Abstract

Over the past decade, the cyber security of power systems has been widely studied. Most previous studies have focused on cyber physical attacks, and barely considered one typical cyber attack: availability attack. We propose a hybrid attack model and apply conventional state estimation processes to study cyber attacks on power grids in this paper. The proposed model considers both integrity attack and availability attack simultaneously. Compared with the particular attack, namely, false data injected attack, we analyze their consequences to power systems in the events of false negatives attack and false alarm attack. The results show that the hybrid attack can confuse the control center by manipulating the integrity and availability of measurements. More importantly, we evaluate the hybrid attack with different values of the cost ratio between integrity and availability attacks, and then verify that the hybrid attack can achieve the same goal with a reduced cost.

Highlights

  • The advent of information and communication technology has made modern power systems smarter and more efficient through deployment of computer-based control and monitoring

  • Modern power systems are cyber-physical power systems (CPPS). The coupling of these two networks brings some convenience, the power system is more vulnerable to intricate cyber environment, which puts the CPPS at the risk of cyber attacks [1], [2]

  • To ensure that a CPPS operates safely and reliably in cyber environment, according to the basic attributes of information security [7], there are three requirements for the handling of data in CPPS: 1) Integrity is to ensure that the data is reliable and authentic; 2) availability is to ensure that the data can be delivered safely and in a timely way; and 3) confidentiality is to ensure that the contents of the data are not illegally leaked

Read more

Summary

INTRODUCTION

The advent of information and communication technology has made modern power systems smarter and more efficient through deployment of computer-based control and monitoring. To ensure that a CPPS operates safely and reliably in cyber environment, according to the basic attributes of information security [7], there are three requirements for the handling of data in CPPS: 1) Integrity is to ensure that the data is reliable and authentic; 2) availability is to ensure that the data can be delivered safely and in a timely way; and 3) confidentiality is to ensure that the contents of the data are not illegally leaked. Liu et al [17] studied the influences of DoS attacks on load frequency control of smart grids The delay of these critical messages can result in catastrophes for power systems.

THE MODEL DESCRIPTION
FALSE DATA INJECTION ATTACK MODEL
AVAILABILITY ATTACK MODEL
HYBRID ATTACK MODEL
INITIALIZATION
MUTATION OPERATION
CROSSOVER OPERATION
SELECTION OPERATION
SIMULATION RESULTS AND DISCUSSIONS
FALSE NEGATIVES ATTACK
COST OF CYBER ATTACKS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call