Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks

Gabriela Hug, Member, and Joseph Andrew Giampapa
IEEE Transactions on Smart Grid, September, 2012, pp. 1362-1370.


Download
  • Adobe portable document format (pdf) (1MB)
Copyright notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Abstract
This paper introduces new analytical techniques for performing vulnerability analysis of state estimationwhen it is subject to a hidden false data injection cyber-attack on a power grid’s SCADA system. Specifically, we consider ac state estimation and describe how the physical properties of the system can be used as an advantage in protecting the power system from such an attack.We present an algorithm based on graph theory which allows determining how many and which measurement signals an attacker will attack in order to minimize his efforts in keeping the attack hidden from bad data detection. This provides guidance on which measurements are vulnerable and need increased protection. Hence, this paper provides insights into the vulnerabilities but also the inherent strengths provided by ac state estimation and network topology features such as buses without power injections.

Keywords
Cyber security, false data injection attacks, graph theory, SCADA systems, state estimation

Notes

Text Reference
Gabriela Hug, Member, and Joseph Andrew Giampapa, "Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks," IEEE Transactions on Smart Grid, September, 2012, pp. 1362-1370.

BibTeX Reference
@inproceedings{Giampapa_2012_7565,
   author = "Gabriela Hug and Member and Joseph Andrew Giampapa",
   title = "Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks",
   booktitle = "IEEE Transactions on Smart Grid",
   pages = "1362-1370",
   month = "September",
   year = "2012",
   volume = "3",
   number = "3",
}