False data injection attack in smart grid: Attack model and reinforcement learning-based detection method

  • Xixiang Lin
  • , Dou An
  • , Feifei Cui
  • , Feiye Zhang

Research output: Contribution to journalArticlepeer-review

17 Scopus citations

Abstract

The smart grid, as a cyber-physical system, is vulnerable to attacks due to the diversified and open environment. The false data injection attack (FDIA) can threaten the grid security by constructing and injecting the falsified attack vector to bypass the system detection. Due to the diversity of attacks, it is impractical to detect FDIAs by fixed methods. This paper proposed a false data injection attack model and countering detection methods based on deep reinforcement learning (DRL). First, we studied an attack model under the assumption of unlimited attack resources and information of complete topology. Different types of FDIAs are also enumerated. Then, we formulated the attack detection problem as a Markov decision process (MDP). A deep reinforcement learning-based method is proposed to detect FDIAs with a combined dynamic-static detection mechanism. To address the sparse reward problem, experiences with discrepant rewards are stored in different replay buffers to achieve efficiency. Moreover, the state space is extended by considering the most recent states to improve the perception capability. Simulations were performed on IEEE 9,14,30, and 57-bus systems, proving the validation of attack model and efficiency of detection method. Results proved efficacy of the detection method in different scenarios.

Original languageEnglish
Article number1104989
JournalFrontiers in Energy Research
Volume10
DOIs
StatePublished - 24 Jan 2023

Keywords

  • attack detection
  • deep reinforcement learning
  • false data injection attack
  • smart grid
  • state estimation

Fingerprint

Dive into the research topics of 'False data injection attack in smart grid: Attack model and reinforcement learning-based detection method'. Together they form a unique fingerprint.

Cite this