Metrics for assessment of smart grid data integrity attacks

There is an emerging consensus that the nation's electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by re-dispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focussed on understanding the connections between grid operational procedures and cyber attacks. We first offer an example to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data is consistent with the physics of power flow, and is therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under operator re-dispatch decisions using optimal power flow methods. These metrics can be used to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advanced detection algorithms.

[1]  J. P. Pandey,et al.  Topology identification, bad data processing, and state estimation using fuzzy pattern matching , 2005, IEEE Transactions on Power Systems.

[2]  Tony Flick,et al.  Securing the Smart Grid: Next Generation Power Grid Security , 2010 .

[3]  A. Abur,et al.  Placement of PMUs to Enable Bad Data Detection in State Estimation , 2006, IEEE Transactions on Power Systems.

[4]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[5]  Thomas J. Overbye,et al.  The smart grid and PMUs: Operational challenges and opportunities , 2010, IEEE PES General Meeting.

[6]  Goran Strbac,et al.  A Recursive Bayesian Approach for Identification of Network Configuration Changes in Distribution System State Estimation , 2010, IEEE Transactions on Power Systems.

[7]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[8]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[9]  Goran Strbac,et al.  A recursive Bayesian approach for identification of network configuration changes in distribution system state estimation , 2011, 2011 IEEE Power and Energy Society General Meeting.

[10]  Fernando L. Alvarado,et al.  Network topology determination using least absolute value state estimation , 1995 .

[11]  Kameshwar Poolla,et al.  Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[12]  Laurence R. Phillips,et al.  Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08). , 2009 .

[13]  Nada Golmie,et al.  NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0 , 2010 .

[14]  Mohammad Shahidehpour,et al.  The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .

[15]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[16]  Nada Golmie,et al.  NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0 , 2014 .

[17]  J. Giri,et al.  PMU Impact on State Estimation Reliability for Improved Grid Security , 2006, 2005/2006 IEEE/PES Transmission and Distribution Conference and Exhibition.

[18]  Miles McQueen,et al.  'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State , 2011, SERENE.

[19]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[20]  Karl Henrik Johansson,et al.  A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator , 2010, ArXiv.

[21]  Probability Subcommittee,et al.  IEEE Reliability Test System , 1979, IEEE Transactions on Power Apparatus and Systems.