DocumentCode :
2364515
Title :
Limiting false data attacks on power system state estimation
Author :
Kosut, Oliver ; Jia, Liyan ; Thomas, Robert J. ; Tong, Lang
Author_Institution :
Sch. of Electr. & Comput. Eng., Cornell Univ., Ithaca, NY, USA
fYear :
2010
fDate :
17-19 March 2010
Firstpage :
1
Lastpage :
6
Abstract :
Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at several meters in a power system, it can sometimes change the state estimate at the control center in a way that will never be detected by classical bad data detectors. However, in cases when the adversary is not able to perform this attack, it was not clear what attacks might look like. An easily computable heuristic is developed to find bad adversarial attacks in all cases. This heuristic recovers the undetectable attacks, but it will also find the most damaging attack in all cases. In addition, a Bayesian formulation of the bad data problem is introduced, which captures the prior information that a control center has about the likely state of the power system. This formulation softens the impact of undetectable attacks. Finally, a new L¿ norm detector is introduced, and it is demonstrated that it outperforms more standard L2 norm based detectors by taking advantage of the inherent sparsity of the false data injection.
Keywords :
Bayes methods; computerised instrumentation; data acquisition; power engineering computing; power grids; power system interconnection; power system measurement; power system security; security of data; Bayesian formulation; L¿ norm detector; bad adversarial attack; bad data problem; false data attack; false data injection; malicious attacks; power system state estimation; undetectable attack; Bayesian methods; Control systems; Detectors; Power measurement; Power system control; Power system measurements; Power system reliability; Power system security; Power systems; State estimation; Power system state estimation; false data attack; power system security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Sciences and Systems (CISS), 2010 44th Annual Conference on
Conference_Location :
Princeton, NJ
Print_ISBN :
978-1-4244-7416-5
Electronic_ISBN :
978-1-4244-7417-2
Type :
conf
DOI :
10.1109/CISS.2010.5464816
Filename :
5464816
Link To Document :
بازگشت