Effective Measurement Design for Cyber Security

被引:0
|
作者
Gol, Murat [1 ]
Abur, Ali [1 ]
机构
[1] Northeastern Univ, Elect & Comp Engn Dept, Boston, MA 02115 USA
关键词
State Estimation; cyber security; critical measurements; leverage measurements; PMU; BAD DATA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber-attacks against power systems have been widely researched in recent years. Several studies have so far focused on ways of deceiving the state estimator so that the resulting estimates would be wrong. On the other hand, the role of network topology and measurement design on detectability of cyber-attacks has not been widely investigated. This work examines the measurements and network topology to identify vulnerabilities against targeted cyber-attacks. Specifically, it considers the leverage measurements, whose errors are typically not easily detected and therefore they may bias estimators when they carry gross errors. The paper also illustrates that this vulnerability can be addressed by strategic replacement of few of these measurements by phasor measurement units (PMUs).
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia
    Hadji-Janev, Metodi
    CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 57 - 64
  • [32] Cyber security
    Boughton, Nick
    CHEMISTRY & INDUSTRY, 2019, 83 (04) : 38 - 38
  • [33] Cyber security
    Sandström, E
    Weiss, J
    2005 CIGRE/IEEE PES International Symposium, 2005, : 282 - 289
  • [34] CYBER SECURITY
    Sonntag, Michael
    IDIMT-2016- INFORMATION TECHNOLOGY, SOCIETY AND ECONOMY STRATEGIC CROSS-INFLUENCES, 2016, 45 : 313 - 323
  • [35] Cyber(in)security
    Szczypiorski, Krzysztof
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2020, 66 (01) : 243 - 248
  • [36] Cyber Security
    Welander, Peter
    CONTROL ENGINEERING, 2009, 56 (01) : 40 - 43
  • [37] Cyber security
    Colias, M
    HOSPITALS & HEALTH NETWORKS, 2004, 78 (05): : 60 - +
  • [38] Taxonomy of cyber security metrics to measure strength of cyber security
    Gupta Bhol S.
    Mohanty J.R.
    Kumar Pattnaik P.
    Materials Today: Proceedings, 2023, 80 : 2274 - 2279
  • [39] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18
  • [40] Cyber Security Training A Survey of Serious Games in Cyber Security
    Tioh, Jin-Ning
    Mina, Mani
    Jacobson, Douglas W.
    2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,