2014
DOI: 10.1109/tac.2014.2351625
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Computations of a Security Index for False Data Attacks in Power Networks

Abstract: Abstract-The resilience of Supervisory Control and Data Acquisition (SCADA) systems for electric power networks for certain cyber-attacks is considered. We analyze the vulnerability of the measurement system to false data attack on communicated measurements. The vulnerability analysis problem is shown to be NP-hard, meaning that unless P = NP there is no polynomial time algorithm to analyze the vulnerability of the system. Nevertheless, we identify situations, such as the full measurement case, where it can be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
73
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 106 publications
(75 citation statements)
references
References 42 publications
2
73
0
Order By: Relevance
“…The nonlinear covert attack is deemed to be more difficult to implement than the linear one due to the changes in the operating points of the system caused by the attack. Hendrickx et al [6] has again a different approach of handling the threat of an attack. This article tries to identify weaknesses in a static model of a power grid by calculating a security index for each measurement taken.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The nonlinear covert attack is deemed to be more difficult to implement than the linear one due to the changes in the operating points of the system caused by the attack. Hendrickx et al [6] has again a different approach of handling the threat of an attack. This article tries to identify weaknesses in a static model of a power grid by calculating a security index for each measurement taken.…”
Section: Related Workmentioning
confidence: 99%
“…This can be used to determine the threat an attack poses. In this context minimum-resource attacks are defined, which are closely related to the security index problem in [6]. Furthermore a minimumresource, maximum-impact attack for dynamic systems is defined, which can also be used in the risk management context to determine the likelihood and impact of an attack.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Sandberg et al [12] also formulated a similar optimization problem for finding a sparsest attack including a given measurement point and defined the optimal value as the security index of the point. After Sandberg et al [12] proposed a simple heuristics to find a suboptimal solution for the problem, Sou et al [13], [14] and Hendrickx et al [2] provided efficient solution methods as follows. It was shown in [13] that the problem reduces to a minimum cost node-bipartitioning problem, which is approximately solved by finding a minimum s-t cut in the given network.…”
Section: Introductionmentioning
confidence: 99%