Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm

Power grid vulnerability to various cyber-attacks will undoubtedly increase with the widespread use of cutting-edge computer technologies in power systems monitoring and control. A common and effective cyber-attack on power grids is load redistribution (LR), which has the potential to confuse power...

Full description

Saved in:
Bibliographic Details
Main Authors: Ali Rahdan, Ali Khaleghi
Format: Article
Language:English
Published: Bilijipub publisher 2023-09-01
Series:Advances in Engineering and Intelligence Systems
Subjects:
Online Access:https://aeis.bilijipub.com/article_180426_0afab0ba81b41194fcd56752263c55ab.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1823856441657655296
author Ali Rahdan
Ali Khaleghi
author_facet Ali Rahdan
Ali Khaleghi
author_sort Ali Rahdan
collection DOAJ
description Power grid vulnerability to various cyber-attacks will undoubtedly increase with the widespread use of cutting-edge computer technologies in power systems monitoring and control. A common and effective cyber-attack on power grids is load redistribution (LR), which has the potential to confuse power re-dispatch and result in unneeded load loss. To protect the power system, it is essential to devise strategies for the best distribution of the scarce defensive resources, especially those that take the actions of the attackers into account. In order to stop LR attacks, the best budget allocation and the interplay between attack and defense are examined in this study. In particular, the bi-level modeling of LR attacks incorporates the attack and defense interactions. Based on their importance as targets for cyber protection, a few significant substations are chosen. To reduce the projected load loss subject to the attacker's capability, an efficient budget allocation approach based on greedy algorithm is devised for protecting the key substations. To select the optimum attack method and pinpoint the most vulnerable buses for crucial transmission assets, a quick greedy algorithm is proposed. The proposed approaches are put to the test in various scenarios using an IEEE test system, and the simulation results show that they work. This study provides fresh information on efficiently preventing and reducing the LR attack.
format Article
id doaj-art-924798ab2f2347ac8577dda9b910ca37
institution Kabale University
issn 2821-0263
language English
publishDate 2023-09-01
publisher Bilijipub publisher
record_format Article
series Advances in Engineering and Intelligence Systems
spelling doaj-art-924798ab2f2347ac8577dda9b910ca372025-02-12T08:47:20ZengBilijipub publisherAdvances in Engineering and Intelligence Systems2821-02632023-09-010020311210.22034/aeis.2023.396397.1095180426Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy AlgorithmAli Rahdan0Ali Khaleghi1Department of Electrical Engineering, Shahid Beheshti University, Tehran, 1983969411, IranDepartment of Electrical Engineering, Shahid Beheshti University, Tehran, 1983969411, IranPower grid vulnerability to various cyber-attacks will undoubtedly increase with the widespread use of cutting-edge computer technologies in power systems monitoring and control. A common and effective cyber-attack on power grids is load redistribution (LR), which has the potential to confuse power re-dispatch and result in unneeded load loss. To protect the power system, it is essential to devise strategies for the best distribution of the scarce defensive resources, especially those that take the actions of the attackers into account. In order to stop LR attacks, the best budget allocation and the interplay between attack and defense are examined in this study. In particular, the bi-level modeling of LR attacks incorporates the attack and defense interactions. Based on their importance as targets for cyber protection, a few significant substations are chosen. To reduce the projected load loss subject to the attacker's capability, an efficient budget allocation approach based on greedy algorithm is devised for protecting the key substations. To select the optimum attack method and pinpoint the most vulnerable buses for crucial transmission assets, a quick greedy algorithm is proposed. The proposed approaches are put to the test in various scenarios using an IEEE test system, and the simulation results show that they work. This study provides fresh information on efficiently preventing and reducing the LR attack.https://aeis.bilijipub.com/article_180426_0afab0ba81b41194fcd56752263c55ab.pdfload redistribution attacksphasor measurements unitsfalse data injection attackspmu allocationgreedy algorithm
spellingShingle Ali Rahdan
Ali Khaleghi
Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm
Advances in Engineering and Intelligence Systems
load redistribution attacks
phasor measurements units
false data injection attacks
pmu allocation
greedy algorithm
title Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm
title_full Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm
title_fullStr Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm
title_full_unstemmed Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm
title_short Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm
title_sort phasor measurement units allocation against load redistribution attacks based on greedy algorithm
topic load redistribution attacks
phasor measurements units
false data injection attacks
pmu allocation
greedy algorithm
url https://aeis.bilijipub.com/article_180426_0afab0ba81b41194fcd56752263c55ab.pdf
work_keys_str_mv AT alirahdan phasormeasurementunitsallocationagainstloadredistributionattacksbasedongreedyalgorithm
AT alikhaleghi phasormeasurementunitsallocationagainstloadredistributionattacksbasedongreedyalgorithm