Information-Theoretic Attacks in the Smart Grid
نویسندگان
چکیده
Gaussian random attacks that jointly minimize the amount of information obtained by the operator from the grid and the probability of attack detection are presented. The construction of the attack is posed as an optimization problem with a utility function that captures two effects: firstly, minimizing the mutual information between the measurements and the state variables; secondly, minimizing the probability of attack detection via the Kullback-Leibler divergence between the distribution of the measurements with an attack and the distribution of the measurements without an attack. Additionally, a lower bound on the utility function achieved by the attacks constructed with imperfect knowledge of the second order statistics of the state variables is obtained. The performance of the attack construction using the sample covariance matrix of the state variables is numerically evaluated. The above results are tested in the IEEE 30-Bus test system.
منابع مشابه
A survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملSmart Meter: Applications, Security Issues and Challenges
The smart meter is an important intelligent device on the Smart Grid that has the capability to report information related to power consumption, billing and other significant readings. The protection of smart meter communications against attacks is essential to ensure reliable operations of the Smart Grid. In this paper, we give an overview of smart meter applications, and we discuss the securi...
متن کاملGraph-Theoretic Framework for Unified Analysis of Observability and Data Injection Attacks in the Smart Grid
State estimation is a fundamental process needed for the effective operation of the smart grid. As such, cyber-physical attacks such as denial-of-service and data injection attacks, which often target the availability and the integrity of the collected state estimation measurements, can have detrimental consequences on the operation of the system. In this paper, a novel graph-theoretic framewor...
متن کاملData-centric threats and their impacts to real-time communications in smart grid
One of the most distinguished challenges in studying the aftermath of cyber attacks in smart grid lies in data-centric threats, which refer to cyber attacks aimed at gaining advantage or sabotage the infrastructure by manipulating the data exchanged in the underlying communication network. Even though such attacks are critical by itself in the information network, they will result in more serio...
متن کاملCyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1708.07810 شماره
صفحات -
تاریخ انتشار 2017