320 likes | 485 Views
Spoofing State Estimation. William Niemira. Overview. State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies. State Estimation. Finite transmission capacity Economic and security aspects must be managed Contingency analysis Pricing Congestion management
E N D
Spoofing State Estimation William Niemira
Overview • State Estimation • DC Estimator • Bad Data • Malicious Data • Examples • Mitigation Strategies
State Estimation Finite transmission capacity Economic and security aspects must be managed Contingency analysis Pricing Congestion management Accurate state information needed
State Estimation • Networks are large • Thousands or tens of thousands of buses • Large geographical area • Many measurements to reconcile • Different types • Redundant • Subject to error
State Estimation • State estimation uses measurement redundancy to improve accuracy • Finds best fit for data • Differences between measures and estimates can indicate errors
DC Estimator • Overdetermined system of linear equations • Solved as weighted-least squares problem • Assumes: • Lossless branches (neglects resistance and shunt impedances) • Flat voltage profile (same magnitude at each bus) • Reduces computational burden
DC Estimator • is the vector of n states • is the vector of m measurements • is the m x n Jacobian matrix • is an m vector of random errors
DC Estimator • Residual vector • Estimated as where • Minimize: • Where is a diagonal matrix of measurement weights
DC Estimator • Differentiate to obtain • Where is the state estimate and is the state estimation gain matrix • Bad data assumed if where is some tolerance
1-Bus Example PG = PGmeas PL1 = PL1meas – PL1 – PG = PL2meas
1-Bus Example For variances of 0.004, 0.001, and 0.001 for PGmeas, PL1meas , PL2meas respectively
3-Bus Example – 50 θ2 – 100 θ3 = P1meas 150 θ2 – 100 θ3 = P2meas – 100 θ2+ 200 θ3= P3meas – 100 θ3 = P13meas
Bad Data • Bad data usually consists of isolated, random errors • These types of errors tend to increase the residual • Measurements with large residuals can be omitted to check for better fit • Works well for non-interacting bad measurements
1-Bus Example Good Data Bad Data
Malicious Data • Malicious data (data manipulated by an adversary) need not be isolated or random • Adversary may inject multiple coordinated measurement errors • Errors could interact with each other or other measurements • Could change without increasing
Attack Formation • Given: • Attacked measurement vector • Attack vector • Estimated states due to attack • Clever adversary chooses
1-Bus Example PG = PGmeas PL1 = PL1meas – PL1 – PG = PL2meas
1-Bus Example Unobservable attack vectors: Any linear combination of
1-Bus Example Unattacked Attacked
For Real? • In practice, state estimators are more complicated than previous examples • Assumed strong adversary: • Has access to topology information • Has some means to change measurements • Why would someone do this? • Simulate congestion—could affect markets • Reduce awareness of system operator
AC Estimator • AC model accounts for some effects neglected in the DC model • Attacks as generated earlier will affect residual • Attack may not have effect intended by adversary
AC Estimator • is the vector of n states • is the vector of m measurements • is nonlinear vector function relating measurements to states • is an m vector of random errors
AC Estimator • Solved using Gauss Newton method • Gain matrix: • is diagonal matrix of variances • Estimation procedure:
AC Estimator • DC approximation is pretty good • Harder to detect attack than random error • Relatively large attacks may escape detection • Grid state affects quality of DC attack
Detection • Focus on quantities neglected by DC model (VARs) • VARs tend to be localized • AttackLosses changeVAR flow and generation changes
Detection • Alternative approach is to estimate parameters simultaneously with states • Augment state vector with known parameters • Compare known values to parameter estimates to find bad data
Detection • Choose something known to the control center but not an attacker • Example: TCUL xformer tap position, D-FACTS setting • Attacks will perturb parameter estimates
Conclusions • State estimators, even nonlinear estimators, are vulnerable to malicious data • Malicious data is different from conventional bad data • Nonlinearity effects of the attack may be detectable • Parameter estimation can verify data
Questions? Thank you!