Information-Theoretic Attacks in the Smart Grid

نویسندگان

  • Ke Sun
  • Inaki Esnaola
  • Samir Medina Perlaza
  • H. Vincent Poor
چکیده

Gaussian random attacks that jointly minimize the amount of information obtained by the operator from the grid and the probability of attack detection are presented. The construction of the attack is posed as an optimization problem with a utility function that captures two effects: firstly, minimizing the mutual information between the measurements and the state variables; secondly, minimizing the probability of attack detection via the Kullback-Leibler divergence between the distribution of the measurements with an attack and the distribution of the measurements without an attack. Additionally, a lower bound on the utility function achieved by the attacks constructed with imperfect knowledge of the second order statistics of the state variables is obtained. The performance of the attack construction using the sample covariance matrix of the state variables is numerically evaluated. The above results are tested in the IEEE 30-Bus test system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Smart Meter: Applications, Security Issues and Challenges

The smart meter is an important intelligent device on the Smart Grid that has the capability to report information related to power consumption, billing and other significant readings. The protection of smart meter communications against attacks is essential to ensure reliable operations of the Smart Grid. In this paper, we give an overview of smart meter applications, and we discuss the securi...

متن کامل

Graph-Theoretic Framework for Unified Analysis of Observability and Data Injection Attacks in the Smart Grid

State estimation is a fundamental process needed for the effective operation of the smart grid. As such, cyber-physical attacks such as denial-of-service and data injection attacks, which often target the availability and the integrity of the collected state estimation measurements, can have detrimental consequences on the operation of the system. In this paper, a novel graph-theoretic framewor...

متن کامل

Data-centric threats and their impacts to real-time communications in smart grid

One of the most distinguished challenges in studying the aftermath of cyber attacks in smart grid lies in data-centric threats, which refer to cyber attacks aimed at gaining advantage or sabotage the infrastructure by manipulating the data exchanged in the underlying communication network. Even though such attacks are critical by itself in the information network, they will result in more serio...

متن کامل

Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1708.07810  شماره 

صفحات  -

تاریخ انتشار 2017