Impacts of Bad Data on the PMU based Line Outage Detection

Impacts of Bad Data on the PMU based Line Outage Detection

Power systems become more prone to cyber-attacks due to the high integration of information technologies. In this paper, we demonstrate that the outages of some lines can be masked by injecting false data into a set of measurements. The success of the topology attack can be guaranteed by making that: 1)the injected false data obeys KCL and KVL to avoid being detected by the bad data detection program in the state estimation; 2)the residual is increased such that the line outage cannot be detected by PMU data. A quadratic programming problem is set up to determine the optimal attack vector that can maximize the residual of the outaged line. The IEEE 39-bus system is used to demonstrate the masking scheme.


💡 Research Summary

The paper investigates a novel class of cyber‑physical attacks that can hide the occurrence of a transmission‑line outage from Phasor Measurement Unit (PMU)‑based monitoring systems. As modern power grids become increasingly dependent on information and communication technologies, the traditional state‑estimation and bad‑data detection (BDD) mechanisms are no longer sufficient to guarantee situational awareness when an adversary deliberately corrupts measurement data.

The authors first describe the threat model. An attacker who has the capability to inject false measurements into a subset of the system’s sensors aims to achieve two simultaneous objectives: (1) the injected data must satisfy Kirchhoff’s Current Law (KCL) and Kirchhoff’s Voltage Law (KVL) so that the residual‑based BDD routine does not flag the data as erroneous; (2) the same data must increase the residual associated with the outaged line in the PMU‑based line‑outage detection algorithm, thereby preventing the algorithm from recognizing the outage. In other words, the attacker wants the state estimator to produce a “clean” solution while the outage‑specific residual remains below the detection threshold.

To formalize this, the paper defines the original measurement vector (z) and the compromised vector (z’ = z + a), where (a) is the attack vector. The physical consistency constraints are expressed as a linear equation (H a = 0), where (H) is the Jacobian (or sensitivity) matrix that captures the relationship between state variables and measurements. The residual for a particular line (l) after state estimation is given by (r_l = |W^{1/2}(z’ - H\hat{x})|), with (W) being the weighting matrix and (\hat{x}) the estimated state that incorporates the false data.

The attacker’s problem is then cast as a quadratic programming (QP) optimization:

\