897 research outputs found
Jamming aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation
Jamming refers to the deletion, corruption or damage of meter measurements
that prevents their further usage. This is distinct from adversarial data
injection that changes meter readings while preserving their utility in state
estimation. This paper presents a generalized attack regime that uses jamming
of secure and insecure measurements to greatly expand the scope of common
'hidden' and 'detectable' data injection attacks in literature. For 'hidden'
attacks, it is shown that with jamming, the optimal attack is given by the
minimum feasible cut in a specific weighted graph. More importantly, for
'detectable' data attacks, this paper shows that the entire range of relative
costs for adversarial jamming and data injection can be divided into three
separate regions, with distinct graph-cut based constructions for the optimal
attack. Approximate algorithms for attack design are developed and their
performances are demonstrated by simulations on IEEE test cases. Further, it is
proved that prevention of such attacks require security of all grid
measurements. This work comprehensively quantifies the dual adversarial
benefits of jamming: (a) reduced attack cost and (b) increased resilience to
secure measurements, that strengthen the potency of data attacks.Comment: 11 pages, 8 figures, A version of this will appear in HICSS 201
One Breaker is Enough: Hidden Topology Attacks on Power Grids
A coordinated cyber-attack on grid meter readings and breaker statuses can
lead to incorrect state estimation that can subsequently destabilize the grid.
This paper studies cyber-attacks by an adversary that changes breaker statuses
on transmission lines to affect the estimation of the grid topology. The
adversary, however, is incapable of changing the value of any meter data and
can only block recorded measurements on certain lines from being transmitted to
the control center. The proposed framework, with limited resource requirements
as compared to standard data attacks, thus extends the scope of cyber-attacks
to grids secure from meter corruption. We discuss necessary and sufficient
conditions for feasible attacks using a novel graph-coloring based analysis and
show that an optimal attack requires breaker status change at only ONE
transmission line. The potency of our attack regime is demonstrated through
simulations on IEEE test cases.Comment: 5 pages, 5 figures, Accepted to the IEEE PES General Meeting 201
- …