Abstract
State estimation plays a critically important role in ensuring the secure and reliable operation of the power grid. However, recent works have shown that the widely used weighted least squares (WLS) estimator, which uses several system wide measurements, is vulnerable to cyber attacks wherein an adversary can alter certain measurements to corrupt the estimator's solution, but evade the estimator's existing bad data detection algorithms and thus remain invisible to the system operator. Realistically, such a stealthy attack in its most general form has several constraints, particularly in terms of an adversary's knowledge and resources for achieving a desired attack outcome. In this light, we present a formal framework to systematically investigate the feasibility of stealthy attacks considering constraints of the adversary. In addition, unlike prior works, our approach allows the modeling of attacks on topology mappings, where an adversary can drastically strengthen stealthy attacks by intentionally introducing topology errors. Moreover, we show that this framework allows an operator to synthesize cost-effective countermeasures based on given resource constraints and security requirements in order to resist stealthy attacks. The proposed approach is illustrated on standard IEEE test cases.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the International Conference on Dependable Systems and Networks |
| Publisher | IEEE Computer Society |
| Pages | 156-167 |
| Number of pages | 12 |
| ISBN (Electronic) | 9781479922338 |
| DOIs | |
| State | Published - 18 Sep 2014 |
| Externally published | Yes |
| Event | 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014 - Atlanta, United States Duration: 23 Jun 2014 → 26 Jun 2014 |
Publication series
| Name | Proceedings of the International Conference on Dependable Systems and Networks |
|---|
Conference
| Conference | 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014 |
|---|---|
| Country/Territory | United States |
| City | Atlanta |
| Period | 23/06/14 → 26/06/14 |
Bibliographical note
Publisher Copyright:© 2014 IEEE.
Keywords
- False Data Injection Attack
- Formal Method
- Power Grid
- State Estimation
ASJC Scopus subject areas
- Software
- Hardware and Architecture
- Computer Networks and Communications