2,510 research outputs found
False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition
This paper studies the vulnerability of phasor measurement units (PMUs) to
false data injection (FDI) attacks. Prior work demonstrated that unobservable
FDI attacks that can bypass traditional bad data detectors based on measurement
residuals can be identified by detector based on low-rank decomposition (LD).
In this work, a class of more sophisticated FDI attacks that captures the
temporal correlation of PMU data is introduced. Such attacks are designed with
a convex optimization problem and can always bypass the LD detector. The
vulnerability of this attack model is illustrated on both the IEEE 24-bus RTS
and the IEEE 118-bus systems.Comment: 6 pages, 4 figures, submitted to 2017 IEEE International Conference
on Smart Grid Communications (SmartGridComm
Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems
Modern urban railways extensively use computerized sensing and control
technologies to achieve safe, reliable, and well-timed operations. However, the
use of these technologies may provide a convenient leverage to cyber-attackers
who have bypassed the air gaps and aim at causing safety incidents and service
disruptions. In this paper, we study false data injection (FDI) attacks against
railways' traction power systems (TPSes). Specifically, we analyze two types of
FDI attacks on the train-borne voltage, current, and position sensor
measurements - which we call efficiency attack and safety attack -- that (i)
maximize the system's total power consumption and (ii) mislead trains' local
voltages to exceed given safety-critical thresholds, respectively. To
counteract, we develop a global attack detection (GAD) system that serializes a
bad data detector and a novel secondary attack detector designed based on
unique TPS characteristics. With intact position data of trains, our detection
system can effectively detect the FDI attacks on trains' voltage and current
measurements even if the attacker has full and accurate knowledge of the TPS,
attack detection, and real-time system state. In particular, the GAD system
features an adaptive mechanism that ensures low false positive and negative
rates in detecting the attacks under noisy system measurements. Extensive
simulations driven by realistic running profiles of trains verify that a TPS
setup is vulnerable to the FDI attacks, but these attacks can be detected
effectively by the proposed GAD while ensuring a low false positive rate.Comment: IEEE/IFIP DSN-2016 and ACM Trans. on Cyber-Physical System
Vulnerability Assessment of Large-scale Power Systems to False Data Injection Attacks
This paper studies the vulnerability of large-scale power systems to false
data injection (FDI) attacks through their physical consequences. Prior work
has shown that an attacker-defender bi-level linear program (ADBLP) can be used
to determine the worst-case consequences of FDI attacks aiming to maximize the
physical power flow on a target line. This ADBLP can be transformed into a
single-level mixed-integer linear program, but it is hard to solve on large
power systems due to numerical difficulties. In this paper, four
computationally efficient algorithms are presented to solve the attack
optimization problem on large power systems. These algorithms are applied on
the IEEE 118-bus system and the Polish system with 2383 buses to conduct
vulnerability assessments, and they provide feasible attacks that cause line
overflows, as well as upper bounds on the maximal power flow resulting from any
attack.Comment: 6 pages, 5 figure
Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements
The false data injection (FDI) attack cannot be detected by the traditional
anomaly detection techniques used in the energy system state estimators. In
this paper, we demonstrate how FDI attacks can be constructed blindly, i.e.,
without system knowledge, including topological connectivity and line reactance
information. Our analysis reveals that existing FDI attacks become detectable
(consequently unsuccessful) by the state estimator if the data contains grossly
corrupted measurements such as device malfunction and communication errors. The
proposed sparse optimization based stealthy attacks construction strategy
overcomes this limitation by separating the gross errors from the measurement
matrix. Extensive theoretical modeling and experimental evaluation show that
the proposed technique performs more stealthily (has less relative error) and
efficiently (fast enough to maintain time requirement) compared to other
methods on IEEE benchmark test systems.Comment: Keywords: Smart grid, False data injection, Blind attack, Principal
component analysis (PCA), Journal of Computer and System Sciences, Elsevier,
201
- …