On Security Indices for State Estimators in Power Networks

In this paper, we study stealthy false-data attacksagainst state estimators in power networks. The focus ison applications in SCADA (Supervisory Control and DataAcquisition) systems where measurement data is corrupted bya malicious attacker. We introduce two security indices for thestate estimators. The indices quantify the least effort neededto achieve attack goals while avoiding bad-data alarms in thepower network control center (stealthy attacks). The indicesdepend on the physical topology of the power network and theavailable measurements, and can help the system operator toidentify sparse data manipulation patterns. This informationcan be used to strengthen the security by allocating encryptiondevices, for example. The analysis is also complemented witha convex optimization framework that can be used to evaluatemore complex attacks taking model deviations and multipleattack goals into account. The security indices are finallycomputed in an example. It is seen that a large measurementredundancy forces the attacker to use large magnitudes in thedata manipulation pattern, but that the pattern still can be relatively sparse.

[1]  Robert J. Thomas,et al.  MATPOWER's extensible optimal power flow architecture , 2009, 2009 IEEE Power & Energy Society General Meeting.

[2]  Stephen P. Boyd,et al.  Enhancing Sparsity by Reweighted ℓ1 Minimization , 2007, 0711.1612.

[3]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[4]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[5]  M. Ribbens-Pavella,et al.  Bad Data Identification Methods In Power System State Estimation-A Comparative Study , 1985, IEEE Transactions on Power Apparatus and Systems.

[6]  A. Monticelli,et al.  Electric power system state estimation , 2000, Proceedings of the IEEE.

[7]  Felix F. Wu,et al.  Detection of Topology Errors by State Estimation , 1989, IEEE Power Engineering Review.

[8]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[9]  Henrik Sandberg,et al.  The VIKING project: An initiative on resilient control of power networks , 2009, 2009 2nd International Symposium on Resilient Control Systems.

[10]  Mohammad Shahidehpour,et al.  Impact of Security on Power Systems Operation , 2005, Proceedings of the IEEE.