DocumentCode
3668698
Title
Using spy node to identify cyber-attack in power systems as a novel approach
Author
Khaled F Alotaibi;Milad Moghassem Hamidi;Morteza Talebi;Jinsheng Xu;Abdollah Homaifar
Author_Institution
North Carolina Agricultural and Technical State University
fYear
2015
fDate
5/1/2015 12:00:00 AM
Firstpage
581
Lastpage
586
Abstract
Cyber-security of power systems is of vital importance in this decade and the attackers attempt to manipulate the data and inject malicious data in state variables to divert state of the system. Cyber-attack utilizes the information of the system to generate the attacking vector in order to elude the malicious data tests. The proposed novel approach intends to change the information of the system being exploited by the adversary through adding virtual buses to the network referred as spy nodes. These nodes, including extra measurements fed to the attacker, are able to change the perceived topology of the network on which the attacker depends. Candidate places of the spy nodes are determined by using spanning tree algorithm. Excluding the spy data and using the proposed criteria, malicious data is detected. Results were verified by simulating IEEE 9-bus standard system for several times. Furthermore the method detects the malicious data when the value of spy data changes.
Keywords
"Pollution measurement","Power measurement","SCADA systems","State estimation","Transmission line measurements","Substations"
Publisher
ieee
Conference_Titel
Electro/Information Technology (EIT), 2015 IEEE International Conference on
Electronic_ISBN
2154-0373
Type
conf
DOI
10.1109/EIT.2015.7293401
Filename
7293401
Link To Document