Impact analysis of topology poisoning attacks on economic operation of the smart power grid

Mohammad Ashiqur Rahman*, Ehab Al-Shaer, Rajesh Kavasseri

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

35 Scopus citations

Abstract

The Optimal Power Flow (OPF) routine used in energy control centers allocates individual generator outputs by minimizing the overall cost of generation subject to system level operating constraints. The OPF relies on the outputs of two other modules, namely topology processor and state estimator. The topology processor maps the grid topology based on statuses received from the switches and circuit breakers across the system. The state estimator computes the system state, i.e., voltage magnitudes with phase angles, transmission line flows, and system loads based on real-time meter measurements. However, topology statuses and meter measurements are vulnerable to false data injection attacks. Recent research has shown that such cyber attacks can be launched against state estimation where adversaries can corrupt the states but still remain undetected. In this paper, we show how the stealthy topology poisoning attacks can compromise the integrity of OPF, and thus undermine economic operation. We describe a formal verification based framework to systematically analyze the impact of such attacks on OPF. The proposed framework is illustrated with an example. We also evaluate the scalability of the framework with respect to time and memory requirements.

Original languageEnglish
Title of host publicationProceedings - International Conference on Distributed Computing Systems
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages649-659
Number of pages11
ISBN (Electronic)9781479951680
DOIs
StatePublished - 29 Aug 2014
Externally publishedYes
Event2014 IEEE 34th International Conference on Distributed Computing Systems, ICDCS 2014 - Madrid, Spain
Duration: 30 Jun 20143 Jul 2014

Publication series

NameProceedings - International Conference on Distributed Computing Systems

Conference

Conference2014 IEEE 34th International Conference on Distributed Computing Systems, ICDCS 2014
Country/TerritorySpain
CityMadrid
Period30/06/143/07/14

Bibliographical note

Publisher Copyright:
© 2014 IEEE.

Keywords

  • Formal Method
  • Impact of Stealthy Attacks
  • Optimal Power Flow
  • Power Grid
  • State Estimation

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Impact analysis of topology poisoning attacks on economic operation of the smart power grid'. Together they form a unique fingerprint.

Cite this