Detection and Defense Methods for False Data Injection Attack in Power Systems Based on State-Space Decomposition

Zhihong LIANG, Binyuan YAN, Chao HONG, Jiaye TAO, Yiwei YANG, Lin CHEN, Pandeng LI

South Power Sys Technol ›› 2025, Vol. 19 ›› Issue (6) : 39-50.

PDF(1462 KB)
Home Journals Southern Power System Technology
Southern Power System Technology

Abbreviation (ISO4): South Power Sys Technol      Editor in chief:

About  /  Aim & scope  /  Editorial board  /  Indexed  /  Contact  / 
PDF(1462 KB)
South Power Sys Technol ›› 2025, Vol. 19 ›› Issue (6) : 39-50. DOI: 10.13648/j.cnki.issn1674-0629.2025.06.004
Network Security and Attack Defense Technologies for Power Systems

Detection and Defense Methods for False Data Injection Attack in Power Systems Based on State-Space Decomposition

Author information +
History +

Abstract

With the growing integration of renewable energy, load frequency control (LFC) in power systems faces security risks from false data injection attack (FDIA). Existing detection methods struggle to differentiate control input attacks from measurement attacks, compromising system stability and security. This paper develops a state-space model for LFC incorporating renewable energy and energy storage systems and analyzes the impact of FDIA on system dynamics. A state-space decomposition method is employed to decouple attack signals into control input and measurement attacks, improving detection accuracy. A sliding mode observer-based attack estimation method is proposed for real-time detection. Additionally, an attack-resilient control (ARC) strategy is designed using H control theory to enhance system robustness. Simulations show that the proposed method reduces the attack estimation mean squared error by nearly 30% and significantly improves frequency response stability compared to traditional methods. These results demonstrate the method′s effectiveness in detecting FDIA and enhancing power system security.

Key words

load frequency control / false data injection attack / state-space decomposition / sliding mode observer / anti-attack control

Cite this article

Download Citations
Zhihong LIANG , Binyuan YAN , Chao HONG , et al . Detection and Defense Methods for False Data Injection Attack in Power Systems Based on State-Space Decomposition[J]. Southern Power System Technology. 2025, 19(6): 39-50 https://doi.org/10.13648/j.cnki.issn1674-0629.2025.06.004

References

[1]
朱文, 江伟, 周志烽, 等. 基于电网调度系统的网络安全态势感知方法研究[J]. 电测与仪表202461(7): 21 - 27.
ZHU Wen JIANG Wei ZHOU Zhifeng, et al. Network security situation awareness method of power grid dispatching automation system[J]. Electrical Measurement & Instrumentation202461(7): 21 - 27.
[2]
李卓, 谢耀滨, 吴茜琼, 等. 基于深度学习的电力系统虚假数据注入攻击检测综述[J]. 电力系统保护与控制202452(19): 175 - 187.
LI Zhuo XIE Yaobin WU Qianqiong, et al. Review of deep learning-based false data injection attack detection in power systems[J]. Power System Protection and Control202452(19): 175 - 187.
[3]
刘增稷, 王琦, 薛彤. 电力系统中数据驱动算法安全威胁分析及应对方法研究[J]. 中国电机工程学报202343(12): 4538 - 4554.
LIU Zengji WANG Qi XUE Tong. Security threat analysis and countermeasures of data-driven algorithms in power systems[J]. Proceedings of the CSEE202343(12): 4538 - 4554.
[4]
钱胜, 王琦, 颜云松. 计及网络攻击影响的安全稳定控制系统风险评估方法[J]. 电力工程技术202241(3): 14 - 21.
QIAN Sheng WANG Qi YAN Yunsong. Risk assessment method for security and stability control system considering the impact of cyber attacks[J]. Electric Power Engineering Technology202241(3): 14 - 21.
[5]
李鹏, 刘念, 胡秦然. “新型电力系统数字化关键技术综述”专辑评述[J]. 电力系统自动化202448(6): 1 - 12.
LI Peng LIU Nian HU Qinran. Commentary on special issue of reviews on key technologies for digitalization of new power system[J]. Automation of Electric Power Systems202448(6): 1 - 12.
[6]
张杰, 方浪森, 姚立明, 等. 基于图论及混合卷积神经网络的电力结算电量数据异常检测方法[J/OL]. 南方电网技术2024: 1 - 12[2024 - 10 - 30]. https://nfdwjs.csg.cn/gateway-web/zh/debutDetail.html?serialNum=20240527004.
ZHANG Jie FANG Langsen YAO Liming, et al. Anomaly detection method for power settlement electricity data based on graph theory and hybrid convolutional neural network[J/OL]. Southern Power System Technology, 2024: 1 - 12[2024 - 10 - 30]. https://nfdwjs.csg.cn/gateway-web/en/debutDetail.html?serialNum=20240527004.
[7]
席磊, 田习龙, 余涛, 等. 基于相关特征-多标签级联提升森林的电网虚假数据注入攻击定位检测[J]. 南方电网技术202418(5): 39 - 50.
XI Lei TIAN Xilong YU Tao, et al. Locational detection of false data injection attack in power grid based on relevant features multi-label cascade boosting forest[J]. Southern Power System Technology202418(5): 39 - 50.
[8]
ARNAB Bhattacharjee ARNAB Kumar Mondal ASHU Verma, et al. Deep latent space clustering for detection of stealthy false data injection attacks against AC state estimation in power systems[J]. IEEE Transactions on Smart Grid202214(3): 2338 - 2351.
[9]
PEI Jianhua WANG Jingyu SHI Dongyuan, et al. Improved efficient two-stage de-noising diffusion power system measurement recovery against false data injection attacks and data losses[EB/OL]. arXiv2312.04346, https://arxiv.org/abs/2312.04346.
[10]
WANG Jun CHEN Haoran SI Yifei, et al. FDIA localization and classification detection in smart grids using multi-modal data and deep learning technique[J]. Computers and Electrical Engineering2024(119): 109572.1 - 109572.10.
[11]
QU Zhaoyang DONG Yunchang LI Yang, et al. Localization of dummy data injection attacks in power systems considering incomplete topological information: a spatio-temporal graph wavelet convolutional neural network approach[J]. Applied Energy2024 (360): 122736.1 - 122736.8.
[12]
PENG Sha ZHANG Zhenyong DENG Ruilong, et al. Localizing false data injection attacks in smart grid: a spectrum-based neural network approach[J]. IEEE Transactions on Smart Grid202314(6): 4827 - 4838.
[13]
ZHANG Guangdou LI Jian BAMISILE Olusola, et al. Spatio-temporal correlation-based false data injection attack detection using deep convolutional neural network[J]. IEEE Transactions on Smart Grid202113(1): 750 - 761.
[14]
席磊, 王文卓, 白芳岩, 等. 基于最大信息系数-双层置信极端梯度提升树的电网虚假数据注入攻击定位检测[J]. 电网技术202549(2): 824 - 833.
XI Lei WANG Wenzhuo BAI Fangyan, et al. Grid false data injection attack localization detection based on MIC-double-deck confidence XGBoost tree[J]. Power System Technology202549(2): 824 - 833.
[15]
黄冬梅, 王一帆, 胡安铎, 等. 融合无监督和有监督学习的虚假数据注入攻击检测[J]. 电力工程技术202443(2): 134 - 141.
HUANG Dongmei WANG Yifan HU Anduo, et al. False data injection attack detection based on the integration of unsupervised and supervised learning[J]. Electric Power Engineering Technology202443(2): 134 - 141.
[16]
罗小元, 耿艺帆, 吴莉艳. 基于GATv2模型的虚假数据注入攻击检测方法[J]. 电气工程学报202419(3): 353 - 361.
LUO Xiaoyuan GENG Yifan WU Liyan. Detection of false data injection attack based on GATv2 model[J]. Journal of Electrical Engineering202419(3): 353 - 361.
[17]
郭天德, 罗萍萍, 林济铿. 考虑状态量未知情况的电力系统杠杆量测攻击[J]. 南方电网技术202317(3): 56 - 64.
GUO Tiande LUO Pingping LIN Jikeng. Leverage measurement attack of power system considering unknown state variates[J]. Southern Power System Technology202317(3): 56 - 64.
[18]
YANG H ZHANG W CHUNG C Y, et al. AC false data injection attack based on robust tensor principle component analysis[J]. IEEE Transactions on Industrial Informatics202420(8): 9887 - 9897.
[19]
YANG Haosen HE Xing WANG Ziqiang, et al. Blind false data injection attacks against state estimation based on matrix reconstruction[J]. IEEE Transactions on Smart Grid202213(4): 3174 - 3187.
[20]
TIAN Jiwei WANG Buhong LI Jing, et al. Data-driven false data injection attacks against cyber-physical power systems[J]. Computers & Security2022(121): 102836.1 - 102836.12.
[21]
YANG Haosen ZHANG Wenjie LIANG Zipeng, et al. Parameter-free false data injection attack against AC state estimation: a canonical polyadic decomposition based approach[J]. IEEE Transactions on Power Systems202540(3):2153 - 2164.
[22]
金增旺, 刘茵, 刁靖东. 针对信息物理系统远程状态估计的隐蔽虚假数据注入攻击[J]. 自动化学报202551(2): 356-365.
JIN Zengwang LIU Yin DIAO Jingdong. Stealthy false data injection attacks on remote state estimation of cyber-physical systems[J]. Acta Automatica Sinica202551(2): 356-365.
[23]
陈炎森, 王鹏宇, 杨义. 基于混合自动机的综合能源系统状态转移空间建模[J]. 南方电网技术202317(1): 103 - 113.
CHEN Yansen WANG Pengyu YANG Yi. State transition space modeling of integrated energy systems based on hybrid automata[J]. Southern Power System Technology202317(1): 103 - 113.
[24]
WEI Shuheng WU Zaijun XU Junjun, et al. Multi-area probabilistic forecasting-aided interval state estimation for FDIA identification in power distribution networks[J]. IEEE Transactions on Industrial Informatics202320(3): 4271 - 4282.
[25]
庞清乐, 韩松易, 周泰. 基于ASRUKF和IMC算法的电力信息物理系统虚假数据注入攻击检测[J]. 智慧电力202452(7): 111 - 118.
PANG Qingle HAN Songyi ZHOU Tai. False data injection attack detection of cyber-physical power system based on ASRUKF and IMC algorithms[J]. Smart Power202452(7): 111 - 118.
[26]
王新宇, 王相杰, 罗小元. 基于自适应生成对抗网络的智能电网状态重构的虚假数据攻击检测[J]. 电力信息与通信技术202422(9): 1 - 7.
WANG Xinyu WANG Xiangjie LUO Xiaoyuan. False data injection attack detection for smart grid state reconstruction based on adaptive generative adversarial networks[J]. Electric Power Information and Communication Technology202422(9): 1 - 7.
[27]
吴在军, 徐东亮, 徐俊俊. 信息物理多重攻击下配电网状态估计关键技术评述[J]. 电力系统自动化202448(6): 127 - 138.
WU Zaijun XU Dongliang XU Junjun. Review on key technologies for distribution network state estimation under cyber-physical multiple attacks[J]. Automation of Electric Power Systems202448(6): 127 - 138.
[28]
ZHANG Zhixun HU Jianqiang LU Jianquan, et al. Preventing false data injection attacks in LFC system via the attack-detection evolutionary game model and KF algorithm[J]. IEEE Transactions on Network Science and Engineering20229(6): 4349 - 4362.
[29]
LI Xue WANG Ziyi ZHANG Changda, et al. A novel dynamic watermarking-based EKF detection method for FDIAs in smart grid[J]. IEEE/CAA Journal of Automatica Sinica20229(7): 1319 - 1322.
[30]
AHMAD S AHMED H. Robust intrusion detection for resilience enhancement of industrial control systems: an extended state observer approach[J]. IEEE Transactions on Industry Applications202359(6): 7735 - 7743.

Funding

National Key Research and Development Program of China(2023YFB3106802)
the Science and Technology Project of Guizhou Power Grid Co., Ltd(GZKJXM20222346)
PDF(1462 KB)

Accesses

Citation

Detail

Sections
Recommended

/