• DocumentCode
    3668698
  • Title

    Using spy node to identify cyber-attack in power systems as a novel approach

  • Author

    Khaled F Alotaibi;Milad Moghassem Hamidi;Morteza Talebi;Jinsheng Xu;Abdollah Homaifar

  • Author_Institution
    North Carolina Agricultural and Technical State University
  • fYear
    2015
  • fDate
    5/1/2015 12:00:00 AM
  • Firstpage
    581
  • Lastpage
    586
  • Abstract
    Cyber-security of power systems is of vital importance in this decade and the attackers attempt to manipulate the data and inject malicious data in state variables to divert state of the system. Cyber-attack utilizes the information of the system to generate the attacking vector in order to elude the malicious data tests. The proposed novel approach intends to change the information of the system being exploited by the adversary through adding virtual buses to the network referred as spy nodes. These nodes, including extra measurements fed to the attacker, are able to change the perceived topology of the network on which the attacker depends. Candidate places of the spy nodes are determined by using spanning tree algorithm. Excluding the spy data and using the proposed criteria, malicious data is detected. Results were verified by simulating IEEE 9-bus standard system for several times. Furthermore the method detects the malicious data when the value of spy data changes.
  • Keywords
    "Pollution measurement","Power measurement","SCADA systems","State estimation","Transmission line measurements","Substations"
  • Publisher
    ieee
  • Conference_Titel
    Electro/Information Technology (EIT), 2015 IEEE International Conference on
  • Electronic_ISBN
    2154-0373
  • Type

    conf

  • DOI
    10.1109/EIT.2015.7293401
  • Filename
    7293401