By Topic

Data Attack Isolation in Power Networks Using Secure Voltage Magnitude Measurements

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Kin Cheong Sou ; KTH R. Inst. of Technol., Stockholm, Sweden ; Sandberg, H. ; Johansson, K.H.

In this paper a procedure to detect and isolate data attacks on power network power flow measurements is proposed. This method can be used in conjunction with available bad data detection (BDD) methods to isolate multiple bad data which are otherwise difficult to handle. The proposed procedure relies on secure measurements of bus voltage magnitudes to define a measurement residual using potentially compromised active and reactive power flow measurements on transmission lines. The proposed residual can be calculated in real-time. In addition, the component of the proposed residual on any particular line depends only locally on the component of the data attack on the same line. This makes the proposed residual well-suited for distributed data attack isolation in large-scale power networks. Furthermore, it can be shown that the proposed procedure becomes more effective when measurements from multiple time instances can be utilized. A detailed numerical case study on the IEEE 14-bus benchmark system demonstrates the effectiveness of the proposed procedure.

Published in:

Smart Grid, IEEE Transactions on  (Volume:5 ,  Issue: 1 )