Sparse Approximate Solutions to Linear Systems
SIAM Journal on Computing
On the approximability of minimizing nonzero variables or unsatisfied relations in linear systems
Theoretical Computer Science
Matrix analysis and applied linear algebra
Matrix analysis and applied linear algebra
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
False data injection attacks against state estimation in electric power grids
Proceedings of the 16th ACM conference on Computer and communications security
IEEE Transactions on Signal Processing - Part I
IEEE Transactions on Signal Processing - Part II
IEEE Transactions on Signal Processing
Addressing the challenges of anomaly detection for cyber physical energy grid systems
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
Modeling and verification of security properties for critical infrastructure protection
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
Hi-index | 0.00 |
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System monitoring is necessary to ensure the reliable operation of power grids, and state estimation is used in system monitoring to best estimate the power grid state through analysis of meter measurements and power system models. Various techniques have been developed to detect and identify bad measurements, including interacting bad measurements introduced by arbitrary, nonrandom causes. At first glance, it seems that these techniques can also defeat malicious measurements injected by attackers. In this article, we expose an unknown vulnerability of existing bad measurement detection algorithms by presenting and analyzing a new class of attacks, called false data injection attacks, against state estimation in electric power grids. Under the assumption that the attacker can access the current power system configuration information and manipulate the measurements of meters at physically protected locations such as substations, such attacks can introduce arbitrary errors into certain state variables without being detected by existing algorithms. Moreover, we look at two scenarios, where the attacker is either constrained to specific meters or limited in the resources required to compromise meters. We show that the attacker can systematically and efficiently construct attack vectors in both scenarios to change the results of state estimation in arbitrary ways. We also extend these attacks to generalized false data injection attacks, which can further increase the impact by exploiting measurement errors typically tolerated in state estimation. We demonstrate the success of these attacks through simulation using IEEE test systems, and also discuss the practicality of these attacks and the real-world constraints that limit their effectiveness.