Detection of False Data Injection Attacks in Smart Grid Communication Systems

被引:167
作者
Rawat, Danda B. [1 ]
Bajracharya, Chandra [1 ]
机构
[1] Georgia So Univ, Dept Elect Engn, Statesboro, GA 30460 USA
基金
美国国家科学基金会;
关键词
Attack detection; cyber-security; machine learning; power systems security; smart grid security; STATE ESTIMATION; POWER; SECURITY;
D O I
10.1109/LSP.2015.2421935
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The transformation of traditional energy networks to smart grids can assist in revolutionizing the energy industry in terms of reliability, performance and manageability. However, increased connectivity of power grid assets for bidirectional communications presents severe security vulnerabilities. In this letter, we investigate Chi-square detector and cosine similarity matching approaches for attack detection in smart grids where Kalman filter estimation is used to measure any deviation from actual measurements. The cosine similarity matching approach is found to be robust for detecting false data injection attacks as well as other attacks in the smart grids. Once the attack is detected, system can take preventive action and alarm the manager to take preventative action to limit the risk. Numerical results obtained from simulations corroborate our theoretical analysis.
引用
收藏
页码:1652 / 1656
页数:5
相关论文
共 22 条
[1]  
Amin S, 2009, LECT NOTES COMPUT SC, V5469, P31, DOI 10.1007/978-3-642-00602-9_3
[2]  
Bi SZ, 2011, IEEE GLOBE WORK, P1162, DOI 10.1109/GLOCOMW.2011.6162362
[3]  
Chui C.K., 2008, KALMAN FILTERING REA
[4]   Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study [J].
Esmalifalak, Mohammad ;
Shi, Ge ;
Han, Zhu ;
Song, Lingyang .
IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (01) :160-169
[5]   Generalized likelihood ratio statistics and Wilks phenomenon [J].
Fan, JQ ;
Zhang, CM ;
Zhang, J .
ANNALS OF STATISTICS, 2001, 29 (01) :153-193
[6]   A Lightweight Message Authentication Scheme for Smart Grid Communications [J].
Fouda, Mostafa M. ;
Fadlullah, Zubair Md ;
Kato, Nei ;
Lu, Rongxing ;
Shen, Xuemin .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :675-685
[7]  
Hayden M., 2014, CYBER SECURITY N AM
[8]  
Jia LY, 2011, INT CONF ACOUST SPEE, P5952
[9]  
Kalman R. E., 1960, A new approach to linear filtering and prediction problems, P35, DOI 10.1115/1.3662552
[10]   Malicious Data Attacks on the Smart Grid [J].
Kosut, Oliver ;
Jia, Liyan ;
Thomas, Robert J. ;
Tong, Lang .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :645-658