Evaluating Power System Vulnerability to False Data Injection Attacks via Scalable Optimization

被引:0
作者
Chu, Zhigang [1 ]
Zhang, Jiazi [1 ]
Kosut, Oliver [1 ]
Sankar, Lalitha [1 ]
机构
[1] Arizona State Univ, Sch Elect Comp & Energy Engn, Tempe, AZ 85287 USA
来源
2016 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM) | 2016年
关键词
IMPACT;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Physical consequences to power systems of false data injection cyber-attacks are considered. Prior work has shown that the worst-case consequences of such an attack can be determined using a bi-level optimization problem, wherein an attack is chosen to maximize the physical power flow on a target line subsequent to re-dispatch. This problem can be solved as a mixed-integer linear program, but it is difficult to scale to large systems due to numerical challenges. Three new computationally efficient algorithms to solve this problem are presented. These algorithms provide lower and upper bounds on the system vulnerability measured as the maximum power flow subsequent to an attack. Using these techniques, vulnerability assessments are conducted for IEEE 118-bus system and Polish system with 2383 buses.
引用
收藏
页数:6
相关论文
共 16 条
  • [1] [Anonymous], IEEE PES GEN M BOST
  • [2] [Anonymous], 2009, CALIFORNIA INDEPENDE
  • [3] [Anonymous], 2015, Electric Reliability Council of Texas
  • [4] [Anonymous], 2016, WIRED
  • [5] Boyd S, 2004, CONVEX OPTIMIZATION
  • [6] Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks
    Hug, Gabriela
    Giampapa, Joseph Andrew
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (03) : 1362 - 1370
  • [7] Impact of Data Quality on Real-Time Locational Marginal Price
    Jia, Liyan
    Kim, Jinsub
    Thomas, Robert J.
    Tong, Lang
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2014, 29 (02) : 627 - 636
  • [8] On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures
    Kim, Jinsub
    Tong, Lang
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (07) : 1294 - 1305
  • [9] Malicious Data Attacks on the Smart Grid
    Kosut, Oliver
    Jia, Liyan
    Thomas, Robert J.
    Tong, Lang
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) : 645 - 658
  • [10] Kundur D, 2010, INT CONF SMART GRID, P244, DOI 10.1109/SMARTGRID.2010.5622049