Next Article in Journal
Use of Balanced Scorecard (BSC) Performance Indicators for Small-Scale Hydropower Project Attractiveness Analysis
Next Article in Special Issue
Sizing Batteries for Power Flow Management in Distribution Grids: A Method to Compare Battery Capacities for Different Siting Configurations and Variable Power Flow Simultaneity
Previous Article in Journal
Machine Learning- and Artificial Intelligence-Derived Prediction for Home Smart Energy Systems with PV Installation and Battery Energy Storage
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel False Measurement Data Detection Mechanism for Smart Grids

1
Department of Electrical & Computer Engineering, Air University, Islamabad 44230, Pakistan
2
Department of Electrical Engineering, Air University Islamabad, Kamra Campus, Kamra 43570, Pakistan
3
Department of Electrical Engineering, Faculty of Engineering, University of Tabuk, Tabuk 47913, Saudi Arabia
4
Renewable Energy and Energy Efficiency Center (REEEC), University of Tabuk, Tabuk 71491, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Energies 2023, 16(18), 6614; https://doi.org/10.3390/en16186614
Submission received: 16 August 2023 / Revised: 5 September 2023 / Accepted: 11 September 2023 / Published: 14 September 2023
(This article belongs to the Special Issue Advances in Integrating Renewable Energy and Multi-Energy Sources)

Abstract

:
With the growing cyber-infrastructure of smart grids, the threat of cyber-attacks has intensified, posing an increased risk of compromised communication links. Of particular concern is the false data injection (FDI) attack, which has emerged as a highly dangerous cyber-attack targeting smart grids. This paper addresses the limitations of the variable dummy value model proposed in the authors previous work and presents a novel defense methodology called the nonlinear function-based variable dummy value model for the AC power flow network. The proposed model is evaluated using the IEEE 14-bus test system, demonstrating its effectiveness in detecting FDI attacks. It has been shown that previous detection techniques are unable to detect FDI attacks, whereas the proposed method is shown to be successful in the detection of such attacks, guaranteeing the security of the smart grid’s measurement infrastructure.

1. Introduction

A smart grid consists of smart infrastructure system, smart management system, and smart protection system. The two-way flow of electricity, as well as information, is used in a smart grid, and an automated as well as distributed energy delivery network is created in this way [1,2,3,4]. The smart grid also has of self-healing features [5].
Smart meters are present for the measurement of power flow values. After measurement, those values are transmitted to utility companies as well as to the customers. These data are also sent through Advanced Metering Infrastructure (AMI) for the purpose of billing and taking certain control actions [6,7]. In a smart grid, the smart meters help enhance the different operational functionalities, such as generation scheduling, load management, power quality enhancement, fault prediction, load forecasting, etc. [8]. The control mechanism of a smart grid is far better than that of a traditional grid [9,10].
If a mismatch has occurred between the generation and the consumption of power in a power system, the electrical quantities will deviate from their values. For this purpose, in a smart grid, the two-way communication is achieved. For a reliable power flow, the communication should be secure. The communication links may be hacked by attackers in an attempt to change the power flow measurements [11]. The attacks can be carried out for multiple purposes. Attacks can be carried out to obtain financial benefits and creating technical problems [12,13,14,15]. On the basis of the target of the attacks, there are three types of attacks: attacks to target availability, attacks to target integrity, and attacks to target confidentiality [16,17].
To detect bad data in the system, the technique of power system state estimation (PSSE) is employed. Although the PSSE technique performs well in detecting bad data, it fails to detect a special kind of attack that is called a stealth attack. The attacker has full awareness of the Jacobian matrix H of power system topology in this particular attack, and the attack can be constructed by using H . Stealth FDI is written as follows [18,19,20,21,22,23,24,25,26,27,28,29]:
z a = z + a
The measurements received in the control room are put in a vector represented by z. In the above equation, vector a consists of the false data, which are to be added to the measurement vector. The intruder hacks the communication line, and the measurement data is obtained. The attacker obtains the Jacobian matrix H with the help of those data. The attack vector a is injected into the measurement vector as   a = H c . The vector c is taken as c ~N (0, σ c 2 ), where σ c 2 denotes the false state variance. The attacked measurement vector is represented by z a .
The variable dummy value model (VDVM) proposed in [26] to detect FDI attacks becomes vulnerable to attacks when the attacker uses multivariate linear regression in order to find the function using which the dummy values were calculated. In that case, an attacker can make such attacks, which bypass the VDVM method. So, it is important to tackle these drawbacks of the VDVM technique.

Contributions

The paper has the following major contributions:
  • A nonlinear function-based the variable dummy value model (NF-VDVM) is proposed for the task of false data injection attack detection, and the proposed model has the ability to handle the limitations of the VDVM technique.
  • It has been validated through the results of the simulations that the NF-VDVM technique is able to successfully detect FDI attacks that were not detected by the bad data filter as well as the VDVM method, and the smart grid is protected against the FDI attacks.
The remaining paper is arranged as follows: Section 2 contains the related work present in the literature. Section 3 consists of the proposed model used to detect FDI attacks. The evaluation of the model is detailed in Section 4. The conclusion is presented in Section 5.

2. Related Work

In the literature, stealth false data injection (FDI) attacks are detected by using different types of algorithms and methods. The methods based on the deep learning [30] have been broadly used for this purpose. In [31], a single deep neural network model was designed to simultaneously perform the distribution system state estimation calculation and FDI attack detection using the real measurements. The FDI attacks were detected by proposing a hybrid deep learning model in [32]. The model used the convolutional neural networks-long short-term memory (CNN-LSTM) with particle swarm optimization (PSO). The measurements of the phasor measurement unit (PMU) were used by the model for the detection of abnormal measurement values. The PSO performed the task of optimizing the complex hyperparameter space of the CNN-LSTM. A graph convolutional network (GCN) framework was proposed in [33] to detect FDI attacks. In [34], an adversarial-resilient deep neural network detection framework was designed for the purpose of detecting the FDI attacks. In [35], FDI attacks were detected by proposing another method that was based on deep learning. The cyber-attacks in smart grids were classified by using the deep neural network model in [36].
In [37], a defense strategy was developed in order to improve the generalization ability as well as the detection performance in case of unseen FDI attacks. A graph autoencoder-based scheme was proposed for their detection that captured the spatio-temporal features from the power systems, and the detection performance was improved in this way. Moreover, in order to improve the generalization ability, training was performed on comprehensive graphs reflecting many realizations for power system topologies. A method for the localization detection of FDI attacks was proposed in [38]. The proposed method was based on graph data modeling and graph deep learning. In [39], a spatiotemporal deep network known as PowerFDNet was proposed to detect stealth FDI attacks. Two sub-architectures i.e., spatial architecture and temporal architecture formed the PowerFDNet. In [40], another deep learning-based method was adopted in order to detect attacks. The formulation of FDI attack detection was based on a machine learning based binary classification problem. A method based on deep neural networks was proposed for solving this binary classification problem. A spatio-temporal learning algorithm was developed in [41] to acquire the normal dynamics for the distribution systems in order to overcome FDI attacks. The usual dynamics were acquired by using a long short-term memory autoencoder. Then, the unsupervised trained model was employed to detect FDI attacks by using the residual error for each measurement sample. A spatiotemporal graph deep learning-based method was implemented in [42] in order to detect FDI attacks, and the attack samples were not required for the proposed scheme.
To detect FDI attacks, a method based on the gated graph neural network as well as the attention mechanism was employed in [43]. The spatial features of the grid operation data as well as the topology data were extracted by using the graph neural network, and the representation for every node was calculated. Moreover, the attention mechanism was used for assigning the aggregation weight for the neighbor nodes. In [44], for the detection of FDI attacks, a method was adopted that used the combination of blockchain, Fog Computing, as well as a linear support vector machine with Principal Component Analysis. In [45], FDI attacks were detected by using recurrent neural networks. Another technique based on the Gaussian mixture model was adopted in [46] for the detection of attacks.
A comprehensive analysis was provided in [47] for different machine learning algorithms for the detection of FDI attacks by two representative datasets, which were power system and water treatment. In order to detect FDI attacks, four methods based on machine learning were used in [48]. In [49], many machine learning-based methods were presented that have been employed in the literature in order to detect false data injection attacks. In [50], the classification of measurements as attacked or secure was achieved by using machine learning algorithms. For that purpose, the method of sparse logistic regression was used. Moreover, the methods of support vector machine (SVM), and k-nearest neighbor were also employed. The work of [51] consisted of a study on the classification of the data for the normal operation of a system as well as the data for FDI attacks. The detection model was based on the time series, and normal operating parameters as well as abnormal operation parameters in case of attack scenarios were collected as samples to train the detection model. A random forest algorithm was adopted for detection purposes.
Stealth FDI attacks were also detected in [52] by proposing two sensor encoding methods. FDI attacks towards the synchrophasor measurements were detected in [53] by using an online data-driven method. There was use of density-based local outlier factor analysis by the proposed algorithm for the purpose of detecting anomalies in data. In [54], another technique was employed, in which the modelling of the system was performed as a discrete-time linear dynamic system. The Kalman filter was used to perform the state estimation. The attacks were quickly detected by the generalized cumulative sum algorithm.
The research work presented in this paper is an improved form of our previously published work [26], in which the VDVM technique was proposed for the detection of FDI attacks. In the previous research work, the comparison of our proposed work was made with the existing techniques used in that area. So, in order to avoid repetition, the comparison of the proposed technique of NF-VDVM has not been made with those techniques. However, the NF-VDVM method has been compared to the previously published technique of VDVM in order to show the necessities and advantages of the proposed NF-VDVM scheme, and it has been validated that the NF-VDVM technique is capable of handling the limitations of the VDVM technique.

3. Proposed Model

In this paper, the proposed model is an extension of the work given in [26]. A novel model for power system has been introduced in [26] for an AC power flow network, in which stealth false data injection attacks are efficiently detected in the control room. The concept of a dummy measurement value is the basis of this model. The smart meters send the actual measurement values as well as the dummy values. For the task of efficient detection of FDI attacks, two techniques have been proposed, which are the fixed dummy value model (FDVM) and variable dummy value model (VDVM). The VDVM has detected even those attacks that had not been detected by the FDVM. However, the VDVM has a limitation while detecting stealth FDI attacks. When the intruder uses multivariate linear regression (MLR) for finding the coefficients used in the function implemented for the calculation of dummy measurement values, the intruder can make an attack that bypasses the VDVM technique. For this purpose, to tackle this limitation, a nonlinear function-based variable dummy value model (NF-VDVM) is proposed in this paper, which is robust against stealth FDI attacks.
In this work, the potential flaws of the communication networks in the smart grid supervisory control and data acquisition (SCADA) systems, like the basic bugs or the communication collapses, are not taken into account. Moreover, it is assumed that noise, interference, or estimation errors do not exist for data collection or detection processing. The main emphases of this research work is on the false data injection attacks. In such attacks, an intruder hacks the measurement data from the communication line and injects the malicious data into the measurement data before it reaches the control room.
In the case of an AC power flow network, where total buses is represented as b and the total transmission lines as l, the measurement vector is written as follows:
z t = z p ( t )     z q ( t )       z p l ( t )      z q l ( t )      z l p ( t )      z l q ( t ) T
Here z t denotes the measurement vector at tth instant where t = 1, 2, 3, …, tt. The total number of instances are represented by tt. The vectors z p ( t ) and z q ( t ) consist of the active powers and the reactive powers, which are injected into all the buses at the tth instant, respectively. The vectors z p l ( t ) and z q l ( t ) contain the active as well as the reactive forward powers for the transmission lines at the tth instant. Similarly, z l p ( t ) and z l q ( t ) consist of the active as well as the reactive backward powers for the transmission lines at the tth instant. The dimensions of the measurement vector z t are m × 1, where m represents the number of entries in z t .
In the case of dummy measurement values, the measurement vector will become like this:
z d t = z p ( t ) 1 ; z p t 1 ; ; z q ( t ) b ; z q t b ;   z p l t 1 ; z p l t 1 ; ; z q l t l ; z q l t l ;     z l p t 1 ; z l p t 1 ; ; z l q t l ; z l q t l  
Here z d t represents the measurement vector, which contains the actual as well as the dummy values. z p ( t ) 1 denotes the first entry of vector z p ( t ) , and z q ( t ) b shows the bth entry of z q ( t ) . In the new measurement vector, even indexes contain the dummy measurement values of power. Dummy value vectors consisting of active as well as the reactive powers that are injected to buses at the tth instant are z p t and z q t , respectively. Similarly, the vectors z p l t , z q l t , z l p t , and z l q t contain the dummy values of active as well as reactive forward and backward transmission line powers at the tth instant. The dimensions of z d t will be 2 m × 1.
In the proposed nonlinear function-based variable dummy value model (NF-VDVM), a dummy measurement value along with the actual measurement value is transmitted to the control room, and that dummy value is calculated by using a nonlinear function. A fifth-order polynomial function is used for the purpose of calculating the dummy measurement values, and the actual measurement values are used in that function. So the dummy values have a dependency on the actual values and will be changed with the change in actual measurement values. Only the control room knows about the function, and its nonlinearity makes it really difficult for the attacker to successfully predict the function and to make an attack. This nonlinear function is inserted into the meters to calculate the dummy measurement values. The functions through which the dummy values are calculated for buses in the case of NF-VDVM are given below:
z p t i = α 1 p i z p i t 5 + α 2 p i z p i t 4 + α 3 p i z p i t 3 + α 4 p i z p i t 2 + α 5 p i z p i t + α 6 p i
z q t i = α 1 q i z q i t 5 + α 2 q i z q i t 4 + α 3 q i z q i t 3 + α 4 q i z q i t 2 + α 5 q i z q i t + α 6 q i
In Equations (4) and (5), i = 1,2 , 3 , , b . z p t i and z q t i denote the ith entries for the vectors z p t and z q t , respectively, containing dummy measurement values for the active as well as the reactive powers, which are injected to buses at the tth instant. Similarly, z p i t and z q i t denote the active and the reactive powers, respectively, for the first transmission line that is attached to the ith bus at the tth instant. α 1 p i , α 2 p i , α 3 p i , α 1 q i , α 2 q i , and α 3 q i represent the constants used in the equations. In Equations (4) and (5), the highest order of the expressions is set to 5. The purpose behind the selection of the highest order of the equations is that the highly nonlinear functions are selected for the calculation of the dummy values, so that the attacker is not able to predict the function. At the same time, the memory requirement is also kept in mind. A function having the highest degree of 5 contains the six constants for the calculation of a single dummy value of power. The higher the order of the polynomial function is, the more constants are utilized, and the more memory is required to implement that function. So, the highest degree of the functions used to calculate the dummy values of power is taken as 5.
The functions used for calculating the dummy values of forward as well as the backward active and reactive powers for transmission lines are given by:
z p l t i = α 1 p l i z p p i t 5 + α 2 p l i z p p i t 4 + α 3 p l i z p p i t 3 + α 4 p l i z p p i t 2 + α 5 p l i z p p i t + α 6 p l i
z q l t i = α 1 q l i z q q i t 5 + α 2 q l i z q q i t 4 + α 3 q l i z q q i t 3 + α 4 q l i z q q i t 2 + α 5 q l i z q q i t + α 6 q l i
z l p t i = α 1 l p i z p r i t 5 + α 2 l p i z p r i t 4 + α 3 l p i z p r i t 3 + α 4 l p i z p r i t 2 + α 5 l p i z p r i t + α 6 l p i
z l q t i = α 1 l q i z q r i t 5 + α 2 l q i z q r i t 4 + α 3 l q i z q r i t 3 + α 4 l q i z q r i t 2 + α 5 l q i z q r i t + α 6 l q i
In Equations (6)–(9), i = 1,2 , 3 , , l . Here, z p l t i and z q l t i represent ith entries for dummy measurement vectors z p l t and z q l t , respectively, containing forward active as well as the reactive powers passing through the transmission lines at the tth instant. Similarly, z l p t i and z l q t i denote the ith entries for the dummy measurement vectors z l p t and z l q t , respectively, which contain backward active as well as the reactive powers passing through the transmission lines at the tth instant. To calculate the dummy measurement value of power flowing through a particular transmission line, z p p i t and z p r i t denote the active powers, and z q q i t and z q r i t denote the reactive powers injected into the bus from which that particular transmission line is coming at the tth instant. These equations also use some constants, which are denoted by α ’s.
To learn the coefficients present in the equations used to calculate dummy values of power, a machine learning technique, known as polynomial regression, is used. It is a technique that models the relationship between a dependent and independent variable as a polynomial having a degree greater than 1. Polynomial regression is used here to find the best values of constants. The process of polynomial regression for finding the constants used in Equation (3) is explained here. The hypothesis can be written in this form:
g α k z p i k = α 1 p k z p k 5 + α 2 p k z p k 4 + α 3 p k z p k 3 + α 4 p k z p k 2 + α 5 p k z p k + α 6 p k
In the above hypothesis, g α k z p i k is the function of z p i k parameterized by α k . z p i k denotes the kth input vector, and k = 1,2,3,……,b. Similarly, α k represents the kth parameter vector. α 1 p k , α 2 p k , α 3 p k , α 4 p k , α 5 p k , and α 6 p k denote the constants to learn. Depending on this hypothesis, a cost function is defined, and a method is adopted to minimize the cost function as discussed in detail for multivariate linear regression in [26]. The best values of constants are determined in this way, and the same process is used to find the constants of the remaining equations. Then these values are placed in their functions in order to calculate the dummy measurement values of active as well as reactive power. The nonlinear functions are then placed into meters for the purpose of calculating dummy measurement values of power. The actual values of power are measured by the meters, and then those embedded functions are used for calculating the dummy values of power. The actual measured values of power as well as the calculated dummy values are sent to the control room.
For the aim detecting FDI attacks in the control room, the recalculation of dummy measurement values is achieved by using those functions. In this case, the actual values of power that are obtained in the control room from the measurement vector are used in those functions for the recalculation of dummy values. For attack detection, a comparison is made between the recalculated dummy measurement value and the received dummy measurement value from the measurement vector. For comparing the recalculated dummy values with the received dummy values in the control room, the equations used for active as well as the reactive powers injected into buses are following:
r z p t j = z p r t j α 1 p j z p r j t 5 + α 2 p j z p r j t 4 + α 3 p j z p r j t 3 + α 4 p j z p r j t 2 + α 5 p j z p r j t + α 6 p j j = 1,2 , 3 , , b
r z q t j = z q r t j α 1 q j z q r j t 5 + α 2 q j z q r j t 4 + α 3 q j z q r j t 3 + α 4 q j z q r j t 2 + α 5 q j z q r j t + α 6 q j j = 1,2 , 3 , , b
z d t r represents measurement vector that the control room receives at the tth instant. z p r t j and z q r t j denote the jth entries of the received dummy measurement vectors z p r t   and   z q r t , respectively at the tth instant, having dummy measurement values for active and reactive powers. Similarly, z p r j t and z q r j t are picked from the received measurement vector. The jth entries of residue vectors r z p t and r z q t are denoted by r z p t j and r z q t j . The residue for active as well as the reactive powers that are injected to buses at tth instant are contained in these residue vectors. To calculate the residue of forward as well as the backward active and reactive powers of transmission lines, the following equations are used:
r z p l t j = z p l r t j α 1 p l j z p p r j t 5 + α 2 p l j z p p r j t 4 + α 3 p l j z p p r j t 3 + α 4 p l j z p p r j t 2 + α 5 p l j z p p r j t + α 6 p l j j = 1,2 , 3 , , t
r z q l t j = z q l r t j α 1 q l j z q q r j t 5 + α 2 q l j z q q r j t 4 + α 3 q l j z q q r j t 3 + α 4 q l j z q q r j t 2 + α 5 q l j z q q r j t + α 6 q l j    j = 1,2 , 3 , , t
r z l p t j = z l p r t j α 1 l p j z p r r j t 5 + α 2 l p j z p r r j t 4 + α 3 l p j z p r r j t 3 + α 4 l p j z p r r j t 2 + α 5 l p j z p r r j t + α 6 l p j     j = 1,2 , 3 , , t
r z l q t j = z l q r t j α 1 l q j z q r r j t 5 + α 2 l q j z q r r j t 4 + α 3 l q j z q r r j t 3 + α 4 l q j z q r r j t 2 + α 5 l q j z q r r j t + α 6 l q j j = 1,2 , 3 , , t
In the above equations, the used actual measurement values as well as the dummy values are taken from the measurement vector that the control room receives. The jth entries of residue vectors, r z p l t , r z q l t , r z l p t , and r z l q t , are represented by r z p l t j , r z q l t j , r z l p t j , and r z l q t j . These residue vectors contain the residue of forward and backward active and reactive transmission lines powers at the tth instant. The system is considered as attacked when any of the entries of residue vectors is not equal to zero. The hacking of the measurement vector z d t is performed by the intruder, and the FDI attack is launched. After the attack, the control room receives the measurement vector z d t r . The attacker also attacks the dummy measurement values. The attacker is unaware of that function through which the dummy measurement values are calculated. Moreover, it becomes difficult for an attacker to predict the nonlinear function used in this case. So, if the attack is made by the attacker, the residue will be some value other than zero. In this way, the control room detects the attack.

4. Evaluation

The implementation of the proposed model is achieved on the IEEE 14-bus system with the AC power flow network. The IEEE 14-bus system [55] is a commonly used benchmark in power systems as well as electrical engineering research. It is a simplified representation of an electrical power network having 14 buses (nodes) and 20 branches (transmission lines). The IEEE 14-bus test system is generally used for many purposes, such as testing and the validation of the algorithms as well as the techniques in the power system analysis. For the purposes of the implementation and evaluation of the proposed model, realistic data for the AC power flow network is used. The data generation for the power flow network is achieved on the basis of the load curves obtained from a transmission organization, which is known as PJM. PJM [56] functions as a regional transmission organization (RTO), which manages the flow of wholesale electricity across the 13 U.S. states and the District of Columbia. The load curves taken from the PJM are used as a reference for the purpose of data generation. The realistic data are the basis of the load curves of PJM. So, our generated data, by using those load curves, are extremely close to the realistic data. The data are generated for the four seasons, winter, summer, spring, and fall, according to standard load curves.

4.1. Data Generation

The generation of data is achieved for the IEEE 14-bus test system for the four different seasons by following the standard realistic load curve for each of the seasons. The time interval between two consecutive measurement vectors is one hour. This means that we take the measurements on an hourly basis. So, for a single day, the number of times the measurement vectors are obtained in the control room is 24. Data generation is performed for one year, that is, 365 days. So, the measurement vectors are obtained for 8760 different instances. The simulations of the model are performed by using MATPOWER 7.0. MATPOWER [57] is an open source, MATLAB-based tool used for the purpose of simulation as well as the optimization of the power system. It is commonly used in the field of electrical engineering, mainly for studying and analyzing power systems. In standard reference load curves, load varies from 61% to 118.5% of its average value. So, for our data generation task, the load is also varied between these two values. After the variation of the overall load of the power system, the load curves for the four different seasons are given in Figure 1. These load curves are shown for a single day. There are 24 different instances, during which the load values are shown in the figure. These load curves are used for the generation of realistic data.

4.2. Method to Launch an Attack

In this manuscript, a certain method is adopted to launch an attack for the simulation purposes, and whenever attacks are made, this method is used for their construction. The attacks are carried out in 25% of measurement vectors for a single day. This means that the measurement vectors obtained at 6 instances out of 24 are taken as attacked. To make it generalized, those six instances are randomly chosen for one day. Out of the total measurement vectors chosen to be attacked, 50% are selected to be subjected to simple attacks, and in the remaining 50%, stealth attacks are carried out. This choice of instances for doing simple attacks or stealth FDI attacks is also carried out randomly. For the purpose of launching the stealth attacks, the attack vector is made by the method in which the Jacobian matrix is constructed first, and then the multiplication of that Jacobian matrix is achieved with vector c . The selection of elements of vector c is carried out in such a way that the values between −1 and 1 are randomly selected. So, its mean is zero, and the variance is 2. The attack vector is added to the measurement vector in order to launch the attack.

4.3. Limitations of Variable Dummy Value Model

The detection technique in [26] known as the variable dummy value model is able to successfully detect FDI attacks. As the dummy values are calculated through a linear function, it is possible for the attacker to find the exact function by using multivariate linear regression. The attacker uses this function in order to calculate and set dummy measurement values while making the attack. In this case, the attacks launched by the attacker become undetectable for the VDVM technique. Figure 2 shows the results for the case in which the VDVM is bypassed by the attacks. The results for simple attacks as well as the stealth attacks are given in the figure. The figure also shows safe measurements. The measurements having simple attack are labelled with 0, stealth attack with −1, and the label used for the safe measurements is 1. All of the obtained dummy measurement values that are contained in the measurement vector are added to obtain a single combined power value at a particular instant. Similarly, all the recalculated dummy values are also added to obtain another combined power at that instant. The absolute value of both the combined powers at every instant are plotted for one complete day in Figure 2, and two curves are drawn, that is, one by using combined powers from obtained values and the second by drawing from the combined powers of the recalculated values. Both of the curves are the same at all the instances, which shows that the combined value of obtained powers is equal to the combined value of the recalculated powers for all the instances. For a secure system, bot values should not be the same when the attack is made. But in this case, both of the values are the same even for simple attacks as well as for stealth attacks. So, the variable dummy value model fails to detect the simple as well as stealth attacks, as shown by the results.
In Figure 3, the combined power of the obtained dummy values and the combined power of recalculated dummy values at every instant for a complete day are plotted by using the bar graph. The first bar shows the absolute value of the combined power of the obtained dummy values, and the second bar displays the absolute value of the combined power of recalculated dummy values. The third bar gives the absolute value of residue. Here, the residue is calculated by taking the difference of the combined power of the recalculated dummy values from the combined power of the obtained dummy values. When the system is secure, if an attack is made, this residue must not give a zero value. But as the residue is zero in the cases of simple attacks and the stealth FDI attacks, VDVM is bypassed in this way.

4.4. Results of Nonlinear Function Based Variable Dummy Value Model

The limitation of VDVM is removed by proposing the NF-VDVM technique. It becomes extremely difficult for the attacker to attack the system due to the use of nonlinear functions in the proposed NF-VDVM technique. The constants used in the polynomial, through which the dummy measurement values are calculated, are learned via polynomial regression. In the case of the polynomial regression model, the dummy measurement values are selected as the outputs for the purpose of finding the relation between the input and output. For all of the equations implemented for calculating the dummy values of power, the polynomial regression model is run, and the best values are obtained for the constants of all the polynomial functions. The learning of the polynomial regression model for finding the parameters of the equation that is implemented to find the dummy measurement values of P 1 is shown in Figure 4. P 1 represents the active power that is injected to bus 1, and P 12 denotes the forward active power flowing through the first transmission line (active power flowing from bus 1 to bus 2 in the forward direction). The suitable constants for all of the equations are found, and then those equations are placed in meters to compute the dummy values.
In Figure 5, the results of the proposed NF-VDVM for simple as well as stealth attacks are shown by plotting the curves for the obtained dummy measurement values and the recalculated dummy measurement values of P 1 (active power that is injected to bus 1) for a complete day. In the figure, the measurements that have a simple attack are labelled with 0, stealth attack with −1, and safe measurements are labelled with 1. The absolute value of the obtained dummy values as well as the recalculated dummy values is used here to draw the curves. For safe measurements, the obtained dummy measurement value as well as the recalculated dummy measurement value of P 1 should be the same, and they should be different in case of simple and stealth FDI attacks. From the figure, it is shown that both the curves are same at the instances of safe measurements. However, for the cases of simple attacks as well as the stealth FDI attacks, the curves are not the same showing that the proposed NF-VDVM technique successfully detects the simple attacks as well as the stealth FDI attacks. In the figure, at some of the instants when the attacks are launched, the recalculated dummy values and the obtained dummy values are close to each other, but they are not exactly the same. If there is no attack, both of the values should be exactly the same. So, even a small difference between them is enough to detect the attacks.
Figure 6 shows a bar graph to display the results of NF-VDVM for simple as well as stealth FDI attacks. The first bar at every instant shows the absolute value of the obtained dummy value of P 1 at that particular instant. The second bar displays the absolute value of the recalculated dummy value of P 1 at that instant. However, the third bar shows the absolute value of residue, whose calculation procedure is given in Section 3. To find the value of residue, the recalculated dummy values that use the received actual values from the measurement vector, are subtracted from the received dummy values present in the measurement vector. The system is said to be secure when the residue contains some value other than zero at the instances of attacks. It is shown in Figure 6 that the value of residue is zero for the instances of safe measurement, and nonzero for simple attacks as well as stealth attacks. The results show the success of our proposed method NF-VDVM against simple attacks and stealth attacks.
The results of NF-VDVM are also shown in Figure 7 by using the combined power values of received dummy values and recalculated dummy values. The combined power of the received dummy values at a particular instant is calculated by adding all the obtained dummy values of power present in the measurement vector at that instant. Similarly, the combined power of the recalculated dummy values at a particular instant is calculated by adding all the recalculated dummy values of power at that instant. The absolute value of the combined power of the obtained dummy values and the absolute value of the combined power of the recalculated dummy values are plotted in Figure 7 at all the instances for a complete day. The curves are drawn by using the combined power values at all the instances. For a secure system, both of the curves (one from the combined power values of received dummy values and the other from the combined power values of recalculated dummy values) should not be same at the instances where the attack is made. It is shown from Figure 7 that at the instances of simple attacks as well as stealth FDI attacks, the curves are not the same, which proves that the simple attacks as well as the stealth attacks are detected by the proposed NF-VDVM method.
Figure 8 displays the results of NF-VDVM in the form of a bar graph for the combined power values of the received dummy values as well as the combined power values of the recalculated dummy values. The first bar shows the absolute value of the combined power of the obtained dummy values present in the measurement vector at a particular instant. The second bar gives the absolute value of the combined power of recalculated dummy values at that instant. The third bar shows the absolute value of residue, which is calculated here by subtracting the combined power of recalculated dummy values from the combined power of obtained dummy values at that particular instant. A system is said to be secure when the value of this residue is not equal to zero for the instances at which the attacks are carried out. Figure 8 shows that the value of the residue is zero at the instances of the same measurements. However, in the case of simple attacks as well as stealth FDI attacks, the residue is not zero. It proves that the simple attacks and stealth FDI attacks are successfully detected by our proposed method NF-VDVM.
The computational cost of the VDVM and NF-VDVM techniques is calculated. The simulation time of both techniques is computed and is given in Table 1.
The simulations are performed on the system, which has the following characteristics: Intel Core i7 (8th Gen) @2.20 GHz 2.21 GHz, RAM 16 GB (HP Omen, Canada), System Type 64-bit operating system, ×64-based processor. In order to compute the simulation time, the simulations are run five times for the VDVM and NF-VDVM techniques. The time is noted for each of the technique at each trial. Finally, the average simulation time of VDVM and NF-VDVM is calculated, and is shown in Table 1. The average simulation time of VDVM is less than that of NF-VDVM. The NF-VDVM technique has higher computational cost compared to VDVM due to the use of higher order functions for the calculation of dummy values in NF-VDVM, but the efficiency of NF-VDVM in the detection of FDI attacks is higher than that of VDVM. Although VDVM has less computational cost, due to its limitations, the security of the smart grid is compromised in the case of VDVM, which is a thing that cannot be overlooked. So, the NF-VDVM technique is preferred over the VDVM in order to protect the smart grid against FDI attacks.
The NF-VDVM technique is capable of detecting FDI attacks in an efficient way, but it may have some limitations and validity threats. The noise in the measurement data can affect the performance of NF-VDVM. Moreover, if the intruder somehow becomes familiar with the functions implemented for the calculation of dummy measurement values, and then the attack is launched, it may be difficult for the technique of NF-VDVM to detect the attack.

5. Conclusions

In a smart grid, the hacking of the communication links is carried out by the attackers in order to make different types of attacks. A huge loss and damage can be suffered through these cyber-attacks. The intruder can obtain financial benefits from these attacks. So, the detection of these cyber-attacks is very important for the accurate and uninterrupted power flow. The bad data detection techniques such as the DC state estimation as well as the AC state estimation are incapable of detecting the stealth FDI attacks. The method of VDVM also fails in a certain scenario. To tackle the limitations, a new technique named NF-VDVM was implemented into the power system to detect stealth FDI attacks. NF-VDVM successfully detected the attacks, and power system was made secure.

Author Contributions

Conceptualization, M.A.S., F.A. and R.N.; data curation, S.U.K.; formal analysis, F.A. and S.U.K.; funding acquisition, A.W.; methodology, M.A.S. and F.A.; resources, S.U.K. and H.A.; software, R.N.; supervision, F.A., A.W. and H.A.; validation, S.U.K. and H.A.; visualization, R.N. and A.W.; writing—original draft, M.A.S.; writing—review and editing, F.A., A.W. and H.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Qays, M.O.; Ahmad, I.; Abu-Siada, A.; Hossain, M.L.; Yasmin, F. Key communication technologies, applications, protocols and future guides for IoT-assisted smart grid systems: A review. Energy Rep. 2023, 9, 2440–2452. [Google Scholar] [CrossRef]
  2. Ghiasi, M.; Wang, Z.; Mehrandezh, M.; Jalilian, S.; Ghadimi, N. Evolution of smart grids towards the Internet of energy: Concept and essential components for deep decarbonisation. IET Smart Grid 2023, 6, 86–102. [Google Scholar] [CrossRef]
  3. Fang, X.; Misra, S.; Xue, G.; Yang, D. Smart grid—The new and improved power grid: A survey. IEEE Commun. Surv. Tutor. 2011, 14, 944–980. [Google Scholar] [CrossRef]
  4. Nawaz, R.; Akhtar, R.; Shahid, M.A.; Qureshi, I.M.; Mahmood, M.H. Machine learning based false data injection in smart grid. Int. J. Electr. Power Energy Syst. 2021, 130, 106819. [Google Scholar] [CrossRef]
  5. Farhangi, H. The path of the smart grid. IEEE Power Energy Mag. 2009, 8, 18–28. [Google Scholar] [CrossRef]
  6. Zheng, J.; Gao, D.W.; Lin, L. Smart meters in smart grid: An overview. In Proceedings of the IEEE Green Technologies Conference (GreenTech), Denver, CO, USA, 4–5 April 2013. [Google Scholar]
  7. Mollah, M.B.; Zhao, J.; Niyato, D.; Lam, K.Y.; Zhang, X.; Ghias, A.M.; Koh, L.H.; Yang, L. Blockchain for future smart grid: A comprehensive survey. IEEE Internet Things J. 2020, 8, 18–43. [Google Scholar] [CrossRef]
  8. Dewangan, F.; Abdelaziz, A.Y.; Biswal, M. Load Forecasting Models in Smart Grid Using Smart Meter Information: A Review. Energies 2023, 16, 1404. [Google Scholar] [CrossRef]
  9. Ghiasi, M.; Niknam, T.; Wang, Z.; Mehrandezh, M.; Dehghani, M.; Ghadimi, N. A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electr. Power Syst. Res. 2023, 215, 108975. [Google Scholar] [CrossRef]
  10. Khurana, H.; Hadley, M.; Lu, N.; Frincke, D.A. Smart-grid security issues. IEEE Secur. Priv. 2010, 8, 81–85. [Google Scholar] [CrossRef]
  11. Nawaz, R.; Shahid, M.A.; Mahmood, M.H. False Data Injection in smart grid in the presence of Missing Data. In Proceedings of the 1st International Conference on Smart Innovation, Ergonomics and Applied Human Factors (SEAHF), Madrid, Spain, 22–24 January 2019. [Google Scholar]
  12. Jayachandran, M.; Reddy, C.R.; Padmanaban, S.; Milyani, A.H. Operational planning steps in smart electric power delivery system. Sci. Rep. 2021, 11, 17250. [Google Scholar] [CrossRef]
  13. Hassan, M.A.; Ali, S.; Imad, M.; Bibi, S. New advancements in cybersecurity: A comprehensive survey. In Big Data Analytics and Computational Intelligence for Cybersecurity; Ouaissa, M., Boulouard, Z., Ouaissa, M., Khan, I.U., Kaosar, M., Eds.; Springer: Cham, Switzerland, 2022; pp. 3–17. [Google Scholar]
  14. Shahid, M.A.; Nawaz, R.; Qureshi, I.M.; Mahmood, M.H. Proposed defense topology against cyber attacks in smart grid. In Proceedings of the International Conference on Power Generation Systems and Renewable Energy Technologies (PGSRET), Islamabad, Pakistan, 10–12 September 2018. [Google Scholar]
  15. Gunduz, M.Z.; Das, R. Analysis of cyber-attacks on smart grid applications. In Proceedings of the International Conference on Artificial Intelligence and Data Processing (IDAP), Malatya, Turkey, 28–30 September 2018. [Google Scholar]
  16. Esmalifalak, M.; Han, Z.; Song, L. Effect of stealthy bad data injection on network congestion in market based power system. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Paris, France, 1–4 April 2012. [Google Scholar]
  17. Zhao, Z.; Chen, G. An overview of cyber security for smart grid. In Proceedings of the IEEE 27th International Symposium on Industrial Electronics (ISIE), Cairns, QLD, Australia, 13–15 June 2018. [Google Scholar]
  18. Esmalifalak, M.; Nguyen, H.; Zheng, R.; Han, Z. Stealth false data injection using independent component analysis in smart grid. In Proceedings of the IEEE international conference on smart grid communications (SmartGridComm), Brussels, Belgium, 17–20 October 2011. [Google Scholar]
  19. Liu, L.; Esmalifalak, M.; Han, Z. Detection of false data injection in power grid exploiting low rank and sparsity. In Proceedings of the IEEE International Conference on Communications (ICC), Budapest, Hungary, 9–13 June 2013. [Google Scholar]
  20. Liang, G.; Zhao, J.; Luo, F.; Weller, S.R.; Dong, Z.Y. A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 2016, 8, 1630–1638. [Google Scholar] [CrossRef]
  21. Kosut, O.; Jia, L.; Thomas, R.J.; Tong, L. Limiting false data attacks on power system state estimation. In Proceedings of the 44th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 17–19 March 2010. [Google Scholar]
  22. Yang, Q.; Yang, J.; Yu, W.; An, D.; Zhang, N.; Zhao, W. On false data-injection attacks against power system state estimation: Modeling and countermeasures. IEEE Trans. Parallel Distrib. Syst. 2013, 25, 717–729. [Google Scholar] [CrossRef]
  23. Ashok, A.; Govindarasu, M.; Ajjarapu, V. Online detection of stealthy false data injection attacks in power system state estimation. IEEE Trans. Smart Grid 2016, 9, 1636–1646. [Google Scholar] [CrossRef]
  24. Huang, Y.; Esmalifalak, M.; Nguyen, H.; Zheng, R.; Han, Z.; Li, H.; Song, L. Bad data injection in smart grid: Attack and defense mechanisms. IEEE Commun. Mag. 2013, 51, 27–33. [Google Scholar] [CrossRef]
  25. Kosut, O.; Jia, L.; Thomas, R.J.; Tong, L. Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures. In Proceedings of the First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010. [Google Scholar]
  26. Shahid, M.A.; Ahmad, F.; Albogamy, F.R.; Hafeez, G.; Ullah, Z. Detection and prevention of false data injection attacks in the measurement infrastructure of smart grids. Sustainability 2022, 14, 6407. [Google Scholar] [CrossRef]
  27. Bobba, R.B.; Rogers, K.M.; Wang, Q.; Khurana, H.; Nahrstedt, K.; Overbye, T.J. Detecting false data injection attacks on dc state estimation. In Proceedings of the First Workshop on Secure Control Systems, CPSWeek, Stockholm, Sweden, 12 April 2010. [Google Scholar]
  28. Liu, Y.; Ning, P.; Reiter, M.K. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 2011, 14, 1–33. [Google Scholar] [CrossRef]
  29. Liu, L.; Esmalifalak, M.; Ding, Q.; Emesih, V.A.; Han, Z. Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid 2014, 5, 612–621. [Google Scholar] [CrossRef]
  30. Ali, S.; Haider, A.; Rahman, M.; Sohail, M.; Zikria, Y.B. Deep learning (DL) based joint resource allocation and RRH association in 5G-multi-tier networks. IEEE Access 2021, 9, 118357–118366. [Google Scholar] [CrossRef]
  31. Radhoush, S.; Vannoy, T.; Liyanage, K.; Whitaker, B.M.; Nehrir, H. Distribution System State Estimation and False Data Injection Attack Detection with a Multi-Output Deep Neural Network. Energies 2023, 16, 2288. [Google Scholar] [CrossRef]
  32. Bitirgen, K.; Filik, Ü.B. A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid. Int. J. Crit. Infrastruct. Prot. 2023, 40, 100582. [Google Scholar] [CrossRef]
  33. Vincent, E.; Korki, M.; Seyedmahmoudian, M.; Stojcevski, A.; Mekhilef, S. Detection of false data injection attacks in cyber–physical systems using graph convolutional network. Electr. Power Syst. Res. 2023, 217, 109118. [Google Scholar] [CrossRef]
  34. Li, J.; Yang, Y.; Sun, J.S.; Tomsovic, K.; Qi, H. Towards adversarial-resilient deep neural networks for false data injection attack detection in power grids. arXiv 2021, arXiv:2102.09057. [Google Scholar]
  35. Niu, X.; Li, J.; Sun, J.; Tomsovic, K. Dynamic detection of false data injection attack in smart grid using deep learning. In Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 18–21 February 2019. [Google Scholar]
  36. Zhou, L.; Ouyang, X.; Ying, H.; Han, L.; Cheng, Y.; Zhang, T. Cyber-attack classification in smart grid via deep neural network. In Proceedings of the 2nd International Conference on Computer Science and Application Engineering, Hohhot, China, 22–24 October 2018. [Google Scholar]
  37. Takiddin, A.; Atat, R.; Ismail, M.; Boyaci, O.; Davis, K.R.; Serpedin, E. Generalized graph neural network-based detection of false data injection attacks in smart grids. IEEE Trans. Emerg. Top. Comput. Intell. 2023, 7, 618–630. [Google Scholar] [CrossRef]
  38. Han, Y.; Feng, H.; Li, K.; Zhao, Q. False data injection attacks detection with modified temporal multi-graph convolutional network in smart grids. Comput. Secur. 2023, 124, 103016. [Google Scholar] [CrossRef]
  39. Yin, X.; Zhu, Y.; Xie, Y.; Hu, J. PowerFDNet: Deep learning-based stealthy false data injection attack detection for AC-model transmission systems. IEEE Open J. Comput. Soc. 2022, 3, 149–161. [Google Scholar] [CrossRef]
  40. Ashrafuzzaman, M.; Chakhchoukh, Y.; Jillepalli, A.A.; Tosic, P.T.; de Leon, D.C.; Sheldon, F.T.; Johnson, B.K. Detecting stealthy false data injection attacks in power grids using deep learning. In Proceedings of the 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018. [Google Scholar]
  41. Musleh, A.S.; Chen, G.; Dong, Z.Y.; Wang, C.; Chen, S. Spatio-temporal data-driven detection of false data injection attacks in power distribution systems. Int. J. Electr. Power Energy Syst. 2023, 145, 108612. [Google Scholar] [CrossRef]
  42. Ruan, J.; Fan, G.; Zhu, Y.; Liang, G.; Zhao, J.; Wen, F.; Dong, Z.Y. Super-Resolution Perception Assisted Spatiotemporal Graph Deep Learning against False Data Injection Attacks in Smart Grid. IEEE Trans. Smart Grid 2023, 14, 4035–4046. [Google Scholar] [CrossRef]
  43. Li, X.; Wang, Y.; Lu, Z. Graph-based detection for false data injection attacks in power grid. Energy 2023, 263, 125865. [Google Scholar] [CrossRef]
  44. Shukla, S.; Thakur, S.; Hussain, S.; Breslin, J.G.; Jameel, S.M. Identification of False Stealthy Data Injection Attacks in Smart Meters Using Machine Learning and Blockchain. In Proceedings of the International Congress on Blockchain and Applications, L’Aquila, Italy, 13–15 July 2022; pp. 398–409. [Google Scholar]
  45. Ayad, A.; Farag, H.E.; Youssef, A.; El-Saadany, E.F. Detection of false data injection attacks in smart grids using recurrent neural networks. In Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 19–22 February 2018. [Google Scholar]
  46. Foroutan, S.A.; Salmasi, F.R. Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method. IET Cyber-Phys. Syst. Theory Appl. 2017, 2, 161–171. [Google Scholar] [CrossRef]
  47. Kumar, A.; Saxena, N.; Jung, S.; Choi, B.J. Improving detection of false data injection attacks using machine learning with feature selection and oversampling. Energies 2021, 15, 212. [Google Scholar] [CrossRef]
  48. Yang, C.; Wang, Y.; Zhou, Y.; Ruan, J.; Liu, W. False data injection attacks detection in power system using machine learning method. J. Comput. Commun. 2018, 6, 276. [Google Scholar] [CrossRef]
  49. Tahar, B.M.; Amine, S.M.; Hachana, O. Machine Learning-Based Techniques for False Data Injection Attacks Detection in Smart Grid: A Review. In Proceedings of the International Conference on Artificial Intelligence in Renewable Energetic Systems, Tamanghasset, Algeria, 20–22 November 2022. [Google Scholar]
  50. Ozay, M.; Esnaola, I.; Vural, F.T.Y.; Kulkarni, S.R.; Poor, H.V. Machine learning methods for attack detection in the smart grid. IEEE Trans. Neural Netw. Learn. Syst. 2015, 27, 1773–1786. [Google Scholar] [CrossRef] [PubMed]
  51. Qu, Z.; Zhang, X.; Gao, Y.; Peng, C.; Wang, Y.; Georgievitch, P.M. Detection of False Data Injection Attack in AGC System Based on Random Forest. Machines 2023, 11, 83. [Google Scholar] [CrossRef]
  52. Trevizan, R.D.; Reno, M. Detection of False Data Injection Attacks in Power System State Estimation Using Sensor Encoding. In Proceedings of the IEEE Kansas Power and Energy Conference (KPEC), Manhattan, KS, USA, 25–26 April 2022. [Google Scholar]
  53. Wu, M.; Xie, L. Online detection of false data injection attacks to synchrophasor measurements: A data-driven approach. In Proceedings of the 50th Hawaii International Conference on System Sciences, Hilton Waikoloa Village, HI, USA, 4–7 January 2017. [Google Scholar]
  54. Kurt, M.N.; Yılmaz, Y.; Wang, X. Distributed quickest detection of cyber-attacks in smart grid. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2015–2030. [Google Scholar] [CrossRef]
  55. Kodsi, S.K.M.; Canizares, C.A. Modeling and Simulation of IEEE 14—Bus System with FACTS Controllers; University of Waterloo: Waterloo, ON, Canada, 2003. [Google Scholar]
  56. PJM Interconnection. Available online: https://www.pjm.com/ (accessed on 4 September 2023).
  57. Zimmerman, R.D.; Murillo-Sánchez, C.E. Matpower (version 7.0). PSERC Cornell 2019, 9, 19–97. [Google Scholar]
Figure 1. The seasonal load curves, which are used for the generation of data.
Figure 1. The seasonal load curves, which are used for the generation of data.
Energies 16 06614 g001
Figure 2. Limitations of VDVM in the form of curves for simple as well as stealth attacks by using the combined dummy values of power.
Figure 2. Limitations of VDVM in the form of curves for simple as well as stealth attacks by using the combined dummy values of power.
Energies 16 06614 g002
Figure 3. The bar graph showing the limitations of VDVM for simple as well as stealth attacks by using the combined dummy values of power.
Figure 3. The bar graph showing the limitations of VDVM for simple as well as stealth attacks by using the combined dummy values of power.
Energies 16 06614 g003
Figure 4. Training of polynomial regression model for finding the coefficients of the equation through which the dummy measurement values of P1 are calculated.
Figure 4. Training of polynomial regression model for finding the coefficients of the equation through which the dummy measurement values of P1 are calculated.
Energies 16 06614 g004
Figure 5. Results of NF-VDVM in the form of curves for simple as well as stealth attacks by using the obtained dummy measurement values and recalculated dummy measurement values of P1.
Figure 5. Results of NF-VDVM in the form of curves for simple as well as stealth attacks by using the obtained dummy measurement values and recalculated dummy measurement values of P1.
Energies 16 06614 g005
Figure 6. Results of NF-VDVM in the form of bar graph for simple as well as stealth attacks by using the obtained dummy values and recalculated dummy values of P1.
Figure 6. Results of NF-VDVM in the form of bar graph for simple as well as stealth attacks by using the obtained dummy values and recalculated dummy values of P1.
Energies 16 06614 g006
Figure 7. Results of NF-VDVM in the form of curves for simple as well as stealth attacks by using the combined dummy values of power.
Figure 7. Results of NF-VDVM in the form of curves for simple as well as stealth attacks by using the combined dummy values of power.
Energies 16 06614 g007
Figure 8. Results of NF-VDVM in the form of bar graph for simple as well as stealth attacks by using the combined dummy values of power.
Figure 8. Results of NF-VDVM in the form of bar graph for simple as well as stealth attacks by using the combined dummy values of power.
Energies 16 06614 g008
Table 1. The simulation time of the VDVM and NF-VDVM techniques.
Table 1. The simulation time of the VDVM and NF-VDVM techniques.
Trial No.VDVM (Seconds)NF-VDVM (Seconds)
10.5680.756
20.4490.535
30.4840.636
40.3940.862
50.5280.752
Average Time0.4850.708
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shahid, M.A.; Ahmad, F.; Nawaz, R.; Khan, S.U.; Wadood, A.; Albalawi, H. A Novel False Measurement Data Detection Mechanism for Smart Grids. Energies 2023, 16, 6614. https://doi.org/10.3390/en16186614

AMA Style

Shahid MA, Ahmad F, Nawaz R, Khan SU, Wadood A, Albalawi H. A Novel False Measurement Data Detection Mechanism for Smart Grids. Energies. 2023; 16(18):6614. https://doi.org/10.3390/en16186614

Chicago/Turabian Style

Shahid, Muhammad Awais, Fiaz Ahmad, Rehan Nawaz, Saad Ullah Khan, Abdul Wadood, and Hani Albalawi. 2023. "A Novel False Measurement Data Detection Mechanism for Smart Grids" Energies 16, no. 18: 6614. https://doi.org/10.3390/en16186614

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop