Malicious Data Attacks on the Smart Grid

Malicious attacks against power systems are investigated, in which an adversary controls a set of meters and is able to alter the measurements from those meters. Two regimes of attacks are considered. The strong attack regime is where the adversary attacks a sufficient number of meters so that the network state becomes unobservable by the control center. For attacks in this regime, the smallest set of attacked meters capable of causing network unobservability is characterized using a graph theoretic approach. By casting the problem as one of minimizing a supermodular graph functional, the problem of identifying the smallest set of vulnerable meters is shown to have polynomial complexity. For the weak attack regime where the adversary controls only a small number of meters, the problem is examined from a decision theoretic perspective for both the control center and the adversary. For the control center, a generalized likelihood ratio detector is proposed that incorporates historical data. For the adversary, the trade-off between maximizing estimation error at the control center and minimizing detection probability of the launched attack is examined. An optimal attack based on minimum energy leakage is proposed.

[1]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[2]  Gene H. Golub,et al.  Matrix computations , 1983 .

[3]  William H. Cunningham On submodular function minimization , 1985, Comb..

[4]  Amir Dembo,et al.  Large Deviations Techniques and Applications , 1998 .

[5]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[6]  Martin Grötschel,et al.  The ellipsoid method and its consequences in combinatorial optimization , 1981, Comb..

[7]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[8]  Fred C. Schweppe,et al.  Power System Static-State Estimation, Part I: Exact Model , 1970 .

[9]  S. Kourouklis,et al.  A Large Deviation Result for the Likelihood Ratio Statistic in Exponential Families , 1984 .

[10]  A. Ott Experience with PJM market operation, system design, and implementation , 2003 .

[11]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[12]  E. Handschin,et al.  Bad data analysis for power system state estimation , 1975, IEEE Transactions on Power Apparatus and Systems.

[13]  M. Ribbens-Pavella,et al.  Bad Data Identification Methods In Power System State Estimation-A Comparative Study , 1985, IEEE Transactions on Power Apparatus and Systems.

[14]  G. Krumpholz,et al.  Power System Observability: A Practical Algorithm Using Network Topology , 1980, IEEE Transactions on Power Apparatus and Systems.

[15]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[16]  A. Monticelli,et al.  Electric power system state estimation , 2000, Proceedings of the IEEE.

[17]  Lamine Mili,et al.  Identification of multiple interacting bad data via power system decomposition , 1996 .

[18]  Tongxin Zheng,et al.  Ex Post Pricing in the Co-Optimized Energy and Reserve Market , 2006, IEEE Transactions on Power Systems.

[19]  Neri Merhav,et al.  When is the generalized likelihood ratio test optimal? , 1992, IEEE Trans. Inf. Theory.

[20]  Lang Tong,et al.  Limiting false data attacks on power system state estimation , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[21]  Lang Tong,et al.  On malicious data attacks on power system state estimation , 2010, 45th International Universities Power Engineering Conference UPEC2010.

[22]  David Hutchison,et al.  The Magic WAND-functional overview , 1998, IEEE J. Sel. Areas Commun..

[23]  Stephen Boyd,et al.  Estimation of faults in DC electrical power system , 2009, 2009 American Control Conference.

[24]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[25]  Alexander Schrijver,et al.  A Combinatorial Algorithm Minimizing Submodular Functions in Strongly Polynomial Time , 2000, J. Comb. Theory, Ser. B.

[26]  Bernard C. Levy,et al.  Principles of Signal Detection and Parameter Estimation , 2008 .

[27]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[28]  Tongxin Zheng,et al.  Ex post pricing in the co-optimized energy and reserve market , 2012, 2012 IEEE Power and Energy Society General Meeting.