Download PDF
Research Article  |  Open Access  |  30 Jul 2024

Importance-driven denial-of-service attack strategy design against remote state estimation in multi-agent intelligent power systems

Views: 279 |  Downloads: 57 |  Cited:  0
Intell Robot 2024;4(3):244-55.
10.20517/ir.2024.16 |  © The Author(s) 2024.
Author Information
Article Notes
Cite This Article

Abstract

This paper introduces a novel importance-driven denial of service (IDoS) attack strategy aimed at impairing the quality of remote estimators for target agents within multi-agent intelligent power systems. The strategy features two key aspects. Firstly, the IDoS attack strategy concentrates on target agents, enabling attackers to determine the voltage sensitivity of each agent based on limited information. By utilizing these sensitivities, the proposed strategy selectively targets agents with high sensitivity to amplify disruption on the target agent. Secondly, unlike most existing denial of service attack strategies that adhere to predefined attack sequences, IDoS attacks can selectively target important packets on highly sensitive agents, causing further disruption to the target agent. Simulation results on the IEEE 39-Bus system demonstrate that, compared to existing denial of service attack strategies, the proposed IDoS attack strategy significantly diminishes the estimation quality of the target agent, confirming its effectiveness from an attacker's perspective.

Keywords

Multi-agent power systems, remote state estimation, DoS attacks, cyber attacks

1. INTRODUCTION

The power system is the backbone of society, directly impacting people's lives and a nation's economy [1]. However, as digitalization advances, interconnected power systems present more opportunities for attackers [2]. Among the various types of attacks, denial of service (DoS) attacks and deception attacks are predominant [3]. Unlike deception attacks, DoS attacks aim to exhaust network resources, cause congestion, and disrupt user access by flooding the system with a large volume of meaningless packets [4]. Despite the apparent simplicity of DoS attacks, their destructive potential poses a significant threat to the stability of the power system, warranting heightened attention [5,6].

In the field of power system security literature, there are generally two main perspectives: the defender's perspective and the attacker's perspective. The defender's perspective focuses on developing various methods to counter increasingly severe cyber attacks, including techniques such as proportional-integral observers [7], consensus control [8], bandwidth-conscious event-based control [9], and collision-free multi-platoon control [10]. In contrast, the attacker's perspective predominantly explores more destructive attack strategies or seeks to enhance stealthiness. For instance, [11] optimizes attack scheduling to maximize destructive impact and proposes that continuous attacks can significantly amplify the potency of DoS attacks. Building upon this, [12] addresses attack scheduling under energy constraints. To counteract remote estimators, studies such as [1315] respectively delve into stochastic DoS attack allocation, adaptive dynamic programming approach, and attack energy management. Furthermore, studies such as [1618] explore the complexity of attack scheduling, encompassing aspects such as sensors, communication protocols, and cooperation strategies.

In this context, most DoS attacks are typically indiscriminate, meaning the attacker lacks specific knowledge about the target system and employs random or preset patterns of attack [11]. On the other hand, deception attacks are based on the attacker having an in-depth understanding of the system [19], including detailed knowledge of its structure, parameters, controller gains, and estimator gains. These two types of attackers represent two extremes: one is completely unaware of the system and relies on random or preset attack strategies, while the other is well-informed about the system and can leverage detailed information to execute precise attacks. Typically, certain information about power systems, such as topology and system output, is relatively easy for attackers to obtain, while other critical details, such as estimator gains, are harder to access. Therefore, from the attacker's perspective, devising an attack strategy based on readily accessible system information is crucial, which is a key motivation for this paper.

Although the aforementioned literature endeavors to increase the destructiveness of attacks, two critical issues deserve attention. Firstly, most current DoS attack strategies indiscriminately target the entire system in a predetermined sequence. However, in real-world power systems, certain agents hold greater significance, such as those serving airports, hospitals, financial centers, and control centers [20]. Designing a DoS attack strategy to inflict greater damage on specific agents is one of the primary motivations of this paper. Secondly, certain information in power systems is easily accessible to attackers, such as packet importance [21], system topology, and rated parameters. Effectively leveraging this information to amplify the destructiveness of DoS attacks serves as another motivation for this paper.

To tackle the challenges outlined above, this paper first proposes a method for calculating the sensitivity of target agent voltages. Secondly, we utilize these sensitivities to develop a novel importance-driven DoS (IDoS) attack strategy, which integrates agent voltage sensitivity with packet importance. To achieve these objectives, we pose two questions:

(1) How to design a method to calculate voltage sensitivity using limited information?

(2) How to design the IDoS attack strategy by integrating sensitivity information with packet importance?

The primary focus of this paper is to address these two inquiries. The key innovations of this paper are summarized as follows:

(1) A new method for computing voltage sensitivity is proposed. Unlike existing sensitivity calculation approaches [2224], this method reduces reliance on system information, including current state values and their respective rates of change, thereby enabling attackers to implement attacks more practically.

(2) A novel IDoS attack strategy is designed, which integrates both voltage sensitivity and packet importance. Unlike most DoS attack strategies that target indiscriminately [11,12], our approach allocates more attack energy to important packets on sensitive agents, thus resulting in a greater potential for disruption on the target agent compared to other attack strategies.

The structure of the subsequent sections of this paper is as follows: Section 2 discusses the calculation of voltage sensitivity. Section 3 presents the design process of the IDoS attack strategy. Section 4 conducts simulations to assess the destructive capability of the attack strategy. Finally, Section 5 provides a summary of the study.

Notation Let the superscript $$ \Re $$ indicate the real part of a parameter, the superscript $$ \Im $$ denote the imaginary part, and the superscript $$ T $$ represent the transpose of a matrix. The notation $$ \|\cdot\| $$ denotes the Euclidean norm, $$ \Delta $$ signifies a change in a parameter, and $$ \exp(\cdot) $$ refers to the exponential function with base $$ e $$.

2. SYSTEM AND STATE ESTIMATION

In a multi-agent power system with $$ n $$ agents, the measured values obtained from devices such as phasor measurement units (PMUs) can be represented as $$ z(k)=[z_1(k)\, \cdots\, z_n(k)]^T $$, where $$ k $$ indicates the discrete time step, $$ z_i(k)=V_i(k) $$ and $$ V_i $$ is the voltage of the $$ i(i=1, \cdots, \, n) $$th agent. The system state can be denoted as $$ x(k)=[x_1(k)\, \cdots\, x_n(k)]^T $$, where $$ x_i(k)=[V_i(k)\ I_i(k)\ \theta_i(k)]^T $$, in which $$ I_i $$ signifies the injected current at the $$ i $$th agent and $$ \theta_i $$ is the phase angle. Therefore, the system model can be expressed as:

$$ z(k)=h(x(k))+\epsilon(k), $$

where $$ \epsilon(k) $$ denotes the measurement noise.

Various methods are proposed to estimate the system's state, with weighted least squares (WLS) being widely favored, defined as follows:

$$ \hat{x}(k)= \arg\min\limits_{x(k)}[ z(k)-h(x(k))] ^\text{T}Y^{-1}[z(k)-h(x(k))], $$

where $$ Y $$ denotes the covariance matrix of measurement errors.

After completing the state estimation process, the detection of faulty data is typically performed to identify potential measurement errors. Among various methods for detection, the maximum normalized residual test is the most commonly used. In this method, the residual is defined as:

$$ \gamma(k)=\left \| z(k)-h(\hat{x(k)}) \right \|_2 . $$

The parameter $$ \gamma(k) $$ serves as a crucial metric for assessing estimation quality. A lower $$ \gamma(k) $$ value indicates superior estimation performance. Therefore, our study focuses on designing a DoS attack strategy from the attacker's perspective to maximize $$ \gamma(k) $$.

3. IDOS ATTACK STRATEGY DESIGN

In this section, a novel IDoS attack strategy from the attacker's perspective is introduced. This strategy leverages the voltage sensitivity of agents and the importance of packets. By allocating more attack energy to the critical data packets of highly sensitive agents, it maximizes the estimation error of the remote estimator. The design comprises two main steps: firstly, analyzing the voltage-current relationships of all agents in the system to determine the voltage sensitivity of the target agent to each agent; secondly, allocating more attack energy to important packets on highly sensitive agents, thereby inflicting more severe damage on the target agent.

3.1 Voltage sensitivity to powers

To enhance the feasibility and practicality of the proposed IDoS attack, this subsection introduces a new method for calculating voltage sensitivity. This method minimizes the attacker's need for extensive system information, requiring only the power system's topology and rated parameters to accurately compute the voltage sensitivity of each agent. The calculation process is as follows: First, the relationship between system voltage and current is established through power flow analysis. Next, the active and reactive voltage sensitivities of the target agent are determined from this relationship. Finally, the voltage sensitivity of the target to all other agents is obtained using an improved entropy method.

In the multi-agent power system, the first agent is designated as the reference agent with its voltage set as the reference voltage. The relationship between the voltage of each agent and the injected current can be expressed as follows:

$$ \begin{bmatrix}V_{1}\\V_{2}\\\vdots \\V_{n}\end{bmatrix}= \begin{bmatrix} 1 & 0 & \cdots & 0\\ \varphi _{2} & \Phi _{22}& \cdots & \Phi _{2n}\\ \vdots & \vdots & \ddots & \vdots\\ \varphi _{n} &\Phi _{n2} & \cdots & \Phi _{nn}\end{bmatrix} \begin{bmatrix}V_{1}\\I_{2}\\\vdots \\I_{n}\end{bmatrix}, $$

where

$$ \begin{equation*} \begin{aligned} &\Phi _{2n}=R_{2n}+jX_{2n},\,\Phi _{n2}=R_{n2}+jX_{n2},\\ &\Phi _{22}=-\sum\limits_{i=1,\,i\ne 2}^{n}(R_{2i}+jX_{2i}),\,\Phi _{nn}=-\sum\limits_{i=1}^{n-1}(R_{ni}+jX_{ni}), \end{aligned} \end{equation*} $$

in which $$ R_{ni}+jX_{ni}\ (i=1, \, \cdots, \, n) $$ represents the impedance of the line between the $$ i $$th agent and the $$ n $$th agent, $$ \varphi $$ denotes the scaling constant, and $$ V_i $$ and $$ I_i $$ refer to the rated voltage and rated injected current of the $$ i $$th agent, respectively.

Without loss of generality, we define the $$ \xi(\xi=1, \, \cdots, \, n) $$th agent as the target agent. For simplicity, let us assume that all agents except the $$ i $$th one have zero injected currents. Based on Equation (4), we obtain the following outcomes:

$$ (V^{\Re}_\xi +jV^{\Im}_\xi )(V^{\Re}_i-jV^{\Im}_i)-(V^{\Re}_{\varphi_\xi }+jV^{\Im}_{\varphi_\xi })(V^{\Re}_i-jV^{\Im}_i)=(R_i+jX_i)(P_i-jQ_i), $$

where $$ V_{\varphi_\xi }=\varphi_\xi V_1 $$, $$ P_i $$ and $$ Q_i $$ represent the rated active power and rated reactive power of the $$ i $$th agent, while $$ \Re $$ and $$ \Im $$ denote the real and imaginary parts of the parameters, respectively.

To understand how changes in active power $$ P_i $$ affect the voltage $$ V_\xi $$ of the target agent, we take the partial derivative of the active power with respect to Equation (5). This operation gives us the voltage-active sensitivity, which measures the change in voltage at agent $$ \xi $$ due to a change in active power at agent $$ i $$. The voltage-active sensitivity of the $$ \xi $$th agent to the $$ i $$th agent can be expressed as:

$$ \varepsilon _{Pi}=\frac{\partial V_\xi }{\partial P_i}=\frac{1}{V_\xi } (V^{\Re}_\xi \frac{\partial V^{\Re}_\xi }{\partial P_i}+V^{\Im}_\xi \frac{\partial V^{\Im}_\xi }{\partial P_i}). $$

Specifically, when $$ i=\xi $$, Equation (5) can be updated to:

$$ (V^{\Re}_{\varphi_\xi}+jV^{\Im}_{\varphi_\xi})(V^{\Re}_{\xi}-jV^{\Im}_{\xi })-V^2_\xi=(\sum\limits_{\substack{i = 1,\,i\ne \xi}}^{n}R_{\xi i}+j\sum\limits_{\substack{i = 1,\,i\ne \ell}}^{n}X_{\xi i} )(P_\xi -jQ_\xi ). $$

In this case, by taking the partial derivative of the active power with respect to Equation (7), the self-voltage sensitivity of the $$ \xi $$th agent is:

$$ \varepsilon _{P_\xi}=\frac{\partial V_\xi }{\partial P_\xi}=\frac{1}{V_\xi } (V^{\Re}_\xi \frac{\partial V^{\Re}_\xi }{\partial P_\xi}+V^{\Im}_\xi \frac{\partial V^{\Im}_\xi }{\partial P_\xi}). $$

This self-sensitivity reflects how changes in the active power of the target agent itself affect its own voltage. Parameters $$ \frac{\partial V^{\Re}_\xi }{\partial P_i} $$, $$ \frac{\partial V^{\Im}_\xi }{\partial P_i} $$, $$ \frac{\partial V^{\Re}_\xi }{\partial P_\xi} $$ and $$ \frac{\partial V^{\Im}_\xi }{\partial P_\xi} $$ in Equations (6) and (8) are determined by solving the following system of equations:

$$ \left\{\begin{matrix} \begin{aligned} \frac{\partial V^{\Re}_\xi}{\partial P_i} = &\frac{1}{V_i}(V^{\Re}_i(R_i+V^{\Re}_{\varphi_\xi}\frac{\partial V^{\Re}_i}{\partial P_i}+V^{\Im}_{\varphi_\xi}\frac{\partial V^{\Im}_i}{\partial P_i}-V^{\Re}_\xi\frac{\partial V^{\Re}_i}{\partial P_i}-V^{\Im}_\xi\frac{\partial V^{\Im}_i}{\partial P_i})\\ &-V^{\Im}_i(V^{\Im}_{\varphi_\xi}\frac{\partial V^{\Re}_i}{\partial P_i}-V^{\Re}_{\varphi_\xi}\frac{\partial V^{\Im}_i}{\partial P_i}-V^{\Im}_\xi\frac{\partial V^{\Re}_i}{\partial P_i}+V^{\Re}_\xi\frac{\partial V^{\Im}_i}{\partial P_i}+X_i)),\\ \frac{\partial V^{\Im}_\xi}{\partial P_i} = &\frac{1}{V_i^{\Re}}((V^{\Im}_{\varphi_\xi}-V^{\Im}_\xi)\frac{\partial V^{\Re}_i}{\partial P_i}-(V^{\Re}_{\varphi_\xi}-V^{\Re}_\xi)\frac{\partial V^{\Im}_i}{\partial P_i}+V^{\Im}_i\frac{\partial V^{\Re}_i}{\partial P_i}+X_i),\\ \frac{\partial V^{\Re}_\xi}{\partial P_\xi} =& \frac{2V_\xi^\Im \Phi_{\xi\xi}^\Im-V_{\varphi_\xi}^\Im \Phi_{\xi\xi}^\Im-V_{\varphi_\xi}^\Re \Phi_{\xi\xi}^\Re }{(V_{\varphi_\xi}^\Re)^2+(V_{\varphi_\xi}^\Im)^2-2V_{\varphi_\xi}^\Re V_{\xi}^\Re-2V_{\varphi_\xi}^\Im V_{\xi}^\Im},\\ \frac{\partial V^{\Im}_\xi}{\partial P_\xi} =&\frac{\Phi_{\xi\xi}^\Im}{V_{\varphi_\xi}^\Re}+\frac{V_{\varphi_\xi}^\Re \partial V^{\Re}_\xi}{V_{\varphi_\xi}^\Im \partial P_\xi}. \end{aligned} \end{matrix}\right. $$

Through the aforementioned steps, the voltage-active power sensitivity vector $$ \varepsilon _P=[\varepsilon_{P_1}\, \cdots\, \varepsilon_{P_n}] $$ can be obtained.

Similarly, from Equation (5), we can obtain the voltage-reactive sensitivity of the $$ \xi $$th agent to the $$ i $$th agent as:

$$ \begin{aligned} \varepsilon _{Q_i}&=\frac{\partial V_\xi }{\partial Q_i}=\frac{1}{V_\xi } (V^{\Re}_\xi \frac{\partial V^{\Re}_\xi }{\partial Q_i}+V^{\Im}_\xi \frac{\partial V^{\Im}_\xi }{\partial Q_i}),\\ \varepsilon _{Q_\xi}&=\frac{\partial V_\xi }{\partial Q_\xi}=\frac{1}{V_\xi } (V^{\Re}_\xi \frac{\partial V^{\Re}_\xi }{\partial Q_\xi}+V^{\Im}_\xi \frac{\partial V^{\Im}_\xi }{\partial Q_\xi}), \end{aligned} $$

where the unknown parameters $$ \frac{\partial V^{\Re}_\xi }{\partial Q_i} $$, $$ \frac{\partial V^{\Im}_\xi }{\partial Q_i} $$, $$ \frac{\partial V^{\Re}_\xi }{\partial Q_\xi} $$ and $$ \frac{\partial V^{\Im}_\xi }{\partial Q_\xi} $$ can be solved by the following system of equations:

$$ \left\{\begin{matrix} \begin{aligned} \frac{\partial V^\Re_\xi}{\partial Q_i}=&\frac{1}{V_i}(V^{\Re}_i(X_i+V^{\Re}_{\varphi_\xi}\frac{\partial V^{\Re}_i}{\partial Q_i}+V^{\Im}_{\varphi_\xi}\frac{\partial V^{\Im}_i}{\partial Q_i}-V^{\Re}_\xi\frac{\partial V^{\Re}_i}{\partial Q_i}-V^{\Im}_\xi\frac{\partial V^{\Im}_i}{\partial Q_i})\\ &-V^{\Im}_i(V^{\Im}_{\varphi_\xi}\frac{\partial V^{\Re}_i}{\partial Q_i}-V^{\Re}_{\varphi_\xi}\frac{\partial V^{\Im}_i}{\partial Q_i}-V^{\Im}_\xi\frac{\partial V^{\Re}_i}{\partial Q_i}+V^{\Re}_\xi\frac{\partial V^{\Im}_i}{\partial Q_i}-R_i)),\\ \frac{\partial V^{\Im}_\xi}{\partial Q_i} = &\frac{1}{V_i^{\Re}}((V^{\Im}_{\varphi_\xi}-V^{\Im}_\xi)\frac{\partial V^{\Re}_i}{\partial Q_i}-(V^{\Re}_{\varphi_\xi}-V^{\Re}_\xi)\frac{\partial V^{\Im}_i}{\partial Q_i}+V^{\Im}_i\frac{\partial V^{\Re}_i}{\partial Q_i}-R_i),\\ \frac{\partial V^{\Re}_\xi}{\partial Q_\xi} =& \frac{V_{\varphi_\xi}^\Im \Phi _{\xi\xi}^\Re-2V_\xi^\Im \Phi_{\xi\xi}^\Re-V_{\varphi_\xi}^\Re \Phi_{\xi\xi}^\Im }{(V_{\varphi_\xi}^\Re)^2+(V_{\varphi_\xi}^\Im)^2-2V_{\varphi_\xi}^\Re V_{\xi}^\Re-2V_{\varphi_\xi}^\Im V_{\xi}^\Im},\\ \frac{\partial V^{\Im}_\xi}{\partial Q_\xi} =&\frac{V_{\varphi_\xi}^\Re \partial V^{\Re}_\xi}{V_{\varphi_\xi}^\Re \partial Q_\xi}-\frac{\Phi_{\xi\xi}^\Re}{V_{\varphi_\xi}^\Re}. \end{aligned} \end{matrix}\right. $$

Therefore, the voltage-reactive power sensitivity vector $$ \varepsilon _Q=[\varepsilon_{Q_1}\, \cdots\, \varepsilon_{Q_n}] $$ can be derived.

After normalizing these vectors, the Pearson correlation coefficient is introduced. The sliding window for the $$ i $$th agent is defined as:

$$ \varpi_i=\begin{cases} \left [ i,\,i+\psi\right ] , & \text{ if }i\leq n-\psi ;\\ \left [ i,\,n\right ]\cup \left [1,\,\psi -n+i\right ] , & \text{ otherwise,} \end{cases} $$

where the window length is $$ \psi+1 $$ and $$ \psi\leq n-1 $$. A shorter window can promptly respond to short-term data changes but may be susceptible to noise interference. Conversely, a longer window can effectively smooth out data, reducing the impact of noise, yet it may not be as sensitive to short-term fluctuations. Attackers can tailor their choice of window length based on the specific characteristics of the data.

As the window moves, the correlation coefficient can be calculated by:

$$ r_i(\varepsilon _{P}',\, \varepsilon _{Q}')=\frac{\sum\limits_{l\in\varpi _i}[(\varepsilon_{P_l}'-\bar{\varepsilon}_P')(\varepsilon_{Q_l}'-\bar{\varepsilon}_Q')]}{\sqrt{\sum\limits_{l\in\varpi _i}(\varepsilon_{P_l}'-\bar{\varepsilon}_P')^2 } \sqrt{\sum\limits_{l\in\varpi _i}(\varepsilon_{Q_l}'-\bar{\varepsilon}_Q')^2 }}, $$

where

$$ \begin{equation*} \begin{aligned} \varepsilon_{P_i}' &= \frac{\varepsilon_{P_i}-\min(\varepsilon_P)}{\max(\varepsilon_P)-\min(\varepsilon_P)},\ \bar{\varepsilon}_P'=\frac{1}{n}\sum\limits_{i=1}^{n}\varepsilon_{P_i}',\\ \varepsilon_{Q_i}' &= \frac{\varepsilon_{Q_i}-\min(\varepsilon_Q)}{\max(\varepsilon_Q)-\min(\varepsilon_Q)},\ \bar{\varepsilon}_Q'=\frac{1}{n}\sum\limits_{i=1}^{n}\varepsilon_{Q_i}'. \end{aligned} \end{equation*} $$

To capture the interrelationships among the elements in the sensitivity vector, we introduce exponential information entropy. Therefore, the voltage sensitivity of the target agent to the $$ i $$th agent is represented as:

$$ \varepsilon _i=\frac{\omega_P\varepsilon_{P_i}+\omega_Q\varepsilon_{Q_i}}{\omega_P+\omega_Q}, $$

where

$$ \begin{aligned} \omega_P&=(\sum\limits_{i=1}^{n}e^{-\varepsilon _{P_i}'}\log e^{-\varepsilon _{P_i}'})\sum\limits_{m=1}^{n}\frac{\varepsilon _{P_m}'r_{m}(\varepsilon _{P}',\, \varepsilon _{Q}')}{\sum\limits_{l=1}^{n} \varepsilon _{P_l}'},\\ \omega_Q&=(\sum\limits_{i=1}^{n}e^{-\varepsilon _{Q_i}'}\log e^{-\varepsilon _{Q_i}'})\sum\limits_{m=1}^{n}\frac{\varepsilon _{Q_m}'r_{m}(\varepsilon _{P}',\, \varepsilon _{Q}')}{\sum\limits_{l=1}^{n} \varepsilon _{Q_l}'}. \end{aligned} $$

Remark 1 Current methods for calculating voltage sensitivity necessitate power system topology, parameters, voltage, and power outputs to derive variations [2224], as demonstrated by:

$$ \begin{equation*} \Delta V_\xi=\Delta Q_i \varepsilon _{Q_i}+\Delta P_i \varepsilon _{P_i}, \end{equation*} $$

where $$ \Delta V_\xi $$ denotes the voltage change at the $$ \xi $$th agent, and $$ \Delta Q_i $$ and $$ \Delta P_i $$ represent changes in reactive and active power at the $$ i $$th agent, respectively. However, from an attacker's viewpoint, obtaining the system state information requires prolonged eavesdropping on the control center, posing significant challenges. Conversely, our proposed voltage sensitivity calculation method only requires obtaining the power system's topology and rated parameters, enhancing practicality and feasibility.

Remark 2 To obtain the sensitive information, an enhanced entropy-based weighting method is employed. Traditional entropy-based approaches [25,26] primarily address data uncertainty while disregarding inter-data relationships, which can lead to inaccuracies in weighting calculations. To overcome this limitation, this paper introduces exponential entropy and the Pearson correlation coefficient to respectively capture relationships among data and between active and reactive power, thereby enhancing the efficiency of comprehensive information utilization.

3.2 IDoS attack strategy design

By leveraging the sensitivity of each agent obtained previously, this section proposes a novel IDoS attack that allocates more attack energy to the important packets transmitted by highly sensitive agents, potentially causing greater disruption.

An experienced attacker targets the network channels between PMUs and control centers [Figure 1]; we can make the following assumptions about the capabilities of the attacker:

Importance-driven denial-of-service attack strategy design against remote state estimation in multi-agent intelligent power systems

Figure 1. IDoS attack scheme. IDos: Importance-driven denial of service.

Assumption 1 (1) The attacker can access the topology of the power system to calculate the voltage sensitivity of the $$ \xi $$th agent to each agent, forming a subset $$ \mathcal{S} =\{\varepsilon _{\xi_1}, \, \cdots, \, \varepsilon _{\xi_\eta} \} $$, where $$ \varepsilon _{\xi_1} > \, \cdots > \varepsilon _{\xi_\eta} $$ and $$ 1\leq\eta\leq n $$. It is evident that the $$ \xi $$th agent exhibits the highest sensitivity to the $$ \xi_1 $$th agent; (2) The attacker can eavesdrop on output packets and retain the latest non-attack packets.

Remark 1 In contrast to [2729], the attack strategy proposed in this paper does not require attackers to obtain hard-to-access information, such as real-time state values or control gains. This enhances the feasibility of Assumption 1.

Based on the aforementioned assumptions, attackers operate according to the following attack mechanism:

$$ \varsigma_i(k)=\begin{cases} 1,& \text{ if } \vartheta_i(k)>0;\\ 0,& \text{ otherwise}, \end{cases} $$

where

$$ \vartheta_i(k) =\left \|z_i(k_\iota)-z_i(k) \right \|^2-\frac{\rho}{\varepsilon_{\xi_i}} \left \| z_i(k_\iota) \right \|^2,\ \varepsilon_{\xi_i}\in \mathcal{S}, $$

in which $$ \rho > 0 $$ represents the attack parameter, determined by the attacker to adjust the attack frequency. $$ z_i(k) $$ stands for the output data of the $$ i $$th agent, and $$ z_i(k_\iota) $$ denotes the most recently received non-attack packet.

When $$ \varsigma_i(k)=1 $$, it indicates that the attacker initiates an attack on the $$ i $$th agent at time $$ k $$. As a result, the packet $$ z_i(k) $$ is attacked, rendering it inaccessible to the estimator. Conversely, when $$ \varsigma_i(k)=0 $$, it signifies the absence of attacks, leading to the update of the most recent non-attack packet as $$ z_i(k_\iota)=z_i(k) $$.

Remark 2 The IDoS attack model Equation (16) distinctly illustrates the correlation between attack behavior and the output packets $$ z_i(k) $$, $$ z_i(k_\iota) $$, voltage sensitivity $$ \varepsilon_{\xi_i} $$, and attack parameter $$ \rho $$. However, the variables $$ z_i(k) $$, $$ z_i(k_\iota) $$, and $$ \varepsilon_{\xi_i} $$ are beyond the attacker's control. The attacker can adjust the attack frequency by manipulating the attack parameter $$ \rho $$. When faced with energy constraints, increasing the attack parameter $$ \rho $$ enables the attacker to reduce attack instances, thus lowering energy consumption. Fundamentally, the proposed IDoS attack model effectively integrates voltage sensitivity, packet importance, and energy constraints.

Remark 3 The proposed IDoS attack strategy is inspired by the event-triggered mechanism, where only significant data packets are transmitted. Similarly, the attack model Equation (16) targets only important data packets. A higher value of $$ \vartheta_i(k) $$ indicates that the data packet $$ z_i(k) $$ is more important, and attacking this packet can cause greater harm. Despite these similarities, there are notable differences between the two. The widely used event-triggered mechanism [30] is defined as:

$$ \begin{equation*} \bar{\vartheta} (\cdot) = (z(k_\iota) - z(k))^T \Psi (y(k_z) - y(k)) - \bar{\rho} z^T(k)\Psi z(k), \end{equation*} $$

where $$ \bar{\rho} $$ is the trigger threshold parameter, and $$ \Psi $$ is the weighting matrix to be designed. In contrast, the IDoS attack model Equation (16) only requires the attacker to determine the attack parameter $$ \rho $$.

Remark 4 In reality, power systems typically encompass numerous agents. When attack energy remains constant, evenly distributing it across each agent leads to energy dispersion, thereby diminishing the attack's impact. Hence, the attack strategy proposed in this paper concentrates the attack energy on the most sensitive subset of agents, denoted as $$ \mathcal{S} $$. The size of this subset, denoted by $$ \eta \ (1 < \eta < n) $$, is determined by the attacker based on their attack resources and technical proficiency. Specifically, when $$ \eta=1 $$, the attacker targets important packets solely on the most sensitive agent, whereas with $$ \eta=n $$, the attacker simultaneously targets important packets across all agents.

4. EXPERIMENTAL SIMULATION RESULTS

To validate the disruptive potential of the proposed IDoS attack strategy, this section conducts simulation experiments on the IEEE 39-Bus system [Figure 2]. Firstly, the experiment explores the relationship between the attack parameter $$ \rho $$ and the number of attacks, enabling attackers to set appropriate attack parameters based on the available attack energy. Secondly, the proposed IDoS attack strategy is compared with two traditional DoS attack strategies and DoS attack strategies that consider only partial importance information, thereby verifying the effectiveness of the proposed IDoS attack.

Importance-driven denial-of-service attack strategy design against remote state estimation in multi-agent intelligent power systems

Figure 2. IEEE 39-Bus system.

Without loss of generality, Bus 16 is designated as the target agent. Using Equation (14), we obtain the voltage sensitivity of each agent as shown in Table 1. Setting $$ \eta=4 $$, $$ \epsilon(k)=3\exp (-k)\sin(k) $$, the four agents with the highest sensitivity are Bus 16, Bus 19, Bus 21, and Bus 17, i.e., $$ \mathcal{S} =\left\{0.4432, \, 0.1413, \, 0.1248, \, 0.1179 \right\} $$. To better reflect the destructiveness of the attack, we define the cumulative error as $$ J=\sum_{k}\gamma(k) $$.

Table 1

Sensitivity for each Bus

Bus 1Bus 2Bus 3Bus 4Bus 5Bus 6Bus 7Bus 8Bus 9Bus 10Bus 11Bus 12Bus 13
0.00170.00080.00120.00060.00080.00080.00520.00050.00130.00090.00090.00690.0009
Bus 14Bus 15Bus 16Bus 17Bus 18Bus 19Bus 20Bus 21Bus 22Bus 23Bus 24Bus 25Bus 26
0.00080.05890.44320.11790.00370.14130.00040.12480.00090.00320.04370.00350.0027
Bus 27Bus 28Bus 29Bus 30Bus 31Bus 32Bus 33Bus 34Bus 35Bus 36Bus 37Bus 38Bus 39
0.00200.02080.00180.00030.00020.00020.00020.00020.00020.00020.00020.00020.0060

According to the attack model Equation (16), the relationship between the attack parameter $$ \rho $$ and the number of attacks on each sensitive agent can be observed as depicted in Figure 3. It can be inferred that as $$ \rho $$ increases, the number of attacks on each sensitive agent decreases. Thus, attackers can adjust $$ \rho $$ based on the allowable attack times determined by attack energy. Additionally, agents with higher sensitivity are allocated more attack energy/times. For the sake of generality, in this experiment, $$ \rho $$ is set to 0.8. Within the sampling time period $$ [0, \, 40] $$, the attack instances and intervals for these four agents are illustrated in Figure 4. From this, the total number of attacks is calculated to be 95.

Importance-driven denial-of-service attack strategy design against remote state estimation in multi-agent intelligent power systems

Figure 3. The relationship between $$ \rho $$ and attack times.

Importance-driven denial-of-service attack strategy design against remote state estimation in multi-agent intelligent power systems

Figure 4. IDoS attack instants and attack intervals. IDoS: Importance-driven denial of service.

To ensure the effectiveness of the comparative experiments, we maintain an equal total number of attacks launched by different attack models within the same time frame. The attack models being compared are as follows:

(1) Model 1: The attacker launches IDoS attacks, with the timing of the attacks determined by the proposed model Equation (16).

(2) Model 2: The attacker employs IDoS attacks without considering voltage sensitivity, with the timing determined by the proposed model Equation (16), where $$ \varepsilon_{\xi_1}=\varepsilon_{\xi_2}=\varepsilon_{\xi_3}=\varepsilon_{\xi_4}=0.25 $$.

(3) Model 3: The attacker executes IDoS attacks without considering packet importance. The attack probabilities for Bus 16, Bus 19, Bus 21, and Bus 17 are set to 0.875, 0.625, 0.45, and 0.425, respectively.

(4) Model 4: The attacker initiates Bernoulli distributed DoS attacks [21], with the timing of attacks adhering to the Bernoulli parameter. The attack probability within the time range $$ [0, \, 40] $$ is set to 0.5938.

(5) Model 5: The attacker employs uniformly distributed DoS attacks [11], with the timing of attacks evenly distributed.

Due to the stochastic nature of the aforementioned attack models, this study conducts 500 experiments for each model. The average results from these experiments serve as the evaluation standard, ensuring that the conclusions drawn are statistically significant and reliable.

Under different attack models, the cumulative error of Bus 16 is illustrated in Figure 5. Upon observation, several trends become apparent: Firstly, the first three IDoS models noticeably outperform the others. This indicates that even without the full sophistication of considering both voltage sensitivity and packet importance, IDoS models are more effective at disrupting the system than traditional DoS attacks. Secondly, IDoS attacks that simultaneously consider voltage sensitivity and packet importance are markedly superior to those that neglect either voltage sensitivity or packet importance. This superior performance can be attributed to its comprehensive approach; this dual consideration allows the attacker to maximize the impact by focusing on the most critical points in the system, thereby causing more substantial disruptions. In contrast, Model 2, which uses IDoS attacks but disregards voltage sensitivity, and Model 3, which considers voltage sensitivity but neglects packet importance, both show lower cumulative errors compared to Model 1. This indicates that while considering voltage sensitivity or packet importance individually can improve attack effectiveness, combining both importance yields the most significant impact. Based on Figure 5, we can conclude that the proposed IDoS attacks comprehensively consider voltage sensitivity and packet importance, allocating more attack energy to important packets on sensitive agents, thus causing greater disruption.

Importance-driven denial-of-service attack strategy design against remote state estimation in multi-agent intelligent power systems

Figure 5. Cumulative error under various attack models.

5. CONCLUSION

The paper has first introduced a new method for calculating voltage sensitivity, which only requires attackers to have access to the power system's topology and relevant parameters, thereby enhancing its feasibility. Secondly, a novel IDoS attack strategy has been proposed, which simultaneously considers the voltage sensitivity of the target agent to each agent and the importance of packets. This strategy allocates more attack energy to critical packets on sensitive agents. Finally, simulation results have validated that the proposed IDoS attack strategy is more destructive to the target agent compared to other DoS attack strategies.

It should be noted that traditional estimators are no longer effective in providing accurate estimates against the IDoS attack strategy proposed in this paper. Therefore, designing specialized estimators or controllers that can effectively address IDoS attacks will be a key focus of our future research. Additionally, for defenders, attack isolation is an effective method to prevent the spread of disruptions, and this will also be a major area of our future investigation.

DECLARATIONS

Authors' contributions

Made substantial contributions to conception and design of the study and performed data analysis and interpretation: Zhao X, Liu G, Li L

Performed data acquisition and provided administrative, technical, and material support: Zhao X, Liu G

Availability of data and materials

Not applicable.

Financial support and sponsorship

This work was supported by the National Natural Science Foundation of China (No. 62173231).

Conflicts of interest

All authors declared that there are no conflicts of interest.

Ethical approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Copyright

© The Author(s) 2024.

REFERENCES

1. Qu B, Wang Z, Shen B, Dong H, Zhang X. Secure particle filtering with paillier encryption-decryption scheme: application to multi-machine power grids. IEEE T Smart Grid 2024;15:863-73.

2. Huang R, Li Y. Adversarial attack mitigation strategy for machine learning-based network attack detection model in power system. IEEE T Smart Grid 2023;14:2367-76.

3. Zhou T, Xiahou K, Zhang LL, Wu QH. Real-time detection of cyber-physical false data injection attacks on power systems. IEEE Trans Ind Inf 2021;17:6810-9.

4. Cheng Z, Yue D, Shen S, Hu S, Chen L. Secure frequency control of hybrid power system under DoS attacks via lie algebra. IEEE T Inf Foren Sec 2022;17:1172-84.

5. Hu Z, Liu S, Luo W, Wu L. Resilient distributed fuzzy load frequency regulation for power systems under cross-layer random denial-of-service attacks. IEEE Trans Cybern 2022;52:2396-406.

6. Zhang Y, Peng C, Xie S, Du X. Deterministic network calculus-based H load frequency control of multiarea power systems under malicious DoS attacks. IEEE T Smart Grid 2022;13:1542-54.

7. Yan S, Gu Z, Park JH, Xie X, Sun W. Distributed cooperative voltage control of networked islanded microgrid via proportional-integral observer. IEEE T Smart Grid 2024.

8. Wang X, Guang W, Huang T, Kurths J. Optimized adaptive finite-time consensus control for stochastic nonlinear multiagent systems with non-affine nonlinear faults. IEEE Trans Autom Sci Eng 2023:1-12.

9. Xiao S, Ge X, Ding L, Yue D. A bandwidth-conscious event-based control approach to secondary frequency regulation under vehicle-to-grid service. IEEE T Smart Grid 2024;15:3739-50.

10. Xiao S, Ge X, Han QL, Zhang Y. Secure and collision-free multi-platoon control of automated vehicles under data falsification attacks. Automatica 2022;145:110531.

11. Zhang H, Cheng P, Shi L, Chen J. Optimal denial-of-service attack scheduling with energy constraint. IEEE T Automat Contr 2015;60:3023-8.

12. Qin J, Li M, Shi L, Yu X. Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE T Automat Contr 2018;63:1648-63.

13. Zhang Y, Du L, Lewis FL. Stochastic DoS attack allocation against collaborative estimation in sensor networks. IEEE/CAA J Autom Sin 2020;7:1225-34.

14. Liu R, Hao F, Yu H. Optimal SINR-based DoS attack scheduling for remote state estimation via adaptive dynamic programming approach. IEEE Trans Syst Man Cybern 2021;51:7622-32.

15. Zhang H, Qi Y, Wu J, Fu L, He L. DoS attack energy management against remote state estimation. IEEE Trans Control Network Syst 2018;5:383-94.

16. Zhang XG, Yang GH. Optimal sensor attacks in cyber-physical systems with round-robin protocol. Inf Sci 2021;548:85-100.

17. Zhang J, Sun J, Lin H. Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol. Automatica 2021;127:109517.

18. Zhang J, Sun J. Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems. Syst Control Lett 2020;144:104771.

19. Tian E, Chen H, Wang C, Wang L. Security-ensured state of charge estimation of lithium-ion batteries subject to malicious attacks. IEEE T Smart Grid 2023;14:2250-61.

20. Zhu D, Wang H, Wang R, Duan J, Bai J. Identification of key nodes in a power grid based on modified PageRank algorithm. Energies 2022;15:797.

21. Wang X, Tian E, Zheng WX, Xie X. Important-data-based DoS attack mechanism and resilient H filter design for networked T-S fuzzy systems. IEEE Trans Cybern 2024;54:3352-62.

22. Kumar R JR, Natarajan B, Pahwa A. Neumann series based voltage sensitivity analysis for three phase distribution system. IEEE Trans Power Syst 2022;37:3145-8.

23. Chang JW, Kang M, Oh S. Data-driven estimation of voltage-to-power sensitivities considering their mutual dependency in medium voltage distribution networks. IEEE Trans Power Syst 2022;37:3173-6.

24. Liu JH, Li ZH. Distributed voltage security enhancement using measurement-based voltage sensitivities. IEEE Trans Power Syst 2024;39:836-49.

25. Xie B, Chen W, Zhou Q, Du J, Cui L. Partition of the development stage of air-gap discharge in oil-paper insulation based on wavelet packet energy entropy. IEEE T Dielect El In 2016;23:866-72.

26. Bian Q, Qiu Y, Wu W, Xin H, Fu X. Generation dispatch method based on maximum entropy principle for power systems with high penetration of wind power. J Mod Power Syst Clean Energy 2018;6:1213-22.

27. Zhao Z, Huang Y, Zhen Z, Li Y. Data-driven false data-injection attack design and detection in cyber-physical systems. IEEE Trans Cybern 2021;51:6179-87.

28. Liu C, He W, Deng R, Tian YC, Du W. False-data-injection-enabled network parameter modifications in power systems: attack and detection. IEEE Trans Ind Inf 2023;19:177-88.

29. Liu C, Liang H, Chen T. Network parameter coordinated false data injection attacks against power system AC state estimation. IEEE T Smart Grid 2021;12:1626-39.

30. Yue D, Tian E, Han QL. A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans Automat Contr 2013;58:475-81.

Cite This Article

Research Article
Open Access
Importance-driven denial-of-service attack strategy design against remote state estimation in multi-agent intelligent power systems
Xia Zhao, ... Lei Li

How to Cite

Zhao, X.; Liu G.; Li L. Importance-driven denial-of-service attack strategy design against remote state estimation in multi-agent intelligent power systems. Intell. Robot. 2024, 4, 244-55. http://dx.doi.org/10.20517/ir.2024.16

Download Citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click on download.

Export Citation File:

Type of Import

Tips on Downloading Citation

This feature enables you to download the bibliographic information (also called citation data, header data, or metadata) for the articles on our site.

Citation Manager File Format

Use the radio buttons to choose how to format the bibliographic data you're harvesting. Several citation manager formats are available, including EndNote and BibTex.

Type of Import

If you have citation management software installed on your computer your Web browser should be able to import metadata directly into your reference database.

Direct Import: When the Direct Import option is selected (the default state), a dialogue box will give you the option to Save or Open the downloaded citation data. Choosing Open will either launch your citation manager or give you a choice of applications with which to use the metadata. The Save option saves the file locally for later use.

Indirect Import: When the Indirect Import option is selected, the metadata is displayed and may be copied and pasted as needed.

About This Article

Special Issue

This article belongs to the Special Issue Performance Evaluation and Optimization for Intelligent Systems
© The Author(s) 2024. Open Access This article is licensed under a Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, sharing, adaptation, distribution and reproduction in any medium or format, for any purpose, even commercially, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Data & Comments

Data

Views
279
Downloads
57
Citations
0
Comments
0
8

Comments

Comments must be written in English. Spam, offensive content, impersonation, and private information will not be permitted. If any comment is reported and identified as inappropriate content by OAE staff, the comment will be removed without notice. If you have any queries or need any help, please contact us at support@oaepublish.com.

0
Download PDF
Share This Article
Scan the QR code for reading!
See Updates
Contents
Figures
Related
Intelligence & Robotics
ISSN 2770-3541 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/