Professional Documents
Culture Documents
T
]
T
R
2n+m
consists of the
generator rotor angles R
n
, the frequencies R
n
,
and the bus voltage angles R
m
. The input term P(t)
is due to known changes in mechanical input power to the
generators or real power demand at the loads. Furthermore,
the descriptor system matrices are
E =
_
_
I 0 0
0 M 0
0 0 0
_
_
, A =
_
_
0 I 0
L
gg
D
g
L
gl
L
lg
0 L
ll
_
_
, (2)
where M (resp. D
g
) is the diagonal matrix of the gener-
ators inertias (resp. damping constants). The dynamic and
algebraic equations of the linear descriptor system (1) are
classically referred to as the linearized swing equation and
the DC power ow equation, respectively. Notice that the
initial condition of system (1) needs to obey the algebraic
constraint L
lg
(0) + L
ll
(0) = P
(0), where P
(0) is the
vector containing the entries {2n+1, . . . , 2n+m} of P(0).
Finally, we assume the parameters of the power network
descriptor model (1) to be known, and we remark that
they can be either directly measured, or estimated through
dynamic identication techniques, e.g., see [11].
Throughout the paper, the assumption is made that a
combination of the state variables of the descriptor system
(1) is being continuously measured over time. Let C R
pn
be the output matrix and let y(t) = Cx(t) denote the p-
dimensional measurements vector. Moreover, we allow for
the presence of unknown disturbances affecting the behavior
of the plant (1), which, besides reecting the genuine failure
of network components, can be the effect of a cyber-physical
attack against the network. We classify these disturbances
into state attacks, if they show up in the measurements
vector after being integrated through the network dynamics,
and output attacks, if they corrupt directly the measurements
vector.
1
The network dynamics in the presence of a cyber-
physical attack can be written as
E x(t) = Ax(t) +
_
F 0
. .
B
_
f(t)
(t)
_
. .
u(t)
,
y(t) = Cx(t) +
_
0 L
. .
D
_
f(t)
(t)
_
. .
u(t)
.
(3)
The input signals f(t) and (t) are referred to as state
and output attack modes, respectively. The attack modes are
assumed to be unknown and piece-wise continuous functions
of time of dimension 2n + m and p, respectively, and they
act through the full rank matrices F R
(2n+m)(2n+m)
and L R
pp
. For notational convenience, and without
affecting generality, we assume that each state and output
variable can be independently compromised by an attacker.
Therefore, we let F and L be the identity matrices of
dimensions 2n + m and p. The attack mode u(t) depends
upon the specic attack prole. In the presence of k N
0
,
k 2n + m + p, attackers indexed by the attack set
K {1, . . . , 2n+m+p}, the corresponding (vector) attack
mode t u
K
(t) R
2n+m+p
has exactly k nonzero entries
1
Because of the linearity of (1), the known input P(t) can be neglected,
since it does not affect the detectability of unknown input attacks.
u
K,i
(t) for i K. Accordingly, the pair (B
K
, D
K
) is called
attack signature, where B
K
and D
K
are the submatrices of
B and D with columns indexed by K.
The model (3) is very general, and it can capture the
occurrence of several concurrent contingencies in the power
network, which are caused either by components failure or
external attacks.
2
For instance,
(i) a change in the mechanical power input to generator i
(resp. in the real power demand of load j) is described
by the attack signature (B
i
, 0) (resp. (B
2n+j
, 0)), and
a non-zero attack mode u
n+i
(t) (resp. u
2n+j
(t));
(ii) a line outage occurring on the line {r, s} is modeled
by the signature ([B
r
B
s
], [0 0]) and a non-zero mode
[u
r
(t) u
s
(t)]
T
[4]; and
(iii) the failure of sensor i, or the corruption of the i-th
measurement by an attacker is captured by the signa-
ture (0, D
2n+m+i
) and a non-zero mode u
2n+m+i
(t).
B. Notions of detectability and identiability for attack sets
In this section we present the problem under investigation
and we recall some denitions. Observe that a cyber-physical
attack may remain undetected from the measurements if there
exists a normal operating condition of the network under
which the output would be the same as under the perturbation
due to the attacker. Let x(x
0
, u, t) denote the network state
trajectory generated from the initial state x
0
under the attack
signal u(t), and let y(x
0
, u, t) be the output sequence for
the same initial condition and input. Throughout the paper,
let T R
0
denote the set of time instants at which the
presence of attacks against the network is checked.
Denition 1 (Undetectable attack set): For the linear
descriptor system (3), the attack set K is undetectable if there
exist initial conditions x
1
, x
2
R
2n+m
, and an attack mode
u
K
(t) such that, for all t T, y(x
1
, u
K
, t) = y(x
2
, 0, t).
A more general concern than detection is identiability of
attackers, i.e., the possibility to distinguish from measure-
ments between the action of two distinct attacks.
Denition 2 (Unidentiable attack set): For the linear
descriptor system (3), the attack set K is unidentiable if
there exists an attack set R, with |R| |K| and R = K,
initial conditions x
K
, x
R
R
2n+m
, and attack modes u
K
(t),
u
R
(t) such that, for all t T, y(x
K
, u
K
, t) = y(x
R
, u
R
, t).
Of course, an undetectable attack is also unidentiable,
since it cannot be distinguished from the zero input. The
converse does not hold. The security problem we consider
in this paper is as follows.
Problem: (Attack detection and identication) For the
linear descriptor system (3), design an attack detection and
identication procedure.
Denitions 1 and 2 are immediately applicable to arbi-
trary constrol systems subjects to external attacks. Before
proposing a solution to the Attack detection and identication
Problem, we motivate the use of a dynamic detection and
identication algorithm by characterizing the fundamental
limitations of static and dynamic procedures.
2
Genuine failures are a subcase of intentional cyber-physical attacks.
III. LIMITATIONS OF STATIC AND DYNAMIC PROCEDURES
FOR DETECTION AND IDENTIFICATION
The objective of this section is to show that some fun-
damental limitations of a static detection procedure can be
overcome by exploiting the network dynamics. We start by
deriving a reduced state space model for a power network,
which is convenient for illustration and analysis purposes.
A. Kron-reduced representation of a power network
For the system (3), let F = [ F
T
F
T
F
T
]
T
, L =
[ L
T
L
T
L
T
]
T
, and C = [ C
C C
], where the partitioning
reects the state x = [
T
T
]
T
. Since the network
Laplacian matrix is irreducible (due to connectivity), the
submatrix L
ll
in (2) is invertible and the bus voltage angles
(t) can be expressed via the generator rotor angles (t) and
the state attack mode f(t) as
(t) = L
1
ll
L
lg
(t) L
1
ll
F
f(t). (4)
Hence, the descriptor system (3) is of index one [4]. The
elimination of the algebraic variables (t) in the descriptor
system (3) leads to the state space system
_
_
=
_
0 I
M
1
_
L
gg
L
gl
L
1
ll
L
lg
_
M
1
D
g
_
. .
A
_
_
+
_
F
0
M
1
F
M
1
L
gl
L
1
ll
F
0
_
. .
B
u, (5)
y(t) =
_
C
L
1
ll
L
lg
C
. .
C
_
_
+
_
C
L
1
ll
F
. .
D
u.
This reduction of the passive bus nodes is known as Kron
reduction in the literature on power networks and circuit
theory [26]. In what follows, we refer to (5) as the Kron-
reduced system. Accordingly, for each attack set K, the
attack signature (B
K
, D
K
) is mapped to the corresponding
signature (
B
K
,
D
K
) in the Kron-reduced system through the
transformation for the matrices B and D described in (5).
Clearly, for any state trajectory of the Kron-reduced (5), the
corresponding state trajectory of the (non-reduced) descriptor
power network model (3) can recovered by identity (4).
We point out the following subtle but important facts,
which are easily visible in the Kron-reduced system (4). First,
a state attack F
(t)
T
(t)
T
]
T
is nonzero for some
t N, where [
(t)
T
(t)
T
]
T
=
C
C
_
(t)
(t)
_
+
Du
K
(t) = 0 , (6)
where
C and
D are as in (5).
Moreover, there exists an attack set K undetectable by a
Static Detector if and only if there exist x R
2n
and g
R
|K|
such that
Cx +
D
K
g = 0.
Before presenting a proof of the above theorem, we
highlight that a necessary and sufcient condition for the
equation (6) to be satised is that L(t) Im(C) at all times
t N, where (t) is the output attack mode, i.e., the vector
of the last p components of u
K
(t). Hence, statement (ii) in
Theorem 3.2 implies that no state attack can be detected by
a static detection procedure, and that an undetectable output
attack exists if and only if Im(D
K
) Im(C) = {0}.
Proof of Theorem 3.2: As previously discussed, the attack
K is undetectable by a Static Detector if and only if for each
t N there exists (t), (t), and u
K
(t) such that
r(t) = y(t)
C
C
y(t) = (I
C
C
)
_
C
_
(t)
(t)
_
+
Du
K
(t)
_
3
Similar conclusion can be drawn for the case of noisy measurements.
vanishes. Consequently, r(t) = (I
C
C
)
Du
K
(t), and the
attack set K is undetectable if and only if
Du
K
(t) Im(
C),
which is equivalent to statement (ii). The last necessary and
sufcient condition in the theorem follows from (ii).
We now focus on the static identication problem. Fol-
lowing Denition 2, the following result can be asserted.
Theorem 3.3: (Static identication of cyber-physical at-
tacks) For the power network descriptor system (3) and an
attack set K, the following two statements are equivalent:
(i) the attack set K is unidentiable by a Static Detector;
(ii) there exists an attack set R, with |R| |K| and R =
K, and attack modes u
K
(t), u
R
(t), such that, for some
(t) and (t), at every t N, it holds
C
_
(t)
(t)
_
+
D(u
K
(t) +u
R
(t)) = 0 ,
where
C and
D are as in (5).
Moreover, there exists an attack set K unidentiable by a
Static Detector if and only if there exists an attack set
K,
|
K| 2|K|, which is undetectable by a Static Detector.
Similar to the fundamental limitations of static detectabil-
ity in Theorem 3.2, Theorem 3.3 implies that, for instance,
state attacks cannot be identied and that an undetectable
output attack exists if and only if Im(D
K
) Im(C) = {0}.
Proof of Theorem 3.3: Because of the linearity of the
system (3), the unidentiability condition in Denition 2
is equivalent to y(x
K
x
R
, u
K
u
R
, t) = 0, for some
initial condition x
K
, x
R
, and attack mode u
K
(t), u
R
(t).
The equivalence between statements (i) and (ii) follow. The
last statement follows from Theorem 3.2.
C. Fundamental limitations of a Dynamic Detector
In the following we refer to a security system having
access to the continuous time measurements signal y(t),
t R
0
, as a Dynamic Detector. As opposed to a Static
Detector, a Dynamic Detector checks for the presence of
attacks at every instant of time t R
0
. By Denition 1,
an attack is undetectable by a Dynamic Detector if and only
if there exists a network initial state (0) R
2n
such that
y(t) =
Ce
At
(0) for all time instances t R
0
. Intuitively, a
Dynamic Detector is harder to mislead than a Static Detector.
Theorem 3.4: (Dynamic detectability of cyber-physical
attacks) For the power network descriptor system (3) and an
attack set K, the following two statements are equivalent:
(i) the attack set K is undetectable by a Dynamic Detec-
tor;
(ii) there exists an attack mode u
K
(t) such that, for some
(0) and (0), at every t R
0
, it holds
Ce
At
_
(0)
(0)
_
+
C
_
t
0
e
A(t)
Bu
K
()d =
Du
K
(t),
where
A,
B,
C, and
D are as in (5).
Moreover, there exists an attack set K undetectable by a
Dynamic Detector if and only if there exist s C, g R
|K|
,
and x R
2n
, x = 0, such that (sI
A)x
B
K
g = 0 and
Cx +
D
K
g = 0.
Before proving Theorem 3.4, some comments are in order.
First, state attacks can be detected in the dynamic case. Sec-
ond, an attacker needs to inject a signal which is consistent
with the network dynamics at every instant of time to mislead
a Dynamic Detector. Hence, as opposed to the static case,
the condition L(t) Im(C) needs to be satised for every
t R
0
, and it is only necessary for the undetectability
of an output attack. Indeed, for instance, state attacks can be
detected even though they automatically satisfy the condition
0 = L(t) Im(C). Third and nally, according to the last
statement of Theorem 3.4, the existence of invariant zeros
for the Kron-reduced system (
A,
B
K
,
C,
D
K
) is equivalent
to the existence of an undetectable attack mode u
K
(t).
4
As a
consequence, for the absence of undetectable cyber-physical
attacks, a dynamic detector performs better that a static
detector, while requiring, possibly, fewer measurements. A
related example is in Section V.
Proof of Theorem 3.4: By Denition 1 and linearity of
the system (5), the attack mode u
K
(t) is undetectable by a
Dynamic Detector if and only if there exists [(0)
T
(0)
T
]
T
such that y([(0)
T
(0)
T
]
T
, u
K
, t) = 0 for all t R
0
.
Hence, statements (i) and (ii) are equivalent. Following
condition (ii) in Theorem 3.4, an attack u
K
(t) may remain
undetected to a Dynamic Detector if and only if u
K
(t) is an
input-zero for some initial condition.
We now focus on the identication problem.
Theorem 3.5: (Dynamic identiability of cyber-physical
attacks) For the power network descriptor system (3), the
following two statements are equivalent:
(i) the attack set K is unidentiable by a Dynamic De-
tector;
(ii) there exists an attack set R, with |R| |K| and R =
K if |R| = |K|, and attack modes u
K
(t), u
R
(t), such
that, for some (0) and (0), at every t R
0
, it
holds
Ce
At
_
(0)
(0)
_
+
C
_
t
0
e
A(t)
B(u
K
() +u
R
()) d
=
D(u
K
(t) +u
R
(t))
where
A,
B,
C, and
D are as in (5).
Moreover, there exists an attack set K unidentiable by a
Dynamic Detector if and only if there exists an attack set
K,
|
K| 2|K|, which is unidentiable by a Dynamic Detector.
Proof: Notice that, because of the linearity of the system
(3), the unidentiability condition in Denition 2 is equiva-
lent to the condition y(x
K
x
R
, u
K
u
R
, t) = 0, for some
initial condition x
K
, x
R
, and attack mode u
K
(t), u
R
. The
equivalence between statements (i) and (ii) follows.
4
For the system (
A,
B
K
,
C,
D
K
), the value s C is an invariant zero if
there exists x R
2n
, with x = 0, g R
|K|
, such that (sI
A)x
B
K
g =
0 and
Cx +
D
K
g = 0. For a linear dynamical system, the existence of
invariant zeros is equivalent to the existence of zero dynamics [20].
In other words, the existence of an unidentiable attack
set of cardinality k is equivalent to the existence of invariant
zeros for the system (
A,
B
K
,
C,
D
K
), for some attack set
K with |
K| 2k. A careful reader may notice that
condition (ii) in Theorem 3.4 is hard to verify because of its
combinatorial complexity: one needs to certify the absence
of invariant zeros for all possible distinct pairs of |K|-
dimensional attack sets. Then, a conservative verication of
condition (ii) requires
_
2n+m+p
2|K|
_
tests. In [6] we partially
address this complexity problem by presenting an intuitive
and easy to check graph-theoretic condition for a given
network topology and generic system parameters.
Remark 1: (Stealth, false-data injection, and replay
attacks) The following prototypical attacks can be modeled
and analyzed through our theoretical framework:
(i) stealth attacks, as dened in [21], correspond to output
attacks satisfying D
K
u
K
(t) Im(C);
(ii) (dynamic) false-data injection attacks, as dened in
[22], are output attacks rendering the unstable modes
(if any) of the system unobservable. These unobserv-
able modes are included in the invariant zeros set; and
(iii) replay attacks, as dened in [23], are state and output
attacks satisfying Im(C) Im(D
K
), B
K
= 0.
The resulting system may have an innite number of
invariant zeros: if the attacker knows the system model,
then it can cast very powerful undetectable attacks.
In [23], a monitoring signal (unknown to the attacker) is
injected into the system to detect replay attacks. It can be
shown that, if the attacker knows the system model, and if the
attack signal enters additively as in (3), then the attacker can
design undetectable attacks without knowing the monitoring
signal. Therefore, the fundamental limitations presented in
Section III are also valid for active detectors, which are
allowed to inject monitoring signals to reveal attacks.
IV. DESIGN OF DYNAMIC DETECTION AND
IDENTIFICATION PROCEDURES
A. Detection of attacks
We start by considering the attack detection problem,
whose solvability condition is in Theorem 3.4. We propose
the following residual lter to detect cyber-physical attacks.
Theorem 4.1 (Attack detection lter): Consider the
power network descriptor system (3) and the associated
Kron-reduced system (5). Assume that the attack set is
detectable and that the network initial state x(0) is known.
Consider the detection lter
w(t) = (
A+G
C)w(t) Gy(t),
r(t) =
Cw(t) y(t),
(7)
where w(0) = x(0), and G R
2np
is such that
A + G
C
is a Hurwitz matrix. Then r(t) = 0 at all times t R
0
if
and only if u(t) = 0 at all times t R
0
.
Proof: Consider the error e(t) = w(t) x(t) between the
states of the lter (7) and the Kron-reduced system (5). The
error dynamics with output r(t) are then
e(t) = (
A+G
C)e(t) (
B +G
D)u(t),
r(t) =
Ce(t)
Du(t),
(8)
where e(0) = 0. Clearly, if the error system (8) has no
invariant zeros, then r(t) = 0 for all t R
0
if and only if
u(t) = 0 for all t R
0
and the claimed statement is true.
The error system (8) has no invariant zeros if and only if
there exists no triple (s, w, g) C R
2n
R
p
satisfying
_
sI (
A+G
C)
B +G
D
D
_ _
w
g
_
=
_
0
0
_
. (9)
The second equation of (9) yields
Cx =
Dg. Thus, by
substituting
Cx by
Dg in the rst equation of (8), the set of
equations (9) can be equivalently written as
_
sI
A
B
D
_ _
w
g
_
=
_
0
0
_
.
Finally, note that the solution (s, w, g) to the above set
of equations yields an invariant zero, zero state, and zero
input for the Kron-reduced system (5). By the detectability
assumption, the Kron-reduced system (5) has no zero dy-
namics. We conclude that the error system (8) has no zero
dynamics, and the statement is true.
In summary, the implementation of the residual lter (7)
guarantees the detection of any detectable attack set.
B. Identication of attacks
We now focus on the attack identication problem, whose
solvability condition is in Theorem 3.5. Unlike the detection
case, the identication of the attack set K requires a combi-
natorial procedure, since, a priori, K is one of the
_
2n+m+p
|K|
_
possible attack sets. As key component of our identication
procedure, we propose a residual lter to determine whether
a predened set coincides with the attack set.
We next introduce in a coordinate-free geometric way the
key elements of this residual lter based on the notion of
condition-invariant subspaces [20]. Let K be a k-dimensional
attack set, and let
B
K
,
D
K
be as dened right after the
Kron reduced model (5). Let [V
T
K
Q
T
K
]
T
R
pp
be an
orthonormal matrix such that
V
K
= Basis(Im(
D
K
)), and Q
K
= Basis(Im(
D
K
)
),
and let
B
Z
=
B
K
(V
K
D
K
)
, and
B
K
=
B
K
(I D
K
D
K
). (10)
Dene the subspace S
R
2n
to be the smallest
_
A
B
K
(V
K
D
K
)
V
K
C , Ker(Q
K
C)
_
-conditioned invariant
subspace containing Im(
B
K
), and let J
K
be an output
injection matrix such that
(
A
B
K
(V
K
D
K
)
V
K
C +J
K
Q
K
C)S
. (11)
Let P
K
be an orthonormal projection matrix onto the quo-
tient space R
2n
\ S
, and let
A
K
= P
K
(
A
B
K
(V
K
D
K
)
V
K
C +J
K
Q
K
C)P
T
K
. (12)
Finally, let H
K
and the unique M
K
be such that
Ker(H
K
Q
C) = S
+ Ker(Q
C), and
H
K
Q
C = M
K
P
K
.
(13)
Theorem 4.2 (Attack identication lter): Consider the
power network descriptor system (3) and the associated
Kron-reduced system (5). Assume that the attack set K
is identiable and that the network initial state is known.
Consider the identication lter
w
K
(t) =(A
K
+G
K
M
K
)w
K
(t)
+
_
P
K
B
Z
V
K
(P
K
J
K
+G
K
H
K
)Q
_
y(t),
r
K
(t) =M
K
w
K
(t) H
K
Qy(t),
(14)
where w
K
(0) = P
K
x(0), and G
K
R
2np
is such that
A
K
+ G
K
M
K
is a Hurwitz matrix. Then r
K
(t) = 0 at all
times t R
0
if and only if K equals the attack set.
Note that the residual r
K
(t) is identically zero if the attack
set coincides with K, even if the attack input is nonzero.
Proof of Theorem 4.2: Let R be an attack set with |R|
|K| and R = K. With the output transformation [z
1
, z
2
] =
[V
K
y, Q
K
y], the Kron-reduced system (5) becomes
x(t) =
Ax(t) +
_
B
K
B
R
_
u
K
(t)
u
R
(t)
_
,
z
1
(t) = V
K
Cx(t) +V
K
D
K
u
K
(t) +V
K
D
R
u
R
(t),
z
2
(t) = Q
K
Cx(t) +Q
K
D
R
u
R
(t).
(15)
Note that the attack set K affects only the output z
1
(t). The
output equation for z
1
(t) can be solved for u
K
(t) as
u
K
(t) = (V
K
D
K
)
(z
1
(t) V
K
Cx(t))
(V
K
D
K
)
V
K
D
R
u
R
(t) +u
hom
(t) ,
where u
hom
(t) Ker(V
k
D
K
) = Ker(
D
K
) and u
R
(t) are
unknown signals, while z
1
(t) is known. The Kron-reduced
system (15) can equivalently be written with unknown inputs
u
K
(t) and u
R
(t), known input z
1
(t), and output z
2
(t) as
x(t) =(
A
B
K
(V
K
D
K
)
V
K
C)x(t)
+
_
B
Z
B
K
B
R
_
_
z
1
(t)
u
K
(t)
u
R
(t)
_
_
,
z
2
(t) =Q
K
Cx(t) +Q
K
D
R
u
R
(t),
(16)
where B
Z
and
B
K
are as in (10), and
B
R
=
B
R
B
K
(V
K
D
K
)
V
K
D
R
.
Let S
and J
K
be as in (11), and consider the orthonormal
change of coordinates given by T
K
= [W
T
K
P
T
K
] R
2n2n
,
where W
T
K
is a basis of S
, P
K
is a projection matrix onto
the quotient space R
2n
\ S
, and T
1
K
= T
T
K
. In the new
coordinates [
1
,
2
] = [W
K
x, P
K
x], system (16) reads as
_
2
_
=
_
A
11
A
12
0
A
22
__
2
_
+
_
B
11
B
12
B
13
B
21
0
B
23
_
_
_
z
1
u
K
u
R
_
_
,
z
2
(t)=
_
C
1
C
2
2
_
+
Du
R
(t).
(17)
The zero pattern in the system and input matrix of (17)
arises due to the invariance properties of S
, which contains
Im(
B
K
). For the system (17) we propose the lter
w
K
(t)=(
A
22
+G
K
M
K
)w
K
(t) +
B
21
z
1
(t) G
K
H
K
z
2
(t),
r
K
(t)=M
K
w
K
(t) H
K
z
2
(t), (18)
where G
K
is chosen such that
A
22
+ G
K
M
K
is a Hurwitz
matrix. Let H
K
and M
K
be as in (13), which, in these
coordinates, coincides with H
K
C
1
= 0 and H
K
C
2
= M
K
.
Dene the lter error e(t) = w
K
(t)
2
(t), then the residual
lter (18) written in error coordinates is
e(t) =(
A
22
+G
K
M
K
)w
K
(t)
A
22
2
(t)
B
23
u
R
(t)
G
K
H
K
_
[
C
1
C
2
](t) +
Du
R
(t)
_
=(
A
22
+G
K
M
K
)e(t) (
B
23
+G
K
H
K
D)u
R
(t)
r
K
(t) =M
K
e(t) H
K
Du
R
(t).
It can be shown that (
A
22
+ G
K
M
K
, (
B
23
+
G
K
H
K
D), M
K
, H
K
D) has no zero dynamics, so that
the residual r
K
(t) is not affected by K, and every nonzero
signal u
R
(t) is detectable from r
K
(t). Consequently, r
K
(t)
is identically zero if and only if K is the attack set. Finally,
in original coordinates, the lter (18) takes the form (14).
For an attack set K, we refer to the signal r
K
(t) in the
lter (14) as the residual associated with K. A corollary
result of Theorem 4.2 is that, if only an upper bound on
the cardinality of the attack set is known, then the residual
r
K
(t) is nonzero if and only if the attack set is contained in
K. We now summarize our identication procedure, which
assumes the knowledge of the network initial condition and
of an upper bound k on the cardinality of the attack set K:
(i) design an identication lter for each possible subset
of {1, . . . , 2n +m+p} of cardinality k;
(ii) monitor the power network by running each identi-
cation lter;
(iii) the attack set K coincides with the intersection of the
attack sets Z whose residual r
Z
(t) is identically zero.
Remark 2: (Detection and identication lters for un-
known initial condition) If the network initial state is not
available, then an arbitrary initial state w(0) R
2n
can
be chosen. Consequently, the lters performance becomes
asymptotic, and some attacks may remain undetected or
unidentied. For instance, if the eigenvalues of the detection
lter matrix have been assigned to have real part smaller
than c < 0, with c R, then, in the absence of attacks,
the residual r(t) exponentially converges to zero with rate
less than c. Hence, only inputs u(t) that vanish faster or
equal than e
ct
can remain undetected by the lter (7).
Alternatively, the detection lter can be modied so as to
converge in a predened nite time [27]. In this case, every
attack signal is detectable after a nite transient.
Remark 3: (Detection and identication in the presence
of process and measurement noise) The detection and
identication lters here presented are a generalization to
dynamical systems with direct input to output feedthrough
of the devices presented in [24]. Additionally, our design
guarantees the absence of invariant zeros in the residual
system, so that every attack signal affect the corresponding
residual. Finally, if the network dynamics are affected by
noise, then an optimal noise rejection in the residual system
can be obtained by choosing the matrix G in (7) and G
K
in
(14) as the Kalman gain according to the noise statistics.
V. A NUMERICAL STUDY
The effectiveness of our theoretic developments is here
demonstrated for the IEEE 14 bus system reported in Fig.
1. Let the IEEE 14 bus power network be modeled as a
descriptor model of the form (3), where the network matrix
A is as in [28]. Following [7], the measurement matrix C
consists of the real power injections at all buses, of the real
power ows of all branches, and of one rotor angle (or one
bus angle). We assume that an attacker can independently
compromise every measurement, except for the one referring
to the rotor angle, and that it does not inject state attacks.
Let k N be the cardinality of the attack set. From [7] it
is known that, for a Static Detector, an undetectable attack
exists if k 4. In other words, due to the sparsity pattern of
C, there exists a signal u
K
(t), with (the same) four nonzero
entries at all times, such that Du
K
(t) Im(C) at all times.
By Theorem 3.2 the attack set K remains undetected by a
Static Detector through the attack mode u
K
(t). On the other
hand, following Theorem 3.4, it can be veried that, for the
same output matrix C, and independent of the value of k,
there exists no undetectable (output) attack set.
VI. CONCLUSION
For a power network modeled via a linear time-invariant
descriptor system, we have analyzed the fundamental limita-
tions of static and dynamic attack detection and identication
procedures. We have rigorously shown that a dynamic detec-
tion and identication method exploits the network dynamics
and outperforms the static counterpart, while requiring, pos-
sibly, fewer measurements. Additionally, we have described a
provably correct attack detection and identication procedure
based on dynamic residuals lters, and we have illustrated its
effectiveness through an example of cyber-physical attacks
against the IEEE 14 bus system.
REFERENCES
[1] A. R. Metke and R. L. Ekl, Security technology for smart grid
networks, IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 99
107, 2010.
[2] M. Amin, Guaranteeing the security of an increasingly stressed grid,
IEEE Smart Grid Newsletter, Feb. 2011.
[3] P. W. Sauer and M. A. Pai, Power System Dynamics and Stability.
Prentice Hall, 1998.
[4] E. Scholtz, Observer-based monitors and distributed wave controllers
for electromechanical disturbances in power systems, Ph.D. disserta-
tion, Massachusetts Institute of Technology, 2004.
[5] A. Domnguez-Garca and S. Trenn, Detection of impulsive effects
in switched DAEs with applications to power electronics reliability
analysis, in IEEE Conf. on Decision and Control, Atlanta, GA, USA,
Dec. 2010, pp. 56625667.
[6] F. Pasqualetti, A. Bicchi, and F. Bullo, A graph-theoretical char-
acterization of power network vulnerabilities, in American Control
Conference, San Francisco, CA, Jun. 2011, to appear.
[7] Y. Liu, M. K. Reiter, and P. Ning, False data injection attacks
against state estimation in electric power grids, in ACM Conference
on Computer and Communications Security, Chicago, IL, USA, Nov.
2009, pp. 2132.
[8] A. Abur and A. G. Exposito, Power System State Estimation: Theory
and Implementation. CRC Press, 2004.
[9] A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, and S. Sastry,
Cyber security analysis of state estimators in electric power systems,
in IEEE Conf. on Decision and Control, Atlanta, GA, USA, Dec. 2010,
pp. 59915998.
[10] N. Balu, T. Bertram, A. Bose, V. Brandwajn, G. Cauley, D. Curtice,
A. Fouad, L. Fink, M. G. Lauby, B. F. Wollenberg, and J. N. Wrubel,
On-line power system security analysis, Proceedings of the IEEE,
vol. 80, no. 2, pp. 262282, 1992.
[11] A. Chakrabortty, J. H. Chow, and A. Salazar, A measurement-based
framework for dynamic equivalencing of large power systems using
wide-area phasor measurements, IEEE Transactions on Smart Grid,
vol. 2, no. 1, pp. 56 69, 2011.
[12] F. Pasqualetti, A. Bicchi, and F. Bullo, Consensus computation in
unreliable networks: A system theoretic approach, IEEE Transactions
on Automatic Control, Feb. 2010, to appear.
[13] S. Sundaram and C. Hadjicostis, Distributed function calculation via
linear iterative strategies in the presence of malicious agents, IEEE
Transactions on Automatic Control, 2011, to appear.
[14] K. Y. Lee and M. A. El-Sharkawi, Eds., Modern Heuristic Optimiza-
tion Techniques: Theory and Applications to Power Systems. Wiley-
IEEE press, 2008.
[15] A. de Souza, J. de Souza, and A. da Silva, On-line voltage stability
monitoring, IEEE Transactions on Power Systems, vol. 15, no. 4, pp.
13001305, 2002.
[16] U. Khan, M. Ilic, and J. Moura, Cooperation for aggregating complex
electric power networks to ensure system observability, in Int. Conf.
on Infrastructure Systems and Services, Rotterdam, Netherlands, 2008,
pp. 16.
[17] D. Kundur, X. Feng, S. Liu, T. Zourntos, and K. L. Butler-Purry,
Towards a framework for cyber attack impact analysis of the electric
smart grid, in IEEE Int. Conf. on Smart Grid Communications,
Gaithersburg, MD, USA, Oct. 2010, pp. 244249.
[18] A. Teixeira, H. Sandberg, and K. H. Johansson, Networked control
systems under cyber attacks with applications to power networks, in
American Control Conference, Baltimore, MD, Jun. 2010, pp. 3690
3696.
[19] W. M. Wonham, Linear Multivariable Control: A Geometric Ap-
proach, 3rd ed. Springer, 1985.
[20] H. L. Trentelman, A. Stoorvogel, and M. Hautus, Control Theory for
Linear Systems. Springer, 2001.
[21] G. Dan and H. Sandberg, Stealth attacks and protection schemes for
state estimators in power systems, in IEEE Int. Conf. on Smart Grid
Communications, Gaithersburg, MD, USA, Oct. 2010, pp. 214219.
[22] Y. Mo and B. Sinopoli, False data injection attacks in control
systems, in First Workshop on Secure Control Systems, Stockholm,
Sweden, Apr. 2010.
[23] , Secure control against replay attacks, in Allerton Conf. on
Communications, Control and Computing, Monticello, IL, Sep. 2010,
pp. 911918.
[24] M.-A. Massoumnia, G. C. Verghese, and A. S. Willsky, Failure
detection and identication, IEEE Transactions on Automatic Control,
vol. 34, no. 3, pp. 316321, 1989.
[25] M. Basseville and I. V. Nikiforov, Detection of Abrupt Changes:
Theory and Application. Prentice Hall, 1993.
[26] F. D orer and F. Bullo, Kron reduction of graphs with applications
to electrical networks, SIAM Review, Feb. 2011, submitted.
[27] A. V. Medvedev and H. T. Toivonen, Feedforward time-delay struc-
tures in state estimation-nite memory smoothing and continuous
deadbeat observers, IEE Proceedings. Control Theory & Applications,
vol. 141, no. 2, pp. 121129, 1994.
[28] R. D. Zimmerman, C. E. Murillo-S anchez, and D. Gan, MAT-
POWER: Steady-state operations, planning, and analysis tools for
power systems research and education, IEEE Transactions on Power
Systems, vol. 26, no. 1, pp. 1219, 2011.