Malicious Data Attacks on the Smart Grid

被引:650
作者
Kosut, Oliver [1 ]
Jia, Liyan [2 ]
Thomas, Robert J. [2 ]
Tong, Lang [2 ]
机构
[1] MIT, Lab Informat & Decis Syst, Cambridge, MA 02139 USA
[2] Cornell Univ, Sch Elect & Comp Engn, Ithaca, NY USA
基金
美国国家科学基金会;
关键词
Bad data detection; false data attack; power network observability; power system state estimation; smart grid security; BAD DATA; STATE ESTIMATION; SYSTEM; IDENTIFICATION; OBSERVABILITY;
D O I
10.1109/TSG.2011.2163807
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
080906 [电磁信息功能材料与结构]; 082806 [农业信息与电气工程];
摘要
Malicious attacks against power systems are investigated, in which an adversary controls a set of meters and is able to alter the measurements from those meters. Two regimes of attacks are considered. The strong attack regime is where the adversary attacks a sufficient number of meters so that the network state becomes unobservable by the control center. For attacks in this regime, the smallest set of attacked meters capable of causing network unobservability is characterized using a graph theoretic approach. By casting the problem as one of minimizing a super-modular graph functional, the problem of identifying the smallest set of vulnerable meters is shown to have polynomial complexity. For the weak attack regime where the adversary controls only a small number of meters, the problem is examined from a decision theoretic perspective for both the control center and the adversary. For the control center, a generalized likelihood ratio detector is proposed that incorporates historical data. For the adversary, the trade-off between maximizing estimation error at the control center and minimizing detection probability of the launched attack is examined. An optimal attack based on minimum energy leakage is proposed.
引用
收藏
页码:645 / 658
页数:14
相关论文
共 30 条
[1]
ABUR A, 2000, POWER SYSTEM STATE E
[2]
[Anonymous], 1990, Matrix Computations
[3]
Bobba R.B., 2010, Preprints of the First Workshop on Secure Control Systems, CPSWEEK, V2010
[4]
Identification of multiple interacting bad data via power system decomposition [J].
Cheniae, MG ;
Mili, L ;
Rousseeuw, PJ .
IEEE TRANSACTIONS ON POWER SYSTEMS, 1996, 11 (03) :1555-1562
[5]
ON SUBMODULAR FUNCTION MINIMIZATION [J].
CUNNINGHAM, WH .
COMBINATORICA, 1985, 5 (03) :185-192
[6]
Dembo A., 1998, LARGE DEVIATIONS TEC
[7]
Estimation of Faults in DC Electrical Power System [J].
Gorinevsky, Dimitry ;
Boyd, Stephen ;
Poll, Scott .
2009 AMERICAN CONTROL CONFERENCE, VOLS 1-9, 2009, :4334-+
[8]
Gorman S., 2009, WALL ST J
[9]
THE ELLIPSOID METHOD AND ITS CONSEQUENCES IN COMBINATORIAL OPTIMIZATION [J].
GROTSCHEL, M ;
LOVASZ, L ;
SCHRIJVER, A .
COMBINATORICA, 1981, 1 (02) :169-197
[10]
BAD DATA-ANALYSIS FOR POWER-SYSTEM STATE ESTIMATION [J].
HANDSCHIN, E ;
SCHWEPPE, FC ;
KOHLAS, J ;
FIECHTER, A .
IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1975, PA94 (02) :329-337