Security design against stealthy attacks on power system state estimation: A formal approach

被引:4
作者
Rahman, Mohammad Ashiqur [1 ]
Datta, Amarjit [2 ]
Al-Shaer, Ehab [3 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33199 USA
[2] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
[3] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC USA
基金
美国国家科学基金会;
关键词
Smart grid; False data injection; Security architecture; Formal model; Synthesis;
D O I
10.1016/j.cose.2019.03.022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
State estimation is very important for securely, reliably, and efficiently maintaining a power grid. If state estimation is not protected, an attacker can compromise meters or communication systems and introduce false measurements, which can evade existing Bad Data Detection (BDD) algorithms and lead to incorrect state estimation. This kind of attack is stealthy and widely known as an Undetected False Data Injection (UFDI) attack. Attackers are limited by different attributes, in terms of knowledge, capabilities, resources, and attack targets, that are important to consider for realizing the potential attack vectors and, thereby, the security measures. In this paper, we present a formal framework for automatic synthesis of security architectures that will guard the grid against potential UFDI attacks on state estimation. In this approach, we first formalize UFDI attacks with respect to the grid topology, electrical properties, and different attack attributes. The solution to the model derives the attack vectors that exist in the formalized scenario. These attack vectors are considered by a second formal model, the security architecture synthesis model, to design the security measures (i.e., a set of measurements to be protected against false data injection). We enhance the performance of the security architecture synthesis mechanism by performing parallel and stepped execution of the formal models. We demonstrate the proposed mechanism through case studies and evaluate the performance of the proposed model by running experiments on different IEEE test systems. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:301 / 317
页数:17
相关论文
共 46 条
[1]  
Abur A., 2004, Power System State Estimation Theory andImplementation
[2]  
[Anonymous], 2016, P IEEE POW EN SOC GE
[3]  
[Anonymous], 2015, CyberSecurity Issues for Bulk Power System
[4]  
Bobba R, 2010, P IEEE WORKSH SEC CO
[5]   Coordinated Cyber-Attacks on the Measurement Function in Hybrid State Estimation [J].
Chakhchoukh, Yacine ;
Ishii, Hideaki .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2015, 30 (05) :2487-2497
[6]  
de Moura L, 2009, P BRAZ S FORM METH S
[7]   Defending Against False Data Injection Attacks on Power System State Estimation [J].
Deng, Ruilong ;
Xiao, Gaoxi ;
Lu, Rongxing .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (01) :198-207
[8]  
Esmalifalak M., 2011, 2011 IEEE Second International Conference on Smart Grid Communications (SmartGridComm 2011), P244, DOI 10.1109/SmartGridComm.2011.6102326
[9]   Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study [J].
Esmalifalak, Mohammad ;
Shi, Ge ;
Han, Zhu ;
Song, Lingyang .
IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (01) :160-169
[10]  
Gao SC, 2015, IEEE DECIS CONTR P, P2613, DOI 10.1109/CDC.2015.7402610