Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
Authors
Abstract:
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfiguration as a strategy to decrease FDI attacks on distribution system state estimation. It is well-known that network reconfiguration is a common approach in distribution systems to improve the system’s operation. In this paper, a modified switch opening and exchange (MSOE) method is used to reconfigure the network. The proposed method is tested on the IEEE 33-bus system. It is shown that network reconfiguration decreases the power measurements manipulation under false data injection attacks. Also, the resilient configuration of the distribution system is achieved, and the best particular configuration for reducing FDI attacks on each bus is obtained.
similar resources
Detecting False Data Injection Attacks on DC State Estimation
State estimation is an important power system application that is used to estimate the state of the power transmission networks using (usually) a redundant set of sensor measurements and network topology information. Many power system applications such as contingency analysis rely on the output of the state estimator. Until recently it was assumed that the techniques used to detect and identify...
full textExtended Distributed State Estimation: A Detection Method against Tolerable False Data Injection Attacks in Smart Grids
False data injection (FDI) is considered to be one of the most dangerous cyber-attacks in smart grids, as it may lead to energy theft from end users, false dispatch in the distribution process, and device breakdown during power generation. In this paper, a novel kind of FDI attack, named tolerable false data injection (TFDI), is constructed. Such attacks exploit the traditional detector’s toler...
full textFalse Data Injection Attacks in Control Systems
This paper analyzes the effects of false data injection attacks on Control System. We assume that the system, equipped with a Kalman filter and LQG controller, is used to monitor and control a discrete linear time invariant Gaussian system. We further assume that the system is equipped with a failure detector. An attacker wishes to destabilize the system by compromising a subset of sensors and ...
full textVulnerabilities of Smart Grid State Estimation against False Data Injection Attack
In recent years, Information Security has become a notable issue in the energy sector. After the invention of ‘The Stuxnet worm’ [1] in 2010, data integrity, privacy and confidentiality has received significant importance in the real-time operation of the control centres. New methods and frameworks are being developed to protect the National Critical Infrastructures likeenergy sector. In the re...
full textConsequences of False Data Injection on Power System State Estimation by
The electric power system is one of the largest, most complicated, and most important cyber-physical systems in the world. The link between the cyber and physical level is the Supervisory Control and Data Acquisition (SCADA) systems and Energy Management Systems (EMS). Their functions include monitoring the real-time system operation through state estimation (SE), controlling the system to oper...
full textA Security Method for Multiple Attacks in Sensor Networks: against False-report Injection, False-vote Injection, and Wormhole Attacks
In a large-scale wireless sensor network, damage spreads rapidly in the network when under false report injection, false votes injection, or wormhole attacks. These attacks cause finite energy resources to be drained, legitimate reports to be dropped, and data to be intercepted by adversary nodes. A probabilistic voting-based filtering scheme (PVFS) and localized encryption and authentication p...
full textMy Resources
Journal title
volume 18 issue 4
pages 2569- 2569
publication date 2022-12
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023