• DocumentCode
    1670649
  • Title

    Power flow cyber attacks and perturbation-based defense

  • Author

    Davis, Katherine R. ; Morrow, K.L. ; Bobba, Rakesh ; Heine, E.

  • Author_Institution
    PowerWorld Corp., USA
  • fYear
    2012
  • Firstpage
    342
  • Lastpage
    347
  • Abstract
    In this paper, we present two contributions to false data injection attacks and mitigation in electric power systems. First, we introduce a method of creating unobservable attacks on the AC power flow equations. The attack strategy details how an adversary can launch a stealthy attack to achieve a goal. Then, we introduce a proactive defense strategy that is capable of detecting attacks. The defense strategy introduces known perturbations by deliberately probing the system in a specific, structured manner. We show that the proposed approach, under certain conditions, is able to detect the presence of false data injection attacks, as well the attack locations and information about the manipulated data values.
  • Keywords
    load flow; power system security; AC power flow equations; attack detection strategy; electric power systems; false data injection attack detection; false data injection attack mitigation; perturbation-based defense; power flow cyber attacks; proactive defense strategy; Equations; Load flow; Mathematical model; Power measurement; Probes; Vectors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Smart Grid Communications (SmartGridComm), 2012 IEEE Third International Conference on
  • Conference_Location
    Tainan
  • Print_ISBN
    978-1-4673-0910-3
  • Electronic_ISBN
    978-1-4673-0909-7
  • Type

    conf

  • DOI
    10.1109/SmartGridComm.2012.6486007
  • Filename
    6486007