Defending False Data Injection Attacks against Power System State Estimation: A Stealthiness Corruption-Oriented Method

被引:0
作者
Zhu, Jie [1 ]
Wei, Xiaoguang [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Elect Engn, Chengdu, Sichuan Provinc, Peoples R China
来源
2016 IEEE INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON) | 2016年
关键词
False data injection attacks; historical running state database; stealthiness corruption-oriented method; state estimation;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Containing false data injection attacks (FDIAs) plays a crucial role in securing the reliable operations of power systems. This paper first proposed a stealthiness corruption-oriented method to defend against such attacks. By checking the consistency between the real-time running states obtained from power system state estimation and the most likely running states derived from historical running state database, the operator would be able to corrupt the stealthiness of FDIAs and then modify the estimation results accurately. Simulation results conducted on the IEEE-14 bus test system demonstrate the feasibility of the proposed method, and analysis based on bus power flow imbalance index verifies the effectiveness and accuracy of this stealthiness corruption-oriented method in containing FDIAs.
引用
收藏
页数:5
相关论文
共 16 条
[1]   Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation [J].
Bi, Suzhi ;
Zhang, Ying Jun .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (07) :1471-1485
[2]  
Bobba R. B., 2010, WORKSHOP SECURE CONT, P1
[3]   Coordinated Data-Injection Attack and Detection in the Smart Grid [J].
Cui, Shuguang ;
Han, Zhu ;
Kar, Soummya ;
Kim, Tung T. ;
Poor, H. Vincent ;
Tajer, Ali .
IEEE SIGNAL PROCESSING MAGAZINE, 2012, 29 (05) :106-115
[4]   A Cross-Layer Defense Mechanism Against GPS Spoofing Attacks on PMUs in Smart Grids [J].
Fan, Yawen ;
Zhang, Zhenghao ;
Trinkle, Matthew ;
Dimitrovski, Aleksandar D. ;
Bin Song, Ju ;
Li, Husheng .
IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (06) :2659-2668
[5]  
Kosut O, 2010, INT CONF SMART GRID, P220, DOI 10.1109/SMARTGRID.2010.5622045
[6]   Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids [J].
Li, Shang ;
Yilmaz, Yasin ;
Wang, Xiaodong .
IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (06) :2725-2735
[7]  
Liu Y, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P21
[8]   A Unified Approach for Power System Predictive Operations Using Viterbi Algorithm [J].
Livani, Hanif ;
Jafarzadeh, Saeed ;
Evrenosoglu, Cansin Yaman ;
Fadali, M. Sami .
IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, 2014, 5 (03) :757-766
[9]  
Morrow K. L., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P2104, DOI 10.1109/HICSS.2012.594
[10]  
Shaocheng Wang, 2014, 2014 American Control Conference, P1572, DOI 10.1109/ACC.2014.6858904