Literature Review on False Data Injection Attacks Against Power System

被引:0
作者
Liang, Gaoqi [1 ]
Zhao, Junhua [2 ,3 ]
Luo, Fengji [1 ]
Weller, Steven R. [4 ]
Dong, Zhao Yang [2 ,4 ]
机构
[1] Univ Newcastle, Ctr Intelligent Elect Networks, Callaghan, NSW, Australia
[2] CSG, Elect Power Res Inst, Guangzhou, Peoples R China
[3] Chinese Univ Hong Kong Shenzhen, Shenzhen, Peoples R China
[4] Univ Newcastle, Sch Elect Engn & Comp Sci, Callaghan, NSW, Australia
来源
IEEE SOUTHEASTCON 2020 | 2020年
关键词
false data injection attacks; detection of bad data; physical security; STATE ESTIMATION; DEFENSE;
D O I
10.1109/southeastcon44009.2020.9249717
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
False data injection attacks against the power system make full use of the traditional state estimation flaw detection of bad data. Cyber attackers can successfully inject false data into the vector equipment value to modify value and state variables of power grids, control the operation state of power grids, obtain economic benefits and other illegal purposes. This paper expounds on the issues about the physical security of power grids, the principle of false data injection attacks, its influence on power grids, how to prevent this kind of cyber attack, analyzes research status of false data injection attacks and unresolved problems.
引用
收藏
页数:5
相关论文
共 26 条
[1]   Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation [J].
Bi, Suzhi ;
Zhang, Ying Jun .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (07) :1471-1485
[2]  
Bobba R.B., 2010, Proc. 1st Workshop on Secure Control Syst, P1
[3]  
Dán G, 2010, INT CONF SMART GRID, P214, DOI 10.1109/SMARTGRID.2010.5622046
[4]  
Deka D, 2014, PES GEN M C EXP WASH, P1
[5]  
Esmalifalak M, 2013, IEEE GLOB COMM CONF, P808, DOI 10.1109/GLOCOM.2013.6831172
[6]   Bad Data Injection in Smart Grid: Attack and Defense Mechanisms [J].
Huang, Yi ;
Esmalifalak, Mohammad ;
Huy Nguyen ;
Zheng, Rong ;
Han, Zhu ;
Li, Husheng ;
Song, Lingyang .
IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (01) :27-33
[7]   Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [J].
Kim, Jinsub ;
Tong, Lang ;
Thomas, Robert J. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (05) :1102-1114
[8]   Strategic Protection Against Data Injection Attacks on Power Grids [J].
Kim, Tung T. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (02) :326-333
[9]  
Kosut O., 2010, Information Sciences and Systems (CISS), 2010 44th Annual Conference on, P1, DOI DOI 10.1109/CISS.2010.5464816
[10]  
Kosut O, 2010, INT CONF SMART GRID, P220, DOI 10.1109/SMARTGRID.2010.5622045