Identification of Successive "Unobservable" Cyber Data Attacks in Power Systems Through Matrix Decomposition
نویسندگان
چکیده
This paper presents a new framework of identifying a series of cyber data attacks on power system synchrophasor measurements. We focus on detecting “unobservable” cyber data attacks that cannot be detected by any existing method that purely relies on measurements received at one time instant. Leveraging the approximate low-rank property of phasor measurement unit (PMU) data, we formulate the identification problem of successive unobservable cyber attacks as a matrix decomposition problem of a low-rank matrix plus a transformed columnsparse matrix. We propose a convex-optimization-based method and provide its theoretical guarantee in the data identification. Numerical experiments on actual PMU data from the Central New York power system and synthetic data are conducted to verify the effectiveness of the proposed method.
منابع مشابه
Identification of "unobservable" cyber data attacks on power grids
This paper presents a new framework of identifying cyber data attacks on synchrophasor measurements. We focus on detecting “unobservable” cyber data attacks that cannot be detected by any existing detection method that purely relies on measurements received at one time instant. Leveraging the approximate low-rank property of phasor measurement unit (PMU) data, we formulate the unobservable cybe...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملTopology Attacks on Power System Operation and Consequences Analysis by Jiazi Zhang A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science Approved June 2015 by the Graduate Supervisory Committee: Lalitha Sankar, Chair
The large distributed electric power system is a hierarchical network involving the transportation of power from the sources of power generation via an intermediate densely connected transmission network to a large distribution network of end-users at the lowest level of the hierarchy. At each level of the hierarchy (generation/ transmission/ distribution), the system is managed and monitored w...
متن کاملAttack Detection and Identification in Cyber-Physical Systems -- Part I: Models and Fundamental Limitations
Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyberphysical systems are prone to malignant attacks, and specific analysis tools as well as monitoring mechanisms need to be developed to enforce system security and reliability. This paper proposes a unified framework to analyze...
متن کاملSmart grid data integrity attacks: characterizations and countermeasuresπ
Coordinated cyberattacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm in the power system state estimation process. These unobservable attacks present a potentially serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unob...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Trans. Signal Processing
دوره 64 شماره
صفحات -
تاریخ انتشار 2016