• DocumentCode
    687575
  • Title

    Mitigating False-data Injection Attacks on DC State Estimation using Covert Topological Information

  • Author

    Suzhi Bi ; Ying Jun Zhang

  • Author_Institution
    Nat. Univ. of Singapore, Hong Kong, China
  • fYear
    2013
  • fDate
    9-13 Dec. 2013
  • Firstpage
    766
  • Lastpage
    771
  • Abstract
    A well-functioning power system relies on its accurate state estimation. However, recent research shows that well-structured false-data injection attacks can bypass the current security system and introduce arbitrary errors to state estimates. In this paper, we propose a novel defending mechanism against false-data injection attacks using covert power network topological information. By keeping the exact reactance of a set of transmission lines from attackers, no false data injection attack can be launched to compromise any set of critical state estimates. We first investigate from the attackers´ perspective the necessary condition to perform injection attack. Based on the arguments, we characterize the optimal protection problem, which protects the state estimates with minimum number of covert transmission lines, into a minimum Steiner tree problem in a graph, where some off-the-shelf algorithms can be applied. Besides, we also propose a mixed defending strategy that jointly considers the use of covert topological information (CTI) and secure meter measurements when CTI protection alone fails to achieve the protection objective due to technical constraints. The advantageous performance of the proposed defending mechanisms is verified in IEEE standard power system testcase. Our results here will be useful in the security upgrade projects of large-scale electrical power system towards smart power grids.
  • Keywords
    IEEE standards; power system protection; power system security; smart power grids; state estimation; trees (mathematics); CTI protection; IEEE standard power system; Steiner tree problem; arbitrary errors; covert power network topological information; covert topological information; covert transmission lines; critical state estimates; dc state estimation; electrical power system; false-data injection attacks mitigation; optimal protection problem; power system; security system; security upgrade projects; smart power grids; technical constraints; transmission lines; Power measurement; Power transmission lines; Security; State estimation; Transmission line measurements; Vectors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Global Communications Conference (GLOBECOM), 2013 IEEE
  • Conference_Location
    Atlanta, GA
  • Type

    conf

  • DOI
    10.1109/GLOCOM.2013.6831165
  • Filename
    6831165