Data attack on strategic buses in the power grid: Design and protection

Malicious data attacks on specific buses of the power grid can lead to incorrect state estimation and in turn affect electricity prices and operational stability. A hidden data attack model is presented in this paper which involves an adversary corrupting meter readings in the grid to produce undetectable errors in a set of critical state variables. A polynomial time algorithm is given to identify the minimum set of measurements needed by the adversary to corrupt the desired state variables. To prevent such hidden attacks, a greedy protection algorithm is proposed for two cases, one where the adversary is resource limited and the other where the adversary has no resource constraint. The performances of the proposed algorithms are demonstrated through simulations on different IEEE test systems.

[1]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[2]  Peter Sanders,et al.  Shortest Paths , 1968, The Mathematical Gazette.

[3]  A.G. Phadke,et al.  Synchronized phasor measurements in power systems , 1993, IEEE Computer Applications in Power.

[4]  Sriram Vishwanath,et al.  Optimal hidden SCADA attacks on power grid: A graph theoretic approach , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[5]  D. R. Fulkerson,et al.  Maximal Flow Through a Network , 1956 .

[6]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[7]  Lang Tong,et al.  Limiting false data attacks on power system state estimation , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[8]  Thomas L. Magnanti,et al.  Shortest paths, single origin-destination network design, and associated polyhedra , 1993, Networks.

[9]  Mechthild Stoer,et al.  A simple min-cut algorithm , 1997, JACM.

[10]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[11]  Henrik Sandberg,et al.  Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.

[12]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.