Multi-Objective False Data Injection Attacks of Cyber-Physical Power Systems

In cyber-physical power systems (CPPSs), false data injection attack (FDIA) has drawn much attention due to its stealthiness. It is of great importance to investigate the potential behaviors of attackers to improve the cyber-security of CPPSs. However, most FDIA models are often constructed separate...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on circuits and systems. II, Express briefs Express briefs, 2022-09, Vol.69 (9), p.3924-3928
Hauptverfasser: Lu, Kang-Di, Wu, Zheng-Guang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3928
container_issue 9
container_start_page 3924
container_title IEEE transactions on circuits and systems. II, Express briefs
container_volume 69
creator Lu, Kang-Di
Wu, Zheng-Guang
description In cyber-physical power systems (CPPSs), false data injection attack (FDIA) has drawn much attention due to its stealthiness. It is of great importance to investigate the potential behaviors of attackers to improve the cyber-security of CPPSs. However, most FDIA models are often constructed separately on the effect of attackers or the impact of attacks. Accordingly, this brief proposes a multi-objective stealthy FDIA scheme in AC grid model. The attack model is described as a multi-objective optimization problem, where minimization of contaminated measurements and maximization of the attack impact are considered as two objectives while remaining stealthy. To deal with the established attack model, a non-dominated sorting genetic algorithm II (NSGAII) is introduced as the solver. To improve the efficiency of generating attack vector, a new representation mechanism is proposed to describe locations and values of injected states. Additionally, during the evolutionary process, we propose a mutation operation to balance the sparsity and impact of FDIA. Simulation results on the IEEE 14-bus, 30-bus, and 118-bus systems demonstrate the feasibility of the NSGAII-based FDIA model.
doi_str_mv 10.1109/TCSII.2022.3181827
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2708642748</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9792416</ieee_id><sourcerecordid>2708642748</sourcerecordid><originalsourceid>FETCH-LOGICAL-c225t-843201a5afc8f1e98e8a3ff4c765464721e39ada9c9196d38ffb6d0fb2b532d33</originalsourceid><addsrcrecordid>eNo9kNFKwzAUhosoOKcvoDcBrzuTk7RJLkd1WphssHkd0jTBzm2dSab07V234dX5OfzfOfAlyT3BI0KwfFoWi7IcAQYYUSKIAH6RDEiWiZRySS77zGTKOePXyU0IK4xBYgqDZPq-X8cmnVUra2LzY9FEr4NFzzpqVG6Py3aLxjFq8xVQ61DRVdan888uNEav0bz9tR4tuhDtJtwmV67H785zmHxMXpbFWzqdvZbFeJoagCymglHARGfaGeGIlcIKTZ1jhucZyxkHYqnUtZZGEpnXVDhX5TV2FVQZhZrSYfJ4urvz7ffehqhW7d5vDy8VcCxyBpyJQwtOLePbELx1auebjfadIlj11tTRmuqtqbO1A_Rwghpr7T8guQRGcvoHoypoVw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2708642748</pqid></control><display><type>article</type><title>Multi-Objective False Data Injection Attacks of Cyber-Physical Power Systems</title><source>IEEE Electronic Library (IEL)</source><creator>Lu, Kang-Di ; Wu, Zheng-Guang</creator><creatorcontrib>Lu, Kang-Di ; Wu, Zheng-Guang</creatorcontrib><description>In cyber-physical power systems (CPPSs), false data injection attack (FDIA) has drawn much attention due to its stealthiness. It is of great importance to investigate the potential behaviors of attackers to improve the cyber-security of CPPSs. However, most FDIA models are often constructed separately on the effect of attackers or the impact of attacks. Accordingly, this brief proposes a multi-objective stealthy FDIA scheme in AC grid model. The attack model is described as a multi-objective optimization problem, where minimization of contaminated measurements and maximization of the attack impact are considered as two objectives while remaining stealthy. To deal with the established attack model, a non-dominated sorting genetic algorithm II (NSGAII) is introduced as the solver. To improve the efficiency of generating attack vector, a new representation mechanism is proposed to describe locations and values of injected states. Additionally, during the evolutionary process, we propose a mutation operation to balance the sparsity and impact of FDIA. Simulation results on the IEEE 14-bus, 30-bus, and 118-bus systems demonstrate the feasibility of the NSGAII-based FDIA model.</description><identifier>ISSN: 1549-7747</identifier><identifier>EISSN: 1558-3791</identifier><identifier>DOI: 10.1109/TCSII.2022.3181827</identifier><identifier>CODEN: ITCSFK</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Biological system modeling ; Computational modeling ; Cyber-physical power systems ; Cyber-physical systems ; cyber-security ; Cybersecurity ; false data injection attacks ; genetic algorithm ; Genetic algorithms ; Mathematical models ; multi-objective optimization problem ; Multiple objective analysis ; Optimization ; Pollution measurement ; Sociology ; Sorting ; Sorting algorithms</subject><ispartof>IEEE transactions on circuits and systems. II, Express briefs, 2022-09, Vol.69 (9), p.3924-3928</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c225t-843201a5afc8f1e98e8a3ff4c765464721e39ada9c9196d38ffb6d0fb2b532d33</citedby><cites>FETCH-LOGICAL-c225t-843201a5afc8f1e98e8a3ff4c765464721e39ada9c9196d38ffb6d0fb2b532d33</cites><orcidid>0000-0002-7054-0008 ; 0000-0002-0131-5085</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9792416$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27923,27924,54757</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9792416$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lu, Kang-Di</creatorcontrib><creatorcontrib>Wu, Zheng-Guang</creatorcontrib><title>Multi-Objective False Data Injection Attacks of Cyber-Physical Power Systems</title><title>IEEE transactions on circuits and systems. II, Express briefs</title><addtitle>TCSII</addtitle><description>In cyber-physical power systems (CPPSs), false data injection attack (FDIA) has drawn much attention due to its stealthiness. It is of great importance to investigate the potential behaviors of attackers to improve the cyber-security of CPPSs. However, most FDIA models are often constructed separately on the effect of attackers or the impact of attacks. Accordingly, this brief proposes a multi-objective stealthy FDIA scheme in AC grid model. The attack model is described as a multi-objective optimization problem, where minimization of contaminated measurements and maximization of the attack impact are considered as two objectives while remaining stealthy. To deal with the established attack model, a non-dominated sorting genetic algorithm II (NSGAII) is introduced as the solver. To improve the efficiency of generating attack vector, a new representation mechanism is proposed to describe locations and values of injected states. Additionally, during the evolutionary process, we propose a mutation operation to balance the sparsity and impact of FDIA. Simulation results on the IEEE 14-bus, 30-bus, and 118-bus systems demonstrate the feasibility of the NSGAII-based FDIA model.</description><subject>Biological system modeling</subject><subject>Computational modeling</subject><subject>Cyber-physical power systems</subject><subject>Cyber-physical systems</subject><subject>cyber-security</subject><subject>Cybersecurity</subject><subject>false data injection attacks</subject><subject>genetic algorithm</subject><subject>Genetic algorithms</subject><subject>Mathematical models</subject><subject>multi-objective optimization problem</subject><subject>Multiple objective analysis</subject><subject>Optimization</subject><subject>Pollution measurement</subject><subject>Sociology</subject><subject>Sorting</subject><subject>Sorting algorithms</subject><issn>1549-7747</issn><issn>1558-3791</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kNFKwzAUhosoOKcvoDcBrzuTk7RJLkd1WphssHkd0jTBzm2dSab07V234dX5OfzfOfAlyT3BI0KwfFoWi7IcAQYYUSKIAH6RDEiWiZRySS77zGTKOePXyU0IK4xBYgqDZPq-X8cmnVUra2LzY9FEr4NFzzpqVG6Py3aLxjFq8xVQ61DRVdan888uNEav0bz9tR4tuhDtJtwmV67H785zmHxMXpbFWzqdvZbFeJoagCymglHARGfaGeGIlcIKTZ1jhucZyxkHYqnUtZZGEpnXVDhX5TV2FVQZhZrSYfJ4urvz7ffehqhW7d5vDy8VcCxyBpyJQwtOLePbELx1auebjfadIlj11tTRmuqtqbO1A_Rwghpr7T8guQRGcvoHoypoVw</recordid><startdate>20220901</startdate><enddate>20220901</enddate><creator>Lu, Kang-Di</creator><creator>Wu, Zheng-Guang</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0002-7054-0008</orcidid><orcidid>https://orcid.org/0000-0002-0131-5085</orcidid></search><sort><creationdate>20220901</creationdate><title>Multi-Objective False Data Injection Attacks of Cyber-Physical Power Systems</title><author>Lu, Kang-Di ; Wu, Zheng-Guang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c225t-843201a5afc8f1e98e8a3ff4c765464721e39ada9c9196d38ffb6d0fb2b532d33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Biological system modeling</topic><topic>Computational modeling</topic><topic>Cyber-physical power systems</topic><topic>Cyber-physical systems</topic><topic>cyber-security</topic><topic>Cybersecurity</topic><topic>false data injection attacks</topic><topic>genetic algorithm</topic><topic>Genetic algorithms</topic><topic>Mathematical models</topic><topic>multi-objective optimization problem</topic><topic>Multiple objective analysis</topic><topic>Optimization</topic><topic>Pollution measurement</topic><topic>Sociology</topic><topic>Sorting</topic><topic>Sorting algorithms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lu, Kang-Di</creatorcontrib><creatorcontrib>Wu, Zheng-Guang</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on circuits and systems. II, Express briefs</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lu, Kang-Di</au><au>Wu, Zheng-Guang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Multi-Objective False Data Injection Attacks of Cyber-Physical Power Systems</atitle><jtitle>IEEE transactions on circuits and systems. II, Express briefs</jtitle><stitle>TCSII</stitle><date>2022-09-01</date><risdate>2022</risdate><volume>69</volume><issue>9</issue><spage>3924</spage><epage>3928</epage><pages>3924-3928</pages><issn>1549-7747</issn><eissn>1558-3791</eissn><coden>ITCSFK</coden><abstract>In cyber-physical power systems (CPPSs), false data injection attack (FDIA) has drawn much attention due to its stealthiness. It is of great importance to investigate the potential behaviors of attackers to improve the cyber-security of CPPSs. However, most FDIA models are often constructed separately on the effect of attackers or the impact of attacks. Accordingly, this brief proposes a multi-objective stealthy FDIA scheme in AC grid model. The attack model is described as a multi-objective optimization problem, where minimization of contaminated measurements and maximization of the attack impact are considered as two objectives while remaining stealthy. To deal with the established attack model, a non-dominated sorting genetic algorithm II (NSGAII) is introduced as the solver. To improve the efficiency of generating attack vector, a new representation mechanism is proposed to describe locations and values of injected states. Additionally, during the evolutionary process, we propose a mutation operation to balance the sparsity and impact of FDIA. Simulation results on the IEEE 14-bus, 30-bus, and 118-bus systems demonstrate the feasibility of the NSGAII-based FDIA model.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TCSII.2022.3181827</doi><tpages>5</tpages><orcidid>https://orcid.org/0000-0002-7054-0008</orcidid><orcidid>https://orcid.org/0000-0002-0131-5085</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1549-7747
ispartof IEEE transactions on circuits and systems. II, Express briefs, 2022-09, Vol.69 (9), p.3924-3928
issn 1549-7747
1558-3791
language eng
recordid cdi_proquest_journals_2708642748
source IEEE Electronic Library (IEL)
subjects Biological system modeling
Computational modeling
Cyber-physical power systems
Cyber-physical systems
cyber-security
Cybersecurity
false data injection attacks
genetic algorithm
Genetic algorithms
Mathematical models
multi-objective optimization problem
Multiple objective analysis
Optimization
Pollution measurement
Sociology
Sorting
Sorting algorithms
title Multi-Objective False Data Injection Attacks of Cyber-Physical Power Systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T15%3A14%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Multi-Objective%20False%20Data%20Injection%20Attacks%20of%20Cyber-Physical%20Power%20Systems&rft.jtitle=IEEE%20transactions%20on%20circuits%20and%20systems.%20II,%20Express%20briefs&rft.au=Lu,%20Kang-Di&rft.date=2022-09-01&rft.volume=69&rft.issue=9&rft.spage=3924&rft.epage=3928&rft.pages=3924-3928&rft.issn=1549-7747&rft.eissn=1558-3791&rft.coden=ITCSFK&rft_id=info:doi/10.1109/TCSII.2022.3181827&rft_dat=%3Cproquest_RIE%3E2708642748%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2708642748&rft_id=info:pmid/&rft_ieee_id=9792416&rfr_iscdi=true