Smart Attacks in Smart Grid Communication Networks

被引:140
作者
Chen, Pin-Yu [1 ]
Cheng, Shin-Ming [2 ]
Chen, Kwang-Cheng [2 ,3 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
[2] Natl Taiwan Univ, Grad Inst Commun Engn, Taipei, Taiwan
[3] Natl Taiwan Univ, Commun Res Ctr, Taipei, Taiwan
关键词
TOLERANCE;
D O I
10.1109/MCOM.2012.6257523
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The operations of a smart grid heavily rely on the support of communication infrastructures for efficient electricity management and reliable power distribution. Due to the strong dependency, the robustness of a smart grid communication network against attack is of the utmost importance for the deployment of the smart grid. Notably, the large scale and autonomous features of a smart grid render its cyber security quite vulnerable to adversaries. In this article, we introduce several intelligent attacks and countermeasures in smart grid communication networks, which aim for maximal damage or benefits by taking advantage of the network structure as well as the protocol functionality. We adopt the percolation-based connectivity in statistic mechanics to quantitatively analyze the network robustness. If the attack and defense strategies are involved, the attack can be further smart and complicated. Consequently, a two-player zero-sum game is introduced between the adversary and the defender, and the outcome of the game equilibrium is used to evaluate the performance of defense mechanisms with different network configurations. This article therefore offers novel insights and comprehensive analysis on the cyber security of a smart grid.
引用
收藏
页码:24 / 29
页数:6
相关论文
共 15 条
[1]   Error and attack tolerance of complex networks [J].
Albert, R ;
Jeong, H ;
Barabási, AL .
NATURE, 2000, 406 (6794) :378-382
[2]  
Boyd S., 2004, CONVEX OPTIMIZATION, VFirst, DOI DOI 10.1017/CBO9780511804441
[3]   Network robustness and fragility: Percolation on random graphs [J].
Callaway, DS ;
Newman, MEJ ;
Strogatz, SH ;
Watts, DJ .
PHYSICAL REVIEW LETTERS, 2000, 85 (25) :5468-5471
[4]  
Chen P.-Y., 2011, P IEEE GLOBECOM 2011
[5]   Breakdown of the internet under intentional attack [J].
Cohen, R ;
Erez, K ;
ben-Avraham, D ;
Havlin, S .
PHYSICAL REVIEW LETTERS, 2001, 86 (16) :3682-3685
[6]   A Dependency Graph Approach for Fault Detection and Localization Towards Secure Smart Grid [J].
He, Miao ;
Zhang, Junshan .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (02) :342-351
[7]   Strategic Protection Against Data Injection Attacks on Power Grids [J].
Kim, Tung T. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (02) :326-333
[8]   Malicious Data Attacks on the Smart Grid [J].
Kosut, Oliver ;
Jia, Liyan ;
Thomas, Robert J. ;
Tong, Lang .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :645-658
[9]  
Liu Y, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P21
[10]   Network Resilience: A Systematic Approach [J].
Smith, Paul ;
Hutchison, David ;
Sterbenz, James P. G. ;
Schoeller, Marcus ;
Fessi, Ali ;
Karaliopoulos, Merkouris ;
Lac, Chidung ;
Plattner, Bernhard .
IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (07) :88-97