On phasor measurement unit placement against state and topology attacks

Cyber attacks on the SCADA system can mislead the control center to produce incorrect state and topology estimate. If undetected, state and topology attacks can have detrimental impacts on the real-time operation of a power system. The problem of placing secure phasor measurement units (PMUs) to detect such attacks is considered. It is shown that any state or topology attack is detectable if and only if buses with secure PMUs form a vertex cover of the system topology. This condition leads to the countermeasures constructed by available graph algorithms. The examples with IEEE 14-bus, 118-bus, and 300-bus systems demonstrate applications of the countermeasures.

[1]  Lang Tong,et al.  On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.

[2]  Lang Tong,et al.  Malicious data attack on real-time electricity market , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[3]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[4]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[5]  O. Alsaç,et al.  Generalized state estimation , 1998 .

[6]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[7]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[8]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[9]  Lang Tong,et al.  On topology attack of a smart grid , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).

[10]  Henrik Sandberg,et al.  Network-layer protection schemes against stealth attacks on state estimators in power systems , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[11]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[12]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[13]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[14]  Kameshwar Poolla,et al.  Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[15]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[16]  A. Abur,et al.  Placement of PMUs to Enable Bad Data Detection in State Estimation , 2006, IEEE Transactions on Power Systems.

[17]  G. Krumpholz,et al.  Power System Observability: A Practical Algorithm Using Network Topology , 1980, IEEE Transactions on Power Apparatus and Systems.

[18]  V. Paschos A survey of approximately optimal solutions to some covering and packing problems , 1997, CSUR.

[19]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .