Journal ArticleDOI
Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation
TLDR
This paper investigates the vulnerability of the power system state estimator to attacks performed against the communication infrastructure and proposes approximations of these metrics, that are based on the communication network topology only, and provides efficient algorithms to calculate the security metrics.Abstract:
Critical power system applications like contingency analysis and optimal power flow calculation rely on the power system state estimator. Hence the security of the state estimator is essential for the proper operation of the power system. In the future more applications are expected to rely on it, so that its importance will increase. Based on realistic models of the communication infrastructure used to deliver measurement data from the substations to the state estimator, in this paper we investigate the vulnerability of the power system state estimator to attacks performed against the communication infrastructure. We define security metrics that quantify the importance of individual substations and the cost of attacking individual measurements. We propose approximations of these metrics, that are based on the communication network topology only, and we compare them to the exact metrics. We provide efficient algorithms to calculate the security metrics. We use the metrics to show how various network layer and application layer mitigation strategies, like single and multi-path routing and data authentication, can be used to decrease the vulnerability of the state estimator. We illustrate the efficiency of the algorithms on the IEEE 118 and 300 bus benchmark power systems.read more
Citations
More filters
Journal ArticleDOI
False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey
TL;DR: This survey comprehensively overviews three major aspects: constructing FDI attacks; impacts of FDI attacked systems' impacts on electricity market; and defending against F DI attacks.
Journal ArticleDOI
Cyber-physical attacks and defences in the smart grid: a survey
TL;DR: This paper provides a comprehensive and systematic review of the critical attack threats and defence strategies in the smart grid, and focuses on prominent CP attack schemes with significant impact on the smartgrid operation and corresponding defense solutions.
Journal ArticleDOI
Secure Control Systems: A Quantitative Risk Management Approach
TL;DR: Networked control systems are ubiquitous in modern societies and include the electric power network, intelligent transport systems, and industrial processes, which require timely data flow between system components.
Journal ArticleDOI
Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation
Suzhi Bi,Ying Jun Zhang +1 more
TL;DR: In this paper, the authors use graphical methods to study defending mechanisms against false-data injection attacks on power system state estimation and propose both exact and reduced-complexity approximation algorithms.
Proceedings ArticleDOI
Fast power system analysis via implicit linearization of the power flow manifold
TL;DR: This paper derives the best linear approximant of such a relation around a generic solution of the power flow equations as an implicit algebraic relation between nodal voltages and nodal power injections.
References
More filters
Journal ArticleDOI
A Set of Measures of Centrality Based on Betweenness
TL;DR: A family of new measures of point and graph centrality based on early intuitions of Bavelas (1948) is introduced in this paper, which define centrality in terms of the degree to which a point falls on the shortest path between others and there fore has a potential for control of communication.
Book
Graph Theory
TL;DR: Gaph Teory Fourth Edition is standard textbook of modern graph theory which covers the core material of the subject with concise yet reliably complete proofs, while offering glimpses of more advanced methods in each chapter by one or two deeper results.
BookDOI
Power System State Estimation : Theory and Implementation
Ali Abur,Antonio Gómez Expósito +1 more
TL;DR: In this paper, Peters and Wilkinson this paper proposed a WLS state estimation algorithm based on the Nodal Variable Formulation (NVF) and the Branch Variable Factorization (BVF).
Journal ArticleDOI
False data injection attacks against state estimation in electric power grids
TL;DR: In this article, a new class of attacks, called false data injection attacks, against state estimation in electric power grids is presented and analyzed, under the assumption that the attacker can access the current power system configuration information and manipulate the measurements of meters at physically protected locations such as substations.
Book
Introduction to applied mathematics
Gilbert Strang,L. B. Freund +1 more
TL;DR: In this article, the authors introduce the concept of applied mathematics and apply it to applied mathematics problems in the context of applied applications. [2]... ].. [3]