Skip to main content

Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11604))

Abstract

A smart grid is a complex system using power transmission and distribution networks to connect electric power generators to consumers across a large geographical area. Due to their heavy dependencies on information and communication technologies, smart grid applications, such as state estimation, are vulnerable to various cyber-attacks. False data injection attacks (FDIA), considered as the most severe threats for state estimation, can bypass conventional bad data detection mechanisms and render a significant threat to smart grids. In this paper, we propose a novel FDIA detection mechanism based on a wide and recurrent neural networks (RNN) model to address the above concerns. Simulations over IEEE 39-bus system indicate that the proposed mechanism can achieve a satisfactory FDIA detection accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Athay, T., Podmore, R., Virmani, S.: A practical method for the direct analysis of transient stability. IEEE Trans. Power Apparatus Syst. 2, 573–584 (1979)

    Google Scholar 

  2. Bertaccini, A., Duduk, B., Paltrinieri, S., Contaldo, N.: Phytoplasmas and phytoplasma diseases: a severe threat to agriculture. Am. J. Plant Sci. 5(12), 1763 (2014)

    Google Scholar 

  3. Cheng, H.T., et al.: Wide & deep learning for recommender systems. In: Proceedings of the 1st Workshop on Deep Learning for Recommender Systems, pp. 7–10. ACM (2016)

    Google Scholar 

  4. Deng, R., Xiao, G., Lu, R.: Defending against false data injection attacks on power system state estimation. IEEE Trans. Industr. Inf. 13(1), 198–207 (2017)

    Google Scholar 

  5. Deng, R., Xiao, G., Lu, R., Liang, H., Vasilakos, A.V.: False data injection on state estimation in power systems-attacks, impacts, and defense: a survey. IEEE Trans. Industr. Inf. 13(2), 411–423 (2017)

    Google Scholar 

  6. Esmalifalak, M., Liu, L., Nguyen, N., Zheng, R., Han, Z.: Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst. J. 11(3), 1644–1652 (2017)

    Google Scholar 

  7. Grid, N.S.: Introduction to NISTIR 7628 guidelines for smart grid cyber security. Guideline, September 2010

    Google Scholar 

  8. Guan, Y., Ge, X.: Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Trans. Signal Inf. Process. Over Netw. 4(1), 48–59 (2018)

    Google Scholar 

  9. He, Y., Mendis, G.J., Wei, J.: Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 8(5), 2505–2516 (2017)

    Google Scholar 

  10. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)

    Google Scholar 

  11. Ikbal, A., Aftab, M.A., Hussain, S.S.: Performance comparison of IEC 61850–90-5 and IEEE C37. 118.2 based wide area PMU communication networks. J. Mod. Power Syst. Clean Energy 4(3), 487–495 (2016)

    Google Scholar 

  12. James, J., Hill, D.J., Lam, A.Y., Gu, J., Li, V.O.: Intelligent time-adaptive transient stability assessment system. IEEE Trans. Power Syst. 33(1), 1049–1058 (2018)

    Google Scholar 

  13. Kim, T.T., Poor, H.V.: Strategic protection against data injection attacks on power grids. IEEE Trans. Smart Grid 2(2), 326–333 (2011)

    Google Scholar 

  14. Kosut, O., Jia, L., Thomas, R.J., Tong, L.: Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2(4), 645–658 (2011)

    Google Scholar 

  15. Liang, G., Zhao, J., Luo, F., Weller, S.R., Dong, Z.Y.: A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 8(4), 1630–1638 (2017)

    Google Scholar 

  16. Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. 32(4), 8–14 (2018)

    Google Scholar 

  17. Lin, J., Yu, W., Yang, X., Xu, G., Zhao, W.: On false data injection attacks against distributed energy routing in smart grid. In: Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, pp. 183–192. IEEE Computer Society (2012)

    Google Scholar 

  18. Liu, L., Esmalifalak, M., Ding, Q., Emesih, V.A., Han, Z.: Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid 5(2), 612–621 (2014). https://doi.org/10.1109/TSG.2013.2284438

    Google Scholar 

  19. Liu, L., Esmalifalak, M., Ding, Q., Emesih, V.A., Han, Z.: Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid 5(2), 612–621 (2014)

    Google Scholar 

  20. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 21–32. ACM, New York, NY, USA (2009). https://doi.org/10.1145/1653662.1653666, http://doi.acm.org/10.1145/1653662.1653666

  21. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)

    Google Scholar 

  22. Manandhar, K., Cao, X., Hu, F., Liu, Y.: Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control Netw. Syst. 1(4), 370–379 (2014). https://doi.org/10.1109/TCNS.2014.2357531

    Google Scholar 

  23. Manandhar, K., Cao, X., Hu, F., Liu, Y.: Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control Netw. Syst. 1(4), 370–379 (2014)

    Google Scholar 

  24. Monticelli, A.: Electric power system state estimation. Proc. IEEE 88(2), 262–282 (2000)

    Google Scholar 

  25. PowerFactory-DIgSILENT Germany (2017). https://www.digsilent.de/en/powerfactory.html

  26. Ozay, M., Esnaola, I., Vural, F.T.Y., Kulkarni, S.R., Poor, H.V.: Machine learning methods for attack detection in the smart grid. IEEE Trans. Neural Netw. Learn. Syst. 27(8), 1773–1786 (2016)

    Google Scholar 

  27. Phadke, A.G., Thorp, J.S., Karimi, K.: State estimlatjon with phasor measurements. IEEE Transactions on Power Systems 1(1), 233–238 (1986)

    Google Scholar 

  28. Rahman, M.A., Mohsenian-Rad, H.: False data injection attacks against nonlinear state estimation in smart power grids. In: 2013 IEEE Power & Energy Society General Meeting, pp. 1–5. IEEE (2013)

    Google Scholar 

  29. Schweppe, F.C.: Power system static-state estimation, Part III: Implementation. IEEE Trans. Power Appar. Syst. PAS–89(1), 130–135 (1970)

    Google Scholar 

  30. Schweppe, F.C., Rom, D.B.: Power system static-state estimation, Part II: approximate model. IEEE Trans. Power Appar. Syst. PAS–89(1), 125–130 (1970)

    Google Scholar 

  31. Schweppe, F.C., Wildes, J.: Power system static-state estimation, Part I: exact model. IEEE Trans. Power Appar. Syst. PAS–89(1), 120–125 (1970)

    Google Scholar 

  32. Ten, C.W., Manimaran, G., Liu, C.C.: Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum. 40(4), 853–865 (2010)

    Google Scholar 

  33. Wu, F.F., Liu, W.E.: Detection of topology errors by state estimation (power systems). IEEE Trans. Power Syst. 4(1), 176–183 (1989). https://doi.org/10.1109/59.32475

    Google Scholar 

  34. Wu, F.F.: Power system state estimation: a survey. Int. J. Electr. Power Energy Syst. 12(2), 80–87 (1990)

    Google Scholar 

  35. Yuan, Y., Li, Z., Ren, K.: Modeling load redistribution attacks in power systems. IEEE Trans. Smart Grid 2(2), 382–390 (2011)

    Google Scholar 

  36. Zheng, Z., Yang, Y., Niu, X., Dai, H.N., Zhou, Y.: Wide and deep convolutional neural networks for electricity-theft detection to secure smart grids. IEEE Trans. Industr. Inf. 14(4), 1606–1615 (2018)

    Google Scholar 

  37. Zimmerman, R.D., Murillo-Sanchez, C.E.: Matpower 4.1 user’s manual. Power Systems Engineering Research Center, Cornell University, Ithaca, NY (2011)

    Google Scholar 

Download references

Acknowledgment

This work was partially supported by the US National Science Foundation under grant IIS-1741279, and the National Science Foundation of China under grants 61832012, 61771289, and 61672321.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Y., Chen, D., Zhang, C., Chen, X., Huang, B., Cheng, X. (2019). Wide and Recurrent Neural Networks for Detection of False Data Injection in Smart Grids. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23597-0_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23596-3

  • Online ISBN: 978-3-030-23597-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics