The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.10 - Oct. (2013 vol.24)
pp: 1961-1971
Zhengrui Qin , College of William and Mary, Williamsburg
Qun Li , College of William and Mary, Williamsburg
Mooi-Choo Chuah , Lehigh University, Bethlehem
ABSTRACT
The electric power grid is a crucial infrastructure in our society and is always a target of malicious users and attackers. In this paper, we first introduce the concept of unidentifiable attack, in which the control center cannot identify the attack even though it detects its presence. Thus, the control center cannot obtain deterministic state estimates, since there may have several feasible cases and the control center cannot simply favor one over the others. Given an unidentifiable attack, we present algorithms to enumerate all feasible cases, and propose an optimization strategy from the perspective of the control center to deal with an unidentifiable attack. Furthermore, we propose a heuristic algorithm from the view of an attacker to find good attack regions such that the number of meters required to compromise is as few as possible. We also formulate the problem that how to distinguish all feasible cases if the control center has some limited resources to verify some meters, and solve it with standard algorithms. Finally, we briefly evaluate and validate our enumerating algorithms and optimization strategy.
INDEX TERMS
Generators, Transmission line measurements, Vectors, Power transmission lines, Reactive power, Power generation, bad data identification, Power grid, unidentifiable attack, state estimates, false data injection, security
CITATION
Zhengrui Qin, Qun Li, Mooi-Choo Chuah, "Defending against Unidentifiable Attacks in Electric Power Grids", IEEE Transactions on Parallel & Distributed Systems, vol.24, no. 10, pp. 1961-1971, Oct. 2013, doi:10.1109/TPDS.2012.273
REFERENCES
[1] F. Schweppe and J. Wildes, "Power System Static-State Estimation, Part I II & III," IEEE Trans. Power Apparatus and Systems, vol. PAS-89, no. 1, pp. 130-135, Jan. 1970.
[2] H. Merrill and F. Schweppe, "Bad Data Suppression in Power System Static State Estimation," IEEE Trans. Power Apparatus and Systems, vol. PAS-90, no. 6, pp. 2718-2725, Nov. 1971.
[3] T. Van Cutsem, M. Ribbens-Pavella, and L. Mili, "Hypothesis Testing Identification: A New Method for Bad Data Analysis in Power System State Estimation," IEEE Trans. Power Apparatus and Systems, vol. PAS-103, no. 11, pp. 3239-3252, Nov. 1984.
[4] E. Asada, A. Garcia, and R. Romero, "Identifying Multiple Interacting Bad Data in Power System State Estimation," Proc. IEEE Power Eng. Soc. General Meeting, 2005.
[5] A. Monticelli, F. Wu, and M. Yen, "Multiple Bad Data Identification for State Estimation by Combinatorial Optimization," IEEE Trans. Power Delivery, vol. TPD-1, no. 3, pp. 361-369, July 1986.
[6] Y. Liu, M. Reiter, and P. Ning, "False Data Injection Attacks against State Estimation in Electric Power Grids," Proc. 16th ACM Conf. Computer and Comm. Security (CCS), 2009.
[7] Z. Qin, Q. Li, and M. Chuah, "Unidentifiable Attacks in Electric Power Systems," Proc. IEEE/ACM Third Int'l Conf. Cyber-Physical Systems, 2012.
[8] Y. Yuan, Z. Li, and K. Ren, "Modeling Load Redistribution Attacks in Power System," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, June 2011.
[9] O. Kosut, L. Jia, R. Thomas, and L. Tong, "Malicious Data Attacks on Smartgrid State Estimation: Attack Strategies and Countermeasures," Proc. IEEE First Int'l Conf. Smart Grid Comm. (SmartGridComm.), 2010.
[10] T. Kim and H. Poor, "Strategic Protection against Data Injection Attacks on Power Grids," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, June 2011.
[11] L. Mili, M. Ribbens-Pavella, and T. Van Cutsem, "Bad Data Identification Methods in Power System State Estimation-A Comparative Study," IEEE Trans. Power Apparatus and Systems, vol. PAS-104, no. 11, pp. 3037-3049, Nov. 1985.
[12] Z. Fadlullah, M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, and Y. Nozaki, "Toward Intelligent Machine-to-Machine Communications in Smart Grid," IEEE Comm. Magazine, vol. 49, no. 4, pp. 60-65, Apr. 2011.
[13] M. Fouda, Z. Fadlullah, N. Kato, R. Lu, and X. Shen, "A Lightweight Message Authentication Scheme for Smart Grid Communications," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 675-685, Dec. 2011.
[14] R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, "EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications," IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621-1631, Sept. 2012.
[15] H. Wang, B. Sheng, and Q. Li, "TelosB Implementation of Elliptic Curve Cryptography over Primary Field," Technical Report WM-CS-2005-12, College of William and Mary, 2005.
[16] H. Wang and Q. Li, "Efficient Implementation of Public Key Cryptosystems on MICAz and TelosB Motes," Technical Report WM-CS-2006-7, College of William and Mary, 2005.
[17] H. Wang, B. Sheng, C.C. Tan, and Q. Li, "WM-ECC: An Elliptic Curve Cryptography Suite on Sensor Motes," Technical Report WM-CS-2007-11, College of William and Mary, 2007.
[18] Y. Yuan, Z. Li, and K. Ren, "Quantitative Analysis of Load Redistribution Attacks in Power Systems," IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 9, pp. 1731-1738, Sept. 2012.
[19] T. Gamage and B. McMillin, "NondeducibilitY-Based Analysis of Cyber-Physical Systems," Critical Infrastructure Protection III, vol. 311, pp. 169-183, 2009.
[20] H. Wang, C. Tan, and Q. Li, "Snoogle: A Search Engine for the Physical World," Proc. IEEE INFOCOM, 2008.
[21] S. Ren, Q. Li, H. Wang, X. Chen, and X. Zhang, "Analyzing Object Detection Quality under Probabilistic Coverage in Sensor Networks," Proc. Int'l Workshop Quality of Service (IWQoS), 2005.
[22] Z. Ling, J. Luo, W. Yu, X. Fu, D. Xuan, and W. Jia, "A New Cell Counter Based Attack against TOR," Proc. 16th ACM Conf. Computer and Comm. Security (CCS), 2009.
[23] D. Xuan, R. Bettati, and W. Zhao, "A Gateway-Based Defense System for Distributed DoS Attacks in High-Speed Networks," Proc. IEEE Workshop Information Assurance and Security, vol. 1, 2001.
[24] M. Ding, F. Liu, A. Thaeler, D. Chen, and X. Cheng, "Fault-Tolerant Target Localization in Sensor Networks," EURASIP J. Wireless Comm. and Networking, vol. 4, p. 19, 2007.
[25] K. Xing, M. Ding, X. Cheng, and S. Rotenstreich, "Safety Warning Based on Highway Sensor Networks," Proc. IEEE Wireless Comm. and Networking Conf., vol. 4, 2005.
[26] A. Wachter and L. Biegler, "On the Implementation of an Interior-Point Filter Line-Search Algorithm for Large-Scale Nonlinear Programming," J. Mathematical Programming: Series A and B, vol. 106, pp. 25-57, 2006.
[27] R. Zimmerman, C. Murillo-Sánchez, and R. Thomas, "MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education," IEEE Trans. Power Systems, vol. 26, no. 1, pp. 12-19, Feb. 2011.
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool