13 research outputs found
False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition
This paper studies the vulnerability of phasor measurement units (PMUs) to
false data injection (FDI) attacks. Prior work demonstrated that unobservable
FDI attacks that can bypass traditional bad data detectors based on measurement
residuals can be identified by detector based on low-rank decomposition (LD).
In this work, a class of more sophisticated FDI attacks that captures the
temporal correlation of PMU data is introduced. Such attacks are designed with
a convex optimization problem and can always bypass the LD detector. The
vulnerability of this attack model is illustrated on both the IEEE 24-bus RTS
and the IEEE 118-bus systems.Comment: 6 pages, 4 figures, submitted to 2017 IEEE International Conference
on Smart Grid Communications (SmartGridComm
A Cyber-Secured Operation for Water-Energy Nexus
The wide implementation of information and communication technologies (ICT) cause power system operations exposed to cyber-attacks. Meanwhile, the tendency of integrated multi energy vectors has worsened this issue with multiple energy coupled. This paper proposes a two-stage risk-averse mitigation strategy for water-energy systems (WESs), incorporating power, natural gas and water systems against false data injection attacks (FDIA) under water-energy nexus. The FDIA on individual sub-systems is modelled through hampering false data integrity to the systems. An innovative two-stage risk-averse distributionally robust optimization (RA-DRO) is proposed to mitigate uneconomic operation and provides a coordinated optimal load shedding scheme for the nexus system security. A coherent risk measure, Conditional Value-at-Risk is incorporated into the RA-DRO to model risk. A Benders decomposition method is used to solve the original NP-hard RA-DRO problem. Case studies are demonstrated on a WES under water-energy nexus and results show that the effectiveness of the method to mitigate risks from potential FDIA and renewable uncertainties. This research provides WES operators an economic system operation tool by optimally coordinating energy infrastructures and implementing reasonable load shedding to enhance cybersecurity
A Cyber-Secured Operation for Water-Energy Nexus
The wide implementation of information and communication technologies (ICT) cause power system operations exposed to cyber-attacks. Meanwhile, the tendency of integrated multi energy vectors has worsened this issue with multiple energy coupled. This paper proposes a two-stage risk-averse mitigation strategy for water-energy systems (WESs), incorporating power, natural gas and water systems against false data injection attacks (FDIA) under water-energy nexus. The FDIA on individual sub-systems is modelled through hampering false data integrity to the systems. An innovative two-stage risk-averse distributionally robust optimization (RA-DRO) is proposed to mitigate uneconomic operation and provides a coordinated optimal load shedding scheme for the nexus system security. A coherent risk measure, Conditional Value-at-Risk is incorporated into the RA-DRO to model risk. A Benders decomposition method is used to solve the original NP-hard RA-DRO problem. Case studies are demonstrated on a WES under water-energy nexus and results show that the effectiveness of the method to mitigate risks from potential FDIA and renewable uncertainties. This research provides WES operators an economic system operation tool by optimally coordinating energy infrastructures and implementing reasonable load shedding to enhance cybersecurity
Modelling and vulnerability analysis of cyber-physical power systems based on interdependent networks
The strong coupling between the power grid and communication systems may contribute to failure propagation, which may easily lead to cascading failures or blackouts. In this paper, in order to quantitatively analyse the impact of interdependency on power system vulnerability, we put forward a “degree–electrical degree” independent model of cyber-physical power systems (CPPS), a new type of assortative link, through identifying the important nodes in a power grid based on the proposed index–electrical degree, and coupling them with the nodes in a communication system with a high degree, based on one-to-one correspondence. Using the double-star communication system and the IEEE 118-bus power grid to form an artificial interdependent network, we evaluated and compare the holistic vulnerability of CPPS under random attack and malicious attack, separately based on three kinds of interdependent models: “degree–betweenness”, “degree–electrical degree” and “random link”. The simulation results demonstrated that different link patterns, coupling degrees and attack types all can influence the vulnerability of CPPS. The CPPS with a “degree–electrical degree” interdependent model proposed in this paper presented a higher robustness in the face of random attack, and moreover performed better than the degree–betweenness interdependent model in the face of malicious attack
Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts
Smart Grid has rapidly transformed the centrally controlled power system into
a massively interconnected cyber-physical system that benefits from the
revolutions happening in the communications (e.g. 5G) and the growing
proliferation of the Internet of Things devices (such as smart metres and
intelligent electronic devices). While the convergence of a significant number
of cyber-physical elements has enabled the Smart Grid to be far more efficient
and competitive in addressing the growing global energy challenges, it has also
introduced a large number of vulnerabilities culminating in violations of data
availability, integrity, and confidentiality. Recently, false data injection
(FDI) has become one of the most critical cyberattacks, and appears to be a
focal point of interest for both research and industry. To this end, this paper
presents a comprehensive review in the recent advances of the FDI attacks, with
particular emphasis on 1) adversarial models, 2) attack targets, and 3) impacts
in the Smart Grid infrastructure. This review paper aims to provide a thorough
understanding of the incumbent threats affecting the entire spectrum of the
Smart Grid. Related literature are analysed and compared in terms of their
theoretical and practical implications to the Smart Grid cybersecurity. In
conclusion, a range of technical limitations of existing false data attack
research is identified, and a number of future research directions is
recommended.Comment: Double-column of 24 pages, prepared based on IEEE Transaction articl