An integrated detection system against false data injection attacks in the Smart Grid

The Smart Grid is a new type of power grid that will use advanced communication network technologies to support more efficient energy transmission and distribution. The grid infrastructure was designed for reliability; but security, especially against cyber threats, is also a critical need. In particular, an adversary can inject false data to disrupt system operation. In this paper, we develop a false data detection system that integrates two techniques that are tailored to the different attack types that we consider. We adopt anomaly-based detection to detect strong attacks that feature the injection of large amounts of spurious measurement data in a very short time. We integrate the anomaly detection mechanism with a watermarking-based detection scheme that prevents more stealthy attacks that involve subtle manipulation of the measurement data. We conduct a theoretical analysis to derive the closed-form formulae for the performance metrics that allow us to investigate the effectiveness of our proposed detection techniques. Our experimental data show that our integrated detection system can accurately detect both strong and stealthy attacks. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[2]  Sushil Jajodia,et al.  Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[3]  Kameshwar Poolla,et al.  Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[4]  Darko Kirovski,et al.  Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..

[5]  Roger Corder,et al.  Endotoxin induced hyperlactatemia and hypoglycemia is linked to decreased mitochondrial phosphoenolpyruvate carboxykinase. , 2009, Life sciences.

[6]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[7]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[8]  Ruggero Carli,et al.  A distributed method for state estimation and false data detection in power networks , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[9]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[10]  William Stallings Zhu,et al.  Network Security Essentials : Applications and Standards , 2007 .

[11]  Xinwen Fu,et al.  DSSS-Based Flow Marking Technique for Invisible Traceback , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[12]  Heejo Lee,et al.  OMAP: One-Way Memory Attestation Protocol for Smart Meters , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.

[13]  V. Yohai,et al.  Quantile–Quantile Plot for Deviance Residuals in the Generalized Linear Model , 2004 .

[14]  Nicolas H. Younan,et al.  An image-adaptive watermark based on a redundant wavelet transform , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[15]  David G. Stork,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[16]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[17]  Zhu Han,et al.  Defending false data injection attack on smart grid network using adaptive CUSUM test , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[18]  Yue Yuan,et al.  Analysis of the environmental benefits of Distributed Generation , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[19]  Kang Lee,et al.  IEEE 1588 standard for a precision clock synchronization protocol for networked measurement and control systems , 2002, 2nd ISA/IEEE Sensors for Industry Conference,.

[20]  Emanuele Garone,et al.  False Data Injection Attacks for State Estimation in Cyber-Physical Systems , 2010, CDC 2010.

[21]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[22]  Lang Tong,et al.  Malicious data attack on real-time electricity market , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[23]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[24]  Bruce M. McMillin,et al.  Information Flow Analysis of Energy Management in a Smart Grid , 2010, SAFECOMP.

[25]  Wei Yu,et al.  On statistical modeling and forecasting of energy usage in smart grid , 2014, RACS '14.

[26]  Alvaro A. Cárdenas,et al.  Evaluating Electricity Theft Detectors in Smart Grid Networks , 2012, RAID.

[27]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[28]  Stamatis Karnouskos,et al.  Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[29]  Xinyu Yang,et al.  On False Data Injection Attacks against Distributed Energy Routing in Smart Grid , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.

[30]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[31]  Dmitry Podkuiko,et al.  Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.

[32]  Tao Jin,et al.  Zero pre-shared secret key establishment in the presence of jammers , 2009, MobiHoc '09.

[33]  June A. Flora,et al.  Real-time Feedback and Electricity Consumption: A Field Experiment Assessing the Potential for Savings and Persistence , 2013 .

[34]  Miodrag Potkonjak,et al.  Real-time watermarking techniques for sensor networks , 2003, IS&T/SPIE Electronic Imaging.

[35]  F.M. Cleveland,et al.  Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[36]  Harry L. Van Trees,et al.  Detection, Estimation, and Modulation Theory, Part I , 1968 .

[37]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[38]  David L. Mills,et al.  Internet Engineering Task Force (ietf) Network Time Protocol Version 4: Protocol and Algorithms Specification , 2010 .

[39]  Lang Tong,et al.  Limiting false data attacks on power system state estimation , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[40]  Lang Tong,et al.  On malicious data attacks on power system state estimation , 2010, 45th International Universities Power Engineering Conference UPEC2010.

[41]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[42]  Ibrahim Kamel,et al.  Simplified watermarking scheme for sensor networks , 2010, Int. J. Internet Protoc. Technol..

[43]  Grahame Smillie Analogue and Digital Communication Techniques , 1999 .

[44]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .