Effective Measurement Design for Cyber Security

被引:0
|
作者
Gol, Murat [1 ]
Abur, Ali [1 ]
机构
[1] Northeastern Univ, Elect & Comp Engn Dept, Boston, MA 02115 USA
关键词
State Estimation; cyber security; critical measurements; leverage measurements; PMU; BAD DATA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber-attacks against power systems have been widely researched in recent years. Several studies have so far focused on ways of deceiving the state estimator so that the resulting estimates would be wrong. On the other hand, the role of network topology and measurement design on detectability of cyber-attacks has not been widely investigated. This work examines the measurements and network topology to identify vulnerabilities against targeted cyber-attacks. Specifically, it considers the leverage measurements, whose errors are typically not easily detected and therefore they may bias estimators when they carry gross errors. The paper also illustrates that this vulnerability can be addressed by strategic replacement of few of these measurements by phasor measurement units (PMUs).
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Smart Cyber-Physical Systems: Beyond Usable Security to Security Ergonomics by Design
    Craggs, Barnaby
    Rashid, Awais
    2017 IEEE/ACM 3RD INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING FOR SMART CYBER-PHYSICAL SYSTEMS (SESCPS 2017), 2017, : 22 - 25
  • [42] Towards the Cyber Security Paradigm of eHealth: Resilience and Design Aspects
    Rajamaki, Jyri
    Pirinen, Rauno
    APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2017, 1836
  • [43] Informing Hybrid System Design in Cyber Security Incident Response
    Nyre-Yu, Megan
    Sprehn, Kelly A.
    Caldwell, Barrett S.
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST, 2019, 11594 : 325 - 338
  • [44] Operation Raven Design of a Cyber Security Incident Response Game
    Seiler, Andreas
    Lechner, Ulrike
    Strussenberg, Judith
    Hofbauer, Stefan
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2024, 2024, 2109 : 337 - 347
  • [45] Design and Development of a Cyber Security Framework for National Time Dissemination
    Arunachalam A.
    Seetharaman K.
    Agarwal A.
    SN Computer Science, 2021, 2 (2)
  • [46] Design and Develop Hands on Cyber-Security Curriculum and Laboratory
    Yuan, Dongqing
    2017 COMPUTING CONFERENCE, 2017, : 1176 - 1179
  • [47] Variable Self-Efficacy as a Measurement for Behaviors in Cyber Security Operations
    Lugo, Ricardo G.
    Knox, Benjamin J.
    Josok, Oyvind
    Sutterlin, Stefan
    AUGMENTED COGNITION. HUMAN COGNITION AND BEHAVIOR, AC 2020, PT II, 2020, 12197 : 395 - 404
  • [48] Cyber Mission Assurance for Cyber Security
    MacKay M.
    ITNOW, 2020, 62 (01) : 32 - 33
  • [49] A Measurement Source Authentication Methodology for Power System Cyber Security Enhancement
    Cui, Yi
    Bai, Feifei
    Liu, Yong
    Liu, Yilu
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) : 3914 - 3916
  • [50] Cyber Security without Cyber War
    O'Connell, Mary Ellen
    JOURNAL OF CONFLICT & SECURITY LAW, 2012, 17 (02): : 187 - 209