A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids
详细信息    查看全文
  • 关键词:Cyber ; physical system ; Security ; Smart grids ; Nonlinear state estimation
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2016
  • 出版时间:2016
  • 年:2016
  • 卷:9722
  • 期:1
  • 页码:40-56
  • 全文大小:283 KB
  • 参考文献:1.Abur, A., Exposito, A.G.: Power System State Estimation: Theory and Implementation. CRC Press, New York (2004)CrossRef
    2.Baumeister, T.: Literature review on smart grid cyber security. Collaborative Software Development Laboratory at the University of Hawaii (2010)
    3.Bobba, R.B., Rogers, K.M., Wang, Q., Khurana, H., Nahrstedt, K., Overbye, T.J.: Detecting false data injection attacks on dc state estimation. In: Preprints of the First Workshop on Secure Control Systems, CPSWEEK, vol. 2010 (2010)
    4.Burke, S., Schneider, E.: Enemy number one for the electric grid: mother nature. SAIS Rev. Int. Aff. 35(1), 73–86 (2015)CrossRef
    5.Chaojun, G., Jirutitijaroen, P., Motani, M.: Detecting false data injection attacks in ac state estimation. IEEE Trans. Smart Grid 6(5), 2476–2483 (2015)CrossRef
    6.Choi, D.H., Xie, L.: Ramp-induced data attacks on look-ahead dispatch in real-time power markets. IEEE Trans. Smart Grid 4(3), 1235–1243 (2013)CrossRef
    7.Coffrin, C., Van Hentenryck, P.: A linear-programming approximation of AC power flows. INFORMS J. Comput. 26(4), 718–734 (2014)CrossRef MATH
    8.Cutsem, T.V., Ribbens-Pavell, M., Mili, L.: Hypothesis testing identification: a new method for bad data analysis in power system state estimation. IEEE Trans. power Apparatus Syst. 11, 3239–3252 (1984)CrossRef
    9.Deka, D., Baldick, R., Vishwanath, S.: Attacking power grids with secure meters: the case for breakers and jammers. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 646–651. IEEE (2014)
    10.Hug, G., Giampapa, J.A.: Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Trans. Smart Grid 3(3), 1362–1370 (2012)CrossRef
    11.Jia, L., Thomas, R.J., Tong, L.: On the nonlinearity effects on malicious data attack on power system. In: Power and Energy Society General Meeting, IEEE 2012, pp. 1–8. IEEE (2012)
    12.Kim, J., Tong, L.: On phasor measurement unit placement against state and topology attacks. In: 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 396–401. IEEE (2013)
    13.Kim, J., Tong, L.: On topology attack of a smart grid: undetectable attacks and countermeasures. IEEE J. Sel. Areas Commun. 31(7), 1294–1305 (2013)CrossRef
    14.Kim, J., Tong, L., Thomas, R.J.: Data framing attack on state estimation. IEEE J. Sel. Areas Commun. 32(7), 1460–1470 (2014)CrossRef
    15.Kim, J., Tong, L., Thomas, R.J.: Dynamic attacks on power systems economic dispatch. In: 2014 48th Asilomar Conference on Signals, Systems and Computers, pp. 345–349. IEEE (2014)
    16.Kim, T.T., Poor, H.V.: Strategic protection against data injection attacks on power grids. IEEE Trans. Smart Grid 2(2), 326–333 (2011)CrossRef
    17.Kosut, O., Jia, L., Thomas, R.J., Tong, L.: Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In: 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 220–225. IEEE (2010)
    18.Liscouski, B., Elliot, W.: Final report on the august 14, 2003 blackout in the united states and canada: Causes and recommendations. A report to US Department of Energy, 40(4) (2004)
    19.Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2011)CrossRef
    20.Ma, J., Liu, Y., Song, L., Han, Z.: Multiact dynamic game strategy for jamming attack in electricity market. IEEE Trans. Smart Grid 6(5), 2273–2282 (2015)CrossRef
    21.Manandhar, K., Cao, X., Hu, F., Liu, Y.: Detection of faults and attacks including false data injection attack in smart grid using kalman filter. IEEE Trans. Control Netw. Syst. 1(4), 370–379 (2014)MathSciNet CrossRef
    22.Mili, L., Phaniraj, V., Rousseeuw, P.J.: Least median of squares estimation in power systems. IEEE Trans. Power Syst. 6(2), 511–523 (1991)CrossRef
    23.Mo, Y., Kim, T.H.J., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber-physical security of a smart grid infrastructure. Proc. IEEE 100(1), 195–209 (2012)CrossRef
    24.Monticelli, A.: State Estimation in Electric Power Systems: A Generalized Approach. Power Electronics and Power Systems, 1st edn. Springer, New York (1999)CrossRef
    25.Purchala, K., Meeus, L., Van Dommelen, D., Belmans, R.: Usefulness of DC power flow for active power flow analysis. In: Power Engineering Society General Meeting, IEEE 2005, pp. 454–459. IEEE (2005)
    26.Rahman, M.A., Mohsenian-Rad, H.: False data injection attacks with incomplete information against smart power grids. In: Global Communications Conference (GLOBECOM), pp. 3153–3158. IEEE (2012)
    27.Song, X., Willett, P., Zhou, S., Luh, P.B.: The mimo radar and jammer games. IEEE Trans. Signal Process. 60(2), 687–699 (2012)MathSciNet CrossRef
    28.Sou, K.C., Sandberg, H., Johansson, K.H.: Data attack isolation in power networks using secure voltage magnitude measurements. IEEE Trans. Smart Grid 5(1), 14–28 (2014)CrossRef
    29.Tan, R., Krishna, V.B., Yau, D.K., Kalbarczyk, Z.: Integrity attacks on real-time pricing in electric power grids. ACM Trans. Inf. Syst. Secur. 18(2), 5 (2015)CrossRef
    30.Tan, S., Song, W.Z., Stewart, M., Long, L.: Lpattack: Leverage point attacks against state estimation in smart grid. In: Global Communications Conference (GLOBECOM), pp. 643–648. IEEE (2014)
    31.Wang, J., Hui, L.C., Yiu, S.: Data framing attacks against nonlinear state estimation in smart grid. In: Global Communications Conference Workshop(GLOBECOM), pp. 1–6. IEEE (2015)
    32.Wang, J., Hui, L.C., Yiu, S.: System-state-free false data injection attack for nonlinear state estimation in smart grid. Int. J. Smart Grid Clean Energy 4(3), 169–176 (2015)
    33.Xu, W., Wang, M., Cai, J.F., Tang, A.: Sparse error correction from nonlinear measurements with applications in bad data detection for power networks. IEEE Trans. Sign. Process. 61(24), 6175–6187 (2013)MathSciNet CrossRef
    34.Yan, J., Tang, Y., Zhu, Y., He, H., Sun, Y.: Smart grid vulnerability under cascade-based sequential line-switching attacks. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1–7. IEEE (2015)
    35.Yu, Z.H., Chin, W.L.: Blind false data injection attack using pca approximation method in smart grid. IEEE Trans. Smart Grid 6(3), 1219–1226 (2015)CrossRef
    36.Zhu, Y., Yan, J., Tang, Y., Sun, Y., He, H.: The sequential attack against power grid networks. In: 2014 IEEE International Conference on Communications (ICC), pp. 616–621. IEEE (2014)
  • 作者单位:Jingxuan Wang (15)
    Lucas C. K. Hui (15)
    S. M. Yiu (15)
    Xingmin Cui (15)
    Eric Ke Wang (16)
    Junbin Fang (17)

    15. Department of Computer Science, The University of Hong Kong, Hong Kong, China
    16. Harbin Institute of Technology Shenzhen Graduate School, Shenzhen, China
    17. Department of Optoelectronic Engineering, Jinan University, Guangzhou, China
  • 丛书名:Information Security and Privacy
  • ISBN:978-3-319-40253-6
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
  • 卷排序:9722
文摘
It is well-known that critical infrastructures would be targets for cyber attacks. In this paper, we focus on smart grids. In a smart grid system, information from smart meters would be used to perform a state estimation in real time in order to maintain the stability of the system. A wrong estimation can lead to diastrous consequences (e.g. suspension of electricity supply or a big financial loss). Unfortunately, quite a number of recent results showed that attacks on this estimation process are feasible by manipulating readings of only a few meters. In this paper, we focus on nonlinear state estimation which is a more realistic model and widely employed in a real smart grid environment. We summarize and categorize all possible attacks, and review the mechanisms behind. We also briefly talk about the countermeasures. We hope that the community would be able to come up with a better protection scheme for smart grids.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700