32
Spoofing State Estimation William Niemira

Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

Embed Size (px)

Citation preview

Page 1: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

Spoofing State Estimation

William Niemira

Page 2: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

Overview

• State Estimation• DC Estimator• Bad Data• Malicious Data• Examples• Mitigation Strategies

2

Page 3: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

State Estimation

• Finite transmission capacity

• Economic and security aspects must be managed– Contingency analysis– Pricing– Congestion

management

• Accurate state information needed

3

Page 4: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

State Estimation

• Networks are large– Thousands or tens of thousands of buses– Large geographical area

• Many measurements to reconcile– Different types– Redundant– Subject to error

4

Page 5: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

State Estimation

• State estimation uses measurement redundancy to improve accuracy

• Finds best fit for data

• Differences between measures and estimates can indicate errors

5

Page 6: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

DC Estimator

• Overdetermined system of linear equations

• Solved as weighted-least squares problem

• Assumes:– Lossless branches (neglects resistance

and shunt impedances)– Flat voltage profile (same magnitude at

each bus)• Reduces computational burden

6

Page 7: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

DC Estimator

• is the vector of n states• is the vector of m measurements• is the m x n Jacobian matrix• is an m vector of random errors

7

Page 8: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

DC Estimator

• Residual vector

• Estimated as where • Minimize:

• Where is a diagonal matrix of measurement weights

8

Page 9: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

DC Estimator

• Differentiate to obtain

• Where is the state estimate and is the state estimation gain matrix

• Bad data assumed if where is some tolerance

9

Page 10: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

1-Bus Example

PG = PGmeas

PL1 = PL1meas

– PL1 – PG = PL2meas

10

Page 11: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

1-Bus Example

For variances of 0.004, 0.001, and 0.001 for PG

meas , PL1meas ,

PL2meas respectively

11

Page 12: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

1-Bus Example

12

Page 13: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

3-Bus Example

– 50 θ2 – 100 θ3 = P1meas

150 θ2 – 100 θ3 = P2meas

– 100 θ2 + 200 θ3 = P3meas

– 100 θ3 = P13meas

13

Page 14: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

3-Bus Example

(−50 −100150 −100−100 2000 −100

)(θ 2θ 3)=(P1meas  P2meas  P3meas  P13meas  

)14

Page 15: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

3-Bus Example

H=(−50 −100150 −100−100 2000 −100

) ,𝑥=(θ2θ3) , 𝑧=(P1meas  P2meas  P3meas  P13meas  

)15

Page 16: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

Bad Data

• Bad data usually consists of isolated, random errors

• These types of errors tend to increase the residual

• Measurements with large residuals can be omitted to check for better fit

• Works well for non-interacting bad measurements

16

Page 17: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

1-Bus Example

Good Data Bad Data

17

Page 18: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

Malicious Data

• Malicious data (data manipulated by an adversary) need not be isolated or random

• Adversary may inject multiple coordinated measurement errors

• Errors could interact with each other or other measurements

• Could change without increasing 18

Page 19: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

Attack Formation

• Given: • Attacked measurement vector • Attack vector • Estimated states due to attack • Clever adversary chooses

19

Page 20: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

1-Bus Example

PG = PGmeas

PL1 = PL1meas

– PL1 – PG = PL2meas

20

Page 21: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

1-Bus Example

Unobservable attack vectors:

Any linear combination of

21

Page 22: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

1-Bus Example

Unattacked Attacked

22

Page 23: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

For Real?

• In practice, state estimators are more complicated than previous examples

• Assumed strong adversary:– Has access to topology information– Has some means to change

measurements• Why would someone do this?

– Simulate congestion—could affect markets

– Reduce awareness of system operator

23

Page 24: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

AC Estimator

• AC model accounts for some effects neglected in the DC model

• Attacks as generated earlier will affect residual

• Attack may not have effect intended by adversary

24

Page 25: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

AC Estimator

• is the vector of n states• is the vector of m measurements• is nonlinear vector function relating

measurements to states• is an m vector of random errors

25

Page 26: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

AC Estimator

• Solved using Gauss Newton method• Gain matrix: • is diagonal matrix of variances• Estimation procedure:

26

Page 27: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

AC Estimator

• DC approximation is pretty good

• Harder to detect attack than random error

• Relatively large attacks may escape detection

• Grid state affects quality of DC attack27

Page 28: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

Detection

• Focus on quantities neglected by DC model (VARs)

• VARs tend to be localized

• AttackLosses changeVAR flow and generation changes

28

Page 29: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

Detection

• Alternative approach is to estimate parameters simultaneously with states

• Augment state vector with known parameters

• Compare known values to parameter estimates to find bad data 29

Page 30: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

Detection

• Choose something known to the control center but not an attacker

• Example: TCUL xformer tap position, D-FACTS setting

• Attacks will perturb parameter estimates

30

Page 31: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

Conclusions

• State estimators, even nonlinear estimators, are vulnerable to malicious data

• Malicious data is different from conventional bad data

• Nonlinearity effects of the attack may be detectable

• Parameter estimation can verify data31

Page 32: Spoofing State Estimation William Niemira. Overview State Estimation DC Estimator Bad Data Malicious Data Examples Mitigation Strategies 2

Questions?

Thank you!

32