DOI QR코드

DOI QR Code

Protection Strategies Against False Data Injection Attacks with Uncertain Information on Electric Power Grids

  • Bae, Junhyung (Dept. of Information and Communication Engineering, DGIST) ;
  • Lee, Seonghun (Convergence Research Center for Future Automotive Technology, DGIST) ;
  • Kim, Young-Woo (Dept. of Daegu Research Center for Medical Devices and Green Energy, KIMM) ;
  • Kim, Jong-Hae (Dept. of Information and Communication Engineering, DGIST)
  • Received : 2016.03.12
  • Accepted : 2016.07.26
  • Published : 2017.01.02

Abstract

False data injection attacks have recently been introduced as one of important issues related to cyber-attacks on electric power grids. These attacks aim to compromise the readings of multiple power meters in order to mislead the operation and control centers. Recent studies have shown that if a malicious attacker has complete knowledge of the power grid topology and branch admittances, s/he can adjust the false data injection attack such that the attack remains undetected and successfully passes the bad data detection tests that are used in power system state estimation. In this paper, we investigate that a practical false data injection attack is essentially a cyber-attack with uncertain information due to the attackers lack of knowledge with respect to the power grid parameters because the attacker has limited physical access to electric facilities and limited resources to compromise meters. We mathematically formulated a method of identifying the most vulnerable locations to false data injection attack. Furthermore, we suggest minimum topology changes or phasor measurement units (PMUs) installation in the given power grids for mitigating such attacks and indicate a new security metrics that can compare different power grid topologies. The proposed metrics for performance is verified in standard IEEE 30-bus system. We show that the robustness of grids can be improved dramatically with minimum topology changes and low cost.

Keywords

References

  1. A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson and S. S. Sastry, "Cyber-security analysis of state estimators in electric power systems", in Proc. IEEE Conf. Decision and Control, Dec. 2010.
  2. A. Giani, S. S. Sastry, K. H. Johansson and H. Sandberg, "The VIKING Project: An initiative on resilient control of power networks", in Proc. 2nd Int. Symp. Resilient Control Systems, Idaho Falls, Idaho, pp. 31-35, Aug. 2009.
  3. Y. Mo and B. Sinopolo, "Secure control against replay attack", in Proc. 47th Annual Allerton Conf., Monticello, IL, USA, pp. 911-918, Sep. 2009.
  4. Y. Liu, P. Ning and M. K. Reiter, "False data injection attacks against state estimation in electric power grids", in Proc. 16th of ACM Conf. Computer and Communications Security, Chicago, IL, pp. 21-32, Nov. 2009.
  5. A. Ashok and M. Govindarasu, "Cyber attacks on power system state estimation through topology errors", in Proc. IEEE Power and Energy Society General Meeting, San Diego, CA, pp. 1-8, Jul. 2012.
  6. O. Kosut, L. Jia, R. Thomas and L. Tong, "Limiting false data attacks on power system state estimation", in Proc. 2010 Conf. Information Sciences and Systems (CISS), Princeton, NJ, pp. 1-6, Mar. 2010.
  7. O. Kosut, L. Jia, R. Thomas and L. Tong, "Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures", in Proc. IEEE Conf. Smart Grid Comm., Gathersburg, MD, pp. 220-225, Oct. 2010.
  8. Y. Huang, M. Esmalifalak, H. Nguyen, R. Zheng, Z. Han, H. Li and L. Song, "Bad data injection in smart grid: Attack and defense mechanisms", IEEE Communications Magazine, vol. 51, no. 1, pp. 27-33, Jan. 2013. https://doi.org/10.1109/MCOM.2013.6400435
  9. S. Cui, Z. Han, S. Kar, T. T. Kim, H. V. Poor and A. Tajer, "Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions", IEEE Signal Processing Magazine, vol. 29, no. 5, pp. 106-115, Sept. 2012. https://doi.org/10.1109/MSP.2012.2185911
  10. S. Bi and Y. J. Zhang, "Defending mechanisms against false data injection attacks in the power system state estimation", in Proc. IEEE Globecom Sg-Comnets, Houston, TX, Dec. 2011.
  11. R. Bobba, K. Rogers, Q. Wang, H. Khurana, K. Nahrstedt and T. Overbye, "Detecting false data injection attacks on DC state estimation", in Proc. 1st Workshop on Secure Control Syst., CPSWeek 2010, Stockholm, Sweden, Apr. 2010.
  12. T. T. Kim and H. V. Poor, "Strategy protection against data injection attacks on power grids", IEEE Trans. Smart Grid, vol. 3, no. 2, pp. 326-333, Jun. 2011.
  13. M. A. Rahman and H. Mohsenian-Rad, "False data injection attacks with incomplete information against smart power grids", in Proc. IEEE Globecom, Anaheim, CA, pp. 3153-3158, Dec. 2012.
  14. X. Liu and Z. Li, "Local load redistribution attacks in power systems with incomplete network information", IEEE Trans. Smart Grid, vol. 5, no. 4, pp. 1665-1676, Jul. 2014. https://doi.org/10.1109/TSG.2013.2291661
  15. A. Abur and A. G. Exposito, Power System State Estimation: Theory and Implementation, New York: CRCPress, 2004.
  16. A. Teieira, G. Dan, H. Sandberg and K. H. Johansson, "A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator", in Proc. 18th Int. Federation of Automatic Control World Congress, Milano, Italy, Aug. 2011.
  17. P. Chen, S. Cheng and K. Chen, "Smart attacks in smart grid communication networks", IEEE Communications Magazine, vol. 50, no. 8, pp. 24-29, Aug. 2012. https://doi.org/10.1109/MCOM.2012.6257523
  18. Y. Huang, S. Werner, J. Huang, N. Kashyap and V. Gupta, "State estimation in electric power grids: Meeting new challenges presented by the requirements of the future grid", IEEE Signal Processing Magazine, vol. 29, no. 5, pp. 33-43, Sep. 2012. https://doi.org/10.1109/MSP.2012.2187037
  19. A. G. Exposito and A. Abur, "Generalized observability analysis and measurement classification", IEEE Trans. Power Systems, vol. 13, no. 3, pp. 1090-1096, Aug. 1998. https://doi.org/10.1109/59.709104
  20. J. Chen and A. Abur, "Placement of PMUs to enable bad data detection in state estimation", IEEE Trans. Power Systems, vol. 21, no. 4, pp. 1608-1615, Nov. 2006. https://doi.org/10.1109/TPWRS.2006.881149
  21. A. G. Phadke, J. S. Thorp, R. F. Nuqui and M. Zhou, "Recent developments in state estimation with phasor measurements", in Proc. Power Systems Conference and Exposition, PSCE'09, IEEE/PES, Mar. 2009.
  22. J. Lee, V. Centeno, J. S. Thorp and A. G. Phadke, "Synchronized phasor measurement applications in power systems", IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 20-27, Jun. 2010. https://doi.org/10.1109/TSG.2010.2044815
  23. R. D. Zimmerman, C. E. Murillo-Sanchez and R. J. Thomas, "MATPOWER steady-state operations, planning and analysis tools for power systems research and education", IEEE Trans. Power Systems, vol. 26, no. 1, pp. 12-19, Feb. 2011. https://doi.org/10.1109/TPWRS.2010.2051168