Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks
Top Cited Papers
- 20 August 2012
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Smart Grid
- Vol. 3 (3), 1362-1370
- https://doi.org/10.1109/tsg.2012.2195338
Abstract
This paper introduces new analytical techniques for performing vulnerability analysis of state estimation when it is subject to a hidden false data injection cyber-attack on a power grid's SCADA system. Specifically, we consider ac state estimation and describe how the physical properties of the system can be used as an advantage in protecting the power system from such an attack. We present an algorithm based on graph theory which allows determining how many and which measurement signals an attacker will attack in order to minimize his efforts in keeping the attack hidden from bad data detection. This provides guidance on which measurements are vulnerable and need increased protection. Hence, this paper provides insights into the vulnerabilities but also the inherent strengths provided by ac state estimation and network topology features such as buses without power injections.Keywords
This publication has 10 references indexed in Scilit:
- Strategic Protection Against Data Injection Attacks on Power GridsIEEE Transactions on Smart Grid, 2011
- Cyber security analysis of state estimators in electric power systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Stealth Attacks and Protection Schemes for State Estimators in Power SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- False Data Injection Attacks in Electricity MarketsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and CountermeasuresPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Data integrity attacks and their impacts on SCADA control systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Cyber attack in a two-area power system: Impact identification using reachabilityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- False data injection attacks against state estimation in electric power gridsPublished by Association for Computing Machinery (ACM) ,2009
- The VIKING project: An initiative on resilient control of power networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Electric power system state estimationProceedings of the IEEE, 2000