Identifying an Exploitable Structure for the Core Problem of Load-Redistribution Attack Problems

被引:3
作者
Kaviani, Ramin [1 ]
Hedman, Kory W. [1 ]
机构
[1] Arizona State Univ, Sch Elect Comp & Energy Engn, Tempe, AZ 85287 USA
来源
2019 51ST NORTH AMERICAN POWER SYMPOSIUM (NAPS) | 2019年
基金
美国国家科学基金会;
关键词
cyber-attack; false data injection attack (FDIA); load-redistribution (LR) attack; linear programming (LP); DATA INJECTION ATTACKS; STATE ESTIMATION; PROTECTION; SECURITY; SYSTEM;
D O I
10.1109/naps46351.2019.9000221
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
This study identifies and proposes an exploitable linear programming model for the core problem of sophisticated attacker-defender load-redistribution (LR) attack problems. This model is developed by leveraging power system domain insight and fundamental knowledge of the physics laws in power systems. The main contribution of this study is to demonstrate the point that there is no reason to solve any complicated problem for attackers in LR attack problems since the attackers' strategy is strikingly simple and trivial for this type of attack, which could be the basis of developing detection mechanisms against this type of cyber-attacks. We applied the proposed model to the IEEE 118-Bus test case to create an LR attack and demonstrate its impact in order to show the applicability and accuracy of our work.
引用
收藏
页数:6
相关论文
共 34 条
[1]   Decision Tree-Based Online Voltage Security Assessment Using PMU Measurements [J].
Diao, Ruisheng ;
Sun, Kai ;
Vittal, Vijay ;
O'Keefe, Robert J. ;
Richardson, Michael R. ;
Bhatt, Navin ;
Stradford, Dwayne ;
Sarawgi, Sanjoy K. .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2009, 24 (02) :832-839
[2]  
Esmalifalak M., 2011, 2011 IEEE Second International Conference on Smart Grid Communications (SmartGridComm 2011), P244, DOI 10.1109/SmartGridComm.2011.6102326
[3]   Greedy-knapsack algorithm for optimal downlink resource allocation in LTE networks [J].
Ferdosian, Nasim ;
Othman, Mohamed ;
Ali, Borhanuddin Mohd ;
Lun, Kweh Yeah .
WIRELESS NETWORKS, 2016, 22 (05) :1427-1440
[4]   Data-driven failure diagnosis in transmission protection system with multiple events and data anomalies [J].
Gholami, Amir ;
Srivastava, Anurag K. ;
Pandey, Shikhar .
JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2019, 7 (04) :767-778
[5]   Post-Disturbance Transient Stability Status Prediction Using Synchrophasor Measurements [J].
Gurusinghe, Dinesh Rangana ;
Rajapakse, Athula D. .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2016, 31 (05) :3656-3664
[6]   Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids [J].
Hao, Jinping ;
Piechocki, Robert J. ;
Kaleshi, Dritan ;
Chin, Woon Hau ;
Fan, Zhong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (05) :1198-1209
[7]   An Intelligent Wide Area Synchrophasor Based System for Predicting and Mitigating Transient Instabilities [J].
Hashiesh, Fahd ;
Mostafa, Hossam E. ;
Khatib, Abdel-Rahman ;
Helal, Ibrahim ;
Mansour, Mohamed M. .
IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (02) :645-652
[8]   Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks [J].
Hug, Gabriela ;
Giampapa, Joseph Andrew .
IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (03) :1362-1370
[9]   Spoofing GPS Receiver Clock Offset of Phasor Measurement Units [J].
Jiang, Xichen ;
Zhang, Jiangmeng ;
Harding, Brian J. ;
Makela, Jonathan J. ;
Dominguez-Garcia, Alejandro D. .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2013, 28 (03) :3253-3262
[10]  
Kaviani R., 2019, ARXIV190713294