False data injection attacks

False data injection (FDI) attacks are malicious insertions of false data as sensor measurements in a cyber-physical system, in order to lead the system to take a wrong action. False data injection attacks do not attack the computational or network components of cyber-physical systems but the interface between the physical and the cyber part. Such attacks are powerful and can have catastrophic results. Defense against them can be achieved by limiting the attack surface through vulnerability analysis of the cyber-physical system design and by monitoring system operation in the field with monitors that observe system parameters and sensor measurements and detect abnormal operation early. In this chapter, we describe promising techniques for vulnerability analysis and dynamic monitoring, based on efficient SMT solvers and Kalman filter techniques, respectively.

[1]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[2]  Steven X. Ding,et al.  A Survey of Fault Diagnosis and Fault-Tolerant Techniques—Part II: Fault Diagnosis With Knowledge-Based and Hybrid/Active Approaches , 2015, IEEE Transactions on Industrial Electronics.

[3]  Michèle Basseville,et al.  The asymptotic local approach to change detection and model validation , 1987 .

[4]  Gerasimos Rigatos,et al.  Intelligent Renewable Energy Systems , 2016 .

[5]  Pierluigi Siano,et al.  Condition monitoring of wind-power units using the Derivative-free nonlinear Kalman Filter , 2018, 2018 IEEE 16th International Conference on Industrial Informatics (INDIN).

[6]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[7]  Gerasimos Rigatos,et al.  Nonlinear Control and Filtering Using Differential Flatness Approaches , 2015 .

[8]  Robert J. Elliott,et al.  On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.

[9]  Edmund M. Clarke,et al.  dReal: An SMT Solver for Nonlinear Theories over the Reals , 2013, CADE.

[10]  Marilyn Wolf,et al.  Internet-of-Things (IoT) Systems , 2018 .

[11]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[12]  Gerasimos Rigatos Intelligent Renewable Energy Systems: Modelling and Control , 2016 .

[13]  Steven X. Ding,et al.  Model-based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools , 2008 .

[14]  Dimitrios Serpanos,et al.  Designing Safe and Secure Industrial Control Systems: A Tutorial Review , 2018, IEEE Design & Test.

[15]  Pierluigi Siano,et al.  Neural Networks and Statistical Decision Making for Fault Diagnosis in Energy Conversion Systems , 2020 .

[16]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[17]  Dimitrios Serpanos,et al.  Secure and Resilient Industrial Control Systems , 2018, IEEE Design & Test.

[18]  Armando Solar-Lezama,et al.  Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[19]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[20]  Pierluigi Siano,et al.  Condition monitoring of gas-turuine power units using the Derivative-free nonlinear Kalman Filter , 2018, 2018 International Conference on Smart Energy Systems and Technologies (SEST).

[21]  Gerasimos Rigatos,et al.  Detection of Attacks Against Power Grid Sensors Using Kalman Filter and Statistical Decision Making , 2017, IEEE Sensors Journal.