1 s2.0 S0005109821006208 Main
1 s2.0 S0005109821006208 Main
Automatica
journal homepage: www.elsevier.com/locate/automatica
Brief paper
article info a b s t r a c t
Article history: This article investigates the distributed state estimation problem for large-scale power systems, where
Received 19 June 2020 both false data injection (FDI) and denial-of-service (DoS) attacks are considered. The DoS attacks
Received in revised form 28 August 2021 are compensated by using measurement predictor, while the FDI attacks are treated as uncertainties
Accepted 1 November 2021
in measurements. Through neighborhood coordination, a posterior residual chi-square test method is
Available online 18 December 2021
applied in each subsystem to detect the FDI attacks in local measurement and edge measurement
Keywords: separately. Finally, by introducing two adaptive factors, an adaptive distributed state estimator (ADSE)
Adaptive state estimation is proposed, which can evaluate the credibility of the tampered measurements and mitigate the impact
Distributed state estimation of FDI attacks. Simulation tests conducted on the IEEE 118-bus system verify the effectiveness of the
Attack detection attack detector and the ADSE in power system state estimation.
Large-scale power system
© 2021 Elsevier Ltd. All rights reserved.
https://doi.org/10.1016/j.automatica.2021.110091
0005-1098/© 2021 Elsevier Ltd. All rights reserved.
J. Yang, W.-A. Zhang and F. Guo Automatica 137 (2022) 110091
as, transforming the FDI attack detection problem into matrix 2. Preliminaries and problem formulation
separation problem (Li et al., 2019; Liang et al., 2017; Liu et al.,
2014), utilizing the unknown input observer (UIO) to observe In practice, a power system is commonly monitored by various
the unknown input and then justify whether there is FDI at- kinds of sensors (e.g., SCADA and PMU). These sensors collect
tack (Kazemi et al., 2020; Wang et al., 2020), perturbing branch measurements and send them to a control center. The control
susceptance to minimize the stealth attack space and making the center uses the system model and sensor measurements to es-
attack detection more effective (Li et al., 2020; Liu & Wu, 2020; timate the system state. Without loss of generality, the power
Zhang et al., 2020), etc. The above attack defense methods are system measurement model is denoted by z(k) = f (x(k)) + v (k),
feasible and effective under certain conditions. However, they where x(k) is the system state, z(k) is the measurement, f (·) is the
are either centralized detection and estimation methods or can nonlinear measurement function, v (k) is the measurement error
only be implemented independently in each subsystem. Since the and is assumed to follow zero mean Gaussian distribution with
power system is practically interconnected, sophisticated with
covariance S(k). By using linearization method, z(k) is linearized
large-scale, it is desirable to design a distributed state estimator
as
which can obtain accurate state estimation against cyber attacks
with less computational cost. z(k) = H(k)x(k) + v (k), (1)
Motivated by the above analysis, a distributed cyber attack
detection method and an adaptive distributed state estimator where H(k) is the Jacobian matrix. Similarly, the dynamic model
(ADSE) are designed in this article to defend against the cyber is also given in a linear form
attacks in large-scale power systems. Firstly, such a large-scale
x(k + 1) = F (k)x(k) + d(k) + w (k), (2)
power system is decomposed into several interconnected, non-
overlapping and topologically observable subsystems. The attacks where F (k) is the state dynamic matrix and d(k) is the trend be-
in local measurement and edge measurement are both detected havior of state which can be obtained online by Holt’s
by using the chi-square detection method. However, it is noted 2-parameter linear exponential smoothing method (Li & Li, 2009;
that an edge measurement is a function of states of the subsystem Nishiya, Takagi, Hasegawa, et al., 1976), w (k) is a zero mean
itself and a neighbor of it. Therefore, to detect the attacks in edge Gaussian noise with covariance R(k). For convenience, the time
measurement at each subsystem locally, the edge measurement is index k is omitted, the maximum a posteriori estimation problem
preprocessed by using the information received from its immedi- is equivalent to find x̂ to minimize the objective function J(x) =
ate neighbors. Then, an adaptive factor in matrix form (AFM) and (z −Hx)T S −1 (z −Hx)+(x−x̄)T P̄ −1 (x−x̄) (Barhumi & Moonen, 2009),
an adaptive factor in scalar form (AFS) are introduced to evaluate where x̄ = F x̂(k − 1) + d(k − 1) and P̄ = FP(k − 1)F T + R(k − 1)
the credibility of the manipulated measurements and further are the predicted state and the corresponding error covariance,
alleviating the impact of the attacks. Finally, an ADSE algorithm respectively. Then, the state estimate x̂ is derived to be x̂ =
is presented by introducing both types of adaptive factors into a
P(P̄ −1 x̄ + H T S −1 z), with covariance P ≜ (P̄ −1 + H T S −1 H)−1 .
distributed iterative Kalman-like estimator. In all, contributions
The architecture of a risky power system is shown in Fig. 1.
of this article are summarized as follows.
Under FDI attack, the attacker injects a designed attack signal a(k)
1. Through neighborhood coordination, a distributed attack
into the sensor measurement, and the manipulated measurement
detection method is designed which can detect the attacks in
is modeled by
local measurement and edge measurement separately. Compared
with Zhao and Mili (2018), a significant advantage is that this y(k) = z(k) + a(k). (3)
article considers the power system as an interconnected system,
rather than treating each subsystem as an independent system. Then, y(k) is transmitted to the control center and leads to a false
This makes the presented method more suitable for large-scale state estimate x̂a = P(P̄ −1 x̄ + H T S −1 y). If one defines e = z − H x̂
power systems. and M = H P̄H T + S, according to the matrix inverse lemma, one
2. The ADSE algorithm is designed to produce accurate state has ea ≜ y − H x̂a = e + S M−1 a. That is to say the existence of FDI
estimation under cyber attacks by introducing two adaptive fac- attack will change the posterior residual vector no matter what
tors AFM and AFS into a distributed iterative Kalman-like esti- structure the attack vector is. Therefore, it is theoretically feasible
mator. The AFM is designed to evaluate the credibility of the to detect all kinds of FDI attacks through a posterior residual
manipulated measurements and the normal measurements sepa- analysis method. Denoting the covariance corresponding to ea as
rately, and the AFS is introduced to further weaken the impact of M, the normalized residual Υ = (ea )T M −1 ea follows a chi-square
the tampered measurements on state estimation. Compared with distribution under normal condition and the existence of FDI
the adaptive factor designed in Yang, Zhang, Liu, and Yu (2019), attack may lead to a larger Υ . With a designed threshold τ , one
the presented ADSE algorithm can better deal with the state believes FDI attack occurs if Υ > τ . When DoS attack occurs, the
estimation problem against cyber attacks when the dimension of timely measurement will be unavailable for the control center.
measurement is high. In this case, the one-step prediction z̄(k) = H(k)x̄(k) is used to
3. The relationship between the threshold and the estimator replace the missing measurement y(k). One defines ϱ(k) = 0
performance is investigated through a series of simulation tests, when DoS attack occurs, otherwise ϱ(k) = 1. Then, measurement
and the method to determine the adaptive factors is studied.
under DoS attack is expressed as
Notations: α1:n denotes [α1T , α2T , . . . , αnT ]T . diag {a, b, c } repre-
sents the block diagonal matrix constructed by a, b and c. E {·} ζ (k) = ϱ(k)y(k) + (1 − ϱ(k))z̄(k). (4)
and cov{·} represent the expectation and covariance operators,
respectively. 0 and Im denote the zero matrix and m-dimensional Instead of detecting the cyber attacks in a single control center,
identity matrix, respectively. 1m represents an m-dimensional in this article, the detection task will be allocated into each sub-
vector constructed by 1. Ni is the set of communication neighbors system. As shown in Fig. 1, a large-scale power system is divided
of subsystem i, the candidate of Ni is denoted as ni . chol(·) is the into several subsystems. In subsystem i, omitting the time index
Cholesky decomposition operation. Matrix A > 0 means that A is k, one denotes the local state as xi , the local measurement as zi ,
positive definite. For vector v , |v| means to take absolute value the edge measurement as zi,j , and the edge measurement matrix
for each element of v , v > 0 means that each element of v is as Li,j , then the relationships between the parameters in the
positive. ⊙ is the Hadamard product. max{·} means to take the centralized power system and these subsystems are x = x1:n , z =
maximum value. Tr {A} denotes the trace of A. [z1T:n , . . . , ziT,j , . . .]T , F = diag {F1 , . . . , Fn }, d = d1:n , w = w1:n , H =
2
J. Yang, W.-A. Zhang and F. Guo Automatica 137 (2022) 110091
Therefore, E {γi (k)} = Vi−1 (k)E {ai (k)}, cov{γi (k)} = Vi−1 (k)Mi (k)
(ViT (k))−1 = Imi . It is obvious that, when ai (k) = 0, γi (k) should
obey a n-dimensional standard normal distribution. Accordingly,
Fig. 1. Architecture of power system under cyber attacks. Υi (k) obeys a mi -dimensional chi-square distribution. Thus, the ex-
istence of FDI attack will lead to a larger Υi (k). With the definition
τi = χm2 i ,p , inequality Υi (k) > τi means that the measurement
[diag {H1 , . . . , Hn }, . . . , HiT,j , . . .]T , v = [v1T:n , . . . , viT,j , . . .]T , Hi,j = is manipulated by FDI attacks with the probability of p. This
[0, Li,j , 0, Lj,i , 0]. Define z̄i (k) = Hi (k)x̄i (k), z̄i,j (k) = Li,j (k)x̄i (k) + completes the proof.
Lj,i (k)x̄j (k), i = 1, . . . , n, j ∈ Ni . Then, according to (1)–(4),
When considering the influence of FDI attack and combining
the mathematical model of subsystem i under cyber attacks is
(6), ν̄i (k) can be rewritten as ν̄i (k) = Hi (k)(xi (k) − x̄i (k)) + vi (k) +
presented as ai (k). Then, one has Mi (k) = cov{ν̄i (k)} = Hi (k)P̄i (k)HiT (k) +
xi (k + 1) = Fi (k)xi (k) + di (k) + wi (k), (5a) Ši (k), where Ši (k) = Si (k) + ∆Si (k) and ∆Si (k) = cov{ai (k)}.
It implies that the existence of FDI attack can be treated as
zi (k) = Hi (k)xi (k) + vi (k), (5b)
increment in observation uncertainty. Thus, this article considers
yi (k) = zi (k) + ai (k), (5c) to thwart the impact of FDI attack on the performance of the state
estimator by modifying the measurement error variance matrix.
ζi (k) = ϱi (k)yi (k) + (1 − ϱi (k))z̄i (k), (5d)
The modified measurement error variance matrix is considered
zi,j (k) = Li,j (k)xi (k) + Lj,i (k)xj (k) + vi,j (k), (5e) to be Ši (k) = ϕi (k)Λi (k)Si (k), where ϕi (k) is a scalar, Λi (k) =
diag {λi(1) (k), . . . , λi(mi ) (k)} and Λi (k) − Imi ≥ 0. Let us define
yi,j (k) = zi,j (k) + ai,j (k), (5f) −1/2 1/2
γ̌i (k) = ViT (k)Λi (k)Si−1 (k)νi (k), γ̃i (k) = ϕi (k)γ̌i (k), a0 =
ζi,j (k) = ϱi (k)yi,j (k) + (1 − ϱi (k))z̄i,j (k). (5g) τi − η̄i (k)Φi (k)Φi (k)η̄i (k), b0 = 2ηi (k)Φi (k)Φi (k)η̄i (k), c0 =
T T T T
Tasks of this article are summarized as follows. ηiT (k)ΦiT (k)Φi (k)ηi (k), Φi(κ,t) = Vi(t ,κ ) Si(t) νi(t) , η̄i (k) = 1mi − ηi (k),
1. For risky power system (5), how to pick out the manipulated ηi(κ ) = 1 when |γi(κ ) | > πi , else ηi(κ ) = 0, where ηi(κ ) and γi(κ ) are
measurements (including the attacks in local measurement and the κ th element of ηi (k) and γi (k), respectively, Φi(κ,t) is the κ th
edge measurement) at each subsystem in a distributed way? row and tth column element of Φi (k), Vi(t ,κ ) is the element in the
2. For power system with high-dimensional measurements, tth row and κ th column of Vi (k), Si(t) is the tth diagonal element
how to design an estimator to ease the impact of attacks on state of Si (k) and νi(t) is the tth element of νi (k). The method to design
estimation? ϕi (k) and Λi (k) is given in Theorem 2.
3
J. Yang, W.-A. Zhang and F. Guo Automatica 137 (2022) 110091
Algorithm 1 Online calculation of πi z̄i,j (k, h), where z̄i,j (k, h) is derived as z̄i,j (k, h) = Li,j (k)x̄i (k) +
√
τi
Lj,i (k)x̂ij (k, h − 1), with x̂ij (k, h − 1) being the state estimate at
1: Initialized by πi,0 = and q = 1
mi subsystem j when removing subsystem i from its neighbors, the
2: for k = 1 to mi do corresponding error covariance is Pji (k, h − 1). Finally, one has
3: while (q) do
4: πi = 2q1−1 πi,0
5: Calculate ηi (k), η̄i (k) and a0 ;
µ̄i (k) =ζi (k) − Hi (k)x̄i (k) = ϱi (k)ν̄i (k), (15)
6: if a0 > 0 then µ̄i,j (k, h) =ζi,j (k) − Li,j (k)x̄i (k) − Lj,i (k)x̂ij (k, h − 1)
7: break;
8: end if =ϱi (k)[Li,j (k)(xi (k) − x̄i (k)) + vi,j (k)
9: q=q+1;
10: end while + Lj,i (k)(xj (k) − x̂ij (k, h − 1)) + ai,j (k)]. (16)
11: end for
Replacing ν̄i (k) in (8) by µ̄i (k), it is obvious that, no matter
whether there is FDI attack or not, γi (k) = 0 always holds as long
as DoS attack occurs. Thus, under cyber attacks, it is still possible
−1/2
Then, one has γ̌i (k) = Φi (k)(αi ηi (k) + η̄i (k)). The proposition to detect whether the local measurement zi (k) is manipulated
γ̌iT (k)γ̌i (k) ≤ τi can be further rewritten as by FDI attack according to Lemma 1. To examine whether the
1/2 edge measurement zi,j (k) is suffered from FDI attack, one defines
a0 α i − b 0 α i − c0 ≥ 0, (10) v̄i,j (k, h − 1) = vi,j (k) + Lj,i (k)(xj (k) − x̂ij (k, h − 1)). It is obvious
To make sure that inequality (10) has a solution, it is necessary that v̄i,j (k, h − 1) follows zero mean Gaussian distribution. Then
to ensure a0 > 0. When considering the case η̄i (k) = 1mi , one has (16) can be rewritten as, µ̄i,j (k, h) = ϱi (k)[Li,j (k)(xi (k) − x̄i (k)) +
v̄i,j (k, h − 1) + ai,j (k)]. In this sense, µ̄i,j (k, h) can be regarded as
η̄iT (k)ΦiT (k)Φi (k)η̄i (k) = mi πi2 ≤ τi . the local prediction residual at subsystem i at the hth iteration
√
Then, it is derived that πi ≤ τi /mi . However, when FDI attack and v̄i,j (k, h − 1) is the measurement noise. Notice that, when
exists, a smaller πi is needed to ensure that a0 is positive. In calculating µ̄i,j (k, h), the component Lj,i (k)x̂ij (k, h) is calculated
practice, the value of πi can be decided online adaptively as at subsystem j. Therefore, subsystem j needs to send relevant
shown in Algorithm 1. Then, by solving (10) and noting that αi information to subsystem i to assist state estimation and attack
is defined to be positive, one has detection in subsystem i. The information to be sent is defined as
Similar to (8), one defines γi,j (k) = , 0)) ×µ̄i,j (k, 1),
ViT,j (k)(M̌ij (k −1
Remark 3. For the sake of calculation, V̌i (k) is defined as V̌i (k) =
1/2 Υi,j (k) = µ̄Ti,j (k, 1)M− 1
(k)µ̄ i,j (k, 1), where V i ,j (k) = chol{Mi,j (k)},
Λi (k)Vi (k) rather than V̌i (k) = chol(M̌i (k)). To avoid confusion, i,j
M̌ij (k, h) = I ⊙ Mij (k, h). Then, Lemma 1 can also be used to judge
one redefines V̄i (k) = chol(M̌i (k)). Then, one has
whether the edge measurement is manipulated by FDI attack and
Υ̌i (k) − Ῡi (k) = V̌i (k)V̌iT (k) − V̄i (k)V̄iT (k) Theorem 2 will be utilized to derive the adaptive matrix Λi,j (k)
1/2 1/2
=Λi (k)Hi (k)P̄i (k)HiT (k)Λi (k) − Hi (k)P̄i (k)HiT (k). and the adaptive factor ϕi,j (k).
To design the gain matrices Ki (k, h) and Ki,j (k, h), one substi-
Combining Λi (k) ≥ Imi leads to V̌i (k)V̌iT (k) ≥ V̄i (k)V̄iT (k). Further- tutes (6), (12) and (15) into (13), then takes partial derivation of
∂ Tr {Pi (k,h)}
more, it is derived that Υ̌i (k) ≥ Ῡi (k). Therefore, when Λi (k) is Tr {Pi (k, h)} and let ∂ K (k ,h)
= 0, ∂ ∂TrK{Pi(k(k,,h)h)} = 0, one obtains
i i,j
designed such that Υ̌i (k) ≤ τi , the inequality Ῡi (k) ≤ τi always
Ki (k, h) = ψi (k, h)Ωi (k)
{
holds. Thus, it is reasonable to replace V̄i (k) with V̌i (k). , (20)
Ki,j (k, h) = ψi (k, h)Γi (k)Ωi,j (k)
3.2. State estimation under both DoS and FDI attacks
where,
Considering power system under cyber attacks that is de- M̄i (k) = Mi (k) + (Λi (k) − Imi )Si (k) (21)
scribed by (5), the state estimator is designed as
Ωi (k) = P̄i (k)HiT (k)M̄−1
i (k) (22)
x̂i (k, h) = x̄i (k) + Ki (k, h)µ̄i (k)
∑ Γi (k) = I − Ωi (k)Hi (k) (23)
+ Ki,j (k, h)µ̄i,j (k, h), (12) M̄ij (k , h) = Λi,j (k) ⊙ Mij (k , h) (24)
j∈Ni
Ωi,j (k, h) = P̄i (k)LTi,j (k)(M̄ij (k , h − 1)) −1
(25)
where h is the iteration step, x̂i (k, 0) = x̄i (k), µ̄i (k) and µ̄i,j (k, h) ∑
are the prediction residual at the hth iteration, Ki (k, h) and ψi (k, h) = [I + Γi (k) Ωi,j (k, h)Li,j (k)] . −1
(26)
Ki,j (k, h) are the gain matrices to be designed, which satisfy j∈Ni
{Ki (k, h), Ki,j (k, h)} = arg min Tr {Pi (k, h)}, (13) Then, substituting (12) and (20) into (14) leads to
Pi (k, h) = cov{xi (k) − x̂i (k, h)}. ψi (k, h)Γi (k)P̄i (k), ϱi (k) = 1
{
(14)
Pi (k, h) = . (27)
P̄i (k), ϱi (k) = 0
The prediction residual µ̄i (k) and µ̄i,j (k, h) are defined as µ̄i (k) ≜
ζi (k) − ζ̄i (k) and µ̄i,j (k, h) ≜ ζi,j (k) − ζ̄i,j (k, h), respectively. Ac- Finally, the state estimation process under cyber attacks is sum-
cording to (5) and (12), one obtains that ζ̄i (k) = z̄i (k), ζ̄i,j (k, h) = marized in Algorithm 2.
4
J. Yang, W.-A. Zhang and F. Guo Automatica 137 (2022) 110091
4. Case study
Chen, W., Ding, D. R., Dong, H. L., & Wei, G. L. (2019). Distributed resilient filter-
ing for power systems subject to denial-of-service atttacks. IEEE Transactions
on Systems, Man, and Cybernetics: Systems, 49(8), 1688–1697.
Chen, R., Li, X., Zhong, H. X., & Fei, M. R. (2019). A novel online detection
method of data injection attack against dynamic state estimation in smart
grid. Neurocomputing, 344, 73–81.
Deng, R. L., Xiao, G. X., & Lu, R. X. (2017). Defending against false data injection
attacks on power system state estimation. IEEE Transactions on Industrial
Informatics, 13(1), 198–207.
Deng, R. L., Xiao, G. X., Lu, R. X., Liang, H., & Vasilakos, A. V. (2017). Falseb
data injection on state estimation in power systems- Attacks, impacts, and
defense: A survey. IEEE Transactions on Industrial Informatics, 13(2), 411–423.
Gu, Y., Liu, T., Wang, D., Guan, X. H., & Xu, Z. B. (2013). Bad data detec-
tion method for smart grids based on distributed state estimation. IEEE
International Conference on Communications, 448, 3–4487.
Kazemi, Z., Safavi, A. A., Naseri, F., Urbas, L., & Setoodeh, P. (2020). A secure
hybrid dynamic state estimation approach for power systems under false
data injection attacks. IEEE Transactions on Industrial Informatics, early access.
Fig. 4. Comparison of the estimation errors of attacking target buses with and
Li, B. D., Ding, T., Huang, C., Zhao, J. B., Yang, Y. H., & Chen, Y. (2019). Detecting
without compensation where the estimation errors of the attacking target buses
false data injection attacks against power system state estimation with fast
without FDI attack compensation are shown in (a)–(c) and that of the attacking
go-decomposition approach. IEEE Transactions on Industrial Informatics, 15(5),
target buses by using the ADSE algorithm are shown in (d)–(f).
2892–2904.
Li, H., & Li, W. G. (2009). Estimation and forecasting of dynamic state estimation
in power systems. International Conference on Sustainable Power Generation
and Supply, 1–6.
Li, B. B., Xiao, G. X., Lu, R. X., Deng, R. L., & Bao, H. Y. (2020). On feasibility
and limitations of detecting false data injection attacks on power grid state
estimation using D-FACTS devices. IEEE Transactions on Industrial Informatics,
16(2), 854–864.
Liang, G. Q., Zhao, J. H., Luo, F. J., Weller, S. R., & Dong, Z. Y. (2017). A review of
false data injection attacks against modern power systems. IEEE Transactions
on Smart Grid, 8(4), 1630–1638.
Liu, L., Esmalifalak, M., Ding, Q. F., Emesih, V. A., & Han, Z. (2014). Detecting false
data injection attacks on power grid by sparse optimization. IEEE Transactions
Fig. 5. Performance comparison for state estimation under cyber attacks by
on Smart Grid, 5(2), 612–621.
using the ADSE algorithm, the ADSE1 algorithm and the DSEI algorithm, as well
Liu, C. S., Liang, H., Chen, T. W., Wu, J., & Long, C. N. (2020). Joint admittance
as the state estimation under security condition by using the DESI algorithm.
perturbation and meter protection for migigating stealthy FDI attacks against
power system state estimation. IEEE Transactions on Power Systems, 35(2),
1468–1478.
Liu, Y., Reiter, M. K., & Ning, P. (2009). False data injection attacks against state
system is suffered from cyber attacks, it is not enough to design
estimation in electric power grids. In 16th Proceedings of the ACM conference
an effective attack detection mechanism and isolate the attack. on computer and communications security (pp. 21-32).
A robust filter is also needed to effectively block the adverse Liu, X., Song, Y. F., & Li, Z. Y. (2020). Dummy data attacks in power systems.
effects of attacks. Besides, Fig. 5 also shows that compared with IEEE Transactions on Smart Grid, 11(2), 1792–1795.
the ADSE1 algorithm, the ADSE algorithm has higher convergence Liu, B., & Wu, H. Y. (2020). Optimal D-FACTS placement in moving target defense
rate and higher estimation accuracy which proves the superiority against false data injection attacks. IEEE Transactions on Smart Grid, early
access.
of the proposed ADSE algorithm.
Manandhar, K., Cao, X. J., Hu, F., & Liu, Y. (2014). Detection of faults and attacks
including false data injection attack in smart grid using Kalman filter. IEEE
5. Conclusion Transactions on Control of Network Systems, 1(4), 370–379.
Nishiya, K., Takagi, H., Hasegawa, J., et al. (1976). Dynamic state estimation
This article investigates the distributed state estimation prob- for electric power systems-introduction of a trend factor and detection of
lem for large-scale power system under both FDI and DoS attacks. innovation process. Electrical Engineering in Japan, 96(5), 497–504.
Rawat, D. B., & Bajracharya, C. (2015). Detection of false data injection attacks
Through neighborhood coordination, a distributed attack detec- in smart grid communication systems. IEEE Signal Processing Letters, 22(10),
tion method is presented. Then, an adaptive distributed estimator 1652–1656.
is designed to mitigate the impact of attacks and produce accurate Rich, C. (1993). 118 Bus power flow test case. Available: http://labs.ece.uw.edu/
state estimation. Simulations conducted on the IEEE 118-bus pstca/pf118/pg_tca118bus.htm.
system verify the effectiveness of the ADSE algorithm in attack Song, H. Y., Shi, P., Lim, C. C., Zhang, W. A., & Yu, L. (2019). Attack and estimator
design for multi-sensor systems with undetectable adversary. Automatica,
detection and its satisfactory performance in state estimation
109.
against cyber attacks for large-scale power systems. The future Sun, Y. B., Fu, M. Y., Wang, B. C., Zhang, H. S., & Marelli, D. (2016). Dynamic state
research direction may be: (1) A more powerful attack detection estimaion for power networks using distributed MAP technique. Automatica,
method can be presented to replace the posteriori residual-based 73, 23–37.
attack detection method. (2) To study the influence of continuous Wang, X. Y., Luo, X. Y., Zhang, M. Y., Jiang, Z. P., & Guan, X. P. (2020). Detection
DoS attacks on the distributed state estimator, one must consider and isolation of false data injection attacks in smart grid via unknown input
interval observer. IEEE Internet of Things Journal, early access.
which and how many subsystems are under DoS attack and what
Yang, J., Zhang, W. A., & Guo, F. H. (2020). Dynamic state estimation for power
are their topology relationships. It will be an interesting but networks by distributed unscented information filter. IEEE Transactions on
challenging problem worth studying. Smart Grid, 11(3), 2162–2171.
Yang, X. S., Zhang, W. A., Liu, A. D., & Yu, L. (2019). Linear fusion estimation for
References range-only target tracking with nonliner transformation. IEEE Transactions on
Industrial Informatics, early access.
Barhumi, I., & Moonen, M. (2009). MLSE and MAP equalization for transmission Zhang, Z. Y., Deng, R. L., Yau, D. K. Y., Cheng, P., & Chen, J. M. (2020). Analysis
over doubly selective channels. IEEE Transactions on Vehicular Technology, of moving target defense against false data injection attacks on power grid.
58(8), 4120–4128. IEEE Transactions on Informormation Forensics and Security, 15, 2320–2335.
Bi, S. Z., & Zhang, Y. J. (2014). Graphical methods for defense against false- Zhao, J. B., & Mili, L. (2018). Power system robust decentralized dynamic state
data injection attacks on power system state estimation. IEEE Transactions estimation based on multiple hypothesis testing. IEEE Transactions on Power
on Smart Grid, 5(3), 1216–1227. Systems, 33(4), 4553–4562.
6
J. Yang, W.-A. Zhang and F. Guo Automatica 137 (2022) 110091
Jun Yang received the B.Eng. degree in mechanical networked control systems, and multi-sensor information fusion estimation. Dr.
and electrical engineering from Huazhong Agricultural Zhang was awarded an Alexander von Humboldt Fellowship in 2011–2012. Since
University, Wuhan, China, in 2013. He is currently September 2016, he has been a Subject Editor for Optimal Control Applications
working toward the MD-Ph.D. degree in control theory and Methods.
and control engineering from Zhejiang University of
Technology, Hangzhou, China. His research interests
include information fusion, distributed estimation and Fanghong Guo received his B. Eng. degree in Automa-
smart grid. tion Science from Southeast University, Nanjing, China
in July 2010, M. Eng. degree in Automation Science
and Electrical Engineering from Beihang University,
Beijing, China in January 2013, and Ph.D. degree in
Sustainable Earth from Energy Research Institute @NTU,
Wen-An Zhang received the B.Eng. degree in Automa- Interdisciplinary Graduate School, Nanyang Technolog-
tion and the Ph.D. degree in Control Theory and Control ical University, Singapore in November 2016. He was
Engineering from Zhejiang University of Technology, a Research Associate and then a Research Fellow with
Hangzhou, China, in 2004 and 2010, respectively. Since the Rolls-Royce Cooperate Lab @NTU, Nanyang Techno-
2010, he has been with Zhejiang University of Tech- logical University, from May 2016 to April 2017. From
nology, where he is currently a Professor with the May 2017 to July 2018, he was a Scientist with the Experimental Power Grid
Department of Automation. From 2010 to 2011, he Centre (EPGC), Agency for Science, Technology and Research (A*STAR), Singapore.
was a Senior Research Associate with the Department He is currently with the Department of Automation, Zhejiang University of
of Manufacturing Engineering and Engineering Man- Technology, Hangzhou, China. His research interests include distributed coop-
agement, City University of Hong Kong. His research erative control, distributed optimization on microgrid systems, and smart grid.
interests include cyber–physical systems security, He served as an Associate Editor of IEEE Transactions on Industrial Electronics.