scispace - formally typeset
Journal ArticleDOI

Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation

TLDR
This paper investigates the vulnerability of the power system state estimator to attacks performed against the communication infrastructure and proposes approximations of these metrics, that are based on the communication network topology only, and provides efficient algorithms to calculate the security metrics.
Abstract
Critical power system applications like contingency analysis and optimal power flow calculation rely on the power system state estimator. Hence the security of the state estimator is essential for the proper operation of the power system. In the future more applications are expected to rely on it, so that its importance will increase. Based on realistic models of the communication infrastructure used to deliver measurement data from the substations to the state estimator, in this paper we investigate the vulnerability of the power system state estimator to attacks performed against the communication infrastructure. We define security metrics that quantify the importance of individual substations and the cost of attacking individual measurements. We propose approximations of these metrics, that are based on the communication network topology only, and we compare them to the exact metrics. We provide efficient algorithms to calculate the security metrics. We use the metrics to show how various network layer and application layer mitigation strategies, like single and multi-path routing and data authentication, can be used to decrease the vulnerability of the state estimator. We illustrate the efficiency of the algorithms on the IEEE 118 and 300 bus benchmark power systems.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey

TL;DR: This survey comprehensively overviews three major aspects: constructing FDI attacks; impacts of FDI attacked systems' impacts on electricity market; and defending against F DI attacks.
Journal ArticleDOI

Cyber-physical attacks and defences in the smart grid: a survey

Haibo He, +1 more
TL;DR: This paper provides a comprehensive and systematic review of the critical attack threats and defence strategies in the smart grid, and focuses on prominent CP attack schemes with significant impact on the smartgrid operation and corresponding defense solutions.
Journal ArticleDOI

Secure Control Systems: A Quantitative Risk Management Approach

TL;DR: Networked control systems are ubiquitous in modern societies and include the electric power network, intelligent transport systems, and industrial processes, which require timely data flow between system components.
Journal ArticleDOI

Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation

TL;DR: In this paper, the authors use graphical methods to study defending mechanisms against false-data injection attacks on power system state estimation and propose both exact and reduced-complexity approximation algorithms.
Proceedings ArticleDOI

Fast power system analysis via implicit linearization of the power flow manifold

TL;DR: This paper derives the best linear approximant of such a relation around a generic solution of the power flow equations as an implicit algebraic relation between nodal voltages and nodal power injections.
References
More filters
Journal ArticleDOI

A Set of Measures of Centrality Based on Betweenness

TL;DR: A family of new measures of point and graph centrality based on early intuitions of Bavelas (1948) is introduced in this paper, which define centrality in terms of the degree to which a point falls on the shortest path between others and there fore has a potential for control of communication.
Book

Graph Theory

TL;DR: Gaph Teory Fourth Edition is standard textbook of modern graph theory which covers the core material of the subject with concise yet reliably complete proofs, while offering glimpses of more advanced methods in each chapter by one or two deeper results.
BookDOI

Power System State Estimation : Theory and Implementation

TL;DR: In this paper, Peters and Wilkinson this paper proposed a WLS state estimation algorithm based on the Nodal Variable Formulation (NVF) and the Branch Variable Factorization (BVF).
Journal ArticleDOI

False data injection attacks against state estimation in electric power grids

TL;DR: In this article, a new class of attacks, called false data injection attacks, against state estimation in electric power grids is presented and analyzed, under the assumption that the attacker can access the current power system configuration information and manipulate the measurements of meters at physically protected locations such as substations.
Book

Introduction to applied mathematics

TL;DR: In this article, the authors introduce the concept of applied mathematics and apply it to applied mathematics problems in the context of applied applications. [2]... ].. [3]
Related Papers (5)