Abstract
The Optimal Power Flow (OPF) routine used in energy control centers allocates individual generator outputs by minimizing the overall cost of generation subject to system level operating constraints. The OPF relies on the outputs of two other modules, namely topology processor and state estimator. The topology processor maps the grid topology based on statuses received from the switches and circuit breakers across the system. The state estimator computes the system state, i.e., voltage magnitudes with phase angles, transmission line flows, and system loads based on real-time meter measurements. However, topology statuses and meter measurements are vulnerable to false data injection attacks. Recent research has shown that such cyber attacks can be launched against state estimation where adversaries can corrupt the states but still remain undetected. In this paper, we show how the stealthy topology poisoning attacks can compromise the integrity of OPF, and thus undermine economic operation. We describe a formal verification based framework to systematically analyze the impact of such attacks on OPF. The proposed framework is illustrated with an example. We also evaluate the scalability of the framework with respect to time and memory requirements.
| Original language | English |
|---|---|
| Title of host publication | Proceedings - International Conference on Distributed Computing Systems |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 649-659 |
| Number of pages | 11 |
| ISBN (Electronic) | 9781479951680 |
| DOIs | |
| State | Published - 29 Aug 2014 |
| Externally published | Yes |
| Event | 2014 IEEE 34th International Conference on Distributed Computing Systems, ICDCS 2014 - Madrid, Spain Duration: 30 Jun 2014 → 3 Jul 2014 |
Publication series
| Name | Proceedings - International Conference on Distributed Computing Systems |
|---|
Conference
| Conference | 2014 IEEE 34th International Conference on Distributed Computing Systems, ICDCS 2014 |
|---|---|
| Country/Territory | Spain |
| City | Madrid |
| Period | 30/06/14 → 3/07/14 |
Bibliographical note
Publisher Copyright:© 2014 IEEE.
Keywords
- Formal Method
- Impact of Stealthy Attacks
- Optimal Power Flow
- Power Grid
- State Estimation
ASJC Scopus subject areas
- Software
- Hardware and Architecture
- Computer Networks and Communications