Skip to main content

Against Data Attacks on Smart Grid Operations: Attack Mechanisms and Security Measures

  • Chapter
Cyber Physical Systems Approach to Smart Electric Power Grid

Part of the book series: Power Systems ((POWSYS))

Abstract

This chapter provides a survey and some highlights of recent developments on cyber security issues related to smart grid operations. In particular, we present data attack models and attack mechanisms on system state estimation, generation dispatch, and market operations. Security measures via sensor protection and data authentication are discussed. Although presented in the context of a smart grid, the main ideas are applicable to general cyber physical systems.

This work is supported in part by the National Science Foundation under Grant CNS-1135844.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations. U.S.-Canada Power System Outage Task Force (2004)

    Google Scholar 

  2. Common Cybersecurity Vulnerabilities in Industrial Control Systems (2011)

    Google Scholar 

  3. Vulnerability Analysis of Energy Delivery Control Systems. INL/EXT-10-18381 (2011)

    Google Scholar 

  4. Abur, A., Expósito, A.G.: Power System State Estimation: Theory and Implementation. CRC (2000)

    Google Scholar 

  5. Bi, S., Zhang, Y.: Defending mechanisms against false-data injection attacks in the power system state estimation. In: 2011 IEEE GLOBECOM Workshops, Houston, TX, USA, pp. 1162–1167 (2011)

    Google Scholar 

  6. Bobba, R.B., Rogers, K.M., Wang, Q., Khurana, H., Nahrstedt, K., Overbye, T.J.: Detecting false data injection attacks on DC state estimation. In: First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweeden (2010)

    Google Scholar 

  7. Choi, D.H., Xie, L.: Ramp-induced data attacks on look-ahead dispatch in real-time power markets. IEEE Transactions on Smart Grid 4(3), 1235–1243 (2013)

    Article  Google Scholar 

  8. Coleman, T.F., Pothen, A.: The Null Space Problem I. Complexity. SIAM J. Alg. Disc. Meth. 7(4), 527–537 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  9. Cui, S., Han, Z., Kar, S., Kim, T., Poor, H., Tajer, A.: Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions. IEEE Signal Processing Magazine 29(5), 106–115 (2012)

    Article  Google Scholar 

  10. Dán, G., Sandberg, H.: Stealth attacks and protection schemes for state estimators in power systems. In: Proc. IEEE 2010 SmartGridComm, Gaithersburg, MD, USA, pp. 214–219 (2010)

    Google Scholar 

  11. Esmalifalak, M., Nguyen, H., Zheng, R., Han, Z.: Stealth false data injection using independent component analysis in smart grid. In: IEEE International Conference on Smart Grid Communications, pp. 244–248 (2011)

    Google Scholar 

  12. Giani, A., Bitar, E., Garcia, M., McQueen, M., Khargonekar, P., Poolla, K.: Smart grid data integrity attacks. IEEE Transactions on Smart Grid 4(3), 1244–1253 (2013)

    Article  Google Scholar 

  13. Handschin, E., Schweppe, F.C., Kohlas, J., Fiechter, A.: Bad data analysis for power system state estimation. IEEE Trans. Power Apparatus and Systems PAS-94(2), 329–337 (1975)

    Article  Google Scholar 

  14. Huang, Y., Esmalifalak, M., Nguyen, H., Zheng, R., Han, Z., Li, H., Song, L.: Bad data injection in smart grid: attack and defense mechanisms. IEEE Communications Magazine 51(1), 27–33 (2013)

    Article  Google Scholar 

  15. Huang, Y., Li, H., Campbell, K., Han, Z.: Defending false data injection attack on smart grid network using adaptive CUSUM test. In: 2011 45th Annual Conference on Information Sciences and Systems (CISS), pp. 1–6 (2011)

    Google Scholar 

  16. Hull, J., Khurana, H., Markham, T., Staggs, K.: Staying in control: Cybersecurity and the modern electric grid. IEEE Power and Energy Magazine 10(1), 41–48 (2012)

    Article  Google Scholar 

  17. Jia, L., Kim, J., Thomas, R., Tong, L.: Impact of data quality on real-time locational marginal price. IEEE Transactions on Power Systems 29(2), 627–636 (2014)

    Article  Google Scholar 

  18. Karp, R.M.: Reducibility Among Combinatorial Problems. In: Complexity of Computer Computations, pp. 85–103 (1972)

    Google Scholar 

  19. Khaitan, S., McCalley, J.: Cyber Physical System Approach for Design of Power Grids: A Survey. In: IEEE PES General Meeting, Vancouver, BC, pp. 1–5 (2013)

    Google Scholar 

  20. Khaitan, S., McCalley, J.: Design Techniques and Applications of Cyber Physical Systems: A Survey. IEEE Systems Journal, 1–16 (2014)

    Google Scholar 

  21. Kim, J., Tong, L.: On phasor measurement unit placement against state and topology attacks. In: IEEE International Conference on Smart Grid Communications (2013)

    Google Scholar 

  22. Kim, J., Tong, L.: On topology attack of a smart grid: undetectable attacks and countermeasures. IEEE Journal on Selected Areas in Communications 31(7), 1294–1305 (2013)

    Article  Google Scholar 

  23. Kim, J., Tong, L., Thomas, R.J.: Data framing attack on state estimation with unknown network parameters. In: The 47th Asilomar Conference on Signals, Systems, and Computers, pp. 1388–1392 (2013)

    Google Scholar 

  24. Kim, J., Tong, L., Thomas, R.J.: Data Framing Attack on State Estimation. IEEE Journal on Selected Areas in Communications 32(7) (2014)

    Google Scholar 

  25. Kim, J., Tong, L., Thomas, R.J.: Dynamic Attacks on Power Systems Economic Dispatch. In: The 48th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA (2014)

    Google Scholar 

  26. Kim, J., Tong, L., Thomas, R.J.: Subspace Methods for Data Attack on State Estimation: A Data Driven Approach. ArXiv e-prints, arXiv:1310.7616 (2014)

    Google Scholar 

  27. Kim, T., Poor, H.: Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid 2(2), 326–333 (2011)

    Article  Google Scholar 

  28. Kosut, O., Jia, L., Thomas, R.J., Tong, L.: Malicious data attacks on the smart grid. IEEE Transactions on Smart Grid 2(4), 645–658 (2011)

    Article  Google Scholar 

  29. Krumpholz, G.R., Clements, K.A., Davis, P.W.: Power system observability: a practical algorithm using network topology. IEEE Trans. Power Apparatus and Systems 99(4), 1534–1542 (1980)

    Article  Google Scholar 

  30. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 21–32 (2009)

    Google Scholar 

  31. Monticelli, A.: State Estimation in Electric Power Systems: A Generalized Approach (Power Electronics and Power Systems). Springer US (1999)

    Google Scholar 

  32. Monticelli, A., Wu, F.F.: Network observability: Theory. IEEE Trans. Power Apparatus and Systems 104(5), 1042–1048 (1985)

    Google Scholar 

  33. Morrow, K., Heine, E., Rogers, K., Bobba, R., Overbye, T.: Topology perturbation for detecting malicious data injection. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 2104–2113 (2012)

    Google Scholar 

  34. Ott, A.L.: Experience with PJM market operation, system design, and implementation. IEEE Trans. Power Systems 18(2), 528–534 (2003)

    Article  MathSciNet  Google Scholar 

  35. Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer (2010)

    Google Scholar 

  36. Page, E.S.: Continuous inspection schemes. Biometrika 41(1/2), 100–115 (1954)

    Article  MathSciNet  MATH  Google Scholar 

  37. Paschos, V.T.: A survey of approximately optimal solutions to some covering and packing problems. ACM Comput. Surv. 29(2), 171–209 (1997)

    Article  Google Scholar 

  38. Rahman, M., Mohsenian-Rad, H.: False data injection attacks with incomplete information against smart power grids. In: IEEE Global Communications Conference, GLOBECOM (2012)

    Google Scholar 

  39. Sandberg, H., Teixeira, A., Johansson, K.H.: On security indices for state estimators in power networks. In: First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweeden (2010)

    Google Scholar 

  40. Scambray, J., McClure, S., Kurtz, G.: Hacking Exposed: Network Security Secrets and Solutions, 2nd edn. McGraw-Hill (2000)

    Google Scholar 

  41. Stoica, P., Nehorai, A.: MUSIC, maximum likelihood, and Cramer-Rao bound. IEEE Transactions on Acoustics, Speech and Signal Processing 37(5), 720–741 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  42. Tajer, A., Kar, S., Poor, H., Cui, S.: Distributed joint cyber attack detection and state recovery in smart grids. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 202–207 (2011)

    Google Scholar 

  43. Tillmann, A., Pfetsch, M.: The computational complexity of the restricted isometry property, the nullspace property, and related concepts in compressed sensing. IEEE Transactions on Information Theory 60(2), 1248–1259 (2014)

    Article  MathSciNet  Google Scholar 

  44. Vukovic, O., Sou, K.C., Dan, G., Sandberg, H.: Network-aware mitigation of data integrity attacks on power system state estimation. IEEE Journal on Selected Areas in Communications 30(6), 1108–1118 (2012)

    Article  Google Scholar 

  45. Xie, L., Mo, Y., Sinopoli, B.: Integrity data attacks in power market operations. IEEE Transactions on Smart Grid 2(4), 659–666 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinsub Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Kim, J., Tong, L. (2015). Against Data Attacks on Smart Grid Operations: Attack Mechanisms and Security Measures. In: Khaitan, S., McCalley, J., Liu, C. (eds) Cyber Physical Systems Approach to Smart Electric Power Grid. Power Systems. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45928-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45928-7_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45927-0

  • Online ISBN: 978-3-662-45928-7

  • eBook Packages: EnergyEnergy (R0)

Publish with us

Policies and ethics