 2020, 5, 110–118. [Google Scholar] [CrossRef]
  22. Yi, N.; Wang, Q.; Yan, L.; Tang, Y.; Xu, J. A multi-stage game model for the false data injection attack from attacker’s perspective. Sustain. Energy Grids Netw. 2021, 28, 100541. [Google Scholar] [CrossRef]
  23. Xie, L.; Mo, Y.; Sinopoli, B. False data injection attacks in electricity markets. In Proceedings of the 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MA, USA, 4–6 October 2010; pp. 226–231. [Google Scholar]
  24. Liu, X.; Li, Z. False data attacks against AC state estimation with incomplete network information. IEEE Trans. Smart Grid 2016, 8, 2239–2248. [Google Scholar] [CrossRef]
  25. Kim, J.; Tong, L.; Thomas, R.J. Subspace methods for data attack on state estimation: A data driven approach. IEEE Trans. Signal Process. 2014, 63, 1102–1114. [Google Scholar] [CrossRef]
  26. Yu, Z.; Chin, W. Blind false data injection attack using PCA approximation method in smart grid. IEEE Trans. Smart Grid 2015, 6, 1219–1226. [Google Scholar] [CrossRef]
  27. Nian-De, X.; Shi-Ying, W.; Er-Keng, Y. A new approach for detection and identification of multiple bad data in power system state estimation. IEEE Trans. Power Appar. Syst. 1982, PAS-101, 454–462. [Google Scholar] [CrossRef]
  28. Handschin, E.; Schweppe, F.C.; Kohlas, J.; Fiechter, A. Bad data analysis for power system state estimation. IEEE Trans. Power Appar. Syst. 1975, 94, 329–337. [Google Scholar] [CrossRef]
  29. Da Silva, A.L.; Do Coutto Filho, M.; Cantera, J. An efficient dynamic state estimation algorithm including bad data processing. IEEE Trans. Power Syst. 1987, 2, 1050–1058. [Google Scholar] [CrossRef]
  30. Li, Q.; Xu, A.; Lin, H.; Hou, W.; Jiang, Y.; Zhang, Y.; Mao, Z.; Wen, H. Research on FDI attacks in edge computing environment. J. Phys. Conf. Ser. 2020, 1646, 012013. [Google Scholar] [CrossRef]
  31. Liu, L.; Esmalifalak, M.; Ding, Q.; Emesih, V.A.; Han, Z. Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid 2014, 5, 612–621. [Google Scholar] [CrossRef]
  32. Li, B.; Ding, T.; Huang, C.; Zhao, J.; Yang, Y.; Chen, Y. Detecting false data injection attacks against power system state estimation with fast Go-decomposition approach. IEEE Trans. Ind. Inform. 2019, 15, 2892–2904. [Google Scholar] [CrossRef] [Green Version]
  33. Zhao, J.; Zhang, G.; La Scala, M.; Dong, Z.Y.; Chen, C.; Wang, J. Short-term state forecasting-aided method for detection of smart grid general false data injection attacks. IEEE Trans. Smart Grid 2017, 8, 1580–1590. [Google Scholar] [CrossRef]
  34. Ashok, A.; Govindarasu, M.; Ajjarapu, V. Online detection of stealthy false data injection attacks in power system state estimation. IEEE Trans. Smart Grid 2018, 9, 1636–1646. [Google Scholar] [CrossRef]
  35. Du, M.; Pierrou, G.; Wang, X.; Kassouf, M. Targeted false data injection attacks against AC state estimation without network parameters. IEEE Trans. Smart Grid 2021, 12, 5349–5361. [Google Scholar] [CrossRef]
  36. Boyaci, O.; Umunnakwe, A.; Sahu, A.; Narimani, M.R.; Ismail, M.; Davis, K.R.; Serpedin, E. Graph neural networks based detection of stealth false data injection attacks in smart grids. IEEE Syst. J. 2022, 16, 2946–2957. [Google Scholar] [CrossRef]
  37. Cheng, G.; Lin, Y.; Zhao, J.; Yan, J. A highly discriminative detector against false data injection attacks in AC state estimation. IEEE Trans. Smart Grid 2022, 13, 2318–2330. [Google Scholar] [CrossRef]
  38. Cob-Parro, A.C.; Losada-Gutiérrez, C.; Marrón-Romera, M.; Gardel-Vicente, A.; Bravo-Muoz, I. Smart Video Surveillance System Based on Edge Computing. Sensors 2021, 21, 2958. [Google Scholar] [CrossRef]
  39. Chen, S.; Wen, H.; Wu, J.; Lei, W.; Hou, W.; Liu, W.; Xu, A.; Jiang, Y. Internet of things based smart grids supported by intelligent edge computing. IEEE Access 2019, 7, 74089–74102. [Google Scholar] [CrossRef]
  40. Huang, Y.; Lu, Y.; Wang, F.; Fan, X.; Liu, J.; Leung, V.C. An edge computing framework for real-time monitoring in smart grid. In Proceedings of the 2018 IEEE International Conference on Industrial Internet (ICII), Seattle, WA, USA, 21–23 October 2018; pp. 99–108. [Google Scholar]
  41. Chen, Y.; Ho, P.H.; Wen, H.; Chang, S.Y.; Real, S. On Physical-Layer Authentication via Online Transfer Learning. IEEE Internet Things J. 2022, 9, 1374–1385. [Google Scholar] [CrossRef]
  42. Lütkepohl, H. New Introduction to Multiple Time Series Analysis; Springer: Berlin/Heidelberg, Germany, 1993. [Google Scholar]
  43. Jiang, X.; Hu, X.; Xu, W.; Park, E. Predicting microbial interactions using vector autoregressive model with graph regularization. IEEE/ACM Trans. Comput. Biol. Bioinform. 2015, 12, 254–261. [Google Scholar] [CrossRef]
  44. Rohmawati, A.A.; Gunawan, P. The Causality Effect on Vector Autoregressive Model: The Case for Rainfall Forecasting. In Proceedings of the 2019 7th International Conference on Information and Communication Technology (ICoICT), Kuala Lumpur, Malaysia, 24–26 July 2019; pp. 1–5. [Google Scholar]
  45. Wang, H.; Bai, L.; Xu, J.; Fei, W. EEG recognition through time-varying vector autoregressive model. In Proceedings of the IEEE 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Zhangjiajie, China, 15–17 August 2015; pp. 292–296. [Google Scholar]
  46. Hassanzadeh, M.; Evrenosoğlu, C.Y.; Mili, L. A short-term nodal voltage phasor forecasting method using temporal and spatial correlation. IEEE Trans. Power Syst. 2015, 31, 3881–3890. [Google Scholar] [CrossRef]
  47. Kosut, O.; Jia, L.; Thomas, R.J.; Tong, L. Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2011, 2, 645–658. [Google Scholar] [CrossRef]
  48. Tzounas, G.; Sipahi, R.; Milano, F. Damping Power System Electromechanical Oscillations Using Time Delays. IEEE Trans. Circuits Syst. I Regul. Pap. 2021, 68, 2725–2735. [Google Scholar] [CrossRef]
  49. Milano, F. Power System Modelling and Scripting; Springer: Berlin/Heidelberg, Germany, 2010; pp. 3–17. [Google Scholar]
  50. Zimmerman, R.D.; Murillo-Sánchez, C.E.; Thomas, R.J. MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 2010, 26, 12–19. [Google Scholar] [CrossRef]
  51. Valenzuela, J.; Wang, J.; Bissinger, N. Real-time intrusion detection in power system operations. IEEE Trans. Power Syst. 2012, 28, 1052–1062. [Google Scholar] [CrossRef]
  52. Rahman, M.A.; Mohsenian-Rad, H. False data injection attacks with incomplete information against smart power grids. In Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, 3–7 December 2012; pp. 3153–3158. [Google Scholar]
Figure 1. FDIA model under edge computing.
Figure 1. FDIA model under edge computing.
Sensors 22 06789 g001
Figure 2. Power grid model of IEEE 14-bus system.
Figure 2. Power grid model of IEEE 14-bus system.
Sensors 22 06789 g002
Figure 3. State change curve of sudden FDIA.
Figure 3. State change curve of sudden FDIA.
Sensors 22 06789 g003
Figure 4. Comparison diagram of the relationship between M and detection rate under different methods.
Figure 4. Comparison diagram of the relationship between M and detection rate under different methods.
Sensors 22 06789 g004
Figure 5. Comparison of the influence of non-zero quantity in c on detection performance.
Figure 5. Comparison of the influence of non-zero quantity in c on detection performance.
Sensors 22 06789 g005
Figure 6. Comparison of detection rate and false detection rate under different method.
Figure 6. Comparison of detection rate and false detection rate under different method.
Sensors 22 06789 g006
Table 1. Bus data format of IEEE 14-bus system.
Table 1. Bus data format of IEEE 14-bus system.
bus _ i Type P d Q d G s B s area V m V a baseKV zone V max V min
13000011.060011.060.94
2221.712.70011.045−4.98011.060.94
3294.2190011.01−12.72011.060.94
4147.8−3.90011.019−10.33011.060.94
517.61.60011.02−8.78011.060.94
6211.27.50011.07−14.22011.060.94
71000011.062−13.37011.060.94
82000011.09−13.36001.060.94
9129.516.601911.056−14.94011.060.94
10195.80011.051−15.1011.060.94
1113.51.80011.057−14.79011.060.94
1216.11.60011.055−15.07011.060.94
13113.55.80011.05−15.16011.060.94
14114.950011.036−16.04011.060.94
Table 2. Branch data format of IEEE 14-bus system.
Table 2. Branch data format of IEEE 14-bus system.
fbus tbus rxb rateA rateB rateC ratio angle status ang min ang max
120.019380.059170.0528990000001−360360
150.054030.223040.0492990000001−360360
230.46990.197970.0438990000001−360360
240.058110.176320.034990000001−360360
250.056950.173880.0346990000001−360360
340.067010.171030.0128990000001−360360
450.013350.042110990000001−360360
4700.2091209900000.97801−360360
4900.5561809900000.96901−360360
5600.2520209900000.93201−360360
6110.094980.19890990000001−360360
6120.122910.255810990000001−360360
6130.066150.130270990000001−360360
7800.176150990000001−360360
7900.110010990000001−360360
9100.031810.08450990000001−360360
9140.127110.270380990000001−360360
10110.082050.192070990000001−360360
12130.220920.199880990000001−360360
13140.170930.348020990000001−360360
Table 3. Comparison of mean square error of different methods.
Table 3. Comparison of mean square error of different methods.
MethodMSE
VAR0.3613
AR1.5945
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Chen, Y.; Hayawi, K.; Zhao, Q.; Mou, J.; Yang, L.; Tang, J.; Li, Q.; Wen, H. Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment. Sensors 2022, 22, 6789. https://doi.org/10.3390/s22186789

AMA Style

Chen Y, Hayawi K, Zhao Q, Mou J, Yang L, Tang J, Li Q, Wen H. Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment. Sensors. 2022; 22(18):6789. https://doi.org/10.3390/s22186789

Chicago/Turabian Style

Chen, Yi, Kadhim Hayawi, Qian Zhao, Junjie Mou, Ling Yang, Jie Tang, Qing Li, and Hong Wen. 2022. "Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment" Sensors 22, no. 18: 6789. https://doi.org/10.3390/s22186789

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop