371 research outputs found
Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids
This paper discusses malicious false data injection attacks on the wide area measurement and monitoring system in smart grids. Firstly, methods of constructing sparse stealth attacks are developed for two typical scenarios: random attacks in which arbitrary measurements can be compromised and targeted attacks in which specified state variables are modified. It is already demonstrated that stealth attacks can always exist if the number of compromised measurements exceeds a certain value. In this paper it is found that random undetectable attacks can be accomplished by modifying only a much smaller number of measurements than this value. It is well known that protecting the system from malicious attacks can be achieved by making a certain subset of measurements immune to attacks. An efficient greedy search algorithm is then proposed to quickly find this subset of measurements to be protected to defend against stealth attacks. It is shown that this greedy algorithm has almost the same performance as the brute-force method but without the combinatorial complexity. Thirdly, a robust attack detection method is discussed. The detection method is designed based on the robust principal component analysis problem by introducing element-wise constraints. This method is shown to be able to identify the real measurements as well as attacks even when only
partial observations are collected. The simulations are conducted based on IEEE test systems
Detection of False Data Injection Attacks in Smart Grid under Colored Gaussian Noise
In this paper, we consider the problems of state estimation and false data
injection detection in smart grid when the measurements are corrupted by
colored Gaussian noise. By modeling the noise with the autoregressive process,
we estimate the state of the power transmission networks and develop a
generalized likelihood ratio test (GLRT) detector for the detection of false
data injection attacks. We show that the conventional approach with the
assumption of Gaussian noise is a special case of the proposed method, and thus
the new approach has more applicability. {The proposed detector is also tested
on an independent component analysis (ICA) based unobservable false data attack
scheme that utilizes similar assumptions of sample observation.} We evaluate
the performance of the proposed state estimator and attack detector on the IEEE
30-bus power system with comparison to conventional Gaussian noise based
detector. The superior performance of {both observable and unobservable false
data attacks} demonstrates the effectiveness of the proposed approach and
indicates a wide application on the power signal processing.Comment: 8 pages, 4 figures in IEEE Conference on Communications and Network
Security (CNS) 201
Electric Power Grid Resilience to Cyber Adversaries: State of the Art
© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
The smart electricity grids have been evolving to a more complex cyber-physical ecosystem of infrastructures with integrated communication networks, new carbon-free sources of powergeneratio n, advanced monitoring and control systems, and a myriad of emerging modern physical hardware
technologies. With the unprecedented complexity and heterogeneity in dynamic smart grid networks comes additional vulnerability to emerging threats such as cyber attacks. Rapid development and deployment of advanced network monitoring and communication systems on one hand, and the growing interdependence of the electric power grids to a multitude of lifeline critical infrastructures on the other, calls for holistic defense strategies to safeguard the power grids against cyber adversaries. In order to improve the resilience of the power grid against adversarial attacks and cyber intrusions, advancements should be sought on
detection techniques, protection plans, and mitigation practices in all electricity generation, transmission,
and distribution sectors. This survey discusses such major directions and recent advancements from a lens
of different detection techniques, equipment protection plans, and mitigation strategies to enhance the
energy delivery infrastructure resilience and operational endurance against cyber attacks. This undertaking
is essential since even modest improvements in resilience of the power grid against cyber threats could lead
to sizeable monetary savings and an enriched overall social welfare
Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts
Smart Grid has rapidly transformed the centrally controlled power system into
a massively interconnected cyber-physical system that benefits from the
revolutions happening in the communications (e.g. 5G) and the growing
proliferation of the Internet of Things devices (such as smart metres and
intelligent electronic devices). While the convergence of a significant number
of cyber-physical elements has enabled the Smart Grid to be far more efficient
and competitive in addressing the growing global energy challenges, it has also
introduced a large number of vulnerabilities culminating in violations of data
availability, integrity, and confidentiality. Recently, false data injection
(FDI) has become one of the most critical cyberattacks, and appears to be a
focal point of interest for both research and industry. To this end, this paper
presents a comprehensive review in the recent advances of the FDI attacks, with
particular emphasis on 1) adversarial models, 2) attack targets, and 3) impacts
in the Smart Grid infrastructure. This review paper aims to provide a thorough
understanding of the incumbent threats affecting the entire spectrum of the
Smart Grid. Related literature are analysed and compared in terms of their
theoretical and practical implications to the Smart Grid cybersecurity. In
conclusion, a range of technical limitations of existing false data attack
research is identified, and a number of future research directions is
recommended.Comment: Double-column of 24 pages, prepared based on IEEE Transaction articl
Bibliographical review on cyber attacks from a control oriented perspective
This paper presents a bibliographical review of definitions, classifications and applications concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems (CPSs). This review tackles the topic from a control-oriented perspective, which is complementary to information or communication ones. After motivating the importance of developing new methods for attack detection and secure control, this review presents security objectives, attack modeling, and a characterization of considered attacks and threats presenting the detection mechanisms and remedial actions. In order to show the properties of each attack, as well as to provide some deeper insight into possible defense mechanisms, examples available in the literature are discussed. Finally, open research issues and paths are presented.Peer ReviewedPostprint (author's final draft
Security Aspects of Internet of Things aided Smart Grids: a Bibliometric Survey
The integration of sensors and communication technology in power systems,
known as the smart grid, is an emerging topic in science and technology. One of
the critical issues in the smart grid is its increased vulnerability to cyber
threats. As such, various types of threats and defense mechanisms are proposed
in literature. This paper offers a bibliometric survey of research papers
focused on the security aspects of Internet of Things (IoT) aided smart grids.
To the best of the authors' knowledge, this is the very first bibliometric
survey paper in this specific field. A bibliometric analysis of all journal
articles is performed and the findings are sorted by dates, authorship, and key
concepts. Furthermore, this paper also summarizes the types of cyber threats
facing the smart grid, the various security mechanisms proposed in literature,
as well as the research gaps in the field of smart grid security.Comment: The paper is published in Elsevier's Internet of Things journal. 25
pages + 20 pages of reference
- …