13 research outputs found

    False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition

    Full text link
    This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be identified by detector based on low-rank decomposition (LD). In this work, a class of more sophisticated FDI attacks that captures the temporal correlation of PMU data is introduced. Such attacks are designed with a convex optimization problem and can always bypass the LD detector. The vulnerability of this attack model is illustrated on both the IEEE 24-bus RTS and the IEEE 118-bus systems.Comment: 6 pages, 4 figures, submitted to 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm

    A Cyber-Secured Operation for Water-Energy Nexus

    Get PDF
    The wide implementation of information and communication technologies (ICT) cause power system operations exposed to cyber-attacks. Meanwhile, the tendency of integrated multi energy vectors has worsened this issue with multiple energy coupled. This paper proposes a two-stage risk-averse mitigation strategy for water-energy systems (WESs), incorporating power, natural gas and water systems against false data injection attacks (FDIA) under water-energy nexus. The FDIA on individual sub-systems is modelled through hampering false data integrity to the systems. An innovative two-stage risk-averse distributionally robust optimization (RA-DRO) is proposed to mitigate uneconomic operation and provides a coordinated optimal load shedding scheme for the nexus system security. A coherent risk measure, Conditional Value-at-Risk is incorporated into the RA-DRO to model risk. A Benders decomposition method is used to solve the original NP-hard RA-DRO problem. Case studies are demonstrated on a WES under water-energy nexus and results show that the effectiveness of the method to mitigate risks from potential FDIA and renewable uncertainties. This research provides WES operators an economic system operation tool by optimally coordinating energy infrastructures and implementing reasonable load shedding to enhance cybersecurity

    A Cyber-Secured Operation for Water-Energy Nexus

    Get PDF
    The wide implementation of information and communication technologies (ICT) cause power system operations exposed to cyber-attacks. Meanwhile, the tendency of integrated multi energy vectors has worsened this issue with multiple energy coupled. This paper proposes a two-stage risk-averse mitigation strategy for water-energy systems (WESs), incorporating power, natural gas and water systems against false data injection attacks (FDIA) under water-energy nexus. The FDIA on individual sub-systems is modelled through hampering false data integrity to the systems. An innovative two-stage risk-averse distributionally robust optimization (RA-DRO) is proposed to mitigate uneconomic operation and provides a coordinated optimal load shedding scheme for the nexus system security. A coherent risk measure, Conditional Value-at-Risk is incorporated into the RA-DRO to model risk. A Benders decomposition method is used to solve the original NP-hard RA-DRO problem. Case studies are demonstrated on a WES under water-energy nexus and results show that the effectiveness of the method to mitigate risks from potential FDIA and renewable uncertainties. This research provides WES operators an economic system operation tool by optimally coordinating energy infrastructures and implementing reasonable load shedding to enhance cybersecurity

    Modelling and vulnerability analysis of cyber-physical power systems based on interdependent networks

    Get PDF
    The strong coupling between the power grid and communication systems may contribute to failure propagation, which may easily lead to cascading failures or blackouts. In this paper, in order to quantitatively analyse the impact of interdependency on power system vulnerability, we put forward a “degree–electrical degree” independent model of cyber-physical power systems (CPPS), a new type of assortative link, through identifying the important nodes in a power grid based on the proposed index–electrical degree, and coupling them with the nodes in a communication system with a high degree, based on one-to-one correspondence. Using the double-star communication system and the IEEE 118-bus power grid to form an artificial interdependent network, we evaluated and compare the holistic vulnerability of CPPS under random attack and malicious attack, separately based on three kinds of interdependent models: “degree–betweenness”, “degree–electrical degree” and “random link”. The simulation results demonstrated that different link patterns, coupling degrees and attack types all can influence the vulnerability of CPPS. The CPPS with a “degree–electrical degree” interdependent model proposed in this paper presented a higher robustness in the face of random attack, and moreover performed better than the degree–betweenness interdependent model in the face of malicious attack

    Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts

    Full text link
    Smart Grid has rapidly transformed the centrally controlled power system into a massively interconnected cyber-physical system that benefits from the revolutions happening in the communications (e.g. 5G) and the growing proliferation of the Internet of Things devices (such as smart metres and intelligent electronic devices). While the convergence of a significant number of cyber-physical elements has enabled the Smart Grid to be far more efficient and competitive in addressing the growing global energy challenges, it has also introduced a large number of vulnerabilities culminating in violations of data availability, integrity, and confidentiality. Recently, false data injection (FDI) has become one of the most critical cyberattacks, and appears to be a focal point of interest for both research and industry. To this end, this paper presents a comprehensive review in the recent advances of the FDI attacks, with particular emphasis on 1) adversarial models, 2) attack targets, and 3) impacts in the Smart Grid infrastructure. This review paper aims to provide a thorough understanding of the incumbent threats affecting the entire spectrum of the Smart Grid. Related literature are analysed and compared in terms of their theoretical and practical implications to the Smart Grid cybersecurity. In conclusion, a range of technical limitations of existing false data attack research is identified, and a number of future research directions is recommended.Comment: Double-column of 24 pages, prepared based on IEEE Transaction articl
    corecore