Data Injection Attacks on Smart Grids With Multiple Adversaries: A Game-Theoretic Perspective

@article{Sanjab2016DataIA,
  title={Data Injection Attacks on Smart Grids With Multiple Adversaries: A Game-Theoretic Perspective},
  author={Anibal Sanjab and Walid Saad},
  journal={IEEE Transactions on Smart Grid},
  year={2016},
  volume={7},
  pages={2038-2049}
}
Data injection attacks have emerged as a significant threat on the smart power grid. By launching data injection attacks, an adversary can manipulate the real-time locational marginal prices to obtain economic benefits. Despite the surge of existing literature on data injection, most such works assume the presence of a single attacker and assume no cost for attack or defense. In contrast, in this paper, a model for data injection attacks with multiple adversaries and a single smart grid… 

Figures and Tables from this paper

Security attacks on smart grid scheduling and their defences: a game-theoretic approach

TLDR
A novel class of false data injection attacks that are based on modifying forecasted demand data is demonstrated, and the impact of the attacks on a typical system’s parameters is identified, using a simulated scenario.

Moving-Target Defense Against Cyber-Physical Attacks in Power Grids via Game Theory

TLDR
This work proposes a moving target defense strategy to detect coordinated cyber-physical attacks against power grids by invalidating the knowledge that the attackers use to mask the effects of their physical attack by actively perturbing the grid’s transmission line reactances via distributed flexible AC transmission system (D-FACTS) devices.

Cyber-physical Security Analysis of Smart Grids With Bayesian Sequential Game Models

TLDR
It is shown that the defender can determine the type of attacker and make the optimal strategy by the Bayesian sequential game model, which provides a reference for the security research on smart grids.

Moving-Target Defense for Detecting Coordinated Cyber-Physical Attacks in Power Grids

TLDR
The main idea of the proposed approach is to invalidate the knowledge that the attackers use to mask the effects of the physical attack by actively perturbing the grid’s transmission line reactances using distributed flexible AC transmission system (D-FACTS) devices.

Smart Grid Security: Threats, Challenges, and Solutions

TLDR
The key threats targeting the smart grid are first exposed while assessing their effects on the operation and stability of the grid and the challenges involved in understanding these attacks and devising defense strategies against them are identified.

Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids

TLDR
The aim of this work was to explore the space of possible behaviors of attackers and to develop a framework where the AMI nodes adaptively select the most profitable strategies and develop a discretization scheme for solving the replicator equations.

Performance and Resilience of Cyber-Physical Control Systems With Reactive Attack Mitigation

TLDR
The results show that the proposed framework can accurately characterize the maximum state estimation errors caused by an attacker who carefully designs the attack sequence to strike a balance between the attack magnitude and stealthiness, due to the simultaneous presence of attack detection and mitigation.

Modeling an Attack-Mitigation Dynamic Game-Theoretic Scheme for Security Vulnerability Analysis in a Cyber-Physical Power System

TLDR
Under two possible cyberattack scenarios, namely time delay of system recovery and distributed denial of service, a three-stage defender-attacker-defender tri-level mathematical programming model is proposed based on dynamic game theory of complete information.
...

References

SHOWING 1-10 OF 21 REFERENCES

Smart grid data injection attacks: To defend or not?

  • Anibal SanjabW. Saad
  • Computer Science, Engineering
    2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)
  • 2015
TLDR
It is shown that a higher cost of defense makes attackers more likely to attack and worsens the defender's expected utility, and shed light on the effect of the cost ofdefense on the attackers' and defender's optimal strategies and utilities.

Strategic Protection Against Data Injection Attacks on Power Grids

TLDR
A fast greedy algorithm to select a subset of measurements to be protected is proposed and another greedy algorithm that facilitates the placement of secure phasor measurement units (PMUs) to defend against data injection attacks is developed.

Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions

TLDR
The coordinated datainjection attack detection problem in the smart grid is considered and the data-injection attack model is first introduced and a thorough survey of existing detection methods is given.

Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study

TLDR
The effect of compromising each measurement on the price of electricity, so that the attacker is able to change the prices in the desired direction (increasing or decreasing) is specified.

Integrity Data Attacks in Power Market Operations

TLDR
This paper shows how an attack could systematically construct a profitable attacking strategy, in the meantime being undetected by the system operator, and formalizes the economic impact of malicious data attacks on real-time market operations.

False data injection attacks against state estimation in electric power grids

TLDR
A new class of attacks, called false data injection attacks, against state estimation in electric power grids are presented, showing that an attacker can exploit the configuration of a power system to launch such attacks to successfully introduce arbitrary errors into certain state variables while bypassing existing techniques for bad measurement detection.

Coding sensor outputs for injection attacks detection

TLDR
A method of coding the sensor outputs in order to detect stealthy false data injection attacks by employing a coding matrix to the original sensor outputs to increase the estimation residues, such that the alarm will be triggered by the detector even under intelligent data injections.

Transaction analysis in deregulated power systems using game theory

The electric power industry is in transition to a deregulated marketplace for power transactions. In this environment, all power transactions are made based on price rather than cost. A regional

Optimal Load Flow with Steady-State Security

The Dommel-Tinney approach to the calculation of optimal power-system load flows has proved to be very powerful and general. This paper extends the problem formulation and solution scheme by

Decentralized Learning of Nash Equilibria in Multi-Person Stochastic Games With Incomplete Information

TLDR
It is proved that all stable stationary points of the algorithm are Nash equilibria for the game and it is shown that the algorithm always converges to a desirable solution.