4.8 Article

False-Data-Injection-Enabled Network Parameter Modifications in Power Systems: Attack and Detection

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 19, Issue 1, Pages 177-188

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2022.3172688

Keywords

State estimation; Power systems; Power measurement; Biological system modeling; Measurement uncertainty; Databases; Data models; False data injection (FDI) attack; indirect modifications of network parameters; optimal detection strategy; security of cyber-physical systems

Ask authors/readers for more resources

This article proposes a practical attack model for detecting malicious modification of critical network parameters. By exploiting the vulnerability of network parameter error processing and utilizing false-data-injection techniques, the requirements on attackers' capability and system information are significantly reduced. An optimal detection strategy is designed to minimize the number of protected measurements needed.
Due to the close relevance to the reliability and efficiency of power systems, network parameters such as branch admittance have been the target of various cyberattacks. However, existing attack models are generally based on the impractical assumption that attackers can directly modify the data of network parameter stored in well-secured control centers. This article proposes a practical attack model and designs an optimal strategy to detect malicious modification of critical network parameters. Specifically, the vulnerability of network parameter error processing is discovered and exploited to indirectly modify the data of network parameter without accessing to the well-secured control center. A model of false-data-injection-enabled network parameter modification is proposed, which significantly reduces the requirements on attackers' capability and system information. An optimal detection strategy is designed based on the analysis of the minimal protection set at a single branch, which can significantly reduce the number of protected measurements in detecting malicious modification of critical network parameters. Finally, numerical simulations are carried out on the PJM 5-bus and the IEEE 118-bus test systems to validate the theoretical results.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available