Mitigating Voltage Violations in Smart City Microgrids Under Coordinated False Data Injection Cyberattacks: Simulation and Experimental Insights
Abstract
:Highlights
- Demonstrating the vulnerability of urban energy systems to coordinated cyberattacks targeting the voltage profile through simulation and experimental validations.
- Highlighting the negative impacts of systematic false data injection attacks while taking more than one objective function at a time.
- Enhancing the reliability of smart city energy systems.
- Providing a basis for designing resilient smart grid infrastructures against cyber threats.
Abstract
1. Introduction
1.1. Background, Definitions, and Motivation
1.2. Literature Review
1.3. Research Gap and Contribution of This Work
- Designing a multi-objective unified framework from attackers’ standpoints to target smart microgrids at the most vulnerable time to undervoltage and overvoltage, resulting in a set of non-dominated solutions (i.e., Pareto-front) to obtain a range of overvoltage and undervoltage rates,
- Experimentally validating the developed framework on a lab-scale smart microgrid, containing wind turbines and PV modules, besides the simulation-based validation to identify the best compromise solution (BCS) between undervoltage and overvoltage.
2. Materials and Methods
2.1. Developed Framework
2.2. Problem Formulation
2.2.1. Pre-Attack Evaluation to Pinpoint the Most Vulnerable Node
2.2.2. Intentional Voltage Alteration from Attackers’ Standpoint
2.2.3. Independent FDIA Model Leading to Overvoltage
2.2.4. Independent FDIA Model Leading to Undervoltage
2.2.5. Unified FDIA Leading to Voltage Violation
2.2.6. Formulation of the Embedded Multi-Objective Methodology
2.2.7. Assumptions to Be Considered for This Type of Cyberattack
3. Simulation and Experimental Results
3.1. Initialization and Introducing the Case Studies
3.2. Simulation Results on the Modified IEEE 13-Node System
- Single-Attacker Scenarios: MTD alone may suffice by increasing the complexity of identifying vulnerabilities.
- Coordinated Multi-Attacker Scenarios: a layered defense strategy, combining MTD, anomaly detection, and advanced encryption, would be required to counteract synchronized attacks targeting multiple DERs.
- Stealthy FDIAs: AI-based detectors with adaptive learning capabilities can enhance detection accuracy by continuously updating models with real-time system data.
3.3. Experimental Results on the Lab-Scale Microgrid
- Attacker 1 targets the PV panels to cause overvoltage in the microgrid. Further, the attacker manipulates the sensor’s reading associated with the system’s load by injecting only ΔPD, obtained after minimizing objective function (10),
- Attacker 2 targets the wind turbines to cause different rates of undervoltage in the lab-scale microgrid.
3.4. Simulation Results on the Large-Scale 136-Node Distribution System
4. Conclusions and Future Work
- In the simulation-based validation, the percentage of conflict between minimizing the false data vectors and maximizing the rate of voltage violation (e.g., overvoltage, undervoltage, or both) was more than 94% in all simulated scenarios. Hence, such objective functions cannot be aggregated with penalty weights to ensure simultaneous optimization. This is where the significance of solving the problem as a multi-objective optimization problem, providing a set of optimal solutions, comes under the spotlight.
- In the experimental-based validation, although the microgrid experienced rates of overvoltage and undervoltage of, respectively, 17% and 15% after the independent FDIAs, the period of voltage violation was on the minute basis. On the other hand, in the unified cyberattack, the microgrid experienced a lower rate of voltage violation (i.e., almost 11%); however, the microgrid was affected for more than 6 h, which significantly reduced the reliability of the microgrid. This is where the importance of the introduced attack framework comes under the spotlight, since the investigated issue can be more noticeable in larger scale microgrids with thousands of end-users.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Yan, J.; Menghwar, M.; Asghar, E.; Panjwani, M.K.; Liu, Y. Real-time energy management for a smart-community microgrid with battery swapping and renewables. Appl. Energy 2019, 238, 180–194. [Google Scholar] [CrossRef]
- Kottayil, S.K. Smart Microgrids, 1st ed.; CRC Press: Boca Raton, FL, USA; Taylor & Francis Group: Boca Raton, FL, USA, 2020. [Google Scholar]
- Kabeyi, M.J.B.; Olanrewaju, O.A. Sustainable energy transition for renewable and low carbon grid electricity generation and supply. Front. Energy Res. 2022, 9, 743114. [Google Scholar] [CrossRef]
- Villanueva-Rosario, J.A.; Santos-García, F.; Aybar-Mejía, M.E.; Mendoza-Araya, P.; Molina-García, A. Coordinated ancillary services, market participation and communication of multi-microgrids: A review. Appl. Energy 2022, 308, 118332. [Google Scholar] [CrossRef]
- Khazaei, J. Stealthy cyberattacks on loads and distributed generation aimed at multi-transmission line congestions in smart grids. IEEE Trans. Smart Grid 2021, 12, 2518–2528. [Google Scholar] [CrossRef]
- Wang, Y.; Liu, Y.; Li, J. Deducing cascading failures caused by cyberattacks based on attack gains and cost principle in cyber-physical power systems. J. Mod. Power Syst. Clean Energy 2019, 7, 1450–1460. [Google Scholar] [CrossRef]
- Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Trans. Power Syst. 2017, 32, 3317–3318. [Google Scholar] [CrossRef]
- Deng, C.; Wang, Y.; Wen, C.; Xu, Y.; Lin, P. Distributed resilient control for energy storage systems in cyber–physical microgrids. IEEE Trans. Ind. Inform. 2021, 17, 1331–1341. [Google Scholar] [CrossRef]
- Zhou, J.; Xu, Y.; Yang, L.; Sun, H. Attack-resilient distributed control for islanded single-/three-phase microgrids based on distributed adaptive observers. J. Mod. Power Syst. Clean Energy 2022, 10, 109–119. [Google Scholar] [CrossRef]
- Li, X.; Xu, Q.; Blaabjerg, F. Adaptive resilient secondary control for islanded AC microgrids with sensor faults. IEEE J. Emerg. Sel. Top. Power Electron. 2021, 9, 5239–5248. [Google Scholar] [CrossRef]
- Habibi, M.R.; Baghaee, H.R.; Dragicevic, T.; Blaabjerg, F. False data injection cyber-attacks mitigation in parallel DC/DC converters based on artificial neural networks. IEEE Trans. Circuits Syst. II Express Briefs 2021, 68, 717–721. [Google Scholar] [CrossRef]
- Habibi, M.R.; Baghaee, H.R.; Dragičević, T.; Blaabjerg, F. Detection of false data injection cyber-attacks in DC microgrids based on recurrent neural networks. IEEE J. Emerg. Sel. Top. Power Electron. 2021, 9, 5294–5310. [Google Scholar] [CrossRef]
- Liu, S.; Hu, Z.; Wang, X.; Wu, L. Stochastic stability analysis and control of secondary frequency regulation for islanded microgrids under random denial of service attacks. IEEE Trans. Ind. Inform. 2019, 15, 4066–4075. [Google Scholar] [CrossRef]
- Aysheh, N.G.A.; Khattab, T.; Massoud, A. Cyber-attacks against voltage profile in smart distribution grids with highly-dispersed PV generators: Detection and protection. In Proceedings of the IEEE Electric Power and Energy Conference (EPEC), Edmonton, AB, Canada, 9–10 November 2020; pp. 1–6. [Google Scholar]
- Xu, Y. A Review of Cyber Security Risks of Power Systems: From Static to Dynamic False Data Attacks. Prot. Control Mod. Power Syst. 2020, 5, 1–12. [Google Scholar] [CrossRef]
- Zhuang, P.; Deng, R.; Liang, H. False Data Injection Attacks Against State Estimation in Multiphase and Unbalanced Smart Distribution Systems. IEEE Trans. Smart Grid 2019, 10, 6000–6013. [Google Scholar] [CrossRef]
- Abhinav, S.; Modares, H.; Lewis, F.L.; Ferrese, F.; Davoudi, A. Synchrony in networked microgrids under attacks. IEEE Trans. Smart Grid 2018, 9, 6731–6741. [Google Scholar] [CrossRef]
- Liang, G.; Zhao, J.; Luo, F.; Weller, S.R.; Dong, Z.Y. A Review of False Data Injection Attacks Against Modern Power Systems. IEEE Trans. Smart Grid 2017, 8, 1630–1638. [Google Scholar] [CrossRef]
- Analysis of the Cyber Attack on the Ukrainian Power Grid. 2016. Available online: https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2016/05/20081514/E-ISAC_SANS_Ukraine_DUC_5.pdf (accessed on 1 October 2024).
- Vox Website. 2021. Available online: https://www.vox.com/world/ (accessed on 1 October 2024).
- Purlu, M.; Turkay, B.E. Optimal allocation of renewable distributed generations using heuristic methods to minimize annual energy losses and voltage deviation index. IEEE Access 2022, 10, 21455–21474. [Google Scholar]
- Balamourougan, V.; Sidhu, T.S.; Sachdev, M.S. Technique for online prediction of voltage collapse. IEE Proc. Gener. Transm. Distrib. 2004, 151, 453–460. [Google Scholar] [CrossRef]
- Micky, R.R.; Lakshmi, R.; Sunitha, R.; Ashok, S. Assessment of voltage stability in microgrid. In Proceedings of the International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India, 3–5 March 2016; pp. 1268–1273. [Google Scholar]
- Chang, C.-T.; Wu, W.-J.; Lin, S.-W. Fuzzy multi-choice goal programming and artificial bee colony algorithm for triangular and trapezoidal membership functions. IEEE Access 2021, 9, 95267–95281. [Google Scholar] [CrossRef]
- Mukherjee, V.; Mukherjee, A.; Prasad, D. Whale Optimization Algorithm With Wavelet Mutation for the Solution of Optimal Power Flow Problem. In Handbook of Research on Predictive Modeling and Optimization Methods in Science and Engineering; Kim, D., Roy, S.S., Länsivaara, T., Deo, R., Samui, P., Eds.; IGI Global Scientific Publishing: Hershey, PA, USA, 2018; pp. 500–553. [Google Scholar]
- Niknam, T.; Narimani, M.R.; Jabbari, M.; Malekpour, A.R. A modified shuffle frog leaping algorithm for multi-objective optimal power flow. Energy 2011, 36, 6420–6432. [Google Scholar] [CrossRef]
- Wind-Turbine-Models Website. Available online: https://en.wind-turbine-models.com/ (accessed on 10 June 2022).
- Commercial and Residential Hourly Load Profile. Available online: https://openei.org/doe-opendata/dataset/commercial-and-residential-hourly-load-profiles-for-all-tmy3-locations-in-the-united-states (accessed on 1 October 2024).
- Kumar, B.; Bihari, A.; Khan, S. Analysis of 13 Nodes Test Feeder Integrated With Renewable Energy Sources and Electrical Vehicle. In Proceedings of the 2021 IEEE 4th International Conference on Computing, Power and Communication Technologies (GUCON), Kuala Lumpur, Malaysia, 24–26 September 2021; pp. 1–5. [Google Scholar]
- Kersting, W.H. Radial distribution test feeders. In Proceedings of the IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.01CH37194), Columbus, OH, USA, 28 January–1 February 2001; pp. 908–912. [Google Scholar]
- Yousaf, M.; Muttaqi, K.M.; Sutanto, D. Overcurrent Protection Scheme for the IEEE 13-Node Benchmark Test Feeder with Improved Selectivity. In Proceedings of the 2020 IEEE Power & Energy Society General Meeting (PESGM), Montreal, QC, Canada, 2–6 August 2020; pp. 1–5.3. [Google Scholar]
- Naderi, E.; Bibek, K.C.; Ansari, M.; Asrari, A. Experimental validation of a hybrid storage framework to cope with fluctuating power of hybrid renewable energy-based systems. IEEE Trans. Energy Convers. 2021, 36, 1991–2001. [Google Scholar] [CrossRef]
- Naderi, E.; Asrari, A. Hardware-in-the-loop experimental validation for a lab-scale microgrid targeted by cyberattacks. In Proceedings of the 9th International Conference on Smart Grid (icSmartGrid), Setubal, Portugal, 29 June–1 July 2021; pp. 57–62. [Google Scholar]
- OP4510. System Descriptions. Available online: https://blob.opal-rt.com/medias/L00161_0124.pdf (accessed on 1 October 2024).
- Imperix Power Electronics. 800 V Voltage Sensor Descriptions. Available online: https://blob.opal-rt.com/medias/L00161_0549.pdf (accessed on 1 October 2024).
- Imperix Power Electronics. 50 A Current Sensor Descriptions. Available online: https://imperix.com/wp-content/uploads/document/DIN-50A.pdf (accessed on 1 October 2024).
- Imperix Power Electronics. Power Interface for OPAL-RT Hardware. Available online: https://imperix.com/wp-content/uploads/document/Power-Interface_OPAL-RT.pdf (accessed on 1 October 2024).
- Naderi, E.; Asrari, A.; Ramos, B. Moving Target Defense Strategy to Protect a PV/Wind Lab-Scale Microgrid Against False Data Injection Cyberattacks: Experimental Validation. In Proceedings of the IEEE Power & Energy Society General Meeting (PESGM), Orlando, FL, USA, 16–20 July 2023; pp. 1–5. [Google Scholar]
- Naderi, E.; Asrari, A. Toward Detecting Cyberattacks Targeting Modern Power Grids: A Deep Learning Framework. In Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 6–9 June 2022; pp. 357–363. [Google Scholar]
- Mantovani, J.R.S.; Casari, F.; Romero, R.A. Reconfiguração de sistemas de distribuição radiais utilizando o critério de queda de tensão. SBA Controle Automação 2000, 11, 150–159. [Google Scholar]
- Nirbhavane, P.S.; Corson, L.; Rizvi, S.M.H.; Srivastava, A.K. TPCPF: Three-Phase Continuation Power Flow Tool for Voltage Stability Assessment of Distribution Networks With Distributed Energy Resources. IEEE Trans. Ind. 2021, 57, 5425–5436. [Google Scholar] [CrossRef]
Attack Phase | Defense Phase | ||
---|---|---|---|
Developed FDIA Targeting Node #11 (i.e., The Most Vulnerable Node to Voltage Deviation) | Moving Target [38] | Deep Learning [39] | |
Overvoltage Based on (15) | 27.6% | 16.6% | 27.6% |
Undervoltage Based on (16) | 39.1% | 21.4% | 39.1% |
Optimal Result | Execution Time (s) to Obtain the Result from the Attackers’ Perspective | ||
---|---|---|---|
Buses Susceptible to Voltage Violation | #21, #30, #36, #78, #91, #115 | 17.22 | |
The Most Vulnerable Bus | #91 | 2.6 | |
Overvoltage (OV) | False Load Data Injected into Smart Meters (kW) | 23.91 | 34.1 |
% of OV | 21.35 | ||
Undervoltage (UV) | False Load Data Injected into Smart Meters (kW) | 21.01 | 33.3 |
% of UV | 21.84 |
Undervoltage (%) | Execution Time (s) | |
---|---|---|
Original Attack Scenario | 21.84 | 33.32 |
Targeting a Random Bus within a Set of 10 buses | 18.08 | 35.76 |
Targeting a Random Bus within a Set of 50 buses | 18.21 | 36.11 |
Targeting a Random Bus within a Set of 100 buses | 19.63 | 36.20 |
Targeting a Random Bus within a Set of 136 buses | 19.17 | 36.04 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Naderi, E.; Asrari, A. Mitigating Voltage Violations in Smart City Microgrids Under Coordinated False Data Injection Cyberattacks: Simulation and Experimental Insights. Smart Cities 2025, 8, 20. https://doi.org/10.3390/smartcities8010020
Naderi E, Asrari A. Mitigating Voltage Violations in Smart City Microgrids Under Coordinated False Data Injection Cyberattacks: Simulation and Experimental Insights. Smart Cities. 2025; 8(1):20. https://doi.org/10.3390/smartcities8010020
Chicago/Turabian StyleNaderi, Ehsan, and Arash Asrari. 2025. "Mitigating Voltage Violations in Smart City Microgrids Under Coordinated False Data Injection Cyberattacks: Simulation and Experimental Insights" Smart Cities 8, no. 1: 20. https://doi.org/10.3390/smartcities8010020
APA StyleNaderi, E., & Asrari, A. (2025). Mitigating Voltage Violations in Smart City Microgrids Under Coordinated False Data Injection Cyberattacks: Simulation and Experimental Insights. Smart Cities, 8(1), 20. https://doi.org/10.3390/smartcities8010020