DocumentCode
1670649
Title
Power flow cyber attacks and perturbation-based defense
Author
Davis, Katherine R. ; Morrow, K.L. ; Bobba, Rakesh ; Heine, E.
Author_Institution
PowerWorld Corp., USA
fYear
2012
Firstpage
342
Lastpage
347
Abstract
In this paper, we present two contributions to false data injection attacks and mitigation in electric power systems. First, we introduce a method of creating unobservable attacks on the AC power flow equations. The attack strategy details how an adversary can launch a stealthy attack to achieve a goal. Then, we introduce a proactive defense strategy that is capable of detecting attacks. The defense strategy introduces known perturbations by deliberately probing the system in a specific, structured manner. We show that the proposed approach, under certain conditions, is able to detect the presence of false data injection attacks, as well the attack locations and information about the manipulated data values.
Keywords
load flow; power system security; AC power flow equations; attack detection strategy; electric power systems; false data injection attack detection; false data injection attack mitigation; perturbation-based defense; power flow cyber attacks; proactive defense strategy; Equations; Load flow; Mathematical model; Power measurement; Probes; Vectors;
fLanguage
English
Publisher
ieee
Conference_Titel
Smart Grid Communications (SmartGridComm), 2012 IEEE Third International Conference on
Conference_Location
Tainan
Print_ISBN
978-1-4673-0910-3
Electronic_ISBN
978-1-4673-0909-7
Type
conf
DOI
10.1109/SmartGridComm.2012.6486007
Filename
6486007
Link To Document