Abstract
This chapter provides a survey and some highlights of recent developments on cyber security issues related to smart grid operations. In particular, we present data attack models and attack mechanisms on system state estimation, generation dispatch, and market operations. Security measures via sensor protection and data authentication are discussed. Although presented in the context of a smart grid, the main ideas are applicable to general cyber physical systems.
This work is supported in part by the National Science Foundation under Grant CNS-1135844.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations. U.S.-Canada Power System Outage Task Force (2004)
Common Cybersecurity Vulnerabilities in Industrial Control Systems (2011)
Vulnerability Analysis of Energy Delivery Control Systems. INL/EXT-10-18381 (2011)
Abur, A., Expósito, A.G.: Power System State Estimation: Theory and Implementation. CRC (2000)
Bi, S., Zhang, Y.: Defending mechanisms against false-data injection attacks in the power system state estimation. In: 2011 IEEE GLOBECOM Workshops, Houston, TX, USA, pp. 1162–1167 (2011)
Bobba, R.B., Rogers, K.M., Wang, Q., Khurana, H., Nahrstedt, K., Overbye, T.J.: Detecting false data injection attacks on DC state estimation. In: First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweeden (2010)
Choi, D.H., Xie, L.: Ramp-induced data attacks on look-ahead dispatch in real-time power markets. IEEE Transactions on Smart Grid 4(3), 1235–1243 (2013)
Coleman, T.F., Pothen, A.: The Null Space Problem I. Complexity. SIAM J. Alg. Disc. Meth. 7(4), 527–537 (1986)
Cui, S., Han, Z., Kar, S., Kim, T., Poor, H., Tajer, A.: Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions. IEEE Signal Processing Magazine 29(5), 106–115 (2012)
Dán, G., Sandberg, H.: Stealth attacks and protection schemes for state estimators in power systems. In: Proc. IEEE 2010 SmartGridComm, Gaithersburg, MD, USA, pp. 214–219 (2010)
Esmalifalak, M., Nguyen, H., Zheng, R., Han, Z.: Stealth false data injection using independent component analysis in smart grid. In: IEEE International Conference on Smart Grid Communications, pp. 244–248 (2011)
Giani, A., Bitar, E., Garcia, M., McQueen, M., Khargonekar, P., Poolla, K.: Smart grid data integrity attacks. IEEE Transactions on Smart Grid 4(3), 1244–1253 (2013)
Handschin, E., Schweppe, F.C., Kohlas, J., Fiechter, A.: Bad data analysis for power system state estimation. IEEE Trans. Power Apparatus and Systems PAS-94(2), 329–337 (1975)
Huang, Y., Esmalifalak, M., Nguyen, H., Zheng, R., Han, Z., Li, H., Song, L.: Bad data injection in smart grid: attack and defense mechanisms. IEEE Communications Magazine 51(1), 27–33 (2013)
Huang, Y., Li, H., Campbell, K., Han, Z.: Defending false data injection attack on smart grid network using adaptive CUSUM test. In: 2011 45th Annual Conference on Information Sciences and Systems (CISS), pp. 1–6 (2011)
Hull, J., Khurana, H., Markham, T., Staggs, K.: Staying in control: Cybersecurity and the modern electric grid. IEEE Power and Energy Magazine 10(1), 41–48 (2012)
Jia, L., Kim, J., Thomas, R., Tong, L.: Impact of data quality on real-time locational marginal price. IEEE Transactions on Power Systems 29(2), 627–636 (2014)
Karp, R.M.: Reducibility Among Combinatorial Problems. In: Complexity of Computer Computations, pp. 85–103 (1972)
Khaitan, S., McCalley, J.: Cyber Physical System Approach for Design of Power Grids: A Survey. In: IEEE PES General Meeting, Vancouver, BC, pp. 1–5 (2013)
Khaitan, S., McCalley, J.: Design Techniques and Applications of Cyber Physical Systems: A Survey. IEEE Systems Journal, 1–16 (2014)
Kim, J., Tong, L.: On phasor measurement unit placement against state and topology attacks. In: IEEE International Conference on Smart Grid Communications (2013)
Kim, J., Tong, L.: On topology attack of a smart grid: undetectable attacks and countermeasures. IEEE Journal on Selected Areas in Communications 31(7), 1294–1305 (2013)
Kim, J., Tong, L., Thomas, R.J.: Data framing attack on state estimation with unknown network parameters. In: The 47th Asilomar Conference on Signals, Systems, and Computers, pp. 1388–1392 (2013)
Kim, J., Tong, L., Thomas, R.J.: Data Framing Attack on State Estimation. IEEE Journal on Selected Areas in Communications 32(7) (2014)
Kim, J., Tong, L., Thomas, R.J.: Dynamic Attacks on Power Systems Economic Dispatch. In: The 48th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA (2014)
Kim, J., Tong, L., Thomas, R.J.: Subspace Methods for Data Attack on State Estimation: A Data Driven Approach. ArXiv e-prints, arXiv:1310.7616 (2014)
Kim, T., Poor, H.: Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid 2(2), 326–333 (2011)
Kosut, O., Jia, L., Thomas, R.J., Tong, L.: Malicious data attacks on the smart grid. IEEE Transactions on Smart Grid 2(4), 645–658 (2011)
Krumpholz, G.R., Clements, K.A., Davis, P.W.: Power system observability: a practical algorithm using network topology. IEEE Trans. Power Apparatus and Systems 99(4), 1534–1542 (1980)
Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 21–32 (2009)
Monticelli, A.: State Estimation in Electric Power Systems: A Generalized Approach (Power Electronics and Power Systems). Springer US (1999)
Monticelli, A., Wu, F.F.: Network observability: Theory. IEEE Trans. Power Apparatus and Systems 104(5), 1042–1048 (1985)
Morrow, K., Heine, E., Rogers, K., Bobba, R., Overbye, T.: Topology perturbation for detecting malicious data injection. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 2104–2113 (2012)
Ott, A.L.: Experience with PJM market operation, system design, and implementation. IEEE Trans. Power Systems 18(2), 528–534 (2003)
Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer (2010)
Page, E.S.: Continuous inspection schemes. Biometrika 41(1/2), 100–115 (1954)
Paschos, V.T.: A survey of approximately optimal solutions to some covering and packing problems. ACM Comput. Surv. 29(2), 171–209 (1997)
Rahman, M., Mohsenian-Rad, H.: False data injection attacks with incomplete information against smart power grids. In: IEEE Global Communications Conference, GLOBECOM (2012)
Sandberg, H., Teixeira, A., Johansson, K.H.: On security indices for state estimators in power networks. In: First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweeden (2010)
Scambray, J., McClure, S., Kurtz, G.: Hacking Exposed: Network Security Secrets and Solutions, 2nd edn. McGraw-Hill (2000)
Stoica, P., Nehorai, A.: MUSIC, maximum likelihood, and Cramer-Rao bound. IEEE Transactions on Acoustics, Speech and Signal Processing 37(5), 720–741 (1989)
Tajer, A., Kar, S., Poor, H., Cui, S.: Distributed joint cyber attack detection and state recovery in smart grids. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 202–207 (2011)
Tillmann, A., Pfetsch, M.: The computational complexity of the restricted isometry property, the nullspace property, and related concepts in compressed sensing. IEEE Transactions on Information Theory 60(2), 1248–1259 (2014)
Vukovic, O., Sou, K.C., Dan, G., Sandberg, H.: Network-aware mitigation of data integrity attacks on power system state estimation. IEEE Journal on Selected Areas in Communications 30(6), 1108–1118 (2012)
Xie, L., Mo, Y., Sinopoli, B.: Integrity data attacks in power market operations. IEEE Transactions on Smart Grid 2(4), 659–666 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Kim, J., Tong, L. (2015). Against Data Attacks on Smart Grid Operations: Attack Mechanisms and Security Measures. In: Khaitan, S., McCalley, J., Liu, C. (eds) Cyber Physical Systems Approach to Smart Electric Power Grid. Power Systems. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45928-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-662-45928-7_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45927-0
Online ISBN: 978-3-662-45928-7
eBook Packages: EnergyEnergy (R0)