scispace - formally typeset
Journal ArticleDOI

A Review of False Data Injection Attacks Against Modern Power Systems

Reads0
Chats0
TLDR
A comprehensive review of state-of-the-art in FDIAs against modern power systems is given and some potential future research directions in this field are discussed.
Abstract
With rapid advances in sensor, computer, and communication networks, modern power systems have become complicated cyber-physical systems. Assessing and enhancing cyber-physical system security is, therefore, of utmost importance for the future electricity grid. In a successful false data injection attack (FDIA), an attacker compromises measurements from grid sensors in such a way that undetected errors are introduced into estimates of state variables such as bus voltage angles and magnitudes. In evading detection by commonly employed residue-based bad data detection tests, FDIAs are capable of severely threatening power system security. Since the first published research on FDIAs in 2009, research into FDIA-based cyber-attacks has been extensive. This paper gives a comprehensive review of state-of-the-art in FDIAs against modern power systems. This paper first summarizes the theoretical basis of FDIAs, and then discusses both the physical and the economic impacts of a successful FDIA. This paper presents the basic defense strategies against FDIAs and discusses some potential future research directions in this field.

read more

Citations
More filters
Proceedings ArticleDOI

A Cyber Attack Taxonomy for Microgrid Systems

TL;DR: In this paper , the authors provided the results of a literature review regarding cyber attacks on microgrid systems and created an attack taxonomy based on the review findings, which can be used by practitioners for various purposes including security assessments of Microgrid systems or relevant cyber threat modeling studies.

Vulnerability Assessment and Privacy-preserving Computations in Smart Grid

Xiangyu Niu
TL;DR: This dissertation is motivated to evaluate the security requirements for the smart grid which include three main properties: confidentiality, integrity, and availability and proposes privacy-preserving algorithms for two important smart grid applications.
Journal ArticleDOI

A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids

TL;DR: In this article , a comprehensive review of the recent advances of the defence countermeasures of the FDI attacks in the smart grid is presented, where relevant existing literature are evaluated and compared in terms of their theoretical and practical significance to the Smart Grid cybersecurity.
Proceedings ArticleDOI

Cyber-Attacks to Voltage Control Applications via Wide Area Monitoring, Protection and Control System

TL;DR: This paper model wide area voltage control as a dynamical system under the presence of an adversary that aims to disrupt the network's voltage and steer the system towards voltage collapse and derives stealthy attack templates that aim to reveal the attack locations and timing that will be most effective on the power grid.
Journal ArticleDOI

Assessing cyber attacks on local electricity markets using simulation analysis: Impacts and possible mitigations

TL;DR: In this article , the authors used simulation techniques to assess the severity of cyber-attacks in local electricity markets. But, their results show that denial-of-service attacks causing random data loss can cause significant market distortions, even at low levels of loss, and can create serious risks to the market and to the grid.
References
More filters
Journal ArticleDOI

Regression Shrinkage and Selection via the Lasso

TL;DR: A new method for estimation in linear models called the lasso, which minimizes the residual sum of squares subject to the sum of the absolute value of the coefficients being less than a constant, is proposed.
Journal ArticleDOI

Matching pursuits with time-frequency dictionaries

TL;DR: The authors introduce an algorithm, called matching pursuit, that decomposes any signal into a linear expansion of waveforms that are selected from a redundant dictionary of functions, chosen in order to best match the signal structures.
Journal ArticleDOI

False data injection attacks against state estimation in electric power grids

TL;DR: In this article, a new class of attacks, called false data injection attacks, against state estimation in electric power grids is presented and analyzed, under the assumption that the attacker can access the current power system configuration information and manipulate the measurements of meters at physically protected locations such as substations.
Journal ArticleDOI

Cyber–Physical System Security for the Electric Power Grid

TL;DR: The significance of cyber infrastructure security in conjunction with power application security to prevent, mitigate, and tolerate cyber attacks is highlighted and a layered approach is introduced to evaluating risk based on the security of both the physical power applications and the supporting cyber infrastructure.
Journal ArticleDOI

Malicious Data Attacks on the Smart Grid

TL;DR: Malicious attacks against power systems are investigated, in which an adversary controls a set of meters and is able to alter the measurements from those meters, and an optimal attack based on minimum energy leakage is proposed.
Related Papers (5)