Detection and Mitigation of False Data Injection Attacks Against Wind Farm Active Power Controllers in Power Grids


Ansari M., Ghafouri M., Ameli A., KARAAĞAÇ U., Kocar I.

Journal of Modern Power Systems and Clean Energy, cilt.14, sa.1, ss.158-173, 2026 (SCI-Expanded, Scopus) identifier identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 14 Sayı: 1
  • Basım Tarihi: 2026
  • Doi Numarası: 10.35833/mpce.2024.001368
  • Dergi Adı: Journal of Modern Power Systems and Clean Energy
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Compendex, INSPEC, Directory of Open Access Journals
  • Sayfa Sayıları: ss.158-173
  • Anahtar Kelimeler: active power controller, attack detection, attack mitigation, cybersecurity, false data injection (FDI), frequency stability, machine learning, wind farm (WF), Wind turbine (WT)
  • Orta Doğu Teknik Üniversitesi Adresli: Evet

Özet

The recent growing integration of wind farms (WFs), particularly variable speed wind turbines (WTs), results in several operational challenges to power grids integrated with WFs, such as low grid inertia and the reduced performance of measurement-based fast frequency response. To deal with such challenges, grid operators use WF active power controllers (WFAPCs) to enhance frequency control support from WTs and improve the frequency stability of the grid. However, the operation of WFAPC relies on measurements received through communication networks and cyber layers of WFs, which consequently makes them prone to cyber threats, e.g., false data injection (FDI). On this basis, firstly, this paper analyzes the cybersecurity vulnerabilities of WFAPCs and the possible impacts of exploiting cybersecurity vulnerabilities on the frequency response of WF and frequency stability of the grid. Then, based on the knowledge of intruders, two attacks, i.e., white-box and black-box FDI attacks, are developed against WFAPCs. After-ward, to detect these attacks, a novel bi-level detection and mitigation technique based on support vector machine (SVM)-based technique and long short-term memory (LSTM) -based technique is developed, which is implemented at the control center of the WF (primary detector) and at the dispatch center of the power grid (secondary detector), respectively. These detectors classify real-time measurements into attack and normal operation. Additionally, a hierarichical mitigation technique is proposed to counter the developed cyber attacks by replacing the active power reference signal of WF with new values obtained based on the droop control theory. The impacts of the attacks and the effectiveness of the proposed bi-level technique are evaluated using the modified 39-bus benchmark.