Abstract

The false data injection (FDI) attack cannot be detected by the traditional anomaly detection techniques used in the energy system state estimators. In this paper, we demonstrate how FDI attacks can be constructed blindly, i.e., without system knowledge; including topological connectivity and line reactance information. Our analysis reveals that existing FDI attacks become detectable (consequently unsuccessful) by the state estimator if the data contains grossly corrupted measurements such as device malfunction and communication errors. The proposed sparse optimization based stealthy attacks construction strategy overcomes this limitation by separating the gross errors from the measurement matrix. Extensive theoretical modeling and experimental evaluation show that the proposed technique performs more stealthily (has less relative error) and efficiently (fast enough to maintain time requirement) compared to other methods on IEEE benchmark test systems.

Highlights

  • Smart grid cyber-security has come to the forefront of national security priorities

  • The vulnerability of smart grid state estimation to an false data injection (FDI) attack was highlighted in this paper

  • We have shown that the stealthiness of the Principal Component Analysis (PCA) based existing blind attack cannot be guaranteed if the measurement data contains any gross errors

Read more

Summary

Introduction

Smart grid cyber-security has come to the forefront of national security priorities. Recent studies have revealed that these critical operational modules (e.g., SE and BDD) are vulnerable to a class of cyber-attack [4, 5, 6], known as a false data injection (FDI) attack. In a seminal work [4], Liu et al have shown that an attacker can construct a stealthy FDI attack that cannot be detected by traditional anomaly detection modules (BDD) of an EMS. Due to this hidden FDI attack, the SE estimates wrong system states, which misleads the system operator in taking wrong operational decisions that can lead to degradation of the system efficiency, reliability and may trigger cascading failures. Significant research has been carried out on FDI attacks to investigate their

Objectives
Methods
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call