The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - March (2014 vol.25)
pp: 717-729
Qingyu Yang , Xi'an Jiaotong University, Xi'an
Jie Yang , Xi'an Jiaotong University, Xi'an
Wei Yu , Towson University, Towson
Dou An , Xi'an Jiaotong University, Xi'an
Nan Zhang , The George Washington University, Washington
Wei Zhao , University of Macau, Macau
ABSTRACT
It is critical for a power system to estimate its operation state based on meter measurements in the field and the configuration of power grid networks. Recent studies show that the adversary can bypass the existing bad data detection schemes, posing dangerous threats to the operation of power grid systems. Nevertheless, two critical issues remain open: 1) how can an adversary choose the meters to compromise to cause the most significant deviation of the system state estimation, and 2) how can a system operator defend against such attacks? To address these issues, we first study the problem of finding the optimal attack strategy--i.e., a data-injection attacking strategy that selects a set of meters to manipulate so as to cause the maximum damage. We formalize the problem and develop efficient algorithms to identify the optimal meter set. We implement and test our attack strategy on various IEEE standard bus systems, and demonstrate its superiority over a baseline strategy of random selections. To defend against false data-injection attacks, we propose a protection-based defense and a detection-based defense, respectively. For the protection-based defense, we identify and protect critical sensors and make the system more resilient to attacks. For the detection-based defense, we develop the spatial-based and temporal-based detection schemes to accurately identify data-injection attacks.
INDEX TERMS
cyber security, Cyber-physical systems, power grid, state estimation,
CITATION
Qingyu Yang, Jie Yang, Wei Yu, Dou An, Nan Zhang, Wei Zhao, "On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures", IEEE Transactions on Parallel & Distributed Systems, vol.25, no. 3, pp. 717-729, March 2014, doi:10.1109/TPDS.2013.92
REFERENCES
[1] T. Morris, A.K. Srivastava, B. Reaves, K. Pavurapu, S. Abdelwahed, R. Vaughn, W. McGrew, and Y. Dandass, "Engineering Future Cyber-Physical Energy Systems: Challenges, Research Needs, and Roadmap," Proc. North Am. Power Symp. (NAPS), Oct. 2009.
[2] U.D. of Energy Smart Grid System Report, http://energy.gov/oe/technology-development smart-grid, 2009.
[3] A. Albur and A.G. Exposito, Power System State Estimation: Theory and Implementation. CRC Press, 2004.
[4] A. Monticelli, F.F. Wu, and M.Y. Multiple, "Multiple Bad Data Identification for State Estimation by Combinatorial Optimization," IEEE Trans. Power Delivery, vol. PD-1, no. 3, pp. 361-369, July 1986.
[5] M.M.G.P. Granelli, "Identification of Interacting Bad Data in the Framework of the Weighted Least Square Method," Electric Power System Research, vol. 78, no. 5, pp. 806-814, May 2008.
[6] J. Khwanramand and P. Damrongkulkamjorn, "Multiple Bad Data Identification in Power System State Estimation Using Particle Swarm Optimization," Proc. Sixth Int'l Conf. Electrical Eng./Electronics, Computer, Telecomm. and Information Technology, pp. 3-6, May 2009.
[7] A.A. Cardenas, S. Amin, and S. Sastry, "Secure Control: Towards Survivable Cyber-Physical Systems," Proc. the First Int'l Workshop Cyber-Physical Systems, pp. 495-500, June 2008.
[8] Y. Liu, M.K. Reiter, and P. Ning, "False Data Injection Attacks against State Estimation in Electric Power Grids," Proc. the 16th ACM Conf. Computer and Comm. Security, Nov. 2009.
[9] NIST, Guidelines for Smart Grid Cyber Security, http://csrc.nist. gov/publicationsPubsNISTIRs.html#NIST-IR-7628 , 2010.
[10] A.A. Cardenas, S. Amin, and S. Sastry, "Research Challenges for the Security of Control Systems," Proc. Third USENIX Workshop Hot Topics in Security (HotSec), July 2008.
[11] A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S.S. Sastry, "Challenges for Securing Cyber Physical Systems," Proc. Workshop Future Directions in Cyber-physical Systems Security, July 2009.
[12] J. Vijayan, "Stuxnet Renews Power Grid Security Concerns," http://www.computerworld.com/s/article/9179689 Stuxnet_ renews_power_grid_security_concerns , July 2010.
[13] Y. Liu, P. Ning, and M.K. Reiter, "Generalized False Data Injection Attacks against State Estimation in Electric Power Grids," ACM Trans. Information and System Security, vol. 14, no. 1, pp. 13:1-13:32, May 2011.
[14] Q. Yang, J. Yang, W. Yu, N. Zhang, and W. Zhao, "On a Hierarchical False Data Injection Attack on Power System State Estimation," Proc. IEEE Globecom, Dec. 2011.
[15] F.C. Schweppe, J. Wildes, and D.B. Rom, "Power System Static State Estimation. Parts 1, 2, 3," IEEE Trans. Power Apparatus and Systems, vol. PAS-89, no. 1, pp. 120-135, Jan. 1970.
[16] S.A. Vinterbo, "A Stab at Approximating Minimum Subadditive Join," Proc. 10th Int'l Conf. Algorithms and Data Structures (WADS '07), pp. 214-225, 2007.
[17] T. Kim and H. Poor, "Strategic Protection against Data Injection Attacks on Power Grids," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, June 2011.
[18] P.J. Bickel, Mathematical Statistics. Holden Day, 1991.
[19] A.A. Cardenas, S. Amin, Z.S. Lin, Y.L. Huang, C.Y. Huang, and S. Sastry, "Attacks against Process Control Systems: Risk Assessment, Detection, and Response," Proc. ACM Symp. Information, Computer and Comm. Security (AsiaCCS '11), Mar. 2011.
[20] R.D. Zimmerman, C.E. Murillo-Sanchez, and D. Gan, "Matpower, a Matlab Power System Simulation Package," http://www.pserc.cornell.edu/matpowermanul.pdf , 2007.
[21] O. Kosut, L. Jia, R.J. Thomas, and L. Tong, "On Malicious Data Attacks on Power System State Estimation," Proc. 45th Int'l Univ. Power Eng. Conf. (UPEC '10), Aug. 2010.
[22] O. Kosut, L. Jia, R.J. Thomas, and L. Tong, "Malicious Data Attacks on the Smart Grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
[23] H. Sandberg, A. Teixeira, and K.H. Johansson, "On Security Indices for State Estimators in Power Networks," Proc. Preprints of the First Workshop Secure Control Systems (CPSWEEK '10), 2010.
[24] G. Dan and H. Sandberg, "Stealth Attacks and Protection Schemes for State Estimators in Power Systems," Proc. First IEEE Int'l Conf. Smart Grid Comm., Oct. 2010.
[25] R.B. Bobba, K.M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T.J. Overbye, "Detecting False Data Injection Attacks on DC State Estimation," Proc. Preprints of the First Workshop Secure Control Systems (CPSWEEK '10), 2010.
[26] O. Kosut, L. Jia, R.J. Thomas, and L. Tong, "Limiting False Data Attacks on Power System State Estimation," Proc. Conf. Information Sciences and Systems, Mar. 2010.
[27] O. Kosut, L. Jia, R.J. Thomas, and L. Tong, "Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures," Proc. First IEEE Int'l Conf. Smart Grid Comm., Oct. 2010.
[28] F. Pasqualetti, R. Carli, and F. Bullo, "A Distributed Method for State Estimation and False Data Detection in Power Networks," Proc. IEEE Int'l Conf. Smart Grid Comm. (SmartGridComm), Oct. 2011.
[29] A. Teixeira, G. Dan, H. Sandberg, and K.H. Johansson, "A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator," Proc. 18th IFAC World Congress, 2011.
[30] Y.L. Mo and B. Sinopoli, "False Data Injection Attacks in Control Systems," Proc. Preprints of the first Workshop Secure Control Systems, 2010.
[31] L. Xie, Y.L. Mo, and B. Sinopoli, "False Data Injection Attacks in Electricity Markets," Proc. First IEEE Int'l Conf. Smart Grid Comm., Oct. 2010.
[32] S. Cui, Z. Han, S. Kar, T.T. Kim, H.V. Poor, and A. Tajer, "Coordinated Data-Injection Attack and Detection in the Smart Grid: A Detailed Look at Enriching Detection Solutions," IEEE Signal Processing Magazine, vol. 29, no. 5, pp. 106-115, Sept. 2012.
[33] A. Teixeira, S. Amin, H. Sandberg, K.H. Johansson, and S.S. Sastry, "Cyber Security Analysis of State Estimators in Electric Power Systems," Proc. 49th IEEE Conf. Decision and Control, Dec. 2010.
[34] A. Tajer, S. Kar, H.V. Poor, and S. Cui, "Distributed Joint Cyber Attack Detection and State Recovery in Smart Grids," Proc. IEEE Int'l Conf. Smart Grid Comm. (SmartGridComm), Oct. 2011.
[35] J. Lin, W. Yu, X. Yang, G. Xu, and W. Zhao, "On False Data Injection Attacks against Distributed Energy Routing in Smart Grid," Proc. ACM/IEEE Third Int'l Conf. Cyber-Physical Systems (ICCPS), Apr. 2012.
[36] A.H. Mohsenian-Rad and A. Leon-Garcia, "Distributed Internet-Based Load Altering Attacks against Smart Power Grids," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 667-674, Dec. 2011.
[37] E. Hossain, Z. Han, and V. Poor, Smart Grid Communications and Networking. Cambridge Univ. Press, 2012.
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool