论文标题
无法检测到的GPS弹性攻击时间序列相量计量单元数据
Undetectable GPS-Spoofing Attack on Time Series Phasor Measurement Unit Data
论文作者
论文摘要
相量测量单元(PMU)是智能电网的重要计量设备。像其他任何智能电子设备(IED)一样,PMU易于进行各种类型的网络攻击。但是,一种攻击形式是PMU所独有的,即GPS-Spofing Attack,其中时间和 /或一个第二次脉冲(1 pps)可以修改时间同步,并使用修改后的时间参考计算测量结果。本文利用PMU在其GPS时间同步信号中的脆弱性。首先,本文提出了一个不可检测的渐进式GPS-spoofing攻击,随着时间的推移,较小的增量角度偏差。角度偏差会通过网格的分支改变功率流量,而无需在非高峰时段提醒系统操作员(SO)。攻击者继续在长时间内无情地促进GPS启动引起的功率流量计算中的缓慢增量变化,其目的是导致功率流量计算违反峰值时分支的MVA限制。通过在常规时间间隔求解凸优化标准来应用攻击,以便在特定时间段之后,攻击矢量会导致PMU传输的角度测量值发生显着变化。其次,虽然攻击通过GPS弹性攻击修改角度测量值,但它通过保持攻击矢量小于攻击检测阈值来确保相位角变化的不可检测性。提出的攻击模型通过加权最小平方误差(WLSE),卡尔曼过滤和基于Hankel-Matrix的GPS弹药攻击检测模型进行了测试。最后,我们提出了基于Hankel-Matrix的检测方法的低排名近似梯度,以检测这种不断的小额增量GPS促进攻击。
The Phasor Measurement Unit (PMU) is an important metering device for smart grid. Like any other Intelligent Electronic Device (IED), PMUs are prone to various types of cyberattacks. However, one form of attack is unique to the PMU, the GPS-spoofing attack, where the time and /or the one second pulse (1 PPS) that enables time synchronization are modified and the measurements are computed using the modified time reference. This article exploits the vulnerability of PMUs in their GPS time synchronization signal. At first, the paper proposes an undetectable gradual GPS-spoofing attack with small incremental angle deviation over time. The angle deviation changes power flow calculation through the branches of the grids, without alerting the System Operator (SO) during off-peak hour. The attacker keeps instigating slow incremental variation in power flow calculation caused by GPS-spoofing relentlessly over a long period of time, with a goal of causing the power flow calculation breach the MVA limit of the branch at peak-hour. The attack is applied by solving a convex optimization criterion at regular time interval, so that after a specific time period the attack vector incurs a significant change in the angle measurements transmitted by the PMU. Secondly, while the attack modifies the angle measurements with GPS-spoofing attack, it ensures the undetectibility of phase angle variation by keeping the attack vector less than attack detection threshold. The proposed attack model is tested with Weighted Least Squared Error (WLSE), Kalman Filtering, and Hankel-matrix based GPS-spoofing attack detection models. Finally, we have proposed a gradient of low-rank approximation of Hankel-matrix based detection method to detect such relentless small incremental GPS-spoofing attack.