False Data Injection Attacks against State Estimation in Electric Power Grids

被引:1241
作者
Liu, Yao [1 ]
Ning, Peng [1 ]
Reiter, Michael K. [2 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
[2] Univ N Carolina, Dept Comp Sci, Chapel Hill, NC 27515 USA
基金
美国国家科学基金会;
关键词
Algorithms; Security; Power grids; state estimation; attack; BAD DATA DETECTION; IDENTIFICATION;
D O I
10.1145/1952982.1952995
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System monitoring is necessary to ensure the reliable operation of power grids, and state estimation is used in system monitoring to best estimate the power grid state through analysis of meter measurements and power system models. Various techniques have been developed to detect and identify bad measurements, including interacting bad measurements introduced by arbitrary, nonrandom causes. At first glance, it seems that these techniques can also defeat malicious measurements injected by attackers. In this article, we expose an unknown vulnerability of existing bad measurement detection algorithms by presenting and analyzing a new class of attacks, called false data injection attacks, against state estimation in electric power grids. Under the assumption that the attacker can access the current power system configuration information and manipulate the measurements of meters at physically protected locations such as substations, such attacks can introduce arbitrary errors into certain state variables without being detected by existing algorithms. Moreover, we look at two scenarios, where the attacker is either constrained to specific meters or limited in the resources required to compromise meters. We show that the attacker can systematically and efficiently construct attack vectors in both scenarios to change the results of state estimation in arbitrary ways. We also extend these attacks to generalized false data injection attacks, which can further increase the impact by exploiting measurement errors typically tolerated in state estimation. We demonstrate the success of these attacks through simulation using IEEE test systems, and also discuss the practicality of these attacks and the real-world constraints that limit their effectiveness.
引用
收藏
页数:33
相关论文
共 46 条
  • [1] On the approximability of minimizing nonzero variables or unsatisfied relations in linear systems
    Amaldi, E
    Kann, V
    [J]. THEORETICAL COMPUTER SCIENCE, 1998, 209 (1-2) : 237 - 260
  • [2] [Anonymous], IEEE T POWER APPAR S
  • [3] [Anonymous], IEEE 2010 S IN PRESS
  • [4] [Anonymous], P IEEE POW TECH C
  • [5] [Anonymous], IEEE 2010 S IN PRESS
  • [6] [Anonymous], P IEEE POW ENG SOC G
  • [7] [Anonymous], 2013, Power generation, operation, and control
  • [8] [Anonymous], 1979, COMPUT INTRACTABILIT
  • [9] [Anonymous], 2010, 44 ANN C INF SCI SYS
  • [10] [Anonymous], 1995, THESIS STANFORD U