Importance-driven denial-of-service attack strategy design against remote state estimation in multi-agent intelligent power systems
Abstract
This paper introduces a novel importance-driven denial of service (IDoS) attack strategy aimed at impairing the quality of remote estimators for target agents within multi-agent intelligent power systems. The strategy features two key aspects. Firstly, the IDoS attack strategy concentrates on target agents, enabling attackers to determine the voltage sensitivity of each agent based on limited information. By utilizing these sensitivities, the proposed strategy selectively targets agents with high sensitivity to amplify disruption on the target agent. Secondly, unlike most existing denial of service attack strategies that adhere to predefined attack sequences, IDoS attacks can selectively target important packets on highly sensitive agents, causing further disruption to the target agent. Simulation results on the IEEE 39-Bus system demonstrate that, compared to existing denial of service attack strategies, the proposed IDoS attack strategy significantly diminishes the estimation quality of the target agent, confirming its effectiveness from an attacker's perspective.
Keywords
1. INTRODUCTION
The power system is the backbone of society, directly impacting people's lives and a nation's economy [1]. However, as digitalization advances, interconnected power systems present more opportunities for attackers [2]. Among the various types of attacks, denial of service (DoS) attacks and deception attacks are predominant [3]. Unlike deception attacks, DoS attacks aim to exhaust network resources, cause congestion, and disrupt user access by flooding the system with a large volume of meaningless packets [4]. Despite the apparent simplicity of DoS attacks, their destructive potential poses a significant threat to the stability of the power system, warranting heightened attention [5,6].
In the field of power system security literature, there are generally two main perspectives: the defender's perspective and the attacker's perspective. The defender's perspective focuses on developing various methods to counter increasingly severe cyber attacks, including techniques such as proportional-integral observers [7], consensus control [8], bandwidth-conscious event-based control [9], and collision-free multi-platoon control [10]. In contrast, the attacker's perspective predominantly explores more destructive attack strategies or seeks to enhance stealthiness. For instance, [11] optimizes attack scheduling to maximize destructive impact and proposes that continuous attacks can significantly amplify the potency of DoS attacks. Building upon this, [12] addresses attack scheduling under energy constraints. To counteract remote estimators, studies such as [13–15] respectively delve into stochastic DoS attack allocation, adaptive dynamic programming approach, and attack energy management. Furthermore, studies such as [16–18] explore the complexity of attack scheduling, encompassing aspects such as sensors, communication protocols, and cooperation strategies.
In this context, most DoS attacks are typically indiscriminate, meaning the attacker lacks specific knowledge about the target system and employs random or preset patterns of attack [11]. On the other hand, deception attacks are based on the attacker having an in-depth understanding of the system [19], including detailed knowledge of its structure, parameters, controller gains, and estimator gains. These two types of attackers represent two extremes: one is completely unaware of the system and relies on random or preset attack strategies, while the other is well-informed about the system and can leverage detailed information to execute precise attacks. Typically, certain information about power systems, such as topology and system output, is relatively easy for attackers to obtain, while other critical details, such as estimator gains, are harder to access. Therefore, from the attacker's perspective, devising an attack strategy based on readily accessible system information is crucial, which is a key motivation for this paper.
Although the aforementioned literature endeavors to increase the destructiveness of attacks, two critical issues deserve attention. Firstly, most current DoS attack strategies indiscriminately target the entire system in a predetermined sequence. However, in real-world power systems, certain agents hold greater significance, such as those serving airports, hospitals, financial centers, and control centers [20]. Designing a DoS attack strategy to inflict greater damage on specific agents is one of the primary motivations of this paper. Secondly, certain information in power systems is easily accessible to attackers, such as packet importance [21], system topology, and rated parameters. Effectively leveraging this information to amplify the destructiveness of DoS attacks serves as another motivation for this paper.
To tackle the challenges outlined above, this paper first proposes a method for calculating the sensitivity of target agent voltages. Secondly, we utilize these sensitivities to develop a novel importance-driven DoS (IDoS) attack strategy, which integrates agent voltage sensitivity with packet importance. To achieve these objectives, we pose two questions:
(1) How to design a method to calculate voltage sensitivity using limited information?
(2) How to design the IDoS attack strategy by integrating sensitivity information with packet importance?
The primary focus of this paper is to address these two inquiries. The key innovations of this paper are summarized as follows:
(1) A new method for computing voltage sensitivity is proposed. Unlike existing sensitivity calculation approaches [22–24], this method reduces reliance on system information, including current state values and their respective rates of change, thereby enabling attackers to implement attacks more practically.
(2) A novel IDoS attack strategy is designed, which integrates both voltage sensitivity and packet importance. Unlike most DoS attack strategies that target indiscriminately [11,12], our approach allocates more attack energy to important packets on sensitive agents, thus resulting in a greater potential for disruption on the target agent compared to other attack strategies.
The structure of the subsequent sections of this paper is as follows: Section 2 discusses the calculation of voltage sensitivity. Section 3 presents the design process of the IDoS attack strategy. Section 4 conducts simulations to assess the destructive capability of the attack strategy. Finally, Section 5 provides a summary of the study.
Notation Let the superscript
2. SYSTEM AND STATE ESTIMATION
In a multi-agent power system with
where
Various methods are proposed to estimate the system's state, with weighted least squares (WLS) being widely favored, defined as follows:
where
After completing the state estimation process, the detection of faulty data is typically performed to identify potential measurement errors. Among various methods for detection, the maximum normalized residual test is the most commonly used. In this method, the residual is defined as:
The parameter
3. IDOS ATTACK STRATEGY DESIGN
In this section, a novel IDoS attack strategy from the attacker's perspective is introduced. This strategy leverages the voltage sensitivity of agents and the importance of packets. By allocating more attack energy to the critical data packets of highly sensitive agents, it maximizes the estimation error of the remote estimator. The design comprises two main steps: firstly, analyzing the voltage-current relationships of all agents in the system to determine the voltage sensitivity of the target agent to each agent; secondly, allocating more attack energy to important packets on highly sensitive agents, thereby inflicting more severe damage on the target agent.
3.1 Voltage sensitivity to powers
To enhance the feasibility and practicality of the proposed IDoS attack, this subsection introduces a new method for calculating voltage sensitivity. This method minimizes the attacker's need for extensive system information, requiring only the power system's topology and rated parameters to accurately compute the voltage sensitivity of each agent. The calculation process is as follows: First, the relationship between system voltage and current is established through power flow analysis. Next, the active and reactive voltage sensitivities of the target agent are determined from this relationship. Finally, the voltage sensitivity of the target to all other agents is obtained using an improved entropy method.
In the multi-agent power system, the first agent is designated as the reference agent with its voltage set as the reference voltage. The relationship between the voltage of each agent and the injected current can be expressed as follows:
where
in which
Without loss of generality, we define the
where
To understand how changes in active power
Specifically, when
In this case, by taking the partial derivative of the active power with respect to Equation (7), the self-voltage sensitivity of the
This self-sensitivity reflects how changes in the active power of the target agent itself affect its own voltage. Parameters
Through the aforementioned steps, the voltage-active power sensitivity vector
Similarly, from Equation (5), we can obtain the voltage-reactive sensitivity of the
where the unknown parameters
Therefore, the voltage-reactive power sensitivity vector
After normalizing these vectors, the Pearson correlation coefficient is introduced. The sliding window for the
where the window length is
As the window moves, the correlation coefficient can be calculated by:
where
To capture the interrelationships among the elements in the sensitivity vector, we introduce exponential information entropy. Therefore, the voltage sensitivity of the target agent to the
where
Remark 1 Current methods for calculating voltage sensitivity necessitate power system topology, parameters, voltage, and power outputs to derive variations [22–24], as demonstrated by:
where
Remark 2 To obtain the sensitive information, an enhanced entropy-based weighting method is employed. Traditional entropy-based approaches [25,26] primarily address data uncertainty while disregarding inter-data relationships, which can lead to inaccuracies in weighting calculations. To overcome this limitation, this paper introduces exponential entropy and the Pearson correlation coefficient to respectively capture relationships among data and between active and reactive power, thereby enhancing the efficiency of comprehensive information utilization.
3.2 IDoS attack strategy design
By leveraging the sensitivity of each agent obtained previously, this section proposes a novel IDoS attack that allocates more attack energy to the important packets transmitted by highly sensitive agents, potentially causing greater disruption.
An experienced attacker targets the network channels between PMUs and control centers [Figure 1]; we can make the following assumptions about the capabilities of the attacker:
Assumption 1 (1) The attacker can access the topology of the power system to calculate the voltage sensitivity of the
Remark 1 In contrast to [27–29], the attack strategy proposed in this paper does not require attackers to obtain hard-to-access information, such as real-time state values or control gains. This enhances the feasibility of Assumption 1.
Based on the aforementioned assumptions, attackers operate according to the following attack mechanism:
where
in which
When
Remark 2 The IDoS attack model Equation (16) distinctly illustrates the correlation between attack behavior and the output packets
Remark 3 The proposed IDoS attack strategy is inspired by the event-triggered mechanism, where only significant data packets are transmitted. Similarly, the attack model Equation (16) targets only important data packets. A higher value of
where
Remark 4 In reality, power systems typically encompass numerous agents. When attack energy remains constant, evenly distributing it across each agent leads to energy dispersion, thereby diminishing the attack's impact. Hence, the attack strategy proposed in this paper concentrates the attack energy on the most sensitive subset of agents, denoted as
4. EXPERIMENTAL SIMULATION RESULTS
To validate the disruptive potential of the proposed IDoS attack strategy, this section conducts simulation experiments on the IEEE 39-Bus system [Figure 2]. Firstly, the experiment explores the relationship between the attack parameter
Without loss of generality, Bus 16 is designated as the target agent. Using Equation (14), we obtain the voltage sensitivity of each agent as shown in Table 1. Setting
Sensitivity for each Bus
Bus 1 | Bus 2 | Bus 3 | Bus 4 | Bus 5 | Bus 6 | Bus 7 | Bus 8 | Bus 9 | Bus 10 | Bus 11 | Bus 12 | Bus 13 |
0.0017 | 0.0008 | 0.0012 | 0.0006 | 0.0008 | 0.0008 | 0.0052 | 0.0005 | 0.0013 | 0.0009 | 0.0009 | 0.0069 | 0.0009 |
Bus 14 | Bus 15 | Bus 16 | Bus 17 | Bus 18 | Bus 19 | Bus 20 | Bus 21 | Bus 22 | Bus 23 | Bus 24 | Bus 25 | Bus 26 |
0.0008 | 0.0589 | 0.4432 | 0.1179 | 0.0037 | 0.1413 | 0.0004 | 0.1248 | 0.0009 | 0.0032 | 0.0437 | 0.0035 | 0.0027 |
Bus 27 | Bus 28 | Bus 29 | Bus 30 | Bus 31 | Bus 32 | Bus 33 | Bus 34 | Bus 35 | Bus 36 | Bus 37 | Bus 38 | Bus 39 |
0.0020 | 0.0208 | 0.0018 | 0.0003 | 0.0002 | 0.0002 | 0.0002 | 0.0002 | 0.0002 | 0.0002 | 0.0002 | 0.0002 | 0.0060 |
According to the attack model Equation (16), the relationship between the attack parameter
To ensure the effectiveness of the comparative experiments, we maintain an equal total number of attacks launched by different attack models within the same time frame. The attack models being compared are as follows:
(1) Model 1: The attacker launches IDoS attacks, with the timing of the attacks determined by the proposed model Equation (16).
(2) Model 2: The attacker employs IDoS attacks without considering voltage sensitivity, with the timing determined by the proposed model Equation (16), where
(3) Model 3: The attacker executes IDoS attacks without considering packet importance. The attack probabilities for Bus 16, Bus 19, Bus 21, and Bus 17 are set to 0.875, 0.625, 0.45, and 0.425, respectively.
(4) Model 4: The attacker initiates Bernoulli distributed DoS attacks [21], with the timing of attacks adhering to the Bernoulli parameter. The attack probability within the time range
(5) Model 5: The attacker employs uniformly distributed DoS attacks [11], with the timing of attacks evenly distributed.
Due to the stochastic nature of the aforementioned attack models, this study conducts 500 experiments for each model. The average results from these experiments serve as the evaluation standard, ensuring that the conclusions drawn are statistically significant and reliable.
Under different attack models, the cumulative error of Bus 16 is illustrated in Figure 5. Upon observation, several trends become apparent: Firstly, the first three IDoS models noticeably outperform the others. This indicates that even without the full sophistication of considering both voltage sensitivity and packet importance, IDoS models are more effective at disrupting the system than traditional DoS attacks. Secondly, IDoS attacks that simultaneously consider voltage sensitivity and packet importance are markedly superior to those that neglect either voltage sensitivity or packet importance. This superior performance can be attributed to its comprehensive approach; this dual consideration allows the attacker to maximize the impact by focusing on the most critical points in the system, thereby causing more substantial disruptions. In contrast, Model 2, which uses IDoS attacks but disregards voltage sensitivity, and Model 3, which considers voltage sensitivity but neglects packet importance, both show lower cumulative errors compared to Model 1. This indicates that while considering voltage sensitivity or packet importance individually can improve attack effectiveness, combining both importance yields the most significant impact. Based on Figure 5, we can conclude that the proposed IDoS attacks comprehensively consider voltage sensitivity and packet importance, allocating more attack energy to important packets on sensitive agents, thus causing greater disruption.
5. CONCLUSION
The paper has first introduced a new method for calculating voltage sensitivity, which only requires attackers to have access to the power system's topology and relevant parameters, thereby enhancing its feasibility. Secondly, a novel IDoS attack strategy has been proposed, which simultaneously considers the voltage sensitivity of the target agent to each agent and the importance of packets. This strategy allocates more attack energy to critical packets on sensitive agents. Finally, simulation results have validated that the proposed IDoS attack strategy is more destructive to the target agent compared to other DoS attack strategies.
It should be noted that traditional estimators are no longer effective in providing accurate estimates against the IDoS attack strategy proposed in this paper. Therefore, designing specialized estimators or controllers that can effectively address IDoS attacks will be a key focus of our future research. Additionally, for defenders, attack isolation is an effective method to prevent the spread of disruptions, and this will also be a major area of our future investigation.
DECLARATIONS
Authors' contributions
Made substantial contributions to conception and design of the study and performed data analysis and interpretation: Zhao X, Liu G, Li L
Performed data acquisition and provided administrative, technical, and material support: Zhao X, Liu G
Availability of data and materials
Not applicable.
Financial support and sponsorship
This work was supported by the National Natural Science Foundation of China (No. 62173231).
Conflicts of interest
All authors declared that there are no conflicts of interest.
Ethical approval and consent to participate
Not applicable.
Consent for publication
Not applicable.
Copyright
© The Author(s) 2024.
REFERENCES
1. Qu B, Wang Z, Shen B, Dong H, Zhang X. Secure particle filtering with paillier encryption-decryption scheme: application to multi-machine power grids. IEEE T Smart Grid 2024;15:863-73.
2. Huang R, Li Y. Adversarial attack mitigation strategy for machine learning-based network attack detection model in power system. IEEE T Smart Grid 2023;14:2367-76.
3. Zhou T, Xiahou K, Zhang LL, Wu QH. Real-time detection of cyber-physical false data injection attacks on power systems. IEEE Trans Ind Inf 2021;17:6810-9.
4. Cheng Z, Yue D, Shen S, Hu S, Chen L. Secure frequency control of hybrid power system under DoS attacks via lie algebra. IEEE T Inf Foren Sec 2022;17:1172-84.
5. Hu Z, Liu S, Luo W, Wu L. Resilient distributed fuzzy load frequency regulation for power systems under cross-layer random denial-of-service attacks. IEEE Trans Cybern 2022;52:2396-406.
6. Zhang Y, Peng C, Xie S, Du X. Deterministic network calculus-based H∞ load frequency control of multiarea power systems under malicious DoS attacks. IEEE T Smart Grid 2022;13:1542-54.
7. Yan S, Gu Z, Park JH, Xie X, Sun W. Distributed cooperative voltage control of networked islanded microgrid via proportional-integral observer. IEEE T Smart Grid 2024.
8. Wang X, Guang W, Huang T, Kurths J. Optimized adaptive finite-time consensus control for stochastic nonlinear multiagent systems with non-affine nonlinear faults. IEEE Trans Autom Sci Eng 2023:1-12.
9. Xiao S, Ge X, Ding L, Yue D. A bandwidth-conscious event-based control approach to secondary frequency regulation under vehicle-to-grid service. IEEE T Smart Grid 2024;15:3739-50.
10. Xiao S, Ge X, Han QL, Zhang Y. Secure and collision-free multi-platoon control of automated vehicles under data falsification attacks. Automatica 2022;145:110531.
11. Zhang H, Cheng P, Shi L, Chen J. Optimal denial-of-service attack scheduling with energy constraint. IEEE T Automat Contr 2015;60:3023-8.
12. Qin J, Li M, Shi L, Yu X. Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE T Automat Contr 2018;63:1648-63.
13. Zhang Y, Du L, Lewis FL. Stochastic DoS attack allocation against collaborative estimation in sensor networks. IEEE/CAA J Autom Sin 2020;7:1225-34.
14. Liu R, Hao F, Yu H. Optimal SINR-based DoS attack scheduling for remote state estimation via adaptive dynamic programming approach. IEEE Trans Syst Man Cybern 2021;51:7622-32.
15. Zhang H, Qi Y, Wu J, Fu L, He L. DoS attack energy management against remote state estimation. IEEE Trans Control Network Syst 2018;5:383-94.
16. Zhang XG, Yang GH. Optimal sensor attacks in cyber-physical systems with round-robin protocol. Inf Sci 2021;548:85-100.
17. Zhang J, Sun J, Lin H. Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol. Automatica 2021;127:109517.
18. Zhang J, Sun J. Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems. Syst Control Lett 2020;144:104771.
19. Tian E, Chen H, Wang C, Wang L. Security-ensured state of charge estimation of lithium-ion batteries subject to malicious attacks. IEEE T Smart Grid 2023;14:2250-61.
20. Zhu D, Wang H, Wang R, Duan J, Bai J. Identification of key nodes in a power grid based on modified PageRank algorithm. Energies 2022;15:797.
21. Wang X, Tian E, Zheng WX, Xie X. Important-data-based DoS attack mechanism and resilient H∞ filter design for networked T-S fuzzy systems. IEEE Trans Cybern 2024;54:3352-62.
22. Kumar R JR, Natarajan B, Pahwa A. Neumann series based voltage sensitivity analysis for three phase distribution system. IEEE Trans Power Syst 2022;37:3145-8.
23. Chang JW, Kang M, Oh S. Data-driven estimation of voltage-to-power sensitivities considering their mutual dependency in medium voltage distribution networks. IEEE Trans Power Syst 2022;37:3173-6.
24. Liu JH, Li ZH. Distributed voltage security enhancement using measurement-based voltage sensitivities. IEEE Trans Power Syst 2024;39:836-49.
25. Xie B, Chen W, Zhou Q, Du J, Cui L. Partition of the development stage of air-gap discharge in oil-paper insulation based on wavelet packet energy entropy. IEEE T Dielect El In 2016;23:866-72.
26. Bian Q, Qiu Y, Wu W, Xin H, Fu X. Generation dispatch method based on maximum entropy principle for power systems with high penetration of wind power. J Mod Power Syst Clean Energy 2018;6:1213-22.
27. Zhao Z, Huang Y, Zhen Z, Li Y. Data-driven false data-injection attack design and detection in cyber-physical systems. IEEE Trans Cybern 2021;51:6179-87.
28. Liu C, He W, Deng R, Tian YC, Du W. False-data-injection-enabled network parameter modifications in power systems: attack and detection. IEEE Trans Ind Inf 2023;19:177-88.
29. Liu C, Liang H, Chen T. Network parameter coordinated false data injection attacks against power system AC state estimation. IEEE T Smart Grid 2021;12:1626-39.
Cite This Article
How to Cite
Zhao, X.; Liu G.; Li L. Importance-driven denial-of-service attack strategy design against remote state estimation in multi-agent intelligent power systems. Intell. Robot. 2024, 4, 244-55. http://dx.doi.org/10.20517/ir.2024.16
Download Citation
Export Citation File:
Type of Import
Tips on Downloading Citation
Citation Manager File Format
Type of Import
Direct Import: When the Direct Import option is selected (the default state), a dialogue box will give you the option to Save or Open the downloaded citation data. Choosing Open will either launch your citation manager or give you a choice of applications with which to use the metadata. The Save option saves the file locally for later use.
Indirect Import: When the Indirect Import option is selected, the metadata is displayed and may be copied and pasted as needed.
Comments
Comments must be written in English. Spam, offensive content, impersonation, and private information will not be permitted. If any comment is reported and identified as inappropriate content by OAE staff, the comment will be removed without notice. If you have any queries or need any help, please contact us at support@oaepublish.com.