Abstract
Moving target defense (MTD) is a new defensive strategy protecting the power system state estimation from cyberattacks. Using the distributed flexible ac transmission system (D-FACTS), MTD works by actively perturbing the branch parameters that are needed to construct the false data injection (FDI) attacks. Although there are many pioneer works on MTD, the relationship between the construction of MTD and detection of FDI attacks has not been revealed. In this article, we reveal the correlation between MTD design and FDI detection and optimize MTD’s performance in terms of detecting FDI attacks. We provide a sufficient condition for a specially designed MTD to detect and identify the FDI attack and a necessary condition for general MTDs to protect the state estimates from being independently modified. With the aim to reduce the number of measurements that can be manipulated by the attacker after MTD, we develop a heuristic algorithm to compute a near-optimal solution for the deployment of D-FACTS devices. Moreover, we prove that the coordinated design of consecutive perturbation schemes within an MTD cycle can improve the performance of MTD in terms of detecting FDI attacks. Finally, we conduct extensive simulations with the IEEE power system test cases to validate our findings.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.