Skip to main content

Efficient Detection Method for Data Integrity Attacks in Smart Grid

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10066))

  • 1439 Accesses

Abstract

With the developing of the Smart Grid, false data injection attacks (FDIAs) as a typical data integrity attack successfully bypass the traditional bad data detection and identification, has a serious influence on the power system safe and reliable operation. State estimation, which is an important process in smart grid, is used in system monitoring to get optimally estimate the power grid state through analysis of the monitoring data. However, FDIAs compromising data integrity will lead to wrong decision makings in power dispatch or electric power market transactions. In this paper, focusing on the power property, we introduce an index to quantitatively measure the node voltage stability and reflect the influence of FDIAs on the power system. Then, we use an improved clustering algorithm to identify the node vulnerability level, which helps operators take measures and detect the false data injection attacks timely. Besides, one effective state forecasting detection method is proposed, which is meaningful for real-time detection of false data injection attacks. Finally, the simulation result verifies the effectiveness and performance of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fang, X., Misra, S., Xue, G., et al.: Smart grid—the new and improved power grid: a survey. IEEE Commun. Surv. Tutorials 14(4), 944–980 (2012)

    Article  Google Scholar 

  2. Kayastha, N., Niyato, D., Hossain, E., et al.: Smart grid sensor data collection, communication, and networking: a tutorial. Wirel. Commun. Mob. Comput. 14(11), 1055–1087 (2014)

    Article  Google Scholar 

  3. Liu, T., Sun, Y., Liu, Y., et al.: Abnormal traffic-indexed state estimation: a cyber–physical fusion approach for Smart Grid attack detection. Future Gener. Comput. Syst. 49, 94–103 (2015)

    Article  Google Scholar 

  4. Pasqualetti, F., Dörfler, F., Bullo, F.: Cyber-physical attacks in power networks: models, fundamental limitations and monitor design. In: 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC), pp. 2195–2201. IEEE (2011)

    Google Scholar 

  5. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In: ACM Conference on Computer and Communications Security, pp. 21–32. ACM (2009)

    Google Scholar 

  6. Guan, Z., An, P., Yang, T.: Matrix partition-based detection scheme for false data injection in smart grid. Int. J. Wirel. Mob. Comput. 9(3), 250–256 (2015)

    Article  Google Scholar 

  7. Guan, Z., Sun, N., Xu, Y., et al.: A comprehensive survey of false data injection in smart grid. Int. J. Wirel. Mob. Comput. 8(1), 27–33 (2015)

    Article  Google Scholar 

  8. Asada, E.N., Garcia, A.V., Romero, R.: Identifying multiple interacting bad data in power system state estimation. In: 2005 IEEE Power Engineering Society General Meeting, pp. 571–577. IEEE (2005)

    Google Scholar 

  9. Zabaiou, T., Dessaint, L.A., Kamwa, I.: Preventive control approach for voltage stability improvement using voltage stability constrained optimal power flow based on static line voltage stability indices. IET Gener. Transm. Distrib. 8(5), 924–934 (2014)

    Article  Google Scholar 

  10. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13 (2009)

    Google Scholar 

  11. Cui, S., Han, Z., Kar, S., et al.: Coordinated data-injection attack and detection in the smart grid: a detailed look at enriching detection solutions. Sig. Process. Mag. IEEE 29(5), 106–115 (2012)

    Article  Google Scholar 

  12. Kosut, O., Jia, L., Thomas, R.J., et al.: Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2(4), 645–658 (2011)

    Article  Google Scholar 

  13. Huang, Y., Esmalifalak, M., Nguyen, H., et al.: Bad data injection in smart grid: attack and defense mechanisms. IEEE Commun. Mag. 51(1), 27–33 (2013)

    Article  Google Scholar 

  14. Li, S., Yilmaz, Y., Wang, X.: Quickest detection of false data injection attack in wide-area smart grids. IEEE Trans. Smart Grid 6(6), 2725–2735 (2015)

    Article  Google Scholar 

  15. Esmalifalak, M., Nguyen, N.T., Zheng, R., et al.: Detecting stealthy false data injection using machine learning in smart grid. In: 2013 IEEE Global Communications Conference (GLOBECOM), pp. 808–813. IEEE, (2013)

    Google Scholar 

  16. Bi, S., Zhang, Y.J.: Graphical methods for defense against false-data injection attacks on power system state estimation. IEEE Trans. Smart Grid 5(3), 1216–1227 (2014)

    Article  MathSciNet  Google Scholar 

  17. Bobba, R.B., Rogers, K.M., Wang, Q., et al.: Detecting false data injection attacks on dc state estimation. In: Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010 (2010)

    Google Scholar 

  18. Giani, A., Bitar, E., Garcia, M.A., et al.: Smart grid data integrity attacks. IEEE Trans. Smart Grid 4(3), 1244–1253 (2013)

    Article  Google Scholar 

  19. Kim, T.T., Poor, H.V.: Strategic protection against data injection attacks on power grids. IEEE Trans. Smart Grid 2(2), 326–333 (2011)

    Article  Google Scholar 

  20. Kekatos, V., Giannakis, G.: Distributed robust power system state estimation. IEEE Trans. Power Syst. 28(2), 1617–1626 (2013)

    Article  Google Scholar 

  21. Ozay, M., Esnaola, I., Vural, F.T.Y., et al.: Distributed models for sparse attack construction and state vector estimation in the smart grid. In: 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm), pp. 306–311. IEEE (2012)

    Google Scholar 

  22. Yang, J., Yu, R., Liu, Y., et al.: A two-stage attacking scheme for low-sparsity unobservable attacks in smart grid. In: 2015 IEEE International Conference on Communications (ICC), pp. 7210–7215. IEEE (2015)

    Google Scholar 

  23. Gu, Y., Liu, T., Wang, D., et al.: Bad data detection method for smart grids based on distributed state estimation. In: 2013 IEEE International Conference on Communications (ICC), pp. 4483–4487. IEEE, (2013)

    Google Scholar 

  24. Cramer, M., Goergens, P., Schnettler, A.: Bad data detection and handling in distribution grid state estimation using artificial neural networks. In: 2015 IEEE Eindhoven PowerTech, pp. 1–6. IEEE (2015)

    Google Scholar 

  25. Jasmon, G.B., Lee, L.: New contingency ranking technique incorporating a voltage stability criterion. In: IEEE Proceedings of C-Generation, Transmission and Distribution, vol. 140, no. 2, pp. 87–90. IET (1993)

    Google Scholar 

  26. MATPOWER (2015). http://www.pserc.cornell.edu//matpower/

Download references

Acknowledgments

This work is partially supported by Natural Science Foundation of China under grant 61402171, Central Government University Foundation under grant JB2016045.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhitao Guan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

An, P., Guan, Z. (2016). Efficient Detection Method for Data Integrity Attacks in Smart Grid. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49148-6_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49147-9

  • Online ISBN: 978-3-319-49148-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics