Controllable Blind AC FDIA via Physics-Informed Extrapolative AVAE
Abstract
:1. Introduction
- Integration of physics-based priors. PI-ExAVAE incorporates AC power flow equations into the adversarial variational autoencoder framework, ensuring that generated attack vectors are physically consistent and stealthy against traditional detection mechanisms.
- Generative extrapolation capability. Unlike traditional generative models that focus on replicating the training data distribution and generating samples similar to the original input, the PI-ExAVAE integrates physics-informed priors, thereby enabling generative extrapolation to produce physically consistent and stealthy attack vectors far from the original input, even beyond the range covered by the training data.
- Precise control over state estimation errors without voltage measurements. The proposed approach allows fine-grained control over the magnitude and direction of state estimation errors, enabling the design of targeted attacks with predictable impacts.
2. Related Work
3. Fundamentals of False Data Injection Attacks on AC State Estimation
- Step 1. Solve the WLS estimation and obtain the elements of the measurement residual vector:
- Step 2. Compute the normalized residuals:
- Step 3. Find k such that is the largest among all .
- Step 4. If , then the measurement will be suspected bad data. Here, is a chosen identification threshold, for instance 3.
4. Proposed AC FDIA Method Based on PI-ExAVAE
4.1. Variational Autoencoder with Adversarial Loss
4.2. Proposed Physics-Informed PI-ExAVAE
4.3. Training Method and Controllable FDIA Generation
Algorithm 1 Training the PI-ExAVAE attack model. |
|
5. Case Studies
5.1. IEEE14 Test System with NYISO Field Data
- Step 1. Link the buses of the IEEE14 system to regions of NYISO as follows:
- Step 2. Normalize the load of NYISO to the initial real and reactive load of the corresponding IEEE14 bus, so that the test system operates near the initial state of the IEEE14 system. Due to lack of reactive load information, we assume that the system load has a constant power factor , so reactive power can be calculated by real power. This assumption can be relaxed if the historical data of reactive power is available.
- Step 3. Add up the new real power load. Find the ratio of the new total load to the IEEE14 bus initial total load. Multiply this ratio to by generation of all generators.
- Step 4. Repeat the previous step for reactive power.
- Step 5. Calculate the system state () using AC power flow analysis.
- Step 6. Calculate the system measurement value , where is the power flow equation derived from the system structure.
- Step 7. White Gaussian noise , i.e., p.u. is added to the measurements .
5.1.1. Attack Effectiveness and Controllability Analysis
5.1.2. Analysis of Extrapolative Performance
5.1.3. Performance Analysis Under Different Detectors
- Accuracy: Represents the proportion of correctly classified samples, including both correctly detected attacks and correctly identified normal measurements. A higher accuracy indicates the detection system’s overall reliability in distinguishing between attacks and normal data, while a lower accuracy suggests that the system struggles to identify the true nature of the measurements.
- Precision: Indicates the proportion of detected attacks that are true attacks (i.e., the accuracy of positive predictions). In this context, higher precision means the detection system generates fewer false alarms, while lower precision implies that many normal measurements are misclassified as attacks.
- Recall: Reflects the proportion of all true attacks that are successfully detected. Higher recall indicates that the detection system can capture a larger fraction of the actual attacks, while lower recall suggests that many attacks evade detection, indicating better attack stealthiness.
- F1 Score: Combines precision and recall into a single metric by calculating their harmonic mean. A higher F1 Score represents a good balance between precision and recall, indicating strong detection performance. Conversely, a lower F1 Score highlights that either precision or recall (or both) is compromised, which often correlates with higher attack stealthiness.
5.1.4. Analysis of Model Robustness to Noise
5.2. IEEE118 Test System
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
IoT | Internet of Things |
PI VAE | physics-informed variational autoencoder |
BDD | bad data detection |
GAN | generative adversarial network |
FDIA | false data injection attacks |
SE | state estimation |
SEJM | state estimation Jacobian matrix |
AE | autoencoder |
ANNs | artificial neural networks |
References
- Liu, Y.; Ning, P.; Reiter, M.K. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 2011, 14, 1–33. [Google Scholar] [CrossRef]
- Horowitz, B.M.; Pierce, K.M. The integration of diversely redundant designs, dynamic system models, and state estimation technology to the cyber security of physical systems. Syst. Eng. 2013, 16, 401–412. [Google Scholar] [CrossRef]
- Bobba, R.B.; Rogers, K.M.; Wang, Q.; Khurana, H.; Nahrstedt, K.; Overbye, T.J. Detecting false data injection attacks on dc state estimation. In Proceedings of the Preprints of the First Workshop on Secure Control Systems, CPSWEEK, Stockholm, Sweden, 12 April 2010; Volume 2010. [Google Scholar]
- Baumeister, T. Literature Review on Smart Grid Cyber Security; Collaborative Software Development Laboratory at the University of Hawaii: Honolulu, HI, USA, 2010; Volume 650. [Google Scholar]
- Zhang, J.; Chu, Z.; Sankar, L.; Kosut, O. Can attackers with limited information exploit historical data to mount successful false data injection attacks on power systems? IEEE Trans. Power Syst. 2018, 33, 4775–4786. [Google Scholar] [CrossRef]
- Liang, J.; Sankar, L.; Kosut, O. Vulnerability analysis and consequences of false data injection attack on power system state estimation. IEEE Trans. Power Syst. 2015, 31, 3864–3872. [Google Scholar] [CrossRef]
- Liu, X.; Li, Z. Local load redistribution attacks in power systems with incomplete network information. IEEE Trans. Smart Grid 2014, 5, 1665–1676. [Google Scholar] [CrossRef]
- Liu, X.; Li, Z. Local topology attacks in smart grids. IEEE Trans. Smart Grid 2016, 8, 2617–2626. [Google Scholar] [CrossRef]
- Kim, J.; Tong, L.; Thomas, R.J. Subspace methods for data attack on state estimation: A data driven approach. IEEE Trans. Signal Process. 2014, 63, 1102–1114. [Google Scholar] [CrossRef]
- Yu, Z.H.; Chin, W.L. Blind false data injection attack using PCA approximation method in smart grid. IEEE Trans. Smart Grid 2015, 6, 1219–1226. [Google Scholar] [CrossRef]
- Lakshminarayana, S.; Kammoun, A.; Debbah, M.; Poor, H.V. Data-driven false data injection attacks against power grids: A random matrix approach. IEEE Trans. Smart Grid 2020, 12, 635–646. [Google Scholar] [CrossRef]
- Yang, H.; He, X.; Wang, Z.; Qiu, R.C.; Ai, Q. Blind false data injection attacks against state estimation based on matrix reconstruction. IEEE Trans. Smart Grid 2022, 13, 3174–3187. [Google Scholar] [CrossRef]
- Liang, G.; Zhao, J.; Luo, F.; Weller, S.R.; Dong, Z.Y. A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 2016, 8, 1630–1638. [Google Scholar] [CrossRef]
- Liang, J.; Kosut, O.; Sankar, L. Cyber attacks on AC state estimation: Unobservability and physical consequences. In Proceedings of the 2014 IEEE PES General Meeting|Conference & Exposition, National Harbor, MD, USA, 27–31 July 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 1–5. [Google Scholar]
- Liu, C.; Liang, H.; Chen, T. Network parameter coordinated false data injection attacks against power system AC state estimation. IEEE Trans. Smart Grid 2020, 12, 1626–1639. [Google Scholar] [CrossRef]
- Deng, R.; Zhuang, P.; Liang, H. False data injection attacks against state estimation in power distribution systems. IEEE Trans. Smart Grid 2018, 10, 2871–2881. [Google Scholar] [CrossRef]
- Zhao, J.; Zhang, G.; Dong, Z.; Wong, K. Forecasting-Aided Imperfect False Data Injection Attacks Against Power System Nonlinear State Estimation. IEEE Trans. Smart Grid 2016, 7, 6–8. [Google Scholar] [CrossRef]
- Tian, J.; Wang, B.; Wang, Z.; Cao, K.; Li, J.; Ozay, M. Joint adversarial example and false data injection attacks for state estimation in power systems. IEEE Trans. Cybern. 2021, 52, 13699–13713. [Google Scholar] [CrossRef] [PubMed]
- Yang, H.; Zhang, W.; Chung, C.; Wang, Z.; Qiu, W.; Liang, Z. AC False Data Injection Attack Based on Robust Tensor Principle Component Analysis. IEEE Trans. Ind. Inform. 2024, 20, 9887–9897. [Google Scholar] [CrossRef]
- Jiao, R.; Xun, G.; Liu, X.; Yan, G. A new AC false data injection attack method without network information. IEEE Trans. Smart Grid 2021, 12, 5280–5289. [Google Scholar] [CrossRef]
- Costilla-Enriquez, N.; Weng, Y. Attack power system state estimation by implicitly learning the underlying models. IEEE Trans. Smart Grid 2022, 14, 649–662. [Google Scholar] [CrossRef]
- Narang, J.K.; Bag, B. Physical model learning based false data injection attack on power system state estimation. Sustain. Energy Grids Netw. 2024, 40, 101524. [Google Scholar] [CrossRef]
- Liu, Z.; Wang, Q.; Ye, Y.; Tang, Y. A GAN-Based Data Injection Attack Method on Data-Driven Strategies in Power Systems. IEEE Trans. Smart Grid 2022, 13, 3203–3213. [Google Scholar] [CrossRef]
- Lu, K.; Wu, Z. Constrained-Differential-Evolution-Based Stealthy Sparse Cyber-Attack and Countermeasure in an AC Smart Grid. IEEE Trans. Ind. Inform. 2022, 18, 5275–5285. [Google Scholar] [CrossRef]
- Chen, S.; Shi, D.; Sadiq, M.; Cheng, X. Image denoising with generative adversarial networks and its application to cell image enhancement. IEEE Access 2020, 8, 82819–82831. [Google Scholar] [CrossRef]
- Afrin, A.; Ardakanian, O. Adversarial Attacks on Machine Learning-Based State Estimation in Power Distribution Systems. In Proceedings of the 14th ACM International Conference on Future Energy Systems, Orlando, FL, USA, 20–23 June 2023; pp. 446–458. [Google Scholar]
- Chin, W.L.; Lee, C.H.; Jiang, T. Blind false data attacks against AC state estimation based on geometric approach in smart grid communications. IEEE Trans. Smart Grid 2017, 9, 6298–6306. [Google Scholar] [CrossRef]
- Du, M.; Pierrou, G.; Wang, X.; Kassouf, M. Targeted false data injection attacks against AC state estimation without network parameters. IEEE Trans. Smart Grid 2021, 12, 5349–5361. [Google Scholar] [CrossRef]
- Gardiner, C. Stochastic Methods: A Handbook for the Natural and Social Sciences; Springer: Berlin/Heidelberg, Germany, 2009. [Google Scholar]
- Rahman, M.; Yan, J.; Fapi, E.T. Adversarial Artificial Intelligence in Blind False Data Injection in Smart Grid AC State Estimation. IEEE Trans. Ind. Inform. 2024, 20, 8873–8883. [Google Scholar] [CrossRef]
- Tian, J.; Wang, B.; Li, J.; Wang, Z.; Ma, B.; Ozay, M. Exploring Targeted and Stealthy False Data Injection Attacks via Adversarial Machine Learning. IEEE Internet Things J. 2022, 9, 14116–14125. [Google Scholar] [CrossRef]
- Sommestad, T.; Ekstedt, M.; Nordstrom, L. Modeling security of power communication systems using defense graphs and influence diagrams. IEEE Trans. Power Deliv. 2009, 24, 1801–1808. [Google Scholar] [CrossRef]
- Abur, A.; Exposito, A.G. Power System State Estimation: Theory and Implementation; CRC Press: Boca Raton, FL, USA, 2004. [Google Scholar]
- Kingma, D.P. Auto-encoding variational bayes. arXiv 2013, arXiv:1312.6114. [Google Scholar]
- Rahman, M.A.; Mohsenian-Rad, H. False data injection attacks against nonlinear state estimation in smart power grids. In Proceedings of the 2013 IEEE Power & Energy Society General Meeting, Vancouver, BC, Canada, 21–25 July 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 1–5. [Google Scholar]
- NYISO. New York Control Area Load Zones. 2018. Available online: https://web.archive.org/web/20180619063459/http://www.nyiso.com/public/webdocs/markets_operations/market_data/zone_maps_graphs/nyca_zonemaps.pdf (accessed on 4 February 2025).
- Zimmerman, R.D.; Murillo-Sánchez, C.E.; Thomas, R.J. MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 2010, 26, 12–19. [Google Scholar] [CrossRef]
- Bhattacharjee, A.; Mondal, A.K.; Verma, A.; Mishra, S.; Saha, T.K. Deep latent space clustering for detection of stealthy false data injection attacks against AC state estimation in power systems. IEEE Trans. Smart Grid 2022, 14, 2338–2351. [Google Scholar] [CrossRef]
Method | Key Features | Voltage Required | Controllable SE Deviations |
---|---|---|---|
Afrin et al. [26] | Sneaky-FGSM selectively perturbs high-variance measurements using multi-layer perceptron (MLP) surrogate models | Yes | No |
Costilla et al. [21] | AE-WGAN: autoencoder serving as a fixed surrogate estimator | Yes | No |
Narang et al. [22] | LSTMAE-GAN: LSTMAE embeds temporal dependencies within the autoencoder-based surrogate estimator | Yes | No |
Jiao et al. [20] | SA-GAN leverages the self-attention mechanism to effectively capture long-range dependencies in power measurement data | No | No |
PI-ExAVAE | A VAE guided by physical priors to control post-attack state estimation deviations via latent space controllability | No | Yes |
Encoder | Decoder | Discriminator |
---|---|---|
Conv2d(1, 8, (3, 2), (2, 1)), ReLU | ConvTranspose2d(hidden, 32, (2, 2), (1, 1)), ReLU | Conv2d(1, 16, (3, 2), (2, 2)) |
Conv2d(8, 16, (3, 2), (2, 1)), ReLU | ConvTranspose2d(32, 16, (3, 2), (1, 1)), ReLU | SpectralNorm, LeakyReLU |
Conv2d(16, 32, (3, 2), (1, 1)), ReLU | ConvTranspose2d(16, 8, (3, 2), (2, 1)), ReLU | Conv2d(16, 32, (3, 2),(2, 1)) |
Conv2d(32, 64, (2, 2), (1, 1)), ReLU | ConvTranspose2d(8, 1,(4, 3), (2, 1)), ReLU | SpectralNorm, LeakyReLU |
FC(, )-Mean | Tanhshrink | Conv2d(32, 64, (3, 2), (2, 1)) |
FC(, )-Logvar | SpectralNorm, LeakyReLU | |
AdaptiveAvgPool2d(1) | ||
Linear(64, 1), Sigmoid |
Confidence Level | SAGAN | LSTMAE-GAN | AE-WGAN | PI-ExAVAE | |||
---|---|---|---|---|---|---|---|
= 0 | = 0.5 | = 1 | |||||
Success Rate (%) | 95% | 95.5 | 98.6 | 100 | 98.2 | 100 | 100 |
90% | 90.2 | 95.3 | 100 | 96.1 | 100 | 100 |
Method | Accuracy | Precision | Recall | F1 Score | |
---|---|---|---|---|---|
SAGAN | 0.4645 | 0.4816 | 0.9290 | 0.6343 | |
AE-WGAN | 0.8900 | 0.8197 | 1.0000 | 0.9009 | |
LSTMAE-GAN | 0.5160 | 0.5081 | 1.0000 | 0.6739 | |
PI-ExAVAE | 0.5270 | 1.0000 | 0.0540 | 0.1025 | |
0.7445 | 1.0000 | 0.4890 | 0.6568 | ||
0.8945 | 1.0000 | 0.8890 | 0.9411 | ||
0.9502 | 1.0000 | 0.9643 | 0.9816 | ||
1.0000 | 1.0000 | 1.0000 | 1.0000 | ||
1.0000 | 1.0000 | 1.0000 | 1.0000 | ||
1.0000 | 1.0000 | 1.0000 | 1.0000 | ||
1.0000 | 1.0000 | 1.0000 | 1.0000 | ||
1.0000 | 1.0000 | 1.0000 | 1.0000 | ||
1.0000 | 1.0000 | 1.0000 | 1.0000 | ||
1.0000 | 1.0000 | 1.0000 | 1.0000 |
Normal Noise | Residual Before Attack | Residual After Attack | Success Rate |
---|---|---|---|
Min/Mean/Max | Min/Mean/Max | ||
43.70/79.55/118.26 | 10.00/17.08/35.95 | 100% | |
54.84/90.64/146.24 | 15.14/23.44/65.68 | 99.7% | |
63.03/99.91/175.64 | 25.42/32.78/90.20 | 99.5% |
Min/Mean/Max | Success Rate | ||
---|---|---|---|
Residual before attack | 643.07/742.75/863.78 | 90% | |
PI-ExAVAE | 83.82/94.58/121.52 | 100% | |
83.50/89.86/106.81 | 100% | ||
101.38/126.85/172.20 | 100% | ||
152.74/191.51/229.13 | 100% | ||
221.85/272.18/318.69 | 100% | ||
310.69/361.57/412.27 | 100% | ||
399.59/452.75/504.51 | 100% | ||
489.46/542.29/599.57 | 100% | ||
571.53/622.95/683.75 | 100% | ||
638.06/693.08/738.09 | 95.3% | ||
640.67/739.92/840.78 | 90.2% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhao, S.; Luo, W.; Shu, Q.; Xu, F. Controllable Blind AC FDIA via Physics-Informed Extrapolative AVAE. Sensors 2025, 25, 943. https://doi.org/10.3390/s25030943
Zhao S, Luo W, Shu Q, Xu F. Controllable Blind AC FDIA via Physics-Informed Extrapolative AVAE. Sensors. 2025; 25(3):943. https://doi.org/10.3390/s25030943
Chicago/Turabian StyleZhao, Siliang, Wuman Luo, Qin Shu, and Fangwei Xu. 2025. "Controllable Blind AC FDIA via Physics-Informed Extrapolative AVAE" Sensors 25, no. 3: 943. https://doi.org/10.3390/s25030943
APA StyleZhao, S., Luo, W., Shu, Q., & Xu, F. (2025). Controllable Blind AC FDIA via Physics-Informed Extrapolative AVAE. Sensors, 25(3), 943. https://doi.org/10.3390/s25030943