SlideShare a Scribd company logo
International Journal of Power Electronics and Drive Systems (IJPEDS)
Vol. 13, No. 4, December 2022, pp. 2086~2097
ISSN: 2088-8694, DOI: 10.11591/ijpeds.v13.i4.pp2086-2097  2086
Journal homepage: http://ijpeds.iaescore.com
Efficient detection of faults and false data injection attacks in
smart grid using a reconfigurable Kalman filter
Prakyath Dayananda1
, Mallikarjunaswamy Srikantaswamy2
, Sharmila Nagaraju3
, Rekha Velluri4
,
Doddananjedevaru Mahesh Kumar5
1
Department of Electrical and Electronics Engineering, SJB Institute of Technology, Bangalore, India
2
Department of Electronics and Communication Engineering, JSS Academy of Technical Education, Bangalore, India
3
Department of Electrical and Electronics Engineering, Sri Jayachamarajendra College of Engineering, Mysore, India
4
Department of Computer Science and Engineering, CHRIST (Deemed to be University), Bengaluru, India
5
Department of Electronics and Instrumentation Engineering, JSS Academy of Technical Education, Bangalore, India
Article Info ABSTRACT
Article history:
Received Mar 17, 2022
Revised Aug 28, 2022
Accepted Sep 19, 2022
The distribution denial of service (DDoS) attack, fault data injection attack
(FDIA) and random attack is reduced. The monitoring and security of smart
grid systems are improved using reconfigurable Kalman filter. Methods: A
sinusoidal voltage signal with random Gaussian noise is applied to the
Reconfigurable Euclidean detector (RED) evaluator. The MATLAB
function randn() has been used to produce sequence distribution channel
noise with mean value zero to analysed the amplitude variation with respect
to evolution state variable. The detector noise rate is analysed with respect to
threshold. The detection rate of various attacks such as DDOS, Random and
false data injection attacks is also analysed. The proposed mathematical
model is effectively reconstructed to frame the original sinusoidal signal
from the evaluator state variable using reconfigurable Euclidean detectors.
Keywords:
False data injection attack
Kalman filter
Random attack
Reconfigurable Euclidean
detector
Smart grid
This is an open access article under the CC BY-SA license.
Corresponding Author:
Mallikarjunaswamy Srikantaswamy
Department of Electronics and Communication Engineering, JSS Academy of Technical Education
JSSATE-B Campus, Dr. Vishnuvardhan Road, Uttarahalli - Kengeri Main Road
Srinivaspura-Post Bengaluru – 560060 Karnataka, India
Email: mallikarjunaswamys@jssateb.ac.in
1. INTRODUCTION
The Power grid is considered to be a significant backbone of infrastructure, which has a profound
effect on the economy and the day-to-day routines. Fiascos in the power grid normally have shattering
effects. With the beginning of fresh skills, the out-of-the-way power grid is updated by a grid that is a
distinctive smart cyber-physical system (CPS) that includes additional implanted smartness and networking
competence. Sensors are furnished all over the system to observe different grid features, like the meter &
voltage fluxes in such arrangements [1]−[3]. The gathered data by the sensors aids to give a reaction to the
physical power grids. So, that kind of a CPS comprises two-approach messages among the controller scheme
and the physical apparatuses as depicted in Figure 1. Numerous evolving attacks precisely aiming at the
control and communication arrangements in smart grid are uncovered. A broad approach to detect physical
altering is done by a process of installing an evaluator along with a corresponding detector in the given
controller. A remarkable variance among the estimated and measured states indicates a likely attack on the
structure. Here, we showcase a framework of security utilizing the Kalman filter (KF) for a given smart grid.
The KF produces assessments for state variables by means of the mathematical prototype for the power grid
& the information got by the system of sensors is installed so as to observe the power grid. Then we can also
Int J Pow Elec & Dri Syst ISSN: 2088-8694 
Efficient detection of faults and false data injection attacks in smart grid … (Prakyath Dayananda)
2087
use a χ2
-detector which can further be used to identify the inconsistencies amid the assessed data & the
experimental data and trigger alarms [4].
Nevertheless, the learning depicts that the χ2-detector can’t identify the statistically resultant false
data injection attack. We broadly examine this attack, along with the planned KF framework and project a
supplementary detection method by means of the Euclidean distance metric [5], [6]. The main objectives
include i) we plan a mathematical prototype along with the KF to identify likely attacks & errors on the
system of smart grid, ii) then examine the functioning of the investigative technique χ2-detector, in
recognizing errors & arbitrary attacks, and iii) we evaluate the restraint of the χ2 detector in sensing the
analytically resultant false data injection attack and consequently project a fresh detector of Euclidean to be
joined with KF and d) then showcase the efficacy of the planned methods through widespread simulations &
study on real-world systems. The remaining work is structured as below. Section 2 shows the motivation &
the associated work on smart-grid security. Section 3 shows the planned structure, the measured prototype of
the power grid & the KF estimator. Section 4 shows the two detectors employed in the structure so as to
identify different attacks in the arrangement. In section 5, outcomes of the planned framework and the
interpretations are detailed. Lastly, section 4 details the conclusion.
Figure 1. Fundamental block diagram of a smart grid system
2. MOTIVATION AND RELATED WORK
In this segment, we examine different security aspects deliberated in the literature. The modern
studies on smart grid security could be largely classified into three sets. The research in the first group pacts
with the wired or wireless security of networking between cyber constituents in the smart grid. The work
inside second group would examine the early detection of abnormalities in the structure. The early anomaly
detection methods can forehandedly safeguard the system. The research in the third group smears the control
theories in the security procedure utilizing different state assessment & revealing methods.
A signature-dependent message validation system was projected, that works in the multicast
authentication format in order to lessen the size of signature & bandwidth of communiqué at the price of
augmented calculation. The projected method includes detecting, reacting, data recollecting & alarm
supervision mechanisms. An error inside the smart grid scheme is constantly shown in the method of
alteration in voltage, phase or current. Prevailing security methods are either i) not feasible, ii) mismatched
with the smart grid, iii) not suitably scalable, or iv) not sufficient. Our research shows a structure, dependent
on a state-space system obtained by the voltage stream reckonings, to secure various kinds of attacks &
errors, corresponding to the Injection attack of the false data. We project an altered detector dependent on the
metric of Euclidean distance to identify a complex Injection attack of the given false data over the power grid
mechanism.
3. PROJECTED STRUCTURE FOR SMART GRID BY MEANS OF RED
In this segment, we showcase the complete report of the structure of the given security for the smart
grid which is utilizing the KF. The structure is proficient in identifying different assaults, including short &
long-term arbitrary attacks including the development of a state-space prototype by the three-phase
 ISSN: 2088-8694
Int J Pow Elec & Dri Syst, Vol. 13, No. 4, December 2022: 2086-2097
2088
sinusoidal voltage reckonings [7]−[9]. Figure 2 depicts the projected structure of security, where we can see
that KF assesses the figures for the given state parameters depending on state of the system and the statistics
from various values of sensors. The KF produced projected values and the detected figures alongside
variables of state are then given inside the detector. After this, the two-state vectors are equated by the
detector. If the two vary from each other considerably and are above an assured pre-calculated threshold, an
alarm to imply a likely smart grid attack is initiated by the detector.
Figure 2. Security execution protocols of the smart grid system
3.1. Prototype of state space
The power structure installs sensors, like phasor units of measurement, so as to assess the system
state at different places and stint to make sure of the even operation of the power scheme. the sinusoidal
voltage mathematical model is given in (1). the three phases voltage signals are given in (2) and (3)
respectively [10], [11].
𝑆1(𝑡) = 𝐴𝑓 cos(𝑤𝑡 + 𝜑) (1)
𝑆2(𝑡) = 𝐴𝑓 cos(𝑤𝑡 + 𝜑 −
2𝜋
3
) (2)
𝑆2(𝑡) = 𝐴𝑓 cos(𝑤𝑡 + 𝜑 −
4𝜋
3
) (3)
Extension of (1) as shown in (4).
𝑆1(𝑡) = 𝐴𝑓 ∗ 𝑐𝑜𝑠𝑤𝑡 ∗ 𝑐𝑜𝑠𝜑 − 𝐴𝑓 ∗ 𝑠𝑖𝑛𝑤𝑡 ∗ 𝑠𝑖𝑛 𝜑 (4)
Where 𝐴𝑓 is described the amplitude function, 𝑤𝑡 is represented as the angular frequency and 𝜑 is identified
as phase angle with respect to time. When the angular frequency is constant with respect to the time then
amplitude and phase can be represented in state-space model is given in (5).
𝑆1(𝑡) = 𝑔1 ∗ cos 𝑤𝑡 − 𝑔2 ∗ sin 𝑤𝑡 (5)
Where 𝑔1 = 𝐴𝑓
8
cos 𝜑 and 𝑔2 = 𝐴𝑓
𝑜
sin 𝜑 is the state variables at no delay condition in the model. The tiny
noise is applied to the system and this condition is given in (6).
[
𝑔1(𝑡 + 1)
𝑔2(𝑡 + 2)
] = [
1 0
0 1
] [
𝑔1(𝑡)
𝑔2(𝑡)
] + 𝑤(𝑡) (6)
In (6) can be represented in simplest form and it is given in (7).
𝑔(𝑡 + 1) = [
1 0
0 1
] 𝑔(𝑡) + 𝑤(𝑡) (7)
Where 𝑔(𝑡) = [
𝑔1(𝑡)
𝑔2(𝑡)
] and 𝑤(𝑡) is described as process noise. At nonstationary deterministic condition the
actual voltage signal is given in (8). Where ℎ(𝑡) is describes the actual voltage signal with respect to time
and 𝛤(𝑡) is represents the measurement noise.
Int J Pow Elec & Dri Syst ISSN: 2088-8694 
Efficient detection of faults and false data injection attacks in smart grid … (Prakyath Dayananda)
2089
ℎ(𝑡) = [𝑐𝑜𝑠𝑤𝑡 − 𝑠𝑖𝑛𝑤𝑡] [
𝑔1(𝑡)
𝑔2(𝑡)
] + 𝛤(𝑡) (8)
3.2. Reconfigurable Kalman filter (RKF)
Figure 3 depicts the control system alongside the KF entrenched on the approximation of the vector
of state & detector in order to do the identification of errors [12], [13]. The (9) represents the KF technique
where = [
1 0
0 1
] , from in (8) it can be represented in simplest form and it is given in (10).
𝑔(𝑡 + 1) = 𝐴𝑔(𝑡) + 𝑤(𝑡) (9)
ℎ(𝑡) = 𝑉
𝑐(𝑡)𝑥(𝑡) + 𝑠(𝑡) (10)
Where ℎ(𝑡) is identified as sensor measurement vector, 𝑉
𝑐(𝑡) is represents the [𝑐𝑜𝑠𝑤𝑡 − 𝑠𝑖𝑛𝑤𝑡] and 𝑠(𝑡) is
described as a white gaussian noise at mean is zero and standard deviation ‘ρ’ it is not depend on process
noise and initial condition [14], [15]. The KF mean and covariance of the evaluator is defined by (11)-(14).
𝑠̂(𝑡|𝑡) = 𝐸𝑠𝑡[𝑔(𝑡), ℎ(𝑡), … … . ℎ(𝑡)] (11)
𝑠̂(𝑡|𝑡 − 1) = 𝐸𝑠𝑡[𝑔(𝑡), ℎ(𝑡), … … . ℎ(𝑡 − 1)] (12)
𝑃𝑡(𝑡|𝑡) = ∑(𝑡|𝑡 − 1) (13)
𝑃𝑡(𝑡|𝑡 − 1) = ∑(𝑡|𝑡 − 1) (14)
Where, 𝑠̂(𝑡|𝑡) is represents the signal evaluator with respect to ‘t’, 𝑠̂(𝑡|𝑡 − 1) is describes the signal
evaluator with respect to time ‘t-1’, 𝑃𝑡(𝑡|𝑡) is identified as covariance of the Evaluator with respect to the ‘t’
and 𝑃𝑡(𝑡|𝑡 − 1) is represents the covariance of the Evaluator with respect to the ‘t-1’. The KF Iteration
process is represented by (15) and (16).
𝑠̂(𝑡 + 1|𝑡) = 𝐴𝑠̂(𝑡) (15)
𝑃𝑡(𝑡|𝑡 − 1) = 𝐴𝑃𝑡(𝑡 − 1)𝐴𝑇
+ 𝑍 (16)
Where 𝑠̂(𝑡 + 1|𝑡) is represents the state and covariance of the evaluator with respect to t to t+1-time steps,
𝑃𝑡(𝑡|𝑡 − 1) is describes the covariance of the evaluator with respect to t-1 to t and ‘Z’ is represents the
covariance matrix process noise [16], [17]. The RKF measuring updates are represented by (17)-(19).
𝐾𝐴(𝑡) = 𝑃𝑡(𝑡|𝑡 − 1)𝑉
𝑐(𝑡)𝑇
(𝑉
𝑐(𝑡)𝑃𝑡(𝑡|𝑡 − 1)𝑉
𝑐(𝑡)𝑇
+ 𝑅)−1
) (17)
𝑃𝑡(𝑡|𝑡) = 𝑃𝑡(𝑡|𝑡 − 1) − 𝐾𝐴(𝑡)𝑉
𝑐(𝑡)𝑃(𝑡|𝑡 − 1) (18)
𝑠̂(𝑡) = 𝑠̂(𝑡|𝑡 − 1) + 𝐾𝐴(𝑡)(ℎ(𝑡) − 𝑉
𝑐(𝑡)𝑠̂(𝑡|𝑡 − 1)) (19)
Where 𝐾𝐴(𝑡) is described the reconfigurable Kalman gain and R represents the covariance matrix noise
analysis. The Kalman Gain before the evaluation is represented by (20), (21) and enhancement of (19) is
given in (22). The evaluation error 𝛿 (𝑡) is represented in (23).
𝑃 ≜ lim
𝑘→∞
𝑃𝑡(𝑡|𝑡 − 1) (20)
𝐾𝐴 = 𝑃𝑡 𝑉
𝑐
𝑇
(𝑉
𝑐𝑃𝑡 − 1)−1
(21)
𝑠̂(𝑡 + 1) = 𝐴𝑠̂(𝑡|𝑡) + 𝐾𝐴[(ℎ(𝑡 + 1) − 𝑉
𝑐𝐴𝑠̂(𝑡) + 𝛽𝑢(𝑡)] (22)
𝛿 (𝑡) ≜ 𝑠̂(𝑡) − 𝑠(𝑡) (23)
3.3. Model generalization
The state-space model is detailed in section 3. It could be widespread for power grid dimensions.
The voltage monitored at every bus could stay in the method of a sinusoidal [18], [19]. Let us study the three-
phase bus structure as shown in Figure 4.
 ISSN: 2088-8694
Int J Pow Elec & Dri Syst, Vol. 13, No. 4, December 2022: 2086-2097
2090
𝜁𝑥 = ∑ |𝑆𝑥||𝑆𝑖|𝑍𝑥𝑖 sin(𝜑𝑥 − 𝜑𝑖) − cos (𝜑𝑥 − 𝜑𝑖)
𝑛
𝑖=1 (24)
𝜌𝑥 = ∑ |𝑆𝑥||𝑆𝑖|𝑍𝑥𝑖 sin(𝜑𝑥 − 𝜑𝑖) − cos (𝜑𝑥 − 𝜑𝑖)
𝑛
𝑖=1 (25)
Where |𝑆𝑥| is represented the voltage amplitude, |𝑆𝑖| has described the phase, 𝑍𝑥𝑖 is identified as gain, 𝜁𝑥 is
represented the active power, 𝜌𝑥 has described reactive power and x is the number of system buses [20], [21].
To determine unknown variables in each system buses by (24) and (25).
Figure 3. Proposed power grid
Figure 4. Fundamental three bus structure
3.4. Model of attack
The model attack occurs when FDIA gets introduced to the smart grid system. It is able to control a
sub set of the sensor readings in the system. It is presumed that the invader is capable of controlling a
subdivision of the sensor evaluations in the structure. there are three types of attacks namely: i) DDoS,
ii) random, and iii) false data injection [22], [23].
3.5. DDoS attack
The DDoS attack is jamming the communication channel, compromising devices and flooding
packets in networks to avoid data transfer. This kind of assault is such that wherein an opponent extracts few
or every constituent of an unreachable control system. The bout of DDoS could be on control, sensor, or on
both data.
3.6. Random attack
Here, the assaults aren’t constructed to bypass the discovery procedure executed by the central
system. Such arbitrary attacks can be produced at any point in time.
ℎ′(𝑡) = 𝑉
𝑐(𝑡)𝑔′(𝑡) + 𝑠(𝑡) + ℎ𝑎(𝑡) (26)
Where ℎ𝑎(𝑡) is represented the random attack vector, ℎ′(𝑡) is described as model observation and 𝑔′(𝑡) is
identified as system process states [24].
3.7. False data-injection attack
It is alleged so as to know that the attacker is aware of the model of a given system, having variables
𝜌 R, A, 𝛽, 𝑉
𝑐 and gain 𝐾𝐴. The attacker could as well regulate a subdivision of sensors (Sbad). Where 𝜏 is
represented the sensor selection matrix 𝜏 = 𝑑𝑖𝑎𝑔(𝛾1 + 𝛾1 + 𝛾2 + 𝛾3 + 𝛾4+, … … … . +𝛾𝑚) and 𝑥 ∈ 𝑆𝑏𝑎𝑑.
Int J Pow Elec & Dri Syst ISSN: 2088-8694 
Efficient detection of faults and false data injection attacks in smart grid … (Prakyath Dayananda)
2091
ℎ′(𝑡) = 𝑉
𝑐(𝑡)𝑔′(𝑡) + 𝑠(𝑡) + 𝜏ℎ𝑎(𝑡) (27)
4. ATTACK DETECTOR
The RKF predictor computes the system state by means of the reckonings detailed in section 3.2. As
the readings of a given meter are evident for that state, the planned assessments and the authentic meter
evaluations are paralleled by the detector. In case the variance among the two is over an earlier calculated
threshold, an alarm is generated to inform a likely attack [25], [26].
4.1. 𝝌𝟐
-detector
The 𝜒2
-detector is a traditional one which castoff with RKF. The 𝜒2
--detector constructs 𝜒2
-test
measurements from the RKF and parallels those with the threshold got from the customary 𝜒2
-Table 1 [27].
Let the residue 𝑅(𝑡 + 1) at k+1 sec be determined by (28) and a simplified (30) is presented by (29). The
scalar test statistics of 𝜒2
-detector is given in (30).
𝑅(𝑡 + 1) ≜ ℎ(𝑡 + 1) − ℎ
̂(𝑡 + 1|𝑡) (28)
𝑅(𝑡 + 1) ≜ ℎ(𝑡 + 1) − 𝑉
𝑐(𝐴𝑠̂(𝑡)) (29)
𝑤(𝑡) = 𝑅(𝑡)𝑇𝐵
(𝑡)𝑅(𝑡)
Where 𝑤(𝑡) is represented as the precomputed threshold and B (t) is described as the covariance matric of R
(t). The reconstructed sinusoidal signals from evaluator of the reconfigurable Euclidean detector. The
comparison analysis has been done with conventional methods by (30). Where 𝜁 is represented the amplitude
and 𝜌 is described the evaluated voltage signal amplitude. Table 1 shows the experimental setup of 𝜒2
-
detector used PKF.
𝑑(𝜁, 𝜌) = √(𝜁1 − 𝜌1)2 + (𝜁1 − 𝜌1)2 + (𝜁1 − 𝜌1)3
+ ⋯ … … … … … + (𝜁𝑛 − 𝜌𝑛)2
(30)
Table 1. Reconfigurable Kalman filter experimental setup
Particular Quantity
Initial covariance matric 𝜁 (0|0) Identified matrix
Frequency 65 Hz
The initial value for 𝑠1 (0) 0
The initial value for 𝑠2 (0) 0
Amplitude 1 Volt
Sampling frequencies 2.5 Hz
4.2. Detector executing the distance metric of Euclidean
The false data injection assault is sensibly made to avoid the numerical detector, like the 𝜒2
-
detectors. So, to identify such kinds of assaults, we acclaim a reconfigurable euclidean-based detector, that
computes the aberration of the experiential figures compared to the assessed figures. To implement the
reconfigurable euclidean detector, initially, sinusoidal signals are built from the state assessments and then
equated with the quantities got from the sensors as depicted. If the variance among the two is more than the
threshold ‘3α’ where α is represented the standard deviation, as in the situation of the 𝜒2
-detector, an alarm
is produced. To reduce to 99.85% of false positives obtained because of noise, we fix the threshold.
5. IMPLEMENTATION AND EVALUATION OF PERFORMANCE
We executed the RKF Evaluator, Euclidean detector, and 𝜒2
-detector making use of MATLAB. The
research setup and the preliminary figures are depicted in Table 1. A 65Hz signal of the sinusoidal voltage
having arbitrary Gaussian noise is produced and given to the RKF estimator by way of the input. The input &
the consequent sinusoidal signal got utilizing the state assessments are shown in Figures 5 to 9.
5.1. Attack/error detection utilizing the 𝝌𝟐
−detector
Figure 5 depicts the simulation consequences utilizing the 𝜒2
-detector in the lack of attacks for
some amount of duration. We can see that the assessed figures got from the KF estimator overlay with the
input signal showing there is no change amongst the projected and the experimental figures. The RKF
functions iteratively by amending its assessments utilizing the state-space model and the values got & the
 ISSN: 2088-8694
Int J Pow Elec & Dri Syst, Vol. 13, No. 4, December 2022: 2086-2097
2092
assessments slowly congregate through the input signal. In the time of assaults, the projected assessments
will not agree with the experiential analysis and w(t) surpasses the threshold as depicted in Figure 6 depicts a
short-duration attack being identified by the structure. Figure 7 depicts the discovery of the attack of the
DDoS.
Figure 5. No attack/fault signal transfer response using χ2
-detector
Figure 6. random attack for a short period transfer response using χ2
–detector
5.2. False data injection attack detection using RKF
Here, it so happens that it injects forged sensor measurements which can mislead the system by
executing the RKF estimator with the χ2-detector. The attack sequence can be obtained from in (31). Where
‘n’ is the represents the measurement of state space, ℎ∗
= 𝑉
𝑐𝑠, 𝑀 = 𝑚𝑎𝑥𝑖=,1,2,3, 4…...n-1,
ℎ𝑎(𝑛 + 𝑡) = ℎ𝑎(𝑡) −
𝜆(𝑥+1)
𝑀
ℎ∗
(31)
The source of the assault arrangement confirms that it overcomes the detector and upsurges the fault in the
assessment of the state. The second subgraph in Figure 7 depicts the behavior of the 𝜒2
-detector beneath the
injection attack of the false data. We observe the approximations don’t match with the experimented figures
in the top subgraph in Figure 7 Nevertheless, w(t) never surpasses the threshold. We talk about this
disadvantage in the subsequent phase by utilizing the Euclidean detector that could detect such attacks by
continually observing the variation amongst the estimated and the experimented values.
Int J Pow Elec & Dri Syst ISSN: 2088-8694 
Efficient detection of faults and false data injection attacks in smart grid … (Prakyath Dayananda)
2093
Figure 7. DDoS attack for a short period transfer response using χ2
–detector
5.3. False data injection attack discovery utilizing the Euclidean detector
This detector equates the alteration among the data experimented and the assessed data depending
on the metric of the Euclidean distance. Nevertheless, to evade fake alarms due to dimension faults, we set
the threshold to 3α as detailed in section IVB. Figure 8 shows the graph of the metric of the Euclidean
distance while an attack is not there in the structure and the below subgraph in Figure 8 shows the plot when
false data injection assault is there inside the structure.
Figure 8. No attack/fault signal transfer response using reconfigurable Euclidean distance
5.4. Load change
In the prototype obtained, it is presumed that the load in the system is persistent. If at all we have a
load change, then, there will be an alteration in the signal voltage through the buses. In case we know the
load profile, then the change in amplitude of voltage produced because of the load change can be predicted.
The factors inside the RKF can be attuned to reproduce the alteration inside the voltage because of the
alteration in load. It permits us to get assessments for the state variables subsequent to the change in load.
Figure 9 depicts that the assessments meticulously trail the signal along with the load alteration at time step
0.08, the random bout is identified by the 𝜒2
detector & Euclidean detector in such situation.
0.00 0.02 0.04 0.06 0.08 0.10
-1.5
-1.0
-0.5
0.0
0.5
1.0
1.5
Simulation
Signal
Time (s)
Input signal
Evaluated Signal
0.00 0.02 0.04 0.06 0.08 0.10
0
2
4
6
8
Simulated
Signal
Time (A)
W(t)
Thershold
 ISSN: 2088-8694
Int J Pow Elec & Dri Syst, Vol. 13, No. 4, December 2022: 2086-2097
2094
5.5. Χ2
-Detector versus reconfigurable Euclidean detector
The likelihood of assault discovery in either of detectors is mainly reliant on the assessment of the
threshold. In 𝜒2
- detector, the verge is got from the 𝜒2
Table 1 Likewise, in reconfigurable Euclidean
detector, the Gaussian distribution standard deviation gives the threshold.
Here in our research, the fixing of the significance of the thresholds in either of detectors to screen
99.15% of noise is done. Hence, the likelihood of wrong alarms because of noise will be less than 0.85%.
Normally, the Euclidean detector is considered extra sensitive for variations than compared to the 𝜒2
-
detector. In case the noise factors are not recognized before, the 𝜒2
-detector is better because it manages the
soft faults better. Nevertheless, a drawback of the 𝜒2
-detector compared to the reconfigurable Euclidean
detector is its incompetence to identify a false data injection assault.
Figure 9. DDoS attack for a short period transfer response using reconfigurable Euclidean distance
5.6. Proposed IEEE 9-bus system using RED to detect false data injection attack
Figure 10 depicts a 9-bus structure of IEEE with sensors to observe the state factors and the
estimator for bus 3. The 9-bus structure is replicated using the MATPOWER platform in MATLAB. The
voltages and phases, got by unravelling the 9-bus power structure in MATPOWER, are utilized like factors
of state in the RKF estimator. A related framework could be presumed for every bus in the structure. In order
to understand, merely bus 3 is deliberated. The assault order ℎ𝑎 is produced by the opponent. The sensors
which are there in the bus inform their interpretations to the matching RKF estimators and reconfigurable
euclidean detectors. The positive identification of the False Data Injection attack on bus 3 is depicted in
Figure 11.
Figure 10. Proposed false data injection attack using IEEE 9-bus structure
Int J Pow Elec & Dri Syst ISSN: 2088-8694 
Efficient detection of faults and false data injection attacks in smart grid … (Prakyath Dayananda)
2095
Figure 11. IEEE 9 bus system used to detect the false data attack
6. CONCLUSION
The proposed method is implemented using reconfigurable Kalman filter, 𝜒2
detector and
reconfigurable euclidean detector for smart grid system. The proposed system has improved the detection
efficiency of the different types of faults and attacks such as DDoS, FDIA and Random attacks compared to
the conventional methods (0.51%,0.3% and 0.42%). The proposed model improves the security and
controlling capability of smart grid by reducing Euclidean detector noise. With respect simulation analysis, it
shows the proposed method improves detection rate and security compared with conventional methods.
Future scope: The proposed methods is enhanced to detect the faults in smart electric meters in residential
area along with detection of faults and attacks in smart grids.
ACKNOWLEDGEMENTS
The authors would like to thank, SJB Institute of Technology, Bengaluru, JSS Academy of
Technical Education, Bengaluru, Sri Jayachamarajendra College of Engineering, Mysore, Visvesvaraya
Technological University (VTU), Belagavi and Vision Group on Science and Technology (VGST) Karnataka
Fund for Infrastructure strengthening in Science & Technology Level-2 sponsored “Establishment of
Renewable Smart Grid Laboratory” for all the support and encouragement provided by them to take up this
research work and publish this paper.
REFERENCES
[1] S. R. Salkuti, “Artificial fish swarm optimization algorithm for power system state estimation,” Indonesian Journal of Electrical
Engineering and Computer Science, 2020, pp. 1130-1137, doi: 10.11591/ijeecs.v18.i3.pp1130-1137.
[2] Y. B. S. Bri, “Torque estimator using MPPT method for wind turbines,” International Journal of Electrical and Computer
Engineering, 2020, pp. 1208-1219, doi: 10.11591/ijece.v10i2.pp1208-1219.
[3] M. Khalaf, A. Youssef and E. El-Saadany, “Detection of false data injection in automatic generation control systems using Kalman
filter,” IEEE Electrical Power and Energy Conference (EPEC), 2017, pp. 1-6, doi: 10.1109/EPEC.2017.8286194.
 ISSN: 2088-8694
Int J Pow Elec & Dri Syst, Vol. 13, No. 4, December 2022: 2086-2097
2096
[4] M. M. Rana and L. Li, “Distributed Generation Monitoring of Smart Grid Using Accuracy Dependent Kalman Filter with
Communication Systems,” 12th International Conference on Information Technology - New Generations, 2015, pp. 496-500, doi:
10.1109/ITNG.2015.154.
[5] Y. Wang, Z. Zhang, J. Ma and Q. Jin, “KFRNN: An effective false data injection attack detection in smart grid based on Kalman
filter and recurrent neural network,” IEEE Internet of Things Journal, vol. 9, no. 9, pp. 6893-6904, 2022, doi:
10.1109/JIOT.2021.3113900.
[6] Y. Liu and L. Cheng, “Relentless false data injection attacks against kalman filter based detection in smart grid,” IEEE
Transactions on Control of Network Systems, doi: 10.1109/TCNS.2022.3141026.
[7] J. Sawodny, O. Riedel and T. Namerikawa, “Detection of attacks in smart grids via extended Kalman filter and correlation
analysis,” 59th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), 2020, pp. 663-669, doi:
10.23919/SICE48898.2020.9240229.
[8] S. H. Mohamad, M. A. M. Radzi, N. F. Mailah, N. I. A. Wahab, A. Jidin and M. Y. Lada, “Adaptive notch filter under indirect and
direct current controls for active power filter,” Bulletin of Electrical Engineering and Informatics, vol. 9, no. 5, pp. 1794-1802,
2020, doi. 10.11591/eei.v9i5.2165.
[9] Y. Zhang, H. Wang and H. Wang, “Integrated navigation positioning algorithm based on improved Kalman Filter,” International
Conference on Smart Grid and Electrical Automation (ICSGEA), 2017, pp. 255-259, doi: 10.1109/ICSGEA.2017.55.
[10] Y. Jiang and Q. Hui, “Kalman filter with diffusion strategies for detecting power grid false data injection attacks,” IEEE
International Conference on Electro Information Technology (EIT), 2017, pp. 254-259, doi: 10.1109/EIT.2017.8053365.
[11] F. Akbarian, A. Ramezani, M. -T. Hamidi-Beheshti and V. Haghighat, “Intrusion detection on critical smart grid infrastructure,”
Smart Grid Conference (SGC), 2018, pp. 1-6, doi: 10.1109/SGC.2018.8777815.
[12] R. Shivaji, k. R. Nataraj, S. Mallikarjunaswamy ank K. R. Rekha, “Implementation of an effective hybrid partial transmit sequence
model for peak to average power ratio in MIMO OFDM system,” ICDSMLA 2020. Lecture Notes in Electrical Engineering,
Springer, vol. 783. PP. 1343-1353, 2020, doi: 10.1007/978-981-16-3690-5_129.
[13] B. Aissa, T. Hamza, G. Yacine, and N. Mohamed, “Impact of sensorless neural direct torque controlin a fuel cell traction system,”
International Journal of Electrical and Computer Engineering, vol. 11, no. 4, pp. 2725-2732, 2021, doi:
10.11591/ijece.v11i4.pp2725-2732.
[14] N. Zhou, D. Meng, Z. Huang and G. Welch, “Dynamic state estimation of a synchronous machine Using PMU data: a comparative
study,” IEEE Transactions on Smart Grid, vol. 6, no. 1, pp. 450-460, 2015, doi: 10.1109/TSG.2014.2345698.
[15] T. N. Manjunath, S. Mallikarjunaswamy, M. Komala, N. Sharmila and K. S. Manu, “An efficient hybrid reconfigurable wind gas
turbine power management system using MPPT algorithm,” International Journal of Power Electronics and Drive Systems, vol.
12, no. 4, pp. 2501-2510, 2021, doi: 10.11591/ijpeds.v12.i4.pp2501-2510.
[16] J. Zhao and L. Mili, “A decentralized h-infinity unscented Kalman filter for dynamic state estimation against uncertainties,” IEEE
Transactions on Smart Grid, vol. 10, no. 5, pp. 4870-4880, 2019, doi: 10.1109/TSG.2018.2870327.
[17] M. M. Rana, “Extended Kalman filter based distributed state estimation algorithm for cyber physical systems,” 3rd International
Conference on Inventive Computation Technologies (ICICT), 2018, pp. 653-655, doi: 10.1109/ICICT43934.2018.9034255.
[18] K. Manandhar, C. Xiaojun, F. Hu and Y. Liu, “Combating false data injection attacks in smart grid using Kalman filter,”
International Conference on Computing, Networking and Communications (ICNC), 2014, pp. 16-20, doi:
10.1109/ICCNC.2014.6785297.
[19] S. R. Salkuti, S. Pagidipala, and S. C. Kim, “Comprehensive analysis of current research trends in energy storage technologies,”
Indonesian Journal of Electrical Engineering and Computer Science, vol. 24, no. 3, pp. 1288-1296,. 2021, doi:
10.11591/ijeecs.v24.i3.pp1288-1296.
[20] S. Mallikarjunaswamy, N. Sharmila, G. K. Siddesh, K. R. Nataraj, M. Komala, “A novel architecture for cluster based false data
injection attack detection and location identification in smart grid. advances in thermofluids and renewable energy,” Lecture Notes
in Mechanical Engineering. Springer, Singapore, 2021, doi: 10.1007/978-981-16-3497-0_48.
[21] S. Mallikarjunaswamy, N. Sharmila, D. M. Kumar, M. Komala and H. N. Mahendra, “Implementation of an effective hybrid
model for islanded microgrid energy management,” Indian Journal of Science and Technology, vol. 13, no. 27, pp. 2733-2746,
2020, doi: 10.17485/IJST/v13i27.982.
[22] T. A. Madhu, M. Komala, V. Rekha, S. Mallikarjunaswamy, N. Sharmila and S. Pooja, “Design of fuzzy logic-controlled hybrid
model for the control of voltage and frequency in microgrid,” Indian Journal of Science and Technology, vol. 13, no. 35, pp. 3612-
3629, 2020, doi: 10.17485/IJST/v13i35.1510.
[23] V. P. Bhuvana, M. Huemer and A. Tonello, “Battery internal state estimation using a mixed Kalman cubature filter,” IEEE
International Conference on Smart Grid Communications (SmartGridComm), 2015, pp. 521-526, doi:
10.1109/SmartGridComm.2015.7436353.
[24] H. Abbes, H. Abid, K. Loukil, M. Abid and A. Toumi, “Fuzzy-based MPPT algorithm implementation on FPGA chip for multi-
channel photovoltaic system,” International Journal of Reconfigurable and Embedded Systems, vol. 11, no. 1, pp. 49-58, 2022,
doi: 10.11591/ijres.v11.i1.pp49-58.
[25] B. Özsoy and M. Göl, “A hybrid state estimation strategy with optimal use of pseudo-measurements,” IEEE PES Innovative Smart
Grid Technologies Conference Europe (ISGT-Europe), 2018, pp. 1-6, doi: 10.1109/ISGTEurope.2018.8571513.
[26] M. M. Rana, M. K. R. Khan and A. Abdelhadi, “IoT architecture for cyber-physical system state estimation using unscented
Kalman Filter,” Second International Conference on Inventive Research in Computing Applications (ICIRCA), 2020, pp. 910-913,
doi: 10.1109/ICIRCA48905.2020.9183350.
[27]I. Onyegbadue, C. Ogbuka and T. Madeume, “Robust least square approach for optimal development of quadratic fuel quantity
function for steam power stations,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 25, no. 2, pp. 732-
740, 2022, doi: 10.11591/ijeecs.v25.i2.pp732-740.
Int J Pow Elec & Dri Syst ISSN: 2088-8694 
Efficient detection of faults and false data injection attacks in smart grid … (Prakyath Dayananda)
2097
BIOGRAPHIES OF AUTHORS
Prakyath Dayananda has completed BE in EEE at CIT, Tumkur and M.Tech in
CAID at SSIT, Tumkur and secured Gold medal in M.Tech. I had 9 years Teaching experience
in teaching and am currently working as Assistant professor in SJBIT, Bangalore. He can be
contacted at email: prakyath100@gmail.com.
Mallikarjunaswamy Srikantaswamy is currently working as an Associate
Professor in Department of Electronics and Communication Engineering at JSS Academy of
Technical Education, Bangalore. He obtained his B. E degree in Telecommunication
Engineering from Visvesvaraya Technological University Belgaum in 2008, M. Tech degree
from Visvesvaraya Technological University Belgaum in 2010 and was awarded Ph. D from
Jain University in 2015.He has 11+ years of teaching experience. His research work has been
published in more than 42 International Journals and conference. He received funds from
different funding agencies. Currently guiding five research scholars in Visvesvaraya
Technological University Belgaum. He can be contacted at email:
mallikarjunaswamys@jssateb.ac.in.
Sharmila Nagaraju has completed her B.E in EEE at SJCE, Mysore and M. Tech
in CAID at NIE Mysore. Secured second rank in Bachelor of Engineering degree. She has
Eight years of experience in teaching and is currently working as an Assistant Professor in
RNSIT, Bangalore.electronics and its applications. She can be contacted at email:
Sharmila.n.89@gmail.com.
Rekha Velluri completed her B.E and M. Tech in Computer Science and
Engineering from Visvesavaraya Technological University Belgavi. She has more than 16
years of teaching experience. Published many papers in national and international conference
and currently working as an Assistant Professor in Christ University. She can be contacted at
email: rekha.v@christuniversity.in.
Doddananjedevaru Mahesh Kumar is presently working as Associate Professor
in the Dept. of Electronics and Instrumentation Engineering, JSS Academy of Technical
Education, Bengaluru. He is working in the teaching field from the past 21 years and has
published more than 30 papers in International Journals, National and International
Conferences. He has 4 patent publications & presently guiding three research scholars
under Visvesvaraya Technological University. His research areas include Biomedical Signal
Processing, Sensors and amp; and Transducers. He can be contacted at email:
dmkjssate@gmail.com.

More Related Content

Similar to Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter (20)

PDF
Fuzzy Logic-Based Fault Classification for Transmission Line Analysis
IRJET Journal
 
PDF
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET Journal
 
PDF
Secure authentication and data aggregation scheme for routing packets in wire...
IJECEIAES
 
PDF
A Defense-in-depth Cybersecurity for Smart Substations
IJECEIAES
 
PDF
Energy-efficient routing protocol for wireless sensor networks based on prog...
International Journal of Reconfigurable and Embedded Systems
 
PDF
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
chokrio
 
PDF
Smart Grid Resilience Issues & Enhancements
IRJET Journal
 
PDF
A Comprehensive Review of Artificial Neural Network Techniques Used for Smart...
ssuser793b4e
 
PDF
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
DETER-Project
 
PDF
International Journal of Engineering (IJE) Volume (3) Issue (1)
CSCJournals
 
PDF
Kezunovic project t 37-pserc_final_report_2010
backam78
 
PDF
TRANSMISSION LINE HEALTH PREDICTION SYSTEM IN HVDC AND HVAC LINES
IRJET Journal
 
PDF
Ameliorate the performance using soft computing approaches in wireless networks
IJECEIAES
 
PDF
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Onyebuchi nosiri
 
PDF
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Onyebuchi nosiri
 
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
DOCX
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
PDF
Development of electrocardiogram intelligent and wearable monitoring system-...
International Journal of Reconfigurable and Embedded Systems
 
PDF
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
chokrio
 
PDF
Cds based energy efficient topology control algorithm in wireless sensor net...
eSAT Journals
 
Fuzzy Logic-Based Fault Classification for Transmission Line Analysis
IRJET Journal
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET Journal
 
Secure authentication and data aggregation scheme for routing packets in wire...
IJECEIAES
 
A Defense-in-depth Cybersecurity for Smart Substations
IJECEIAES
 
Energy-efficient routing protocol for wireless sensor networks based on prog...
International Journal of Reconfigurable and Embedded Systems
 
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
chokrio
 
Smart Grid Resilience Issues & Enhancements
IRJET Journal
 
A Comprehensive Review of Artificial Neural Network Techniques Used for Smart...
ssuser793b4e
 
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
DETER-Project
 
International Journal of Engineering (IJE) Volume (3) Issue (1)
CSCJournals
 
Kezunovic project t 37-pserc_final_report_2010
backam78
 
TRANSMISSION LINE HEALTH PREDICTION SYSTEM IN HVDC AND HVAC LINES
IRJET Journal
 
Ameliorate the performance using soft computing approaches in wireless networks
IJECEIAES
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Onyebuchi nosiri
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Onyebuchi nosiri
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
Development of electrocardiogram intelligent and wearable monitoring system-...
International Journal of Reconfigurable and Embedded Systems
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
chokrio
 
Cds based energy efficient topology control algorithm in wireless sensor net...
eSAT Journals
 

More from International Journal of Power Electronics and Drive Systems (IJPEDS) (20)

PDF
Comparative study by numerical simulation of two methods for automatic flow c...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
Implementation of artificial intelligence for prediction performance of solar...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
Dynamic fuel cell model improvement based on macroscopic energy representation
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
Investigation of common mode voltages of single stage boost inverter for five...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
Dynamic modeling of an open cathode PEM fuel cell for automotive energy manag...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
A modified CPS-PWM for capacitor voltage reduction of MMC based variable spee...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
Firefly analytical hierarchy algorithm for optimal allocation and sizing of D...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
Optimal power flow using archimedes optimizer algorithm
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
Economic evaluation of induction motor based on motor’s nameplate data and in...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
Assessment of field oriented induction machine control strategy using new gen...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
A current sensor fault diagnosis method based on phase angle shift technique ...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
Optimized speed control with torque ripple reductions of BLDC motor based on ...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
Design and implementation of DC linear actuator and stepper motor for remote ...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
Milestone of the most used maximum power point tracking in solar harvesting s...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
Intelligent torque observer combined with backstepping sliding-mode control f...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
A novel multilevel inverter with reduced components and minimized voltage unb...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
A synchronization technique for single-phase grid applications
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
Torque ripple alleviation of a five-phase permanent magnet synchronous motor ...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
A novel interactive technique for load current harmonic reduction for any ran...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
PDF
A 1 MHz soft-switching boost DC-DC converter with matching network
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Comparative study by numerical simulation of two methods for automatic flow c...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Implementation of artificial intelligence for prediction performance of solar...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Dynamic fuel cell model improvement based on macroscopic energy representation
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Investigation of common mode voltages of single stage boost inverter for five...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Dynamic modeling of an open cathode PEM fuel cell for automotive energy manag...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
A modified CPS-PWM for capacitor voltage reduction of MMC based variable spee...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Firefly analytical hierarchy algorithm for optimal allocation and sizing of D...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Optimal power flow using archimedes optimizer algorithm
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Economic evaluation of induction motor based on motor’s nameplate data and in...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Assessment of field oriented induction machine control strategy using new gen...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
A current sensor fault diagnosis method based on phase angle shift technique ...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Optimized speed control with torque ripple reductions of BLDC motor based on ...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Design and implementation of DC linear actuator and stepper motor for remote ...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Milestone of the most used maximum power point tracking in solar harvesting s...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Intelligent torque observer combined with backstepping sliding-mode control f...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
A novel multilevel inverter with reduced components and minimized voltage unb...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
A synchronization technique for single-phase grid applications
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Torque ripple alleviation of a five-phase permanent magnet synchronous motor ...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
A novel interactive technique for load current harmonic reduction for any ran...
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
A 1 MHz soft-switching boost DC-DC converter with matching network
International Journal of Power Electronics and Drive Systems (IJPEDS)
 
Ad

Recently uploaded (20)

DOCX
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
PDF
Design Thinking basics for Engineers.pdf
CMR University
 
PDF
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
PDF
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PPTX
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
DOC
MRRS Strength and Durability of Concrete
CivilMythili
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PDF
monopile foundation seminar topic for civil engineering students
Ahina5
 
PDF
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PPTX
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
PPTX
Introduction to Design of Machine Elements
PradeepKumarS27
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
Design Thinking basics for Engineers.pdf
CMR University
 
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
Thermal runway and thermal stability.pptx
godow93766
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
MRRS Strength and Durability of Concrete
CivilMythili
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
monopile foundation seminar topic for civil engineering students
Ahina5
 
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
Hashing Introduction , hash functions and techniques
sailajam21
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
Introduction to Design of Machine Elements
PradeepKumarS27
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
Ad

Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter

  • 1. International Journal of Power Electronics and Drive Systems (IJPEDS) Vol. 13, No. 4, December 2022, pp. 2086~2097 ISSN: 2088-8694, DOI: 10.11591/ijpeds.v13.i4.pp2086-2097  2086 Journal homepage: http://ijpeds.iaescore.com Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter Prakyath Dayananda1 , Mallikarjunaswamy Srikantaswamy2 , Sharmila Nagaraju3 , Rekha Velluri4 , Doddananjedevaru Mahesh Kumar5 1 Department of Electrical and Electronics Engineering, SJB Institute of Technology, Bangalore, India 2 Department of Electronics and Communication Engineering, JSS Academy of Technical Education, Bangalore, India 3 Department of Electrical and Electronics Engineering, Sri Jayachamarajendra College of Engineering, Mysore, India 4 Department of Computer Science and Engineering, CHRIST (Deemed to be University), Bengaluru, India 5 Department of Electronics and Instrumentation Engineering, JSS Academy of Technical Education, Bangalore, India Article Info ABSTRACT Article history: Received Mar 17, 2022 Revised Aug 28, 2022 Accepted Sep 19, 2022 The distribution denial of service (DDoS) attack, fault data injection attack (FDIA) and random attack is reduced. The monitoring and security of smart grid systems are improved using reconfigurable Kalman filter. Methods: A sinusoidal voltage signal with random Gaussian noise is applied to the Reconfigurable Euclidean detector (RED) evaluator. The MATLAB function randn() has been used to produce sequence distribution channel noise with mean value zero to analysed the amplitude variation with respect to evolution state variable. The detector noise rate is analysed with respect to threshold. The detection rate of various attacks such as DDOS, Random and false data injection attacks is also analysed. The proposed mathematical model is effectively reconstructed to frame the original sinusoidal signal from the evaluator state variable using reconfigurable Euclidean detectors. Keywords: False data injection attack Kalman filter Random attack Reconfigurable Euclidean detector Smart grid This is an open access article under the CC BY-SA license. Corresponding Author: Mallikarjunaswamy Srikantaswamy Department of Electronics and Communication Engineering, JSS Academy of Technical Education JSSATE-B Campus, Dr. Vishnuvardhan Road, Uttarahalli - Kengeri Main Road Srinivaspura-Post Bengaluru – 560060 Karnataka, India Email: [email protected] 1. INTRODUCTION The Power grid is considered to be a significant backbone of infrastructure, which has a profound effect on the economy and the day-to-day routines. Fiascos in the power grid normally have shattering effects. With the beginning of fresh skills, the out-of-the-way power grid is updated by a grid that is a distinctive smart cyber-physical system (CPS) that includes additional implanted smartness and networking competence. Sensors are furnished all over the system to observe different grid features, like the meter & voltage fluxes in such arrangements [1]−[3]. The gathered data by the sensors aids to give a reaction to the physical power grids. So, that kind of a CPS comprises two-approach messages among the controller scheme and the physical apparatuses as depicted in Figure 1. Numerous evolving attacks precisely aiming at the control and communication arrangements in smart grid are uncovered. A broad approach to detect physical altering is done by a process of installing an evaluator along with a corresponding detector in the given controller. A remarkable variance among the estimated and measured states indicates a likely attack on the structure. Here, we showcase a framework of security utilizing the Kalman filter (KF) for a given smart grid. The KF produces assessments for state variables by means of the mathematical prototype for the power grid & the information got by the system of sensors is installed so as to observe the power grid. Then we can also
  • 2. Int J Pow Elec & Dri Syst ISSN: 2088-8694  Efficient detection of faults and false data injection attacks in smart grid … (Prakyath Dayananda) 2087 use a χ2 -detector which can further be used to identify the inconsistencies amid the assessed data & the experimental data and trigger alarms [4]. Nevertheless, the learning depicts that the χ2-detector can’t identify the statistically resultant false data injection attack. We broadly examine this attack, along with the planned KF framework and project a supplementary detection method by means of the Euclidean distance metric [5], [6]. The main objectives include i) we plan a mathematical prototype along with the KF to identify likely attacks & errors on the system of smart grid, ii) then examine the functioning of the investigative technique χ2-detector, in recognizing errors & arbitrary attacks, and iii) we evaluate the restraint of the χ2 detector in sensing the analytically resultant false data injection attack and consequently project a fresh detector of Euclidean to be joined with KF and d) then showcase the efficacy of the planned methods through widespread simulations & study on real-world systems. The remaining work is structured as below. Section 2 shows the motivation & the associated work on smart-grid security. Section 3 shows the planned structure, the measured prototype of the power grid & the KF estimator. Section 4 shows the two detectors employed in the structure so as to identify different attacks in the arrangement. In section 5, outcomes of the planned framework and the interpretations are detailed. Lastly, section 4 details the conclusion. Figure 1. Fundamental block diagram of a smart grid system 2. MOTIVATION AND RELATED WORK In this segment, we examine different security aspects deliberated in the literature. The modern studies on smart grid security could be largely classified into three sets. The research in the first group pacts with the wired or wireless security of networking between cyber constituents in the smart grid. The work inside second group would examine the early detection of abnormalities in the structure. The early anomaly detection methods can forehandedly safeguard the system. The research in the third group smears the control theories in the security procedure utilizing different state assessment & revealing methods. A signature-dependent message validation system was projected, that works in the multicast authentication format in order to lessen the size of signature & bandwidth of communiqué at the price of augmented calculation. The projected method includes detecting, reacting, data recollecting & alarm supervision mechanisms. An error inside the smart grid scheme is constantly shown in the method of alteration in voltage, phase or current. Prevailing security methods are either i) not feasible, ii) mismatched with the smart grid, iii) not suitably scalable, or iv) not sufficient. Our research shows a structure, dependent on a state-space system obtained by the voltage stream reckonings, to secure various kinds of attacks & errors, corresponding to the Injection attack of the false data. We project an altered detector dependent on the metric of Euclidean distance to identify a complex Injection attack of the given false data over the power grid mechanism. 3. PROJECTED STRUCTURE FOR SMART GRID BY MEANS OF RED In this segment, we showcase the complete report of the structure of the given security for the smart grid which is utilizing the KF. The structure is proficient in identifying different assaults, including short & long-term arbitrary attacks including the development of a state-space prototype by the three-phase
  • 3.  ISSN: 2088-8694 Int J Pow Elec & Dri Syst, Vol. 13, No. 4, December 2022: 2086-2097 2088 sinusoidal voltage reckonings [7]−[9]. Figure 2 depicts the projected structure of security, where we can see that KF assesses the figures for the given state parameters depending on state of the system and the statistics from various values of sensors. The KF produced projected values and the detected figures alongside variables of state are then given inside the detector. After this, the two-state vectors are equated by the detector. If the two vary from each other considerably and are above an assured pre-calculated threshold, an alarm to imply a likely smart grid attack is initiated by the detector. Figure 2. Security execution protocols of the smart grid system 3.1. Prototype of state space The power structure installs sensors, like phasor units of measurement, so as to assess the system state at different places and stint to make sure of the even operation of the power scheme. the sinusoidal voltage mathematical model is given in (1). the three phases voltage signals are given in (2) and (3) respectively [10], [11]. 𝑆1(𝑡) = 𝐴𝑓 cos(𝑤𝑡 + 𝜑) (1) 𝑆2(𝑡) = 𝐴𝑓 cos(𝑤𝑡 + 𝜑 − 2𝜋 3 ) (2) 𝑆2(𝑡) = 𝐴𝑓 cos(𝑤𝑡 + 𝜑 − 4𝜋 3 ) (3) Extension of (1) as shown in (4). 𝑆1(𝑡) = 𝐴𝑓 ∗ 𝑐𝑜𝑠𝑤𝑡 ∗ 𝑐𝑜𝑠𝜑 − 𝐴𝑓 ∗ 𝑠𝑖𝑛𝑤𝑡 ∗ 𝑠𝑖𝑛 𝜑 (4) Where 𝐴𝑓 is described the amplitude function, 𝑤𝑡 is represented as the angular frequency and 𝜑 is identified as phase angle with respect to time. When the angular frequency is constant with respect to the time then amplitude and phase can be represented in state-space model is given in (5). 𝑆1(𝑡) = 𝑔1 ∗ cos 𝑤𝑡 − 𝑔2 ∗ sin 𝑤𝑡 (5) Where 𝑔1 = 𝐴𝑓 8 cos 𝜑 and 𝑔2 = 𝐴𝑓 𝑜 sin 𝜑 is the state variables at no delay condition in the model. The tiny noise is applied to the system and this condition is given in (6). [ 𝑔1(𝑡 + 1) 𝑔2(𝑡 + 2) ] = [ 1 0 0 1 ] [ 𝑔1(𝑡) 𝑔2(𝑡) ] + 𝑤(𝑡) (6) In (6) can be represented in simplest form and it is given in (7). 𝑔(𝑡 + 1) = [ 1 0 0 1 ] 𝑔(𝑡) + 𝑤(𝑡) (7) Where 𝑔(𝑡) = [ 𝑔1(𝑡) 𝑔2(𝑡) ] and 𝑤(𝑡) is described as process noise. At nonstationary deterministic condition the actual voltage signal is given in (8). Where ℎ(𝑡) is describes the actual voltage signal with respect to time and 𝛤(𝑡) is represents the measurement noise.
  • 4. Int J Pow Elec & Dri Syst ISSN: 2088-8694  Efficient detection of faults and false data injection attacks in smart grid … (Prakyath Dayananda) 2089 ℎ(𝑡) = [𝑐𝑜𝑠𝑤𝑡 − 𝑠𝑖𝑛𝑤𝑡] [ 𝑔1(𝑡) 𝑔2(𝑡) ] + 𝛤(𝑡) (8) 3.2. Reconfigurable Kalman filter (RKF) Figure 3 depicts the control system alongside the KF entrenched on the approximation of the vector of state & detector in order to do the identification of errors [12], [13]. The (9) represents the KF technique where = [ 1 0 0 1 ] , from in (8) it can be represented in simplest form and it is given in (10). 𝑔(𝑡 + 1) = 𝐴𝑔(𝑡) + 𝑤(𝑡) (9) ℎ(𝑡) = 𝑉 𝑐(𝑡)𝑥(𝑡) + 𝑠(𝑡) (10) Where ℎ(𝑡) is identified as sensor measurement vector, 𝑉 𝑐(𝑡) is represents the [𝑐𝑜𝑠𝑤𝑡 − 𝑠𝑖𝑛𝑤𝑡] and 𝑠(𝑡) is described as a white gaussian noise at mean is zero and standard deviation ‘ρ’ it is not depend on process noise and initial condition [14], [15]. The KF mean and covariance of the evaluator is defined by (11)-(14). 𝑠̂(𝑡|𝑡) = 𝐸𝑠𝑡[𝑔(𝑡), ℎ(𝑡), … … . ℎ(𝑡)] (11) 𝑠̂(𝑡|𝑡 − 1) = 𝐸𝑠𝑡[𝑔(𝑡), ℎ(𝑡), … … . ℎ(𝑡 − 1)] (12) 𝑃𝑡(𝑡|𝑡) = ∑(𝑡|𝑡 − 1) (13) 𝑃𝑡(𝑡|𝑡 − 1) = ∑(𝑡|𝑡 − 1) (14) Where, 𝑠̂(𝑡|𝑡) is represents the signal evaluator with respect to ‘t’, 𝑠̂(𝑡|𝑡 − 1) is describes the signal evaluator with respect to time ‘t-1’, 𝑃𝑡(𝑡|𝑡) is identified as covariance of the Evaluator with respect to the ‘t’ and 𝑃𝑡(𝑡|𝑡 − 1) is represents the covariance of the Evaluator with respect to the ‘t-1’. The KF Iteration process is represented by (15) and (16). 𝑠̂(𝑡 + 1|𝑡) = 𝐴𝑠̂(𝑡) (15) 𝑃𝑡(𝑡|𝑡 − 1) = 𝐴𝑃𝑡(𝑡 − 1)𝐴𝑇 + 𝑍 (16) Where 𝑠̂(𝑡 + 1|𝑡) is represents the state and covariance of the evaluator with respect to t to t+1-time steps, 𝑃𝑡(𝑡|𝑡 − 1) is describes the covariance of the evaluator with respect to t-1 to t and ‘Z’ is represents the covariance matrix process noise [16], [17]. The RKF measuring updates are represented by (17)-(19). 𝐾𝐴(𝑡) = 𝑃𝑡(𝑡|𝑡 − 1)𝑉 𝑐(𝑡)𝑇 (𝑉 𝑐(𝑡)𝑃𝑡(𝑡|𝑡 − 1)𝑉 𝑐(𝑡)𝑇 + 𝑅)−1 ) (17) 𝑃𝑡(𝑡|𝑡) = 𝑃𝑡(𝑡|𝑡 − 1) − 𝐾𝐴(𝑡)𝑉 𝑐(𝑡)𝑃(𝑡|𝑡 − 1) (18) 𝑠̂(𝑡) = 𝑠̂(𝑡|𝑡 − 1) + 𝐾𝐴(𝑡)(ℎ(𝑡) − 𝑉 𝑐(𝑡)𝑠̂(𝑡|𝑡 − 1)) (19) Where 𝐾𝐴(𝑡) is described the reconfigurable Kalman gain and R represents the covariance matrix noise analysis. The Kalman Gain before the evaluation is represented by (20), (21) and enhancement of (19) is given in (22). The evaluation error 𝛿 (𝑡) is represented in (23). 𝑃 ≜ lim 𝑘→∞ 𝑃𝑡(𝑡|𝑡 − 1) (20) 𝐾𝐴 = 𝑃𝑡 𝑉 𝑐 𝑇 (𝑉 𝑐𝑃𝑡 − 1)−1 (21) 𝑠̂(𝑡 + 1) = 𝐴𝑠̂(𝑡|𝑡) + 𝐾𝐴[(ℎ(𝑡 + 1) − 𝑉 𝑐𝐴𝑠̂(𝑡) + 𝛽𝑢(𝑡)] (22) 𝛿 (𝑡) ≜ 𝑠̂(𝑡) − 𝑠(𝑡) (23) 3.3. Model generalization The state-space model is detailed in section 3. It could be widespread for power grid dimensions. The voltage monitored at every bus could stay in the method of a sinusoidal [18], [19]. Let us study the three- phase bus structure as shown in Figure 4.
  • 5.  ISSN: 2088-8694 Int J Pow Elec & Dri Syst, Vol. 13, No. 4, December 2022: 2086-2097 2090 𝜁𝑥 = ∑ |𝑆𝑥||𝑆𝑖|𝑍𝑥𝑖 sin(𝜑𝑥 − 𝜑𝑖) − cos (𝜑𝑥 − 𝜑𝑖) 𝑛 𝑖=1 (24) 𝜌𝑥 = ∑ |𝑆𝑥||𝑆𝑖|𝑍𝑥𝑖 sin(𝜑𝑥 − 𝜑𝑖) − cos (𝜑𝑥 − 𝜑𝑖) 𝑛 𝑖=1 (25) Where |𝑆𝑥| is represented the voltage amplitude, |𝑆𝑖| has described the phase, 𝑍𝑥𝑖 is identified as gain, 𝜁𝑥 is represented the active power, 𝜌𝑥 has described reactive power and x is the number of system buses [20], [21]. To determine unknown variables in each system buses by (24) and (25). Figure 3. Proposed power grid Figure 4. Fundamental three bus structure 3.4. Model of attack The model attack occurs when FDIA gets introduced to the smart grid system. It is able to control a sub set of the sensor readings in the system. It is presumed that the invader is capable of controlling a subdivision of the sensor evaluations in the structure. there are three types of attacks namely: i) DDoS, ii) random, and iii) false data injection [22], [23]. 3.5. DDoS attack The DDoS attack is jamming the communication channel, compromising devices and flooding packets in networks to avoid data transfer. This kind of assault is such that wherein an opponent extracts few or every constituent of an unreachable control system. The bout of DDoS could be on control, sensor, or on both data. 3.6. Random attack Here, the assaults aren’t constructed to bypass the discovery procedure executed by the central system. Such arbitrary attacks can be produced at any point in time. ℎ′(𝑡) = 𝑉 𝑐(𝑡)𝑔′(𝑡) + 𝑠(𝑡) + ℎ𝑎(𝑡) (26) Where ℎ𝑎(𝑡) is represented the random attack vector, ℎ′(𝑡) is described as model observation and 𝑔′(𝑡) is identified as system process states [24]. 3.7. False data-injection attack It is alleged so as to know that the attacker is aware of the model of a given system, having variables 𝜌 R, A, 𝛽, 𝑉 𝑐 and gain 𝐾𝐴. The attacker could as well regulate a subdivision of sensors (Sbad). Where 𝜏 is represented the sensor selection matrix 𝜏 = 𝑑𝑖𝑎𝑔(𝛾1 + 𝛾1 + 𝛾2 + 𝛾3 + 𝛾4+, … … … . +𝛾𝑚) and 𝑥 ∈ 𝑆𝑏𝑎𝑑.
  • 6. Int J Pow Elec & Dri Syst ISSN: 2088-8694  Efficient detection of faults and false data injection attacks in smart grid … (Prakyath Dayananda) 2091 ℎ′(𝑡) = 𝑉 𝑐(𝑡)𝑔′(𝑡) + 𝑠(𝑡) + 𝜏ℎ𝑎(𝑡) (27) 4. ATTACK DETECTOR The RKF predictor computes the system state by means of the reckonings detailed in section 3.2. As the readings of a given meter are evident for that state, the planned assessments and the authentic meter evaluations are paralleled by the detector. In case the variance among the two is over an earlier calculated threshold, an alarm is generated to inform a likely attack [25], [26]. 4.1. 𝝌𝟐 -detector The 𝜒2 -detector is a traditional one which castoff with RKF. The 𝜒2 --detector constructs 𝜒2 -test measurements from the RKF and parallels those with the threshold got from the customary 𝜒2 -Table 1 [27]. Let the residue 𝑅(𝑡 + 1) at k+1 sec be determined by (28) and a simplified (30) is presented by (29). The scalar test statistics of 𝜒2 -detector is given in (30). 𝑅(𝑡 + 1) ≜ ℎ(𝑡 + 1) − ℎ ̂(𝑡 + 1|𝑡) (28) 𝑅(𝑡 + 1) ≜ ℎ(𝑡 + 1) − 𝑉 𝑐(𝐴𝑠̂(𝑡)) (29) 𝑤(𝑡) = 𝑅(𝑡)𝑇𝐵 (𝑡)𝑅(𝑡) Where 𝑤(𝑡) is represented as the precomputed threshold and B (t) is described as the covariance matric of R (t). The reconstructed sinusoidal signals from evaluator of the reconfigurable Euclidean detector. The comparison analysis has been done with conventional methods by (30). Where 𝜁 is represented the amplitude and 𝜌 is described the evaluated voltage signal amplitude. Table 1 shows the experimental setup of 𝜒2 - detector used PKF. 𝑑(𝜁, 𝜌) = √(𝜁1 − 𝜌1)2 + (𝜁1 − 𝜌1)2 + (𝜁1 − 𝜌1)3 + ⋯ … … … … … + (𝜁𝑛 − 𝜌𝑛)2 (30) Table 1. Reconfigurable Kalman filter experimental setup Particular Quantity Initial covariance matric 𝜁 (0|0) Identified matrix Frequency 65 Hz The initial value for 𝑠1 (0) 0 The initial value for 𝑠2 (0) 0 Amplitude 1 Volt Sampling frequencies 2.5 Hz 4.2. Detector executing the distance metric of Euclidean The false data injection assault is sensibly made to avoid the numerical detector, like the 𝜒2 - detectors. So, to identify such kinds of assaults, we acclaim a reconfigurable euclidean-based detector, that computes the aberration of the experiential figures compared to the assessed figures. To implement the reconfigurable euclidean detector, initially, sinusoidal signals are built from the state assessments and then equated with the quantities got from the sensors as depicted. If the variance among the two is more than the threshold ‘3α’ where α is represented the standard deviation, as in the situation of the 𝜒2 -detector, an alarm is produced. To reduce to 99.85% of false positives obtained because of noise, we fix the threshold. 5. IMPLEMENTATION AND EVALUATION OF PERFORMANCE We executed the RKF Evaluator, Euclidean detector, and 𝜒2 -detector making use of MATLAB. The research setup and the preliminary figures are depicted in Table 1. A 65Hz signal of the sinusoidal voltage having arbitrary Gaussian noise is produced and given to the RKF estimator by way of the input. The input & the consequent sinusoidal signal got utilizing the state assessments are shown in Figures 5 to 9. 5.1. Attack/error detection utilizing the 𝝌𝟐 −detector Figure 5 depicts the simulation consequences utilizing the 𝜒2 -detector in the lack of attacks for some amount of duration. We can see that the assessed figures got from the KF estimator overlay with the input signal showing there is no change amongst the projected and the experimental figures. The RKF functions iteratively by amending its assessments utilizing the state-space model and the values got & the
  • 7.  ISSN: 2088-8694 Int J Pow Elec & Dri Syst, Vol. 13, No. 4, December 2022: 2086-2097 2092 assessments slowly congregate through the input signal. In the time of assaults, the projected assessments will not agree with the experiential analysis and w(t) surpasses the threshold as depicted in Figure 6 depicts a short-duration attack being identified by the structure. Figure 7 depicts the discovery of the attack of the DDoS. Figure 5. No attack/fault signal transfer response using χ2 -detector Figure 6. random attack for a short period transfer response using χ2 –detector 5.2. False data injection attack detection using RKF Here, it so happens that it injects forged sensor measurements which can mislead the system by executing the RKF estimator with the χ2-detector. The attack sequence can be obtained from in (31). Where ‘n’ is the represents the measurement of state space, ℎ∗ = 𝑉 𝑐𝑠, 𝑀 = 𝑚𝑎𝑥𝑖=,1,2,3, 4…...n-1, ℎ𝑎(𝑛 + 𝑡) = ℎ𝑎(𝑡) − 𝜆(𝑥+1) 𝑀 ℎ∗ (31) The source of the assault arrangement confirms that it overcomes the detector and upsurges the fault in the assessment of the state. The second subgraph in Figure 7 depicts the behavior of the 𝜒2 -detector beneath the injection attack of the false data. We observe the approximations don’t match with the experimented figures in the top subgraph in Figure 7 Nevertheless, w(t) never surpasses the threshold. We talk about this disadvantage in the subsequent phase by utilizing the Euclidean detector that could detect such attacks by continually observing the variation amongst the estimated and the experimented values.
  • 8. Int J Pow Elec & Dri Syst ISSN: 2088-8694  Efficient detection of faults and false data injection attacks in smart grid … (Prakyath Dayananda) 2093 Figure 7. DDoS attack for a short period transfer response using χ2 –detector 5.3. False data injection attack discovery utilizing the Euclidean detector This detector equates the alteration among the data experimented and the assessed data depending on the metric of the Euclidean distance. Nevertheless, to evade fake alarms due to dimension faults, we set the threshold to 3α as detailed in section IVB. Figure 8 shows the graph of the metric of the Euclidean distance while an attack is not there in the structure and the below subgraph in Figure 8 shows the plot when false data injection assault is there inside the structure. Figure 8. No attack/fault signal transfer response using reconfigurable Euclidean distance 5.4. Load change In the prototype obtained, it is presumed that the load in the system is persistent. If at all we have a load change, then, there will be an alteration in the signal voltage through the buses. In case we know the load profile, then the change in amplitude of voltage produced because of the load change can be predicted. The factors inside the RKF can be attuned to reproduce the alteration inside the voltage because of the alteration in load. It permits us to get assessments for the state variables subsequent to the change in load. Figure 9 depicts that the assessments meticulously trail the signal along with the load alteration at time step 0.08, the random bout is identified by the 𝜒2 detector & Euclidean detector in such situation. 0.00 0.02 0.04 0.06 0.08 0.10 -1.5 -1.0 -0.5 0.0 0.5 1.0 1.5 Simulation Signal Time (s) Input signal Evaluated Signal 0.00 0.02 0.04 0.06 0.08 0.10 0 2 4 6 8 Simulated Signal Time (A) W(t) Thershold
  • 9.  ISSN: 2088-8694 Int J Pow Elec & Dri Syst, Vol. 13, No. 4, December 2022: 2086-2097 2094 5.5. Χ2 -Detector versus reconfigurable Euclidean detector The likelihood of assault discovery in either of detectors is mainly reliant on the assessment of the threshold. In 𝜒2 - detector, the verge is got from the 𝜒2 Table 1 Likewise, in reconfigurable Euclidean detector, the Gaussian distribution standard deviation gives the threshold. Here in our research, the fixing of the significance of the thresholds in either of detectors to screen 99.15% of noise is done. Hence, the likelihood of wrong alarms because of noise will be less than 0.85%. Normally, the Euclidean detector is considered extra sensitive for variations than compared to the 𝜒2 - detector. In case the noise factors are not recognized before, the 𝜒2 -detector is better because it manages the soft faults better. Nevertheless, a drawback of the 𝜒2 -detector compared to the reconfigurable Euclidean detector is its incompetence to identify a false data injection assault. Figure 9. DDoS attack for a short period transfer response using reconfigurable Euclidean distance 5.6. Proposed IEEE 9-bus system using RED to detect false data injection attack Figure 10 depicts a 9-bus structure of IEEE with sensors to observe the state factors and the estimator for bus 3. The 9-bus structure is replicated using the MATPOWER platform in MATLAB. The voltages and phases, got by unravelling the 9-bus power structure in MATPOWER, are utilized like factors of state in the RKF estimator. A related framework could be presumed for every bus in the structure. In order to understand, merely bus 3 is deliberated. The assault order ℎ𝑎 is produced by the opponent. The sensors which are there in the bus inform their interpretations to the matching RKF estimators and reconfigurable euclidean detectors. The positive identification of the False Data Injection attack on bus 3 is depicted in Figure 11. Figure 10. Proposed false data injection attack using IEEE 9-bus structure
  • 10. Int J Pow Elec & Dri Syst ISSN: 2088-8694  Efficient detection of faults and false data injection attacks in smart grid … (Prakyath Dayananda) 2095 Figure 11. IEEE 9 bus system used to detect the false data attack 6. CONCLUSION The proposed method is implemented using reconfigurable Kalman filter, 𝜒2 detector and reconfigurable euclidean detector for smart grid system. The proposed system has improved the detection efficiency of the different types of faults and attacks such as DDoS, FDIA and Random attacks compared to the conventional methods (0.51%,0.3% and 0.42%). The proposed model improves the security and controlling capability of smart grid by reducing Euclidean detector noise. With respect simulation analysis, it shows the proposed method improves detection rate and security compared with conventional methods. Future scope: The proposed methods is enhanced to detect the faults in smart electric meters in residential area along with detection of faults and attacks in smart grids. ACKNOWLEDGEMENTS The authors would like to thank, SJB Institute of Technology, Bengaluru, JSS Academy of Technical Education, Bengaluru, Sri Jayachamarajendra College of Engineering, Mysore, Visvesvaraya Technological University (VTU), Belagavi and Vision Group on Science and Technology (VGST) Karnataka Fund for Infrastructure strengthening in Science & Technology Level-2 sponsored “Establishment of Renewable Smart Grid Laboratory” for all the support and encouragement provided by them to take up this research work and publish this paper. REFERENCES [1] S. R. Salkuti, “Artificial fish swarm optimization algorithm for power system state estimation,” Indonesian Journal of Electrical Engineering and Computer Science, 2020, pp. 1130-1137, doi: 10.11591/ijeecs.v18.i3.pp1130-1137. [2] Y. B. S. Bri, “Torque estimator using MPPT method for wind turbines,” International Journal of Electrical and Computer Engineering, 2020, pp. 1208-1219, doi: 10.11591/ijece.v10i2.pp1208-1219. [3] M. Khalaf, A. Youssef and E. El-Saadany, “Detection of false data injection in automatic generation control systems using Kalman filter,” IEEE Electrical Power and Energy Conference (EPEC), 2017, pp. 1-6, doi: 10.1109/EPEC.2017.8286194.
  • 11.  ISSN: 2088-8694 Int J Pow Elec & Dri Syst, Vol. 13, No. 4, December 2022: 2086-2097 2096 [4] M. M. Rana and L. Li, “Distributed Generation Monitoring of Smart Grid Using Accuracy Dependent Kalman Filter with Communication Systems,” 12th International Conference on Information Technology - New Generations, 2015, pp. 496-500, doi: 10.1109/ITNG.2015.154. [5] Y. Wang, Z. Zhang, J. Ma and Q. Jin, “KFRNN: An effective false data injection attack detection in smart grid based on Kalman filter and recurrent neural network,” IEEE Internet of Things Journal, vol. 9, no. 9, pp. 6893-6904, 2022, doi: 10.1109/JIOT.2021.3113900. [6] Y. Liu and L. Cheng, “Relentless false data injection attacks against kalman filter based detection in smart grid,” IEEE Transactions on Control of Network Systems, doi: 10.1109/TCNS.2022.3141026. [7] J. Sawodny, O. Riedel and T. Namerikawa, “Detection of attacks in smart grids via extended Kalman filter and correlation analysis,” 59th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), 2020, pp. 663-669, doi: 10.23919/SICE48898.2020.9240229. [8] S. H. Mohamad, M. A. M. Radzi, N. F. Mailah, N. I. A. Wahab, A. Jidin and M. Y. Lada, “Adaptive notch filter under indirect and direct current controls for active power filter,” Bulletin of Electrical Engineering and Informatics, vol. 9, no. 5, pp. 1794-1802, 2020, doi. 10.11591/eei.v9i5.2165. [9] Y. Zhang, H. Wang and H. Wang, “Integrated navigation positioning algorithm based on improved Kalman Filter,” International Conference on Smart Grid and Electrical Automation (ICSGEA), 2017, pp. 255-259, doi: 10.1109/ICSGEA.2017.55. [10] Y. Jiang and Q. Hui, “Kalman filter with diffusion strategies for detecting power grid false data injection attacks,” IEEE International Conference on Electro Information Technology (EIT), 2017, pp. 254-259, doi: 10.1109/EIT.2017.8053365. [11] F. Akbarian, A. Ramezani, M. -T. Hamidi-Beheshti and V. Haghighat, “Intrusion detection on critical smart grid infrastructure,” Smart Grid Conference (SGC), 2018, pp. 1-6, doi: 10.1109/SGC.2018.8777815. [12] R. Shivaji, k. R. Nataraj, S. Mallikarjunaswamy ank K. R. Rekha, “Implementation of an effective hybrid partial transmit sequence model for peak to average power ratio in MIMO OFDM system,” ICDSMLA 2020. Lecture Notes in Electrical Engineering, Springer, vol. 783. PP. 1343-1353, 2020, doi: 10.1007/978-981-16-3690-5_129. [13] B. Aissa, T. Hamza, G. Yacine, and N. Mohamed, “Impact of sensorless neural direct torque controlin a fuel cell traction system,” International Journal of Electrical and Computer Engineering, vol. 11, no. 4, pp. 2725-2732, 2021, doi: 10.11591/ijece.v11i4.pp2725-2732. [14] N. Zhou, D. Meng, Z. Huang and G. Welch, “Dynamic state estimation of a synchronous machine Using PMU data: a comparative study,” IEEE Transactions on Smart Grid, vol. 6, no. 1, pp. 450-460, 2015, doi: 10.1109/TSG.2014.2345698. [15] T. N. Manjunath, S. Mallikarjunaswamy, M. Komala, N. Sharmila and K. S. Manu, “An efficient hybrid reconfigurable wind gas turbine power management system using MPPT algorithm,” International Journal of Power Electronics and Drive Systems, vol. 12, no. 4, pp. 2501-2510, 2021, doi: 10.11591/ijpeds.v12.i4.pp2501-2510. [16] J. Zhao and L. Mili, “A decentralized h-infinity unscented Kalman filter for dynamic state estimation against uncertainties,” IEEE Transactions on Smart Grid, vol. 10, no. 5, pp. 4870-4880, 2019, doi: 10.1109/TSG.2018.2870327. [17] M. M. Rana, “Extended Kalman filter based distributed state estimation algorithm for cyber physical systems,” 3rd International Conference on Inventive Computation Technologies (ICICT), 2018, pp. 653-655, doi: 10.1109/ICICT43934.2018.9034255. [18] K. Manandhar, C. Xiaojun, F. Hu and Y. Liu, “Combating false data injection attacks in smart grid using Kalman filter,” International Conference on Computing, Networking and Communications (ICNC), 2014, pp. 16-20, doi: 10.1109/ICCNC.2014.6785297. [19] S. R. Salkuti, S. Pagidipala, and S. C. Kim, “Comprehensive analysis of current research trends in energy storage technologies,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 24, no. 3, pp. 1288-1296,. 2021, doi: 10.11591/ijeecs.v24.i3.pp1288-1296. [20] S. Mallikarjunaswamy, N. Sharmila, G. K. Siddesh, K. R. Nataraj, M. Komala, “A novel architecture for cluster based false data injection attack detection and location identification in smart grid. advances in thermofluids and renewable energy,” Lecture Notes in Mechanical Engineering. Springer, Singapore, 2021, doi: 10.1007/978-981-16-3497-0_48. [21] S. Mallikarjunaswamy, N. Sharmila, D. M. Kumar, M. Komala and H. N. Mahendra, “Implementation of an effective hybrid model for islanded microgrid energy management,” Indian Journal of Science and Technology, vol. 13, no. 27, pp. 2733-2746, 2020, doi: 10.17485/IJST/v13i27.982. [22] T. A. Madhu, M. Komala, V. Rekha, S. Mallikarjunaswamy, N. Sharmila and S. Pooja, “Design of fuzzy logic-controlled hybrid model for the control of voltage and frequency in microgrid,” Indian Journal of Science and Technology, vol. 13, no. 35, pp. 3612- 3629, 2020, doi: 10.17485/IJST/v13i35.1510. [23] V. P. Bhuvana, M. Huemer and A. Tonello, “Battery internal state estimation using a mixed Kalman cubature filter,” IEEE International Conference on Smart Grid Communications (SmartGridComm), 2015, pp. 521-526, doi: 10.1109/SmartGridComm.2015.7436353. [24] H. Abbes, H. Abid, K. Loukil, M. Abid and A. Toumi, “Fuzzy-based MPPT algorithm implementation on FPGA chip for multi- channel photovoltaic system,” International Journal of Reconfigurable and Embedded Systems, vol. 11, no. 1, pp. 49-58, 2022, doi: 10.11591/ijres.v11.i1.pp49-58. [25] B. Özsoy and M. Göl, “A hybrid state estimation strategy with optimal use of pseudo-measurements,” IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), 2018, pp. 1-6, doi: 10.1109/ISGTEurope.2018.8571513. [26] M. M. Rana, M. K. R. Khan and A. Abdelhadi, “IoT architecture for cyber-physical system state estimation using unscented Kalman Filter,” Second International Conference on Inventive Research in Computing Applications (ICIRCA), 2020, pp. 910-913, doi: 10.1109/ICIRCA48905.2020.9183350. [27]I. Onyegbadue, C. Ogbuka and T. Madeume, “Robust least square approach for optimal development of quadratic fuel quantity function for steam power stations,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 25, no. 2, pp. 732- 740, 2022, doi: 10.11591/ijeecs.v25.i2.pp732-740.
  • 12. Int J Pow Elec & Dri Syst ISSN: 2088-8694  Efficient detection of faults and false data injection attacks in smart grid … (Prakyath Dayananda) 2097 BIOGRAPHIES OF AUTHORS Prakyath Dayananda has completed BE in EEE at CIT, Tumkur and M.Tech in CAID at SSIT, Tumkur and secured Gold medal in M.Tech. I had 9 years Teaching experience in teaching and am currently working as Assistant professor in SJBIT, Bangalore. He can be contacted at email: [email protected]. Mallikarjunaswamy Srikantaswamy is currently working as an Associate Professor in Department of Electronics and Communication Engineering at JSS Academy of Technical Education, Bangalore. He obtained his B. E degree in Telecommunication Engineering from Visvesvaraya Technological University Belgaum in 2008, M. Tech degree from Visvesvaraya Technological University Belgaum in 2010 and was awarded Ph. D from Jain University in 2015.He has 11+ years of teaching experience. His research work has been published in more than 42 International Journals and conference. He received funds from different funding agencies. Currently guiding five research scholars in Visvesvaraya Technological University Belgaum. He can be contacted at email: [email protected]. Sharmila Nagaraju has completed her B.E in EEE at SJCE, Mysore and M. Tech in CAID at NIE Mysore. Secured second rank in Bachelor of Engineering degree. She has Eight years of experience in teaching and is currently working as an Assistant Professor in RNSIT, Bangalore.electronics and its applications. She can be contacted at email: [email protected]. Rekha Velluri completed her B.E and M. Tech in Computer Science and Engineering from Visvesavaraya Technological University Belgavi. She has more than 16 years of teaching experience. Published many papers in national and international conference and currently working as an Assistant Professor in Christ University. She can be contacted at email: [email protected]. Doddananjedevaru Mahesh Kumar is presently working as Associate Professor in the Dept. of Electronics and Instrumentation Engineering, JSS Academy of Technical Education, Bengaluru. He is working in the teaching field from the past 21 years and has published more than 30 papers in International Journals, National and International Conferences. He has 4 patent publications & presently guiding three research scholars under Visvesvaraya Technological University. His research areas include Biomedical Signal Processing, Sensors and amp; and Transducers. He can be contacted at email: [email protected].