Identification of Successive "Unobservable" Cyber Data Attacks in Power Systems Through Matrix Decomposition

نویسندگان

  • Pengzhi Gao
  • Meng Wang
  • Joe H. Chow
  • Scott G. Ghiocel
  • Bruce Fardanesh
  • George Stefopoulos
  • Michael P. Razanousky
چکیده

This paper presents a new framework of identifying a series of cyber data attacks on power system synchrophasor measurements. We focus on detecting “unobservable” cyber data attacks that cannot be detected by any existing method that purely relies on measurements received at one time instant. Leveraging the approximate low-rank property of phasor measurement unit (PMU) data, we formulate the identification problem of successive unobservable cyber attacks as a matrix decomposition problem of a low-rank matrix plus a transformed columnsparse matrix. We propose a convex-optimization-based method and provide its theoretical guarantee in the data identification. Numerical experiments on actual PMU data from the Central New York power system and synthetic data are conducted to verify the effectiveness of the proposed method.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identification of "unobservable" cyber data attacks on power grids

This paper presents a new framework of identifying cyber data attacks on synchrophasor measurements. We focus on detecting “unobservable” cyber data attacks that cannot be detected by any existing detection method that purely relies on measurements received at one time instant. Leveraging the approximate low-rank property of phasor measurement unit (PMU) data, we formulate the unobservable cybe...

متن کامل

Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

متن کامل

Topology Attacks on Power System Operation and Consequences Analysis by Jiazi Zhang A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science Approved June 2015 by the Graduate Supervisory Committee: Lalitha Sankar, Chair

The large distributed electric power system is a hierarchical network involving the transportation of power from the sources of power generation via an intermediate densely connected transmission network to a large distribution network of end-users at the lowest level of the hierarchy. At each level of the hierarchy (generation/ transmission/ distribution), the system is managed and monitored w...

متن کامل

Attack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations

Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyberphysical systems are prone to malignant attacks, and specific analysis tools as well as monitoring mechanisms need to be developed to enforce system security and reliability. This paper proposes a unified framework to analyze...

متن کامل

Smart grid data integrity attacks: characterizations and countermeasuresπ

Coordinated cyberattacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm in the power system state estimation process. These unobservable attacks present a potentially serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unob...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Trans. Signal Processing

دوره 64  شماره 

صفحات  -

تاریخ انتشار 2016