Next Article in Journal
Numerical Study of a High-Temperature Latent Heat Thermal Energy Storage Device with AlSi12 Alloy
Previous Article in Journal
Performance, Emissions, and Combustion Characteristics of a Hydrogen-Fueled Spark-Ignited Engine at Different Compression Ratios: Experimental and Numerical Investigation
Previous Article in Special Issue
Adaptive Control of a Virtual Synchronous Generator with Multiparameter Coordination
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Joint Detection and State Estimate with GSAs in PMU-Based Smart Grids

1
School of Electrical Engineering, Anhui Polytechnic University, Wuhu 241000, China
2
Key Laboratory of Advanced Perception and Intelligent Control of High-End Equipment, Chinese Ministry of Education, Wuhu 241000, China
*
Author to whom correspondence should be addressed.
Energies 2023, 16(15), 5731; https://doi.org/10.3390/en16155731
Submission received: 7 June 2023 / Revised: 18 July 2023 / Accepted: 28 July 2023 / Published: 31 July 2023
(This article belongs to the Special Issue Energy, Electrical and Power Engineering 2021-2022)

Abstract

:
The Phasor Measurement Unit (PMU) with a GPS signal receiver is a synchronized sensor widely used for power system state estimation. While the GPS receiver ensures time accuracy, it is vulnerable to network attacks. GPS spoofing attacks can alter the phase angle of PMU measurement signals and manipulate system states. This paper derives a power system state model based on PMUs under GPS spoofing attacks, according to the characteristics of changes in bus voltages and branch currents after GSA. Based on the characteristics of this model, a detection and correction algorithm for attacked data is proposed to detect GSA and correct attacked measurements. The corrected measurements can be used for power system state estimation. Simulation results on the IEEE 14-bus system show that the proposed algorithm improves the accuracy of state estimation under one or multiple GSAs, especially when multiple GSAs are present, compared to classical Weighted Least Squares Estimation (WLSE) and Alternating Minimization (AM) algorithms. Further research indicates that this algorithm is also applicable to large-scale networks.

1. Introduction

Phasor Measurement Units (PMUs) based on global positioning system have been widely used in wide area measurement system [1,2]. PMU is an advanced digital instrument used for real-time monitoring of grid operation in smart grids. By installing a PMU on one bus, it can obtain the bus voltage phasor and all current phasors of the branches connected to that bus [3]. PMU data is an important data source for situation awareness, dispatching control, and early warning of modern power systems. Many advanced applications have been developed based on PMU data, such as state estimation, wide area damping control, generator state monitoring, static voltage stability evaluation, etc. Accurate PMU data is a prerequisite for advanced applications.
The PMU uses a common time source for synchronization and can measure the electrical waves on the grid. The PMU does this by converting the analog signals of voltage and current to digital signals and applying anti-alias filters and discrete Fourier transforms to isolate the fundamental frequency components and compute their phase representation [4,5]. This allows obtaining the fundamental frequency amplitude and phase information of the voltage and current signals at each bus in the power system, instead of the actual measurements in conventional Supervisory Control and Data Acquisition (SCADA) systems. When the number of PMUs deployed in the system is sufficient to make the system globally observable, state estimation is only required based on the PMU data [6,7]. In this case, the state of the power system can be expressed in the form of a linear equation that can be solved in a single iteration, which improves the processing speed [8,9]. Replacing nonlinear state estimation with linear state estimation using PMU measurements allows direct manipulation of the Jacobi matrix. The reliability of the simplified model and PMU state variables was explained in [10]. The solution of the linear model is direct and non-iterative.
In recent years, with the intelligent development of power grid and the importance of the power grid security, PMUs have become increasingly important in power system state estimation [10,11,12,13,14,15]. The low reporting rate and complex nonlinear state estimation of traditional SCADA systems for power grids make it difficult to meet high-precision state analysis and real-time safety monitoring. However, PMU can provide synchronized phasor measurements, generating a linear model for state estimation. Their sampling rate is much higher than that of the SCADA system, and it can estimate the state of power system in real-time and quickly respond to abnormal conditions.
Each PMU is equipped with a GPS receiver, which is synchronized using GPS civilian signals, which are not encrypted like the military signals [11,16,17,18]. GPS provides sub-microsecond precision timing [16], which plays a crucial role in the time synchronization of PMU measurements. Wireless communication between civilian receivers and satellites is then vulnerable to cyber attacks. GPS spoofing is caused by transmitters mimicking GPS signals with the intent of altering the GPS time estimated by the PMU’s GPS receiver [19]. These attacks maliciously introduce incorrect timestamps, which leads to incorrect phase angles in PMU measurements [20], making the system state estimation problem nonlinear, counteracting the original motivation for the introduction of PMUs as well as posing a serious threat to the correct state estimation of the power system. The issue of time delay in PMU measurements and its compensation methods have been discussed in [21], but these methods have limited effectiveness compared to GSAs. As a result, GSAs detection and countermeasures are widely studied and methods are proposed to prevent serious destructions to the power system.

2. Prior Work

In recent years, there have been much research on GSA, and the research directions were mostly divided into three categories. They were respectively the feasibility of GSA [22,23,24,25], the impact of GSA on power grid state [19,26], and some solutions for GSA [21,27,28,29,30].
The feasibility details of GSAs were shown in [22,23,24,25]. Shepard et al. [24] have performed field tests of GPS spoofing on PMUs, exposing the vulnerability of PMUs to this malicious attack; by spoofing the GPS signal receiver inside the PMU, the attacker can introduce timing errors, which result in a consequent shift in the phase angle of the PMU, which posed a serious problem for real-time monitoring of the smart grid. Humphreys et al. [22] first implemented GPS spoofing attack in the laboratory and gave a preliminary mitigation method for non-encrypted GSA. Jiang et al. [25] manipulated the acquired GPS signal data, and they found that this operation could change the phase angle of the PMU-measured signal.
However, more research were on the countermeasures of GSA [19,26,27,28,29,30]. Liang et al. [26] comprehensively discussed the theoretical basis of false data injection attacks (FDIA) and gave the most basic defense strategy for FDIA. After measuring and collecting the data provided by the PMUs, a cross-layer detection method was proposed in [19]. Its principle is to use the angle of arrival of GPS as the initial guess, and then detect whether GSA has occurred through the state estimation of the system. Mahapatra et al. [27] proposed a method to detect bad data in PMU measurements during interference. Which was based on the principal component analysis (PCA) method to distinguish the safety data caused by bad data from the manipulation data caused by interference. In particular, Zhang et al. [28] proposed a novel distribution system identification and correction algorithm for simultaneous GSA with multiple PMU positions. The algorithm first analyzed the sensitivity of the residual of the phase angle state estimation under a single GSA, and then used the proposed detection technology identification algorithm to locate the attacked PMU and the shift range of the phase angle after the attack. Finally, the phase shift was determined by minimizing the offset of measurement and system state estimation. PMU is vulnerable to attack because it receives unencrypted civil signals. To solve this problem, Mina et al. [29] proposed a wide-area spoofing detection algorithm for PMU, which used the hybrid communication architecture of NAPSInet. They created conditional signal fragments containing military P (Y) signals, whose precise code sequences are not available to civilian users, thus protecting PMUs from attack from the source. Unlike adding military encrypted signal fragments, Bhamidipati et al. [30] proposed a new algorithm for jointly spoofer location and GPS time using multiple receivers direct time estimation (MRDTE). The experimental results show that it can locate the attacked PMU within a certain range and estimate the time change. For the error synchronization in PMU measurement data, Zhang et al. [21] gave the source of this error, and proposed the method of using the Kalman filter to compensate for this error, which effectively alleviates the error caused by different.
The impact of a GPS spoofing attack on the secure operation of the power grid system was shown in [25]. We can find that once the PMU is subject to GSA, it is impossible to conduct real-time monitoring and correct state estimation of the system, which will bring huge hidden dangers.
For system state estimation, the static estimation method was used to detect attacks of PMU in the power grid [31]. More PMUs were installed in the power grid to make the measurements of the bus redundant, and then various PMU signals are compared mathematically to obtain the GPS attack detection formula [32]. Most of the above literature treats the system as static. The dynamic changes of the system were not considered. Phase shift caused by PMU delay under system dynamic characteristics was considered in [33]. However, this phase shift is not caused by spoofing attacks, but the deployed PMUs come from different standards, protocols, and designs. Siamak et al. [34] also described the attacked power system under the dynamic framework, which was an extension of the dynamic model of the methods in [13,26], and then proposed a method to detect multiple non-constant attacks on the system. By using Kalman filter, this method can estimate the data and measurements of spoofing attack with higher accuracy, and determine the phase shift of spoofing attack. In addition, the traditional measurement model assumed that the incomplete synchronization of PMU was modeled as additive noise [27,35,36,37]. However, according to the numerical example given in [33], if the synchronization error and/or the time between successive synchronizations increase, the traditional estimation method will deteriorate significantly.
In this paper, we consider the introduced multiplicative noise by GSAs in the proposed model, which results in the attacked residuals being greater than the residuals of the nominal system. We propose a spoofing algorithm for attacked data that classifies the attacked data and secure data, and then inputs the attacked data into the proposed data correction algorithm to obtain measurement data under secure residuals. Finally, a static estimation method is employed to estimate the system state using all the data. The main contributions of this paper can be summarized as follows:
  • The PMU’s measurement model under GSA attack is derived by comparing changes in bus voltage and branch current before and after the attack.
  • According to the characteristic that the measurement residual of PMU data will change after being attacked, an attack detection method is proposed, which can effectively detect one or more GSAs.
  • Through the particularity of the matrix in the measurement model, a bad data correction algorithm is proposed to restore the corrected attacked to the security measurements residual range. This method effectively avoids the challenge of coupling two unknown parameters in the model, which is difficult to estimate.
The rest of this paper is organized as follows. Section 3 introduces the security measurement model of PMU and derives the measurement model of PMU after being attacked by GPS spoofing. Section 4 describes the proposed algorithm and explains the simulation environment and implementation. Section 5 presents the simulation results, and our conclusions are peserented in Section 6.

3. System Model

This section summarizes the measurement model for the presence of GPS spoofing attacks in the network. The PMU measurements are correlated by derivation to the network state and the phase angle shift caused by GPS spoofing attacks.

3.1. Measurement Model

We consider a power network with N buses connected via l transmission lines, e.g., the IEEE 14-bus model, that is observed by M PMUs installed on several buses. This collection of measured quantities (in rectangular corrdinate) at bus k is concatenated in a vector z k R ( 2 + 2 l ) × 1 . The PMU measurements at bus k, which is connected to l different buses, are given by
z k = [ U k r , U k i , I k 1 r , I k 1 i , , I k l r , I k l i ] T
where U k r , U k i denote the real and imaginary parts of the complex voltage at bus k, respectively. I k l r , I k l i are the real and imaginary parts of the complex current injected into line ( k , l ) , T is the transpose operator. The system state x R 2 N × 1 can be written as
x = [ U 1 r , U 1 i , , U k r , U k i , , U N r , U N i ] T
Thus, using the bus admittance matrix of the network, z k can be written as a linear function of the system state x :
z k = H k x + e k
where z k denotes the PMU measurements at the bus k, H k is the admittance matrix associated with a bus at bus k, and e k denotes gauss measurement noise. Thus, the overall PMUs’ measurements are given by
z = H x + e
where z = [ z 1 , , z M ] T , H = [ H 1 , , H M ] T , e = [ e 1 , , e M ] T . In this case, the estimation of the state variable x can be obtained from the least square estimation (LSE), which is expressed as
x ^ = ( H T H ) 1 H T z
In the network, the continuous voltage signal on the bus k when the time t is defined as
U ¯ k ( t ) = U k ( t ) cos ( 2 π f c t + φ k ( t ) )
where f c is the frequency, U ¯ k can be expressed in the form of phasor U k ( t ) e j φ k ( t ) , where U k ( t ) denotes magnitude and φ k ( t ) denotes the phase at time t. Since the subsequent analysis of the GPS spoofing attack is based on the data collected at a certain time point, we omit the symbol t in the subsequent formula for simplicity of notation. Therefore, according to its phasor form, it can be obtained that the real and imaginary parts of the complex voltage are
U k r = U k cos φ k
U k i = U k sin φ k
Here, a branch line is approximated using a π model, as illustrated in Figure 1. The admittance matrix relates the complex current flowing in a line with the complex voltages at the buses of the π model.
In Figure 1, we denote the susceptance at bus k as B k and the admittance at branch ( k , l ) as y k l with
y k l = g k l + j b k l
where g k l is the conductance and b k l is the susceptance. In this paper, we assume these parameters are known and constant. Therefore, we can calculate the real and imaginary parts of the branch current as follows:
I k l r = ( U k r U l r ) g k l ( U k i U l i ) b k l B k U k i
I k l i = ( U k r U l r ) b k l + ( U k i U l i ) g k l + B k U k r .

3.2. Spoofing Attack Model

Consider attackers can manipulate the synchronization of PMUs through GPS spoofing, such that the time reference of an attacked PMU is delayed or advanced. For each attacked measurement, we consider GPS spoofing attack will shift the phase angle of the phasor z n by an angle α n while the phasor magnitude is unchanged [25]. Thus the attacked measurement are defined as
z n s p f = z n e j α n
where z n s p f denotes the change of measurement under attack. The resulting measurement vector z s p f is given by
z s p f = ( z 1 s p f , , z k s p f , z M s p f ) T = z s p f w
where w = ( e j α 1 , , e j α k , , e j α M ) T is the attack vector, ⊙ is the Hadamard product and if a PMU is security, the shift angle α n = 0 , i.e., e j α n = 1 can be obtained. Thus, the measurments are still z n . However, the PMU installed on bus k is attacked, and the voltage measurements are
U ¯ k s p f = U ¯ k · e j α k = U k · e j ( φ k + α k )
where α k is the phase shift angle caused by the attack, and
α k = 2 π f c t k
where t k is the time delay of the kth bus due to a spoofing attack. Thus, by transforming (14) in the rectangular coordinates, we can obtain the real and imaginary parts of attacked voltage can be expressed as
U ¯ k s p f , r = U k cos ( α k + φ k ) = U k r cos α k U k i sin α k
and
U ¯ k s p f , i = U k sin ( α k + φ k ) = U k r sin α k + U k i cos α k
Note that trigonometric identities cos ( x + y ) = cos ( x ) cos ( y ) sin ( x ) sin ( y ) and sin ( x + y ) = sin ( x ) cos ( y ) + cos ( x ) sin ( y ) are introduced in the operation of the above formula. In addition, the delay expression of the current after being attacked are given by
I k l s p f , r = ( U k cos ( α k + φ k ) U l cos ( α k + φ k ) ) g k l ( U k sin ( α k + φ k ) U l sin ( α k + φ k ) ) b k l B k U k sin ( α k + φ k ) = U k r ( g k l cos α k b k l sin α k B k sin α k ) + U l r ( g k l cos α k + b k l sin α k ) + U k i ( g k l sin α k b k l cos α k B k cos α k ) + U l i ( g k l sin α k + b k l cos α k )
I k l s p f , i = ( U k cos ( α k + φ k ) U l cos ( α k + φ k ) ) b k l + ( U k sin ( α k + φ k ) U l sin ( α k + φ k ) ) g k l + B k U k cos ( α k + φ k ) = U k r ( b k l cos α k + g k l sin α k + B k cos α k ) + U l r ( b k l cos α k g k l sin α k ) + U k i ( b k l sin α k + g k l cos α k B k sin α k ) + U l i ( b k l sin α k g k l cos α k )
Note that since GSA has the same effect on all signals measured by PMU at any time, phase angles of voltage and currents shift are identical [38]. Thus, the measurement of PMU installed at bus k after the spoofing attack is given by
z k s p f = τ k H k x + e k
where τ k is a block diagonal matrix with following submatrix
G = cos α k sin α k sin α k cos α k
and the matrix H k can be written as
H k = I 0 0 Ψ k 1 Ψ ˜ k 1 0 Ψ k l 0 Ψ ˜ k l
where
I = 1 0 0 1
Ψ k l = g k l B k + b k l B k b k l g k l
Ψ ˜ k l = g k l b k l b k l g k l
Stacking (20) for all into one large model yields the measurements of all PMUs under attack as
z s p f = ϕ H x + e
where the measurement error vector e is assumed to be Gaussian e N ( 0 , δ 2 I ) , and ϕ is given by
ϕ = I 1 0 τ k 0 I M
where I denotes an identity matrix and the presence of τ k in the diagonal element of the matrix indicates that the kth PMU is attacked. Note that τ k depends on α k , when α k = 0 (no spoofing attack), identity matrix τ k = I 2 l + 2 can be obtained. Without given ϕ , the solution of the least squares of the state variable x in (26) is
x ^ s p f = ( H T H ) 1 H T z s p f

4. Detection of Attacked Data and State Estimate of System

After collecting all the PMU measurement data, we propose a residual-based detection and correction method for attacked data. The specific steps of the entire algorithm are as follows:
(1) Initialization: Use the measurements of all PMUs to estimate the power system state x ^ s p f and calculate the measurement residuals r s p f .
(2) Detection of Attacked Data: Compare the residuals r s p f calculated in step 1 with the predetermined threshold ε . If the norm of the measurement residuals r s p f is greater than the predetermined threshold, we consider the PMU’s measurements to be generated under attack.
(3) Correction of Attacked Data: Correct the attacked data in step 2. We first estimate the attack angle and then use the special property of the PMU measurement model under attack to easily correct the attacked data.
(4) State Estimate: Use the corrected data and the non-attacked data to estimate the power system state x . The detection and correction of attacked data are mainly composed of two sub-algorithms: the detection of attacked data and the correction of attacked data. We will provide specific details in the following sections.

4.1. Detection of Attacked Data

In Section 3.2, we theoretically derived the measurement model of PMU under GSAs. Equation (26) show that the attack model introduces multiplicative attacked data into the security measurement model. The more simplified relationship between the measurements before and after the attack is
z s p f = ϕ z
Given the security power grid, the measurement residual of PMU is expressed as
r = z H x ^ = z H ( H T H ) 1 H T z = ( I H ( H T H ) 1 H T ) z
However, when PMU in the power grid is affected by GSAs, the residual becomes
r s p f = z s p f H x ^ s p f = z s p f H ( H T H ) 1 H T z s p f = ( I H ( H T H ) 1 H T ) z s p f
Chauhan et al. [39] revealed that when GSAs occur in the power grid, the deviation of the residual error will be caused, which is embodied as | | r s p f | | 2 | | r | | 2 . However, a necessary condition to be met is that the matrix ( I H ( H T H ) 1 H T ) must be Semi-positive definite.
Therefore, we can set a residual threshold ε for the measurement data to identify whether certain data is affected by GSA. When the residual error of a measurement is greater than a given threshold, the algorithm considers the PMU of the measured data as being attacked, otherwise the data is secure. For setting the predetermined threshold, as we mentioned in the previous section, the measurement residual increases under GSA attack. Based on this change, we perform Monte Carlo simulations under secure power system conditions and take the maximum measurement residual as the threshold to distinguish between secure and attacked scenarios. The specific simulation process is as follows: we use MATPOWER to simulate a power system, generate PMU measurements using Equation (4), and estimate the power system state using the least squares estimate. We perform multiple simulations and record the maximum residual norm as the threshold ε .

4.2. Attacked Data Correction and System State Estimate

In Section 4.1, we used the attack detection algorithm to determine the measurements. If the norm of the measurement residuals is greater than the selected threshold, we correct the measurements in the measurement correction algorithm; otherwise, we can directly use the measurements to estimate the power system state. In this section, specific algorithm is proposed to correct the attacked data so that measurements can also be used for state estimation normally.
Equation (29) shows the relationship between the measurements of a PMU under GSA attack and the secure condition. For simplicity, we only consider an attack on one measurements.
ϕ = cos α sin α sin α cos α
where α is the shift angle generated by the attack. According to the property cos 2 θ + sin 2 θ = 1 of trigonometric function and the particularity of matrix ϕ , (33) can be derived.
ϕ T ϕ = cos α sin α sin α cos α cos α sin α sin α cos α = 1 0 0 1
Therefore, for the attack angles matrix introduced by the attacked measurements, we can obtain
ϕ T ϕ = I
Inspired by (34), the correction method of the attacked data can be given by
z n e w = ϕ T z s p f
where z n e w represents a new measurement z n e w that can be used for normal state estimation obtained by correcting the measurements of the attacked PMU(s). With these data, we can use LSE to estimate the state of the system, that is
x ^ = ( H T H ) 1 H T z n e w
When a PMU is detected to be under attack, i.e., the residual of its measurements exceeds the given threshold, we use an iterative method to minimize these residuals | | r i | | and bring this set of data back to the level where safe state estimation can be performed. To this end, the goal of the question is
m i n i m i z e α | | r m a x s p f | |
The specific steps of the correction and safe state estimation process are as follows:
(1) If the calculated residual norm is less than the predetermined threshold, i.e., the PMU is not under attack, the algorithm outputs the same measurements, which can be directly used for state estimation.
(2) When the measurements are under attack, we estimate the attack angle by solving the objective function (37). The specific method for minimizing the objective function is as follows:
  • Firstly, we select the PMU with the largest residual norm, calculate its residual.
  • Then give a priori state estimation x , and minimize the objective function with respect to the angle to estimate the attack angle.
  • Finally, use the estimated attack angle to correct the phase angle of the PMU’s measurements using equation (29) and update the power system state. Repeat this process until the estimation converges.
(3) Repeat from step 1 until the residual satisfies | | r s p f | | < ε .
In this way, the difficult problem that the objective function (37) under the coupling of two unknown parameters is a non-convex becomes relatively simple.
We have presented the principles and implementation of the entire algorithm process for attack detection, correction of attacked data, and safe state estimation. The process is summarized in the flowchart shown in Figure 2.

5. Simulation Results

In this section, we conducted numerical experiments on the GSA detection, data correction, and system state estimation methods proposed in Section 3. The main simulation in this paper were conducted on the IEEE 14-bus system. The IEEE 14-bus test system (i.e., Figure 3) is a commonly used standard test system for evaluating the performance of power system load flow calculation and optimization algorithms. It is based on the IEEE standard 14-bus reference model and is widely used in research and applications in the field of power systems. The bus data, line data, and generator data of this test system all conform to the definitions and specifications of the IEEE standard, making it considered as a standard test system. It is extensively used for validating and comparing different load flow calculation algorithms, optimization algorithms, and other power system analysis methods. Using the IEEE standard test system as a benchmark ensures comparability of research and application results and provides a common platform for the academic and industrial communities. MATPOWER is a MATLAB toolbox used for power system load flow calculation and optimization. For the IEEE 14-bus test system, MATPOWER can provide the required buse data (bus number, bus types), line data (line resistance and reactance, etc.), and load flow calculation results (bus voltage magnitude and phase angle, etc.) as requested in this paper. With this data, the system model described in the paper has a standardized and realistic representation.
In addition, in the IEEE 14-bus system attack simulation, the threshold value ε that distinguishes the nominal scenario from the spoofing scenario is set to 0.0215. In all our simulations, we assume that the system bus network are observable. Table 1 provides the placement locations of PMUs for different test cases. And in this paper the measurement noise covariance of the PMUs is a diagonal matrix, with a standard deviation of 0.01 for each measurement.

5.1. Attacked Data Detection

In this paper, attacked data detection algorithm uses the residual norm of the measurements as the threshold to distinguish whether data is attacked data generated by GSA. Therefore, the selection of this threshold is very important. We conducted 2000 Monte Carlo simulations for nominal and spoofing scenarios. In the nominal scenario, no modifications were made to the PMU measurements. The highest residual values obtained from static state estimation in these nominal scenarios were utilized as the threshold. Remarkably, during over 1000 simulations of the nominal scenarios, the occurrence rate of instances reaching the maximum residual value is estimated to be around 2 to 3 thousandths of a percent. This suggests that using this threshold to distinguish between secure and attacked data exhibits exceptional robustness. Figure 4 shows the residual norm distributions under different simulation scenarios. The results in Figure 4 clearly demonstrate that the presence of GSA causes an increase in the measurement residuals for PMUs, thus further validating the feasibility of using a set residual threshold to differentiate between attacked and non-attacked systems.
Through the Monte Carlo simulation results, we found that the maximum value of the measurement residual for PMUs under secure conditions is 0.025, which serves as the threshold for differentiating between attacked and non-attacked PMUs based on residual values. The specific method is to generate a series of PMU measurements according to the security measurement Equation (4), then use the traditional static state estimation (5) to estimate the state of the power grid, and finally calculate the measurement residual r under each simulation condition through (30), taking r m a x = ε = 0.0215 .
Since the GSA process requires special equipment and a long time to achieve, and the actual geographical span of the grid is huge, especially the distance between adjacent substations is long. Therefore, it is difficult to coordinate the generation of GSA in multiple locations or PMUs. Therefore, we first consider that only one PMU is subject to GSA on the system. For a single GSA, we consider that the measured phase of bus 2 has shifted by 12° due to the GSA. We record the measurements of all PMUs of the system under the security state and the attack of a single GSA in Figure 5. For multiple GSAs, we consider that the PMU measurement phase on bus 2 and bus 7 has a phase shift of 12° and 60°, respectively. Figure 6 shows a record of the measurements of all PMUs when the above attack occurs on PMUs on bus 2 and bus 7.
Figure 5 and Figure 6 show the measurements of the system PMU under a single GSA and multiple GSAs, and the measured results of each PMU under the security state. And the scatter diagram shows that when a PMU was attacked, the measurements will have a large deviation from the actual value, which is enough to significantly deteriorate the system state estimation. On the other hand, from the location of the data with obvious deviation, we can also accurately locate the location of the PMUs under attack. At the same time, this also verifies that it is reasonable for us to use the maximum deviation norm threshold to classify the security and attacked data within a certain range.

5.2. Correction of Attacked Data under Different Number of GSA

To observe the effects after correction, for a single GSA, we still take the PMU on bus 2 as an example, which is attacked to produce a 12° phase shift. In the measurement data detection algorithm, we can obtain a dataset of PMU measurements containing attacked data. After correcting these data with the data correction algorithm, a new set of effective measurements z n e w can be obtained, satisfying | | r n e w | | < ε . The data correction process is the same for multiple GSAs. Therefore, the measurement data correction results of two different attack scenarios in Section 5.1 are shown in Figure 6 and Figure 7, respectively. The results in Figure 8 and Figure 9 illustrated that the corrected measurements are almost identical to the true values with very small RMSE, indicating their suitability for power system state estimation for secure operation.
In addition, we apply 1–3 GSAs to the IEEE 14-bus system to study the performance of the algorithm. We take the root mean square error (RMSE) of corrected measurements as the performance metric, and RMSE is defined as ( x ^ x ) 2 / n , where n represents the number of data samples, x ^ represents estimated value and x is actual value.
Figure 9 shows that for the IEEE 14-bus system, the corrected measurements in this paper have a lower RMSE, and the algorithm also has good robustness with the increase of GSAs. Even when the system is subject to three GSAs at the same time, the RMSE of the corrected measurements remains below 0.02.
On the other hand, in our simulation study, we examined the applicability of the algorithm to larger scale networks to showcase its performance on larger networks. We proposed algorithm on the IEEE 14, IEEE 57, and IEEE 118-bus test cases. We performed Monte Carlo simulations in which the number of GSAs are varied from 1 to 3. For each GSA, we perform 100 Monte Carlo simulations in which we randomly spoofed a given number of PMU buses with the attack angles. Table 2 presents the RMSE in the corrected measurements obtained from AM and proposed algorithms. The RMSE of proposed algorithm corrected measurements is smaller than AM for all test cases under multiple GSAs. In addition, Table 2 gave the computation time of all algorithms for 100 Monte Carlo simulations. The computation time of the proposed algorithm is less than AM in all the test cases. The computation time of the proposed algorithm increases with the increase of GSA as it is an iterative estimator that mitigates one GSA at a time. For the scenario with 3 GSAs, the maximum computation time observed in the IEEE 118-bus test case is 0.0068 s. It is worth noting that all simulation tests were conducted in real-time calculations. This demonstrates that the proposed algorithm performs effectively when applied to large-scale networks and real-time monitoring.

5.3. State Estimate of System with Different Number of GSAs

In the previous section, we used the attacked data correction algorithm to correct the data damaged by GSA into secure data within the specified threshold range. Then we can use these data to estimate the state of the system through (36). We compared the proposed algorithm in this paper with the Alternating minimization (AM) [20] algorithm and the traditional weighted least square (WLS) algorithm under the influence of 1–3 GSAs. The results are shown in Figure 10 and Figure 11.
The results in Figure 10 and Figure 11 show that the proposed algorithm in this paper has a small RMSE for different GSAs. Even under three GSAs, the RMSE of voltage amplitude is below the same order of magnitude. The proposed algorithm can be well used in the process of system state estimation under GSAs.

6. Conclusions

This paper proposes a detection and data correction algorithm for the measurement data deviation caused by the GSAs of PMUs in the power grid, and uses the corrected data to estimate the system state. Through the simulation test on IEEE 14-bus system, we observed that the algorithm can detect the location of GSAs and the corrected data are very close to the original real measurements. And the root mean square error of the system state estimation for the corrected data is also very small, which greatly improves the estimation accuracy. In the generalized simulation, we also found that the algorithm is also applicable to larger scale networks.
Subsequent research will consider the study of the problem under different PMU placements, and develop a new joint estimation algorithm to estimate the two coupled unknown parameters in the model more accurately.

Author Contributions

Conceptualization, F.H.; methodology, Y.L. and W.G.; software, F.H. and P.H.; validation, W.G.; formal analysis, L.Q.; resources, W.G.; data curation, L.Q.; writing—original draft preparation, F.H.; writing—review and editing, W.G. and P.H.; visualization, F.H.; supervision, W.G.; project administration, Y.L.; funding acquisition, W.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (U21A20146), Collaborative Innovation Project of Anhui Universities (GXXT-2020-070) and Open Research Fund of Anhui Province Key Laboratory of Electric Drive and Control (DQKJ202103).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We thank the anonymous reviewers for their valuable comments.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Singh, R.S.; vanden Brom, H.; Babaev, S.; Cobben, S.; Ćuk, V. Estimation of Impedance and Susceptance Parameters of a 3-Phase Cable System Using PMU Data. Energies 2019, 12, 4573. [Google Scholar] [CrossRef] [Green Version]
  2. James, J.Q.; Hill, D.J.; Li, V.O.; Hou, Y. Synchrophasor recovery and prediction: A graph-based deep learning approach. IEEE Internet Things J. 2019, 6, 7348–7359. [Google Scholar] [CrossRef]
  3. Gou, B. Generalized Integer Linear Programming Formulation for Optimal PMU Placement. IEEE Trans. Power Syst. 2008, 23, 1099–1104. [Google Scholar] [CrossRef]
  4. Terzija, V.; Valverde, G.; Cai, D.; Regulski, P.; Madani, V.; Fitch, J.; Skok, S.; Begovic, M.M.; Phadke, A. Wide-Area Monitoring, Protection, and Control of Future Electric Power Networks. Proc. IEEE 2011, 99, 80–93. [Google Scholar] [CrossRef]
  5. Matsumoto, S.; Serizawa, Y.; Fujikawa, F. Wide-Area Situational Awareness (WASA) system based upon international standards. In Proceedings of the 11th IET International Conference on Developments in Power Systems Protection (DPSP 2012), Birmingham, UK, 23–26 April 2012; pp. 1–6. [Google Scholar] [CrossRef]
  6. Xie, N.; Torelli, F.; Bompard, E.; Vaccaro, A. A graph theory based methodology for optimal PMUs placement and multiarea power system state estimation. Electr. Power Syst. Res. 2015, 119, 25–33. [Google Scholar] [CrossRef]
  7. Xia, N.; Gooi, H.B.; Chen, S.X.; Wang, M.Q. Redundancy based PMU placement in state estimation. Sustain. Energy Grids Netw. 2015, 2, 23–31. [Google Scholar] [CrossRef]
  8. Hongga, Z. A New State Estimation Model of Utilizing PMU Measurements. In Proceedings of the 2006 International Conference on Power System Technology, Chongqing, China, 22–26 October 2006; pp. 1–5. [Google Scholar] [CrossRef]
  9. Srdjan, S.; Igor, I.; Zdeslav, C. Hybrid State Estimation Model Based on PMU and SCADA Measurements. IFAC-PapersOnLine 2016, 49, 390–394. [Google Scholar] [CrossRef]
  10. Ghahremani, E.; Kamwa, I. Local and Wide-Area PMU-Based Decentralized Dynamic State Estimation in Multi-Machine Power Systems. IEEE Trans. Power Syst. 2016, 31, 547–562. [Google Scholar] [CrossRef]
  11. Ioannides, R.T.; Pany, T.; Gibbons, G. Known Vulnerabilities of Global Navigation Satellite Systems, Status, and Potential Mitigation Techniques. Proc. IEEE 2016, 104, 1174–1194. [Google Scholar] [CrossRef]
  12. Antončič, M.; Papič, I.; Blažič, B. Robust and Fast State Estimation for Poorly-Observable Low Voltage Distribution Networks Based on the Kalman Filter Algorithm. Energies 2019, 12, 4457. [Google Scholar] [CrossRef] [Green Version]
  13. Zhao, J.; Gómez-Expósito, A.; Netto, M.; Mili, L.; Abur, A.; Terzija, V.; Kamwa, I.; Pal, B.; Singh, A.K.; Qi, J.J.; et al. Power System Dynamic State Estimation: Motivations, Definitions, Methodologies, and Future Work. IEEE Trans. Power Syst. 2019, 34, 3188–3198. [Google Scholar] [CrossRef]
  14. Zhao, J.B.; Netto, M.; Huang, Z.Y.; Yu, S.S.; Gómez-Expósito, A.; Wang, S.B.; Kamwa, I.; Akhlaghi, S.; Mili, L.; Terzija, V.; et al. Roles of Dynamic State Estimation in Power System Modeling, Monitoring and Operation. IEEE Trans. Power Syst. 2021, 36, 2462–2472. [Google Scholar] [CrossRef]
  15. Lin, C.H.; Wu, W.C.; Guo, Y. Decentralized Robust State Estimation of Active Distribution Grids Incorporating Microgrids Based on PMU Measurements. IEEE Trans. Smart Grid. 2020, 11, 810–820. [Google Scholar] [CrossRef]
  16. Enge, P.P. The Global Positioning System: Signals, measurements, and performance. Int. J. Wirel. Inf. Netw. 1994, 1, 83–105. [Google Scholar] [CrossRef]
  17. Dempster, A.G.; Cetin, E. Interference Localization for Satellite Navigation Systems. Proc. IEEE 2016, 104, 1318–1326. [Google Scholar] [CrossRef]
  18. Vyskocil, P.; Sebesta, J. Relative timing characteristics of GPS timing modules for time synchronization application. In Proceedings of the International Workshop on Satellite and Space Communications, Siena, Italy, 9–11 September 2009; pp. 230–234. [Google Scholar] [CrossRef]
  19. Fan, Y.; Zhang, Z.; Trinkle, M.; Dimitrovski, A.D.; Song, J.B.; Li, H. A Cross-Layer Defense Mechanism Against GPS Spoofing Attacks on PMUs in Smart Grids. IEEE Trans. Smart Grid. 2015, 6, 2659–2688. [Google Scholar] [CrossRef]
  20. Risbud, P.; Gatsis, N.; Taha, A. Vulnerability Analysis of Smart Grids to GPS Spoofing. IEEE Trans. Smart Grid. 2019, 10, 3535–3548. [Google Scholar] [CrossRef] [Green Version]
  21. Zhang, Q.; Vittal, V.; Heydt, G.; Chakhchoukh, Y.; Logic, N.; Sturgill, S. The time skew problem in PMU measurements. In Proceedings of the 2012 IEEE Power and Energy Society General Meeting, PES 2012, San Diego, CA, USA, 22–26 July 2012. [Google Scholar] [CrossRef]
  22. Navid, R.; Lotfollah, S. A Compact Microstrip Patch Antenna for Civilian GPS Interference Mitigation. IEEE Antennas Wireless Propagat. Lett. 2018, 17, 381–384. [Google Scholar] [CrossRef]
  23. Bonebrake, C.; O’Neil, L.R. Attacks on GPS Time Reliability. IEEE Secur. Priv. 2014, 12, 82–84. [Google Scholar] [CrossRef]
  24. Akkaya, I.; Lee, E.A.; Derler, P. Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. In Proceedings of the 2013 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), Berkeley, CA, USA, 20 May 2013; pp. 1–6. [Google Scholar] [CrossRef]
  25. Jiang, X.; Zhang, J.; Harding, B.J.; Makela, J.J.; Domínguez-García, A.D. Spoofing GPS Receiver Clock Offset of Phasor Measurement Units. IEEE Trans. Power Syst. 2013, 28, 3253–3262. [Google Scholar] [CrossRef] [Green Version]
  26. Liang, G.; Zhao, J.; Luo, F.; Weller, S.; Dong, Z.Y. A Review of False Data Injection Attacks Against Modern Power Systems. IEEE Trans. Smart Grid. 2017, 8, 1630–1638. [Google Scholar] [CrossRef]
  27. Mahapatra, K.; Chaudhuri, N.R.; Kavasseri, R. Bad data detection in PMU measurements using principal component analysis. In Proceedings of the 2016 North American Power Symposium (NAPS), Denver, CO, USA, 18–20 September 2016; pp. 1–6. [Google Scholar] [CrossRef]
  28. Zhang, Y.; Wang, J.; Lui, J. Attack Identification and Correction for PMU GPS Spoofing in Unbalanced Distribution Systemss. IEEE Trans. Smart Grid. 2017, 11, 762–773. [Google Scholar] [CrossRef] [Green Version]
  29. Mina, T.Y.; Bhamidipati, S.; Gao, G.X. Detecting GPS Spoofing via a Multi-Receiver Hybrid Communication Network for Power Grid Timing Verification. In Proceedings of the 31st International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2018), Miami, FL, USA, 24–28 September 2018. [Google Scholar] [CrossRef] [Green Version]
  30. Bhamidipati, S.; Gao, G.X. GPS multireceiver joint direct time estimation and spoofer localization. IEEE Trans. Aerosp. Electron. Syst. 2019, 55, 1907–1919. [Google Scholar] [CrossRef]
  31. Abbaspour, A.; Sargolzaei, A.; Forouzannezhad, P.; Kang, K.Y.; Sarwat, A.I. Resilient Control Design for Load Frequency Control System Under False Data Injection Attacks. IEEE Trans. Ind. Electron. 2020, 67, 7951–7962. [Google Scholar] [CrossRef]
  32. Yasinzadeh, M. Detection of PMU Spoofing in Power Grid Based on Phasor Measurement Analysis. IET Transm. Distrib. 2018, 12, 1980–1987. [Google Scholar] [CrossRef]
  33. Yang, P.; Tan, Z.; Wiesel, A. Power System State Estimation Using PMUs With Imperfect Synchronization. IEEE Trans. Power Syst. 2013, 28, 4162–4172. [Google Scholar] [CrossRef]
  34. Siamak, S.; Dehghani, M.; Mohammadi, M. Dynamic GPS Spoofing Attack Detection, Localization, and Measurement Correction Exploiting PMU and SCADA. IEEE Syst. J. 2021, 15, 2531–2540. [Google Scholar] [CrossRef]
  35. Jain, A.; Shivakumar, N.R. Impact of PMU in dynamic state estimation of power systems. In Proceedings of the 2008 40th North American Power Symposium, Calgary, AB, Canada, 28–30 September 2008; pp. 1–8. [Google Scholar] [CrossRef]
  36. Faranttatos, E.; Stefopoulos, G.K.; Cokkinides, G.J.; Meliopoulos, A.P. PMU-based dynamic state estimation for electric power systems. In Proceedings of the 2009 IEEE Power and Energy Society General Meeting, Calgary, AB, Canada, 26–30 July 2009; pp. 1–8. [Google Scholar] [CrossRef]
  37. Kekatos, V.; Giannakis, G.B. An Alternative for Including Phasor Measurements in State Estimators. IEEE Trans. Power Syst. 2013, 28, 1617–1626. [Google Scholar] [CrossRef] [Green Version]
  38. Shereen, V.; Ramakrisshan, R.; Dan, G. Detection and Localization of PMU Time Synchronization Attacks via Graph Signal Processing. IEEE Trans. Power Syst. 2022, 13, 3241–3254. [Google Scholar] [CrossRef]
  39. Chauhan, S.; Gao, G.X. Synchrophasor Data Under GPS Spoofing: Attack Detection and Mitigation Using Residuals. IEEE Trans. Smart Grid. 2021, 12, 3415–3424. [Google Scholar] [CrossRef]
Figure 1. Bus branch model.
Figure 1. Bus branch model.
Energies 16 05731 g001
Figure 2. Flow chat of the combined attack detection, attacked data correction, and power system state estimation method.
Figure 2. Flow chat of the combined attack detection, attacked data correction, and power system state estimation method.
Energies 16 05731 g002
Figure 3. IEEE 14-bus system.
Figure 3. IEEE 14-bus system.
Energies 16 05731 g003
Figure 4. Residual norm distributions for both nominal and attacked scenarios.
Figure 4. Residual norm distributions for both nominal and attacked scenarios.
Energies 16 05731 g004
Figure 5. PMU measurements under security conditions and after the PMU on bus 2 has a 12° phase shift due to GSA.
Figure 5. PMU measurements under security conditions and after the PMU on bus 2 has a 12° phase shift due to GSA.
Energies 16 05731 g005
Figure 6. PMU measurements under security conditions and after the PMU on bus 2 and bus 7 have a phase shift of 12° and 60°, respectively.
Figure 6. PMU measurements under security conditions and after the PMU on bus 2 and bus 7 have a phase shift of 12° and 60°, respectively.
Energies 16 05731 g006
Figure 7. Scatter diagram of the measurements of 12° shift under a single GSA after data correction vs the security measurements.
Figure 7. Scatter diagram of the measurements of 12° shift under a single GSA after data correction vs the security measurements.
Energies 16 05731 g007
Figure 8. Scatter diagram of the measurements of 12° and 60° shift under multiple GSAs after data correction vs the security measurements.
Figure 8. Scatter diagram of the measurements of 12° and 60° shift under multiple GSAs after data correction vs the security measurements.
Energies 16 05731 g008
Figure 9. RMSE of corrected measurements at different GSAs.
Figure 9. RMSE of corrected measurements at different GSAs.
Energies 16 05731 g009
Figure 10. Proposed algorithm vs. AM and WLSE voltage estimate for different GSAs.
Figure 10. Proposed algorithm vs. AM and WLSE voltage estimate for different GSAs.
Energies 16 05731 g010
Figure 11. Proposed algorithm vs. AM and WLSE phase estimate for different GSAs.
Figure 11. Proposed algorithm vs. AM and WLSE phase estimate for different GSAs.
Energies 16 05731 g011
Table 1. PMU buses for different IEEE bus test case.
Table 1. PMU buses for different IEEE bus test case.
Test CaseNumber of PMUsPMU Buses
IEEE 1462,4,6,7,10,14
IEEE 30121,3,5,7,9,10,12
18,24,25,27,28
IEEE 118541,3,4,5,6,8,9
11,12,15,17,19,21
23,25,26,28,30,34
35,37,40,43,45,46
49,52,54,56,59,62
63,65,68,70,71,75
76,77,78,80,83,85
86,89,90,92,94,96
100,105,108,110,114
Table 2. Comparison of the proposed algorithm, the computation time of the AM algorithm, and the RMSE of the measurements corrected for different GSAs under the IEEE 14, IEEE 30, and IEEE 118-bus test cases.
Table 2. Comparison of the proposed algorithm, the computation time of the AM algorithm, and the RMSE of the measurements corrected for different GSAs under the IEEE 14, IEEE 30, and IEEE 118-bus test cases.
TestScenarioCorrected MeasurementsComputation Time (s)Corrected MeasurementsComputation Time (s)
Case RMSE (pu) of Proposed Algorithmof Proposed AlgorithmRMSE of AM Algorithmof AM Algorithm
IEEE 141 GSAs0.00930.02940.04138.4909
2 GSAs0.01200.11440.042914.6323
3 GSAs0.01580.28300.052221.3417
IEEE 301 GSAs0.00260.14260.019387.9859
2 GSAs0.02190.24210.039694.3241
3 GSAs0.04130.30290.0641107.4123
IEEE 1181 GSAs0.00330.14870.013791.3233
2 GSAs0.00570.40230.0366122.4132
3 GSAs0.00680.70110.0539129.5605
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hua, F.; Gao, W.; Li, Y.; Hu, P.; Qiao, L. Joint Detection and State Estimate with GSAs in PMU-Based Smart Grids. Energies 2023, 16, 5731. https://doi.org/10.3390/en16155731

AMA Style

Hua F, Gao W, Li Y, Hu P, Qiao L. Joint Detection and State Estimate with GSAs in PMU-Based Smart Grids. Energies. 2023; 16(15):5731. https://doi.org/10.3390/en16155731

Chicago/Turabian Style

Hua, Feng, Wengen Gao, Yunfei Li, Pengfei Hu, and Lina Qiao. 2023. "Joint Detection and State Estimate with GSAs in PMU-Based Smart Grids" Energies 16, no. 15: 5731. https://doi.org/10.3390/en16155731

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop