Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm
Power grid vulnerability to various cyber-attacks will undoubtedly increase with the widespread use of cutting-edge computer technologies in power systems monitoring and control. A common and effective cyber-attack on power grids is load redistribution (LR), which has the potential to confuse power...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Bilijipub publisher
2023-09-01
|
Series: | Advances in Engineering and Intelligence Systems |
Subjects: | |
Online Access: | https://aeis.bilijipub.com/article_180426_0afab0ba81b41194fcd56752263c55ab.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1823856441657655296 |
---|---|
author | Ali Rahdan Ali Khaleghi |
author_facet | Ali Rahdan Ali Khaleghi |
author_sort | Ali Rahdan |
collection | DOAJ |
description | Power grid vulnerability to various cyber-attacks will undoubtedly increase with the widespread use of cutting-edge computer technologies in power systems monitoring and control. A common and effective cyber-attack on power grids is load redistribution (LR), which has the potential to confuse power re-dispatch and result in unneeded load loss. To protect the power system, it is essential to devise strategies for the best distribution of the scarce defensive resources, especially those that take the actions of the attackers into account. In order to stop LR attacks, the best budget allocation and the interplay between attack and defense are examined in this study. In particular, the bi-level modeling of LR attacks incorporates the attack and defense interactions. Based on their importance as targets for cyber protection, a few significant substations are chosen. To reduce the projected load loss subject to the attacker's capability, an efficient budget allocation approach based on greedy algorithm is devised for protecting the key substations. To select the optimum attack method and pinpoint the most vulnerable buses for crucial transmission assets, a quick greedy algorithm is proposed. The proposed approaches are put to the test in various scenarios using an IEEE test system, and the simulation results show that they work. This study provides fresh information on efficiently preventing and reducing the LR attack. |
format | Article |
id | doaj-art-924798ab2f2347ac8577dda9b910ca37 |
institution | Kabale University |
issn | 2821-0263 |
language | English |
publishDate | 2023-09-01 |
publisher | Bilijipub publisher |
record_format | Article |
series | Advances in Engineering and Intelligence Systems |
spelling | doaj-art-924798ab2f2347ac8577dda9b910ca372025-02-12T08:47:20ZengBilijipub publisherAdvances in Engineering and Intelligence Systems2821-02632023-09-010020311210.22034/aeis.2023.396397.1095180426Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy AlgorithmAli Rahdan0Ali Khaleghi1Department of Electrical Engineering, Shahid Beheshti University, Tehran, 1983969411, IranDepartment of Electrical Engineering, Shahid Beheshti University, Tehran, 1983969411, IranPower grid vulnerability to various cyber-attacks will undoubtedly increase with the widespread use of cutting-edge computer technologies in power systems monitoring and control. A common and effective cyber-attack on power grids is load redistribution (LR), which has the potential to confuse power re-dispatch and result in unneeded load loss. To protect the power system, it is essential to devise strategies for the best distribution of the scarce defensive resources, especially those that take the actions of the attackers into account. In order to stop LR attacks, the best budget allocation and the interplay between attack and defense are examined in this study. In particular, the bi-level modeling of LR attacks incorporates the attack and defense interactions. Based on their importance as targets for cyber protection, a few significant substations are chosen. To reduce the projected load loss subject to the attacker's capability, an efficient budget allocation approach based on greedy algorithm is devised for protecting the key substations. To select the optimum attack method and pinpoint the most vulnerable buses for crucial transmission assets, a quick greedy algorithm is proposed. The proposed approaches are put to the test in various scenarios using an IEEE test system, and the simulation results show that they work. This study provides fresh information on efficiently preventing and reducing the LR attack.https://aeis.bilijipub.com/article_180426_0afab0ba81b41194fcd56752263c55ab.pdfload redistribution attacksphasor measurements unitsfalse data injection attackspmu allocationgreedy algorithm |
spellingShingle | Ali Rahdan Ali Khaleghi Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm Advances in Engineering and Intelligence Systems load redistribution attacks phasor measurements units false data injection attacks pmu allocation greedy algorithm |
title | Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm |
title_full | Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm |
title_fullStr | Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm |
title_full_unstemmed | Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm |
title_short | Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm |
title_sort | phasor measurement units allocation against load redistribution attacks based on greedy algorithm |
topic | load redistribution attacks phasor measurements units false data injection attacks pmu allocation greedy algorithm |
url | https://aeis.bilijipub.com/article_180426_0afab0ba81b41194fcd56752263c55ab.pdf |
work_keys_str_mv | AT alirahdan phasormeasurementunitsallocationagainstloadredistributionattacksbasedongreedyalgorithm AT alikhaleghi phasormeasurementunitsallocationagainstloadredistributionattacksbasedongreedyalgorithm |