The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.1109/tifs.2016.2542061
|View full text |Cite
|
Sign up to set email alerts
|

Masking Transmission Line Outages via False Data Injection Attacks

Abstract: Today's power systems become more prone to cyberattacks due to the high integration of information technologies. In this paper, we demonstrate that the outages of some lines can be masked by injecting false data into a set of measurements. The success of the topology attack can be guaranteed by making that: 1)the injected false data obeys KCL and KVL to avoid being detected by the bad data detection program in the state estimation; 2)the residual is increased such that the line outage cannot be detected by PMU… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
47
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 97 publications
(47 citation statements)
references
References 34 publications
0
47
0
Order By: Relevance
“…However, the above two works only discussed a single attack and does not concern how to launch successive attacks. In the work by the authors of [15], attackers with perfect knowledge injected false data to successively mask transmission line outages leading to a serious situation without awareness. With further research, attack strategies have been improved, for example, optimal FDI attack actions are studied to mask the exceptional frequency leading to the largest disruption of generators in the work by the authors of [16].…”
Section: Fdi Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the above two works only discussed a single attack and does not concern how to launch successive attacks. In the work by the authors of [15], attackers with perfect knowledge injected false data to successively mask transmission line outages leading to a serious situation without awareness. With further research, attack strategies have been improved, for example, optimal FDI attack actions are studied to mask the exceptional frequency leading to the largest disruption of generators in the work by the authors of [16].…”
Section: Fdi Attackmentioning
confidence: 99%
“…False command injection caused the system failure and FDI could delay the time of attack detection and develop impact of attacks. Based on the above discussion, the characters of FDI attacks [13][14][15][16][17][18][19] are summarized in Table 4. We can clearly see that the FDI attack becomes more complex, hides the traces of attacks better, and causes greater disruption.…”
Section: Fdi Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…The attack was designed based on finding out the line that can cause the most damaging to the system in [14]. Then, the authors in [15], [16] attempted to modify the PMU data to mask the outage event. The attack model was further derived using the power flow method [17] and SE [18].…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we focus on the detection of FDI attacks on transmission lines of the smart grid. An FDI attack on transmission line refers to the action in which a smart attacker modifies a part of sensory data to cause the false evaluation of line states such as transmission line outage mask attacks [2]. Transmission line states estimated based on related sensory data are critical to maintain the normal running of smart grid.…”
Section: Introductionmentioning
confidence: 99%