False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure

The concept of false data injection attack (FDIA) was introduced originally in the smart grid domain. While the term sounds common, it specifically means the case when an attacker compromises sensor readings in such tricky way that undetected errors are introduced into calculations of state variables and values. Due to the rapid growth of the Internet and associated complex adaptive systems, cyber attackers are interested in exploiting similar attacks in other application domains such as healthcare, finance, defense, governance, etc. In today’s increasingly perilous cyber world of complex adaptive systems, FDIA has become one of the top-priority issues to deal with. It is a necessity today for greater awareness and better mechanism to counter such attack in the cyberspace. Hence, this work presents an overview of the attack, identifies the impact of FDIA in critical domains, and talks about the countermeasures. A taxonomy of the existing countermeasures to defend against FDIA is provided. Unlike other works, we propose some evaluation metrics for FDIA detection and also highlight the scarcity of benchmark datasets to validate the performance of FDIA detection techniques.

[1]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[2]  Jin Wei,et al.  Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.

[3]  Bo Tang,et al.  Detection of false data injection attacks in smart grid under colored Gaussian noise , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[4]  Hilde van der Togt,et al.  Publisher's Note , 2003, J. Netw. Comput. Appl..

[5]  Fei Hu,et al.  Combating False Data Injection Attacks in Smart Grid using Kalman Filter , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[6]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[7]  Yang Liu,et al.  A survey on bad data injection attack in smart grid , 2013, 2013 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC).

[8]  Mohiuddin Ahmed,et al.  A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..

[9]  Zhu Han,et al.  Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.

[10]  Mohiuddin Ahmed,et al.  False Data Injection Attacks in Healthcare , 2017, AusDM.

[11]  Mehul Motani,et al.  Detecting False Data Injection Attacks in AC State Estimation , 2015, IEEE Transactions on Smart Grid.

[12]  Mohiuddin Ahmed Data summarization: a survey , 2018, Knowledge and Information Systems.

[13]  Mohammad Shojafar,et al.  Internet of everything, networks, applications, and computing systems (IoENACS) , 2020, International Journal of Computers and Applications.

[14]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[15]  Ganesh Kumar Venayagamoorthy,et al.  A Survey on the Effects of False Data Injection Attack on Energy Market , 2018, 2018 Clemson University Power Systems Conference (PSC).

[16]  Xuemin Shen,et al.  Efficient prevention technique for false data injection attack in smart grid , 2016, 2016 IEEE International Conference on Communications (ICC).

[17]  Al-Sakib Khan Pathan,et al.  Practical Cryptography: Algorithms and Implementations Using C++ , 2014 .

[18]  JajodiaSushil,et al.  Interleaved hop-by-hop authentication against false data injection attacks in sensor networks , 2007 .

[19]  Hamed Mohsenian Rad,et al.  False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[20]  Mohiuddin Ahmed,et al.  False Image Injection Prevention Using iChain , 2019, Applied Sciences.

[21]  Al-Sakib Khan Pathan,et al.  Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification , 2019, Complex Adapt. Syst. Model..

[22]  Mohiuddin Ahmed,et al.  Blockchain: Can It Be Trusted? , 2020, Computer.

[23]  Qi Wang,et al.  Review of the false data injection attack against the cyber-physical power system , 2018, IET Cyper-Phys. Syst.: Theory & Appl..

[24]  Mohiuddin Ahmed,et al.  Deep Learning: Hope or Hype , 2020 .