2019
DOI: 10.1109/tsg.2018.2817387
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation

Abstract: Understanding smart grid cyber attacks is key for developing appropriate protection and recovery measures. Advanced attacks pursue maximized impact at minimized costs and detectability. This paper conducts risk analysis of combined data integrity and availability attacks against the power system state estimation. We compare the combined attacks with pure integrity attacks -false data injection (FDI) attacks. A security index for vulnerability assessment to these two kinds of attacks is proposed and formulated … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 79 publications
(38 citation statements)
references
References 35 publications
(59 reference statements)
0
38
0
Order By: Relevance
“…If the communication channel between two neighboring inverters is attacked by FDI, the local controller receives the corrupted frequency signal [7,11,[55][56][57]. FDI attack on the communication channel can be modeled by:…”
Section: Fdi Attack On Microgridmentioning
confidence: 99%
“…If the communication channel between two neighboring inverters is attacked by FDI, the local controller receives the corrupted frequency signal [7,11,[55][56][57]. FDI attack on the communication channel can be modeled by:…”
Section: Fdi Attack On Microgridmentioning
confidence: 99%
“…To be illustrative, one can consider a man-in-the-middle (MITM) attack scenario on the communication channels between the substations and the control center. Then, the attacker is capable of interfering with the transmitted measurements using the MITM tool to block the measurements, either by attacking the routing scheme or flooding the network traffic [37]. In this article, we aim to model DoS attacks on the developed LFC mathematical model in Section 2 such that the behavior of data absence caused by DoS attacks is considered in the modeling process.…”
Section: Dos Attacks On the Ac/dc Multi-area Lfc System With Virtualmentioning
confidence: 99%
“…For instance, to be disruptive of attack impact, the (absolute) MFD value should reach 0.8 Hz, as a possible load shedding scheme could be triggered when the frequency decreases to 59.2 Hz; we refer to our previous work in [32] for a detailed discussion on the selections of b min , b max and F f . In (31), f (i) denotes the i-th FDI on the measurement that the attacker has already been able to compromise; this constraint is to make (31) feasible [37]. The last constraint in (31) is introduced to show that some protected measurements in the set P could not be attacked.…”
Section: The Test Lfc Sytem Under Fdi Attacks: Basicsmentioning
confidence: 99%
See 1 more Smart Citation
“…Since then vulnerability and impact analysis of stealthy attacks on power systems have been a prominent subject in the literature. A typical notion to quantify the vulnerability to stealthy attacks is directly concerned with the level of efforts required to alter specific measurements [12,27]. Without advanced diagnosis tools, tampering measurements remains undetected, causing state deviations, equipment damages or even cascading failures [18].…”
Section: Introductionmentioning
confidence: 99%