20.11.2012 Views

Smart Grid Data Integrity Attacks - Berkeley Center for Control and ...

Smart Grid Data Integrity Attacks - Berkeley Center for Control and ...

Smart Grid Data Integrity Attacks - Berkeley Center for Control and ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JANUARY 2012 10<br />

Fig. 7. IEEE 300 bus test case: 19 bus subsystem.<br />

Fig. 8. 3-Sparse attack that compromises injection buses 9021 <strong>and</strong> 9002.<br />

The attack commences at t = 3sec with amplitude increasing at 3MW/sec.<br />

all 3-,4-, <strong>and</strong> 5-sparse attacks under the assumption that all<br />

lines are metered. We have offered countermeasures against<br />

arbitrary unobservable attacks using known-secure PMUs, <strong>and</strong><br />

shown that p + 1 PMUs are sufficient to disable p attacks.<br />

A significant difficulty in state estimation is the stale data<br />

problem. Meter readings arrive asynchronously at the state<br />

estimator, <strong>and</strong> the worst case delay may be on the order of 5-<br />

10 minutes [including algorithm convergence time]. With such<br />

latencies, state estimation may be a poor vehicle to detect<br />

cyberattacks. The deeper issue with cybersecurity research<br />

relate to grid operations. An attack has consequences only<br />

when the grid operator is misled into taking harmful actions<br />

based on the compromised data. A comprehensive <strong>and</strong> realistic<br />

analysis of cybersecurity threats to electricity grids must<br />

there<strong>for</strong>e incorporate current operating practice, both under<br />

normal <strong>and</strong> contingency operations. These issues are worthy<br />

of future research.<br />

REFERENCES<br />

[1] A. Abur <strong>and</strong> A. G. Exposito, “Power System State Estimation: Theory<br />

<strong>and</strong> Implementation,” CRC Press, 2004.<br />

[2] M. Basseville <strong>and</strong> I. V. Niki<strong>for</strong>ov, “Detection of Abrupt Changes: Theory<br />

<strong>and</strong> Application,” Prentice-Hall, 1993.<br />

[3] R.B. Bobba, K.M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt <strong>and</strong><br />

T.J. Overbye, “Detecting False <strong>Data</strong> Injection <strong>Attacks</strong> on DC State<br />

Estimation,” Proceedings First Workshop on Secure <strong>Control</strong> Systems,<br />

CPSWeek 2010, Stockholm Sweden, April, 2010.<br />

[4] J. Chen <strong>and</strong> A. Abur, “Placement of PMUs to Enable Bad <strong>Data</strong> Detection<br />

in State Estimation,” IEEE Transactions on Power Systems, vol. 21, no.<br />

4, pp. 1608–1615, 2006.<br />

[5] S. Cui, Z. Han, S. Kar, T. T. Kim, H. V. Poor, <strong>and</strong> A. Tajer, “Coordinated<br />

<strong>Data</strong> Injection Attack <strong>and</strong> Detection in <strong>Smart</strong> <strong>Grid</strong>,” IEEE Signal<br />

Processing Magazine, vol. 29, no. 5, pp. 106–115, 2012.<br />

[6] G. Dan <strong>and</strong> H. S<strong>and</strong>berg, “Stealth <strong>Attacks</strong> <strong>and</strong> Protection Schemes <strong>for</strong><br />

State Estimators in Power Systems,” Proceedings First IEEE International<br />

Conference on <strong>Smart</strong> <strong>Grid</strong> Communications (<strong>Smart</strong><strong>Grid</strong>Comm),<br />

2010.<br />

[7] S. Dasgupta, C. Papadimitriou, <strong>and</strong> U. Vazirani, Algorithms, McGraw<br />

Hill, 2006.<br />

[8] Dept. of Energy, http://www.oe.energy.gov/Documents<strong>and</strong>Media/02-1-<br />

11 OE Press Release Risk Management.pdf<br />

[9] R. Emami <strong>and</strong> A. Abur, “Robust Measurement Design by Placing Synchronized<br />

Phasor Measurements on Network Branches,” IEEE Transactions<br />

on Power Systems, vol. 25, no. 1, pp. 38–43, Feb. 2010.<br />

[10] T. Flick <strong>and</strong> J. Morehouse, “Securing the <strong>Smart</strong> <strong>Grid</strong>: Next Generation<br />

Power <strong>Grid</strong> Security,” Syngress, 2010.<br />

[11] A. Giani et al, “<strong>Smart</strong> <strong>Grid</strong> <strong>Data</strong> <strong>Integrity</strong> <strong>Attacks</strong>: Characterizations<br />

<strong>and</strong> Countermeasures,” Proceedings of The Second IEEE International<br />

Conference on <strong>Smart</strong> <strong>Grid</strong> Communications (<strong>Smart</strong><strong>Grid</strong>Comm), 2010.<br />

[12] D. Gorinevsky, S. Boyd, <strong>and</strong> S. Poll, “Estimation of Faults in DC<br />

Electrical Power System,” Proceedings IEEE Conference on Decision<br />

<strong>and</strong> <strong>Control</strong>, pp. 4334–4339, December 2009.<br />

[13] G.P. Granelli, <strong>and</strong> M. Montagna, “Identification of Interacting Bad <strong>Data</strong><br />

in the Framework of the Weighted Least Square Method,” Electric Power<br />

Systems Research, vol. 78, no. 5, pp. 806–814, 2008.<br />

[14] J. Hopcroft <strong>and</strong> R. Tarjan, “Efficient algorithms <strong>for</strong> graph manipulation,”<br />

Communications of the ACM, vol. 16, no. 6, pp. 372-378, 1973.<br />

[15] C.-H. Huang, C.-H. Lee, K.-R. Shih, <strong>and</strong> Y.-J. Wang, “Bad <strong>Data</strong> Analysis<br />

in Power System Measurement Estimation,” European Transaction on<br />

Electrical Power, vol. 20, pp. 1082–1100, 2010.<br />

[16] H.-J.Koglin, Th. Neisius, G. Beissler, <strong>and</strong> K. D. Schmitt, “Bad <strong>Data</strong><br />

Detection <strong>and</strong> Identification,” Int. Journal on Electric Power, vol. 12,<br />

no. 2, pp. 94–103, 1990.<br />

[17] V. Igure, S. Laughtera, <strong>and</strong> R. Williams, “Security issues in SCADA<br />

networks,” Computers <strong>and</strong> Security, vol. 25, no. 7, pp. 498–506, 2006.<br />

[18] G. N. Korres et al., “Numerical Observability Analysis Based on<br />

Network Graph Theory,” IEEE Transaction on Power Systems, vol. 18,<br />

no. 3, pp. 1035–1045, 2003.<br />

[19] T.T. Kim <strong>and</strong> H. V. Poor, “Strategic Protection Against <strong>Data</strong> Injection<br />

<strong>Attacks</strong> on Power <strong>Grid</strong>s”, IEEE Transactions on <strong>Smart</strong> <strong>Grid</strong>, vol. 2, no.<br />

2, pp. 326–333, 2011.<br />

[20] O. Kosut, L. Jia, R. Thomas, <strong>and</strong> L. Tong, “Malicious <strong>Data</strong> <strong>Attacks</strong> on<br />

<strong>Smart</strong> <strong>Grid</strong> State Estimation: Attack Strategies <strong>and</strong> Countermeasures,”<br />

Proceedings First IEEE International Conference on <strong>Smart</strong> <strong>Grid</strong> Communications<br />

(<strong>Smart</strong><strong>Grid</strong>Comm), 2010.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!