4.7 Article

Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid

Journal

IEEE TRANSACTIONS ON SMART GRID
Volume 10, Issue 4, Pages 4577-4588

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSG.2018.2865316

Keywords

Cyber-physical system; joint attacks; smart grid; power line outages; power flow

Funding

  1. Center for mmWave Smart Radar Systems and Technologies under the Featured Areas Research Center Program by the Ministry of Education
  2. Ministry of Science and Technology [107-3017-F-009-001, 104-2221-E-007-147-MY3, 105-2221-E-007-144-MY3]
  3. Digital Economy Advancement Project, in Taiwan [106-2218-E-002-014-MY4]
  4. SUTD-MIT International Design Center [NSFC 61750110529]

Ask authors/readers for more resources

Malicious attacks in the power system can eventually result in a large-scale cascade failure if not rectified in a timely manner. These attacks, which are traditionally classified into physical and cyber attacks, can be avoided by using the latest advanced detection mechanisms. However, a new threat called cyber-physical attacks jointly targets both the physical and cyber layers of the system to interfere with the operations of the power grid is more malicious than traditional attacks. In this paper, we propose a new cyber-physical attack strategy where the transmission line is first physically disconnected, the line-outage event is masked to mislead the control center into detecting this as an obvious line outage at a different position in the local area of the power system. Therefore, the topology information in the control center is interfered with as a result of our attack. We also propose a novel procedure for selecting vulnerable lines and analyze the observability of our proposed framework. Our proposed method can effectively and continuously deceive the control center into detecting fake line-outage positions, and thereby increase the chance of cascade failure because the attention is given to the fake outage. The simulation results validate the efficiency of our proposed attack strategy.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available