Smart Grid Data Integrity Attacks - Berkeley Center for Control and ...
Smart Grid Data Integrity Attacks - Berkeley Center for Control and ...
Smart Grid Data Integrity Attacks - Berkeley Center for Control and ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JANUARY 2012 10<br />
Fig. 7. IEEE 300 bus test case: 19 bus subsystem.<br />
Fig. 8. 3-Sparse attack that compromises injection buses 9021 <strong>and</strong> 9002.<br />
The attack commences at t = 3sec with amplitude increasing at 3MW/sec.<br />
all 3-,4-, <strong>and</strong> 5-sparse attacks under the assumption that all<br />
lines are metered. We have offered countermeasures against<br />
arbitrary unobservable attacks using known-secure PMUs, <strong>and</strong><br />
shown that p + 1 PMUs are sufficient to disable p attacks.<br />
A significant difficulty in state estimation is the stale data<br />
problem. Meter readings arrive asynchronously at the state<br />
estimator, <strong>and</strong> the worst case delay may be on the order of 5-<br />
10 minutes [including algorithm convergence time]. With such<br />
latencies, state estimation may be a poor vehicle to detect<br />
cyberattacks. The deeper issue with cybersecurity research<br />
relate to grid operations. An attack has consequences only<br />
when the grid operator is misled into taking harmful actions<br />
based on the compromised data. A comprehensive <strong>and</strong> realistic<br />
analysis of cybersecurity threats to electricity grids must<br />
there<strong>for</strong>e incorporate current operating practice, both under<br />
normal <strong>and</strong> contingency operations. These issues are worthy<br />
of future research.<br />
REFERENCES<br />
[1] A. Abur <strong>and</strong> A. G. Exposito, “Power System State Estimation: Theory<br />
<strong>and</strong> Implementation,” CRC Press, 2004.<br />
[2] M. Basseville <strong>and</strong> I. V. Niki<strong>for</strong>ov, “Detection of Abrupt Changes: Theory<br />
<strong>and</strong> Application,” Prentice-Hall, 1993.<br />
[3] R.B. Bobba, K.M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt <strong>and</strong><br />
T.J. Overbye, “Detecting False <strong>Data</strong> Injection <strong>Attacks</strong> on DC State<br />
Estimation,” Proceedings First Workshop on Secure <strong>Control</strong> Systems,<br />
CPSWeek 2010, Stockholm Sweden, April, 2010.<br />
[4] J. Chen <strong>and</strong> A. Abur, “Placement of PMUs to Enable Bad <strong>Data</strong> Detection<br />
in State Estimation,” IEEE Transactions on Power Systems, vol. 21, no.<br />
4, pp. 1608–1615, 2006.<br />
[5] S. Cui, Z. Han, S. Kar, T. T. Kim, H. V. Poor, <strong>and</strong> A. Tajer, “Coordinated<br />
<strong>Data</strong> Injection Attack <strong>and</strong> Detection in <strong>Smart</strong> <strong>Grid</strong>,” IEEE Signal<br />
Processing Magazine, vol. 29, no. 5, pp. 106–115, 2012.<br />
[6] G. Dan <strong>and</strong> H. S<strong>and</strong>berg, “Stealth <strong>Attacks</strong> <strong>and</strong> Protection Schemes <strong>for</strong><br />
State Estimators in Power Systems,” Proceedings First IEEE International<br />
Conference on <strong>Smart</strong> <strong>Grid</strong> Communications (<strong>Smart</strong><strong>Grid</strong>Comm),<br />
2010.<br />
[7] S. Dasgupta, C. Papadimitriou, <strong>and</strong> U. Vazirani, Algorithms, McGraw<br />
Hill, 2006.<br />
[8] Dept. of Energy, http://www.oe.energy.gov/Documents<strong>and</strong>Media/02-1-<br />
11 OE Press Release Risk Management.pdf<br />
[9] R. Emami <strong>and</strong> A. Abur, “Robust Measurement Design by Placing Synchronized<br />
Phasor Measurements on Network Branches,” IEEE Transactions<br />
on Power Systems, vol. 25, no. 1, pp. 38–43, Feb. 2010.<br />
[10] T. Flick <strong>and</strong> J. Morehouse, “Securing the <strong>Smart</strong> <strong>Grid</strong>: Next Generation<br />
Power <strong>Grid</strong> Security,” Syngress, 2010.<br />
[11] A. Giani et al, “<strong>Smart</strong> <strong>Grid</strong> <strong>Data</strong> <strong>Integrity</strong> <strong>Attacks</strong>: Characterizations<br />
<strong>and</strong> Countermeasures,” Proceedings of The Second IEEE International<br />
Conference on <strong>Smart</strong> <strong>Grid</strong> Communications (<strong>Smart</strong><strong>Grid</strong>Comm), 2010.<br />
[12] D. Gorinevsky, S. Boyd, <strong>and</strong> S. Poll, “Estimation of Faults in DC<br />
Electrical Power System,” Proceedings IEEE Conference on Decision<br />
<strong>and</strong> <strong>Control</strong>, pp. 4334–4339, December 2009.<br />
[13] G.P. Granelli, <strong>and</strong> M. Montagna, “Identification of Interacting Bad <strong>Data</strong><br />
in the Framework of the Weighted Least Square Method,” Electric Power<br />
Systems Research, vol. 78, no. 5, pp. 806–814, 2008.<br />
[14] J. Hopcroft <strong>and</strong> R. Tarjan, “Efficient algorithms <strong>for</strong> graph manipulation,”<br />
Communications of the ACM, vol. 16, no. 6, pp. 372-378, 1973.<br />
[15] C.-H. Huang, C.-H. Lee, K.-R. Shih, <strong>and</strong> Y.-J. Wang, “Bad <strong>Data</strong> Analysis<br />
in Power System Measurement Estimation,” European Transaction on<br />
Electrical Power, vol. 20, pp. 1082–1100, 2010.<br />
[16] H.-J.Koglin, Th. Neisius, G. Beissler, <strong>and</strong> K. D. Schmitt, “Bad <strong>Data</strong><br />
Detection <strong>and</strong> Identification,” Int. Journal on Electric Power, vol. 12,<br />
no. 2, pp. 94–103, 1990.<br />
[17] V. Igure, S. Laughtera, <strong>and</strong> R. Williams, “Security issues in SCADA<br />
networks,” Computers <strong>and</strong> Security, vol. 25, no. 7, pp. 498–506, 2006.<br />
[18] G. N. Korres et al., “Numerical Observability Analysis Based on<br />
Network Graph Theory,” IEEE Transaction on Power Systems, vol. 18,<br />
no. 3, pp. 1035–1045, 2003.<br />
[19] T.T. Kim <strong>and</strong> H. V. Poor, “Strategic Protection Against <strong>Data</strong> Injection<br />
<strong>Attacks</strong> on Power <strong>Grid</strong>s”, IEEE Transactions on <strong>Smart</strong> <strong>Grid</strong>, vol. 2, no.<br />
2, pp. 326–333, 2011.<br />
[20] O. Kosut, L. Jia, R. Thomas, <strong>and</strong> L. Tong, “Malicious <strong>Data</strong> <strong>Attacks</strong> on<br />
<strong>Smart</strong> <strong>Grid</strong> State Estimation: Attack Strategies <strong>and</strong> Countermeasures,”<br />
Proceedings First IEEE International Conference on <strong>Smart</strong> <strong>Grid</strong> Communications<br />
(<strong>Smart</strong><strong>Grid</strong>Comm), 2010.