Malicious Data Attacks on the Smart Grid
TLDR
Malicious attacks against power systems are investigated, in which an adversary controls a set of meters and is able to alter the measurements from those meters, and an optimal attack based on minimum energy leakage is proposed.Abstract:
Malicious attacks against power systems are investigated, in which an adversary controls a set of meters and is able to alter the measurements from those meters. Two regimes of attacks are considered. The strong attack regime is where the adversary attacks a sufficient number of meters so that the network state becomes unobservable by the control center. For attacks in this regime, the smallest set of attacked meters capable of causing network unobservability is characterized using a graph theoretic approach. By casting the problem as one of minimizing a supermodular graph functional, the problem of identifying the smallest set of vulnerable meters is shown to have polynomial complexity. For the weak attack regime where the adversary controls only a small number of meters, the problem is examined from a decision theoretic perspective for both the control center and the adversary. For the control center, a generalized likelihood ratio detector is proposed that incorporates historical data. For the adversary, the trade-off between maximizing estimation error at the control center and minimizing detection probability of the launched attack is examined. An optimal attack based on minimum energy leakage is proposed.read more
Citations
More filters
Journal ArticleDOI
A Review of False Data Injection Attacks Against Modern Power Systems
TL;DR: A comprehensive review of state-of-the-art in FDIAs against modern power systems is given and some potential future research directions in this field are discussed.
Journal ArticleDOI
A survey on security control and attack detection for industrial cyber-physical systems
TL;DR: An overview of recent advances on security control and attack detection of industrial CPSs is presented, and robustness, security and resilience as well as stability are discussed to govern the capability of weakening various attacks.
Journal ArticleDOI
Design Techniques and Applications of Cyberphysical Systems: A Survey
TL;DR: The aim of this survey is to enable researchers and system designers to get insights into the working and applications of CPSs and motivate them to propose novel solutions for making wide-scale adoption of CPS a tangible reality.
Journal ArticleDOI
Machine Learning Methods for Attack Detection in the Smart Grid
TL;DR: Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.
Journal ArticleDOI
Distributed Robust Power System State Estimation
TL;DR: A novel algorithm is developed based on the alternating direction method of multipliers that leverages existing PSSE solvers, respects privacy policies, exhibits low communication load, and its convergence to the centralized estimates is guaranteed even in the absence of local observability.
References
More filters
Book
Large Deviations Techniques and Applications
Amir Dembo,Ofer Zeitouni +1 more
TL;DR: The LDP for Abstract Empirical Measures and applications-The Finite Dimensional Case and Applications of Empirically Measures LDP are presented.
BookDOI
Power System State Estimation : Theory and Implementation
Ali Abur,Antonio Gómez Expósito +1 more
TL;DR: In this paper, Peters and Wilkinson this paper proposed a WLS state estimation algorithm based on the Nodal Variable Formulation (NVF) and the Branch Variable Factorization (BVF).
Journal ArticleDOI
The ellipsoid method and its consequences in combinatorial optimization
TL;DR: The method yields polynomial algorithms for vertex packing in perfect graphs, for the matching and matroid intersection problems, for optimum covering of directed cuts of a digraph, and for the minimum value of a submodular set function.
Journal ArticleDOI
False data injection attacks against state estimation in electric power grids
TL;DR: In this article, a new class of attacks, called false data injection attacks, against state estimation in electric power grids is presented and analyzed, under the assumption that the attacker can access the current power system configuration information and manipulate the measurements of meters at physically protected locations such as substations.