Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies