Protecting the grid topology and user consumption patterns during state estimation in smart grids based on data obfuscation

Journal Article (2019)
Author(s)

Lakshminarayanan Nandakumar (CGI Nederland B.V)

Gamze Tillem (TU Delft - Cyber Security)

Z Erkin (TU Delft - Cyber Security)

Tamás Keviczky (TU Delft - Team Tamas Keviczky, TU Delft - Delft Center for Systems and Control)

Research Group
Cyber Security
Copyright
© 2019 Lakshminarayanan Nandakumar, G. Tillem, Z. Erkin, T. Keviczky
DOI related publication
https://doi.org/10.1186/s42162-019-0078-y
More Info
expand_more
Publication Year
2019
Language
English
Copyright
© 2019 Lakshminarayanan Nandakumar, G. Tillem, Z. Erkin, T. Keviczky
Research Group
Cyber Security
Volume number
2
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Smart grids promise a more reliable, efficient, economically viable, and environment-friendly electricity infrastructure for the future. State estimation in smart grids plays a pivotal role in system monitoring, reliable operation, automation, and grid stabilization. However, the power consumption data collected from the users during state estimation can be privacy-sensitive. Furthermore, the topology of the grid can be exploited by malicious entities during state estimation to launch attacks without getting detected. Motivated by the essence of a secure state estimation process, we consider a weighted-least-squares estimation carried out batch-wise at repeated intervals, where the resource-constrained clients utilize a malicious cloud for computation services. We propose a secure masking protocol based on data obfuscation that is computationally efficient and successfully verifiable in the presence of a malicious adversary. Simulation results show that the state estimates calculated from the original and obfuscated dataset are exactly the same while demonstrating a high level of obscurity between the original and the obfuscated dataset both in time and frequency domain.