scispace - formally typeset
Journal ArticleDOI

A Review of False Data Injection Attacks Against Modern Power Systems

Reads0
Chats0
TLDR
A comprehensive review of state-of-the-art in FDIAs against modern power systems is given and some potential future research directions in this field are discussed.
Abstract
With rapid advances in sensor, computer, and communication networks, modern power systems have become complicated cyber-physical systems. Assessing and enhancing cyber-physical system security is, therefore, of utmost importance for the future electricity grid. In a successful false data injection attack (FDIA), an attacker compromises measurements from grid sensors in such a way that undetected errors are introduced into estimates of state variables such as bus voltage angles and magnitudes. In evading detection by commonly employed residue-based bad data detection tests, FDIAs are capable of severely threatening power system security. Since the first published research on FDIAs in 2009, research into FDIA-based cyber-attacks has been extensive. This paper gives a comprehensive review of state-of-the-art in FDIAs against modern power systems. This paper first summarizes the theoretical basis of FDIAs, and then discusses both the physical and the economic impacts of a successful FDIA. This paper presents the basic defense strategies against FDIAs and discusses some potential future research directions in this field.

read more

Citations
More filters
Journal ArticleDOI

The 2015 Ukraine Blackout: Implications for False Data Injection Attacks

TL;DR: In this paper, the authors consider some implications for FDIAs arising from the late 2015 Ukraine Blackout event, and propose a false data injection attack (FDIA) framework.
Journal ArticleDOI

Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations

TL;DR: A unique taxonomy is provided, which sheds the light on IoT vulnerabilities, their attack vectors, impacts on numerous security objectives, attacks which exploit such vulnerabilities, corresponding remediation methodologies and currently offered operational cyber security capabilities to infer and monitor such weaknesses.
Journal ArticleDOI

A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids

TL;DR: An intensive summary of several detection algorithms for false data injection attacks by categorizing them and elaborating on the pros and cons of each category is provided.
Journal ArticleDOI

Cyber-physical attacks and defences in the smart grid: a survey

Haibo He, +1 more
TL;DR: This paper provides a comprehensive and systematic review of the critical attack threats and defence strategies in the smart grid, and focuses on prominent CP attack schemes with significant impact on the smartgrid operation and corresponding defense solutions.
Journal ArticleDOI

A Systems and Control Perspective of CPS Security

TL;DR: A survey of systems and control methods proposed for the security of Cyber-Physical Systems, a field that has recently garnered increased attention, classifies these methods into three categories based on the type of defense proposed against the cyberattacks: prevention, resilience, and detection & isolation.
References
More filters
Proceedings ArticleDOI

Grid topology identification using electricity prices

TL;DR: The potential of recovering the topology of a grid using solely publicly available market data is explored here and a regularized maximum likelihood estimator (MLE) is developed to recover the grid Laplacian from the LMPs.
Posted Content

Grid Topology Identification using Electricity Prices

TL;DR: In this paper, a regularized maximum likelihood estimator (MLE) is developed to recover the grid Laplacian from the locational marginal prices (LMPs) under a linear DC model, where the LMPs correspond to the Lagrange multipliers of the linear program involved.
Proceedings ArticleDOI

Enhanced protection against false data injection by dynamically changing information structure of microgrids

TL;DR: The proposed approach shows that the power system can typically be partitioned into a group of microgrids, which makes it impossible to organize a synchronized data injection that exploits a fixed configuration and coordinately attacks certain meters in the configuration.
Book

Smart Grid Security: An End-to-End View of Security in the New Electrical Grid

TL;DR: In this paper, Assante et al. present an end-to-end view of security in the new electrical grid and discuss the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid.
Proceedings ArticleDOI

Impact Analysis of Topology Poisoning Attacks on Economic Operation of the Smart Power Grid

TL;DR: This paper shows how the stealthy topology poisoning attacks can compromise the integrity of OPF, and thus undermine economic operation and describes a formal verification based framework to systematically analyze the impact of such attacks on OPF.
Related Papers (5)