Journal ArticleDOI
A Review of False Data Injection Attacks Against Modern Power Systems
Reads0
Chats0
TLDR
A comprehensive review of state-of-the-art in FDIAs against modern power systems is given and some potential future research directions in this field are discussed.Abstract:
With rapid advances in sensor, computer, and communication networks, modern power systems have become complicated cyber-physical systems. Assessing and enhancing cyber-physical system security is, therefore, of utmost importance for the future electricity grid. In a successful false data injection attack (FDIA), an attacker compromises measurements from grid sensors in such a way that undetected errors are introduced into estimates of state variables such as bus voltage angles and magnitudes. In evading detection by commonly employed residue-based bad data detection tests, FDIAs are capable of severely threatening power system security. Since the first published research on FDIAs in 2009, research into FDIA-based cyber-attacks has been extensive. This paper gives a comprehensive review of state-of-the-art in FDIAs against modern power systems. This paper first summarizes the theoretical basis of FDIAs, and then discusses both the physical and the economic impacts of a successful FDIA. This paper presents the basic defense strategies against FDIAs and discusses some potential future research directions in this field.read more
Citations
More filters
Journal ArticleDOI
The 2015 Ukraine Blackout: Implications for False Data Injection Attacks
TL;DR: In this paper, the authors consider some implications for FDIAs arising from the late 2015 Ukraine Blackout event, and propose a false data injection attack (FDIA) framework.
Journal ArticleDOI
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations
TL;DR: A unique taxonomy is provided, which sheds the light on IoT vulnerabilities, their attack vectors, impacts on numerous security objectives, attacks which exploit such vulnerabilities, corresponding remediation methodologies and currently offered operational cyber security capabilities to infer and monitor such weaknesses.
Journal ArticleDOI
A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids
TL;DR: An intensive summary of several detection algorithms for false data injection attacks by categorizing them and elaborating on the pros and cons of each category is provided.
Journal ArticleDOI
Cyber-physical attacks and defences in the smart grid: a survey
TL;DR: This paper provides a comprehensive and systematic review of the critical attack threats and defence strategies in the smart grid, and focuses on prominent CP attack schemes with significant impact on the smartgrid operation and corresponding defense solutions.
Journal ArticleDOI
A Systems and Control Perspective of CPS Security
Seyed Mehran Dibaji,Mohammad Pirani,David Bezalel Flamholz,Anuradha M. Annaswamy,Karl Henrik Johansson,Aranya Chakrabortty +5 more
TL;DR: A survey of systems and control methods proposed for the security of Cyber-Physical Systems, a field that has recently garnered increased attention, classifies these methods into three categories based on the type of defense proposed against the cyberattacks: prevention, resilience, and detection & isolation.
References
More filters
Proceedings ArticleDOI
Grid topology identification using electricity prices
TL;DR: The potential of recovering the topology of a grid using solely publicly available market data is explored here and a regularized maximum likelihood estimator (MLE) is developed to recover the grid Laplacian from the LMPs.
Posted Content
Grid Topology Identification using Electricity Prices
TL;DR: In this paper, a regularized maximum likelihood estimator (MLE) is developed to recover the grid Laplacian from the locational marginal prices (LMPs) under a linear DC model, where the LMPs correspond to the Lagrange multipliers of the linear program involved.
Proceedings ArticleDOI
Enhanced protection against false data injection by dynamically changing information structure of microgrids
TL;DR: The proposed approach shows that the power system can typically be partitioned into a group of microgrids, which makes it impossible to organize a synchronized data injection that exploits a fixed configuration and coordinately attacks certain meters in the configuration.
Book
Smart Grid Security: An End-to-End View of Security in the New Electrical Grid
TL;DR: In this paper, Assante et al. present an end-to-end view of security in the new electrical grid and discuss the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid.
Proceedings ArticleDOI
Impact Analysis of Topology Poisoning Attacks on Economic Operation of the Smart Power Grid
TL;DR: This paper shows how the stealthy topology poisoning attacks can compromise the integrity of OPF, and thus undermine economic operation and describes a formal verification based framework to systematically analyze the impact of such attacks on OPF.
Related Papers (5)
False data injection attacks against state estimation in electric power grids
Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks
Gabriela Hug,Joseph Giampapa +1 more