TY - JOUR
T1 - Stealthy Data Integrity Attack Against Consensus-Based Distributed Energy Management Algorithm
AU - Jin, Wentao
AU - Zhou, Yadong
AU - Liu, Yang
AU - Liu, Ting
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2024
Y1 - 2024
N2 - Consensus-based distributed energy management (DEM) algorithm is a promising approach to manage distributed energy resources in microgrids. However, it introduces new risks of cyber-attacks to microgrids. This article proposes a new data integrity attack against consensus-based DEM algorithm, which enables the attacker to manipulate the power scheduling result of the attacked node and ultimately compromise its economic benefits. Specifically, we design a method to infer the privacy data of the attacked node from its broadcast information, and then use the inferred privacy data to design the false data that can manipulate the power scheduling result of the attacked node. The proposed method includes an analysis of the relationship between the difficulty of launching such an attack and the system topology, some findings contribute to designing a more secure communication topology. The attack offers higher stealthiness as it does not break power balance and the consistency of consensus variables, its effectiveness is verified on a 16-node microgird.
AB - Consensus-based distributed energy management (DEM) algorithm is a promising approach to manage distributed energy resources in microgrids. However, it introduces new risks of cyber-attacks to microgrids. This article proposes a new data integrity attack against consensus-based DEM algorithm, which enables the attacker to manipulate the power scheduling result of the attacked node and ultimately compromise its economic benefits. Specifically, we design a method to infer the privacy data of the attacked node from its broadcast information, and then use the inferred privacy data to design the false data that can manipulate the power scheduling result of the attacked node. The proposed method includes an analysis of the relationship between the difficulty of launching such an attack and the system topology, some findings contribute to designing a more secure communication topology. The attack offers higher stealthiness as it does not break power balance and the consistency of consensus variables, its effectiveness is verified on a 16-node microgird.
KW - Consensus algorithm
KW - data integrity attack
KW - distributed energy management (DEM)
KW - microgird
UR - https://www.scopus.com/pages/publications/85192194591
U2 - 10.1109/TII.2024.3390409
DO - 10.1109/TII.2024.3390409
M3 - 文章
AN - SCOPUS:85192194591
SN - 1551-3203
VL - 20
SP - 9976
EP - 9986
JO - IEEE Transactions on Industrial Informatics
JF - IEEE Transactions on Industrial Informatics
IS - 8
ER -