PMUs from three layers in the WAMS. In particular, we utilize the fact that in GPS-based PMUs, unlike most of the GPS applications, the position of the PMU receivers are already fixed and known. Our first technique employs an algorithm that accurately predicts the number of theoretically visible GPS satellites from a given position on earth. If the GPS receiver detects satellites which should not be visible at that time, this signifies a spoofing attempt. The second technique is an anomaly-based detection method which assumes that iii the statistics of malicious errors in GPS time solutions are unlikely to be consistent with the expected statistics of the typical receiver clock. We also propose a model which can be used to analyze the phasor data uploaded from two PMUs to the Phasor Data Concentrator.The relative phase angle difference (RPAD) is used in our algorithm to detect the spoofing attack. The algorithm uses Fast Fourier Transform to analyze the RPAD between two PMUs. We study the behavior of the low frequency component in the FFT result of the RPAD between that two PMUs to detect the spoofing attacks. The effectiveness of the proposed techniques is confirmed by simulations. iv First of all, I would like to thank my supervisors Dr. Amr Youssef and Dr. Walaa Hamouda for their patient guidance and continuous support throughout my Master's study career. Furthermore, I would like to express special thanks to my parents, Mr.Xinping Zhu and Mrs. Liping Liu for their continuous love and support. I would also like to thank my immediate family members, including my uncle Dr. Xianping Liu, my aunt Mrs. Meiling Yao, my grandma Mrs. Duoyun Zeng for always being there for me. Last, but not least, I would like to thank my colleagues at Concordia University, specifically, for making my time at the university and in Montreal pleasurable and memorable. v