Data Attacks on Power System State Estimation: Limited Adversarial Knowledge vs. Limited Attack Resources

Kaikai Pan, André Teixeira, Milos Cvetkovic, Peter Palensky

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

6 Citations (Scopus)

Abstract

It has shown that with perfect knowledge of the system model and the capability to manipulate a certain number of measurements, the false data injection (FDI) attacks, as a class of data integrity attacks, can coordinate measurements corruption to keep stealth against the bad data detection schemes. However, a more realistic attack is essentially an attack with limited adversarial knowledge of the system model and limited attack resources due to various reasons. In this paper, we generalize the data attacks that they can be pure FDI attacks or combined with availability attacks (e.g., DoS attacks) and analyze the attacks with limited adversarial knowledge or limited attack resources. The attack impact is evaluated by the proposed metrics and the detection probability of attacks is calculated using the distribution property of data with or without attacks. The analysis is supported with results from a power system use case. The results show how important the knowledge is to the attacker and which measurements are more vulnerable to attacks
with limited resources.
Original languageEnglish
Title of host publicationProceedings - IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society
Place of PublicationPiscataway, NJ
PublisherIEEE
Pages4313-4318
Number of pages6
ISBN (Electronic)978-1-5386-1127-2
DOIs
Publication statusPublished - 2017
EventIECON 2017: 43rd Annual Conference of the IEEE Industrial Electronics Society - China National Convention Center, Beijing, China
Duration: 29 Oct 20171 Nov 2017
Conference number: 43
http://iecon2017.csp.escience.cn/dct/page/1

Conference

ConferenceIECON 2017
Country/TerritoryChina
CityBeijing
Period29/10/171/11/17
Internet address

Keywords

  • Transmission line measurements
  • Transmission line matrix method
  • Power measurement
  • State estimation
  • Power grids

Fingerprint

Dive into the research topics of 'Data Attacks on Power System State Estimation: Limited Adversarial Knowledge vs. Limited Attack Resources'. Together they form a unique fingerprint.

Cite this