cyber security analysis of state estimators in electric ... › media › lccc2011 › workshopmay...

28
Cyber Security Analysis of State Estimators in Electric Power Systems H. Sandberg, G. Dán, A. Teixeira, K. C. Sou, O. Vukovic, K. H. Johansson ACCESS Linnaeus Center KTH Royal Institute of Technology, Stockholm, Sweden LCCC Workshop on Dynamics, Control and Pricing in Power Systems May 19 th , 2011

Upload: others

Post on 03-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Cyber Security Analysis of State Estimators in Electric Power Systems

H. Sandberg, G. Dán, A. Teixeira, K. C. Sou, O. Vukovic, K. H. Johansson

ACCESS Linnaeus Center

KTH Royal Institute of Technology, Stockholm, Sweden

LCCC Workshop on Dynamics, Control and Pricing in Power Systems

May 19th, 2011

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAA

Page 2: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Outline

• On state estimation, bad-data detection, and cyber stealth attacks in power systems

• A security index

– Definition and experimental validation

– Computation

– Protection and mitigation strategies

• Conclusions

Page 3: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Background and Motivation • Northeast U.S. Blackout of August 14th, 2003: 55

million people affected

• Software bug in energy management system stalled alarms in state estimator for over an hour

• Cyber attacks against the power network control center systems pose a real threat to society

Page 4: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

SCADA Systems and False-Data Attacks

• SCADA/EMS used to obtain accurate state information to identify faulty equipment, power flow optimization, contingency analysis,…

• Redundant power flow and voltage measurements (zi) currently sent over unencrypted communication network

• How do we strengthen security incrementally against attacks A1-A3?

(SCADA/EMS = Supervisory Control and Data Acquisition/Energy Management Systems)

Page 5: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Attacker Model and Bad Data Detection in Control Center

• Scenario: Attacker injects malicious data a to corrupt analog measurements in the power grid

• First characterize the set of undetectable malicious data a

Page 6: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

• Steady-state models:

• WLS-Estimates of bus phase angles i (in vector ):

• Linear DC approximation (¼ML-estimate):

Power Network and Estimator Models

H :=@h(x)

@x

¯¯¯x=0

For example: [Abur and Exposito, 2004]

Page 7: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Bad-Data Detection and Undetectable Attacks

• Bad-Data Detection triggers when residual r is large

• Characterization of undetectable malicious data a:

• The attacker has a lot of freedom in the choice of a!

• ak 0 means measurement device k is corrupted. Attacker likely to seek sparse solutions a!

r := z¡ z = z¡Hx = z¡H(HTR¡1H)¡1HTR¡1z

[Liu et al., 2009]

Page 8: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

• Assume attacker wants to make undetectable attack against measurement k

• Estimates complexity of “least-effort undetectable attack” on measurement k

• Example: ®1=2 ) undetectable attack against measurement 1 involves at least two measurements

• Non-convex optimization problem. How solve efficiently?

Security Index k

®k := minckak0 (sparsest possible attack)

a= Hc (undetectable attack)

ak = 1 (targets measurement k)

[Sandberg, Teixeira, and Johansson, 2010]

Page 9: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Example of the Index k

• Sparse attack corresponding to k:

• Compare with the “hat matrix”:

• Hat matrix misleading for judging sparsity of attacks!

Page 10: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Security Metric k for 40-bus Network

Attack 33 (7 measurements)

• = Current measurement config. Ο = Upgraded measurement config.

At least 7 measurements need to be

involved in an undetectable attack

[Teixeira et al.,2011]

Page 11: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

• Attacks of 150 MW (¼55% of nominal value) pass undetected in a real system!

Experiments on KTH SCADA/EMS Testbed

Bad Data Detected & Removed

False value

(MW)

Estimated value

(MW)

# BDD Alarms

-14.8 -14.8 0

35.2 36.2 0

85.2 86.7 0

135.2 137.5 0

185.2 Non convergent

-

[Teixeira et al.,2011]

Page 12: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Summary so Far

• Multiple interacting bad data is hard to detect. What if attacker exploits this well-known fact?

• Security index k identifies measurements that are relatively “easy” to attack (it locates weak spots)

• Analysis of the hat matrix can be misleading for judging the sparsity of possible attacks

• How do we compute ®k, and can we use it for protection and mitigation?

Page 13: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Combinatorial Optimization Problem

min 0

H

,: 1H k subject to

• Mixed integer linear program (MILP) • Combinatorial optimization problem. Expensive! • Typical convex heuristics: LASSO (||¢||0 ! ||¢||1)

• We will exploit structure in H instead:

:k

, arc-to-node incidence matrix, pos. diag. matrix

T

T

T

ADA

H DA A D

DA

Page 14: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Graph Interpretation

1=1

2=0

3=0

4 =0

phase angles

H injections and flows induced by phase angles

0 0

0

2

T

T

H DA

ADA

2(# arc with flow)

# node with injection

,: 1H k

Cost = 22+3 = 7

Fix two phase angles

Determine the rest to minimize cost

0minH

cost

(Dii = 1)

Page 15: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Optimal Solution is Binary Vector

1

0

1

0

0

1

1

4

1

4

Cost = 25+3=13 attacks Cost = 23+4=10 attacks

Can always construct no worse 0-1 feasible solution

-2 attacks

-2 attacks

+1 attack

negative->0

positive->1

(Dii = 1)

[Sou, Sandberg, and Johansson; 2011]

Page 16: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Reformulation as Graph Partitioning

Optimal i are either 0 or 1, for all i

Consider only partitioning of nodes

Each cut arc requires 2 attacks

Each node incident to at least one cut arc requires 1 attack

Pick partition of Minimum # cost

For example

Page 17: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

MIN-CUT Relaxation

Min cost partitioning difficult; Relaxation: ignore injection cost

0 0 02 T TH DA ADA

2(# cut arcs) # node with injection

Partitioning with minimum #of cut arcs

MIN-CUT problem

Enumerate ALL MIN-CUT

partitions for best relaxation!

[Sou, Sandberg, and Johansson; 2011]

Page 18: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

IEEE 14-bus Security Indices

MIN-CUT incurs no error, LASSO is very bad here

Page 19: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Large-Scale Examples

• IEEE 300-bus: Exact 6700 sec., LASSO 42.5 sec., MIN-CUT 0.044 sec.

• Polish 2383-bus: Exact ¼ 5.7 days, MIN-CUT 30 sec.

Page 20: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Outline

• On state estimation, bad-data detection, and stealth attacks in power systems

• A security index

– Definition and experimental validation

– Computation

– Protection and mitigation strategies

• Conclusions

Page 21: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Protection Against Stealth Attacks

• Set of protected measurements

– Cost of protection

• Protection goals

– Perfect protection

– Limited budget

• Max-min

• Max-ave

( )C

min ( ) . . kP

C s t k

( )C

Page 22: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Protection with Limited Budget π • Maximize minimum attack cost ®k

– Greedy iterative algorithm (MSM)

• P=0

• Iterate until

– Calculate k given P (k=1,…,M)

– Find most frequently appearing meters in minimal attacks corresponding to mink ®k and put in Mj

– Set

: ( )arg max min

M

MM

kkC P

jM

( )M

C P

[Dán and Sandberg, 2010]

Page 23: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Numerical Results • IEEE 14-bus and 118-bus networks

• Meters on every load and transmission line

– 54 and 490 measurements

Page 24: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

1 10 20 34

4

7

10

13

Measurement ID (i)

Att

ack c

ost

(

i)

Bound

Exact

Minimal Attacks - No Protection

1 50 100 150 200 250 304

4

7

10

13

16

1921

Measurement ID (i)

Att

ack

co

st (

i)

Bound

Exact

IEEE-14

IEEE-118

Non-meshed buses

Page 25: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Incremental Protection (IEEE 14-bus)

• Increase protection budget π=0,1,…,n • Perfect protection for π=n=13

– Incremental deployment efficient (compare with random deployment)

Page 26: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Impact of the Network Layer • Optical ground wire topology along transmission lines

• Attack targets

– Substation switching equipment

• Security metrics

– Substation attack impact (Is)

• # measurements exposed by substation

– Measurement attack cost (m)

• # substations needed to attack measurement

• Mitigation

– Routing – single and multipath

– Encryption – tamper proofness

– Physical protection, surveillance

Page 27: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Reroute Physically Correlated Measurements (IEEE 118-bus)

[Dán, Sou, and Sandberg, 2011]

Page 28: Cyber Security Analysis of State Estimators in Electric ... › media › LCCC2011 › WorkshopMay › slides › Sandberg.pdfMIN-CUT Relaxation Min cost partitioning difficult; Relaxation:

Summary • Undetectable false-data attack against power systems

possible. Verified both in theory and practice

• Attacks are local, and require basic power systems knowledge

• Why would an attacker do this?

– Disturb optimal power generation pattern

– Disturb contingency analysis

• Security metric ®k defined and computed with MIN-CUT/MAX-FLOW relaxation

• Metric ®k used to

– Allocate limited number of encryption devices

– Design routing tables that make attacks as hard as possible