Graph-based Cyber Security Analysis of State Estimation in Smart Power Grid

被引:17
作者
Bi, Suzhi [1 ]
Zhang, Ying Jun [2 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, Shenzhen, Peoples R China
[2] Chinese Univ Hong Kong, Dept Informat Engn, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
DATA INJECTION; ATTACKS; DEFENSE;
D O I
10.1109/MCOM.2017.1600210C
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The smart power grid enables intelligent automation at all levels of power system operation, from electricity generation at power plants to power usage in the home. The key enabling factor of an efficient smart grid is its built-in ICT, which monitors the real-time system operating state and makes control decisions accordingly. As an important building block of the ICT system, power system state estimation is of critical importance to maintain normal operation of the smart grid, which, however, is under mounting threat from potential cyber attacks. In this article, we introduce a graph-based framework for performing cyber-security analysis in power system state estimation. Compared to conventional arithmetic-based security analysis, the graphical characterization of state estimation security provides intuitive visualization of some complex problem structures and enables efficient graphical solution algorithms, which are useful for both defending and attacking the ICT system of the smart grid. We also highlight several promising future research directions on graph-based security analysis and its applications in smart power grid.
引用
收藏
页码:176 / 183
页数:8
相关论文
共 15 条
[1]  
Abur A., 2004, POWER SYSTEM STATE E
[2]  
Barglela A., 1986, IEEE T POWER SYST, VPWRS-1
[3]  
Bi S., 2011, P IEEE GLOBECOM
[4]  
Bi S., 2014, IEEE JSAC, V32, P1
[5]  
Bi S., 2013, P IEEE GLOBECOM
[6]   Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation [J].
Bi, Suzhi ;
Zhang, Ying Jun .
IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (03) :1216-1227
[7]  
Bobba R., 2010, P CPSWEEK APR
[8]   Bad Data Injection in Smart Grid: Attack and Defense Mechanisms [J].
Huang, Yi ;
Esmalifalak, Mohammad ;
Huy Nguyen ;
Zheng, Rong ;
Han, Zhu ;
Li, Husheng ;
Song, Lingyang .
IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (01) :27-33
[9]   Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks [J].
Hug, Gabriela ;
Giampapa, Joseph Andrew .
IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (03) :1362-1370
[10]   Malicious Data Attacks on the Smart Grid [J].
Kosut, Oliver ;
Jia, Liyan ;
Thomas, Robert J. ;
Tong, Lang .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :645-658