Next Article in Journal
Optimal Planning Strategy for Reconfigurable Electric Vehicle Chargers in Car Parks
Next Article in Special Issue
Measuring and Modeling the Skin Effect for Harmonic Power Flow Studies
Previous Article in Journal
Heat Production Performance from an Enhanced Geothermal System (EGS) Using CO2 as the Working Fluid
Previous Article in Special Issue
Real-Time Control of a Battery Energy Storage System Using a Reconfigurable Synchrophasor-Based Control System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Detection of False Data Injection Attacks in a Smart Grid Based on WLS and an Adaptive Interpolation Extended Kalman Filter

1
School of Electrical Engineering, Anhui Polytechnic University, Wuhu 241000, China
2
Key Laboratory of Advanced Perception and Intelligent Control of High-End Equipment, Chinese Ministry of Education, Wuhu 241000, China
*
Author to whom correspondence should be addressed.
Energies 2023, 16(20), 7203; https://doi.org/10.3390/en16207203
Submission received: 8 August 2023 / Revised: 10 October 2023 / Accepted: 20 October 2023 / Published: 23 October 2023
(This article belongs to the Special Issue Advanced Electric Power System 2023)

Abstract

:
An accurate power state is the basis of the normal functioning of the smart grid. However, false data injection attacks (FDIAs) take advantage of the vulnerability in the bad data detection mechanism of the power system to manipulate the process of state estimation. By attacking the measurements, then affecting the estimated state, FDIAs have become a serious hidden danger that affects the security and stable operation of the power system. To address the bad data detection vulnerability, in this paper, a false data attack detection method based on weighted least squares (WLS) and an adaptive interpolation extended Kalman filter (AIEKF) is proposed. On the basis of applying WLS and AIEKF, the Euclidean distance is used to calculate the deviation values of the two-state estimations to determine whether the current moment is subjected to a false data injection attack in the power system. Extensive experiments were conducted to simulate an IEEE-14-bus power system, showing that the adaptive interpolation extended Kalman filter can compensate for the deficiency in the bad data detection mechanism and successfully detect FDIAs.

1. Introduction

The modern power system is developing towards intelligence, and plenty of intelligent devices, such as smart meters and sensors, promote the transformation of the power system in the modes of power generation, transformation, transmission, and distribution, which makes the smart grid a typical cyber–physical system (CPS) [1,2]. In a smart grid, the supervisory control and data acquisition (SCADA) system collects and analyzes real-time data from field devices across the network. Finally, the SCADA reports back to the control center, which then makes adjustments to the power generation and distribution of the grid based on this information [3].
The susceptibility of the power cyber–physical system (CPS) to cyber attacks is a result of the unpredictable nature of sensor data in the perception layer and the unrestricted communication channels for data exchange [4,5]. Among the many types of cyber attacks, attacks against smart grids and industrial control systems are the most common; the damage caused to the system cannot be underestimated, seriously affecting the normal production activities of society. For example, in 2010, the “Stuxnet” virus attack on a Belarusian enterprise, which caused anomalies in uranium enrichment centrifuges and generators at the Iranian nuclear power plant, resulted in damage to many pieces of equipment [6]. In 2015, Black Energy, a cyber virus targeting the power grid, caused power outages at some Ukrainian power plants, disrupting the power supply to many factories in the Ivano-Frankivsk region and affecting production [7]. The investigation revealed that the incident resulted in the malicious deletion of historical grid measurements stored in the SCADA, which made recovery extremely difficult.
A false data injection attack (FDIA) is a novel attack method specifically targeting the integrity of state estimation data in the power CPS [8,9]. The attackers inject false data, which affects the power flow calculation, control decisions, etc., through smart grid sensors, controllers, and remote control units to tamper with the original data of the grid. This situation can potentially result in the malfunction of grid equipment and, in severe cases, the complete paralysis of the power network, which not only poses a significant threat to grid security but also carries the potential for substantial economic losses. Figure 1 shows the structure of a smart grid system and an illustration of an FDIA.
Liu et al. [10] first introduced the topic of FDIAs in the literature, where it was hypothesized that an attacker could access the current configuration information of a smart grid and manipulate meter or sensor measurements. Such an attack could insert false data into specific state variables, avoiding detection by current bad data detection algorithms. Yang et al. [11] delved into the challenge of determining the most effective attack strategy. This strategy, known as an injection attack strategy, involves selecting a specific set of meters to manipulate in a way that maximizes the resulting damage. They not only formalized this problem but also developed efficient algorithms to pinpoint the ideal set of meters for such attacks. It is important to highlight that even if these attacks are isolated to specific devices, their impact on the smart grid can be catastrophic due to the grid’s intricate interconnections. As described by He et al. [12], electricity theft by attackers by modifying smart meter data has seriously affected utility security. Therefore, many researchers have devoted themselves to the detection of false data injection attacks in order to safeguard the security of the smart grid.
When the power system is subjected to malicious false data injection, the state estimation result of the WLS under attack is updated in real time by incorporating an estimation algorithm of an extended Kalman filter, which has a hysteresis in its state estimation process, and by observing disparities in the estimation outcomes produced by the two algorithms, making it possible to detect the FDIA. Meanwhile, to improve the accuracy and reduce the linearization error of the EKF, the adaptive interpolation strategy is introduced. Therefore, in this paper, we propose a detection method based on WLS and AIEKF. Considering that the two algorithms have different degrees of correspondence to real-time information, the FDIA can be effectively detected. The main contributions can be summarized as follows:
  • Considering the linearization error of the EKF algorithm in state estimation in a power system, the adaptive interpolation strategy is introduced. The pseudomeasurements between two consecutive measurements are inserted by linear interpolation to improve the estimation accuracy.
  • We propose a novel FDIA detection method that combines AIEKF and WLS, marking the first instance of their joint application in this context.
  • We conduct many experiments on an IEEE-14-bus power system to demonstrate the proposed algorithm’s performance in detecting FDIAs. The result shows that the method can effectively detect FDIAs.
The remainder of the paper is structured as follows. Section 2 provides an overview of relevant literature pertaining to the detection of FDIAs. Section 3 outlines the system model employed in this study. In Section 4, we delve into the details of the proposed AIEKF algorithm. In Section 5, the detection principle is described. The experiments and results are presented in Section 6. Finally, in Section 7, we present our concluding remarks and suggest directions for future work. A list of abbreviations and acronyms is provided in Table 1.

2. Related Work

Since the concept of FDIAs was introduced, the issues related to FDIAs have received a great deal of attention in both academic research and industry. Many scholars have studied bad data in state estimation and proposed corresponding detection methods for FDIAs based on their research. Although FDIA detection algorithms differ from each other, the algorithms can be classified into two categories [13]: model-based algorithms and data-driven algorithms.

2.1. Model-Based Detection Algorithms

Nowadays, with the increasing degree of interconnection of power systems in smart grids, the simple use of weighted least squares is no longer applicable, and many variants have emerged. Moslemi et al. [14] introduced an innovative cyber attack detection technique based on maximum likelihood estimation. This method capitalizes on the near-chordal sparsity (NCS) characteristics of the power grid to establish a robust framework for addressing the corresponding maximum likelihood estimation problem. Furthermore, they broke down this detection approach into a series of localized maximum likelihood estimation problems. This approach not only safeguards privacy but also mitigates potential issues. Chen et al. [15] introduced a novel method for detecting FDIAs using kernel density estimation. This method utilizes the concept of kernel density estimation, which utilizes historical data to estimate the probability distributions of both measurements and control commands. Additionally, it calculates confidence intervals for these estimates at a specified significance level. Zhao et al. [16] proposed a method that employs short-term state prediction in smart grids to detect spurious data injection attacks. This method utilizes real-time and predicted states to pinpoint potential false data injections by analyzing the differences between them. By continuously monitoring and comparing the accuracy of short-term state predictions, this approach enhances the security and resilience of smart grid systems by improving the detection of malicious attacks. Li et al. [17] proposed a detection method based on the watermark embedding technique. The method uses a dynamic watermark embedding technique to embed security-enhancing markers (watermarks) into the grid measurement data to ensure the integrity and authenticity of the data. Then, the data embedded with the watermark are processed and detected using the EKF algorithm to identify possible faulty data insertion attacks. Through the joint application of dynamic watermarking and EKF, this method can improve the detection capability of smart grid systems against FDIAs and provide increased security. The above methods cannot be used alone; they must be used with the help of some determination methods to determine the existence of FDIAs. Some determination methods are available, such as Euclidean distance [16,18], maximum normalized residuals [19,20], chi-square testing [18,21], Cumulative sum testing [22,23], Kullback–Leibler distance [14,24], and cumulative error sum of squares probability density curves [25,26].

2.2. Data-Driven Detection Algorithms

In contrast to detection algorithms that rely on system models, data-driven detection algorithms operate without the need for system parameters and models. The process of detecting FDIAs is independent of these factors, and it relies on a large amount of historical data from the smart grid to speculate on future data [13]. Mahi-Al-Rashid et al. [27] proposed an innovative approach for countering FDIAs. They employed a CNN-LSTM-based self-encoder sequence-to-sequence architecture for prediction-assisted anomaly detection. Additionally, they suggested an adaptive optimal thresholding method based on consumption patterns to identify unusual behaviors. Yu et al. [28] proposed an online method for detecting FDIAs that merges wavelet transform with deep neural networks. This approach involves extracting features from grid sensor data using wavelet transform and subsequently employing a deep neural network for real-time detection. This methodology effectively enhances the security and reliability of the smart grid system by identifying potential attacks as they occur. Wang et al. [29] combined Kalman filtering with recurrent neural networks. The actual state of the grid was first estimated using Kalman filtering. Next, the estimated state was modeled and predicted using recurrent neural networks. By analyzing the disparity between the predicted state and the real measured data, the system can identify the existence of FDIAs. Jorjani et al. [30] introduced a novel algorithm designed for the detection of FDIAs in AC state estimation. This algorithm employs outlier detection techniques to the outcomes of state estimation because the attack may lead to data inconsistencies between buses, resulting in an abnormal graph structure. The above methods can be proven to detect FDIAs.

3. System Model

The state estimation of the power system usually deeply relies on the system model. The selection and establishment of the model have a substantial impact on the results of the system state calculation, which directly lead to the accuracy of the acquired state. State estimation in the power system is a crucial element within EMS, as it provides essential real-time information about the grid’s operational status, and it is the basis for other high-level applications to realize the calculation and analysis.
The measurements for power system state estimation are collected from the grid by SCADA or phase measurement units (PMUs). PMUs are able to provide accurate and synchronized phase measurements for geographically dispersed buses in the grid by taking advantage of the high accuracy, sub-microsecond time synchronization, and unprecedented reporting rate [31]. And if the system is completely observable with PMU measurements, the state estimation process is a linear procedure. The proposed algorithm aims at solving the linearization of EKF for state estimation. Therefore, the proposed algorithm can be applied to the mentioned PMU-based state estimation problem by reducing the linearization steps of the AIEKF algorithm. We can discuss a situation in which there are m measurements and n state variables. In an AC power system, the connection between measurements and state variables is characterized by a nonlinear relationship, which can be represented as:
z = h x + e
where z R m × 1 is the measurement vector; x R n × 1 is the state vector, typically bus voltage amplitude and phase; e R m × 1 is the measurement error vector that satisfies e = e 1 , e 2 , , e m T N 0 m × 1 , R ; and h ( · ) represents the nonlinear relationship between the measurement vector ( z ) and the state vector ( x ).
To analyze the correlation between the bus voltage, phase angle, and bus current of the grid system and determine the nonlinear relationship h ( · ) , we must streamline the power system branch by representing it through an equivalent circuit, as illustrated in Figure 2. Subsequently, utilizing the AC model of the power system, we establish the connection between the state variables and measurements, which can be formulated as follows:
P i = V i j T V j G i j cos θ i j + B i j sin θ i j
Q i = V i j T V j G i j sin θ i j B i j cos θ i j
P i j = V i 2 G i j V i V j G i j cos θ i j + B i j sin θ i j
Q i j = V i 2 B i j V i V j G i j sin θ i j B i j cos θ i j
where V i and V j are the voltage amplitudes at bus i and bus j, respectively; P i and Q i represent the active and reactive power injection of bus i, respectively; P i j and Q i j denote active power flow and reactive power flow from bus i to bus j, respectively; G i j and B i j denote the conductance and susceptance of the line from bus i to bus j, respectively; θ i j denotes the phase angle difference of the line voltage from bus i to bus j; and T denotes the set buses adjacent to bus i.

3.1. State Estimation

The most commonly used state estimation in power systems is the weighted least squares method, which is still widely used [32,33,34]. Under this method, the objective function ( J x ^ ) is the weighted sum of squares of the difference between the measured and estimated values. With the smallest objective function value, the obtained x is the closest approximation to the true state of the system. Based on the weighted least squares method, the objective function ( J x ^ ) can be expressed as:
J x ^ = z h x ^ T R 1 z h x ^ .
Then,
x ^ = arg min z h x ^ T R 1 z h x ^
To solve the nonlinear WLS problem, we can linearize the measurement equation around x , then apply the linear WLS method. The final result is expressed as:
x ^ k + 1 = x ^ k + G x ^ k 1 H T x ^ k R 1 z h x ^ k
G x ^ k = H T x ^ k R 1 H x ^ k
where k is the k-th iteration index, and H R m × n is the Jacobian matrix of the measurement equation, which can be expressed as:
H = V i V V i θ P i V P i θ Q i V Q i θ P i j V P i j θ Q i j V Q i j θ T

3.2. Bad Data Detection

Traditional methods for detecting bad data, like the chi-square test and largest normalized residual (LNR) test, rely on the results obtained from WLS estimation.
By checking the value of the objective function ( J x ^ ), we can determine whether there are bad data in the power system or not. In particular, in the chi-square test, we need to perform null hypothesis testing, which can be expressed as:
J x ^ > χ m n , p 2 , Reject H 0 J x ^ χ m n , p 2 , A c c e p t H 0
where H 0 represents the original hypothesis, i.e., there are no bad data, and χ m n , p 2 is the chi-square test threshold with a confidence level of p and a degree of freedom corresponding to m n .
The LNR test stands as another commonly employed approach for bad data detection. Its core concept revolves around the normalization of measurement residuals, which can be formulated as follows:
r i = z i h i ( x ^ ) Ω i i
Ω = I H ( x ^ ) H T x ^ R 1 H ( x ^ ) 1 H T x ^ R 1 R
where z i is the ith measurement, Ω i i is the ith diagonal entry of Ω , and I is the identity matrix. If there exit bad data in the power system, the largest normalized residual is larger than the threshold ( ε ).
The chi-square test and LNR test are generally effective for detecting natural bad data, which typically induce large measurement residuals [35].

3.3. FDIA Generation

If an attacker possesses precise information regarding real-time state estimation, network topology, and parameters, they can achieve an elaborate FDIA without being detected. When measurement meters are tampered with, the measurement ( z ) changes to z f , and the attacked measurement ( z f ) changes to:
z f = h ( x ) + a + e
where a R m × 1 is the attacked vector.
As an elaborate FDIA, the attacked vector requires a certain condition, which is expressed as:
a = h ( x ^ + c ) h ( x ^ )
where c R n × 1 is the deviation of the state variable, and x ^ is the state-estimated vector without an FDIA.
As indicated by the equation above, FDIAs can lead to an identical measurement residual vector compared to the condition without an attack. To be specific, the measurement residuals between the pre-attack and post-attack states can be described as follows:
r = z h ( x ^ )
r f = z f h ( x ^ + c ) = z + a h ( x ^ ) a = z h ( x ^ )
The measurement residual between the pre-attack and post-attack states does not change; hence, an elaborate FDIA is stealthy and can avoid detection by the existing BDD system based on residuals [36].

4. Dynamic State Estimation Model

4.1. Extended Kalman Filter (EKF)

The physical power information system in an AC power system is inherently complex and highly multidimensional and nonlinear. The state and measurement equations for state estimation can be formalized as:
x k = f ( x k 1 ) + ω k 1
z k = h ( x k ) + e k
where x k and z k denote the state vector and the measurement vector at time k, respectively; f . denotes the state transfer equation from k 1 to k; h . denotes measurement equation; and ω k 1 and e k denote the process and measurement noise, respectively, which are independent of each other.
Since the KF algorithm can only deal with linear system problems, it is not applicable to nonlinear problems such as power systems, so the EKF algorithm is derived. The EKF algorithm first uses Taylor’s formula to linearize the nonlinear system, then filters it using the basic formula of the KF algorithm. Specifically, state Equation (18) carries out Taylor series expansion at the state estimation quantity ( x ^ k 1 ) and ignores items at quadratic levels and higher. Similarly, measurement Equation (19) carries out Taylor series expansion at the state prediction quantity ( x ˜ k ) and ignores items at quadratic levels and higher. The linearization models are expressed as:
x k f x ^ k 1 + f x ^ k 1 x ^ k 1 x ^ k 1 x k 1 x ^ k 1 + ω k 1 = F k 1 x k 1 + ω k 1 + u k 1
z k h x ˜ k + h x ˜ k x ˜ k x ˜ k x k x ˜ k + e k = H k x k + e k + y k
where F k 1 = f x ^ k 1 x ^ k 1 x ^ k 1 is the Jacobian matrix of the state equation, u k 1 = f x ^ k 1 f x ^ k 1 x ^ k 1 x ^ k 1 x ^ k 1 is an externality item, H k = h x ˜ k x ˜ k x ˜ k is the Jacobian matrix of the measurement equation, and y k = h x ˜ k h x ˜ k x ˜ k x ˜ k x ˜ k is an externality item.
On the basis of Equations (18) and (19), the basic formula of the EKF algorithm is expressed as follows:
(1) Prediction steps:
x ˜ k | k 1 = F k 1 x ^ k 1
P ˜ k | k 1 = F k 1 P ^ k 1 F k 1 T + Q k 1
(2) Update steps:
K k = P ˜ k | k 1 H k T ( H k P ˜ k | k 1 H k T + R k ) 1
x ^ k = x ˜ k | k 1 + K k z k H k x ˜ k | k 1
P ^ k = I K k H k P ˜ k | k 1
where  ˜  and  ^  indicate the predicted and estimated quantities, respectively; I is the identity matrix; P is the state covariance matrix; Q and R are the covariance matrices of the process noise and measurement noise error vectors, respectively, which are assumed to be white Gaussian processes; and K is Kalman gain.
The EKF algorithm is extensively employed for dynamic state estimation in power systems due to its straightforward model development and efficient computational performance in practical engineering applications. However, since the EKF algorithm ignores the higher-level items in the linearization process, it results in a large truncation error in power systems with highly nonlinear characteristics, resulting in a decrease in the filtering effect.

4.2. Adaptive Interpolation Strategy

To enhance the dynamic state estimation capabilities of the EKF algorithm in the power system, an adaptive interpolation method is proposed to strike a balance between estimation precision and computational efficiency [37].
Based on Equation (18), we need to quantify the nonlinear index of state function f ( x ) to obtain η f , which can be expressed as:
ε f = x k f x ^ k 1 f x ^ k 1 x ^ k 1 x ^ k 1 x k 1 x ^ k 1
η f = ε f T Q k 1 ε f
where ε f is the difference between f ( x ) and the corresponding linear approximation.
Similarly, based on Equation (19), we can obtain the nonlinear index ( η h ) of measurement function h ( x ) , which can be represented as:
ε h = z k h x ˜ k h x ˜ k x ˜ k x ˜ k x k x ˜ k
η h = ε h T R k 1 ε h
where ε h is the difference between h ( x ) and the corresponding linear approximation.
As shown in Equations (28) and (30), ε f and ε h are normalized by Q k and R k . Under the process, ε f and ε h are numerically non-negative. Hence, if ε f Q k and ε h R k , η f and η h are both much less than 1, and the system can be considered quasilinear. Otherwise, according to the size of the nonlinearization index, the pseudomeasurements must be added between two consecutive sampling points to increase the sampling rate and reduce the degree of nonlinearity of the system.
The interpolation factor (r) is closely related to the sizes of ε f and ε h . The larger nonlinearization indices η f and η h are, the larger the interpolation factor (r) is. Conversely, the interpolation factor (r) is smaller. It is important to emphasize that ε f = 0 and ε h = 0 in the linear system. Therefore, the system does not interpolate.
The finite state machine model is shown in Figure 3. In practical applications, we can introduce as many states as required to the FSM model to accommodate the nonlinearity indices. There are three parameters in each state (i): the interpolation factor ( r i ), the upper threshold ( U i ), and the lower threshold ( L i ). In addition, as the state (i) changes, the interpolation factor is set to r i + 1 > r i . The selection of the interpolation factor (r) is shown in Algorithm 1.
The thresholds of each state are different, and they are set depending on different scenarios. When selecting the thresholds, it is necessary to ensure that the upper threshold ( U i ) is larger than the lower threshold ( L i ). Furthermore, as U i and L i become smaller, the interpolation factor (r) and estimation accuracy increase, and the algorithm consumes more time. It is important to highlight that the nonlinear indices can take on discrete values. To maintain small values for both η f and η h , here is how the process works: If either η f or η h exceeds U i , r parameter is increased to minimize the nonlinear error. Conversely, if both η f and η h are below L i , r is reduced to lower computational complexity. The specific values of r for each state can be found in Table 2.
Algorithm 1 Choose the interpolation factor (r).
  • State i               r = r i
  • if  η f i or η h i > U i   then
  •     go to the state i + 1
  • else
  •     η f i and η h i < L i
  •     go to the state i 1
  • end if
  • Stay in the state i

4.3. Adaptive Interpolation EKF (AIEKF)

Building upon the dynamic model outlined in Section 4.1 and the adaptive interpolation approach discussed in Section 4.2, we introduce the AIEKF algorithm in this section. The AIEKF algorithm effectively strikes a balance between computation time and estimation accuracy, thereby enhancing the performance of the EKF algorithm in power systems. A flow chart illustrating the AIEKF algorithm is provided in Figure 4, and its detailed steps are as outlined as follows:
(1) Initialization: setting the initial state variable ( x ^ 0 ) and state error covariance ( P ^ 0 ).
(2) Adaptive Interpolation: In order to strike a compromise between computational efficiency and estimation precision, the algorithm incorporates an adaptive interpolation strategy, which comprises three key steps. Initially, we calculate the nonlinearity indices of the state transition function and the measurement function (referred to as η f and η h , respectively) using Equations (28) and (30), respectively. In the next step, we ascertain the interpolation factor (r) by utilizing a finite-state machine model. Finally, r pseudomeasurements are introduced between two actual measurements through linear interpolation, which is designed to mitigate the adverse impacts of nonlinearity.
(3) EKF: On the basis of determining the number of interpolation factors (r), the power system is estimated using the EKF algorithm. Initially, leveraging the state and its covariance matrix from time k 1 , we derive a prior estimation at time k in accordance with Equations (22) and (23). Secondly, the correction of the a priori estimation is used to obtain an a posteriori estimation according to Equations (24)–(26). Thirdly, filtering is performed between two consecutive samples based on the size of the interpolation factor. Then, the above steps are repeated until the end of the sampling time.

5. Detection of FDIAs

This section proposes a methodology for FDIA detection based on power system state estimation. As a nonlinear system in the smart grid, it is difficult to guarantee the estimation accuracy using traditional state estimation methods. Meanwhile, in order to improve the stability of the detection algorithm, the real-time state information of the grid buses is solved according to the system model equation and AIEKF algorithm.
Once the attacker begins to tamper with the measuring instruments, the result of Equation (25) is different from the previous result and expressed as:
x ^ k f = x ˜ k k 1 + K k [ z k + a k H k x ˜ k k 1 ] = x ^ k + K k a k
where x ^ k f is the estimated state after the FDIA. To better facilitate estimation, c k = x ^ k f x ^ k is introduced. Then, for the next time ( k + 1 ), it can be represented as:
x ^ k + 1 f = x ˜ k + 1 k f + K k + 1 [ z k + 1 f H k + 1 x ˜ k + 1 k f ] = x ˜ k + 1 k f + K k + 1 [ z k + 1 + a k + 1 H k + 1 x ˜ k + 1 k f ] = x ^ k + 1 + I K k + 1 H k + 1 F k c k + K k + 1 a k + 1
The analysis above highlights that the injection bias is influenced by both the currently injected false data and the bias present in the previously estimated state. Over time, this injection bias accumulates and gradually shifts the estimated state closer to the actual system state. When the power system is subjected to an FDIA, the altered measurements make the WLS state estimation results swing towards the new mean. For the AIEKF algorithm, due to the constraints of the state transfer matrix and the fact that its estimation is jointly determined by the predicted and measured values, the state estimation has some hysteresis, and only small oscillations occur.
Based on WLS and AIEKF estimation results, considering the influence of bus states on the system, the Euclidean distance in multidimensional spaces is introduced. The Euclidean distance detection threshold required in FDIA detection is obtained from historical data, and the Euclidean distance between two points estimated by WLS and AIEKF states is calculated online in real time and used as the basis for attack detection. The expression for the Euclidean distance at time k is expressed as follows:
d k = i = 1 n x ^ i , k W L S x ^ i , k A I E K F 2
where x ^ i , k W L S denotes the WLS-based state estimation at time k, x ^ i , k A I E K F denotes the AIEKF-based state estimation, and n denotes the system dimension.
In the n-dimensional grid system state space, the Euclidean distance is employed to quantify the spatial separation between two points within the same state space at a given time point. The Euclidean distance of the two state estimation algorithms stabilizes in a certain range during regular power system operation, which provides a basis for false data injection attack detection. The detection threshold is expressed as:
τ D = max d 1 , , d n , + μ
where μ is the threshold margin, which is introduced to prevent false alarms triggered by minor data fluctuations while the detection system is operating under normal conditions.
Attack detection is performed by comparing the Euclidean distance between the detection threshold and the two points in the state space, and when d ( k ) τ D , it is considered that there exits an FDIA in the power system; otherwise, it is considered that no attack occurs. The relation can be expressed as:
d ( k ) < τ D , N o F D I A d ( k ) τ D , F D I A
In order to distinguish between bad data and FDIAs, bad data detection is also required at the end of the above steps. Only if d ( k ) τ D and J x ^ < χ m n , p 2 hold can we conclude that the power system is under FDIAs. The proposed FDIA detection method based on WLS and AIEKF is shown in Algorithm 2.
Algorithm 2 FDIA detection based on WLS and the AIEKF algorithm
1:
Initialize state variable x ^ k 1 and state error covariance P ^ k 1 ; the Euclidean distance detection threshold τ D ;
2:
Obtain the measurements by SCADA at time k;
3:
In traditional static state estimation, WLS is widely used to calculate an estimated state vector x ^ k W L S , x ^ k W L S = H k T R k 1 H k 1 H k T R k 1 z k
4:
AIEKF
(1) Calculate calculate the nonlinearity indices of the state transition function and the measurement function (referred to as η f and η h ) using Equations (28) and (30);
(2) Ascertain the interpolation factor r by utilizing a finite state machine model;
(3) Interpolate r pseudo-measurement between two actual measurements through linear interpolation;
(4) Execute the state prediction step of the EKF by applying Equations (22) and (23);
(5) Conduct the measurement update step of EKF by applying Equations (24)–(26) to calculate estimated state vector x ^ k A I E K F , x ^ k A I E K F = x ˜ k | k 1 + K k z k H k x ˜ k | k 1
5:
Calculate the Euclidean distance between two points estimated by WLS and AIEKF states;
6:
if  d ( k ) τ D and J x ^ < χ m n , p 2  then
7:
   Exist FDIA and generate early warning;
8:
else
9:
   Continue the state estimation process at time k = k + 1 ,
10:
end if

6. Experiments and Results

This paper introduces a detection approach that relies on state estimation. Considering the effectiveness of the method in real systems, the power standard IEEE-14-bus system shown in Figure 5 is used for MATLAB R2021b simulation. The active and reactive power of each bus are shown in the following Table 3. The data used in this paper come from MATPOWER trend calculation, which is used to obtain the bus voltage magnitude and phase-angle truth values, superimposed with zero-mean Gaussian white noise as the measurements. Furthermore, the estimation computations occur at one-minute intervals, which aligns with the anticipated average sampling frequency for utilities equipped with contemporary Energy management systems (EMS).

6.1. Comparison of Estimation Effects with WLS, EKF, and AIEKF

Next, the estimation effect of AIEKF proposed in this paper is compared with the standard WLS and EKF before injecting false data. As shown in Figure 6 and Figure 7, bus 11 was randomly selected to compare the estimation performance of the three algorithms in 60 min. It is clear to see from the figures that although the bus voltage and phase angle fluctuate up and down with time, the AIEKF achieves superior performance relative to WLS and EKF in state estimation. To further demonstrate the estimation capability of the proposed algorithm, the estimation results of the voltage amplitude and phase of each bus under the three algorithms after stabilization are shown in Figure 8 and Figure 9.
To validate the efficacy of the AIEKF algorithm introduced in this paper for state estimation, we use the root mean square error (RMSE) as a metric to assess the accuracy of the algorithm’s estimations. The RMSE calculation formula is provided below.
R M S E = 1 N i = 1 N x i x ^ i 2
where x i is the ith component of the true value of the state variable, x ^ i is the ith component of the estimation of the state variable, and N is the dimension of the state variable.
The RMSE performance metric is calculated in the IEEE-14-bus system, and the results are shown in Table 4. As shown in Table 4, the RMSE of the AIEKF algorithm is the smallest of the three algorithms. Compared with WLS and EKF, the RMSE of the AIEKF algorithm decreases by 79% and 67%, respectively.

6.2. Estimation of the State Variable before and after FDIA

To assess the viability of the false data injection attack vector strategy, in this paper, we uses the IEEE-14-bus standard test system for simulation and analysis. An attack on a local subnetwork, e.g., an attack vector ( a ), is injected into each bus measurement value. Meanwhile, it is necessary to ensure that the internal power of the subnetwork is conserved and that the subnetwork boundary voltage and the transmission power between the subnetwork and the external network remain unchanged. The introduction of line blocking constraints leads to the response of the grid security analysis system so that the attacked measurement value ( z + a ) is a valid attack value. Under this condition, the attack vector ( a = [ P 3 , Q 3 , P 1 2 , P 2 3 , P 4 2 , Q 1 2 , Q 2 3 , Q 4 2 ] T ) is selected as a = 0.0020 , 0.2029 , 0.0084 , 0.0073 , 0.0059 , 0.4874 , 0.1329 , 0.0723 T , and the increment of the rest of z is zero. Figure 10 shows the change in the measurement distribution of the system before and after the attack.
Once the measurements are tampered with, the state variable ( x ) changes. Assuming that the system is subjected to a false data injection attack at 75 min, bus 11 is selected to observe the change in bus voltage magnitude and phase angle before and after the false data injection attack occurs. State estimation of system buses using the AIEKF algorithm is performed to improve the stability and accuracy of the detection algorithm. The state estimation results of the two algorithms are shown in Figure 11 and Figure 12. As shown in the figures, in the first 75 min without an attack, AIEKF outperforms WLS in terms of estimation. The system is attacked by false data injection in the 75th minute, and the two algorithms converge to the state expectation at different moments. It is clear that AIEKF converges slowly and with small fluctuations, while WLS is affected by a sudden change in the measurements and converges quickly to the new state value.

6.3. Detection of FDIAs

Normal operation of the power information physics system produces a certain amount of error, but the residuals caused by measurement noise and system noise are often very small—much smaller than the threshold allowed for the detection of undesirable data errors—so that undesirable data can be prevented from interfering with the system. The values of J x ^ before and after an attack determined using weighted least squares are shown in Figure 13. Before the attack, the value of J x ^ is 4.5728. When the false data attack is injected into the system, the value of J x ^ is 4.7041. It is not difficult to find that the residual does not change much before and after an attack. The IEEE-14-bus system has a total of 41 measurements, the redundancy is k = m n = 41 27 = 14 , and the significance level ( α ) is 0.05. According to the statistical chi-square distribution table, the threshold of bad data detection is 23.685. The residual of the injected attack is within the threshold. However, the voltage amplitude and voltage phase are changed. The false data attack vector successfully achieves the attack.
This paper proposes a detection method based on the computation of the Euclidean distance between two points in the state space to detect FDIAs. Using Monte Carlo simulation with 1000 independent experiments, we can obtain the normal-case Euclidean distance distribution. The maximum value is taken as the detection threshold, i.e., max d 1 , , d n , = 1.847 . The detection margin ( μ ) is set to 0.03, and according to Equation (30), the detection threshold can be derived as τ D = 1.85 . After an attack, the Euclidean distance changes to 17.9586. Figure 14 shows the Euclidean distance distribution based on the two algorithms before and after an attack.
As can be seen from the figure, during the first 75 min, when the system is not under attack, the Euclidean distance between the state points stays within a certain range below the predefined detection threshold, which indicates that the system does not detect an attack according to the judgment conditions. When the system is attacked after the 75th minute, the two algorithms converge to the new state values at different moments. At this moment, the Euclidean distance of the voltage state estimate fluctuates considerably with the attack and exceeds the predefined detection threshold. Therefore, FDIAs can be detected, which triggers the attack alarm system.

7. Conclusions

In this research, we introduce an approach that combines weighted least squares with an adaptive interpolation extended Kalman filter to detect FDIAs in power systems. AIEKF effectively reduces the nonlinear errors associated with the extended Kalman filters, leading to enhanced accuracy in estimating the state of the power system. When a power system is subject to false data injection attacks, the state estimation weighted least squares statistic is characterized by a real-time nature, where changes in state variables are instantaneous, whereas adaptive interpolation extended Kalman filtering is characterized by hysteresis, and a change in state variables requires a process. Based on the difference between the two algorithms, the Euclidean distance is introduced as a metric for detecting whether the system is injected with false data or not. Additionally, the relevant detection threshold is obtained using Monte Carlo simulation. The experiments show that the method is effective in detecting false data injection attacks.
Subsequent research will consider the study of the localization of FDIAs and the development of a new joint estimation algorithm that can simultaneously achieve the detection and localization of false data injection attacks.

Author Contributions

Conceptualization, G.Z.; methodology, Y.L. and W.G.; software, G.Z. and X.G.; validation, J.Z.; formal analysis, X.G.; resources, W.G.; data curation, P.H.; writing—original draft preparation, G.Z.; writing—review and editing, W.G. and Y.L.; visualization, P.H. and X.G.; supervision, W.G.; project administration, Y.L.; funding acquisition, W.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by the National Natural Science Foundation of China (NSFC) (U21A20146), the Collaborative Innovation Project of Anhui Universities (GXXT-2020-070), the Open Research Fund of Anhui Province Key Laboratory of Detection Technology and Energy Saving Devices (JCKJ2022C02, JCKJ2022A10), and the Open Research Fund of the Key Laboratory of Advanced Perception and Intelligent Control of High-end Equipment of the Ministry of Education (GDSC202208).

Data Availability Statement

Not applicable.

Acknowledgments

We thank the anonymous reviewers for their valuable comments.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Marashi, K.; Sarvestani, S.S.; Hurson, A.R. Consideration of Cyber-Physical Interdependencies in Reliability Modeling of Smart Grids. IEEE Trans. Sustain. Comput. 2018, 3, 73–83. [Google Scholar] [CrossRef]
  2. Guo, H.; Pang, Z.H.; Sun, J.; Li, J. An Output-Coding-Based Detection Scheme Against Replay Attacks in Cyber-Physical Systems. IEEE Trans. Circuits Syst. II 2021, 68, 3306–3310. [Google Scholar] [CrossRef]
  3. Ghosh, S.; Sampalli, S. A Survey of Security in SCADA Networks: Current Issues and Future Challenges. IEEE Access 2019, 7, 135812–135831. [Google Scholar] [CrossRef]
  4. Zhou, J.; Chen, B.; Yu, L. Intermediate-Variable-Based Estimation for FDI Attacks in Cyber-Physical Systems. IEEE Trans. Circuits Syst. II 2020, 67, 2762–2766. [Google Scholar] [CrossRef]
  5. Gao, Y.; Ma, J.; Wang, J.; Wu, Y. Event-Triggered Adaptive Fixed-Time Secure Control for Nonlinear Cyber-Physical System with False Data-Injection Attacks. IEEE Trans. Circuits Syst. II 2023, 70, 316–320. [Google Scholar] [CrossRef]
  6. Wang, Y.; Gu, D.; Peng, D.; Chen, S.; Yang, H. Stuxnet Vulnerabilities Analysis of SCADA Systems. Commun. Comput. Inf. Sci. 2012, 345, 640–646. [Google Scholar] [CrossRef]
  7. Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks. IEEE Trans. Power Syst. 2016, 32, 3317–3318. [Google Scholar] [CrossRef]
  8. Lu, K.D.; Wu, Z.G. Multi-Objective False Data Injection Attacks of Cyber–Physical Power Systems. IEEE Trans. Circuits Syst. 2022, 69, 3924–3928. [Google Scholar] [CrossRef]
  9. Yu, W.; Bu, X.; Hou, Z. Security Data-Driven Control for Nonlinear Systems Subject to Deception and False Data Injection Attacks. IEEE Trans. Netw. Sci. Eng. 2022, 9, 2910–2921. [Google Scholar] [CrossRef]
  10. Liu, Y.; Reiter, M.K.; Ning, P. False data injection attacks against state estimation in electric power grids. In Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, 9–13 November 2009; pp. 1–33. [Google Scholar] [CrossRef]
  11. Yang, Q.; Yang, J.; Yu, W.; An, D.; Zhang, N.; Zhao, W. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 717–729. [Google Scholar] [CrossRef]
  12. He, Y.; Mendis, G.J.; Wei, J. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism. IEEE Trans. Smart Grid 2017, 8, 2505–2516. [Google Scholar] [CrossRef]
  13. Musleh, A.S.; Chen, G.; Dong, Z.Y. A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids. IEEE Trans. Smart Grid 2020, 11, 2218–2234. [Google Scholar] [CrossRef]
  14. Moslemi, R.; Mesbahi, A.; Velni, J.M. A fast, decentralized covariance selection-based approach to detect cyber attacks in smart grids. IEEE Trans. Smart Grid 2018, 9, 4930–4941. [Google Scholar] [CrossRef]
  15. Chen, Y.; Huang, S.; Liu, F.; Wang, Z.; Sun, X. Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control. IEEE Trans. Smart Grid 2019, 10, 2158–2169. [Google Scholar] [CrossRef]
  16. Zhao, J.; Zhang, G.; Scala, L.M.; Dong, Z.Y.; Chen, C.; Wang, J. Short-Term State Forecasting-Aided Method for Detection of Smart Grid General False Data Injection Attacks. IEEE Trans. Smart Grid 2017, 8, 1580–1590. [Google Scholar] [CrossRef]
  17. Li, X.; Wang, Z.; Zhang, C.; Du, D.; Fei, M. A Novel Dynamic Watermarking-Based EKF Detection Method for FDIAs in Smart Grid. IEEE/CAA J. Autom. Sinica 2022, 9, 1319–1322. [Google Scholar] [CrossRef]
  18. Manandhar, K.; Cao, X.J.; Hu, F.; Liu, Y. Combating False Data Injection Attacks in Smart Grid using Kalman Filter. In Proceedings of the 2014 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 3–6 February 2014; pp. 16–20. [Google Scholar] [CrossRef]
  19. Shi, W.; Wang, Y.; Jin, Q.; Ma, J. PDL: An Efficient Prediction-Based False Data Injection Attack Detection and Location in Smart Grid. In Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, 23–27 July 2018; pp. 676–681. [Google Scholar] [CrossRef]
  20. Abreu, O.A.; Messina, F.; Vega, L.R. Stealth Attacks on the SADI with Prior Information on the State Covariance Matrix. In Proceedings of the 2022 IEEE Biennial Congress of Argentina (ARGENCON), San Juan, Argentina, 7–9 September 2022; pp. 1–7. [Google Scholar] [CrossRef]
  21. Huang, K.; Xiang, Z.; Deng, W.; Yang, C.; Wang, Z. False Data Injection Attacks Detection in Smart Grid: A Structural Sparse Matrix Separation Method. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2545–2558. [Google Scholar] [CrossRef]
  22. Khalaf, M.; Youssef, A.; El-Saadany, E. Joint Detection and Mitigation of False Data Injection Attacks in AGC Systems. IEEE Trans. Smart Grid 2019, 10, 4985–4995. [Google Scholar] [CrossRef]
  23. Kurt, M.N.; Yilmaz, Y.; Wang, X. Distributed Quickest Detection of Cyber-Attacks in Smart Grid. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2015–2030. [Google Scholar] [CrossRef]
  24. Cheng, G.; Lin, Y.; Zhao, J.; Yan, J. A Highly Discriminative Detector Against False Data Injection Attacks in AC State Estimation. IEEE Trans. Smart Grid 2022, 13, 2318–2330. [Google Scholar] [CrossRef]
  25. Wang, Y.; Shi, W.; Jin, Q.; Ma, J. An Accurate False Data Detection in Smart Grid Based on Residual Recurrent Neural Network and Adaptive threshold. In Proceedings of the 2019 IEEE International Conference on Energy Internet (ICEI), Nanjing, China, 27–31 May 2019; pp. 499–504. [Google Scholar] [CrossRef]
  26. Mousavian, S.; Valenzuela, J.; Wang, J.H. Real-time data reassurance in electrical power systems based on artificial neural networks. Electr. Pow. Syst. Res. 2013, 96, 285–295. [Google Scholar] [CrossRef]
  27. Mahi-al-rashid, A.; Hossain, F.; Anwar, A.; Azam, S. False Data Injection Attack Detection in Smart Grid Using Energy Consumption Forecasting. Energies 2022, 15, 4877. [Google Scholar] [CrossRef]
  28. Yu, J.J.Q.; Hou, Y.; Li, V.O.K. Online False Data Injection Attack Detection With Wavelet Transform and Deep Neural Networks. IEEE Trans. Industr. Inform. 2018, 14, 3271–3280. [Google Scholar] [CrossRef]
  29. Wang, Y.F.; Zhang, Z.H.; Ma, J.H.; Jin, Q. KFRNN: An Effective False Data Injection Attack Detection in Smart Grid Based on Kalman Filter and Recurrent Neural Network. IEEE Internet Things J. 2022, 9, 6893–6904. [Google Scholar] [CrossRef]
  30. Jorjani, M.; Seifi, H.; Varjani, A.Y. A Graph Theory-Based Approach to Detect False Data Injection Attacks in Power System AC State Estimation. IEEE Trans. Ind. Informat. 2021, 17, 2465–2475. [Google Scholar] [CrossRef]
  31. Muscas, C.; Pegoraro, P.A.; Sulis, S.; Pau, M.; Ponci, F.; Monti, A. New Kalman Filter Approach Exploiting Frequency Knowledge for Accurate PMU-Based Power System State Estimation. IEEE Trans. Instrum. Meas. 2020, 69, 6713–6722. [Google Scholar] [CrossRef]
  32. Deng, R.L.; Zhuang, P.; Liang, H. False Data Injection Attacks Against State Estimation in Power Distribution Systems. IEEE Trans. Smart Grid 2019, 10, 2871–2881. [Google Scholar] [CrossRef]
  33. Yuan, C.; Zhuo, Y.; Liu, G.; Dai, R.; Lu, Y.; Wang, Z. Graph Computing-Based WLS Fast Decoupled State Estimation. IEEE Trans. Smart Grid 2020, 11, 2440–2451. [Google Scholar] [CrossRef]
  34. Manousakis, N.M.; Korres, G.N. Application of State Estimation in Distribution Systems with Embedded Microgrids. Energies 2021, 14, 7933. [Google Scholar] [CrossRef]
  35. Radhoush, S.; Vannoy, T.; Liyanage, K.; Whitaker, B.M.; Nehrir, H. Distribution System State Estimation and False Data Injection Attack Detection with a Multi-Output Deep Neural Network. Energies 2023, 16, 2288. [Google Scholar] [CrossRef]
  36. Ganjkhani, M.; Fallah, S.N.; Badakhshan, S.; Shamshirband, S.; Chau, K.-W. A Novel Detection Algorithm to Identify False Data Injection Attacks on Power System State Estimation. Energies 2019, 12, 2209. [Google Scholar] [CrossRef]
  37. Akhlaghi, S.; Zhou, N.; Huang, Z. A Multi-Step Adaptive Interpolation Approach to Mitigating the Impact of Nonlinearity on Dynamic State Estimation. IEEE Trans. Smart Grid 2018, 9, 3102–3111. [Google Scholar] [CrossRef]
Figure 1. Illustration of an FDIA in a smart grid.
Figure 1. Illustration of an FDIA in a smart grid.
Energies 16 07203 g001
Figure 2. Power system branch equivalent circuits.
Figure 2. Power system branch equivalent circuits.
Energies 16 07203 g002
Figure 3. Finite-state machine (four states).
Figure 3. Finite-state machine (four states).
Energies 16 07203 g003
Figure 4. Flow chart of the AIEKF algorithm.
Figure 4. Flow chart of the AIEKF algorithm.
Energies 16 07203 g004
Figure 5. The IEEE-14-bus power system.
Figure 5. The IEEE-14-bus power system.
Energies 16 07203 g005
Figure 6. Bus 11 voltage amplitude estimation.
Figure 6. Bus 11 voltage amplitude estimation.
Energies 16 07203 g006
Figure 7. Bus 11 voltage phase estimation.
Figure 7. Bus 11 voltage phase estimation.
Energies 16 07203 g007
Figure 8. Bus voltage amplitude estimation.
Figure 8. Bus voltage amplitude estimation.
Energies 16 07203 g008
Figure 9. Bus voltage phase estimation.
Figure 9. Bus voltage phase estimation.
Energies 16 07203 g009
Figure 10. Measurement distribution before and after an attack on the IEEE-14-bus power system.
Figure 10. Measurement distribution before and after an attack on the IEEE-14-bus power system.
Energies 16 07203 g010
Figure 11. The voltage amplitude change of bus 11 before and after an attack.
Figure 11. The voltage amplitude change of bus 11 before and after an attack.
Energies 16 07203 g011
Figure 12. The voltage phase change of bus 11 before and after an attack.
Figure 12. The voltage phase change of bus 11 before and after an attack.
Energies 16 07203 g012
Figure 13. The residual of WLS estimation before and after an attack.
Figure 13. The residual of WLS estimation before and after an attack.
Energies 16 07203 g013
Figure 14. The Euclidean distance before and after an attack.
Figure 14. The Euclidean distance before and after an attack.
Energies 16 07203 g014
Table 1. A list of abbreviations and acronyms.
Table 1. A list of abbreviations and acronyms.
Abbreviations and AcronymsFull Name
AIEKFAdaptive interpolation extended Kalman filter
BDDBad data detection
CPSCyber–physical system
EMSEnergy management system
FDIAsFalse data injection attacks
LNRLargest normalized residual
PMUsPhase measurement units
RMSERoot mean square error
SCADASupervisory control and data acquisition
WLSWeighted least squares
Table 2. The size of the interpolation factor (r).
Table 2. The size of the interpolation factor (r).
State (i)Interpolation Factor (r)Lower ThresholdUpper Threshold
i = 1 1 L 1 U 1
i = 2 3 L 2 U 2
i = 3 7 L 3 U 3
i = 4 15 L 4 U 4
Table 3. Active and reactive power injections into system buses.
Table 3. Active and reactive power injections into system buses.
BusGenerationGenerationLoadLoad
NumberActive (MW)Reactive (Mvar)Active (MW)Reactive (Mvar)
12.3824−0.14900.00000.0000
20.40000.49040.21700.1270
30.00000.27440.94200.1900
40.00000.00000.4780−0.0390
50.00000.00000.07600.0160
60.00000.29600.11200.0750
70.00000.00000.00000.0000
80.00000.30920.00000.0000
90.00000.00000.29500.1660
100.00000.00000.09000.0580
110.00000.00000.03500.0180
120.00000.00000.06100.0160
130.00000.00000.13500.0580
140.00000.00000.14900.0500
Table 4. Comparison of the RMSE of the three algorithms.
Table 4. Comparison of the RMSE of the three algorithms.
AlgorithmRMSE
WLS0.0969
EKF0.0616
AIEKF0.0201
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, G.; Gao, W.; Li, Y.; Guo, X.; Hu, P.; Zhu, J. Detection of False Data Injection Attacks in a Smart Grid Based on WLS and an Adaptive Interpolation Extended Kalman Filter. Energies 2023, 16, 7203. https://doi.org/10.3390/en16207203

AMA Style

Zhang G, Gao W, Li Y, Guo X, Hu P, Zhu J. Detection of False Data Injection Attacks in a Smart Grid Based on WLS and an Adaptive Interpolation Extended Kalman Filter. Energies. 2023; 16(20):7203. https://doi.org/10.3390/en16207203

Chicago/Turabian Style

Zhang, Guoqing, Wengen Gao, Yunfei Li, Xinxin Guo, Pengfei Hu, and Jiaming Zhu. 2023. "Detection of False Data Injection Attacks in a Smart Grid Based on WLS and an Adaptive Interpolation Extended Kalman Filter" Energies 16, no. 20: 7203. https://doi.org/10.3390/en16207203

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop