Local Cyber-physical Attack with Leveraging Detection in Smart Grid

被引:0
作者
Chung, Hwei-Ming [1 ]
Li, Wen-Tai [2 ]
Yuen, Chau [2 ]
Chung, Wei-Ho [1 ]
Wen, Chao-Kai [3 ]
机构
[1] Acad Sinica, Res Ctr Informat Technol Innovat, Taipei 115, Taiwan
[2] Singapore Univ Technol & Design, Engn Prod Dev, Singapore 487372, Singapore
[3] Natl Sun Yat Sen Univ, Inst Commun Engn, Kaohsiung 804, Taiwan
来源
2017 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM) | 2017年
关键词
Cyber-physical system; combinational attacks; smart grid; power line outages; power flow; POWER-SYSTEMS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A well-designed attack in the power system can cause an initial failure and then results in large-scale cascade failure. Several works have discussed power system attack through false data injection, line-maintaining attack, and line-removing attack. However, the existing methods need to continuously attack the system for a long time, and, unfortunately, the performance cannot be guaranteed if the system states vary. To overcome this issue, we consider a new type of attack strategy called combinational attack which masks a line-outage at one position but misleads the control center on line outage at another position. Therefore, the topology information in the control center is interfered by our attack. We also offer a procedure of selecting the vulnerable lines of its kind. The proposed method can effectively and continuously deceive the control center in identifying the actual position of line-outage. The system under attack will be exposed to increasing risks as the attack continuously. Simulation results validate the efficiency of the proposed attack strategy.
引用
收藏
页码:461 / 466
页数:6
相关论文
共 18 条
[1]  
Abur A., 2004, POWER SYSTEM STATE E
[2]  
Christie R., 1993, Power systems test case archive
[3]  
Grant M., 2014, CVX: MATLAB software for disciplined convex programming, version 2.0 beta
[4]   Direct Calculation of Line Outage Distribution Factors [J].
Guo, Jiachun ;
Fu, Yong ;
Li, Zuyi ;
Shahidehpour, Mohammad .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2009, 24 (03) :1633-1634
[5]   On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures [J].
Kim, Jinsub ;
Tong, Lang .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (07) :1294-1305
[6]  
Lee C.Y., 1961, IRE Trans. Electron. Comput, V3, P346, DOI [10.1109/TEC.1961.5219222, DOI 10.1109/TEC.1961.5219222]
[7]  
Li Z., IEEE T SMART GRID
[8]  
Lin Y., IEEE T SMART GRID
[9]  
Liu X., IEEE T SMART GRID
[10]   Modeling of Local False Data Injection Attacks With Reduced Network Information [J].
Liu, Xuan ;
Bao, Zhen ;
Lu, Dan ;
Li, Zuyi .
IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (04) :1686-1696